M. Srivastava, D. Prasad, Laxya, Avadesh K. Sharma
{"title":"Novel Active Circuit for Realizing Variable Grounded Passive Elements","authors":"M. Srivastava, D. Prasad, Laxya, Avadesh K. Sharma","doi":"10.1109/ICMETE.2016.110","DOIUrl":"https://doi.org/10.1109/ICMETE.2016.110","url":null,"abstract":"This research paper presents a novel circuit configuration which can increase or decrease the value of an arbitrary grounded passive component. The proposed configuration employs two voltage differencing transconductance amplifiers (VDTAs) and does not require any passive component except the component to be scale. Hence, this configuration can be considered as a completely active circuit. The proposed circuit can increase/decrease the value of used passive component by a multiplication factor which includes the tranconductance gains of VDTAs. So, the value of passive element can be tuned electronically by varying bias currents. The presented configuration has several beneficial features such as no requirement(s) of component matching, low sensitivity indexes and excellent behavior under non-ideal conditions. The utilization of presented passive element multiplier has been validated by a high-pass filter design example. To verify the mathematical analysis, SPICE simulations have been performed with TSMC 0.18µm CMOS process parameters model.","PeriodicalId":167368,"journal":{"name":"2016 International Conference on Micro-Electronics and Telecommunication Engineering (ICMETE)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122564516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Automatic System for Recognition and Assessment of Anger Using Adaptive Boost","authors":"Palac Chhabra, Garima Vyas, Joyjit Chatterjee, Sven-Hendrik Voss","doi":"10.1109/ICMETE.2016.89","DOIUrl":"https://doi.org/10.1109/ICMETE.2016.89","url":null,"abstract":"This paper proposes a method to identify and assess different levels of anger from the speech utterances. Unlike the existing methods which only detect the emotion from speech, the proposed method not only detects but also labels the level of an emotion. A 75 dimensional feature vector has been extracted from each audio clip and is used for training and testing. For classification and assessment the adaptive boosting algorithm is used. Experiments were performed on a dataset of seven emotions. 231 audio clips were used for training and 100 were used for testing. The accuracy of the proposed system to detect 'Angry' emotion is 78.3%. All the angry clips are classified into low, medium and high level of anger.","PeriodicalId":167368,"journal":{"name":"2016 International Conference on Micro-Electronics and Telecommunication Engineering (ICMETE)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123355536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Choudhury, Vivek Kumar, Darshika Nigam, Bhaskar Mandal
{"title":"Intelligent Classification of Lung & Oral Cancer through Diverse Data Mining Algorithms","authors":"T. Choudhury, Vivek Kumar, Darshika Nigam, Bhaskar Mandal","doi":"10.1109/ICMETE.2016.24","DOIUrl":"https://doi.org/10.1109/ICMETE.2016.24","url":null,"abstract":"Nowadays, the environment of healthcare is quiet richin information, but knowledge wise the data is very poor. There isan availability of ample amount of data within the systems ofhealthcare. Nevertheless, there is a absence of genuine tools ofinvestigation in order to determine hidden associations in data. The main motive of this investigation is towards the speciallydesigned GUI based Interface in order to input the patient'srecord. Thus anticipate whether or not the patient is sufferingfrom the lung and oral cancer by the use of the rule basedclassifier. The forecast is done from the process of mining therecent informative data of the patient and data repository or thereference value for every attributes. The reference values aretaken from specialist doctors, and internet repository. In thisresearch a comparison of Multilayer perceptron and simplelogistic algorithm have been carried out so as to analyse anddetect the lung and oral cancer in an intelligent way.","PeriodicalId":167368,"journal":{"name":"2016 International Conference on Micro-Electronics and Telecommunication Engineering (ICMETE)","volume":"143 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115278288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Tactile Array Sensor with Piezoresistive Cantilever Embedded in Air Cavity","authors":"Shweta Jain, Deepak Bhatia","doi":"10.1109/ICMETE.2016.21","DOIUrl":"https://doi.org/10.1109/ICMETE.2016.21","url":null,"abstract":"In this paper, we proposed array of cantilever to increase sensitivity of a Piezoresistive tactile