{"title":"Adopting High-level Synthesis Approach to Accelerate Power Management Design","authors":"K. Jelemenská, Dominik Macko","doi":"10.1109/ICRITO.2018.8748268","DOIUrl":"https://doi.org/10.1109/ICRITO.2018.8748268","url":null,"abstract":"High-level synthesis (HLS) is rapidly gaining its position in hardware design. With nowadays designs complexity and continuously growing pressure to cut down the time-to-market it is now inevitable to raise the hardware design from Register-Transfer Level (RTL) to the higher-level of abstraction, commonly known as Electronic System Level (ESL). The HLS naturally brings an increase in design productivity and by adopting current techniques like IP reuse and formal verification the design correctness could be improved as well. However, the available studies show that the recent HLS tools still have a lot of limitations. Not only the design quality could be improved, concerning for example performance or energy-efficiency, but also various design techniques, currently applied at RTL and lower levels, should be supported at the ESL. The low power design techniques belong to the group. Application of these techniques is especially important in fault-tolerant systems, where an incorporated overhead results in highly increased power consumption. Although low power design is supported by standard RTL specification it is still significantly challenging, as well as highly error prone work, to apply these techniques to the HLS synthesized design. We present an approach to ESL power intent specification, together with the proposed HLS methods for generating an equivalent standard RTL specification of power management. The approach substantially reduces the power management specification and provides for rapid RTL-precise power estimation, offering thus the fast exploration of various power architectures. What is more, our current research aims for automated ESL power intent generation that could make the adoption of low power design techniques fully transparent.","PeriodicalId":439047,"journal":{"name":"2018 7th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134394119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Comparative Approach of Segmentation Methods Using Thermal Images of Apple","authors":"Yogesh, Ashwani Kumar Dubey, R. Arora","doi":"10.1109/ICRITO.2018.8748437","DOIUrl":"https://doi.org/10.1109/ICRITO.2018.8748437","url":null,"abstract":"This paper elaborates a comparative approach of various segmentation methods for identification of defected region in apple. External properties of fruit such as texture, shape, size and color are inadequate for recognizing the internal properties of fruit. A non-destructive technique based on thermal imaging examined the internal and external properties of fruit. Fruit quality screening without harming them is a challenging work with precision level. As external appearance of fruit cannot guarantee superb quality, there is probability of defected region in inner structure of fruit having good outer appearance. It is required to examine fruit thoroughly for acceptability. A proper segmentation technique aiding sorting of quality fruit compared to visual approach.","PeriodicalId":439047,"journal":{"name":"2018 7th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132799114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Khera, Prateekshya Biswal, Chintalapudi Likhith
{"title":"Development of Web Based Light Intensity Control of LED Using LabVIEW","authors":"N. Khera, Prateekshya Biswal, Chintalapudi Likhith","doi":"10.1109/ICRITO.2018.8748385","DOIUrl":"https://doi.org/10.1109/ICRITO.2018.8748385","url":null,"abstract":"This paper presents the development of web based light intensity control of LED light source using LabVIEW. In this paper, a low-cost microcontroller is used as a control card for supplying the digital dimming signals to the LED light source from the National Instruments LabVIEW software. The main objective of this paper is to implement dimming of light intensity from both the onsite and remote location using intelligent control. The dimming level signal is transmitted to low-cost microcontroller board from the virtualinstrument software rchitecture (VISA) driver of LabVIEW software from both onsite and remote location. The diming signal from microcontroller port are isolated using an opto-coupler and are supplied to the LED driver. In order to felicitate the remote dimming, the dimming signals are supplied from the client computer to microcontroller board using web publishing tool of LabVIEW.","PeriodicalId":439047,"journal":{"name":"2018 7th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130994246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Ensemble-Classifier Based Approach for Multiclass Emotion Classification of Short Text","authors":"Shivangi Chawla, Monica Mehrotra","doi":"10.1109/ICRITO.2018.8748757","DOIUrl":"https://doi.org/10.1109/ICRITO.2018.8748757","url":null,"abstract":"The profusion of social media textual content coupled with emotion mining methodologies, present exciting opportunities for researches to unveil the hidden emotions behind these texts. Despite recent growth and development in the field of Textual Emotion Mining (TEM), previous studies of emotion classification mainly focused on the use of simple classifiers over Ekman (6 emotions) or Plutchik (8 emotions) emotion models. In this study, Parrott’s hierarchy of emotion is utilized to build three emotion-labelled datasets of tweets corresponding to three levels(primary, secondary and tertiary) of emotion categories. We then present an ensemble-classifier based approach for multiclass textual emotion classification problem. The ensemble was created using four diverse