{"title":"Design of CORDIC coprocessor for sparc V8","authors":"Y. Nirmala, Shilpa Kc, Umesh Sb, Hareesh Kumar","doi":"10.1109/ICCMC.2017.8282674","DOIUrl":"https://doi.org/10.1109/ICCMC.2017.8282674","url":null,"abstract":"CORDIC (COordinate Rotation DIgital Computer), also known as Volder's algorithm, is a simple and efficient algorithm to calculate hyperbolic functions, natural log, square root and trigonometric functions. The operations required for the solving or evaluating Cordic equation are simple shift operation, addition and subtraction to find sine and cosine. It also has small lookup table to store constant values. In earlier design single processor where used, which increases the number of clock cycles, reduces the speed and performance of the system during the calculation of trigonometric function because it uses Taylor's series method where multiplication of two variables consumes more time i.e. software implementation. So we go for separate processor in an processor called coprocessor using hardware implementation method i.e. CORDIC method which helps in clock cycle reduction, high performance, low cost. The design is described in VHDL and simulated in modelsim.","PeriodicalId":163288,"journal":{"name":"2017 International Conference on Computing Methodologies and Communication (ICCMC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128372957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and implementation of high speed modified booth multiplier using hybrid adder","authors":"Divya Govekar, A. Amonkar","doi":"10.1109/ICCMC.2017.8282661","DOIUrl":"https://doi.org/10.1109/ICCMC.2017.8282661","url":null,"abstract":"Multiplier is one of the most desirable component in most of the processors designed today. The speed of multiplier determines the speed of the processor. So there is a need of high speed multiplier. In this paper, a novel method for Multiplication is proposed by combining Modified Booth algorithm, Wallace tree architecture and Hybrid adder design. Modified Booth Multiplier reduces the number of partial products and has least latency as compared to other multiplier designs. Wallace Tree increases the speed by parallel addition of partial products. Adders play an important role in addition of partial products. If the speed at which the addition operation is performed is increased than the overall speed of the multiplier design will increase. So the main focus in this paper is to increase the speed of the adder. A novel hybrid adder design is used in the multiplier design which, has less delay and occupies less area. Area, delay and power complexities of the proposed Multiplier design are reported. The proposed Modified Booth Multiplier design shows better performance compare to conventional method using Carry LookAhead Adder and has advantages of reduced area overhead and critical path delay. The proposed multiplier design has been synthesized using Xilinx ISE 10.1 design tool and simulated using ModelSim15.7g. The programming language used is Verilog HDL.","PeriodicalId":163288,"journal":{"name":"2017 International Conference on Computing Methodologies and Communication (ICCMC)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131959357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Image security using image encryption and image stitching","authors":"Jyoti T. G. Kankonkar, N. Naik","doi":"10.1109/ICCMC.2017.8282663","DOIUrl":"https://doi.org/10.1109/ICCMC.2017.8282663","url":null,"abstract":"With increase in digital communication, multimedia data such as digital images, videos etc. we require fast and robust security systems. To achieve high security, encryption is one of the way to protect our data from unauthorized users. In this paper, the proposed model aims to provide security to the images using a combination of image encryption and image stitching techniques. The use of chaotic methods in the encryption makes it more difficult for the attackers to decrypt the image. Every image to be transferred is first partitioned and then each part is encrypted and sent to the receiver. That is why a person with a single part or two parts of the image will not be able to use that image. Image stitching algorithm used on the receivers end makes it easy for him to generate the original image. Image encryption along with image stitching provides a double layer of protection to the image. The need for this approach is to achieve security and privacy during the communication.","PeriodicalId":163288,"journal":{"name":"2017 International Conference on Computing Methodologies and Communication (ICCMC)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122376339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An conceptual view of an iris-biometric identification system canny edge detection techniques","authors":"N. Jagadeesh, C. M. Patil","doi":"10.1109/ICCMC.2017.8282710","DOIUrl":"https://doi.org/10.1109/ICCMC.2017.8282710","url":null,"abstract":"In the current years, extreme changes have been refined in the regions like iris acknowledgment, mechanized iris division, edge discovery, limit identification and so on. Iris acknowledgment is a biometric acknowledgment innovation that uses the example acknowledgment procedures in view of the brilliant pictures of iris. An iris acknowledgment framework fundamentally utilizes