首页 > 最新文献

International Journal of Scientific Methods in Engineering and Management最新文献

英文 中文
Implementation of small cell antenna based massive MIMO system for high spectrum and energy efficiencies 基于小蜂窝天线的大规模MIMO系统的高频谱和高能效实现
Pub Date : 1900-01-01 DOI: 10.58599/ijsmem.2023.1102
C.Sateesh kumar Reddy, Poornaiah Billa
In order to achieve high data rates (DR) in the fifth generation (5G), Massive Multiple Input Multiple Output (m-MIMO) systems must be altered to boost spectral efficiency. These systems must be used in conjunction with Small Cell Antennas (SCA). When compared to a number of User Terminals (UTs) provided in the same time-frequency resource without significant inter-user interference, m-MIMO enables a significant increase in spectrum efficiency. This is accomplished by deploying a large number of antenna elements at the base station, anywhere from tens to hundreds. The evolution of SC technology has resulted in decreased latency, decreased energy consumption, and increased data rates, all of which are necessary conditions for the deployment of 5G. In this study, we construct an m-MIMO system with SCAs that takes into account partial channel state information. We do this by reaching DR in the lower limit by repeating pilot sequences in time division duplex. In this way, we are able to achieve our goal (TDD). Either implementing massive MIMO at the base stations (BSs) or overlaying SCAs on top of the infrastructure already in place may help improve the energy efficiency of cellular networks. We present some intriguing results that demonstrate that combining Massive MIMO with small cells may be able to drastically cut total power usage. Beam-forming techniques with a low level of complexity, such as the proposed multi-flow RZF beam-forming, also have the potential to
为了在第五代(5G)中实现高数据速率(DR),必须改变大规模多输入多输出(m-MIMO)系统以提高频谱效率。这些系统必须与小蜂窝天线(SCA)结合使用。与在同一时间-频率资源中提供多个用户终端(ut)相比,在没有显著用户间干扰的情况下,m-MIMO能够显著提高频谱效率。这是通过在基站部署大量的天线元件来实现的,从几十到几百个不等。SC技术的发展带来了延迟的减少、能耗的降低、数据速率的提高,这些都是部署5G的必要条件。在这项研究中,我们构建了一个具有sca的m-MIMO系统,该系统考虑了部分信道状态信息。我们通过在时分双工中重复导频序列以达到DR的下限来做到这一点。通过这种方式,我们能够实现我们的目标(TDD)。无论是在基站(BSs)上实施大规模MIMO,还是在已有的基础设施上覆盖sca,都有助于提高蜂窝网络的能源效率。我们提出了一些有趣的结果,表明将大规模MIMO与小蜂窝相结合可能能够大幅降低总功耗。复杂性较低的波束形成技术,如所提出的多流RZF波束形成技术,也有可能实现这一目标
{"title":"Implementation of small cell antenna based massive MIMO system for high spectrum and energy efficiencies","authors":"C.Sateesh kumar Reddy, Poornaiah Billa","doi":"10.58599/ijsmem.2023.1102","DOIUrl":"https://doi.org/10.58599/ijsmem.2023.1102","url":null,"abstract":"In order to achieve high data rates (DR) in the fifth generation (5G), Massive Multiple Input Multiple Output (m-MIMO) systems must be altered to boost spectral efficiency. These systems must be used in conjunction with Small Cell Antennas (SCA). When compared to a number of User Terminals (UTs) provided in the same time-frequency resource without significant inter-user interference, m-MIMO enables a significant increase in spectrum efficiency. This is accomplished by deploying a large number of antenna elements at the base station, anywhere from tens to hundreds. The evolution of SC technology has resulted in decreased latency, decreased energy consumption, and increased data rates, all of which are necessary conditions for the deployment of 5G. In this study, we construct an m-MIMO system with SCAs that takes into account partial channel state information. We do this by reaching DR in the lower limit by repeating pilot sequences in time division duplex. In this way, we are able to achieve our goal (TDD). Either implementing massive MIMO at the base stations (BSs) or overlaying SCAs on top of the infrastructure already in place may help improve the energy efficiency of cellular networks. We present some intriguing results that demonstrate that combining Massive MIMO with small cells may be able to drastically cut total power usage. Beam-forming techniques with a low level of complexity, such as the proposed multi-flow RZF beam-forming, also have the potential to","PeriodicalId":103282,"journal":{"name":"International Journal of Scientific Methods in Engineering and Management","volume":"96 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113999616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Base Station Power Shutdown using New SNARK Algorithm 基于新SNARK算法的基站断电
