{"title":"A 4-READ 2-WRITE Multi-Port Register File Design Using Pulsed-Latches","authors":"T. Manivannan, M. Srinivasan","doi":"10.1109/ICECA.2018.8474898","DOIUrl":"https://doi.org/10.1109/ICECA.2018.8474898","url":null,"abstract":"Pulsed-latches provide high performance with low power consumption by taking the advantages of both flip-flops and latches and thus, they are targeted in implementing different kinds of memory devices in various applications. One such memory device is the register files, which is traditionally being realized using SRAMs. In this paper, an area efficient and low power consumption design approach is proposed to perform the multi-read and multi-write operations in the pulsed-latches based multiport register files. These register files showed significant decrease in area as well as power consumption when compared to the SRAM based register files. An 8-BIT 4-READ and 2-WRITE (4R2W) pulsed-latches based multiport register file were designed and simulated in 180nm technology and its power-delay product was analyzed.","PeriodicalId":272623,"journal":{"name":"2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124179914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Facial Expression Analysis for Distress Detection","authors":"Priyanka Nair, Subha V","doi":"10.1109/ICECA.2018.8474761","DOIUrl":"https://doi.org/10.1109/ICECA.2018.8474761","url":null,"abstract":"Emotions are an incredibly important aspect of human life and basic research on emotions of the past few decades has produced several discoveries that have led to important real world applications. Facial expressions project our true emotions to others and add the real intent to the words we say. The interpretation of such facial expressions exhibited by the subject in response to a situation is really useful for many applications in fields of medicine, E-learning, entertainment, monitoring, marketing, law and many more. This project focuses on determining the distress level of a person by analyzing his facial expressions. The reaction of a person to a particular communication scenario is recorded using a video or still camera under predefined lighting conditions and this input is taken and processed further to detect his emotion. The face and facial landmarks detection are done using Viola Jones algorithm. Facial patches active during an emotion elicitation are then extracted for texture analysis. The feature extraction method used here is Gray Level Difference Method (GLDM) in which texture features are derived from the GLDM probability density functions. The next step, classification is done using Naïve Bayes Classifier. With reference to the trained information, the emotion of the person is recognized and is used for determining his distress level. The proposed system is tested using Extended Cohn Kanade(CK+) and Japanese female facial expression (JAFFE) datasets.","PeriodicalId":272623,"journal":{"name":"2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127684051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Pranathi, S. Kranthi, A. Srisaila, P. Madhavilatha
{"title":"Attacks on Web Application Caused by Cross Site Scripting","authors":"K. Pranathi, S. Kranthi, A. Srisaila, P. Madhavilatha","doi":"10.1109/ICECA.2018.8474765","DOIUrl":"https://doi.org/10.1109/ICECA.2018.8474765","url":null,"abstract":"Cross Site Scripting (XSS) Attacks are as of now the most well known security issues in current web applications. The attacks which we are using will make use of vulnerabilities in the web applications. Cross-Site scripting (XSS) Attacks happen while getting to data in middle of the data transfer. Web proxy is used as one solution on client-side. Cross Site Scripting (XSS) Attacks are anything but difficult to find and detect, yet hard to distinguish and counteract. This paper gives customer side answer for relieve cross site scripting Attacks. The client system performance is decreased which result in poor web surfing background. In this undertaking gives a customer side arrangement that uses a well ordered way to deal with ensure cross website scripting, without corrupting much the client's web perusing knowledge. Attackers accesses and manipulates the control system networks by using cross-site scripting. It exploits Web servers that arrival progressively produced Web pages or enable clients to post distinguishable substance.","PeriodicalId":272623,"journal":{"name":"2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126339284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Review on Image Segmentation for Brain Tumor Detection","authors":"S. M. Kulkarni, Dr. G. Sundari","doi":"10.1109/ICECA.2018.8474893","DOIUrl":"https://doi.org/10.1109/ICECA.2018.8474893","url":null,"abstract":"A brain tumor is the gathering, or mass, of unusual cells in the cerebrum. The skull, which encases the mind, is extremely unbending. Any advancement inside such a confined space can cause issues. Experts refers a tumor based on where the tumor cells started, and whether they are dangerous (malignant) or not (benign). Main aim of the image segmentation is to find the location and size of the tumor present in the brain. In this paper various types of segmentation algorithms are reviewed.","PeriodicalId":272623,"journal":{"name":"2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120996267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"LoRa Technology - An Overview","authors":"Shilpa Devalal, A. Karthikeyan","doi":"10.1109/ICECA.2018.8474715","DOIUrl":"https://doi.org/10.1109/ICECA.2018.8474715","url":null,"abstract":"IoT is gaining high popularity in today's world. Embedded systems have become a major part of our lives. People are able to control, monitor, and do a lot more from remote distance. This is done by connecting various objects reducing physical distance. IoT is the connectivity of various objects with network connectivity. Many a times these systems are battery operated and need a high battery backup. These systems require a technology that consumes less power and also covers long distances. But many technologies such as Zig-Bee, Wi-Fi, Bluetooth popularly used at present consumes high power and is not suitable for battery operated systems. LoRa is a new found technology that is emerging rapidly. The LoRa technology addresses these needs of a battery operated embedded device. The LoRa technology is a long range low power technology. This paper discuses about the advantages of LoRa over the existing