classifiers including naive bayes, multiclass SVM, logistic regression and SGDunder three algorithms bagging, boosting and voting, in order to constitute a promising model which combines the benefits of base classifiers. The experimental investigation over three crawled datasets of hashtag-annotated english tweets, showed promising results and indicated that the proposed ensemble-classifier based approach improved the performance of base learners. Also, voting proved to be most suitable and outperformed both bagging and boosting ensembles.","PeriodicalId":439047,"journal":{"name":"2018 7th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124307296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On Uncensored Mean First-Passage-Time Performance Experiments with Multi-Walk: a New Stochastic Optimization Algorithm","authors":"F. Brglez","doi":"10.1109/ICRITO.2018.8748717","DOIUrl":"https://doi.org/10.1109/ICRITO.2018.8748717","url":null,"abstract":"A rigorous empirical comparison of two stochastic solvers is important when one of the solvers is a prototype of a new algorithm such as multi-walk (MWA). When searching for global minima in $mathbb{R}^{p}$, the key data structures of MWA include: $p$ rulers with each ruler assigned $m$ marks and a set of $p$ neighborhood matrices of size up to $mast(m - 2)$, where each entry represents absolute values of pairwise differences between $m$ marks. Before taking the next step, a controller links the tableau of neighborhood matrices and computes new and improved positions for each of the m marks. The number of columns in each neighborhood matrix is denoted as the neighborhood radius $r_{n} < = m - 2$. Any variant of the DEA (differential evolution algorithm) has an effective population neighborhood of radius not larger than 1. Uncensored first-passage-time performance experiments that vary the neighborhood radius of a MW-solver can thus be readily compared to existing variants of DE-solvers. This paper considers seven test cases of increasing complexity and demonstrates, under uncensored first-passage-time performance experiments: (1) significant variability in convergence rate for seven DE-based solver configurations, and (2) consistent, monotonic, and significantly faster rate of convergence for the MW-solver prototype as we increase the neighborhood radius from 4 to its maximum value.","PeriodicalId":439047,"journal":{"name":"2018 7th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123406110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Effect of Run-Time Triggered Multinet Trojan on Max-log-MAP Decoder","authors":"M. Aiswarya, B. Yamuna, Karthi Balasubramanian","doi":"10.1109/ICRITO.2018.8748334","DOIUrl":"https://doi.org/10.1109/ICRITO.2018.8748334","url":null,"abstract":"The rapid growth in wireless communication has caused an increased demand for high speed error control decoders with improved BER performance. Turbo codes, the Shannon limit approaching codes, use Max-log-MAP decoders as the component decoders in the iterative decoding process. The demand for high speed error control decoders has led to an increased interest in the design of hardware-secure Max-log-MAP decoders with high throughput and reduced area. This paper focuses on designing a high throughput Max-log-MAP decoder with reduced area and analyzing the effect of a run time triggered multinet connected Trojan on its performance. High throughput is achieved by using radix-4 and radix-8 architectures and area is optimized using maximum sharing of resources (MSR) architecture. This architecture uses a modified add-compare-select unit designed by effectively utilizing the relationship existing between the branch metrics. Trojan analysis is performed by inserting a run time triggered multinet connected Trojan and comparing its performance with the Trojan free decoder.","PeriodicalId":439047,"journal":{"name":"2018 7th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129366005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"4QAM OFDM Visible Light Communication using Laser","authors":"Chetna Verma, Chetan Selwal","doi":"10.1109/ICRITO.2018.8748463","DOIUrl":"https://doi.org/10.1109/ICRITO.2018.8748463","url":null,"abstract":"A visible light communication (VLC) system with 4QAM-OFDM is formed and simulated using 450 nm CW laser (CW laser) with a modulator at the input side and at the receiving side photodetector is used. VLC system Simulation is done by working on Optisystem 12, a constellation of VLC obtained at 250m/10Gbps. the benefit of CW laser along with 4 QAM OFDM improve the VLC system for free space communication Significant. With the help of CW Laser at visible frequency aspect can be seen as an advanced class of an input carrier which has the potential to accomplish data rate of high speed, high communication distance, as well as easy supervision and furnishing. By using 4 QAM OFDM we get clear constellation diagram. In this paper, we evaluate the performance of optical to electrical power conversion, Clear constellation diagram of VLC System corresponding distance from the transmitter to receiver.","PeriodicalId":439047,"journal":{"name":"2018 7th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129385679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Anju Annie Thomas, Emna Jeridi, B. Sharma, V. P. Mishra, Mohamamad Al Shamsi, Mohammad Al Khalloufi