Pub Date : 1900-01-01 DOI: 10.58599/ijsmem.2023.1403
K. Venkatesan, V.Ramakrishna, Rayudu Srinivas
The mobile communications sector is consuming an alarming amount of energy and having a significant impact on the environment at an increasingly rapid rate as mobile data continues to advance. Because of this, research into technologies that are more efficient with energy is essential for minimizing the impact of adverse effects. This strategy will benefit from turning off the station during the off-peak hours when there is less demand for it. This article presents an algorithm for selecting a base station based on the status of the switches, which can be either ”on” or ”off.” This research makes use of the penalty function to define the risks in order to get beyond the numerous constraints that were part of the original optimizations. The outcomes of our simulations of multiple randomly created cellular networks indicate that our methodology may generate results that are satisfactory.
随着移动数据的不断发展,移动通信部门正在以越来越快的速度消耗惊人的能源,并对环境产生重大影响。正因为如此,研究更有效利用能源的技术对于最大限度地减少不利影响至关重要。这一策略将受益于在需求较少的非高峰时段关闭车站。本文提出了一种基于开关状态选择基站的算法,开关状态可以是“开”或“关”。本研究使用惩罚函数来定义风险,以便超越原始优化中的众多约束。我们对多个随机创建的蜂窝网络的模拟结果表明,我们的方法可能会产生令人满意的结果。
{"title":"Base Station Power Shutdown using New SNARK Algorithm","authors":"K. Venkatesan, V.Ramakrishna, Rayudu Srinivas","doi":"10.58599/ijsmem.2023.1403","DOIUrl":"https://doi.org/10.58599/ijsmem.2023.1403","url":null,"abstract":"The mobile communications sector is consuming an alarming amount of energy and having a significant impact on the environment at an increasingly rapid rate as mobile data continues to advance. Because of this, research into technologies that are more efficient with energy is essential for minimizing the impact of adverse effects. This strategy will benefit from turning off the station during the off-peak hours when there is less demand for it. This article presents an algorithm for selecting a base station based on the status of the switches, which can be either ”on” or ”off.” This research makes use of the penalty function to define the risks in order to get beyond the numerous constraints that were part of the original optimizations. The outcomes of our simulations of multiple randomly created cellular networks indicate that our methodology may generate results that are satisfactory.","PeriodicalId":103282,"journal":{"name":"International Journal of Scientific Methods in Engineering and Management","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134202171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Combining Lightweight Encryption Methods to Secure IoT Networks 结合轻量级加密方法保护物联网网络
Pub Date : 1900-01-01 DOI: 10.58599/ijsmem.2023.1704
G. Rao, K. Venkatesan, Allanki Sanyasi Rao
The rapid development of the underlying infrastructure of the internet has permitted the widespread acceptance of a number of emerging technologies that have far-reaching ramifications for current society. As a result of the expansion of the Internet of Things, several new networking protocols and upgrades have been created and implemented. On top of that, there is a significant shortage of financing for the development of information technology applications, as well as critical security problems that jeopardise private data. As if that weren’t enough, there are also substantial weaknesses in the data’s privacy protection. In spite of the enormous research that has been done, there has