{"title":"Analysis and impacts of Negative Bias Temperature Instability (NBTI)","authors":"R. Mishra, A. Pandey, S. Alam","doi":"10.1109/SCEECS.2012.6184739","DOIUrl":"https://doi.org/10.1109/SCEECS.2012.6184739","url":null,"abstract":"As the Integrated Circuits (IC) density keeps on increasing with the scaling of CMOS devices in each successive technology generation, reliability concerns mainly Negative Bias Temperature Instability (NBTI) becomes a major challenge. NBTI degrades the performance of a PMOS transistor under a negative gate stress. The after effects of NBTI include: (a) threshold voltage increase of PMOS transistor, (b) drain current degradation, and (c) speed degradation. Elevated temperature and the negative gate stress play an important role in degradation of Gate Oxide which further degrades the above said parameters. Before any circuit design Stress Analysis becomes important for any device in order to get the complete performance of the circuit. Negative bias temperature instability (NBTI) has become the dominant reliability concern for nanoscale PMOS transistors. In this paper basically we have analysed the effect of temperature variations on NBTI for a buffer.","PeriodicalId":372799,"journal":{"name":"2012 IEEE Students' Conference on Electrical, Electronics and Computer Science","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124949441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Low power ENG signal acquisition amplifier for Epileptic Seizure Prediction","authors":"J. Alexander, M. S. Lakshmi, M. Renuga","doi":"10.1109/SCEECS.2012.6184790","DOIUrl":"https://doi.org/10.1109/SCEECS.2012.6184790","url":null,"abstract":"This paper deals with the design of low power low noise neural signal amplifier for Epileptic Seizure Prediction. The advent of Micro-electro Arrays has driven the need for implantable electronic circuitry to detect those Extracellular neural signals (ENG). We proposed a preamplifier of fully differential Low Noise Amplifier (LNA) with gm boosting in order to enhance the gain as well as reduce the power consumption. Low frequency high pass function has been realized with anti-parallel Diode connected PMOS. Simulation results shows that the input referred noise is 1.24μVrms from 100Hz to 5 KHz, mid-band voltage gain of 44.6dB, and the power consumption is 18.74μw. The results are validated using Cadence spectre simulator with 180nm technology. Simulation results show that this implantable amplifier is suitable for Epileptic seizure prediction.","PeriodicalId":372799,"journal":{"name":"2012 IEEE Students' Conference on Electrical, Electronics and Computer Science","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125278294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Geography-informed sleep scheduled and chaining based energy efficient data routing in WSN","authors":"P. Lohan, R. Chauhan","doi":"10.1109/SCEECS.2012.6184802","DOIUrl":"https://doi.org/10.1109/SCEECS.2012.6184802","url":null,"abstract":"We introduce Geography-Informed Sleep Scheduling and Chaining Based Routing (GSSC) algorithm in wireless sensor network. Since sensor nodes are energy constraint, so our aim is to maximize the network lifetime by utilizing the energy of nodes very efficiently. GSSC conserves energy by finding out equivalent nodes from routing perspective by using their geographical information i.e. the nodes which sense almost same information and then turning off unnecessary nodes to remove data redundancy. To further reduce the energy consumption of communication in network we use chaining based routing scheme to route the sensed data from active nodes to the base station. This chaining based data routing can reduce energy consumption of data transmission with the help of multi-hop routing concept. Our simulation results (using MATLAB) show that in comparison of very famous routing protocols like LEACH and PEGASIS, this algorithm has achieved significant increment in network lifetime.","PeriodicalId":372799,"journal":{"name":"2012 IEEE Students' Conference on Electrical, Electronics and Computer Science","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121208780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Dixit, P. Kulkarni, P. S. Somasagar, Veerendra C Angadi