sensor. As in conventional tactile sensor there is four cantilevers is embedded in air cavity. We formed an array of 2*2 of conventional sensing element which is embedded in air cavity. In this paper we simulate the array of cantilevers by which we confirmed that sensitivity is increased by 20 times. Tactile sensor is used in the area of robotics, manipulating objects and robot-hands is one of the main studies. To achieve exploitation with optimum pressure, as the human does, it is essential to compute as well as apply the pressure, which occurs between the target object and the robot-hands.","PeriodicalId":167368,"journal":{"name":"2016 International Conference on Micro-Electronics and Telecommunication Engineering (ICMETE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131539155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bluetooth Worm Propagation in Mobile Networks","authors":"Sumitra Tiwari, V. Tiwari","doi":"10.1109/ICMETE.2016.132","DOIUrl":"https://doi.org/10.1109/ICMETE.2016.132","url":null,"abstract":"Everyday lives are dependent on networked services. Endpoint data capture was a necessity and Bluetooth was developed as a viable option. It is a point to point short range wireless technology that provides high capacity data transfer. IEEE standards 802.15 commonly termed as Bluetooth support. Bluetooth has the facility of automatic detection and is extremely easy to use. First Bluetooth worm was reported in 2004 and since then specific malware designed to propagate through Bluetooth have been reported. Bluetooth worm can harm the target device besides eating away battery life and malfunction within the target system. This paper analyses Bluetooth worm propagation and its peculiarities as compared with internet worms. Dependent models that study effects of mobility, concentration of mobiles in a particular area on the propagation of Bluetooth worm have been discussed.","PeriodicalId":167368,"journal":{"name":"2016 International Conference on Micro-Electronics and Telecommunication Engineering (ICMETE)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127052768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Memory Based Floating Point FFT Processor Using Vedic Multiplication for Pulse Doppler RADAR","authors":"Bhawna Kalra, J. B. Sharma","doi":"10.1109/ICMETE.2016.40","DOIUrl":"https://doi.org/10.1109/ICMETE.2016.40","url":null,"abstract":"A radix -2 based 32 bit memory based floating point FFT processor using Vedic multiplication for pulse Doppler RADAR is presented in this paper. In proposed architecture twiddle factor is stored in memory. This architecture uses Urdhvtiryakabhyam sutra for multiplication process. Due to this computational complexity of FPGA gets reduce because it provides an external multiplication module to the FPGA tool and area required also gets reduces. This is a performance enhancement strategy because it reduces propagation delay of circuit and also reduces transmitted power and area required. Propagation delay of the proposed architecture at 40MHz frequency is 200ns. Hence latency of circuit gets increases. Hardware Simulation is done on Xilinx ISE simulator 14.2 and test bench results are received on Xilinx isim simulator.","PeriodicalId":167368,"journal":{"name":"2016 International Conference on Micro-Electronics and Telecommunication Engineering (ICMETE)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116909112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Digital Speech Watermarking for Authenticity of Speaker in Speaker Recognition System","authors":"Nihalkumar G. Desai, Nikunj Tahilramani","doi":"10.1109/ICMETE.2016.13","DOIUrl":"https://doi.org/10.1109/ICMETE.2016.13","url":null,"abstract":"Speaker recognition is a process of speakeridentification and speaker verification refers to specific tasks. Where security is a main concern, speaker Recognitiontechnique is one of the most helpful recognition techniques intoday world. It is very important to identify correct person andefficiently work without fail of Recognition system. There aresome possibilities of direct attack and indirect attack inspeaker recognition system by an unauthorized person. An Unauthorized person can attack in the speaker recognitionsystem for retrieve the system. To prevent this kind attackthere is need of a new level of security, for that new scheme ofwatermark technology is proposed here. The watermark isused for the authenticity of claiming speaker. Watermarktechnology is not effect on the quality of claimed speakerspeech signal. Here watermarking technology is 100% efficientto identify the attack and authenticity detection of Speaker.","PeriodicalId":167368,"journal":{"name":"2016 International