not been a single security solution for the IoT network that has been proved to be entirely effective. This is due to the fact that the network of things connected to the Internet of Things has a unique mix of low energy usage, rare materials, sufficient computational power, and considerable operational expenses. As a consequence of this, we consider the modification of the protocol to be a viable and comprehensive strategy for defending Internet of Things devices from cyberattacks. The inclusion of IoT layer-specific security solutions into enhanced code is one of the many ways in which algorithmic enhancements contribute to the accomplishment of this objective. In this study, we propose improving and integrating the DTLS Procedure with the earwigging mechanism, also then testing the protocol on representative models o
互联网底层基础设施的快速发展使得许多新兴技术得到广泛接受,这些技术对当今社会产生了深远的影响。由于物联网的扩展,一些新的网络协议和升级已经被创建和实施。最重要的是,信息技术应用开发的资金严重短缺,以及危及私人数据的关键安全问题。似乎这还不够,在数据隐私保护方面也存在重大缺陷。尽管已经进行了大量的研究,但还没有一种物联网网络的安全解决方案被证明是完全有效的。这是因为连接到物联网的物联网具有低能耗、稀有材料、足够的计算能力和可观的运营费用的独特组合。因此,我们认为修改协议是保护物联网设备免受网络攻击的可行且全面的策略。将特定于物联网层的安全解决方案包含到增强代码中,是算法增强有助于实现这一目标的众多方式之一。在本研究中,我们提出了改进DTLS过程并将其与窃听机制集成,然后在具有代表性的模型上对该协议进行了测试
{"title":"Combining Lightweight Encryption Methods to Secure IoT Networks","authors":"G. Rao, K. Venkatesan, Allanki Sanyasi Rao","doi":"10.58599/ijsmem.2023.1704","DOIUrl":"https://doi.org/10.58599/ijsmem.2023.1704","url":null,"abstract":"The rapid development of the underlying infrastructure of the internet has permitted the widespread acceptance of a number of emerging technologies that have far-reaching ramifications for current society. As a result of the expansion of the Internet of Things, several new networking protocols and upgrades have been created and implemented. On top of that, there is a significant shortage of financing for the development of information technology applications, as well as critical security problems that jeopardise private data. As if that weren’t enough, there are also substantial weaknesses in the data’s privacy protection. In spite of the enormous research that has been done, there has not been a single security solution for the IoT network that has been proved to be entirely effective. This is due to the fact that the network of things connected to the Internet of Things has a unique mix of low energy usage, rare materials, sufficient computational power, and considerable operational expenses. As a consequence of this, we consider the modification of the protocol to be a viable and comprehensive strategy for defending Internet of Things devices from cyberattacks. The inclusion of IoT layer-specific security solutions into enhanced code is one of the many ways in which algorithmic enhancements contribute to the accomplishment of this objective. In this study, we propose improving and integrating the DTLS Procedure with the earwigging mechanism, also then testing the protocol on representative models o","PeriodicalId":103282,"journal":{"name":"International Journal of Scientific Methods in Engineering and Management","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115334353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Information Preservation and Restore Strategies for the Cloud Era 云时代的信息保存和恢复策略
Pub Date : 1900-01-01 DOI: 10.58599/ijsmem.2023.1305
J. Lakshmi, Mallikarjun P Y
Computing in the cloud is the method that is most frequently employed by companies for the purpose of storing huge volumes of data. In the data-driven society that we live in today, a significant amount of data is produced each day. You are going to need data backup and recovery services in the event that you suffer an unplanned loss of these files. Here, we examine a variety of data-protection methods in order to compare and contrast their respective merits and downsides and to better understand the innovative aspects of each technique.
