{"title":"N-Curve Analysis of Low power SRAM Cell","authors":"D. Anitha, K. M. Chari, P. Kumar","doi":"10.1109/ICICCT.2018.8473215","DOIUrl":"https://doi.org/10.1109/ICICCT.2018.8473215","url":null,"abstract":"In this paper, a low power SRAM cell is proposed, whose leakage power is almost negligible compared to that of conventional 6T SRAM cell. All the stability parameters like static voltage noise margin(SVNM), static current noise margin(SINM), write trip voltage (WTV) and write trip current (WTI) are calculated using N-curve analysis. A better write stability is achieved for the proposed cell than 6T SRAM cell with a slight reduction in the read stability. The N-curves are plotted under different process corners and different temperatures. The standby power of the 6T SRAM cell and proposed SRAM cell is 6.22nW and 4.23uW respectively. Therefore, for low standby power applications the proposed cell is more suitable. Cadence tools are used for simulation of SRAM cells with gpdk 45-nm technology.","PeriodicalId":334934,"journal":{"name":"2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127164401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis on Periodic Web Personalization for the Efficiency of Web services","authors":"Y. Rajul, D. Babu, K. Anuradha","doi":"10.1109/ICICCT.2018.8473276","DOIUrl":"https://doi.org/10.1109/ICICCT.2018.8473276","url":null,"abstract":"World Wide Web is an endless network and has numerous browsing categories. But, the information available on the web is not appropriate to all categories of web surfers. Also, retrieving the data and documents for a particular user at a specific period of time is very important. Relevant, customized and specific information made available to the specific category of users to their satisfactory levels along with time optimization is called Web Personalization. Data, information, Knowledge and Web services made accessible and producing personalized output for individual users or groups of users for the following developments of web: Efficiency, Accuracy, Productivity etc.,. The assessment of Internet usage in temporal and periodic way is essential to determine the above parameters for web service providers. We propose a potential technique for extraction of periodic web usage of individual users. This is a different way to extract user changes and personalization on the web periodically.","PeriodicalId":334934,"journal":{"name":"2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT)","volume":"10 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123263164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Protecting Agents from Malicious Hosts using Trusted Platform Modules (TPM)","authors":"M. Shaik","doi":"10.1109/ICICCT.2018.8473278","DOIUrl":"https://doi.org/10.1109/ICICCT.2018.8473278","url":null,"abstract":"Software agents represent an assured computing paradigm that tends to emerge to be an elegant technology to solve present day problems. The eminent Scientific Community has proved us with the usage or implementation of software agent's usage approach that simplifies the proposed solution in various types to solve the traditional computing problems arise. The proof of the same is implemented in several applications that exist based on this area of technology where the software agents have maximum benefits but on the same hand absence of the suitable security mechanisms that endures for systems that are based on representation of barriers exists in the paradigm with respect to present day industry. As the application proposing present security mechanisms is not a trivial one as the agent based system builders or developers who are not often security experts as they subsequently do not count on the area of expertise. This paper presents a novel approach for protecting the infrastructure for solving the issues considered to be malicious host in mobile agent system by implementing a secure protocol to migrate agents from host to host relying in various elements based on the enhanced Trusted Platforms Modules (TPM) for processing data. We use enhanced extension to the Java Agent Development framework (JADE) in our proposed system and a migrating protocol is used to validate the proposed framework (AVASPA).","PeriodicalId":334934,"journal":{"name":"2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124091556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhanced Energy Efficient OSPF Algorithm for Wireless Sensor Network","authors":"Ashutosh Anand, Himanshu Garg, Vinay Joshi, Sanjay Kumar","doi":"10.1109/ICICCT.2018.8473348","DOIUrl":"https://doi.org/10.1109/ICICCT.2018.8473348","url":null,"abstract":"Wireless sensor network is a group of sensors which has the characteristic of sensing the data, then processing it and finally communicating the data according to the desired application. These sensors are connected in distributed form which basically performs four major tasks which are aggregation of data, sending and receiving data, and data processing inside the network. Many research have already been done related to making the sensor network more energy efficient. The major issue of wireless sensor network nowadays in terms of application is increasing the lifetime of sensors in the network by decreasing their energy consumption. In this paper an approach is used for making the enhanced version of OSPF (open shortest path first) algorithm more fruitful than the LEACH protocol and when direct transmission between the nodes are done.","PeriodicalId":334934,"journal":{"name":"2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122210008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"R Peak Detection using Empirical Mode Decomposition with Shannon Energy Envelope","authors":"K. Kumari, S. Sahu, R. Sinha","doi":"10.1109/ICICCT.2018.8473279","DOIUrl":"https://doi.org/10.1109/ICICCT.2018.8473279","url":null,"abstract":"R peak is an important parameter of ECG for monitoring the cardiac health. In this paper we present R peak detection algorithm from electrocardiogram (ECG) signal using Empirical Mode Decomposition (EMD) with combination of Shannon Energy Envelope. In this algorithm the ECG signal is decomposed by using the EMD and for highlighting the QRS complex we have take summation of first three Intrinsic Mode Functions (IMFs). The Shannon energy envelope is used for obtaining the envelope for detection of R peaks. MIT-BIH arrhythmia database is used for evaluation of proposed algorithm and compared with existing techniques. The comparison results shows that the proposed methodology is superior providing sensitivity of 97.85 %, positive predictive rate of 98.15% and accuracy of 98.19% of our proposed algorithm.","PeriodicalId":334934,"journal":{"name":"2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134137695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Choudhury, S. Nayak, Tara Prasanna Dash, P. Rout
