2017 International Conference on Computing Methodologies and Communication (ICCMC)最新文献

筛选
英文 中文
Analysis of Time Bound Collaborative Access Control Delegation Model in Electronic Health Records 电子健康档案中限时协同访问控制授权模型分析
2017 International Conference on Computing Methodologies and Communication (ICCMC) Pub Date : 2017-07-01 DOI: 10.1109/ICCMC.2017.8282724
C. Kalpana, S. Revathy
{"title":"Analysis of Time Bound Collaborative Access Control Delegation Model in Electronic Health Records","authors":"C. Kalpana, S. Revathy","doi":"10.1109/ICCMC.2017.8282724","DOIUrl":"https://doi.org/10.1109/ICCMC.2017.8282724","url":null,"abstract":"Electronic Health Records (EHR) is the digital record shared across multiple users like hospital, personal physicians, researchers, insurance companies and many. Such a scenario of data sharing attracts much attention towards security and privacy of their own medical records. These data are patient centric and patients are very much concerned towards the limitations in sharing of their own medical records. We present a time bound combined access control model which provides concerns on spatial dimensions and time constraints to concern over temporal dimensions. This model aims in providing privacy since dynamic key creation and distribution is included based on the time constraint using a new key assignment scheme suitable for hierarchical systems. The research focus will be on insisting the importance of the role of Delegation and Access Control in Health care. Time Bound Access Control is to be proposed and concentrated much on developing and implementing algorithms related to combining various access controls techniques as a time bound delegation model. Combining privacy policy through an analyzer will control the access of data, which gives the privacy of the data.","PeriodicalId":163288,"journal":{"name":"2017 International Conference on Computing Methodologies and Communication (ICCMC)","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123244649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Scan methodology and ATPG DFT techniques at lower technology node 低技术节点的扫描方法和ATPG DFT技术
2017 International Conference on Computing Methodologies and Communication (ICCMC) Pub Date : 2017-07-01 DOI: 10.1109/ICCMC.2017.8282741
Janki K Chauhan, Chintan Panchal, Haresh A. Suthar
{"title":"Scan methodology and ATPG DFT techniques at lower technology node","authors":"Janki K Chauhan, Chintan Panchal, Haresh A. Suthar","doi":"10.1109/ICCMC.2017.8282741","DOIUrl":"https://doi.org/10.1109/ICCMC.2017.8282741","url":null,"abstract":"As VLSI Technology is continuously shrinking to lower technology nodes, we need efficient techniques for testing on lower nodes because as Design Complexity grows, there are numbers of challenges including higher test cost, higher power consumption, test time, area, pin count and new defects at small geometries(variation in transistor's channel length, W/L ratio, threshold voltage). Reliability and testability both are the important parameters in today's VLSI design. We use design for testability for this purpose. Scan is the first step for inserting DFT(design for testability) architecture in any chip. Thus scan insertion improves the controllability and observability of the sequentially flops. After that pattern generation step is there which is generated by ATPG (Automatic test pattern generation) Tool and finally pattern simulation will give results in terms of pass/fail patterns. The purpose of this paper is to implement scan insertion flow architecture on lower technology nodes and detect the targeted faults through the pattern generation by ATPG which will improve the yield on SOC by fault detection using some EDA tools. It also includes the optimization of the most important test parameters related to testability.","PeriodicalId":163288,"journal":{"name":"2017 International Conference on Computing Methodologies and Communication (ICCMC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125528196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Design and simulation of multimaster ahblite bus interconnect 多主总线互连的设计与仿真
2017 International Conference on Computing Methodologies and Communication (ICCMC) Pub Date : 2017-07-01 DOI: 10.1109/ICCMC.2017.8282672
Anurag Ingle, P. Srividya
{"title":"Design and simulation of multimaster ahblite bus interconnect","authors":"Anurag Ingle, P. Srividya","doi":"10.1109/ICCMC.2017.8282672","DOIUrl":"https://doi.org/10.1109/ICCMC.2017.8282672","url":null,"abstract":"This paper implements an Advanced Microcontroller Bus Architecture (AMBA) AHBLite bus interconnect fabric using multi layer interconnect bus matrix. This interconnect has four masters and sixteen slaves thus makes it a multi-master AHBLite. We can enable or disable each slave for each master using the control parameters. Those slaves which are not used by any master, gets optimized away after synthesis. The arbiter logic used is Round robin algorithm. We can combine two or more slaves to get one additional slave interface for connection. This feature is useful when a master wants to access a number of resources through a single slave interface. It also provides remap functionality for first master. When remap is high, slave 0 and slave 1 memory space are swapped. The complete design is realized using Verilog HDL and simulated using ModelSim SE 10.4c and synthesized using Synplify to obtain resource utilization. The results obtained shows that the design uses very less resources of the device.","PeriodicalId":163288,"journal":{"name":"2017 International Conference on Computing Methodologies and Communication (ICCMC)","volume":"193 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122501281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Virtex FPGA based flash memory controller for chandrayaan - 2 lander mission 月船2号着陆器基于Virtex FPGA的闪存控制器
