{"title":"Soft output Viterbi decoder using hybrid register exchange","authors":"D. M. Khatri, S. Haridas","doi":"10.1145/1980022.1980223","DOIUrl":"https://doi.org/10.1145/1980022.1980223","url":null,"abstract":"There are two types of decoding techniques, trace back method (TBM) and register exchange method (REM). In trace back method, memory requirement is high. TBM is the preferred method used in Viterbi decoders (VD) having large constraint length and high performance. However, the TBM has drawbacks, which requires last-in-first-out (LIFO) buffer and has to use multiple read operations for high speed operation. This multiple operation results in complex control logic In register exchange method, the no. of switching activities is high. So total power dissipation is high. Using Hybrid register exchange, no. of switching activities is reduced and so the total power dissipation is reduced. So we concentrate more on REM. There are two types of decision outputs, hard output and soft output. In hard decision output, error correcting capability is less as compared to soft output decision. So to increase the accuracy as compared with hard decision outputs, soft output viterbi algorithm is used.. In this paper, we propose a new approache hybrid register exchange method (HREM). The simulation model is ready. The main advantage of the proposed method is that it reduces the number of decoding operation and memory read operations, less switching activity and fewer requirements on additional control logic.","PeriodicalId":197580,"journal":{"name":"International Conference & Workshop on Emerging Trends in Technology","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123483751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and implementation of a universal DMA controller","authors":"A. Wadekar, S. Swapnil, R. Lohani","doi":"10.1145/1980022.1980281","DOIUrl":"https://doi.org/10.1145/1980022.1980281","url":null,"abstract":"The direct memory access (DMA) I/O technique provides direct access to the memory while the microprocessor is temporarily disabled. A DMA Controller temporarily borrows the address bus, data bus and control bus from the microprocessor and transfers the data bytes directly between an I/O port and a series of memory locations. The proposed model of a Universal DMA Controller is of generic type and supports much functionality. This DMA Controller can be plugged into any SoC system for the required data transfer operation. Support transactions such as Port 1 IO/Memory to Port1 IO/Memory, Port1 IO/Memory to Port2 IO/Memory, Port2 IO/Memory to Port1 IO/Memory and Port2 IO/Memory to Port2 IO/Memory and many more.","PeriodicalId":197580,"journal":{"name":"International Conference & Workshop on Emerging Trends in Technology","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121398087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Neural network based sensor drift compensation of induction motor","authors":"R. Uthra, N. Kalaiarasi, A. Rathinam","doi":"10.1145/1980022.1980148","DOIUrl":"https://doi.org/10.1145/1980022.1980148","url":null,"abstract":"In this paper, sensor drift compensation of vector control of induction motor using neural network is presented. An induction motor is controlled based on vector control. The sensors sense the primary feedback signals for the feedback control system which is processed by the controller. Any fault in the sensors cause incorrect measurements of feedback signals due to malfunction in sensor circuit elements which affects the system performance. Hence, sensor fault compensation or drift compensation is important for an electric drive. Analysis of sensor drift compensation in motor drives is done using neural networks. The feedback signals from the phase current sensors are given as the neural network input. The neural network then performs the auto-associative mapping of these signals so that its output is an estimate of the sensed signals. Since the Auto-associative neural network exploits the physical and analytical redundancy, whenever a sensor starts to drift, the drift is compensated at the output, and the performance of the drive system is barely affected.","PeriodicalId":197580,"journal":{"name":"International Conference & Workshop on Emerging Trends in Technology","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121582444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"e-business adoption and implications in the banking industry in India","authors":"P. Mudholkar, M. Shanker, S. Maitra","doi":"10.1145/1980022.1980414","DOIUrl":"https://doi.org/10.1145/1980022.1980414","url":null,"abstract":"The introduction of ICT and E-Business in the Banking Industry (hereinafter the BI) has had a significant impact on banks operating with physical branches. Especially the internet has made it possible for banks to cut cost by offering online banking at a lower cost. The econometric analysis show that ICT use is positively correlated with firm restructuring activities. Thus, ICT enables companies to redefine the boundaries of their organizations and possibly gain a competitive advantage. This paper is focusing on ICT and e-business usage in the banking industry. The study objectives are to describe how companies in this industry use ICT for