{"title":"Area efficient high speed low power multiplier architecture for multirate filter design","authors":"K. Mariammal, S. V. vasantha Rani, T. Kohila","doi":"10.1109/ICE-CCN.2013.6528474","DOIUrl":"https://doi.org/10.1109/ICE-CCN.2013.6528474","url":null,"abstract":"Interpolation and Decimation is very effective and popular in multirate signal processing applications. This paper proposes a high speed, area and power efficient VLSI architecture for polyphase decimation filter with decimation factor of three (D=3) using BFD (Bypass Feed Direct) multiplier. Various key performance metrics such as number of slices, maximum operating frequency, number of LUT's, input output bonds, power consumption, setup time, hold time, propagation delay between source and destinations are estimated for the filter of length nine (N=9). The power dissipation is reduced in polyphase decimation filter using BFD multiplier which consumes low-power when compared to the conventional multiplier. The speed is improved by using carrylook ahead adder. This architecture also provide significant reduction in area (in terms of number of slices). The proposed scheme has been simulated and the results are reported. It was observed that the proposed scheme provides 57.99% increase in speed, 83.3% reduction in area and slight reduction in power dissipation when compared to conventional multiplier.","PeriodicalId":286830,"journal":{"name":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129752986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An enhanced approach to reduce rerouting time in MANETs","authors":"A. Hussain, P. Khader","doi":"10.1109/ICE-CCN.2013.6528614","DOIUrl":"https://doi.org/10.1109/ICE-CCN.2013.6528614","url":null,"abstract":"MANET routing protocols have to deal with link breaks which occur due to frequent movement of the nodes and dynamic network topology. The protocol has to find alternative paths in these situations. The latency occurred during this retransmission is referred to rerouting time. Several approaches have been proposed by researchers to improve rerouting time. One such approach is buffer zone routing where the transmission area of a node is divided into a safe zone close to the node and an unsafe zone near the end of the transmission range. However, this approach has few gaps and limitations such as optimal size of the buffer zone, network load etc. This paper proposes an approach to enhance or extend the buffer zone transmission where nodes within the buffer zone are grouped as virtual zones based on their energy level. The approach provides solutions to the problems in existing algorithm and addresses the gaps in it. There by reducing the rerouting time in MANETs.","PeriodicalId":286830,"journal":{"name":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129424762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study of 25nm Symmetric Extended Source/Drain Schottky Tunneling Transistors","authors":"J. Ajayan, T. Subash, T. Gnanasekaran, N. Kumar","doi":"10.1109/ICE-CCN.2013.6528485","DOIUrl":"https://doi.org/10.1109/ICE-CCN.2013.6528485","url":null,"abstract":"The performance of 25nm Symmetric Extended Source/Drain Schottky Tunneling Transistor (ESD-ST-SOIFET) with different gate structures are investigated through a TCAD modeling study. It is shown that, the doped extension regions adjacent to the source/drain schottky barrier improves the drive current by shrinking the schottky barrier and also the simulation results shows that the increasing doping levels at the source/drain(S/D) extensions increases the leakage current. The device shows better short channel effects compared to other schottky barrier devices. The analysis also shows that, the best characteristics of the proposed device can be obtained only if using proper silicides at the S/D regions. For best performance platinum silicide can be used for p-type and Erbium silicide can be used for n-type devices.","PeriodicalId":286830,"journal":{"name":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128920155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Kottaimalai, M. Rajasekaran, V. Selvam, B. Kannapiran
{"title":"EEG signal classification using Principal Component Analysis with Neural Network in Brain Computer Interface applications","authors":"R. Kottaimalai, M. Rajasekaran, V. Selvam, B. Kannapiran","doi":"10.1109/ICE-CCN.2013.6528498","DOIUrl":"https://doi.org/10.1109/ICE-CCN.2013.6528498","url":null,"abstract":"Brain Computer Interface (BCI) is the method of communicating the human brain with an external device. People who are incapable to communicate conventionally due to spinal cord injury are in need of Brain Computer Interface. Brain Computer Interface uses the brain signals to take actions, control, actuate and communicate with the world directly using brain integration with peripheral devices and systems. Brain waves are in necessitating to eradicate noises and to extract the valuable features. Artificial Neural Network (ANN) is a functional pattern classification technique which is trained all the way through the error Back-Propagation algorithm. In this paper in order to classify the