2017 International Conference on Computing Methodologies and Communication (ICCMC) Pub Date : 2017-07-01 DOI: 10.1109/ICCMC.2017.8282726
D. Patel, Yogesh D. Parmar
{"title":"Virtex FPGA based flash memory controller for chandrayaan - 2 lander mission","authors":"D. Patel, Yogesh D. Parmar","doi":"10.1109/ICCMC.2017.8282726","DOIUrl":"https://doi.org/10.1109/ICCMC.2017.8282726","url":null,"abstract":"After successful mission Chandrayaan - 1 India decide to launch Chandrayaan - 2. The Chandrayaan - 2 is planned to launch with a lunar orbiter, lander and rover. The lander is accomplishing autonomous soft and safe landing at the south polar region of the moon. For safe and soft landing one of the key elements is the Hazard Detection and avoidance (HDA) system which is under progress. HDA processor is process on landmarks which are based on crater topology on lunar surface from previous mission. Other parameters like matching algorithms, real time data and reference images are required for the correct navigation and exact predicted location of lander. So for storage of this reference images and real time data we required high density, space grade flash memory. For this purpose of storage RTIMS (Radiation tolerant intelligent memory stack) flash memory is used. This RTIMS flash memory controller prepared in Virtex FPGA in HDA processor. This paper presents and gives details of basic architecture, Design, comparison, VHDL implementation and test results of RTIMS flash controller.","PeriodicalId":163288,"journal":{"name":"2017 International Conference on Computing Methodologies and Communication (ICCMC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116427492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lip's movements biometric authentication in electronic devices 唇的动作在电子设备上的生物识别认证
2017 International Conference on Computing Methodologies and Communication (ICCMC) Pub Date : 2017-07-01 DOI: 10.1109/ICCMC.2017.8282619
R. Kotkar Shubhangi, N. Balbhim
{"title":"Lip's movements biometric authentication in electronic devices","authors":"R. Kotkar Shubhangi, N. Balbhim","doi":"10.1109/ICCMC.2017.8282619","DOIUrl":"https://doi.org/10.1109/ICCMC.2017.8282619","url":null,"abstract":"System authentication key is very sensitive and important part of today's smart and high technology system. Key contains the biometric information of the human body. Detection of the face, lip and lip movements are taken as the key for the system. In the whole process of authentication different phases are there which includes reading video file, framing, segmentation, removal of noise using median filter, classification of templates using hamming distance, recognition password, etc. Results are taken from offline stored videos. Results need improvement in terms of accuracy.","PeriodicalId":163288,"journal":{"name":"2017 International Conference on Computing Methodologies and Communication (ICCMC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125973450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Monitoring and detection of EEG signals before and after yoga during depression in human brain using MATLAB 利用MATLAB对抑郁症患者瑜伽前后脑电信号的监测与检测
2017 International Conference on Computing Methodologies and Communication (ICCMC) Pub Date : 2017-07-01 DOI: 10.1109/ICCMC.2017.8282702
Ankita Tiwari, R. Tiwari
{"title":"Monitoring and detection of EEG signals before and after yoga during depression in human brain using MATLAB","authors":"Ankita Tiwari, R. Tiwari","doi":"10.1109/ICCMC.2017.8282702","DOIUrl":"https://doi.org/10.1109/ICCMC.2017.8282702","url":null,"abstract":"Stress is a very normal issue among the present generation people & every people wants to reduce his stress. The mental response of events in stressed state of mind causes the imbalance in neural activities. In this paper author analyses the EEG signals which are responsible for stress or depression and how they can be controlled. Reasons of mood swings are also analysed and the activities, which are responsible, can be varied person to person, by which it can be controlled. Here the author basically focused on analysing the changes in EEG waves due to mood swings and how the yoga exercise will help in the prevention of these switching s. Here the author will focus on meditation like yoga techniques to reduce stress and analyse those frequencies which are required for relaxation of brain.","PeriodicalId":163288,"journal":{"name":"2017 International Conference on Computing Methodologies and Communication (ICCMC)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121483359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Automatic segmentation technique for detection of brain tumor in MRI images MRI图像中脑肿瘤检测的自动分割技术
2017 International Conference on Computing Methodologies and Communication (ICCMC) Pub Date : 2017-07-01 DOI: 10.1109/ICCMC.2017.8282695
Vishal Sawant, Palhavi Kerkar
