{"title":"EEG Signal Analysis for BCI Interface: A Review","authors":"Swati Vaid, Preeti Singh, Chamandeep Kaur","doi":"10.1109/ACCT.2015.72","DOIUrl":"https://doi.org/10.1109/ACCT.2015.72","url":null,"abstract":"Brain Computer Interface (BCI) systems are the devices which are proposed to help the disabled, people who are incapable of making motor response to communicate with computer using brain signal. The aim of BCI is to interpret brain activity into digital form which acts as a command for a computer. One key challenge in current BCI research is how to extract features of random time-varying EEG signals and its classification as accurately as possible. Feature extraction techniques are used to extract the features which represent a unique property obtained from pattern of brain signal. Earlier EEG analysis was restricted to visual inspection only. The visual inspection of the signal is very subjective and hardly allows any standardization or statistical analysis. Hence, several different techniques were intended in order to quantify the information of the brain signal. Many linear and non-linear methods for feature extraction exist. The purpose of this paper is to give a brief introduction to the EEG signals and BCI system. The paper also includes a review on the conventional methods that are used for feature extraction of the signal.","PeriodicalId":351783,"journal":{"name":"2015 Fifth International Conference on Advanced Computing & Communication Technologies","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129178644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparing Data Mining Techniques for Mining Patents","authors":"Nisha Mattas, Smarika, D. Mehrotra","doi":"10.1109/ACCT.2015.119","DOIUrl":"https://doi.org/10.1109/ACCT.2015.119","url":null,"abstract":"Today is the world of knowledge economy. The business unit which believes in creating new innovations and implementing this technology in their organization as it always provides an edge over traditional working. Patents are used for preserving this knowledge. A large number of patents are filed every day. Identifying the best patent as per business need and extracting relevant knowledge from patients will help organizations to enhance their business. There are many technologies of data mining that can be suitably used for this purpose. This paper compares the key features of different techniques used for mining hidden patterns from patents.","PeriodicalId":351783,"journal":{"name":"2015 Fifth International Conference on Advanced Computing & Communication Technologies","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121481441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Distributed Energy Adaptive Location-Based Cooperative MAC Protocol for Prolonging the Network Lifetime of MANET","authors":"P. Das, V. Gulhane","doi":"10.1109/ACCT.2015.48","DOIUrl":"https://doi.org/10.1109/ACCT.2015.48","url":null,"abstract":"A Mobile ad hoc networks (MANETs) is an infrastructure-less, dynamic network consisting of a collection of wireless mobile nodes that communicate with each other without the use of any centralized authority. It is a network that allows user to change its location and configure itself, and use wireless connections to connect various networks. In this paper, a survey on various protocols like CMAC, DEL-CMAC, and strategies like energy efficient relay selection and power allocation strategy, optimal grouping strategy, lyapunov optimization are considered., based on the factors like throughput, delay, reliability, energy efficiency, relay selection and power allocation. All these protocols and strategies are used only for small and less mobile networks. In this paper the working of DEL-CMAC protocol is proposed which will prolong the network lifetime of MANET, and a system is proposed which will use cross layer scheme using cooperative diversity along with DEL-CMAC to increase the network lifetime of MANET by conserving energy while minimizing throughput and delay degradation.","PeriodicalId":351783,"journal":{"name":"2015 Fifth International Conference on Advanced Computing & Communication Technologies","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121564411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SPIN with Cluster for Data Centric Wireless Sensor Networks","authors":"Ashutosh Tripathi, N. Yadav, R. Dadhich","doi":"10.1109/ACCT.2015.76","DOIUrl":"https://doi.org/10.1109/ACCT.2015.76","url":null,"abstract":"Routing Algorithms are driving the growth of the data transmission in wireless sensor networks. Contextually, many algorithms considered the data gathering and data aggregation. This paper uses the scenario of clustering and its impact over the SPIN protocol and also finds out the effect over the energy consumption in SPIN after uses of clustering. The proposed scheme is implemented using TCL/C++ programming language and evaluated using Ns2.34 simulator and