2021 IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics (DISCOVER)最新文献

筛选
英文 中文
High Performance Variable Precision Multiplier and Accumulator Unit for Digital Filter Applications 用于数字滤波器应用的高性能可变精度乘法器和累加器单元
K. Neelima, Satyam
{"title":"High Performance Variable Precision Multiplier and Accumulator Unit for Digital Filter Applications","authors":"K. Neelima, Satyam","doi":"10.1109/DISCOVER52564.2021.9663665","DOIUrl":"https://doi.org/10.1109/DISCOVER52564.2021.9663665","url":null,"abstract":"The computationally intensive designs such as Multiplier Accumulator Unit need to be revisited for ascertaining better performance. Design of MAC unit using Variable Precision multiplier is explored in this paper with adoption of this concept to multipliers like Array, Carry Save, Booth and Vedic Multipliers. The variable precision MAC unit saves the computation memory as the partial results are computed with less memory so that the final result has a size of 2n x m for multiplication of n x m bits. The Verilog HDL modeling is used for the designs and Xilinx ISE 14.5 with ISIM simulator are used to functionally verify for Zynq 7000 series FPGA (XC7Z020-1CLG484). Among these, Vedic VPMAC FIR Filter proved to be better for area and delay by atleast 23.05% and 17.16% respectively, with a trade-off of 2.04% in power dissipation when compared with the other three designs. Also when compared with existing designs, it uses less area, delay and power dissipation by at least 8.06%, 8.58% and 2% respectively.","PeriodicalId":413789,"journal":{"name":"2021 IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics (DISCOVER)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114819345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Load Balancing and Predictive Analysis Model Implementation in Public Cloud 公共云中负载均衡与预测分析模型的实现
M. Gagandeep, R. Pushpalatha, B. Ramesh
{"title":"Load Balancing and Predictive Analysis Model Implementation in Public Cloud","authors":"M. Gagandeep, R. Pushpalatha, B. Ramesh","doi":"10.1109/DISCOVER52564.2021.9663617","DOIUrl":"https://doi.org/10.1109/DISCOVER52564.2021.9663617","url":null,"abstract":"The data centre is fundamental to cloud computing. Data centers are currently being strained by the rising demand for cloud computing services. Cloud computing practices are very important in terms of device performance and schedule that can make it easier for users to distribute the workload among network resources. Any data-center services can eventually become overloaded/ under loaded, resulting in increased energy usage, as well as decreased functionality and resource waste.As a result, this paper uses a contextual with multiple metrics to adopt optimization algorithms that are implemented by load balancing. Load balancing with system integration strengthens resource utilization but can increase Performance of System (Latency) metrics. This research aims to incorporate a new system for congestion control and server expansion including migration latency, device threshold, QoS, and energy consumption.","PeriodicalId":413789,"journal":{"name":"2021 IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics (DISCOVER)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132335987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Scalable Data Provenance Mechanism for Cloud Environment using Ethereum Blockchain 基于以太坊区块链的云环境可扩展数据来源机制
P. Abhishek, Y. Akash, D. Narayan
{"title":"A Scalable Data Provenance Mechanism for Cloud Environment using Ethereum Blockchain","authors":"P. Abhishek, Y. Akash, D. Narayan","doi":"10.1109/DISCOVER52564.2021.9663425","DOIUrl":"https://doi.org/10.1109/DISCOVER52564.2021.9663425","url":null,"abstract":"Cloud computing has become an important technology for the processing of large computationally expensive programs and data from real-world. IT organizations are en-trusting the cloud vendors for the security of their computational infrastructures including the data. Thus, there is a need for better provenance assurance for the data present in the cloud for better security and to establish trust between the cloud vendors and customers. Blockchain technology operates in a decentralized way for building trust between the entities in the system using immutable ledger. In this work, we propose the decentralized and trusted cloud data provenance mechanism using Ethereum blockchain platform, IPFS and scalable consensus mechanism. PoW is the consensus algorithm currently used in Ethereum Blockchain. PoW consensus mechanism needs lot of computational power for the processing of data in the Blockchain. Thus, we implement Proof of Stake (POS) consensus algorithm in Ethereum to improve the efficiency of the proposed data provenance mechanism. We demonstrate the performance of PoS-enabled provenance framework in a multi-node testbed. The results reveal that POS performs better than PoW for cloud data provenance.","PeriodicalId":413789,"journal":{"name":"2021 IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics (DISCOVER)","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116401407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Secure Access Control to Cloud Resources using Blockchain 使用区块链对云资源进行安全访问控制
H. Spoorti, R. Sneha, V. Soujanya, K. Heena, S. Pooja, D. Narayan
