{"title":"A biometric approach towards recognizing face in various dark illuminations","authors":"S. Zeenathunisa, A. Jaya, M. Rabbani","doi":"10.1109/ICECCT.2011.6077059","DOIUrl":"https://doi.org/10.1109/ICECCT.2011.6077059","url":null,"abstract":"Face Recognition is a computerized biometric modality which automatically identifies an individual's face for the purpose of recognition. The ability to recognize human faces can be categorized under two senses, the former is the biometric identification and the later is the visual perception. The biometric identification can be done by obtaining a person's image and matching the same against the set of known images whereas the later is how the system percepts the familiar faces and recognize them. This paper presents such a biometric identification of the frontal static face image subjected in various dark illuminations. Face Recognition Biometric Systems automatically recognize the individuals based on their physiological characteristics. The research on such areas has been conducted for more than thirty years, but still more processes and better techniques for biometric facial extraction and recognition are required. This paper presents a framework on such issue by integrating the preprocessing method, local feature extractor and a recognizer for face recognition. An automatic FRBS has been developed that uses 1) Local Binary Pattern and 2) k — Nearest Neighbor classifier. Experimental results based on the Yale — B database show that the use of LBP and k-NN is able to improve the face recognition performance in various dark illuminations.","PeriodicalId":158960,"journal":{"name":"2011 International Conference on Electronics, Communication and Computing Technologies","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127365877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comprehensive analysis of delay in UDSM CMOS circuits","authors":"J. Samanta, B. P. De","doi":"10.1109/ICECCT.2011.6077064","DOIUrl":"https://doi.org/10.1109/ICECCT.2011.6077064","url":null,"abstract":"In this paper, we have developed a simple and accurate delay model for any Ultra Deep Sub-micron (UDSM) CMOS inverter, NAND2 & NOR2 based on nth power law of MOSFET model when the channel length is of the order of less than or equal to 90nm. We have taken all the parameters from BSIM.4.6.1 manual. This work derives analytical expression for the delay model of a CMOS inverter including all sorts of secondary effects such as Body Bias effect, Channel Length Modulation Effect (CLM), Velocity Saturation effect, Drain Induced Barrier Lowering (DIBL), etc which may occur in the Ultra Deep Submicron MOS devices. We also extend our delay model for 2 input CMOS NAND and NOR gate. Our result is better than nth power law and Cadence (UMC90nm) simulation result with respect to both quality and estimation time. Our proposed model gives an average error of only 3.63% with compare to Cadence Simulation result.","PeriodicalId":158960,"journal":{"name":"2011 International Conference on Electronics, Communication and Computing Technologies","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116847933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Developing Application Specific Integrated Circuits(ASIC) for cloud computing","authors":"Pannerselvam Velmyl","doi":"10.1109/ICECCT.2011.6077067","DOIUrl":"https://doi.org/10.1109/ICECCT.2011.6077067","url":null,"abstract":"Cloud computing is the emerging computing technology platform which resolves for a single platform for diversive applications. The paper takes up the issues of security, migration of applications from an internal data centre into cloud, scalability, billing and security. The paper thus points out the hardware incongruence for the cloud computing and presents key concepts for fabrication of VLSI chips. For example, the bills for cloud storage access is based on I/0 count. This metric is inaccurate since the cost of handling the bits varies from disk to disk. This arises due to variance of random access and sequential access used in disk. In sequential access, data is written to or read from one portion of the disk in a continual stream of bits. In random access, the disk head must jump around to different parts of the disk to read or write data. This disparity is immense since, sequential access can achieve a throughput on an average disk of up to 63.5MB/s (megabits per second), whereas random access can only be executed at 1.5MB/s. Techniques for reducing the random access and unnecessary metadata lookups are analyzed. The external threats for cloud from hardware hacking is attended and key alternatives are suggested for networking environment.","PeriodicalId":158960,"journal":{"name":"2011 International Conference on Electronics, Communication and Computing Technologies","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116590004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimized gain EDFA of different lengths with an influence of pump power","authors":"S. Semmalar, Poonkuzhali, P. Devi","doi":"10.1109/ICECCT.2011.6077076","DOIUrl":"https://doi.org/10.1109/ICECCT.2011.6077076","url":null,"abstract":"This Paper describes the simulation models of EDFA(Erbium Doped Fiber Amplifier) of different Lengths(10m, 50m and 120m) with optimized Gain and maintained noise figure is obtained using single pumping with the wavelengths 980nm or 1480nm and the