{"title":"Empowering ASIC Front-End to Meet the Challenges of the Ultra Deep Sub-Micrometer","authors":"V. K, R. A, K. Suriya Kumar, M. Kannan","doi":"10.1109/ICSCN.2007.350769","DOIUrl":"https://doi.org/10.1109/ICSCN.2007.350769","url":null,"abstract":"The major problem posed by very deep sub-micrometer is the inaccuracies which it introduces into the conventional electronic design automation tool estimates. The estimates of power and speed reported by these tools do not consider the effects posed by very deep sub micrometer because of the non-availability of 45 nm cell libraries. Thus, there is an urgent need of a design flow which results in power and speed predictions at very deep sub micrometer considering the various issues in the same. The objective of this research paper is to analyze the prerequisites for electronic design automation tool which provides the front-end engineer the real insight into the physical manifestation of the design in the deep sub-micron. The tool has been partially implemented using PERL, and has yielded results which have been validated at 180 nm after comparison with conventional synthesis engines. The accuracy of results depends solely on the accuracy of the sub 65 nm models employed for gates and interconnects","PeriodicalId":257948,"journal":{"name":"2007 International Conference on Signal Processing, Communications and Networking","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128528681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automatic Modulation Identification of QPSK and GMSK using Wavelet Transform for Adaptive Demodulator in SDR","authors":"P. Prakasam, M. Madheswaran","doi":"10.1109/ICSCN.2007.350651","DOIUrl":"https://doi.org/10.1109/ICSCN.2007.350651","url":null,"abstract":"This paper presents an automatic modulation identification (AMI) algorithm using wavelet transform for distinguishing QPSK and GMSK in adaptive demodulator. The developed algorithm has been tested by introducing additive white Gaussian noise (AWGN) in the modulated signal. It has been found that the identification of QPSK and GMSK using histogram peaks simplifies the procedure. The performance of the proposed AMI algorithm has been computed by estimating the bit error rate (BER) and reconstruction efficiency. This shows that the correct modulation identification is possible to a lower bound of 15 dB and 6 dB for GMSK and QPSK respectively","PeriodicalId":257948,"journal":{"name":"2007 International Conference on Signal Processing, Communications and Networking","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128579567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Radiation Characteristics of Photonic Antenna for Optical Wireless Communication using Beam Propagation Method","authors":"L. Suresh, S. Sundaravadivelu","doi":"10.1109/ICSCN.2007.350750","DOIUrl":"https://doi.org/10.1109/ICSCN.2007.350750","url":null,"abstract":"The optical wireless communication is the only solution to the emerging next generation wireless communication. The photonic antennas play major role in the development of optical wireless communications. This photonic antenna transfers light energy from optical waveguide to free-space with high directionality and act as a matching device between optical source and channel (atmosphere). The analysis of light propagation through waveguide structures is indispensable in designing complex photonic devices. The optical waveguide grating structures with multiple longitudinal reflecting interfaces are analyzed to form photonic antennas. The multilayer triangular grating structure is analyzed using beam propagation method for its ability and suitability to optical wireless communication. The beam propagation method (BPM), extensively used tool for computer simulation of light propagation in optical waveguide structures, has been developed for analyzing optical waveguides with discontinuities in transmission, reflection and radiations. The discontinuities comprise changes in core thickness and effective refractive index. The optical powers radiated and transmitted at an abrupt discontinuity in waveguide gratings are calculated numerically by means of BPM for TE modes, and applied to the eigen mode and propagating beam analysis of that structure. The current method achieves soaring precision and converging time is significantly abridged and it is proportional to the log of the total number of periods in the waveguide than that in the conventional time-domain method. This paper intends a novel integrated photonic antenna with snooty directional efficiency and radiation which can be tattered for protracted distance optical wireless communication. The consequences confirm that it is promising to curtail radiation loss under sturdy mode coupling conditions. This method can be used for modeling of laser beam propagation in non-homogeneous atmosphere","PeriodicalId":257948,"journal":{"name":"2007 International Conference on Signal Processing, Communications and Networking","volume":"154 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134124349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Implementation of High Bit Rate Satellite Image Data Ingest and Processing System","authors":"T. C. Sarmal, C. Srinivas","doi":"10.1109/ICSCN.2007.350720","DOIUrl":"https://doi.org/10.1109/ICSCN.2007.350720","url":null,"abstract":"Remote