{"title":"BER Analysis in Wavelet Based SC-FDMA for LTE Uplink Transmission","authors":"Naresh Kumar, Ishu","doi":"10.1109/ACCT.2015.49","DOIUrl":"https://doi.org/10.1109/ACCT.2015.49","url":null,"abstract":"Long Term Evolution (LTE) has adopted Single Carrier Frequency Division Multiple Access (SCFDMA) technique for uplink and Orthogonal Frequency Division Multiple Access (OFDMA) for downlink. SCFDMA is often called as Discrete Fourier Transform (DFT) spread OFDMA. In this paper, Wavelet based SCFDMA is proposed for analyzing Bit Error Rate (BER) performance. Analysis is carried out using different wavelets and different modulation schemes under AWGN channel. This analysis will show that the reduction in BER takes place by using wavelet transform in SCFDMA. Thus wavelet based SCFDMA provides better BER performance than that of DFT based SCFDMA.","PeriodicalId":351783,"journal":{"name":"2015 Fifth International Conference on Advanced Computing & Communication Technologies","volume":"42 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125753185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reduction of Leakage Power & Noise for DRAM Design Using Sleep Transistor Technique","authors":"Priyanka Kushwah, N. Saxena, S. Akashe, Saurabh","doi":"10.1109/ACCT.2015.81","DOIUrl":"https://doi.org/10.1109/ACCT.2015.81","url":null,"abstract":"In this paper the analysis of DRAM logic compatible 3T cell has been shown. Due to its high density and low cost of memory, it is universally used by the advanced processor for on chip data and program memory. DRAM has transistor-capacitor cell structure, where capacitor is charged to produce 1 or 0. Memory array, which is arranged in row and column, is word line and bit line respectively. Here I have proposed sleep transistor technique at 3T dram with semantic design, for improvement of leakage and also calculated stability by calculating noise, slew rate and settling time. This circuit proposed two voltage source are connected to bit line and bit line bar respectively. Switching of main transistor is performed by word line, which is at low for write operation and high for read operation. The simulation result shows that when a wide range of operating voltage is taken, which is from 0.7 to 1.3v then it is observed that low voltage operation is suitable for low slew rate or low read access time and the leakage current reduced as increase in the range of operating voltage. At 0.7v the leakage current is 595.4×10-12 amp, slew rate is 6.96×103 dB, noise measurement is 5.995×10-14, settling time is 46.63×10-9. The design has been carried out at the 45 nanometre scale technology on cadence virtuoso simulating tool.","PeriodicalId":351783,"journal":{"name":"2015 Fifth International Conference on Advanced Computing & Communication Technologies","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125097548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Analysis of TSDRP and AODV Routing Protocol under Black Hole Attacks in MANETs by Varying Network Size","authors":"Nirbhay Chaubey, A. Aggarwal, S. Gandhi, K. Jani","doi":"10.1109/ACCT.2015.62","DOIUrl":"https://doi.org/10.1109/ACCT.2015.62","url":null,"abstract":"Mobile Ad hoc Network (MANET) is a self-configured collection of mobile nodes in which there is no need of predefined infrastructure and centralized authority. MANET is particularly vulnerable to security attacks due to its fundamental nature. Ad hoc On-demand Distance Vector (AODV) is a very popular routing protocol of MANETs, but it has no security measures in-built and vulnerable to many types of attacks. Black hole attack at network layer is the most attention seeking attack in AODV routing protocol. This paper study the impact of network size of our propose Trust Based Secure On Demand Routing Protocol called \"TSDRP\" and AODV routing protocol for making it secure to thwart Black hole attack. To evaluate the performances, we have considered Packet Delivery Fraction (PDF), Average End-to-End Delay (AED), Average Throughput (AT) and Normalized Routing Load (NRL).","PeriodicalId":351783,"journal":{"name":"2015 Fifth International Conference on Advanced Computing & Communication Technologies","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125420455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"VLSI Implementation of a Key Distribution Server Based Data Security Scheme for RFID System","authors":"J. Bag, S. Sarkar","doi":"10.1109/ACCT.2015.55","DOIUrl":"https://doi.org/10.1109/ACCT.2015.55","url":null,"abstract":"RFID Technology is now a globally accepted technology which is rapidly emerging in every field of science and applications. It's excellent feature of very fast auto-identification without line of sight has made it popular in different areas of wire-less communication based system. But, during data transmission/exchange, security of personal or confidential data, it exposes serious threats to the security and privacy of individuals and organizations. Data security for RFID technology is now a mandatory condition to be provided by the manufacturer for better customer support and services. In this paper, we have proposed a security scheme which introduces a trusted