{"title":"Secure Access Control to Cloud Resources using Blockchain","authors":"H. Spoorti, R. Sneha, V. Soujanya, K. Heena, S. Pooja, D. Narayan","doi":"10.1109/DISCOVER52564.2021.9663647","DOIUrl":"https://doi.org/10.1109/DISCOVER52564.2021.9663647","url":null,"abstract":"With the steady increase in complexity of cloud computing and other technologies, there has been a significant concern for providing privacy and data security. For secure access of cloud resources, protection of sensitive data is essential. The critical data that relates to resource provisioning in cloud environment includes key pairs and IP addresses. The user needs this critical data to access the resources which has been provisioned. In conventional systems, this data is directly provided to the user. This technique results in local storage and opens up a vulnerability of snooping by a malicious intruder. Furthermore, the user needs to repeatedly remember the key pairs and other information of all the created resources. Recently, Blockchain, with its decentralized and immutable features is being explored in the design access control mechanism. In this work, we design blockchain based access control mechanism to access cloud resources. We use OpenStack cloud to provision the resources, store the critical data of resources in Ethereum blockchain and use secure access control to cloud resources. We also carry out the scalability and performance analysis of the blockchain based system using Ethereum platform.","PeriodicalId":413789,"journal":{"name":"2021 IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics (DISCOVER)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116453686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security of the Medical Images using Different Chaos map Techniques 不同混沌图技术对医学图像安全性的影响
S. Ragani, T. Vijaya Murari, K. Ravishankar
{"title":"Security of the Medical Images using Different Chaos map Techniques","authors":"S. Ragani, T. Vijaya Murari, K. Ravishankar","doi":"10.1109/DISCOVER52564.2021.9663714","DOIUrl":"https://doi.org/10.1109/DISCOVER52564.2021.9663714","url":null,"abstract":"Nowadays Internet is used for faster transmission of valuable information. This information may be text, image, and video anything. With the advancement of computer and biomedical innovations, medical JPEG images contain the patient’s individual data and the security of the private data pulls in incredible consideration. The progression of program and correspondence advancements has made images act significant parts in the domain of telediagnosis, tele-surgery, and so forth. Simultaneously, such signs of progress provide new intends to process clinical pictures; it additionally expands security concern as far as confidentiality, integrity and availability. This paper provides an overview of the various approaches currently in use and then goes on to develop a new mechanism for the same using various Chaos maps techniques in order to provide more integrityand security to the image by making the keyspace large enough towithstand brute force attacks.","PeriodicalId":413789,"journal":{"name":"2021 IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics (DISCOVER)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116608133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
PCA and SVM Technique for Epileptic Seizure Classification 基于PCA和SVM的癫痫发作分类
Mohammad Asif Raibag, J. V. Franklin
{"title":"PCA and SVM Technique for Epileptic Seizure Classification","authors":"Mohammad Asif Raibag, J. V. Franklin","doi":"10.1109/DISCOVER52564.2021.9663616","DOIUrl":"https://doi.org/10.1109/DISCOVER52564.2021.9663616","url":null,"abstract":"In India we have shortage of skilled Neuro-Physicians who can correctly and timely analyze the complicated features of electroencephalogram (EEG) signal which is critical in epilepsy diagnosis, and hence developing a reliable seizure classification model remains a challenging task. A Support Vector Machine (SVM)-based mechanism is proposed in this paper for classification of epileptic seizures from EEG recordings of brain activity. Certain relevant features are selected from time-frequency domain EEG recordings (TFD). Principal Component Analysis (PCA) technique is applied to improve the performance of the model and for classification SVM classifier with different kernels is applied. According to the results, the proposed PCA-SVM radial basis kernel approach is capable of improving epilepsy classification, as made evident by the results, which show an accuracy of 96.6% for normal subject data versus epileptic data. The performance with other parameters too show promising results hence the proposed SVM-RBF model achieves robust classification for epilepsy.","PeriodicalId":413789,"journal":{"name":"2021 IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics (DISCOVER)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114942963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Hardware Architecture for Sample Adaptive Offset Filter in HEVC HEVC中样本自适应偏移滤波器的硬件结构
P. Kopperundevi, M. S. Prakash
