2012 IEEE Students' Conference on Electrical, Electronics and Computer Science最新文献

筛选
英文 中文
Analysis and impacts of Negative Bias Temperature Instability (NBTI) 负偏置温度不稳定性(NBTI)分析及影响
2012 IEEE Students' Conference on Electrical, Electronics and Computer Science Pub Date : 2012-03-01 DOI: 10.1109/SCEECS.2012.6184739
R. Mishra, A. Pandey, S. Alam
{"title":"Analysis and impacts of Negative Bias Temperature Instability (NBTI)","authors":"R. Mishra, A. Pandey, S. Alam","doi":"10.1109/SCEECS.2012.6184739","DOIUrl":"https://doi.org/10.1109/SCEECS.2012.6184739","url":null,"abstract":"As the Integrated Circuits (IC) density keeps on increasing with the scaling of CMOS devices in each successive technology generation, reliability concerns mainly Negative Bias Temperature Instability (NBTI) becomes a major challenge. NBTI degrades the performance of a PMOS transistor under a negative gate stress. The after effects of NBTI include: (a) threshold voltage increase of PMOS transistor, (b) drain current degradation, and (c) speed degradation. Elevated temperature and the negative gate stress play an important role in degradation of Gate Oxide which further degrades the above said parameters. Before any circuit design Stress Analysis becomes important for any device in order to get the complete performance of the circuit. Negative bias temperature instability (NBTI) has become the dominant reliability concern for nanoscale PMOS transistors. In this paper basically we have analysed the effect of temperature variations on NBTI for a buffer.","PeriodicalId":372799,"journal":{"name":"2012 IEEE Students' Conference on Electrical, Electronics and Computer Science","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124949441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Low power ENG signal acquisition amplifier for Epileptic Seizure Prediction 用于癫痫发作预测的低功率ENG信号采集放大器
2012 IEEE Students' Conference on Electrical, Electronics and Computer Science Pub Date : 2012-03-01 DOI: 10.1109/SCEECS.2012.6184790
J. Alexander, M. S. Lakshmi, M. Renuga
{"title":"Low power ENG signal acquisition amplifier for Epileptic Seizure Prediction","authors":"J. Alexander, M. S. Lakshmi, M. Renuga","doi":"10.1109/SCEECS.2012.6184790","DOIUrl":"https://doi.org/10.1109/SCEECS.2012.6184790","url":null,"abstract":"This paper deals with the design of low power low noise neural signal amplifier for Epileptic Seizure Prediction. The advent of Micro-electro Arrays has driven the need for implantable electronic circuitry to detect those Extracellular neural signals (ENG). We proposed a preamplifier of fully differential Low Noise Amplifier (LNA) with gm boosting in order to enhance the gain as well as reduce the power consumption. Low frequency high pass function has been realized with anti-parallel Diode connected PMOS. Simulation results shows that the input referred noise is 1.24μVrms from 100Hz to 5 KHz, mid-band voltage gain of 44.6dB, and the power consumption is 18.74μw. The results are validated using Cadence spectre simulator with 180nm technology. Simulation results show that this implantable amplifier is suitable for Epileptic seizure prediction.","PeriodicalId":372799,"journal":{"name":"2012 IEEE Students' Conference on Electrical, Electronics and Computer Science","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125278294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Geography-informed sleep scheduled and chaining based energy efficient data routing in WSN 无线传感器网络中基于地理信息的睡眠调度和链的节能数据路由
2012 IEEE Students' Conference on Electrical, Electronics and Computer Science Pub Date : 2012-03-01 DOI: 10.1109/SCEECS.2012.6184802
P. Lohan, R. Chauhan
{"title":"Geography-informed sleep scheduled and chaining based energy efficient data routing in WSN","authors":"P. Lohan, R. Chauhan","doi":"10.1109/SCEECS.2012.6184802","DOIUrl":"https://doi.org/10.1109/SCEECS.2012.6184802","url":null,"abstract":"We introduce Geography-Informed Sleep Scheduling and Chaining Based Routing (GSSC) algorithm in wireless sensor network. Since sensor nodes are energy constraint, so our aim is to maximize the network lifetime by utilizing the energy of nodes very efficiently. GSSC conserves energy by finding out equivalent nodes from routing perspective by using their geographical information i.e. the nodes which