results are plotted with an influence of various Pump power. In DWDM networks EDFA'S are an imperative elements and are regarded as a cost effective replacement of classical optoelectronic regenerative repeaters EDFA plays an important role in improvement of performance of optical fiber transmission systems. The proposed model consists of Input source with multiple channels, pumping source with the wavelengths 980nm or 1480nm and Isolator. The Erbium doped fiber amplifier's gain which appears in the signal to noise ratio expression is computed from the simulation. The resulting models accurately represent EDFA optimized gain. Simulation results, EDFA length of 10m and with 980nm pump of power 0.22W gives the gain of 40.17DB and for the same length of EDFA with 980nm pump of power 0.62W gives the optimized gain of 44.3DB and also with 980nm pump of power 1W gives the maximum optimized gain of 46DB and compared the results of Gain and noise figure with the wavelength of 1480nm and also with different lengths. This is applicable in Network reconfiguration and Multi-vendor networks and also addition of new services and wavelengths.","PeriodicalId":158960,"journal":{"name":"2011 International Conference on Electronics, Communication and Computing Technologies","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130781659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Denoising of MST radar data using complex wavelets","authors":"C. Madhu, T. Reddy","doi":"10.1109/ICECCT.2011.6077065","DOIUrl":"https://doi.org/10.1109/ICECCT.2011.6077065","url":null,"abstract":"This paper discusses the application of complex wavelet transform (CWT) which has significant advantages over real wavelet transform. CWT is a form of discrete wavelet transform, which generates complex coefficients by using a dual tree of wavelet filters to obtain their real and imaginary parts. In this paper we implement Selesnick's idea of dual tree complex wavelet transform where it can be formulated for standard wavelet filters without special filter design. We examine the behavior of 1 dimensional signal and implement the method for the analysis and synthesis of signal in frequency domain. Analysis and synthesis of a signal is performed on a test signal to verify the CWT application on 1D signal. The same is implemented for the MST radar signal. In this paper, CWT with custom thresholding algorithm is proposed for cleaning the spectrum. The proposed algorithm is self-consistent in detecting wind speeds up to a height of 20 km, in contrast to existing methods, which estimates the spectrum manually and failed at higher altitudes.","PeriodicalId":158960,"journal":{"name":"2011 International Conference on Electronics, Communication and Computing Technologies","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125862824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluation of the performance of FSO system using OOK and M-PPM modulation schemes in inter-satellite links with turbo codes","authors":"Naveen Kumar, V. Jain, Subrat Kar","doi":"10.1109/ICECCT.2011.6077070","DOIUrl":"https://doi.org/10.1109/ICECCT.2011.6077070","url":null,"abstract":"This paper gives a detailed overview of the inter-satellite links used in free space optical (FSO) communication. FSO communication uses laser technology to send and receive data. For the modulation of message signal, OOK and 8-PPM schemes are used. As energy in the inter-satellite link is a major constraint, OOK and M-PPM provide better options than others since they have to remain ON for the transmission of bit ‘1’ only. In this paper, turbo code is used for improving the system performance. Turbo code adds redundancy to the input block code. Therefore, it minimizes the average weight of the code and reduces the data rate. At the same time, it lowers the probability of error. Overall performance of the system improves significantly as evident from the computed results.","PeriodicalId":158960,"journal":{"name":"2011 International Conference on Electronics, Communication and Computing Technologies","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125638893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An approach towards improved cyber security by hardware acceleration of OpenSSL cryptographic functions","authors":"A. Thiruneelakandan, T. Thirumurugan","doi":"10.1109/ICECCT.2011.6077061","DOIUrl":"https://doi.org/10.1109/ICECCT.2011.6077061","url":null,"abstract":"Providing improved Information Security to the rapidly developing Cybernet System has become a vital factor in the present technically networked world. The information security concept becomes a more complicated subject when the more sophisticated system requirements and real time computation speed are considered. In order to solve these issues, lots of research and development activities are carried out and cryptography has been a very important part of any communication system in the recent years. Cryptographic algorithms fulfil specific information security requirements such as data integrity, confidentiality and authenticity. This work proposes an FPGA-based VLSI Crypto-System, integrating hardware that accelerates the cryptographic algorithms used in the SSL/TLS protocol. SSL v3 and TLS v1 protocol is deployed in the proposed system powered with a Nios-2 soft-core processor. The cipher functions used in SSL-driven connection are the Scalable Encryption