{"title":"Overview of DC Microgrid as a Conceivable Future Power System","authors":"S. Choudhury, S. Nayak, Tara Prasanna Dash, P. Rout","doi":"10.1109/ICICCT.2018.8473326","DOIUrl":"https://doi.org/10.1109/ICICCT.2018.8473326","url":null,"abstract":"Diminution in conventional fuels likely petroleum and fossil fuel, global warming due to green house gas effusion and ozone layer degradation has led to shift in power generation from conventional to renewable source based generation. Further integration of power storage systems had led to emergence of Microgrid. DC Microgrid is preferably gaining popularity due to advancement in semiconductor devices and simpler configurable structure. This paper provides a comprehensive idea about DC Microgrid structure, control, protection and possible prospects to meet future expectations of the power system along with the inspiration that guided towards the study of DC Microgrid.","PeriodicalId":334934,"journal":{"name":"2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT)","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131286077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparative Study on Data Mining Classification Algorithms for Predicting Road Traffic Accident Severity","authors":"Tadesse Kebede Bahiru, Dheeraj Kumar Singh, Engdaw Ayalew Tessfaw","doi":"10.1109/ICICCT.2018.8473265","DOIUrl":"https://doi.org/10.1109/ICICCT.2018.8473265","url":null,"abstract":"According to World Health Organization report the number of deaths by road traffic accident is more than 1.25 million people and every year with non-fatal accidents affecting more than 20–50 million people. Several factors are contributed on the occurrence of road traffic accident. In this study, data mining classification techniques applied to establish models (classifiers) to identify accident factors and to predict traffic accident severity using previously recorded traffic data. Using WEKA (Waikato Environment for Knowledge Analysis) data mining decision tree (J48, ID3 and CART) and Naïve Bayes classifiers are built to model the severity of injury. The classification performance of all these algorithms is compared based on their results. The experimental result shows that the accuracy of J48 classifier is higher than others.","PeriodicalId":334934,"journal":{"name":"2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129837331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"De-Militarized Zone: A Next Level to Network Security","authors":"Krati Dadheech, Arjun Choudhary, Gaurav Bhatia","doi":"10.1109/ICICCT.2018.8473328","DOIUrl":"https://doi.org/10.1109/ICICCT.2018.8473328","url":null,"abstract":"In recent years, due to rapid enhancement in computer technology, network security has become a big concern for any organization. As a result, most of the organizations are investing billions of dollars every year to get strengthen their network infrastructure. Now, when we look into this problem, one of the possible solutions which can be thought off as is to implement industrial level De-Militarized Zone. The De-Militarized Zone is a process of building up a semi-secure network which works as the first line of defense to protect the internal infrastructure of any organization from external threats. By implementing this small and efficient technique, many network security problems can be resolved at first sight. This paper provides an insight view of different levels of DMZ design and based on these design levels, a small DMZ model has been proposed to enhance the internal security of an organization keeping common network security problems in mind.","PeriodicalId":334934,"journal":{"name":"2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT)","volume":"46 43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132470602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Prashant Malik, S. S. Gawas, Imran AltafPatel, Ninad P Parsekar, Akshay A Parab, Shubham S Parkar
{"title":"Transient Response Improvement of DC to DC Converter by Using Auto-tuned PID Controller","authors":"Prashant Malik, S. S. Gawas, Imran AltafPatel, Ninad P Parsekar, Akshay A Parab, Shubham S Parkar","doi":"10.1109/ICICCT.2018.8473075","DOIUrl":"https://doi.org/10.1109/ICICCT.2018.8473075","url":null,"abstract":"The DC-DC converters are extensively used in modern telecommunication and consumer electronics. Stability is one of the most aspect in designing of automatic control of DC-DC buck converter. In this paper a discrete auto-tuning PID scheme is developed for DC-DC converters for fast response time. When the required output does not follow the set point, a controller for synchronous buck converter is to be used with objective of keeping the error as minimum. The algorithm is used for the tuning discrete PID controller to obtain its parameters with a minimum error and is applied to Synchronous buck converter to improve its performance. For fast transient response, settling time and rise time of the Converter, the controller gains are continuously modified. For its implementation a buck converter is designed and its MATLAB/Simulink model is developed. The simulation results describes the effectiveness of the developed algorithms.","PeriodicalId":334934,"journal":{"name":"2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132506603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Weather Forecasting Using Artificial Neural Network","authors":"Dires Negash Fente, Dheeraj Kumar Singh","doi":"10.1109/ICICCT.2018.8473167","DOIUrl":"https://doi.org/10.1109/ICICCT.2018.8473167","url":null,"abstract":"Accurate weather forecast plays a vital role in today's world as agricultural and indusrial sectors are principally dependent on weather conditions. It is also used to forecast and warm about natural disasters. Weather forecasting is determination of the right values of weather parameters and furhermore the future weather condition based on these parameters. In this study different weather parameters were collected from national climate data center then using Long-short term memory(LSTM) technique, the neural network is trained for different combinations. In prediction of future weather condition using LSTM the neural network is trained using different combinations of weather parameters, the weather parameters used are temperature, precipitation, wind speed. pressure, dew point visibility and humidity. After training of LSTM model using these parameters the prediction of future weather is done.","PeriodicalId":334934,"journal":{"name":"2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132893095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}