Key management system. In this system, not a single key but several keys will be maintained, controlled and provided by the Key distribution server system (KDSS). It will be extremely useful for military persons in remote places where it is useful to identify specific item or guide to right route. Data will be encrypted using different programmable cellular automata (PCA) rules which is also provided with the key by the server. The system processor has been implemented up to RTL schematic level using Xilinx ISE14.3 simulation tool and virtex-7 FPGA board for real time verification of its functionality.","PeriodicalId":351783,"journal":{"name":"2015 Fifth International Conference on Advanced Computing & Communication Technologies","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128952385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimized Two Head Disk Scheduling Algorithm (OTHDSA)","authors":"Karishma Singh, Nidhi, Divya Rastogi, Dayashankar Singh","doi":"10.1109/ACCT.2015.70","DOIUrl":"https://doi.org/10.1109/ACCT.2015.70","url":null,"abstract":"In this paper, we proposed a new disk scheduling algorithm for improving the performance of modern storage devices in terms of throughput. Since the invention of disk with movable heads, many researchers tried to improve the I/O performance by using intelligent algorithms for disk scheduling. Memory capacity and speed of the processor are increasing several times than the speed of disk. This disparity shows that this cannot supply data to processor as fast as it requires. As soon as data is received by the processor from disk, data is processed immediately and then processor waits for next data from disk. Hence disk I/O performance becomes a bottleneck. Some advanced methods and scheduling algorithms are required for increasing disk I/O performance and using the disk efficiently. We can improve the performance of disk by reducing total number of head movements needed to serve requests. In this paper, we proposed and implemented an optimized two head disk scheduling algorithm (OTHDSA) which reduces total number of head movements. Experimental analysis has been carried out and it is observed that this proposed algorithm requires less number of head movements than many existing disk scheduling algorithms and hence it maximizes the throughput.","PeriodicalId":351783,"journal":{"name":"2015 Fifth International Conference on Advanced Computing & Communication Technologies","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117074816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparative Analysis of Various Routing Protocols in VANET","authors":"Surmukh Singh, P. Kumari, S. Agrawal","doi":"10.1109/ACCT.2015.113","DOIUrl":"https://doi.org/10.1109/ACCT.2015.113","url":null,"abstract":"To make the drive safer in future Vehicular ad hoc network can ease our life. For its success, it needs efficient routing protocols for communication among vehicles. Such communication can either through road side units (RSUs) or on board units (OBUs) in the vehicles. In this paper we are exploiting various existing routing protocols like AODV, AOMDV, DSR and DSDV by varying the velocity of vehicles and then comparing their performances with respect to throughput, end to end delay, packet delivery ratio and normalized routing load during communication.","PeriodicalId":351783,"journal":{"name":"2015 Fifth International Conference on Advanced Computing & Communication Technologies","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124118965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design & Optimization of FinFET Based Schmitt Trigger Using Leakage Reduction Techniques","authors":"Pawan Sharma, S. Khandelwal, S. Akashe","doi":"10.1109/ACCT.2015.86","DOIUrl":"https://doi.org/10.1109/ACCT.2015.86","url":null,"abstract":"In this proposed work we are applying valuable power gating schemes to FinFET based Schmitt trigger to enhance its performance by reducing the leakage current in standby mode (off-state mode). The power gating schemes like Sleep Transistor approach and Multi-Threshold CMOS (MTCMOS) have been analysed and simulated which shows the tremendous reduction in the leakage current thus increasing the stability of the design. In this paper, different consecutive designs of PULL-UP and PULL-DOWN networks of NMOS and PMOS are applied to FinFET based Schmitt trigger one after another. Due to this treatment of PULL-UP and PULL-DOWN network controlled voltage supply is obtained and the current driving capability of the design is increased, hence less Gate leakage current is formed. This provides the motivation to explore the design of low leakage FinFET based Schmitt trigger. Simulation is performed on the cadence virtuoso tool in 45nm technology and simulation results revealed that there is a significant reduction in leakage current for this proposed design. Leakage current offers by Sleep transistor approach and MTCMOS are 2.733 pA and 2.907 pA at 0.7 volt power supply.","PeriodicalId":351783,"journal":{"name":"2015 Fifth International Conference on Advanced Computing & Communication Technologies","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126867898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hybrid