Conference on Micro-Electronics and Telecommunication Engineering (ICMETE)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123524842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Stub-Based Design of Coupled Line Directional Couplers","authors":"B. Yaduvanshi, Deepak Bhatia","doi":"10.1109/ICMETE.2016.22","DOIUrl":"https://doi.org/10.1109/ICMETE.2016.22","url":null,"abstract":"This paper presents a new development in directional couplers to enhance their performance. The performance is enhanced by improving directivity with the help of stubs in an existing design of parallel coupled line directional coupler. In the proposed stub based microstrip design of directional couplers we were able to achieve directivity of 68dB in the proposed coupler. In the end we have compared the directivity of our proposed coupler with an earlier proposed coupler design.","PeriodicalId":167368,"journal":{"name":"2016 International Conference on Micro-Electronics and Telecommunication Engineering (ICMETE)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123446855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Trust Based Solution for Detection of Network Layer Attacks in Sensor Networks","authors":"B. Patel, Ashish Patel","doi":"10.1109/ICMETE.2016.113","DOIUrl":"https://doi.org/10.1109/ICMETE.2016.113","url":null,"abstract":"The nature of wireless sensor networks make them very attractive to attackers. Network layer have ability to swap network service data units between two transport entities above a network connection depending same feature like latency and energy. The network layer deals with directing the information supplied by the transport layer. It is in charge of determining the task of locations and how parcels are sent Routing. Network layer is vulnerable for different types of attacks like a Sinkhole, Wormhole, Sybil, Selective Forwarding, Hello Flood, Black Hole, greyhole and so on. In this paper we survey different attacks on network layer like a black hole and wormhole attack. Black hole attacks attracts network traffic and drop all data packets. One of the most popular and serious attack in wireless sensor network is the wormhole attack. It is an especially severe attack on routing protocols for specially appointed systems in which two or additionally colluding attackers record packets at one location, and tunnel them to another location for a replay at that remote location. When this attack targets routing control packets, the nodes that are near the attackers are guarded from any option route with more than maybe a couple bounces to the remote area. All routes are along these lines coordinated to the wormhole set up by the attackers. In this work paper make the literature review of detection and prevention of black hole and wormhole attack. Also proposed the trust based mechanism for detection of wormhole attack that is already simulated for black hole attack. Simulation results are used with the NS-2 simulator and attack has been evaluated in term of packet delivery ratio, throughput, delay and routing overhead compare to a network without or with attack. And results shows that performance will be increase.","PeriodicalId":167368,"journal":{"name":"2016 International Conference on Micro-Electronics and Telecommunication Engineering (ICMETE)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128978731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Performance Analysis of a Novel High Gain and Compact Planar Patch Antenna for RFID Reader Application","authors":"N. Singh, Arvind Kumar","doi":"10.1109/ICMETE.2016.55","DOIUrl":"https://doi.org/10.1109/ICMETE.2016.55","url":null,"abstract":"A novel realisation of high gain and compact slotted planar patch antenna for the radio frequency identification (RFID) application is presented here. The antenna was printed on a dielectric Flame Retardant FR-4 Epoxy substrate of dielectric constant (εr=4.3). Simulated results obtained for this antenna exhibits resonant frequency of 5.8 GHz, better return loss of -36.91 dB, high gain of 8.308 dBi, consistent omnidirectional radiation pattern and 43 MHz impedance bandwidth within the RFID frequency range. Further parametric analysis of dimension of slots and feed line was done to acquire the required reflection coefficient, gain and 50Ω impedance of feed line. The simulation tool ZELAND IE3D version 15.20, which is based on method of moment was used to analyze and optimize the proposed antenna.","PeriodicalId":167368,"journal":{"name":"2016 International Conference on Micro-Electronics and Telecommunication Engineering (ICMETE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129849164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}