sense almost same information and then turning off unnecessary nodes to remove data redundancy. To further reduce the energy consumption of communication in network we use chaining based routing scheme to route the sensed data from active nodes to the base station. This chaining based data routing can reduce energy consumption of data transmission with the help of multi-hop routing concept. Our simulation results (using MATLAB) show that in comparison of very famous routing protocols like LEACH and PEGASIS, this algorithm has achieved significant increment in network lifetime.","PeriodicalId":372799,"journal":{"name":"2012 IEEE Students' Conference on Electrical, Electronics and Computer Science","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121208780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Variable scaling factor based invisible image watermarking using hybrid DWT — SVD compression — Decompression technique 基于可变比例因子的不可见图像水印,采用DWT - SVD混合压缩-解压技术
2012 IEEE Students' Conference on Electrical, Electronics and Computer Science Pub Date : 2012-03-01 DOI: 10.1109/SCEECS.2012.6184847
M. Dixit, P. Kulkarni, P. S. Somasagar, Veerendra C Angadi
{"title":"Variable scaling factor based invisible image watermarking using hybrid DWT — SVD compression — Decompression technique","authors":"M. Dixit, P. Kulkarni, P. S. Somasagar, Veerendra C Angadi","doi":"10.1109/SCEECS.2012.6184847","DOIUrl":"https://doi.org/10.1109/SCEECS.2012.6184847","url":null,"abstract":"Watermarking is a technique of embedding hidden information in multimedia data imperceptibly, such as image, video, audio and text data. Generally, an original image is transformed and coded watermark image data is embedded in frequency domain watermarking models. The proposed work explores the computational analysis of variable scaling factor (α) based invisible image watermarking process using the combination of Singular Value Decomposition (SVD) and Discrete Wavelet Transform (DWT) algorithms. The performance analysis of such an invisible image watermarking system is measured using percentage Compression Ratio (%CR), Peak Signal to Noise Ratio (PSNR), with respect to the embedded and extracted images correspondingly. The algorithms thus developed may find applications in copyright identification, finger printing, transaction tracking, content authentication, device control to name a few.","PeriodicalId":372799,"journal":{"name":"2012 IEEE Students' Conference on Electrical, Electronics and Computer Science","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117226546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Design and simulation of a novel micro-mixer along with a dielectrophoresis based focusing mechanism for clinical applications 一种新型微混合器的设计与仿真及其基于介电电泳的聚焦机制
2012 IEEE Students' Conference on Electrical, Electronics and Computer Science Pub Date : 2012-03-01 DOI: 10.1109/SCEECS.2012.6184740
K. Pourang, M. A. Heidarlou, K. J. Khasraghi, M. Bahrami
{"title":"Design and simulation of a novel micro-mixer along with a dielectrophoresis based focusing mechanism for clinical applications","authors":"K. Pourang, M. A. Heidarlou, K. J. Khasraghi, M. Bahrami","doi":"10.1109/SCEECS.2012.6184740","DOIUrl":"https://doi.org/10.1109/SCEECS.2012.6184740","url":null,"abstract":"We report a successful design and simulation of a novel micro-mixer with embedded micro electrodes to produce dielectrophoresis (DEP) force in order to focus particles in the middle of the channel and reduce sedimentation of particles. The device is designed to let cells with diameter of less than 15μm pass and therefore it can be integrated in the micro-scale cell sorters, which should be a key device for clinical applications. First, the concept of micro-mixers and dielectrophoresis phenomena is introduced. Then, design and simulation results of the micromixer and micro electrodes are presented, and evaluation of the mixer performance and focusing mechanism is discussed.","PeriodicalId":372799,"journal":{"name":"2012 IEEE Students' Conference on Electrical, Electronics and Computer Science","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116273703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MISTIKOS-secure data transmission in wireless network mistikos -无线网络中的安全数据传输
