Ansuman Mishra, M. Bhat, Prasad Krishna Pai, D. Kamath
{"title":"Implementation of Low Voltage Floating Gate MOSFET based Current Mirror Circuits using 180nm technology","authors":"Ansuman Mishra, M. Bhat, Prasad Krishna Pai, D. Kamath","doi":"10.1109/ICISC44355.2019.9036355","DOIUrl":"https://doi.org/10.1109/ICISC44355.2019.9036355","url":null,"abstract":"The paper discusses implementation of low voltage (LV) basic current mirror (CM) and cascode current mirror (CCM) circuits using Floating Gate MOSFET (FGMOS) devices. The performance parameters such as output resistance, minimum output voltage requirement and power dissipation are compared for basic CM and double CCM circuits. The current mirror circuits are implemented with 180 nm technology using Cadence Virtuoso and simulated with Spectre RF. The simulation results are in good agreement with theory. The FGMOS based basic CM and double CCM circuits exhibited 52.4% and 40% power reduction as compared to gate driven current mirror circuits.","PeriodicalId":419157,"journal":{"name":"2019 Third International Conference on Inventive Systems and Control (ICISC)","volume":"137 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124472615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Novel Multi-Source Inverter Based Hybridization Scheme for Electrical Energy Storage System Using Renewable Source","authors":"Y. Mahadik, Vinayak Ansurkar, A. Kadam","doi":"10.1109/ICISC44355.2019.9036411","DOIUrl":"https://doi.org/10.1109/ICISC44355.2019.9036411","url":null,"abstract":"In this paper, a new battery/solar Novel Energy Management System topology is proposed to meet efficacy and make the system cost effective. The battery/solar HESS uses a multi-source inverter to connect the battery and solar energy three phase load. A small DC/DC converter is used for boosting the voltage coming from solar source. The durability of the battery is a major concern in any electric vehicle hence this circumscription is overcome by connecting solar source along with the battery. This topology is advantageous in the sense that it makes the system more compact, improves the durability and also the overall cost of the battery reduces significantly. The regenerative braking does not directly affect the battery and thereby consequently enhancing the life, endurance, efficiency, and reliability of the battery.","PeriodicalId":419157,"journal":{"name":"2019 Third International Conference on Inventive Systems and Control (ICISC)","volume":"42 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121013312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Tetrahedral 3D Mesh Generation for Medical Images","authors":"S. G, Tripty Singh","doi":"10.1109/ICISC44355.2019.9036329","DOIUrl":"https://doi.org/10.1109/ICISC44355.2019.9036329","url":null,"abstract":"In this paper, the tetrahedral 3D mesh using MRI/CT images i.e., Medical Images is generated. The 3D mesh is generated for segmented medical images. Tetrahedral component is a necessary part for mesh generation with the parameters of boundary points and sampling points for the anatomic model. It will also extract the internal and external surface of that structure for tetrahedral homogenously. It can also be used for multi-modal complex structure. Thus, classify and label the particular type of tissue for which the mesh is to be generated.","PeriodicalId":419157,"journal":{"name":"2019 Third International Conference on Inventive Systems and Control (ICISC)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132977248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of Genes Responsible for the Development of Cancer using Machine Learning","authors":"Geetika Aggarwal, Sarika Jain","doi":"10.1109/ICISC44355.2019.9036398","DOIUrl":"https://doi.org/10.1109/ICISC44355.2019.9036398","url":null,"abstract":"The average adult human's body is made up of approximately 37 trillion cells. Healthy cells in our bodies divide and replace themselves in a controlled fashion throughout our lives. But when healthy cells divide uncontrollably, they form new, abnormal cells, thus making a lesion in an affected body part. This lesion can be cancerous or non-cancerous. At what stage one got to know about the cancerous tumour is crucial as that would decide the basis of treatment. In this paper, we mentioned the basics of cancer and used different algorithms of data mining to detect breast cancer. In our proposed research work, WEKA software is applied with ten cross validation to calculate and accumulate result.","PeriodicalId":419157,"journal":{"name":"2019 Third International Conference on Inventive Systems and Control (ICISC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125172991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and SAR Analysis of a body wearable Textile patch Antenna","authors":"J. Singh, B. S. Sohi","doi":"10.1109/ICISC44355.2019.9036379","DOIUrl":"https://doi.org/10.1109/ICISC44355.2019.9036379","url":null,"abstract":"In this paper a body wearable textile patch antenna operated at 2.4 GHz is presented. The designed antenna is analyzed under bend and flat conditions. For design of this antenna, 3 mm thick wash cotton with dielectric constant of 1.51 is used as a substrate and 0.04 mm thick copper is used as conductive part of antenna. An electromagnetic band gap (EBG) is employed as a ground plane to reduce the SAR (specific absorption rate) when the same antenna is simulated on a three layered body phantom model (containing muscles, skin and fat). Using the EBG, SAR value of antenna has been reduced by 97.96% as compared to conventional antenna. Due to good return loss, high bandwidth and gain designed antenna is suitable for wearable applications.","PeriodicalId":419157,"journal":{"name":"2019 Third International Conference on Inventive Systems and Control (ICISC)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116088755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Medical Imaging - Boundary Solutions","authors":"M. Viswanath, R. Seetharaman, D. Nedumaran","doi":"10.1109/ICISC44355.2019.9036469","DOIUrl":"https://doi.org/10.1109/ICISC44355.2019.9036469","url":null,"abstract":"Boundary detection to a narrow scale or for a Region of Interest are required for studying the affected area in an human organ depending on the nature of the disease and the damage it caused to the specific organ. The problem is narrowed down to edge detection and the associated complexities. Precisely, it concentrates over a small region of interest confined to a specific area lying anywhere on the shape of study under consideration. Even though there are many imaging methods which help to overcome these kinds of situation, there are limitations. This paper addresses these issues with the help of Contourlet Transformation. Further, Gradient and Laplacian operators help in tuning the