云计算是公司存储大量数据最常用的方法。在我们今天生活的数据驱动的社会中,每天都会产生大量的数据。如果这些文件意外丢失,您将需要数据备份和恢复服务。在这里,我们将研究各种数据保护方法,以便比较和对比它们各自的优点和缺点,并更好地理解每种技术的创新方面。
{"title":"Information Preservation and Restore Strategies for the Cloud Era","authors":"J. Lakshmi, Mallikarjun P Y","doi":"10.58599/ijsmem.2023.1305","DOIUrl":"https://doi.org/10.58599/ijsmem.2023.1305","url":null,"abstract":"Computing in the cloud is the method that is most frequently employed by companies for the purpose of storing huge volumes of data. In the data-driven society that we live in today, a significant amount of data is produced each day. You are going to need data backup and recovery services in the event that you suffer an unplanned loss of these files. Here, we examine a variety of data-protection methods in order to compare and contrast their respective merits and downsides and to better understand the innovative aspects of each technique.","PeriodicalId":103282,"journal":{"name":"International Journal of Scientific Methods in Engineering and Management","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114204792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and implementation of 10T-SRAM cell using Carbon Nano Tube Field Effect Transistor 碳纳米管场效应晶体管10T-SRAM电池的设计与实现
Pub Date : 1900-01-01 DOI: 10.58599/ijsmem.2023.1105
Nagarjuna Reddy Gujjula, Rameshbabu Kellampalli
SRAM is a key component in many VLSI circuits for efficient storage data. Various researches have been performed on implementation of SRAM using Conventional CMOS, FinFET and GNRFET technologies. But, these methodologies generating the more number of faults with high power and delay consumption, tosolve this problem proposed10T SRAM cell is implemented with the CNTFET respectively. Present research involving CNTFET SRAM deals with leakage analysis and dealt with the dual hilarity characteristics. Fault introduction and analysis of faults were limited with CMOS SRAM. The detection algorithms and circuits possess limitations in terms of detecting the current at nanoscales and restricted with CMOS SRAM. These limitations made us to pursue the research in these areas to bring novel ideas. The performance metrics evaluated and experimental analysis is made and it helps us to choose between various SRAMS. The simulation results shows that the proposed 10T SRAM consumes less delay and power compared to the 7T SRAM cell.
SRAM是许多VLSI电路中有效存储数据的关键部件。使用传统CMOS、FinFET和gnfet技术实现SRAM的各种研究已经完成。但是,这些方法产生的故障数量多,功耗高,延迟消耗大,为了解决这一问题,提出了用CNTFET分别实现10t SRAM单元。目前有关CNTFET SRAM的研究主要涉及泄漏分析和对偶性特性。CMOS SRAM的故障引入和故障分析受到限制。检测算法和电路在检测纳米级电流方面存在局限性,并且受到CMOS SRAM的限制。这些限制促使我们在这些领域进行研究,带来新颖的想法。并对性能指标进行了评价和实验分析,帮助我们在各种sram之间进行选择。仿真结果表明,与7T SRAM单元相比,10T SRAM单元消耗的延迟和功耗更低。
{"title":"Design and implementation of 10T-SRAM cell using Carbon Nano Tube Field Effect Transistor","authors":"Nagarjuna Reddy Gujjula, Rameshbabu Kellampalli","doi":"10.58599/ijsmem.2023.1105","DOIUrl":"https://doi.org/10.58599/ijsmem.2023.1105","url":null,"abstract":"SRAM is a key component in many VLSI circuits for efficient storage data. Various researches have been performed on implementation of SRAM using Conventional CMOS, FinFET and GNRFET technologies. But, these methodologies generating the more number of faults with high power and delay consumption, tosolve this problem proposed10T SRAM cell is implemented with the CNTFET respectively. Present research involving CNTFET SRAM deals with leakage analysis and dealt with the dual hilarity characteristics. Fault introduction and analysis of faults were limited with CMOS SRAM. The detection algorithms and circuits possess limitations in terms of detecting the current at nanoscales and restricted with CMOS SRAM. These limitations made us to pursue the research in these areas to bring novel ideas. The performance metrics evaluated and experimental analysis is made and it helps us to choose between various SRAMS. The simulation results shows that the proposed 10T SRAM consumes less delay and power compared to the 7T SRAM cell.","PeriodicalId":103282,"journal":{"name":"International Journal of Scientific Methods in Engineering and Management","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124034102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Opencv in Smart Parking Space Allocation and Management Opencv在智能车位分配与管理中的应用