infrared or else the noticeable light. The frameworks which depend on close infrared light (NIR) are exceptionally basic on the grounds that NIR won't create reflections that makes iris acknowledgment complex. Yet, NIR pictures needs shade tinge data, in this way acknowledgment calculations should completely rely on upon the examples that are disconnected to shading. In this paper, we have exhibited the definite procedure of the calculation usage alongside the reenactment comes about. The proposed system alongside the introduced reproduction comes about demonstrates the adequacy of the technique created by us.","PeriodicalId":163288,"journal":{"name":"2017 International Conference on Computing Methodologies and Communication (ICCMC)","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127998894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"P2P bot detection system based on map reduce","authors":"B. Sengar, B. Padmavathi","doi":"10.1109/ICCMC.2017.8282543","DOIUrl":"https://doi.org/10.1109/ICCMC.2017.8282543","url":null,"abstract":"Among the various sorts of malware, botnets are rising briskly as one of the most serious threat against cyber-security. Botnets supply a distributed platform for many prohibited activities like launching distributed denial of service attacks against crucial targets, phishing, malware dissemination, click fraud etc. The characteristic of botnets is that they use command and control channels to keep themselves updated and directed. P2P Botnets are one of the most malevolent threats to the Internet users due to their resiliency against takedown. This paper proposes a scalable model which can be used for botnet detection in P2P network. This proposed system treats network traffic as a data stream, segregating the traffic into two parallel streams. The detection is based on failure traffic, communication traffic and frequency of traffic. The traffic is analyzed during small time window, and the infected hosts are reported immediately.","PeriodicalId":163288,"journal":{"name":"2017 International Conference on Computing Methodologies and Communication (ICCMC)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128727934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis and design of x-band down converter for data acquisition system of satellite ground station","authors":"Bhanuprasad Eppe, N. Soniya, P. Sivaprasad","doi":"10.1109/ICCMC.2017.8282544","DOIUrl":"https://doi.org/10.1109/ICCMC.2017.8282544","url":null,"abstract":"Data Acquisition system of the Remote Sensing Satellite Ground Station established for Indian satellite receives data from IRS Series of satellites in X-Band frequency. Antenna, Feed and RF system receive the signals from faraway sensing satellites in X Band. In this paper the study evaluation and design of X-band twin down converter, to convert incoming RF frequency (7.9 to 8.5) GHZ to lower (S-band) frequency 2.3 to 2.9GHZ by beating with fixed 5.7GHZ VCO frequency, derived by PLL technology, is attempted. In the 2nd stage (2.3 to 2.9) GHZ frequency is translated to suitable Intermediate frequency 720MHZ, through pounding with a frequency synthesizer having the variety of 1.5 to 2.3GHZ by tuning the frequency synthesizer frequency. We can adapt all incoming frequency within the variety of 7.9 to 8.6GHz to suitable 720MHZ, Here the down conversion has got the capability of multi mission.","PeriodicalId":163288,"journal":{"name":"2017 International Conference on Computing Methodologies and Communication (ICCMC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115879580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation of real time secure routing protocol for mobile ad HOC network and AES for disaster affected area","authors":"M. Mukhedkar, U. Kolekar","doi":"10.1109/ICCMC.2017.8282738","DOIUrl":"https://doi.org/10.1109/ICCMC.2017.8282738","url":null,"abstract":"The implementation of a suitable example of Ad hoc network routing protocol which is without centralized infrastructure for disaster affected area like flood in Jammu & Kashmir and Mumbai is performed. For the establishment of wireless connectivity without fixed infrastructure the data exchange can be done with the help of wireless channels with multi hop. The routing protocols are required for communication in Ad hoc network. The key aspect of Ad hoc network is to provide efficient performance parameter for timely delivery of real time and non real time information. The various performance parameters of an Ad hoc network are analyzed with respect to three important routing protocols such as Ad hoc on Demand Distance Vector (AODV) protocol, Destination Sequence Distance Vector (DSDV) protocol and Dynamic Source Routing (DSR) protocol for a suitable numbers of node configurations. The analysis of all the necessary parameters is done. The Ad hoc network is implemented in Network Simulator 2. The Advance Encryption Standard security algorithm is utilized to provide the security to the packets used for real time communication in the Ad hoc network. For defense and military point of view it is essential to achieve secure communication. In the initial stage AES-128 is implemented for getting desire encryption and decryption results.","PeriodicalId":163288,"journal":{"name":"2017 International Conference on Computing Methodologies