2012 IEEE Students' Conference on Electrical, Electronics and Computer Science Pub Date : 2012-03-01 DOI: 10.1109/SCEECS.2012.6184762
S. Kalyan, R. Vignesh, U. H. Thakkar, T. A. Macriga
{"title":"MISTIKOS-secure data transmission in wireless network","authors":"S. Kalyan, R. Vignesh, U. H. Thakkar, T. A. Macriga","doi":"10.1109/SCEECS.2012.6184762","DOIUrl":"https://doi.org/10.1109/SCEECS.2012.6184762","url":null,"abstract":"The encryption standards such as DES (Data Encryption Standard), AES(Advanced Encryption Standard) and EES (Escrowed Encryption Standard) are widely used to solve the problem of communication over an insecure channel' [10]. Network security threat is an onerous issue that has captured lot of attention in recent times. Data transmissions between computers in a network employ different protocols and encryption methods to ensure data safety. In this paper, a methodology to encrypt data into texts with dynamic inputs that are more reliable and secure and cannot be hacked by malicious hackers is presented. This method uses the existing protocols in wireless network like Kerberos data transmission of cipher texts, for a secure and reliable transmission of data. Various “ciphering techniques” [1] were introduced for keeping the transmission of data secure. The method proposed in this paper deals with the two basic things. Firstly, encryption of data into texts with dynamic inputs which is more reliable & secure. Secondly, using the existing protocols in wireless network like Kerberos data transmission of cipher text can be done. Network security threat is a major problem and therefore, keeping this in mind, the technique has been proposed for a secure and reliable transmission of data.","PeriodicalId":372799,"journal":{"name":"2012 IEEE Students' Conference on Electrical, Electronics and Computer Science","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116279653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Current injection disturbance based voltage drift control for anti-islanding of photovoltaic inverter system 基于注入电流扰动的光伏逆变器系统防孤岛电压漂移控制
2012 IEEE Students' Conference on Electrical, Electronics and Computer Science Pub Date : 2012-03-01 DOI: 10.1109/SCEECS.2012.6184779
M. Alam
{"title":"Current injection disturbance based voltage drift control for anti-islanding of photovoltaic inverter system","authors":"M. Alam","doi":"10.1109/SCEECS.2012.6184779","DOIUrl":"https://doi.org/10.1109/SCEECS.2012.6184779","url":null,"abstract":"Islanding detection is necessary as it causes power quality issues, equipment damage and personnel hazards. This paper proposes a new active anti-islanding scheme for inverter based photovoltaic system connected to grid. This method is based on injecting a current disturbance at the PV inverter output and observing the behavior of voltage at the point of common coupling (PCC) in absence of grid which depends upon the load connected to the PV inverter in an island condition. The proposed control scheme is based on Synchronous Reference Frame or dq frame. The voltage drift scheme using control gain and current command reference as positive feedback is utilized to drift the PCC voltage beyond the threshold limits to detect island within 2 seconds as prescribed by IEEE 1547. The test system configuration and parameters for anti-islanding study is prepared on IEEE 929 standards. The proposed control scheme is implemented on constant power controlled inverter system with reliable islanding detection. The effectiveness of proposed anti-islanding scheme is validated by extensive simulation done in MATLAB platform.","PeriodicalId":372799,"journal":{"name":"2012 IEEE Students' Conference on Electrical, Electronics and Computer Science","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115806049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Contingency analysis of power system 电力系统应急分析
2012 IEEE Students' Conference on Electrical, Electronics and Computer Science Pub Date : 2012-03-01 DOI: 10.1109/SCEECS.2012.6184751
Veenavati Jagadishprasad Mishra, M. D. Khardenvis