mental tasks, the brain signals are trained using neural network and also using Principal Component Analysis with Artificial Neural Network. Principal Component Analysis (PCA) is a dominant tool for analyzing data and finding patterns in it. In Principal Component Analysis, data compression is possible and it projects higher dimensional data to lower dimensional data. By using Principal Component Analysis with Neural Network, the redundant data in the dataset is eliminated first and the obtained data is trained using Neural Network. EEG data for five cognitive tasks from five subjects are taken from the Colorado University database. Pattern classification is applied for the data of all tasks of one subject using Neural Network and also using Principal Component Analysis with Neural Network. Finally it is observed that the correctly classified percentage of data is better in Principal Component Analysis with Neural Network compared to Neural Network alone.","PeriodicalId":286830,"journal":{"name":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","volume":"327 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121839587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"VOIP and data storage in wireless GSM modem over MANET area","authors":"P. Sachin, S. Tamrakar","doi":"10.1109/ICE-CCN.2013.6528595","DOIUrl":"https://doi.org/10.1109/ICE-CCN.2013.6528595","url":null,"abstract":"VOIP communication done by IP but we know that IP spoofed attacks are the major problems to the current internet and defense communication in VOIP. Most networks today use TCP/IP protocol as the standard to communicate with each other. Each host in the network is uniquely identified by its IP address. In TCP/IP architecture, there is no way to check authorization of source IP. So attackers can easily target source IP address in IP header. In this paper, we have proposed a method to verify authentication of source IP address. We identify the attacks by comparing IP address, corresponding MAC address and BIOS serial number with register database. Detected spoofing was maintained in a log. Our method is very simple and efficient as it will perform in MANET area. Thus it is effective method to identify IP and MAC spoofed attacks. I will construct the secured VOIP communication over MANET area using TCP / IP and storage Data in GSM modem as SMS (inbox). Finally using IP and MAC get fail to prevent spoofing attack then DoS attack prevent using BIOS serial number of clients.","PeriodicalId":286830,"journal":{"name":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126559301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development of a relay test bench and an arbitrary waveform generator in RTAI-Linux platform","authors":"P. P. Hazarika, K. Shubhanga","doi":"10.1109/ICE-CCN.2013.6528569","DOIUrl":"https://doi.org/10.1109/ICE-CCN.2013.6528569","url":null,"abstract":"This paper presents the development of a PC-based relay test bench and an arbitrary waveform generator using an open-source Real-Time Application Interface (RTAI) in Linux environment. Such a setup not only permits the generation of any arbitrary waveforms: steady-state signals as well as transients, but also simplifies the testing of various single-phase or three-phase static relays such as over-voltage relay, directional power relay, negative sequence relay as well as numerical impedance relays. The actuating signal is fed to the relay under test using a set-up that consists of a PCI card with a built-in Digital to Analog Converter and a feedback circuit for detecting the status of the relay. Using any off-line simulation package, sampled data points of a desired waveform are obtained in the form of a data-file. The RTAI-Linux program generates this waveform in real-time which is directly fed to the relay under test. The relay test bench presented in this paper is a cost-effective set-up for laboratories to test and understand the behavior and characteristics of relaying systems.","PeriodicalId":286830,"journal":{"name":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126834097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Gupta, M. Wazid, S. Sharma, D. P. Singh, R. Goudar
{"title":"Coverage life time improvement in Wireless Sensor Networks by novel deployment technique","authors":"N. Gupta, M. Wazid, S. Sharma, D. P. Singh, R. Goudar","doi":"10.1109/ICE-CCN.2013.6528511","DOIUrl":"https://doi.org/10.1109/ICE-CCN.2013.6528511","url":null,"abstract":"In Wireless Sensor Networks (WSNs), the coverage means how well a sensor network will monitor the total area of the region. Node deployment is one of the important issues that need to be solved. The number of sensor nodes has direct impact on the cost of the Wireless Sensor Networks. So, keeping this in mind, the proper deployment of nodes can reduce the complexity of problems, energy consumption can be reduced and thus extends the lifetime of the Wireless Sensor Networks. In this paper, we are considering the tactical environment, so the deployment of sensor node becomes random. We are forming the tessellation of the deployment as Rhombus other than Triangle, Square and Hexagon that are