A. Mandal, B. Kaushik, K. Tyagi, R. P. Agarwal, Anuj Kumar
{"title":"Implementation of Coordinate Rotation Algorithm for Digital Phase Locked Loop System in In-Phase and Quadrature Channel Signal Processing","authors":"A. Mandal, B. Kaushik, K. Tyagi, R. P. Agarwal, Anuj Kumar","doi":"10.1109/ICETET.2010.164","DOIUrl":"https://doi.org/10.1109/ICETET.2010.164","url":null,"abstract":"Digital Signal Processing (DSP) system involves a wide spectrum of DSP algorithms for its realization and is often accelerated by use of novel VLSI design techniques. Now-a-days various DSP systems are implemented on a variety of programmable signal processors or on application specific VLSI chips. Coordinate Rotation Digital Computer (CORDIC) algorithm has turned out to be widely researched topic in the field of vector rotated Digital Signal Processing (DSP) applications due to its simplicity. This paper presents the design of pipelined architecture for coordinate rotation algorithm for the computation of loop performance of complex Digital Phase Locked Loop (DPLL). The design of CORDIC in the vector rotation mode results in high system throughput due to its pipelined architecture where latency is reduced in each of the pipelined stage. Saving area on silicon substrate is essential to the design of any pipelined CORDIC. The area reduction in proposed design can be achieved through optimization in the number of micro rotations. For better loop performance of first order complex DPLL and to minimize quantization error, the number of iterations are also optimized.","PeriodicalId":175615,"journal":{"name":"2010 3rd International Conference on Emerging Trends in Engineering and Technology","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122704649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Finagling Congestion in Selfish Overlay Routing by Belittling Link Utilization","authors":"S. Shyry, V. Ramachandran","doi":"10.1109/ICETET.2010.124","DOIUrl":"https://doi.org/10.1109/ICETET.2010.124","url":null,"abstract":"The rapid growth and increasing requirements for service quality, reliability had made everyone to choose the traffic engineering essential for the large public networks. The multi Protocol label switching is a protocol used when there is interaction between the traffic engineering and the overlay networks. This MultiProtocol Labeled Switching (MPLS) with the help of the nash equilibrium algorithm has given optimized performance better by reducing the latency and increasing the link utilization. But increase in link utilization will gradually increase the congestion in the network as the same link is being used by all the nodes. So, to overcome this specific problem we have performed a formulation called dual programming formulation which has set of constraints that have to be satisfied, along with Open Shortest Path First(OSPF) protocol so as to reduce the maximum link utilization. We have simulated the results for five queuing models say BPR, PD1, PM1, MM1, MD1 and also compared Source, Compliant, Optimal overlay routing.","PeriodicalId":175615,"journal":{"name":"2010 3rd International Conference on Emerging Trends in Engineering and Technology","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125002314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Preserving Privacy through Data Control in a Cloud Computing Architecture Using Discretion Algorithm","authors":"D. Jayalatchumy, P. Ramkumar, D. Kadhirvelu","doi":"10.1109/ICETET.2010.103","DOIUrl":"https://doi.org/10.1109/ICETET.2010.103","url":null,"abstract":"Cloud computing is an On-demand self-service Internet infrastructure where a customer can pay and use only what is needed, managed by an API. The SP plays an active role in transmitting information across the cloud. Privacy for the information through authentication is being considered important. Providing security requires more than user authentication with passwords or digital certificates. The discretion algorithm has been designed and the IDS provide passive security solution. Since the context data is stored by the service provider the control of the data propagate to the whole cloud chain.","PeriodicalId":175615,"journal":{"name":"2010 3rd International Conference on Emerging Trends in Engineering and Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129864003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Single Channel Phonocardiograph Processing Using EMD, SVD, and EFICA","authors":"A. Warbhe, R. Dharaskar, Bharati Kalambhe","doi":"10.1109/ICETET.2010.171","DOIUrl":"https://doi.org/10.1109/ICETET.2010.171","url":null,"abstract":"In