{"title":"Study of Security Features of Bank Cheques and Credit Cards and Decipherment","authors":"Anju Annie Thomas, Emna Jeridi, B. Sharma, V. P. Mishra, Mohamamad Al Shamsi, Mohammad Al Khalloufi","doi":"10.1109/ICRITO.2018.8748316","DOIUrl":"https://doi.org/10.1109/ICRITO.2018.8748316","url":null,"abstract":"Questioned documents are documents whose authenticity is suspicious or uncertain. Guilty people most of the time use to burn important documents to hide their criminal activities and intentions. This is usually achieved by exposing the document to fire with/without any accelerant. These burnt documents may be linked to a substantial act of forgery, fraud, ransoms or any other serious offence. Present work has been attempted to study experimentally, certain government/non-government documents of UAE such as bank cheques and bank credit cards for the effect of heat/fire on these documents and further how these charred documents can be subjected to decipherment of any meaningful matter. For this study the bank cheques and credit cards with pre-written matter by different types of writing instruments and inks were considered. At that point, the written by hand certifications were signed until the point that the works turned out to be halfway or totally undetectable. The roasted reports were then appropriately gathered and were analyzed under a projectina inspec-8 by utilizing diverse light sources (non-damaging sources, for example, UV, IR, Retro and so on and saw under different wavelengths. Results demonstrated that the works on these singed reports can be apparently improved which can be used for encouraging criminological examinations. The writings were comparatively more visible under diverse wavelengths of lights. The results were recorded through proper photographic techniques.","PeriodicalId":439047,"journal":{"name":"2018 7th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129874953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aparna Madan, Ann M. George, Apurva Singh, M. Bhatia
{"title":"Redaction of Protected Health Information in EHRs using CRFs and Bi-directional LSTMs","authors":"Aparna Madan, Ann M. George, Apurva Singh, M. Bhatia","doi":"10.1109/ICRITO.2018.8748713","DOIUrl":"https://doi.org/10.1109/ICRITO.2018.8748713","url":null,"abstract":"This paper describes the de-identification of personally identifiable information (PIIs) in electronic health records (EHRs) using two models of conditional random fields (CRFs) and bidirectional long short term memory networks (LSTMs). Most medical records store private information such as PATIENT NAME, HOSPITAL NAME, LOCATION, etc. that needs to be de-identified or redacted before being passed on for further medical research. The process of removing such information using machine learning techniques is started with pre-processing of raw data by tokenization and detection of sentences. On comparing the techniques, it is noted that CRFs require manual feature engineering to train the model whereas LSTM is capable of handling long term dependencies without much insight about the dataset. Bi-directional LSTM network was used to generate context information from suitable word representations. Finally, a predictive layer was applied to predict the protected health information (PHI) terms having maximum probability.Evaluated with the i2b2 gold data set of clinical narratives of patients of 2014 De-identification challenge, we propose an efficient solution for redaction using two models, both of which achieve good F-scores for PHIs of all types. The LSTM-based model achieved a micro-F1 measure of 0.9592, which performs better than the CRF-based model.","PeriodicalId":439047,"journal":{"name":"2018 7th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128383887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Leveraging the Power of Cloud Computing for Technology Enhanced Learning (TEL)","authors":"Deepshikha Aggarwal","doi":"10.1109/ICRITO.2018.8748538","DOIUrl":"https://doi.org/10.1109/ICRITO.2018.8748538","url":null,"abstract":"Technology-enhanced learning (TEL) is a system of education that promotes the application of information and communication technologyfor teaching and learning. In today's world where technology is dominating all kinds of businesses and societies, the education sector is not lagging behind in exploring the power of information and communication technology. The recent developments in the higher education sector are not limited to providing the students with the latest knowledge and information but also focus on theenhancement of the student learning experience. The need of the current education system is to make the learning process accessible to maximum number of learners in the most comfortable manner. This paper presents a review of technology enhanced learning (TEL) with focus on two different implementations of TEL. These are Bring your Own Device (BYOD) to classroom and eLearning (the anywhere anytime learning methodology). The TEL enables the learners to have a better and convenient access to learning resources both inside and outside the educational campus. We have examined the use of technology in education sector to enhance the learning experienceof the students and better accessibility of learning content by presenting a learning system based on the power of cloud computing.The importance of cloud computing in the education sector has been understood well by the academic community as this is the technology that provides high capability computing resources at a nominal cost. The main reason for the success of technology enhanced learning is the availability of learning resources to the learners from anywhere, anytime as per their requirement and cloud computing is the computing technology that provides the resources when demanded through the internet. Therefore cloud computing is one of the major requirements to set up a technology enhanced learning system.","PeriodicalId":439047,"journal":{"name":"2018 7th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127865282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}