{"title":"A single-channel 5bit 333MS/s asynchronous digital slope ADC based on CMOS technology","authors":"Yujun Shu, Fengyi Mei, Youling Yu","doi":"10.1109/CIACT.2017.7977324","DOIUrl":"https://doi.org/10.1109/CIACT.2017.7977324","url":null,"abstract":"This project design and present a 5-bit 333MS/s digital slope ADC (analog-to-digital converter. It is implemented and simulated with Cadence tool in SMIC 55nm CMOS technology. The power supply is 1.2 V and the improved delay cells are used which can shorten the delay time to 50ps. In addition, a self-disabled comparator is used to save power. When the peak-to-peak value of input is 0.4V, the SNDR(Signal to Noise and Distortion Ratio) is 28.19 dB, ENOB(Effective Number of Bits)is 4.39 bit, SFDR(Spurious Free Dynamic Range) is 35.87 dB, SNR(Signal-to-Noise Ratio)is 31.47dB.","PeriodicalId":218079,"journal":{"name":"2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115808722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fusion of visible and infrared images in HSV color space","authors":"Meenu Manchanda, Rajiv Sharma","doi":"10.1109/CIACT.2017.7977384","DOIUrl":"https://doi.org/10.1109/CIACT.2017.7977384","url":null,"abstract":"Multiple images taken from different imaging devices are required to be combined together to obtain a single fused image that provides an enhanced representation of an observed scene. The images obtained from imaging devices having different modalities usually provide complementary information. For instance, visible and infrared (IR) images provide complementary information of an object or a scene. Visible images provide the outline of an object or a scene whereas infrared images provide information of some special effects such as hidden objects or persons. Further, color image processing is also gaining importance in most of the real-life applications as color images provide better visual information and are highly suitable for human visual perception. Thus, fusion of visible and infrared images in HSV color space is proposed in the paper. Visual evaluations and objective comparisons on different datasets of visible and infrared images show that the proposed algorithm can effectively combine the information contained in input images and therefore can be successfully utilized in surveillance, military and many other real-life applications.","PeriodicalId":218079,"journal":{"name":"2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133488127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Review of recent trends on miniaturization of substrate integrated waveguide (SIW) components","authors":"Nitin Muchhal, S. Srivastava","doi":"10.1109/CIACT.2017.7977389","DOIUrl":"https://doi.org/10.1109/CIACT.2017.7977389","url":null,"abstract":"Substrate-integrated waveguide (SIW) is a promising and potential technology for designing and developing millimeter wave and microwave components, circuits and systems. With the rapid advancement of new standards and communication devices and system in past few years, there has been high demand to miniaturize microwave components. This paper briefly discusses some of the techniques that have been accounted in the literature towards size reduction of SIW components. These miniaturization techniques broadly include slotted SIW, Folded SIW (FSIW), HMSIW, Metamaterials etc.","PeriodicalId":218079,"journal":{"name":"2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"245 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131962166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detecting and mitigating faults in cloud computing environment","authors":"M. K. Gokhroo, M. C. Govil, E. Pilli","doi":"10.1109/CIACT.2017.7977362","DOIUrl":"https://doi.org/10.1109/CIACT.2017.7977362","url":null,"abstract":"Distributed Systems have swiftly evolved from network of personal computers to cluster and then to grid, moving on to the era of cloud computing and now the latest one as Internet of things (IoT). With these rapid enhancements, the scale and complexity of systems providing cloud computing services have also increased tremendously. The major challenge faced by cloud service providers today is to provide an efficient, cost-effective, and reliable solution for seamless delivery of services to users. To achieve this research community is constantly working hard on different related issues like scheduling, power consumption, high availability, customer retention, resource provisioning, reliability and minimizing the probability of failures, etc. Reliability of service is an important parameter. With a large number of components in the cloud, the probability of failures is becoming a norm rather than an exception while delivering services to users. This emphasizes the need to develop fault tolerant schemes for cloud environment to deliver the required level of reliability. In this work, we have proposed a novel fault detection and mitigation approach. The novelty of approach lies in the method of detecting the fault based on running status of the job. The detection algorithm