Pub Date : 1900-01-01 DOI: 10.58599/ijsmem.2023.1501
K. Venkatesan
In today’s world, the quantity of cars on the road remains steadily rising at a quickening pace. Due to the growing sum of automobiles on the road also the imperfect number of parking spaces, it can be a pain and a waste of time to look for a parking spot. This is because there are fewer parking spots than there are cars. The upshot of this is traffic congestion on the roads. According to studies that were carried out in this region, motorists typically spend 15 minutes driving about in search of a parking spot and cover a distance of 0.5 miles while travelling at a speed of 10 mph. The use of intelligent parking solutions has the potential to significantly cut down on the severity of these difficulties. Because it requires a large number of sensors to be installed at each parking lot, the traditional method is not only expensive but also time-consuming and labour-intensive. The results of this study present a smart parking classification that is based on image dispensation and may be utilised in a number of scenarios, including open parking lots, parking garages with many levels, and other similar places. In order to ascertain whether or not a parking spot in the gathered video is occupied, the proposed design for the system utilises a combination of edge detection and coordinate bound pixel sections. In addition to that, it functions as an illustration of the process of transforming text into images. Tesseract is utilised whenever an image is analysed in order to extract the text contained within it. It is possible to modify the strength of the image processing so that each photograph experiences precisely the amount of processing that is necessary to provide the highest quality text results.
在当今世界,道路上的汽车数量仍在以更快的速度稳步增长。由于道路上的汽车数量不断增加,停车位的数量也不完善,寻找停车位可能是一种痛苦和浪费时间。这是因为停车位比汽车少。这样做的结果是道路上的交通堵塞。根据在该地区进行的研究,开车的人通常要花15分钟寻找一个停车位,以每小时10英里的速度行驶0.5英里。智能停车解决方案的使用有可能显著降低这些困难的严重性。由于需要在每个停车场安装大量的传感器,传统的方法不仅成本高,而且耗时费力。本研究的结果提出了一种基于图像分配的智能停车分类,可用于多种场景,包括开放式停车场、多层停车场和其他类似场所。为了确定采集到的视频中是否有停车位被占用,提出的系统设计采用边缘检测和坐标绑定像素截面相结合的方法。除此之外,它还可以作为将文本转换为图像的过程的说明。每当分析图像以提取其中包含的文本时,就会使用Tesseract。可以修改图像处理的强度,以便每张照片都能精确地进行必要的处理,以提供最高质量的文本结果。
{"title":"Opencv in Smart Parking Space Allocation and Management","authors":"K. Venkatesan","doi":"10.58599/ijsmem.2023.1501","DOIUrl":"https://doi.org/10.58599/ijsmem.2023.1501","url":null,"abstract":"In today’s world, the quantity of cars on the road remains steadily rising at a quickening pace. Due to the growing sum of automobiles on the road also the imperfect number of parking spaces, it can be a pain and a waste of time to look for a parking spot. This is because there are fewer parking spots than there are cars. The upshot of this is traffic congestion on the roads. According to studies that were carried out in this region, motorists typically spend 15 minutes driving about in search of a parking spot and cover a distance of 0.5 miles while travelling at a speed of 10 mph. The use of intelligent parking solutions has the potential to significantly cut down on the severity of these difficulties. Because it requires a large number of sensors to be installed at each parking lot, the traditional method is not only expensive but also time-consuming and labour-intensive. The results of this study present a smart parking classification that is based on image dispensation and may be utilised in a number of scenarios, including open parking lots, parking garages with many levels, and other similar places. In order to ascertain whether or not a parking spot in the gathered video is occupied, the proposed design for the system utilises a combination of edge detection and coordinate bound pixel sections. In addition to that, it functions as an illustration of the process of