technologies used in IoT. It also discusses the features of LoRa. LoRa WAn(Long Range Wide Area Network) is an open grade secure standard for the IoT connectivity. The LoRa alliance is an open non profitable group that shares their experience to drive LoRa.","PeriodicalId":272623,"journal":{"name":"2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117177465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Visual Cryptography: A Literature Survey","authors":"Rajat Bhatnagar, M. Kumar","doi":"10.1109/ICECA.2018.8474649","DOIUrl":"https://doi.org/10.1109/ICECA.2018.8474649","url":null,"abstract":"Visual cryptography(VC) is a cryptographic methodology which permits visual information, for instance, text, pictures, etcetera to be encrypted such that the decryption can be performed by the human visual framework, without the assistance of PCs. The aim of this survey paper is to provide the readers a layout of the first visual cryptography method, along with the various methods developed and proposed from time to time. This paper also gives a survey of the applications that are based upon the concept of Visual Cryptography.","PeriodicalId":272623,"journal":{"name":"2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124356231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Wadkar, Prathamesh Koshti, Devendra Parab, Santosh Tamboli
{"title":"V-Buddy: A Learning Management System","authors":"K. Wadkar, Prathamesh Koshti, Devendra Parab, Santosh Tamboli","doi":"10.1109/ICECA.2018.8474743","DOIUrl":"https://doi.org/10.1109/ICECA.2018.8474743","url":null,"abstract":"The software we are going to build is useful for different users such as students, placement coordinator, academic coordinator, exam coordinator, faculties, etc. for fulfilling their requirements. The user who accesses the system through his unique log in id and password and then gets information according to the access rights established in the system. Students will be able to get information related to placements, holidays, announcements from faculties, events, timetable, etc. through android app and faculties will have access to the system through a web portal from which information will be shared.","PeriodicalId":272623,"journal":{"name":"2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129138841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Patteti Krishna, Ch Yamini Surya Teja, S. Renuga Devi, V. Thanikaiselvan
{"title":"A Chaos Based Image Encryption Using Tinkerbell Map Functions","authors":"Patteti Krishna, Ch Yamini Surya Teja, S. Renuga Devi, V. Thanikaiselvan","doi":"10.1109/ICECA.2018.8474891","DOIUrl":"https://doi.org/10.1109/ICECA.2018.8474891","url":null,"abstract":"From the past few decades new image encryption methods are being developed so as to increase the secrecy rate. Eavesdropping is the main concern for any type of cryptographic methods. Eavesdropping include various methods like cipher text attack. In order to overcome these problems, we have proposed a compelling chaos-based encryption algorithm particularly for pictures. In this we use a secret hexadecimal key which is used to generates initial conditions for Tinkerbell maps. These are further used to generate initial seeds. The main advantage of the proposed algorithm is that it produces different initial seeds for different rounds which increases the encryption security. Using these we have compared the performances of two different chaotic maps using NPCR, UACI and Correlation analysis.","PeriodicalId":272623,"journal":{"name":"2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129151087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dheerajkumar Solanki, M. Wagh, Kailas Yedle, Y. S. Rao
{"title":"Evaluation of Image Processing Techniques on a Single Chip Digital Signal Processor","authors":"Dheerajkumar Solanki, M. Wagh, Kailas Yedle, Y. S. Rao","doi":"10.1109/ICECA.2018.8474682","DOIUrl":"https://doi.org/10.1109/ICECA.2018.8474682","url":null,"abstract":"Ahstract- The importance of embedded applications in image and video processing have been taking a large space in current research scenario. Image processing techniques like Histogram equalization, Filtering, Bit plane slicing, Sampling, Quantization, Edge detection, Contrast stretching, Thresholding, Gray scale conversion etc. are the basic building blocks in several fields such as satellite imaging, medical imaging, face recognition, video surveillance etc. The present paper aims at mathematical analysis of these basic building blocks and further examines their implementation on a floating point Digital Signal Processor (DSP) TMS320F28335. It also verifies the reliability of the implemented techniques using a performance parameter. The processed images have been displayed using Python for various image processing techniques to verify the theory.","PeriodicalId":272623,"journal":{"name":"2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA)","volume":"22 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117084174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Working model of Self-driving car using Convolutional Neural Network, Raspberry Pi and Arduino","authors":"A. Jain","doi":"10.1109/ICECA.2018.8474620","DOIUrl":"https://doi.org/10.1109/ICECA.2018.8474620","url":null,"abstract":"The evolution of Artificial Intelligence has served as the catalyst in the field of technology. We can now develop things which was once just an imagination. One of such creation is the birth of self-driving car. Days have come where one can do their work or even sleep in the car and without even touching the steering wheel, accelerator you will still be able to reach your target destination safely. This paper proposes a working model of self-driving car which is capable of driving from one location to the other or to say on different types of tracks such as curved tracks, straight tracks and straight followed by curved tracks. A camera module is mounted over the top of the car along with Raspberry Pi sends the images from real world to the Convolutional Neural Network which then predicts one of the following directions. i.e. right, left, forward or stop which is then followed by sending a signal from the Arduino to the controller of the remote controlled car and as a result of it the car moves in the desired direction without any human intervention.","PeriodicalId":272623,"journal":{"name":"2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133922423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}