Algorithm (SEA), Message Digest Algorithm (MD5), Secured Hash Algorithm (SHA2). These algorithms are accelerated in the VLSI Crypto-System that is on an Altera Cyclone III FPGA DE2 development board. The experimental results shows that, by hardware acceleration of SEA, MD5 and SHA2 cryptographic algorithms, the VLSI Crypto-System performance has increased in terms of speed, optimized area and enhanced level security for the target Cybernetic application.","PeriodicalId":158960,"journal":{"name":"2011 International Conference on Electronics, Communication and Computing Technologies","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132337861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"VLSI implementation of sorting network for ACSFD in WSN","authors":"K. Baskaran, M. Raghu, R. R. Kumar","doi":"10.1109/ICECCT.2011.6077081","DOIUrl":"https://doi.org/10.1109/ICECCT.2011.6077081","url":null,"abstract":"A fault-tolerant distributed decision fusion in the presence of sensor faults via Collaborative Sensor Fault Detection (CSFD) was used traditionally. CSFD scheme is proposed in which the results of a homogeneity test are used to identify the faulty nodes within the network such that their quantized messages can be filtered out when estimating the parameter of interest. The scheme can identify the faulty nodes efficiently and improve the performance of the decision fusion significantly. It achieves very good performance at the expense of such extensive computations as exponent and multiplication/division in the detecting process. In many real-time WSN applications, the fusion center might be implemented in an ASIC and included in a stand-alone device. Therefore, a simple and efficient decision fusion scheme requiring lower hardware cost and power consumption is extremely desired. In this paper, we propose the Approximated Collaborative Sensor Fault Detection (ACSFD) scheme and its VLSI architecture. Sorting operation are required in ACSFD to find out four biggest faulty node indexes for subsequent usage for this purpose. we have implemented different sorting algorithm to evaluate the efficiency of the sorting network.","PeriodicalId":158960,"journal":{"name":"2011 International Conference on Electronics, Communication and Computing Technologies","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114931351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance analysis of labeling technique for coronary arteries in angiogram images","authors":"A. Arulmurugan, G. Murugadass, D. Sharp, P. Kumar","doi":"10.1109/ICECCT.2011.6077077","DOIUrl":"https://doi.org/10.1109/ICECCT.2011.6077077","url":null,"abstract":"The medical imaging analysis is the process to view and understand the internal structure and function of the physiological system in medical diagnostic and therapeutic applications. Coronary artery angiography is playing a decisive role to determine the presence of cardiac diseases and the consequences for a therapeutic approach. So, the coronary angiography is remained for determining the extent, location and severity of the cardiac diseases. Automatically segmenting the coronary arteries in X-ray angiogram images has been an active area of research over the past several years and is an important task in medical imaging. Here mathematical morphological operations are used for segmenting the arteries. This method was impleme nted for a variety of clinical images. The results indicate the feasibility of achieving robust and consistently accurate image segmentation through this method.","PeriodicalId":158960,"journal":{"name":"2011 International Conference on Electronics, Communication and Computing Technologies","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127297398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"EDA based automatic detection of epileptic seizures using wireless system","authors":"S. Ganesan, T. Victoire, R. Ganesan","doi":"10.1109/ICECCT.2011.6077068","DOIUrl":"https://doi.org/10.1109/ICECCT.2011.6077068","url":null,"abstract":"Epilepsy is a neurological disorder which manifest by recurrent involuntary seizures. The seizures dynamics is wide ranging from blinking of the eye to severe muscle contraction. The last category can be life threatening for the person. Currently, the epileptic seizures are impossible to predict, an alternative is to detect the seizure as early as possible and to tell the care giver that a seizure occurred and take action. The current monitoring systems involve audio and video observation which is difficult to analyze in particular during the night. The wireless electronic diagnosing system designed here is exclusively meant for epilepsy patients. The system helps in accurately predicting the occurrence of seizures. In this paper, a new scheme is proposed for detecting epileptic seizures from the skin of epileptic patients. In this paper, a system with wireless electronic diagnosing system that combines Electro dermal activity (EDA), GPS, GSM, and ARM processor is proposed. This paper provides the location of epileptic patients through GPS technology and warning to the caring persons of epileptic patient through GSM technology.","PeriodicalId":158960,"journal":{"name":"2011 International Conference on Electronics, Communication and Computing Technologies","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129956750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}