transforming text into images. Tesseract is utilised whenever an image is analysed in order to extract the text contained within it. It is possible to modify the strength of the image processing so that each photograph experiences precisely the amount of processing that is necessary to provide the highest quality text results.","PeriodicalId":103282,"journal":{"name":"International Journal of Scientific Methods in Engineering and Management","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124219697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementing the Lightweight mCrypton Algorithm in Hardware using FPGA 用FPGA在硬件上实现轻量级mCrypton算法
Pub Date : 1900-01-01 DOI: 10.58599/ijsmem.2023.1705
K. Venkatesan, Mohan Babu Bukya, Gasiganti Vidyasagar
The use of lightweight cryptography might be beneficial for low-power devices such as RFID tags, nodes in the Internet of Things, and nodes in wireless sensor network nodes. When developing a lightweight strategy, it is essential to take into consideration a cryptographic algorithm’s data storage requirements, processing speed, throughput, and energy consumption. Taking everything into consideration, the findings of this research provide a contemporary foundation for the effective lightweight cryptographic technology known as mCrypton. The restoration not only reduces the overall size of the common rooms but also boosts the efficiency of those spaces. FPGA boards manufactured by Xilinx, namely the Spartan 3, were used in the construction of the recommended design by ISE. The results of the simulation show that the proposed architecture is capable of functioning at a frequency of 302 MHz, accomplishing a amount of 646 Mbps, also accomplishing an efficacy of 1.7 Mbps/slice while using a entire of 0.089 W of power. Because of this, the proposed layout achieves superior results than those of its contemporaries in terms of the amount of space used, the energy consumption, the performance, and the throughput.
轻量级加密的使用可能有利于低功耗设备,如RFID标签、物联网中的节点和无线传感器网络节点中的节点。在开发轻量级策略时,必须考虑加密算法的数据存储需求、处理速度、吞吐量和能耗。考虑到所有因素,这项研究的结果为称为mCrypton的有效轻量级加密技术提供了当代基础。修复不仅减少了公共休息室的整体尺寸,而且提高了这些空间的效率。由赛灵思制造的FPGA板,即Spartan 3,被用于ISE推荐设计的构建中。仿真结果表明,所提出的架构能够在302 MHz的频率下工作,实现646 Mbps的速率,并且在使用0.089 W的功耗下实现1.7 Mbps/片的效率。因此,所提出的布局在使用的空间量、能耗、性能和吞吐量方面都比同时代的布局取得了更好的结果。
{"title":"Implementing the Lightweight mCrypton Algorithm in Hardware using FPGA","authors":"K. Venkatesan, Mohan Babu Bukya, Gasiganti Vidyasagar","doi":"10.58599/ijsmem.2023.1705","DOIUrl":"https://doi.org/10.58599/ijsmem.2023.1705","url":null,"abstract":"The use of lightweight cryptography might be beneficial for low-power devices such as RFID tags, nodes in the Internet of Things, and nodes in wireless sensor network nodes. When developing a lightweight strategy, it is essential to take into consideration a cryptographic algorithm’s data storage requirements, processing speed, throughput, and energy consumption. Taking everything into consideration, the findings of this research provide a contemporary foundation for the effective lightweight cryptographic technology known as mCrypton. The restoration not only reduces the overall size of the common rooms but also boosts the efficiency of those spaces. FPGA boards manufactured by Xilinx, namely the Spartan 3, were used in the construction of the recommended design by ISE. The results of the simulation show that the proposed architecture is capable of functioning at a frequency of 302 MHz, accomplishing a amount of 646 Mbps, also accomplishing an efficacy of 1.7 Mbps/slice while using a entire of 0.089 W of power. Because of this, the proposed layout achieves superior results than those of its contemporaries in terms of the amount of space used, the energy consumption, the performance, and the throughput.","PeriodicalId":103282,"journal":{"name":"International Journal of Scientific Methods in Engineering and Management","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122484332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Safety Attachment for Carriers of Walking Disabled Persons 行走残障人士运载工具安全附件