periodically monitors the progress of job on virtual machines (VMs) and reports the stalled job due to failed VM to fault tolerant manager (FTM). This not only reduces the resources wastage but ensures timely delivery of services to avoid any penalty due to service level agreement (SLA) violation. The validation of the proposed approach is done using CloudSim simulator. The performance analysis reveals the effectiveness of the proposed approach.","PeriodicalId":218079,"journal":{"name":"2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130039580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"PWM waveform generation using rotary encoder on Spartan-3E starter kit","authors":"Shilpa Thakral, A. Joshi, Unnati C Mehta","doi":"10.1109/CIACT.2017.7977372","DOIUrl":"https://doi.org/10.1109/CIACT.2017.7977372","url":null,"abstract":"A PWM waveform generator with variable duty cycle has been designed and implemented in this paper. The design has been simulated for different frequencies. The waveform is generated on Spartan 3E FPGA starter kit which has on board rotary encoder. The on board clock signal and rotary encoder generates the required PWM signal. The duty cycle of PWM is varied by rotating the encoder in clockwise and anticlockwise directions. Various frequencies of PWM signal is generated by pressing it up and down. The design has been proposed where duty cycle can be varied from 0 to 100%. The frequency of the on board clock signal i.e., 50 MHz and this has been varied to generate different frequencies. The output can be observed on DSO and CRO. The PWM is used in controlling inverters, electrical motors and many communication and control applications. The usage of FPGA provides the reconfigurable architecture and also provides flexibility as well as economically viable.","PeriodicalId":218079,"journal":{"name":"2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130074449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis and comparison among Ant System; Ant Colony System and Max-Min Ant System with different parameters setting","authors":"Renu Jangra, Ramesh Kait","doi":"10.1109/CIACT.2017.7977376","DOIUrl":"https://doi.org/10.1109/CIACT.2017.7977376","url":null,"abstract":"Ant colony optimization is a victorious technique to resolve complicated combinatorial optimized problems. Subsequent Ant System; the primary ACO algorithm, the tremendous number of algorithmic variations have been deployed that illustrate appreciably superior performance on a broad variety of optimized problems. In this paper, we present the basic modifications in Ant Colony System-ACS and Max-Min Ant System-MMAS with respect to Ant System-AS. Also, compare the result of these three algorithms based on different parameter adjustments.","PeriodicalId":218079,"journal":{"name":"2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130482917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhancing online banking authentication using hybrid cryptographic method","authors":"N. Sharma, Brahmdutt Bohra","doi":"10.1109/CIACT.2017.7977275","DOIUrl":"https://doi.org/10.1109/CIACT.2017.7977275","url":null,"abstract":"Security of Electronic mode of payment is a crucial aspect today when a large number of customers urge to do the transaction online instead of approaching Banks physically. Now as the traffic on Internet is growing, it becomes a challenging task to secure the electronic transactions over an insecure channel of communication on Internet. The areas of security which are critical here include well-built data enciphering techniques, secure mode of transaction and trusted third party which maintains the database electronically. Data security can only be maintained by conventional methods of encryption in strong and secure channel of transaction. But the threat that is most vulnerable here is theft of customer's data for any malicious purpose such as severe attacks that are done online. The proposed encryption technique provides adequate safety for electronic transactions over wireless set-up. This research study depicts a clear picture of call for improved authentication in online banking. It shows the major safety concerns and illegal activities that are driving the need for well-built verification as well as showing the increase of online channel that is being driven by consumers and monetary institutions. This study provides a careful analysis of the various authentication solutions available, as well as a set of principles for choosing and applying improved authentication focused on the learning and understanding of business experts and customer.","PeriodicalId":218079,"journal":{"name":"2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123661467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance evaluaron of energy efficient for MANET using AODV routing protocol","authors":"Anjana Tiwari, I. Kaur","doi":"10.1109/CIACT.2017.7977328","DOIUrl":"https://doi.org/10.1109/CIACT.2017.7977328","url":null,"abstract":"In recent times, mobile ad-hoc network (MANET) has become a growing interesting