this paper a novel approach using a trio of EMD, SVD and efficient version of FICA for extracting the fetal heart sound signals from the recorded single channel abdominal phonocardiogram (PCG) is presented. Phonocardiography is a low-cost, passive, non-invasive way of recording heart sounds and murmurs. Phonocardiography consists of recording acoustic signal on the maternal abdominal surface, and hence the recordings are heavily loaded by noise. Because of this the determination of the fetal heart rate (FHR) raises serious signal processing issues. We here propose a scheme of Blind Source Separation (BSS) technique for the fetal PCG extraction from the single channel recorded noisy abdominal phonographs. This presented method is the combination of the Empirical Mode Decomposition (EMD), Singular Value decomposition (SVD) and Independent Component Analysis (ICA).","PeriodicalId":175615,"journal":{"name":"2010 3rd International Conference on Emerging Trends in Engineering and Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129202249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"New Iterative Algorithms for Thinning Binary Images","authors":"G. Padole, S. Pokle","doi":"10.1109/ICETET.2010.173","DOIUrl":"https://doi.org/10.1109/ICETET.2010.173","url":null,"abstract":"Thinning is a process of reducing an object in a digital image to the minimum size necessary for machine recognition of that object. Efficient and reliable thinning of image patterns is essential to a variety of applications in the field of image analysis and recognition system. In this paper we propose two new iterative algorithms for thinning binary images. In the first algorithm, thinning is accomplished by using two operations: edge detection and subtraction. Another algorithm is based on repeatedly conditionally eroding the pixels until a one pixel thick pattern is obtained. Erosion conditions are devised to assure preserving connectivity. Results of applying the algorithms on the variety of images will be shown. To judge performance of our algorithms, we made a comparison with some other major algorithm.","PeriodicalId":175615,"journal":{"name":"2010 3rd International Conference on Emerging Trends in Engineering and Technology","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121114754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evolutionary Computational Tools Aided Extended Kalman Filter for Ballistic Target Tracking","authors":"K. Kumar, Nagarjuna Rao Dustakar, R. K. Jatoth","doi":"10.1109/ICETET.2010.125","DOIUrl":"https://doi.org/10.1109/ICETET.2010.125","url":null,"abstract":"Tracking a ballistic target in its reentry mode by considering the radar measurements is a highly complex problem in nonlinear filtering. Kalman Filter (KF) is used to estimate the position of target when the measurements are corrupted with noise. If the measurements are nonlinear (radar measurements) then Extended kalman filter (EKF) is used. For obtaining reliable estimate of the target state, filter has to be tuned before the operation which is offline. Tuning an EKF is the process of estimating the process noise covariance matrix (Q) and measurement noise covariance matrix (R). This paper presents a new method of tuning the EKF using different evolutionary algorithms.","PeriodicalId":175615,"journal":{"name":"2010 3rd International Conference on Emerging Trends in Engineering and Technology","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117092199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Impact of Random Process Variations on Different 65nm SRAM Cell Topologies","authors":"Sumit Kansal, M. Lanuzza, P. Corsonello","doi":"10.1109/ICETET.2010.19","DOIUrl":"https://doi.org/10.1109/ICETET.2010.19","url":null,"abstract":"In this paper, the influence of random process variations on different low leakage SRAM topologies has been analyzed. This analysis was performed through extensive Monte Carlo simulations and exploiting a commercial 65 nm technology. Simulation results demonstrate that the Low Vdd SRAM cell presents the best trade-off between performances and robustness against random process variations.","PeriodicalId":175615,"journal":{"name":"2010 3rd International Conference on Emerging Trends in Engineering and Technology","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115736676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Dorle, Sheetal A. Khandare, A. Keskar, M. Chakole