Pub Date : 1900-01-01 DOI: 10.58599/ijsmem.2023.1203
S.Yuvaraj, B.Babu, Rameshwari Yadav
Throughout the manufacturing process of a car, the safety of pedestrians is frequently put in a secondary position to that of the occupants of the vehicle, despite the fact that both are extremely important. The findings of this study will perhaps shed some light on the problem of pedestrian safety when they are on the road. The accomplishment of the objective is made possible by conducting research on the safety system that, in the event of the worst-case scenario, applies warning signals and brakes automatically in order to avoid collisions involving vehicles and pedestrians. In this situation, an image-processing-based safety technology is utilised to detect pedestrians and immediately apply the brakes. At first, the camera that has been mounted in the vehicle makes use of an image processing algorithm in order to monitor the obstacles that are in its route. The automobile will automatically apply the brakes if it determines that a human is approaching at a distance that could be considered hazardous. In the event of an unexpected emergency, such as when pedestrians unexpectedly cross the path of the automobile, the controller will deploy the airbag by employing a servo motor to pull it out from behind the engine cover. Using this strategy, we may ensure the safety of pedestrians by lowering the number of accidents that occur, all without changing the kinds of cars that are driven or driven by. A functional prototype of the suggested improvements is currently available for evaluation.
在汽车的整个制造过程中,行人的安全往往被置于车辆乘员的安全之后,尽管事实上两者都非常重要。这项研究的结果可能会对行人在路上的安全问题有所启发。通过对安全系统的研究,可以实现这一目标,在最坏的情况下,自动发出警告信号和刹车,以避免车辆和行人发生碰撞。在这种情况下,基于图像处理的安全技术被用来检测行人并立即刹车。首先,安装在车辆上的摄像头利用图像处理算法来监控其路线上的障碍物。如果汽车确定有人在可能被认为是危险的距离上接近,它将自动刹车。在意外的紧急情况下,例如当行人意外地穿过汽车的路径时,控制器将通过伺服电机将安全气囊从发动机盖后面拉出来,从而展开安全气囊。使用这种策略,我们可以通过减少发生的事故数量来确保行人的安全,而无需改变驾驶或驾驶的车辆种类。建议改进的功能原型目前可供评估。
{"title":"Safety Attachment for Carriers of Walking Disabled Persons","authors":"S.Yuvaraj, B.Babu, Rameshwari Yadav","doi":"10.58599/ijsmem.2023.1203","DOIUrl":"https://doi.org/10.58599/ijsmem.2023.1203","url":null,"abstract":"Throughout the manufacturing process of a car, the safety of pedestrians is frequently put in a secondary position to that of the occupants of the vehicle, despite the fact that both are extremely important. The findings of this study will perhaps shed some light on the problem of pedestrian safety when they are on the road. The accomplishment of the objective is made possible by conducting research on the safety system that, in the event of the worst-case scenario, applies warning signals and brakes automatically in order to avoid collisions involving vehicles and pedestrians. In this situation, an image-processing-based safety technology is utilised to detect pedestrians and immediately apply the brakes. At first, the camera that has been mounted in the vehicle makes use of an image processing algorithm in order to monitor the obstacles that are in its route. The automobile will automatically apply the brakes if it determines that a human is approaching at a distance that could be considered hazardous. In the event of an unexpected emergency, such as when pedestrians unexpectedly cross the path of the automobile, the controller will deploy the airbag by employing a servo motor to pull it out from behind the engine cover. Using this strategy, we may ensure the safety of pedestrians by lowering the number of accidents that occur, all without changing the kinds of cars that are driven or driven by. A functional prototype of the suggested improvements is currently available for evaluation.","PeriodicalId":103282,"journal":{"name":"International Journal of Scientific Methods in Engineering and Management","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129890242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Scientific Methods in Engineering and Management
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1