sensing satellites orbit around the Earth around 600-900 kilometers in sun synchronous polar orbit. Each satellite transmits the image data in X-band and the data reception is carried out through a parabolic antenna along with the associated systems. The entire data acquisition system is complex and expensive as it has to meet the requirements of the fast orbiting remote sensing satellites. During the visibility of the satellite, the data is acquired at the acquisition systems, frame synchronized band separated and displayed in the monitor in real-time. The authors of this paper used the concept of archiving the RAW data directly to redundant array of inexpensive disks (RAID) in real-time and also to provide on the fly sub-sampled video image display using generic PC Based Linux Servers available in the industry. Handling of high speed image data from satellite involves de-randomization, decryption and decompression in real time. Innovative multiplexing techniques are used for digital correlation to increase the operating speed. Effective system design strategies rely on appropriate matching of systems hardware, software and environment. This needs the proper evaluation of the system environment. Schedulers for a realtime system are concerned with maximizing resource utilization subject to meeting system timing constraints. Priority-driven presumptive schedulers used in realtime systems require predictable cache performance. The design involved shared memory concepts, cache memory handling, image data handling and transfer to RAID while each system handles the data of around 500 GB per day. The paper deals with a generalized design of such system using a common platform as a part of Indian Remote Sensing Satellite Program and supplied to many users around the world. These systems are working error free all over","PeriodicalId":257948,"journal":{"name":"2007 International Conference on Signal Processing, Communications and Networking","volume":"61 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124323477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nagarajanvelmurugan, S. Karthikeyan, P. Dananjayan
{"title":"Resource Allocation Management for Multimedia QoS in Wireless Networks","authors":"Nagarajanvelmurugan, S. Karthikeyan, P. Dananjayan","doi":"10.1109/ICSCN.2007.350715","DOIUrl":"https://doi.org/10.1109/ICSCN.2007.350715","url":null,"abstract":"Adaptive resource allocation for multimedia quality of service (QoS) support in broadband wireless network is examined in this work. A service model consisting of three classes with different handoff dropping requirements is presented. Appropriate call admission control and resource reservation schemes are developed to allocate resource adaptively to the real time service classes with stringent delay bound. An efficient and effective measurement based dynamic resource allocation scheme is proposed for prioritized services. The non real time application serviced by the best effort model, are supported. The system accommodates adaptive multimedia applications to further reduce the blocking and dropping probabilities of real time application. The simulation results show that the proposed system can satisfy desired QoS of multimedia application under different traffic loads while achieving high channel utilization","PeriodicalId":257948,"journal":{"name":"2007 International Conference on Signal Processing, Communications and Networking","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121075789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Clustering Technique using Density Difference","authors":"B. Borah, D. Bhattacharyya","doi":"10.1109/ICSCN.2007.350675","DOIUrl":"https://doi.org/10.1109/ICSCN.2007.350675","url":null,"abstract":"Finding clusters with widely differing sizes, shapes and densities in presence of noise and outliers is a challenging job. The DBSCAN algorithm is a versatile clustering algorithm that can find clusters with differing size and shape in databases containing noise and outliers. But it cannot find clusters with different densities. We extend the DBSCAN algorithm so that it can also detect clusters that differ in densities. While expanding a cluster local density is taken into consideration. Starting with a core object a cluster is extended by expanding only those density connected core objects whose neighbourhood sizes are within certain ranges as determined by their neighbours already existing in the cluster. Our algorithm detects clusters even if they are not separated by sparse regions. The computational complexity of the modified algorithm (O(n log n)) remains same as the original DBSCAN","PeriodicalId":257948,"journal":{"name":"2007 International Conference on Signal Processing, Communications and Networking","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122452967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Rajkumar, V. Vaidehi, S. Pradeep, N. Srinivasan, M. Vanishree