compare with LEACH. Simulation shows proposed protocol exhibits significant performance gains over the LEACH for lifetime of network and guaranteed data transmission.","PeriodicalId":351783,"journal":{"name":"2015 Fifth International Conference on Advanced Computing & Communication Technologies","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127745475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Study of Conventional and Junctionless MOSFET Using TCAD Simulations","authors":"N. Gupta, J. Patel, A. K. Raghav","doi":"10.1109/ACCT.2015.51","DOIUrl":"https://doi.org/10.1109/ACCT.2015.51","url":null,"abstract":"As the transistors are scaling down, a conventional MOSFET calls for stringent doping gradients which are quite difficult to achieve. Moreover, the short channel effects become more and more prominent with scaling. Contrary to a conventional MOSFET a junction less transistor is devoid of junctions and its current drive is controlled by the doping concentration instead of the gate capacitance. Though it is quite unorthodox to accept a device sans semiconductor junctions into the family of transistors. A junction less transistor displays very good performance in comparison with a conventional MOSFET especially when the channel is short. Basically, the conduction observed in the junction less transistor is bulk conduction whereas a conventional MOSFET relies on surface conduction. This paper presents simulation of a Junction less Transistor in Silva co and comparison of its performance with that of a conventional MOSFET. The parameters needed for the comparison are to be obtained from the transfer characteristics as well as the output characteristics.","PeriodicalId":351783,"journal":{"name":"2015 Fifth International Conference on Advanced Computing & Communication Technologies","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126436845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Load Balancing in Region Based Clustering for Heterogeneous Environment in WSNs Using AI Techniques","authors":"K. Singh, A. K. Daniel","doi":"10.1109/ACCT.2015.101","DOIUrl":"https://doi.org/10.1109/ACCT.2015.101","url":null,"abstract":"Wireless Sensor Networks (WSNs) contains a large number of sensor nodes with restricted energy. The sensing and transmitting of data involves a huge amount of energy consumption. Therefore, Clustering is considered as one of the powerful approaches for efficient utilization of energy. The heterogeneous environment contains different types of sensor nodes in term of sensing, computation, communication and power. The proposed Load Balancing in Region Based Clustering approach is used to balance the load of super nodes regions by dividing the region of super nodes into levels and levels into clusters using inverted binary tree concept to optimize Cluster Head (CH) selection using Fuzzy Logic Techniques. The Unequal Region Based clustering approach is used to deploy different types of sensor nodes in different region to provide efficient utilization of coverage area. Hybrid routing is used for transmitting data to Base Station (BS). The protocol optimizes the number of CH selection and balance the load of CH. The lifetime of the network is improved by efficient utilization of energy.","PeriodicalId":351783,"journal":{"name":"2015 Fifth International Conference on Advanced Computing & Communication Technologies","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126569996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Channel Management Algorithm for Modeling Network Throughput in IEEE 802.11 WLAN","authors":"R. Krishan, V. Laxmi","doi":"10.1109/ACCT.2015.15","DOIUrl":"https://doi.org/10.1109/ACCT.2015.15","url":null,"abstract":"With the increasing demand of the high quality service applications the 802.11 WLAN (Wireless Local Area Network) performance becomes the important issue. This paper proposes a Channel Management Algorithm to enhance the network performance by balance the load on access points (APs) to maximize the efficiency of available channels. By managing network channels the overall throughput gets maximized. Proposed algorithm starts with the channel assignment to each AP, based on minimizing the total interference between them. The proposed algorithm uses the dynamic scenarios with assigning non-overlapped channels and managing fixed and roaming users in the network. Result shows the proposed algorithm is capable of managing the users load on APs as significantly manages the channels in WLAN, which in turn improves the network throughput.","PeriodicalId":351783,"journal":{"name":"2015 Fifth International Conference on Advanced Computing & Communication Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128106874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Low Power Memristor Based 7T SRAM Using MTCMOS Technique","authors":"Vijay Singh Baghel, S. Akashe","doi":"10.1109/ACCT.2015.58","DOIUrl":"https://doi.org/10.1109/ACCT.2015.58","url":null,"abstract":"In