Pub Date : 2019-03-01DOI: 10.1109/ICATIECE45860.2019.9063850
Sreepriya S, Nikhil George, S. Amit
A microwave component with frequency selective structures enhances many of the antenna parameters gaining popularity among many techniques. A microstrip patch antenna parameter is studied and its performance is compared with defected ground plane. This paper presents a way in which we convert single resonant antenna to a multi-resonant antenna by adding a fractal defect in the ground plane. The number of resonant frequencies depends on the number of iterations of defect structure. Three resonant frequencies of 2.3GHz, 4GHz and 4.2GHz are achieved by considering two iterations in the fractal geometry. The designed antenna yields a peak gain of 3.04695dB. The antenna is validated for impedance matching with a return loss of < −20dB making it very suitable to integrate with other microwave devices. The 10dB return loss bandwidth is 300MHz (3.9GHz to 4.2GHz) and the gain of the antenna is 3.044dBi.
{"title":"A Multi-Resonant Microstrip Patch Antenna with Fractal Defected Ground Structure","authors":"Sreepriya S, Nikhil George, S. Amit","doi":"10.1109/ICATIECE45860.2019.9063850","DOIUrl":"https://doi.org/10.1109/ICATIECE45860.2019.9063850","url":null,"abstract":"A microwave component with frequency selective structures enhances many of the antenna parameters gaining popularity among many techniques. A microstrip patch antenna parameter is studied and its performance is compared with defected ground plane. This paper presents a way in which we convert single resonant antenna to a multi-resonant antenna by adding a fractal defect in the ground plane. The number of resonant frequencies depends on the number of iterations of defect structure. Three resonant frequencies of 2.3GHz, 4GHz and 4.2GHz are achieved by considering two iterations in the fractal geometry. The designed antenna yields a peak gain of 3.04695dB. The antenna is validated for impedance matching with a return loss of < −20dB making it very suitable to integrate with other microwave devices. The 10dB return loss bandwidth is 300MHz (3.9GHz to 4.2GHz) and the gain of the antenna is 3.044dBi.","PeriodicalId":106496,"journal":{"name":"2019 1st International Conference on Advanced Technologies in Intelligent Control, Environment, Computing & Communication Engineering (ICATIECE)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125340774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-01DOI: 10.1109/ICATIECE45860.2019.9063837
Nihal Antony, Rohit Kr, Shreya Patel, S. S, Namratha M
Driver drowsiness is one of the leading causes of accidents among motorists today, therefore it is recognized as a serious problem that needs to be resolved. Although there have been many methods proposed in the past to tackle this issue, computer vision seems to be the most promising tool to detect driver drowsiness. Previous works have focused on particular features of the driver’s face and made used of handcrafted algorithms to detect drowsiness in an individual, this paper, however, aims to make use of a convoluted neural network to determine how features of the face give an indication of driver drowsiness.
{"title":"Driver Drowsiness Detection using Convoluted Neural Networks","authors":"Nihal Antony, Rohit Kr, Shreya Patel, S. S, Namratha M","doi":"10.1109/ICATIECE45860.2019.9063837","DOIUrl":"https://doi.org/10.1109/ICATIECE45860.2019.9063837","url":null,"abstract":"Driver drowsiness is one of the leading causes of accidents among motorists today, therefore it is recognized as a serious problem that needs to be resolved. Although there have been many methods proposed in the past to tackle this issue, computer vision seems to be the most promising tool to detect driver drowsiness. Previous works have focused on particular features of the driver’s face and made used of handcrafted algorithms to detect drowsiness in an individual, this paper, however, aims to make use of a convoluted neural network to determine how features of the face give an indication of driver drowsiness.","PeriodicalId":106496,"journal":{"name":"2019 1st International Conference on Advanced Technologies in Intelligent Control, Environment, Computing & Communication Engineering (ICATIECE)","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128137677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-01DOI: 10.1109/ICATIECE45860.2019.9063795
Mohanaradhya, Sumithra Devi K.A
In cluster based Wireless Sensor Networks, lifetime of the network may be increased by conserving the energy spent by the cluster members and cluster heads. Energy consumption by cluster based WSN depends on the factors like number of data bits transmitted, received, aggregated by the nodes. In two hop cluster based networks member nodes acquires data and pushes to cluster heads (CH). Cluster Heads in WSN consumes more energy as they are affected by all the three factors. This paper proposes three different methods that cleverly selects the cluster heads, avoids unnecessary data transmission and balances the aggregation energy. The first method maintains threshold distance between the cluster heads for even distribution of cluster heads to avoid unnecessary CH. In the second approach, redundant data collected by the cluster member are curbed to save aggregation energy at CH. In the last method member nodes are distributed uniformly to balance the energy consumption.