{"title":"Variable scaling factor based invisible image watermarking using hybrid DWT — SVD compression — Decompression technique","authors":"M. Dixit, P. Kulkarni, P. S. Somasagar, Veerendra C Angadi","doi":"10.1109/SCEECS.2012.6184847","DOIUrl":"https://doi.org/10.1109/SCEECS.2012.6184847","url":null,"abstract":"Watermarking is a technique of embedding hidden information in multimedia data imperceptibly, such as image, video, audio and text data. Generally, an original image is transformed and coded watermark image data is embedded in frequency domain watermarking models. The proposed work explores the computational analysis of variable scaling factor (α) based invisible image watermarking process using the combination of Singular Value Decomposition (SVD) and Discrete Wavelet Transform (DWT) algorithms. The performance analysis of such an invisible image watermarking system is measured using percentage Compression Ratio (%CR), Peak Signal to Noise Ratio (PSNR), with respect to the embedded and extracted images correspondingly. The algorithms thus developed may find applications in copyright identification, finger printing, transaction tracking, content authentication, device control to name a few.","PeriodicalId":372799,"journal":{"name":"2012 IEEE Students' Conference on Electrical, Electronics and Computer Science","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117226546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Pourang, M. A. Heidarlou, K. J. Khasraghi, M. Bahrami
{"title":"Design and simulation of a novel micro-mixer along with a dielectrophoresis based focusing mechanism for clinical applications","authors":"K. Pourang, M. A. Heidarlou, K. J. Khasraghi, M. Bahrami","doi":"10.1109/SCEECS.2012.6184740","DOIUrl":"https://doi.org/10.1109/SCEECS.2012.6184740","url":null,"abstract":"We report a successful design and simulation of a novel micro-mixer with embedded micro electrodes to produce dielectrophoresis (DEP) force in order to focus particles in the middle of the channel and reduce sedimentation of particles. The device is designed to let cells with diameter of less than 15μm pass and therefore it can be integrated in the micro-scale cell sorters, which should be a key device for clinical applications. First, the concept of micro-mixers and dielectrophoresis phenomena is introduced. Then, design and simulation results of the micromixer and micro electrodes are presented, and evaluation of the mixer performance and focusing mechanism is discussed.","PeriodicalId":372799,"journal":{"name":"2012 IEEE Students' Conference on Electrical, Electronics and Computer Science","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116273703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Kalyan, R. Vignesh, U. H. Thakkar, T. A. Macriga
{"title":"MISTIKOS-secure data transmission in wireless network","authors":"S. Kalyan, R. Vignesh, U. H. Thakkar, T. A. Macriga","doi":"10.1109/SCEECS.2012.6184762","DOIUrl":"https://doi.org/10.1109/SCEECS.2012.6184762","url":null,"abstract":"The encryption standards such as DES (Data Encryption Standard), AES(Advanced Encryption Standard) and EES (Escrowed Encryption Standard) are widely used to solve the problem of communication over an insecure channel' [10]. Network security threat is an onerous issue that has captured lot of attention in recent times. Data transmissions between computers in a network employ different protocols and encryption methods to ensure data safety. In this paper, a methodology to encrypt data into texts with dynamic inputs that are more reliable and secure and cannot be hacked by malicious hackers is presented. This method uses the existing protocols in wireless network like Kerberos data transmission of cipher texts, for a secure and reliable transmission of data. Various “ciphering techniques” [1] were introduced for keeping the transmission of data secure. The method proposed in this paper deals with the two basic things. Firstly, encryption of data into texts with dynamic inputs which is more reliable & secure. Secondly, using the existing protocols in wireless network like Kerberos data transmission of cipher text can be done. Network security threat is a major problem and therefore, keeping this in mind, the technique has been proposed for a secure and reliable transmission of data.","PeriodicalId":372799,"journal":{"name":"2012 IEEE Students' Conference on Electrical, Electronics and Computer Science","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116279653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Current injection disturbance based voltage drift control for anti-islanding of photovoltaic inverter system","authors":"M. Alam","doi":"10.1109/SCEECS.2012.6184779","DOIUrl":"https://doi.org/10.1109/SCEECS.2012.6184779","url":null,"abstract":"Islanding detection is necessary as it causes power quality issues, equipment damage and personnel hazards. This paper proposes a new active anti-islanding scheme for inverter based photovoltaic system connected to grid. This method is based on injecting a current disturbance at the PV inverter output and observing the behavior of voltage at the point of common coupling (PCC) in absence of grid which depends upon the load connected to the PV inverter in an island condition. The proposed control