{"title":"Wireless Transmission Impact on the Lifetime of Routing Path in VANET","authors":"S. Dorle, Sheetal A. Khandare, A. Keskar, M. Chakole","doi":"10.1109/ICETET.2010.117","DOIUrl":"https://doi.org/10.1109/ICETET.2010.117","url":null,"abstract":"In recent years there has been a growing interest in the field of vehicular networks, primarily due to the advancement in technology and need for safety and entertainment applications. The current generation of vehicles has embedded computers, GPS receivers, and number of sensors, where as the next generation of these vehicles will potentially have short-range wireless network interface. The target of ITS (Intelligent transport system) is to increase safety of passenger by exchanging warning messages between vehicles, this can be done by offering on-board network applications which is a challenge for the scientific community. In addition to safety applications, other telemetric services could improve traffic efficiency environment preservation, comfort and provide a reliable journey. Since VANET (Vehicular Adhoc Network) is composed of vehicles equipped with short range wireless communication capabilities. The performance of vehicles can be affected by high mobility pattern of the vehicle, speed of vehicle, transmission range, network breakup, traffic density and number of vehicles in the route. This paper describes the effect of the wireless transmission range on the lifetime improvement of the routing path in VANET, simulation result obtained helps to select the appropriate transmission range for increasing the lifetime of the routing path.","PeriodicalId":175615,"journal":{"name":"2010 3rd International Conference on Emerging Trends in Engineering and Technology","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130858481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Effect of Air Preheating on the Performance of C.I. Engine Using Energy Wheel","authors":"Monali S. Bhojane, M. S. Deshmukh","doi":"10.1109/ICETET.2010.78","DOIUrl":"https://doi.org/10.1109/ICETET.2010.78","url":null,"abstract":"Energy wheel are used very commonly in air conditioning system to humidify, dehumidify, heating and cooling of air supplied to air conditioning system. An attempt is made to design and fabricate energy wheel for waste heat recovery from C.I. energy exhaust. It has been observed that the exhaust temperature of C.I. engine is more than 380 degree Celsius it can be used to reheat the air intake to the C.I. engine so that attempt can be made to improve its performance by using the waste heat recovery system i.e., energy wheel.","PeriodicalId":175615,"journal":{"name":"2010 3rd International Conference on Emerging Trends in Engineering and Technology","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134400281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Discrete Wavelet Transform Based Strongly Robust Watermarking Scheme for Information Hiding in Digital Images","authors":"B. L. Gunjal, R. Manthalkar","doi":"10.1109/ICETET.2010.12","DOIUrl":"https://doi.org/10.1109/ICETET.2010.12","url":null,"abstract":"The performance evaluation of watermarking scheme is done by two performance metrics: perceptual transparency and robustness. Perceptual transparency refers quality of image which is measured by ‘Peak Signal to Noise Ratio’ (PSNR). Robustness is measured in terms of ‘Correlation Factor’ (ρ). A good quality watermarking scheme should have maximum PSNR, ideally Correlation Factor equals to 1 and should have maximum watermark information hiding capacity. In this paper, we have presented strongly robust digital image watermarking scheme based on ‘Discrete Wavelet Transform’, by embedding scrambled watermark in middle frequency sub band. The security levels are increased by generating PN sequence depending on periodicity of watermark image. The image scrambling is applied by Arnold Transform. The decomposition is done with ‘Haar’ which is simple, symmetric and orthogonal wavelet and the direct weighting factor is used in watermark embedding and extraction process. The scheme results in exact recovery of watermark with standard database images of size 512x512, giving Correlation Factor equals to 1. The Correlation Factor for different attacks like Noise addition, Filtering, Rotation and Compression ranges from 0.90 to 0.95. The PSNR with weighting factor 0.02 is up to 48.53 dBs. The presented scheme is nonblind and embeds binary watermark of 64x64 size.","PeriodicalId":175615,"journal":{"name":"2010 3rd International Conference on Emerging Trends in Engineering and Technology","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132966828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}