conducting business, to identify opportunities and barriers for ICT adoption, and to assess impacts of this development for firms and for the industry as a whole.","PeriodicalId":197580,"journal":{"name":"International Conference & Workshop on Emerging Trends in Technology","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122200052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Resistive analysis of mixed carbon nanotube bundle interconnect and its comparison with copper interconnect","authors":"T. Alam, R. Dhiman, R. Chandel","doi":"10.1145/1980022.1980271","DOIUrl":"https://doi.org/10.1145/1980022.1980271","url":null,"abstract":"As resistivity of Copper (Cu) increases with technology scaling, this drives us to look for new interconnect material for future very large scale integration (VLSI). Mixed carbon nanotube (CNT) bundle has superior properties like current carrying capacity and conductivity than Cu interconnect. It is the mixture of single wall carbon nanotubes (SWCNTs) and multi-wall carbon nanotubes (MWCNTs) due to the nature of the bottom-up fabrication process. In this paper, impact on resistance of the bundle has been shown due to various process parameters of the bundle and then optimized values of those parameters have been given. This work also presents a comprehensive analysis of bundle and compares its resistance (R) with those of the Cu interconnects for intermediate and global interconnect levels for 32nm technology node. More reduction in bundle resistance has been achieved than the research work reported in literature. The result show that bundle has smaller values of R compared to its Cu interconnect counterparts. This is advantageous for VLSI interconnect design and performance.","PeriodicalId":197580,"journal":{"name":"International Conference & Workshop on Emerging Trends in Technology","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122240869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Motion sensing in mobile phone","authors":"S. U. Pacharaney, K. Reddy","doi":"10.1145/1980022.1980366","DOIUrl":"https://doi.org/10.1145/1980022.1980366","url":null,"abstract":"With advancement in technology and also increase in consumer requirements, mobile phones are no longer just a mere communication tool. More and more applications are embedded onto the mobile phones nowadays. Here we introduce a novel technique for handheld mobile devices which enables the user interface to be controlled by the motion of the user's hand. A feature --based approach is proposed for local motion estimation that exploits the direction in which the handheld device is moved and the phone's motion is then used to trigger some events on the phone for example photo browsing, music track changing, games control etc. Special motion sensors such as accelerometers provide a straight forward solution but require extra hardware to be installed. Today, computer vision is a more natural choice, because current mobile phones are often are often equipped with cameras that can provide visual input for estimating motion.","PeriodicalId":197580,"journal":{"name":"International Conference & Workshop on Emerging Trends in Technology","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122344808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Escaping difference image histogram steganalysis","authors":"H. B. Kekre, A. Athawale, S. Maheshwari","doi":"10.1145/1980022.1980121","DOIUrl":"https://doi.org/10.1145/1980022.1980121","url":null,"abstract":"Steganography is used to hide the occurrence of communication. Discovering and rendering useless such covert message is an art of Steganalysis. A popular Steganalysis technique is Difference Image Histogram (DIH), proposed by Zhang, aimed at LSB steganography. This algorithm can not only detect the existence of hidden messages embedded using sequential or random LSB replacement in images reliably, but also estimate the amount of hidden messages exactly.\u0000 In this paper a number of stego images are created by varying the percentage of embedding i. e. from 0% to 100% of total number of pixels, total number of ones in the LSB plane and total number of zeros in the LSB plane. The Difference Image Histogram algorithm is applied to all these images. And a result is drawn as to exactly when and why the algorithm fails. A steganographic technique to escape Difference Image Histogram Steganalysis is then presented.","PeriodicalId":197580,"journal":{"name":"International Conference & Workshop on Emerging Trends in Technology","volume":"367 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115978112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Overview of visual analytics","authors":"A. Chopra, R. Samant","doi":"10.1145/1980022.1980329","DOIUrl":"https://doi.org/10.1145/1980022.1980329","url":null,"abstract":"Visual analytics is \"the science of analytical reasoning facilitated by visual interactive interfaces.