scheme is based on Synchronous Reference Frame or dq frame. The voltage drift scheme using control gain and current command reference as positive feedback is utilized to drift the PCC voltage beyond the threshold limits to detect island within 2 seconds as prescribed by IEEE 1547. The test system configuration and parameters for anti-islanding study is prepared on IEEE 929 standards. The proposed control scheme is implemented on constant power controlled inverter system with reliable islanding detection. The effectiveness of proposed anti-islanding scheme is validated by extensive simulation done in MATLAB platform.","PeriodicalId":372799,"journal":{"name":"2012 IEEE Students' Conference on Electrical, Electronics and Computer Science","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115806049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Contingency analysis of power system","authors":"Veenavati Jagadishprasad Mishra, M. D. Khardenvis","doi":"10.1109/SCEECS.2012.6184751","DOIUrl":"https://doi.org/10.1109/SCEECS.2012.6184751","url":null,"abstract":"Contingency analysis is a well known function in modern Energy Management Systems (EMS). The goal of this power system analysis function is to give the operator information about the static security [4]. Contingency Analysis of a power system is a major activity in power system planning and operation. In general an outage of one transmission line or transformer may lead to over loads in other branches and/or sudden system voltage rise or drop. Contingency analysis is used to calculate violations. This paper shows the example on 6 bus power system which gives information of violations & remedial action to remove violations. Detailed studies have been carried out to work out the contingency plans.","PeriodicalId":372799,"journal":{"name":"2012 IEEE Students' Conference on Electrical, Electronics and Computer Science","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125219264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel design strategy of low-pass FIR filter using Opposition-based Differential Evolution algorithm","authors":"G. Samanta, A. Chandra","doi":"10.1109/SCEECS.2012.6184731","DOIUrl":"https://doi.org/10.1109/SCEECS.2012.6184731","url":null,"abstract":"Complicated mathematical operations are in the heart of any signal processing application and therefore minimization of computational time is one of the major areas of concern at which the researchers have been looking for years. A number of evolutionary optimization techniques have proved their faithful appearance in various signal processing operations, particularly in the field of digital filter design. However, they often require significantly higher time to converge, thus making the approach unsuitable for applications requiring higher throughput. In this paper, an attempt has been made towards the improvement of the convergence nature of a popularly used optimization technique namely, Differential Evolution (DE) through the use of an alternative approach, called Opposition-based Differential Evolution (ODE), derived from the concept of DE in designing low-pass Finite duration Impulse Response (FIR) filter. Performance comparison between these two distinct techniques has been carried out from different analytical angles. Finally, it has been concluded that ODE outperforms DE in every respect as considered in this work.","PeriodicalId":372799,"journal":{"name":"2012 IEEE Students' Conference on Electrical, Electronics and Computer Science","volume":"42 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128221001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Robust H∞ design with pole placement constraints via static output feedback of T-S fuzzy systems with parametric uncertainties","authors":"A. A. Momeni-Mazdeh, A. Farrokhzad","doi":"10.1109/SCEECS.2012.6184742","DOIUrl":"https://doi.org/10.1109/SCEECS.2012.6184742","url":null,"abstract":"This paper offers a design procedure for a robust pole-placement problem with H∞ objective via static output feedback control for T-S fuzzy systems with time-varying norm bounded uncertainties. Sufficient conditions for synthesis of a fuzzy static output feedback controller for T-S fuzzy systems are derived in terms of a set of linear matrix inequalities (LMIs). In comparison with the existing robust H∞ fuzzy static output feedback controllers we also employ pole-placement method in order to drive the closed loop poles into a suitable sub-region of the complex plane, and to improve the transient behavior of the system.","PeriodicalId":372799,"journal":{"name":"2012 IEEE Students' Conference on Electrical, Electronics and Computer Science","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127036222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}