and Communication (ICCMC)","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116363322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Review: Methods for relay coordination","authors":"Shubhangi B. Walke, N. Jangle","doi":"10.1109/ICCMC.2017.8282625","DOIUrl":"https://doi.org/10.1109/ICCMC.2017.8282625","url":null,"abstract":"Reliability of the power system degrades with abnormal operating condition of the protective system caused due to overvoltage, under-frequency, overload etc. which may leads to interruption of the supply, and may damage equipment's connected to the system. To maintain system stability and reliability it is necessary to have a protective system which operates as quickly as possible, isolates smallest part of the system under fault. For this purpose it is necessary to have coordination between the protective devices to assure safe operation. This paper represents the relay coordination of distribution system with and without penetration of distributed generators due to increase in the interest in distributed generation by renewable energy sources. Directional overcurrent relaying, which is simple and economic, is commonly used as primary protection in distribution and sub transmission system and secondary protection in transmission system. This inclusion of DG may cause false tripping in feeders, increasing or decreasing short circuit levels, bidirectional power flow in case of radial distribution system, so to find the optimal solution of relay coordination problem there are different optimization methods. In this paper review of the methods like Genetic algorithm, Linear programming, Particle swarm optimization and Hybrid PSO is presented. Out of these methods hybrid PSO gives better solution with less iterations as compared to Genetic algorithm, Linear programming. In Hybrid PSO, TMS is considered as continuous parameter and current setting as discrete parameter. TMS is calculated by linear programming at the end of each iteration of PSO optimization algorithm.","PeriodicalId":163288,"journal":{"name":"2017 International Conference on Computing Methodologies and Communication (ICCMC)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114806467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Impact of distributed generation on relay coordination","authors":"Shubhangi B. Walke, N. Jangle","doi":"10.1109/ICCMC.2017.8282592","DOIUrl":"https://doi.org/10.1109/ICCMC.2017.8282592","url":null,"abstract":"The reliability and stability of the power system decreases with abnormal operating condition of the protective system which may be caused due to overvoltage, under-frequency, overload etc. and leads to interruption of the supply, and may damage equipment's connected to the system. To maintain system stability and reliability it is necessary to have a protective system which operates as quickly as possible, isolates smallest part of the system under fault. For this purpose it is necessary to have coordination between the protective devices to assure safe operation. Over-current relays especially Inverse Definite Minimum Time (IDMT) relays are most commonly used protective device in the distribution system. It is vital that during abnormalities or faults, the IDMT relays must be capable to isolate only the faulty part of power system from the healthy system. A population based optimization algorithm called Teaching-learning based optimization algorithm is used in order to get optimum settings of TMS & PS. The CTI associated with primary and backup relay pairs is getting violated due to changes in fault current level. Thus coordination between primary and back up relays fails in the presence of distributed Generation. Hence interconnection of DG in the distribution system causes adverse impact on protection coordination","PeriodicalId":163288,"journal":{"name":"2017 International Conference on Computing Methodologies and Communication (ICCMC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114913650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparative study of adaptive neuro-fuzzy and fuzzy inference system for diagnosis of hypertension","authors":"Rimpy Nohria","doi":"10.1109/ICCMC.2017.8282719","DOIUrl":"https://doi.org/10.1109/ICCMC.2017.8282719","url":null,"abstract":"Adaptive neuro-fuzzy inference system (ANFIS) for diagnosis of hypertension is proposed in this paper. Hypertension patient's records are collected under the supervision of physician on real time basis. The system is trained using hybrid training algorithm. The trained model is tested by using new patient's record. Further the performance of the diagnosing capability of the system is compared with judgment of physician on same test cases. The performance of the system is also compared with existing fuzzy expert system in terms of several parameters. We have obtained 94.63% accuracy from the experiments made on record collected from physician and it was very promising with regard to existing system. We have obtained sensitivity 97.50%, specificity 93.33% and precision 98.11% values for diagnosis hypertension.","PeriodicalId":163288,"journal":{"name":"2017 International Conference on Computing Methodologies and Communication (ICCMC)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125451555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}