Mechanism for Multiple User Indoor Localization Using Smart Antenna","authors":"Y. Sharma, V. Gulhane","doi":"10.1109/ACCT.2015.24","DOIUrl":"https://doi.org/10.1109/ACCT.2015.24","url":null,"abstract":"GPS is commonly used for navigation. But Location estimation in indoor environments is not possible using GPS, as GPS signals cannot work in indoor environment. In indoor localization there is a huge impact of multipath parameters like shadowing, reflection, refraction, diffraction phenomena which have an impact on the position estimation which leads to inaccurate localization. Large number of Access Points (APs) equipped with single antenna could receive enough Receive Signal Strength (RSS) information that gives information about signal characteristics of the target area. But this results in a large cost of deployment. Various localization methods available are: TDOA, TOA, AOA, Location Finger Printing, GPS and RSSI. However in all these approaches the localization depends either on distance or on angle or on time only. In this paper the hybrid mechanism of range and angle measurements is considered. This proposed mechanism will provide an indoor positioning solution using the smart antenna architecture to increase the location estimation accuracy using mode of RSSI values followed by adaptive filtering.","PeriodicalId":351783,"journal":{"name":"2015 Fifth International Conference on Advanced Computing & Communication Technologies","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126751128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MATLAB/Simulink Model of Multi-machine (3-Machine, 9-Bus) WSCC System Incorporated with Hybrid Power Flow Controller","authors":"Garima Aggarwal, Anish Mittal, L. Mathew","doi":"10.1109/ACCT.2015.71","DOIUrl":"https://doi.org/10.1109/ACCT.2015.71","url":null,"abstract":"The stability of an interconnected power system is its ability to return to normal or stable operation after having been subjected to some form of disturbance. Instability means a condition denoting loss of synchronism or falling out of step. Stability considerations have been recognized as an essential part of power system planning for a long time. With interconnected system continually growing in size and extending over vast geographical regions, it is becoming increasingly more difficult to maintain synchronism between various parts of a power system. FACTS devices have shown very promising results when used to improve power system steady-state performance. They have been very promising Candidates for utilization in power system damping enhancement. Hybrid Power Flow Controller (HPFC) is incorporated with MM system in the present work as it can be used to replace or supplement the existing equipments. Usually, it can be installed at locations already having the reactive power compensation equipments like the SVC, STATCOM etc. In this Paper author Studied the power system stability enhancement by implementing the HPFC in MM System power system. The system also has the provision of a comparative study of the performances of UPFC and HPFC regarding power system stability enhancement of the system. Results obtained are encouraging and indicate that the designed model has very good performance which is comparable to the already existing UPFC.","PeriodicalId":351783,"journal":{"name":"2015 Fifth International Conference on Advanced Computing & Communication Technologies","volume":"39 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123523413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New Hybrid Virtual Machine Scheduling Scheme for Public Cloud","authors":"Harmeet Kaur, R. Challa","doi":"10.1109/ACCT.2015.47","DOIUrl":"https://doi.org/10.1109/ACCT.2015.47","url":null,"abstract":"Cloud computing is a distributed system that provides on demand services that are realizes with minimal efforts. Scheduling is one of the important issue in cloud computing. Scheduling is a set of polices to control the order of work performed by the computer system. The main drawback of First come first serve is that its response time and turnaround time is slow. The complexity of algorithm increased by reallocation of virtual machines. Time and energy are two important issues while selecting a scheduling strategy. Proposed new hybrid virtual machine scheduling is one of the concepts which improve the performance by using virtual machines and priority based scheduling algorithm. It also includes the mapping and priority of the jobs. This scheduling method takes the advantages of generalized priority scheduling, FCFS and Round Robin. It reduces the execution time as well as the energy. This scheduling algorithm make group of the jobs according to the energy consumption of the jobs as a high priority and low priority jobs. The proposed work will be compared with generalized priority algorithm to show the improved performance in terms of time and energy.","PeriodicalId":351783,"journal":{"name":"2015 Fifth International Conference on Advanced Computing & Communication Technologies","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124887679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}