{"title":"Contingency analysis of power system","authors":"Veenavati Jagadishprasad Mishra, M. D. Khardenvis","doi":"10.1109/SCEECS.2012.6184751","DOIUrl":"https://doi.org/10.1109/SCEECS.2012.6184751","url":null,"abstract":"Contingency analysis is a well known function in modern Energy Management Systems (EMS). The goal of this power system analysis function is to give the operator information about the static security [4]. Contingency Analysis of a power system is a major activity in power system planning and operation. In general an outage of one transmission line or transformer may lead to over loads in other branches and/or sudden system voltage rise or drop. Contingency analysis is used to calculate violations. This paper shows the example on 6 bus power system which gives information of violations & remedial action to remove violations. Detailed studies have been carried out to work out the contingency plans.","PeriodicalId":372799,"journal":{"name":"2012 IEEE Students' Conference on Electrical, Electronics and Computer Science","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125219264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 48
A novel design strategy of low-pass FIR filter using Opposition-based Differential Evolution algorithm 一种基于对立差分进化算法的低通FIR滤波器设计策略
2012 IEEE Students' Conference on Electrical, Electronics and Computer Science Pub Date : 2012-03-01 DOI: 10.1109/SCEECS.2012.6184731
G. Samanta, A. Chandra
{"title":"A novel design strategy of low-pass FIR filter using Opposition-based Differential Evolution algorithm","authors":"G. Samanta, A. Chandra","doi":"10.1109/SCEECS.2012.6184731","DOIUrl":"https://doi.org/10.1109/SCEECS.2012.6184731","url":null,"abstract":"Complicated mathematical operations are in the heart of any signal processing application and therefore minimization of computational time is one of the major areas of concern at which the researchers have been looking for years. A number of evolutionary optimization techniques have proved their faithful appearance in various signal processing operations, particularly in the field of digital filter design. However, they often require significantly higher time to converge, thus making the approach unsuitable for applications requiring higher throughput. In this paper, an attempt has been made towards the improvement of the convergence nature of a popularly used optimization technique namely, Differential Evolution (DE) through the use of an alternative approach, called Opposition-based Differential Evolution (ODE), derived from the concept of DE in designing low-pass Finite duration Impulse Response (FIR) filter. Performance comparison between these two distinct techniques has been carried out from different analytical angles. Finally, it has been concluded that ODE outperforms DE in every respect as considered in this work.","PeriodicalId":372799,"journal":{"name":"2012 IEEE Students' Conference on Electrical, Electronics and Computer Science","volume":"42 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128221001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Robust H∞ design with pole placement constraints via static output feedback of T-S fuzzy systems with parametric uncertainties 具有参数不确定性的T-S模糊系统静态输出反馈的极点配置约束鲁棒H∞设计
2012 IEEE Students' Conference on Electrical, Electronics and Computer Science Pub Date : 2012-03-01 DOI: 10.1109/SCEECS.2012.6184742
A. A. Momeni-Mazdeh, A. Farrokhzad
{"title":"Robust H∞ design with pole placement constraints via static output feedback of T-S fuzzy systems with parametric uncertainties","authors":"A. A. Momeni-Mazdeh, A. Farrokhzad","doi":"10.1109/SCEECS.2012.6184742","DOIUrl":"https://doi.org/10.1109/SCEECS.2012.6184742","url":null,"abstract":"This paper offers a design procedure for a robust pole-placement problem with H∞ objective via static output feedback control for T-S fuzzy systems with time-varying norm bounded uncertainties. Sufficient conditions for synthesis of a fuzzy static output feedback controller for T-S fuzzy systems are derived in terms of a set of linear matrix inequalities (LMIs). In comparison with the existing robust H∞ fuzzy static output feedback controllers we also employ pole-placement method in order to drive the closed loop poles into a suitable sub-region of the complex plane, and to improve the transient behavior of the system.","PeriodicalId":372799,"journal":{"name":"2012 IEEE Students' Conference on Electrical, Electronics and Computer Science","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127036222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信