recent years demand of low power devices is increasing and the reason behind this is scaling of CMOS technology. Due to the scaling, size of the chip decreases and number of transistor in system on chip (SOC) increases and this phenomenon also apply on memories that are used in SOC. Generally the number of transistors used in chip to store data is more as compared to the number of transistors used for other function. So in future the need of low power memories is increasing and to design low power memories leakage power is attentive parameter to design low power devices because it plays a major role in increasing the total power consumption of the devices. In this paper, 7T simple SRAM and technique based 7T SRAM has been designed and parameters like total power and leakage power has been calculated. SRAM (Static Random Access Memory) is a type of memory that provide a link with CPU and designing of SRAM is very critical because it takes large part of power and area therefore to achieve low power SRAM we have designed Memristor based SRAM. Memristor is a forth missing non-linear resistor which acts as memory and it improves the power and speed. It is invented in 1971 by L. O. Chua and in this paper MTCMOS (Multi Threshold CMOS) technique is used, recently it is very famous in academia and industry. It is a power reducing technique that helps in reducing leakage power in the SRAM by turning of the inactive circuit domains. Designing and calculation of parameters of simple SRAM, Memristor based SRAM and MTCMOS based Memristor SRAM has been done with cadence virtuoso tool and that was done at 45 nm technology with the operating voltage of 0.7 volt.","PeriodicalId":351783,"journal":{"name":"2015 Fifth International Conference on Advanced Computing & Communication Technologies","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132538153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of Full Adder Circuit Using Double Gate MOSFET","authors":"J. K. Sahani, Shiwani Singh","doi":"10.1109/ACCT.2015.37","DOIUrl":"https://doi.org/10.1109/ACCT.2015.37","url":null,"abstract":"This paper presents a design of a one bit full adder cell based on degenerate pass transistor logic (PTL) using Double Gate MOSFET. The design cell is degenerate 5-T XOR-XNOR module. This design has been compared with existing one-bit full adder cell based on degenerate pass transistor logic (PTL) designed using Single Gate MOSFET. In this paper, the proposed circuit has been analyzed for parameters like- power consumption and power delay product. The simulations of the proposed Full Adder have been performed using Tanner EDA Tool version 13.0. All the proposed design simulations are carried out at 45nm technology for various inputs like supply voltage, temperature and frequency. The decrease of 24% in power consumption has observed in proposed circuit. The results show a validity of double gate MOSFETs for designing for low power full adder circuit.","PeriodicalId":351783,"journal":{"name":"2015 Fifth International Conference on Advanced Computing & Communication Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131066666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Facial Behavior Recognition Using Soft Computing Techniques: A Survey","authors":"Khyati J. Kantharia, Ghanshyam I. Prajapati","doi":"10.1109/ACCT.2015.132","DOIUrl":"https://doi.org/10.1109/ACCT.2015.132","url":null,"abstract":"Human facial behaviour recognition can be defined as the process of identifying human internal feelings or mood from the classification of facial expression and gesture. Human facial expression and gesture recognition have a many real world applications such as Human Machine Intelligent Interaction (HMII), Smart rooms, Advance Driver Assistance Systems (ADAS), Intelligent Robotics, Monitoring and Surveillance, Gaming, Research on pain and depression, Health support appliances. Facial Expression Recognition is challenging problem up till now because of many reasons, moreover, it consists of three sub challenging tasks face detection, facial feature extraction and expression classification. Soft computing is a computer science field that applies to the problem whose solution is unpredictable or inexact. Digital image processing works effectively together with soft computing techniques to improve efficiency of recognizing human facial behaviour through machine. This paper gives a review on the mechanisms of human facial behavior recognition using soft computing techniques, which includes a brief detail on framework, literature survey and key issues in facial behaviour recognition using soft computing.","PeriodicalId":351783,"journal":{"name":"2015 Fifth International Conference on Advanced Computing & Communication Technologies","volume":"168 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114599119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}