{"title":"Optimum Quaternary Galois Field Circuit Design through Carbon Nano Tube Technology","authors":"A. Keshavarzian, K. Navi","doi":"10.1109/ADCOM.2007.97","DOIUrl":"https://doi.org/10.1109/ADCOM.2007.97","url":null,"abstract":"The geometry dependant threshold voltage of carbon nanotube FETs (CNFETs), has been often used to design a ternary logic family. However , for the last couple of decades , multiple-valued logic (MVL) such as ternary (base=3) or quaternary (base=4) logic styles has attracted considerable attention. MVL circuits can reduce the number of operations necessary to implement a particular mathematical function and further, have an advantage in terms of reduced area. As we progress into an era of nanotechnology , molecular devices are becoming promising alternatives to the existing silicon technology. Carbon nanotube field effect transistors (CNFETs) are being extensively studied as possible successors to silicon MOSFETs. Research has started in the earnest to understand the device physics of CNFETs as well as to explore possible circuit applications. Implementable CNTFET circuits have operational characteristics to approach the advantage of using MVL in voltage mode. In this paper through using of CNTFET characteristics, we presented new CNTFET circuit design to implement optimum quaternary Galois field logic.","PeriodicalId":185608,"journal":{"name":"15th International Conference on Advanced Computing and Communications (ADCOM 2007)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130989517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Approach of Synthesizing Low Power VLSI Architecture","authors":"R. Maity, D. Samanta","doi":"10.1109/ADCOM.2007.24","DOIUrl":"https://doi.org/10.1109/ADCOM.2007.24","url":null,"abstract":"With the leaps and bounds progression of VLSI technol- ogy, the requirement of low power VLSI architecture has become highly on demand, specially for hand-held, bat- tery driven, portable applications. In this paper we have identified several low power strategies and applied them to realize a low power VLSI architecture suitable for motion estimation block in a video codec chip. For motion estima- tion we have adopted the TBHEX block matching algorithm [14]. Our proposed architecture has been synthesized with the Synopsis Design Analyzer tool and experimental results reveal that it requires only 22.14 mW power. Further our proposed architecture is area efficient with 30 K gate counts including memory within the chip boundary.","PeriodicalId":185608,"journal":{"name":"15th International Conference on Advanced Computing and Communications (ADCOM 2007)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123132770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Nakkeeran, C. Balaji, N. Gujju, K. Balakumaran, M.K. Sasidharan
{"title":"Enhanced Burst Assembly Mechanism with Hybrid Signaling Scheme for Optical Burst Switched Networks","authors":"R. Nakkeeran, C. Balaji, N. Gujju, K. Balakumaran, M.K. Sasidharan","doi":"10.1109/ADCOM.2007.66","DOIUrl":"https://doi.org/10.1109/ADCOM.2007.66","url":null,"abstract":"In this paper, an enhanced burst assembly mechanism, utilizing the offset time effectively for assembling the incoming packets, is proposed for optical burst switched (OBS) networks. The channel utilization, end-to-end delay and packet transmission rate of proposed burst assembly method are compared with those of existing burst assembly methods. A hybrid signaling scheme is used to implement the proposed burst assembly. The performance of hybrid signaling is compared with existing signaling schemes. However, just enough time (JET) signaling gives better performance than the hybrid signaling scheme. Therefore, a prediction technique is incorporated to use JET signaling scheme in the proposed burst assembly method. The prediction error occurring in this method is calculated and the average number of contentions encountered in the proposed burst assembly method is determined.","PeriodicalId":185608,"journal":{"name":"15th International Conference on Advanced Computing and Communications (ADCOM 2007)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122228473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"FHMS: Fuzzy Logic-Based Handoff Management Scheme for Wireless Network","authors":"Sourav Saha, M. Mukherjee, S. Neogy","doi":"10.1109/ADCOM.2007.70","DOIUrl":"https://doi.org/10.1109/ADCOM.2007.70","url":null,"abstract":"Error-free and fast handoff support in excessive mobile world is challenging issue. Various earlier related works require improvement of QoS, reduction of packet loss advanced support of fast handoff etc. In this paper we propose one simple, flexible, modular and inexpensive fuzzy logic-based handoff management scheme FHMS for wireless networks that reduces packet losses and forced termination probability while not increasing call-blocking probability considerably. It also attempts to raise the accuracy of system behavioral representation and increasing precision. Fast handoff support, QoS enhancement, location update cycle time reduction, performance advancement are also parts of our effort. The simulation of it also supports its capability and potential .","PeriodicalId":185608,"journal":{"name":"15th International Conference on Advanced Computing and Communications (ADCOM 2007)","volume":"41 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120994908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Prototype for Tiger Hash Primitive Hardware Architecture","authors":"Sudarshan TSB, K. Rakesh, S. Kumar K.","doi":"10.1109/ADCOM.2007.25","DOIUrl":"https://doi.org/10.1109/ADCOM.2007.25","url":null,"abstract":"With the increasing prominence of the Internet as a tool of commerce, security has become a tremendously important issue. One essential aspect for secure communication over networks is that of cryptography. The increasing prominence of mobile devices has increased the necessity for hardware implementations of cryptography algorithms. Tiger hash function is the new hash function proposed which is very fast and secure. To the best of our knowledge there are no known architecture design proposal except an FPGA design implementation for Tiger Hash In this paper, we describe a prototype for Tiger Hash Primitive Hardware Architecture, which increases the security and speed factors when implemented.","PeriodicalId":185608,"journal":{"name":"15th International Conference on Advanced Computing and Communications (ADCOM 2007)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125100700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Priority Based Fairness Provisioning QoS-Aware MAC Protocol","authors":"Marchang Jims, N. Sarma, Sukumar Nandi","doi":"10.1109/ADCOM.2007.98","DOIUrl":"https://doi.org/10.1109/ADCOM.2007.98","url":null,"abstract":"This