edge detection. Comparatively, the proposed methods perform better than the traditional methods. But, still the direction specific issues and extension issues made these techniques difficult to achieve the expected accuracy. Moreover, the Contourlet transform addresses the edge detection problem very well in digital domain. Finally, the Contourlet Transformation helped to overcome all of these issues by capturing the required data that involved the features in an image which ultimately focused on bringing the discreteness of the nature of the problem.","PeriodicalId":419157,"journal":{"name":"2019 Third International Conference on Inventive Systems and Control (ICISC)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121131527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Simulation Study of Mutual Coupling of MIMO System for Millimeter Wave Communications","authors":"Yusra Banday, G. M. Rather, G. R. Begh","doi":"10.1109/ICISC44355.2019.9036456","DOIUrl":"https://doi.org/10.1109/ICISC44355.2019.9036456","url":null,"abstract":"Mutual coupling affects the characteristics of an antenna element in an array and causes the spectral re-growth. With the result the performance of the multiple-input multiple-output (MIMO) system degrades. This affects the Signal-to-Noise Ratio (SNR) of a MIMO system and hence its BER performance. This paper presents the effect of antenna mutual coupling on BER of a MIMO channel under different coupling and correlation scenarios, using orthogonal space-time block code (OSTBC) transmission. Under High coupling environment with High correlation BER shows improvements whereas degradation in BER performance is observed when correlation is low.","PeriodicalId":419157,"journal":{"name":"2019 Third International Conference on Inventive Systems and Control (ICISC)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126749697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Front-End IoT Application for the Bitcoin based on Proof of Elapsed Time (PoET)","authors":"M. A. Kumar, V. Radhesyam, B. Srinivasarao","doi":"10.1109/ICISC44355.2019.9036391","DOIUrl":"https://doi.org/10.1109/ICISC44355.2019.9036391","url":null,"abstract":"There are some registry agreements that may be appropriate for the Internet of Things (IoT), including Bitcoin, Hyperledger Fabric and IOTA. This article presents quickly and examines them in terms of the progress of Internet applications. Block-dependent IoT applications can consolidate the chain's rationale (smart contracts) and front-end, portable or front-end web applications. We present three possible designs for BC IoT front-end applications. They vary depending on the Bitcoin block chain customer (neighborhood gadget, remote server) and the key location needed to manage active exchanges. The vital requirements of these projects, which use Bitcoin to organize constructive exchanges, are the volumes of information, the area and time of the complete block and block block, and the entry of the Bitcoin store. The implications of these surveys show that it is unlikely that a full Bitcoin distributor will continue to operate reliably with a mandatory IoT gadget. Then, designing with remote Bitcoin customers is, in all respects, a suitable methodology in which there are two minor alternatives and vary in key storage / management. Similarly, we recommend using the design with a unique match between the IoT gadget and the remote blockchain client to reduce system activity and improve security. We hope you also have the ability to operate with versatile verses with low control and low productivity. Our review eliminates the contradictions between synthesis methodologies, but the final choice for a particular registration agreement and the original technique completely depends on the proposed use case.","PeriodicalId":419157,"journal":{"name":"2019 Third International Conference on Inventive Systems and Control (ICISC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125832884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Prevention of Drive by Download Attack (URL Malware Detector)","authors":"A. Tyagi, Laxmi Ahuja, S. Khatri, S. Som","doi":"10.1109/ICISC44355.2019.9036341","DOIUrl":"https://doi.org/10.1109/ICISC44355.2019.9036341","url":null,"abstract":"This paper is intended to inform the user about a software tool called ‘url malware detector’. This software will help the user avoid falling prey for drive by download attacks. This tool accepts the url as the input text in a. txt file extension. It lists the files that are downloaded in backend during the process of urlvisitization and scans them on an online malware detection tool and yield the results in a SQLite database and visualizations. The details of the malware present in those files are represented in a graphical format. It uses MD5 hash technique. The paper consists of the detailed analysis of the tool in 5 modules for more comprehensibility. This paper will be helpful for the Inquisitors who wish to learn about prevention of drive by download attacks. This will also prove to be of great importance to people who want to be equipped with the updating of latest security threats while surfing World Wide Web.","PeriodicalId":419157,"journal":{"name":"2019 Third International Conference on Inventive Systems and Control (ICISC)","volume":"282 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127553663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Habibunnisha, K. Sivamani, R. Seetharaman, D. Nedumaran
{"title":"Reduction of Noises From Degraded Document Images Using Image Enhancement Techniques","authors":"N. Habibunnisha, K. Sivamani, R. Seetharaman, D. Nedumaran","doi":"10.1109/ICISC44355.2019.9036418","DOIUrl":"https://doi.org/10.1109/ICISC44355.2019.9036418","url":null,"abstract":"Evolution of digital devices and computers makes an increasing attraction in document image analysis. Many of the paper documents have been transferred and stored using digital devices in large manner. In this work, we have done image enhancement techniques to reduce the noises from degraded document images. Here, we have taken sample images from Document Image Binarization Contest (DIBCO) dataset images. We have done contrast stretching, histogram equalization, noise filtering, Laplacian transformation, global and local thresholding methods to remove show-through noise, uneven illumination noise and shot noise from degraded document images using OpenCV open source software. Further, performance metrics were estimated to understand the efficiency of the above methods in removing the aforementioned noises.","PeriodicalId":419157,"journal":{"name":"2019 Third International Conference on Inventive Systems and Control (ICISC)","volume":" 12","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113949680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}