\" It can attack certain problems whose size, complexity, and need for closely coupled human and machine analysis may make them otherwise intractable. Visual analytics advances science and technology developments in analytical reasoning, interaction, data transformations and representations for computation and visualization, analytic reporting, and technology transition. As a research agenda, visual analytics brings together several scientific and technical communities from computer science, information visualization, cognitive and perceptual sciences, interactive design, graphic design, and social sciences. This science of analytical reasoning provides the reasoning framework upon which one can build both strategic and tactical visual analytics technologies for threat analysis, prevention, and response. Visual Analytics is a relatively new multidisciplinary field that combines various research areas including knowledge discovery, data analysis, visualization, human-computer interaction, data management, geo-spatial and temporal data processing and statistics. Visual Analytics has seen unprecedented growth in the past five years and is expected to grow ten folds in the coming future seeing the amount of massive, dynamic and heterogeneous data which concludes nothing unless put to use using the visual analytical techniques. The basic goal of visual analytics includes deriving an insight from the large amount of dynamic data which is from different sources and to analyze them to discover the unexpected and provide timely, defensible, and understandable assessments which can be then communicated effectively for action. An integration of the increasing processing power of computers with the efficient pattern recognition abilities and domain knowledge of human analysts is a challenging and promising road in dealing with large amounts of complex data. It will be also a major driving force for solutions for information overload in many research and commercial areas.","PeriodicalId":197580,"journal":{"name":"International Conference & Workshop on Emerging Trends in Technology","volume":"160 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123752174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Obtaining patterns for identification of power quality disturbances using continuous wavelet transform","authors":"R. A. Gupta, R. Kumar, Manoj Gupta","doi":"10.1145/1980022.1980106","DOIUrl":"https://doi.org/10.1145/1980022.1980106","url":null,"abstract":"This paper presents a new approach for obtaining patterns for identification of power quality (PQ) disturbances present in electrical power systems with the use of continuous wavelet transform (CWT). A new difference coefficient matrix (DCM) is proposed, which is calculated from the difference of the CWT coefficients of the pure sinusoidal signal and the PQ disturbance signal. Then, the scale wise sums of coefficients of all the rows of DCM give unique feature matrix (UFM). This paper shows that the UFM posses unique features that can be used to generate the unique patterns of various PQ disturbances. The algorithms of the proposed approach are given together with its implementation on various cases of PQ disturbances namely sag, interruption, swell, transient, harmonics, and flicker with different magnitudes of each of the disturbances. The results show that unique pattern is obtained for each PQ disturbance irrespective of its magnitude, which can be treated as signature of the respective PQ disturbance.","PeriodicalId":197580,"journal":{"name":"International Conference & Workshop on Emerging Trends in Technology","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122409679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Outlier detection and visualization of large datasets","authors":"L. Gunisetti","doi":"10.1145/1980022.1980134","DOIUrl":"https://doi.org/10.1145/1980022.1980134","url":null,"abstract":"Outliers are special observations or extraordinary cases in the available data which deviate so much from other observations so as to arouse suspicions that they were generated by a different mechanism. Outliers detected can be used to identify special or extraordinary or fraudulent cases in day to day transactions. Outlier detection can be used to identify the noise in the data and these detected outliers have to be removed to improve data quality. Outlier Detection can be used for Traffic Analysis, Credit Card Fraud Detection. We applied Outlier Detection to Traffic data set for identifying the outlier stations on the highway. Detected outlier stations represent abnormalities in the traffic sensors data. This information is used by us to identify the faulty traffic sensors located at the highway stations. We have provided two dimensional visualization of the outliers which can be used for analyzing the data in an efficient manner. Traffic Management becomes easier when the abnormal traffic sensors identified at the corresponding outlier stations are identified. The method used here is a Statistic Approach. This technique compares every location to its neighbors using the Statistic. The Statistic is calculated to identify whether the data generated at a highway traffic station sensor is abnormal or not. This technique can be used efficiently to identify the outliers. This method can be easily applied to very large datasets as compared to existing conventional approaches.","PeriodicalId":197580,"journal":{"name":"International Conference & Workshop on Emerging Trends in Technology","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131505641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}