paper studies the issues of channel allocation subject to QoS constraint(s) and fairness issues in mobile ad hoc networks (MANETs). While a solution to the hidden-terminal problem is paramount, a QoS- aware Medium Access Control (MAC) protocol must also provide a channel access mechanism that considers the QoS constraints of real-time flows. We propose a new MAC protocol called PFQAMP (Priority based Fairness provisioning QoS-Aware MAC Protocol) which supports QoS for real-time applications and provides fairness in accessing the channel. Nodes are assigned priorities dynamically based on i) their roles as sender, receiver or forwarding node and ii) type of the traffic they have to forward or send. Our approach ensures both QoS (through differentiating traffic types) and fairness (among the traffic in the same class). This leads to better network throughput, lower delay and avoidance of starvations for same priority traffic flow. Through simulation we show that our proposal outperforms IEEE 802.11 in terms of average throughput, delay and fairness.","PeriodicalId":185608,"journal":{"name":"15th International Conference on Advanced Computing and Communications (ADCOM 2007)","volume":"149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134461765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Advances in Telemedicine and Its Usage in India","authors":"Arun K. Majumdar","doi":"10.1109/ADCOM.2007.34","DOIUrl":"https://doi.org/10.1109/ADCOM.2007.34","url":null,"abstract":"Telemedicine development has proliferated in several countries, including India, in the last decade. With the advances in information and communication technology, there has been substantial improvement in the quality of healthcare services that can be offered for dealing with different category of diseases. This paper looks into the technological issues that are of prime concern in the growth of telemedicine services and presents a brief review of some of the telemedicine projects successfully executed in India.","PeriodicalId":185608,"journal":{"name":"15th International Conference on Advanced Computing and Communications (ADCOM 2007)","volume":"17 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114113994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fractal Model of the Blood Vessel in Cardiovascular System","authors":"G. Jayalalitha, V. S. Deviha, R. Uthayakumar","doi":"10.1109/ADCOM.2007.71","DOIUrl":"https://doi.org/10.1109/ADCOM.2007.71","url":null,"abstract":"Blood flow in the blood vessel of the cardiovascular system has been the central point of experimental and theoretical investigation. The objective of the study is to determine the blood flow in the cardiovascular system using Darcy 's law, Reynold's number and Poiseuille's equation. The blood flow in the above system has been numerically calculated for both normal and abnormal patients. A new algorithm has been introduced to the visit the blood vessels in a robust manner which avoids loops and provides us the results in an easier manner. Flow analysis in the above system is analyzed by invasion percolation.","PeriodicalId":185608,"journal":{"name":"15th International Conference on Advanced Computing and Communications (ADCOM 2007)","volume":"143 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125253903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"QoS-Aware Resource Discovery in Grids","authors":"U.S. Grover, P. Varma, S. Chaudhary","doi":"10.1109/ADCOM.2007.107","DOIUrl":"https://doi.org/10.1109/ADCOM.2007.107","url":null,"abstract":"Grids are used extensively for scientific research and computationally intensive business processes, as they provide a wide range of resources for use to its participants. Collaboration and resource sharing form the basic ideologies of a grid, hence it becomes imperative that joining and leaving the grid becomes easy and any independent network of resources can collaborate with other operational grids. To utilize these geographically separated resources efficiently, it is important to have a robust system of discovering resources based on functional and non-functional requirements. The current information service of the Globus Toolkit 4.0 does not feature quality-of-service and the various service-level agreements of each node of the grid. This paper suggests solution for the issues of dynamic update of the grid resource information, and efficient, scalable and QoS-aware resource discovery in independent grids. In this paper, overlay architecture for resource discovery in a grid is proposed in which the functional and nonfunctional requirements are taken into account for resource discovery. The approach combines resource registration with SLA specifications and semantic discovery of resources with a desired QoS.","PeriodicalId":185608,"journal":{"name":"15th International Conference on Advanced Computing and Communications (ADCOM 2007)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123785562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Srinivasa K.G., S. P., A. Bhat, Venugopal K.R., L. Patnaik
{"title":"Genetic Algorithm with Characteristic Amplification through Multiple Geographically Isolated Populations and Varied Fitness Landscapes","authors":"Srinivasa K.G., S. P., A. Bhat, Venugopal K.R., L. Patnaik","doi":"10.1109/ADCOM.2007.74","DOIUrl":"https://doi.org/10.1109/ADCOM.2007.74","url":null,"abstract":"This paper proposes a new approach, wherein multiple populations are evolved on different landscapes. The prob- lem statement is broken down, to describe discrete charac- teristics. Each landscape, described by its fitness landscape is used to optimize or amplify a certain characteristic or set of characteristics. Individuals from each of these pop- ulations are kept geographically isolated from each other. Each population is evolved individually. After a predeter- mined number of evolutions, the system of populations is analysed against a normalized fitness function. Depending on this score and a predefined merging scheme, the popula- tions are merged, one at a time, while continuing evolution. Merging continues until only one final population remains. This population is then evolved, following which the result- ing population will contain the optimal solution. The fi- nal resulting population will contain individuals which have been optimized against all characteristics as desired by the problem statement. Each individual population is optimized for a local maxima. Thus when populations are merged, the effect is to produce a new population which is closer to the global maxima.","PeriodicalId":185608,"journal":{"name":"15th International Conference on Advanced Computing and Communications (ADCOM 2007)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130760520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}