{"title":"Automatic segmentation technique for detection of brain tumor in MRI images","authors":"Vishal Sawant, Palhavi Kerkar","doi":"10.1109/ICCMC.2017.8282695","DOIUrl":"https://doi.org/10.1109/ICCMC.2017.8282695","url":null,"abstract":"Cerebrum Tumor is the development of anomalous cells in the mind. X-ray is valuable apparatus for the discovery of tumor development. The medicinal issues are serious if tumor is identified at the later stage consequently most punctual analysis is essential. In this paper we naturally remove the tumor in MR Images by pixel based division technique. It includes upgrade, division and arrangement steps. To extricate the element the improved pictures are portioned and ordered by marking pictures into ordinary and anomalous. It is accomplished for various MRI tests. In the event that specimens are more in number, doctor could spare time utilizing this strategy.","PeriodicalId":163288,"journal":{"name":"2017 International Conference on Computing Methodologies and Communication (ICCMC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129062317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Power systems protection coordination and associated reliability with smart grid security 电力系统保护协调及与智能电网安全相关的可靠性
2017 International Conference on Computing Methodologies and Communication (ICCMC) Pub Date : 2017-07-01 DOI: 10.1109/ICCMC.2017.8282648
S. Rao, G. M. Babu
{"title":"Power systems protection coordination and associated reliability with smart grid security","authors":"S. Rao, G. M. Babu","doi":"10.1109/ICCMC.2017.8282648","DOIUrl":"https://doi.org/10.1109/ICCMC.2017.8282648","url":null,"abstract":"In this paper, new Hierarchically Coordinated Protection (HCP) concept that mitigates and manages the effects of increased grid complexity on the protection of the power system is proposed. The concept is based on predicting protection circumstances in real-time, adapting protection actions to the power system's prevailing conditions, and executing corrective actions when an undesirable outcome of protection operation is verified. Depending on an application, HCP concept may utilize local and wide area measurements of the power system parameters, as well as non-power system data, such as meteorological, detection of lightning strikes, outage data and geographic information. Since HCP introduces intelligence, flexibility and self-correction in protection operation, it is well suited for the systems with increased penetration of renewables where legacy solutions may be prone to mis-operate. Such instances are unintended distance relay tripping for overloaded lines, insensitive anti-islanding scheme operation, and inability to mitigate cascading events, among other system conditions caused by renewable generation prevailing in future grids.","PeriodicalId":163288,"journal":{"name":"2017 International Conference on Computing Methodologies and Communication (ICCMC)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130463826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A survey paper on 3D reconstruction of underwater coral reef images 水下珊瑚礁图像三维重建研究综述
2017 International Conference on Computing Methodologies and Communication (ICCMC) Pub Date : 2017-07-01 DOI: 10.1109/ICCMC.2017.8282665
Seema Sultana, Sunanda Dixit
{"title":"A survey paper on 3D reconstruction of underwater coral reef images","authors":"Seema Sultana, Sunanda Dixit","doi":"10.1109/ICCMC.2017.8282665","DOIUrl":"https://doi.org/10.1109/ICCMC.2017.8282665","url":null,"abstract":"The research work here describes the 3D reconstruction work of coral reef images using the Epipolar Geometry. Here utilizing a multi-see camera framework comprising of 3 indistinguishable waterproof cameras showed on a stereo-base, and gathered film of the ocean bottom in direct transects. To build up a 3D-portrayal of the ocean bottom picture sets were initially separated from the video film physically. At that point relating focuses are naturally separated from the stereo-matches by the notable SURF calculation. In light of the resultant x, y, z point cloud the 3D appearance of the coral reef is approximated by Epipolar strategy using Gradient Field.","PeriodicalId":163288,"journal":{"name":"2017 International Conference on Computing Methodologies and Communication (ICCMC)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131345983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Analysis of optimal voltage stability in power systems with wind power 风电电力系统最优电压稳定性分析
2017 International Conference on Computing Methodologies and Communication (ICCMC) Pub Date : 2017-07-01 DOI: 10.1109/ICCMC.2017.8282602
M. G. Sugirtha, P. Latha, N. Karuppiah, J. Shanmugapriyan
{"title":"Analysis of optimal voltage stability in power systems with wind power","authors":"M. G. Sugirtha, P. Latha, N. Karuppiah, J. Shanmugapriyan","doi":"10.1109/ICCMC.2017.8282602","DOIUrl":"https://doi.org/10.1109/ICCMC.2017.8282602","url":null,"abstract":"Due to various environmental and economic constraints, the transmission networks are tending to operate close to loadability limit. Loadability limit is known as the point in which demand reaches the maximum value. But if the system is operating near to loadability limit, then there is a possibility of voltage instability. Maximum loadability point or point of voltage collapse can be computed using optimization methodologies. This paper mainly deals with Gravitational Search Algorithm (GSA) as an optimization technique to determine loadability limit of power system integrated with wind power. The IEEE 14-bus System which is modified to incorporate wind power generation is used for the simulation in MATLB and the results show more enhancements in the loadability limit of power system. The wind generation is augmented to standard IEEE14 bus test system and the infiltration level is varied to assess the influence of wind power on voltage stability and loadability limit enhancement.","PeriodicalId":163288,"journal":{"name":"2017 International Conference on Computing Methodologies and Communication (ICCMC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131419491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信