field for researchers. Mobile ad-hoc network is an ensemble of mobile nodes which is gently connected without any centralized base station of network. For transmitting data from one node to another node routing protocols are used. This paper focus on AODV routing protocol that is one of extensively used routing protocol in MANET. Energy consumption is a main issue in Ad hoc network which speciously builds attention today. AODV routing protocol is not consider energy of nodes in route discovery phase. If less energy of node occurs in between the path, it causes packet dropping. It leads to link-failure problem. After that system reinitiate RREQ message from source node again. Therefore, it causes more energy consumption. To overcome this issue, we proposed a new technique based on existing AODV routing protocol without disconnection of route after link failure problem. This scheme does not cause link failure problem and avoid rebroadcast message again from source node. This gives a significant improvement in node energy. The simulation result shows that proposed technique will enhance the energy of network. The comparison results between proposed AODV and existing AODV routing protocols are shown in terms of various QoS parameters such as throughput, energy spent, end to end delay and packet delivery ratio. This simulation work is analyzed using NS-2 simulation tool (NS-2.35) under Ubuntu 14.04 LTS as operating system.","PeriodicalId":218079,"journal":{"name":"2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"283 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127491458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Solutions of fuzzy correspondence inequations with sup-conjunctor composition","authors":"Kai Zuo, Xue-ping Wang, Xiaohong Zhang","doi":"10.1109/IFSA-SCIS.2017.8023313","DOIUrl":"https://doi.org/10.1109/IFSA-SCIS.2017.8023313","url":null,"abstract":"This paper investigates the solutions of fuzzy correspondence inequations with sup-conjunctor composition, i.e., it discusses those solutions for the input and output fuzzy sets which are unknown while a fuzzy correspondence is fixed. First, it proves that the solutions of the fuzzy correspondence inequations can be analyzed and formulated by solving the corresponding cut set problems. It then shows that the space of solutions of the fuzzy correspondence in equation is a complete distributive lattice and the same holds for the space of solutions of the fuzzy correspondence equation. Moreover, it describes the solution set of the fuzzy correspondence in equation partly.","PeriodicalId":218079,"journal":{"name":"2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"Spec No 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116352368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A service identification model for service oriented architecture","authors":"Anurag Shashwat, Deepak Kumar","doi":"10.1109/CIACT.2017.7977299","DOIUrl":"https://doi.org/10.1109/CIACT.2017.7977299","url":null,"abstract":"Service Oriented Architecture facilitates more feature as compared to legacy architecture which makes this architecture widely accepted by the industry. Service oriented architecture provides feature like reusability, composability, distributed deployment. Service of SOA is governed by SOA governance board in which they provide approval to create the services and also provide space to expose the particular services. Sometime many services are kept in a repository which creates service identification issue. Service identification is one of the most critical aspects in service oriented architecture. The services must be defined or identified keeping reuse and usage in different business contexts in mind. Rigorous review of Identified service should be done prior to development of the services. Identification of the authenticated service is challenging to development teams due to several reasons such as lack of business process documentation, lack of expert analyst, and lack of business executive involvement, lack of reuse of services, lack of right decision to choose the appropriate service. In some of the cases we have replica of same service exist, which creates difficulties in service identification. Existing design approaches of SOA doesn't take full advantage whereas proposed model is compatible more advantageous and increase the performance of the services. This paper proposes a model which will help in clustering the service repository based on service functionality. Service identification will be easy if we follow distributed repository based on functionality for our services. Generally in case of web services where service response time should be minimal, searching in whole repository delays response time. The proposed model will reduce the response time of the services and will also helpful in identifying the correct services within the specified time.","PeriodicalId":218079,"journal":{"name":"2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129591040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}