{"title":"Application Level IDS using Protocol Analysis","authors":"K. Rajkumar, V. Vaidehi, S. Pradeep, N. Srinivasan, M. Vanishree","doi":"10.1109/ICSCN.2007.350762","DOIUrl":"https://doi.org/10.1109/ICSCN.2007.350762","url":null,"abstract":"As network attacks have increased in number and severity over the past few years, intrusion detection systems have become a necessary addition to the security infrastructure of most organizations. From a security perspective, firewalls and SSL offer little protection. Web traffic often contains attacks such as cross-site scripting and SQL injection that enter through port 80 and are not blocked by the firewall. Among the Web applications HTTP holds the majority share of the traffic transported through Web. In this paper, implementation of an application level IDS has been presented which uses combination of pattern matching and protocol analysis approaches. The first method of detection relies on a multi pattern matching within the protocol fields, the second one provides an efficient decision tree adaptive to the application traffic characteristics to limit the number of patterns to be checked. The proposed IDS can be effectively implemented in a high performance semantic processor","PeriodicalId":257948,"journal":{"name":"2007 International Conference on Signal Processing, Communications and Networking","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123800858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comprehensive Simulation of Dispersion Management in Long-Haul WDM Light Wave Systems Operating in Quasi-Linear Regime","authors":"A. Sangeetha, K. Anusudha","doi":"10.1109/ICSCN.2007.350748","DOIUrl":"https://doi.org/10.1109/ICSCN.2007.350748","url":null,"abstract":"A comprehensive simulation on the optimization of the management of the non linear effects in long haul light wave systems has been carried out by chirped RZ format as the format has significant advantages over the NRZ modulation format in WDM systems We have tried to demonstrate that a system reach of long-haul light wave link could be significantly improved by optimizing the dispersion map in transmission path and pre-chirping input pulses. Input powers were reduced to provide quasi-linear regime. There is a need for the optimization of the length of compensation fiber on both terminal sides to maximize the effect for channel away from zero-dispersion wavelength","PeriodicalId":257948,"journal":{"name":"2007 International Conference on Signal Processing, Communications and Networking","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130136384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Yashwanth Reddy, N.V. Deepa Gandhi, K. Balachander
{"title":"Simulation and Analysis of Performance Models of Broadband Intelligent Mobile Networks","authors":"K. Yashwanth Reddy, N.V. Deepa Gandhi, K. Balachander","doi":"10.1109/ICSCN.2007.350667","DOIUrl":"https://doi.org/10.1109/ICSCN.2007.350667","url":null,"abstract":"The present thrust is to develop a broadband intelligent network system which is able to sustain a large number of users and a varying amount of data while maintaining high availability of resources and acceptable performance. In such a scenario, scalability is an important aspect. In this paper we consider the impact of increasing the number of users supported by a network node and show that the network is scalable. Also congestion control is necessary to protect the broadband service control point during overload situations. Existing algorithms do not operate optimally with respect to important performance criteria such as responsiveness, efficiency and fairness. Here we try to identify their shortcomings and propose few enhancements. We also show that the proposed enhanced call-gapping algorithm performs consistently better than the existing automatic call-gapping algorithm in terms of above-mentioned criteria. The effectiveness of this analysis are shown using NS-2 simulator","PeriodicalId":257948,"journal":{"name":"2007 International Conference on Signal Processing, Communications and Networking","volume":"359 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122760277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. Jagannathan, A. Mahadevan, R. Hariharan, S. Srinivasan
{"title":"Number Theory Based Image Compression Encryption and Application to Image Multiplexing","authors":"V. Jagannathan, A. Mahadevan, R. Hariharan, S. Srinivasan","doi":"10.1109/ICSCN.2007.350696","DOIUrl":"https://doi.org/10.1109/ICSCN.2007.350696","url":null,"abstract":"Image compression and image encryption are pivotal to proper storage and transmission of images. Simultaneous image compression and encryption aims at achieving enhanced bandwidth utilization and security at the same time. The proposed number theory based image compression encryption (NTICE) algorithm employs number theoretic paradigm-Chinese remainder theorem, to solve congruencies and hence realize the twin ideals of compression and encryption simultaneously. The NTICE algorithm has been implemented on color images. The image coding results, calculated from actual image size and encoded image file, are comparable to the results obtained through much more sophisticated and computationally complex methods. In addition, the algorithm has been applied to the scenario of image multiplexing in order to obtain enhanced level of security along with compression","PeriodicalId":257948,"journal":{"name":"2007 International Conference on Signal Processing, Communications and Networking","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123976198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}