{"title":"A Hardware Architecture for Sample Adaptive Offset Filter in HEVC","authors":"P. Kopperundevi, M. S. Prakash","doi":"10.1109/DISCOVER52564.2021.9663590","DOIUrl":"https://doi.org/10.1109/DISCOVER52564.2021.9663590","url":null,"abstract":"The newly introduced in-loop filtering tool in the High Efficiency Video Coding (HEVC) standard is the Sample Adaptive Offset (SAO) filter. It mainly helps to reduce the ringing artifacts, that occurs due to distortion or loss of high frequency information. While SAO contributes to a significant increase in coding efficiency, the complexity of in-loop filtering in HEVC encoding is dominated by the estimation of SAO parameters. The SAO estimation primarily includes two phases: the statistics collection phase and the parameter determination phase. The statistics collection phase involves calculating sum and count for band and edge offset. The parameter determination phase involves distortion and offset generation, cost generation and decision, SAO type decision and finally, merge mode decision. In this paper, we designed the SAO encoder’s hardware architecture using a separate clock for each phase. The evaluation of proposed architecture results in decrease in the area of 4%-73% when compared with existing architectures while achieving a similar throughput rate. The design occupies a 70K gate count with a minimum operating frequency of 375MHz.","PeriodicalId":413789,"journal":{"name":"2021 IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics (DISCOVER)","volume":"135 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122983051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Classification of Crop and Weed from Digital Images: A Review 基于数字图像的作物和杂草分类研究进展
Radhika Kamath, Mamatha Balachandra, Srikanth Prabhu
{"title":"Classification of Crop and Weed from Digital Images: A Review","authors":"Radhika Kamath, Mamatha Balachandra, Srikanth Prabhu","doi":"10.1109/DISCOVER52564.2021.9663729","DOIUrl":"https://doi.org/10.1109/DISCOVER52564.2021.9663729","url":null,"abstract":"One of the major concern in the agricultural sector is the control of weeds. Weeds are capable of reducing the crop yield significantly and thus in curhuge loss. There are many ways of controlling weeds like using chemical herbicides, manual weeding, and using mechanical weeder. Overuse of chemical herbicides for weeds harms environment. Shortage of labors is a main problem with manual weeding. Mechanical weeding is not effective and is not suitable for some of the crops like direct-seeded rice fields. In recenty ears, technology is being explored in agriculture for the automatic detection and identification weeds from the digital images. This is useful in recommending specific herbicides and thus reducing overuse of herbicides and herbicide-resistant weeds. Thus contributing to site-specific weed management. This paper reviews some of the important research works carried out for the classification of crop and weeds from the digital images. In addition, some of the important future research scopes are discussed in this paper.","PeriodicalId":413789,"journal":{"name":"2021 IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics (DISCOVER)","volume":"139 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122846010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
[DISCOVER 2021 Front cover] [DISCOVER 2021年封面]
{"title":"[DISCOVER 2021 Front cover]","authors":"","doi":"10.1109/discover52564.2021.9663626","DOIUrl":"https://doi.org/10.1109/discover52564.2021.9663626","url":null,"abstract":"","PeriodicalId":413789,"journal":{"name":"2021 IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics (DISCOVER)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117245785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Efficient Triple-Layered and Double Secured Cryptography Technique in Wireless Sensor Networks 无线传感器网络中一种高效的三层双重安全加密技术
K. Vivek, M. R. Kale, Venkata Sai Krishna Thotakura, K. Sushma
{"title":"An Efficient Triple-Layered and Double Secured Cryptography Technique in Wireless Sensor Networks","authors":"K. Vivek, M. R. Kale, Venkata Sai Krishna Thotakura, K. Sushma","doi":"10.1109/DISCOVER52564.2021.9663674","DOIUrl":"https://doi.org/10.1109/DISCOVER52564.2021.9663674","url":null,"abstract":"When implemented in a complex environment, wireless network security is the main factor, and it is the sensor networks’ primary concern. Cryptology is a vital component in wireless sensor networks to accomplish this. Many existing cryptographic techniques had not shown good and better results till now. An efficient, strong, triple phased, double secured, and integrated cryptographic approach has been introduced in this study that utilizes both secret-key and public-key methods. Rijndael Encryption Approach (REA), Horst Feistel’s Encryption Approach (HFEA), and enhanced Rivest-Shamir-Adleman (e- RSA) are employed in the propounded technique in various stages of the algorithm since secret-key based system offers a significant level of protection and enable key management through publickey based techniques. REA was used in stage 1 of the algorithm; REA+HFEA was used in stage 2, and REA+HFEA+e-RSA was used in the last stage, and all three stages were performed in parallel. Parameters like execution time and decryption time were taken into account for measuring the performance levels of the propounded approach. The propounded algorithm is differentiated from existing techniques using a single evaluation parameter i.e computation time. It is found that propounded approach gave a good performance in terms of computation time with an Average Encryption Time (AET) and Average Decryption Time (ADT) of 1.12 and 1.26 on text sizes of 6, 25, 35, 61, and 184MegaBytes (MB) respectively. The proposed hybrid model is 1.36 times faster than ECC+RSA+MD-5,3.25 times faster than AES+ECC, 2.7 times faster than AES+RSA, and 3.24 times faster than AES+ECC+RSA+MD5.","PeriodicalId":413789,"journal":{"name":"2021 IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics (DISCOVER)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132950680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信