taken ideally for deploying the sensor nodes and after applying the proposed method the life time of the given network increases.","PeriodicalId":286830,"journal":{"name":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130904288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Certain studies on thresholding based defect detection algorithms for Magnetic Flux Leakage images","authors":"S. Janakiraman, J. Daniel, A. Abudhahir","doi":"10.1109/ICE-CCN.2013.6528552","DOIUrl":"https://doi.org/10.1109/ICE-CCN.2013.6528552","url":null,"abstract":"Automatic thresholding is an important technique in the image segmentation process. The basic idea of automatic thresholding is to automatically select an optimal gray-level threshold value for partitioning pixels in the images into object and background based on their gray-level distribution. In this work the performance evaluation of three image thresholding algorithms namely, Otsu's thresholding method, Hou's thresholding method and Kapur's entropy based thresholding method for Non-Destructive Testing (NDT) applications were performed. Otsu's method is considered as one of the best threshold selection approaches for general real world images. The Otsu's and Hou's methods only consider class variance sum, but neglect variance discrepancy between foreground (object) and background. If the object is clearly distinguishable from the background, the gray-level histogram will be bimodal and the threshold for segmentation can be chosen at the bottom of the valley. Methods other than valley-seeking are thus required to solve this problem. So, Kapur's Entropy based thresholding method is performed for NDT images. This method uses global and objective property of the histogram. The suitable thresholding method for Magnetic Flux Leakage (MFL) image is identified by comparing performance measures for the three thresholding methods.","PeriodicalId":286830,"journal":{"name":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","volume":"2015 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132826084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. B. Sahoo, H. Pradhan, S. K. Mohanty, B. B. Mangaraj
{"title":"Analysis of 3×5 planar array antenna with mutual coupling and optimization using PSO","authors":"A. B. Sahoo, H. Pradhan, S. K. Mohanty, B. B. Mangaraj","doi":"10.1109/ICE-CCN.2013.6528479","DOIUrl":"https://doi.org/10.1109/ICE-CCN.2013.6528479","url":null,"abstract":"A 3×5 planar array of dipoles is analyzed taking mutual coupling into account. Multi-objective fitness function considering the Directivity (D), Half Power Beam Width (HPBW) and Front to Side Lobe Level (FSLL) of the antenna is examined and the Particle Swarm Optimization (PSO) algorithm is employed to optimize the planar array using the obtained fitness value. The array is simulated with self developed MOM structure code using MATLAB (7.8.0) and verified using MININEC (14.0) software package. Finally, the optimized results are compared with different types of Yagi-Uda array, optimized using various optimization techniques, to evaluate the performance of the planar array.","PeriodicalId":286830,"journal":{"name":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132875559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"PEPPDA: Power efficient privacy preserving data aggregation for wireless sensor networks","authors":"J. Jose, M. Princy","doi":"10.1109/ICE-CCN.2013.6528518","DOIUrl":"https://doi.org/10.1109/ICE-CCN.2013.6528518","url":null,"abstract":"Energy efficient privacy preserving data aggregation is important in power constrained wireless sensor networks. Existing hop by hop encrypted privacy preserving data aggregation protocols does not provide efficient solutions for energy constrained and security required WSNs due to the overhead of performing power consuming decryption and encryption at the aggregator node for the data aggregation and the increased number of transmissions for achieving data privacy. The decryption of data at the aggregator node will increase the frequency of node compromise attack. Thereby aggregator node reveals large amounts of data to adversaries. The proposed privacy homomorphism based privacy preservation protocol achieves non delayed data aggregation by performing aggregation on encrypted data. Thereby decreases the node compromise attack frequency. So high chance to get accurate aggregated results at the sink with reduced communication and computation overhead. The PEPPDA technique is best suited for time critical, secure applications such as military application, since it achieves privacy, authenticity, accuracy, end to end confidentiality, data freshness and energy efficiency during data aggregation. Our main aim is to provide a secure data aggregation scheme which guarantees the privacy, authenticity and freshness of individual sensed data as well as the accuracy and confidentiality of the aggregated data without introducing a significant overhead on the battery limited sensors.","PeriodicalId":286830,"journal":{"name":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128372675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}