{"title":"Novel Approaches to Enhance Wireless Sensor Network Life time by Even Distribution of Cluster Heads and Avoiding Redundant Data","authors":"Mohanaradhya, Sumithra Devi K.A","doi":"10.1109/ICATIECE45860.2019.9063795","DOIUrl":"https://doi.org/10.1109/ICATIECE45860.2019.9063795","url":null,"abstract":"In cluster based Wireless Sensor Networks, lifetime of the network may be increased by conserving the energy spent by the cluster members and cluster heads. Energy consumption by cluster based WSN depends on the factors like number of data bits transmitted, received, aggregated by the nodes. In two hop cluster based networks member nodes acquires data and pushes to cluster heads (CH). Cluster Heads in WSN consumes more energy as they are affected by all the three factors. This paper proposes three different methods that cleverly selects the cluster heads, avoids unnecessary data transmission and balances the aggregation energy. The first method maintains threshold distance between the cluster heads for even distribution of cluster heads to avoid unnecessary CH. In the second approach, redundant data collected by the cluster member are curbed to save aggregation energy at CH. In the last method member nodes are distributed uniformly to balance the energy consumption.","PeriodicalId":106496,"journal":{"name":"2019 1st International Conference on Advanced Technologies in Intelligent Control, Environment, Computing & Communication Engineering (ICATIECE)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125610438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-01DOI: 10.1109/ICATIECE45860.2019.9063787
I. Pandey, Jai Deo Tiwari
Worldwide electronic waste is one of the emerging problems which can adversely affect the human and environment. The paper based flexible eco-friendly, disposable electronics battery is the excellent way to come up with the above mentioned challenge. In this work we reported the development and optimization of a cost, disposable, biodegradable, miniaturized and lightweight conductive polymer coated exfoliated graphite paper battery. Here, anode contains aluminium foil and cathode is made using electrochemically deposited anthraquinone conductive polymers on exfoliated graphite paper with a concentrated sodium chloride salt, as electrolyte. The battery shows a electrochemical response on by applying 40–50 μL of water and produces a maximum capacity of 235 mAh g−1 along with a superior cyclability of up to 500 cycles at 200.0 mA cm−2 current density. The proposed 3–4 battery connected in series powers a LED during approximately 60–90 seconds. Still continuous effort is going on for battery performance improvement. Obtained results allow to planning potential uses to low power consumptions microelectronics such as pacemakers, cosmetics, wearable biomedical devices, and electronics.
在世界范围内,电子垃圾是对人类和环境产生不利影响的新问题之一。基于纸张的柔性环保一次性电子电池是应对上述挑战的绝佳途径。在这项工作中,我们报道了一种低成本、一次性、可生物降解、小型化和轻量化的导电聚合物涂层剥离石墨纸电池的开发和优化。在这里,阳极是铝箔,阴极是用电化学沉积的蒽醌导电聚合物在剥离的石墨纸上,用浓氯化钠盐作为电解质制成的。在200.0 mA cm−2电流密度下,电池的最大容量为235 mAh g−1,循环次数可达500次。提议的3-4块电池串联在一起,在大约60-90秒内为LED供电。电池性能的改进仍在不断努力。获得的结果允许规划低功耗微电子的潜在用途,如起搏器,化妆品,可穿戴生物医学设备和电子产品。
{"title":"Nanostructured conductive polymeric modified exfoliated graphite paper based flexible battery for wearable electronics","authors":"I. Pandey, Jai Deo Tiwari","doi":"10.1109/ICATIECE45860.2019.9063787","DOIUrl":"https://doi.org/10.1109/ICATIECE45860.2019.9063787","url":null,"abstract":"Worldwide electronic waste is one of the emerging problems which can adversely affect the human and environment. The paper based flexible eco-friendly, disposable electronics battery is the excellent way to come up with the above mentioned challenge. In this work we reported the development and optimization of a cost, disposable, biodegradable, miniaturized and lightweight conductive polymer coated exfoliated graphite paper battery. Here, anode contains aluminium foil and cathode is made using electrochemically deposited anthraquinone conductive polymers on exfoliated graphite paper with a concentrated sodium chloride salt, as electrolyte. The battery shows a electrochemical response on by applying 40–50 μL of water and produces a maximum capacity of 235 mAh g−1 along with a superior cyclability of up to 500 cycles at 200.0 mA cm−2 current density. The proposed 3–4 battery connected in series powers a LED during approximately 60–90 seconds. Still continuous effort is going on for battery performance improvement. Obtained results allow to planning potential uses to low power consumptions microelectronics such as pacemakers, cosmetics, wearable biomedical devices, and electronics.","PeriodicalId":106496,"journal":{"name":"2019 1st International Conference on Advanced Technologies in Intelligent Control, Environment, Computing & Communication Engineering (ICATIECE)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133361686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-01DOI: 10.1109/ICATIECE45860.2019.9063778
A. Shravya, K. Monika, Vindhya P. Malagi, R. Krishnan
Object detection and tracking is a one of the major research topics in the field of computer vision. It is a major component in applications like video surveillance, people monitoring, traffic monitoring etc. Object tracking algorithms typically estimate the location of the target in each frame in a sequence, given initial location of the target as a bounding box. In spite of extensive research reported on tracking, object tracking under occlusion remains a challenge still. There are many practical challenges in object tracking that have to be addressed. This survey paper aims to compile the various techniques available for object tracking under occlusion. Details about the various performance measures available to evaluate the tracking performance under occlusion is also discussed. This paper also points to a list of publicly available datasets that are used to test the tracking algorithms.
{"title":"A Comprehensive Survey on Multi Object Tracking Under Occlusion in Aerial Image Sequences","authors":"A. Shravya, K. Monika, Vindhya P. Malagi, R. Krishnan","doi":"10.1109/ICATIECE45860.2019.9063778","DOIUrl":"https://doi.org/10.1109/ICATIECE45860.2019.9063778","url":null,"abstract":"Object detection and tracking is a one of the major research topics in the field of computer vision. It is a major component in applications like video surveillance, people monitoring, traffic monitoring etc. Object tracking algorithms typically estimate the location of the target in each frame in a sequence, given initial location of the target as a bounding box. In spite of extensive research reported on tracking, object tracking under occlusion remains a challenge still. There are many practical challenges in object tracking that have to be addressed. This survey paper aims to compile the various techniques available for object tracking under occlusion. Details about the various performance measures available to evaluate the tracking performance under occlusion is also discussed. This paper also points to a list of publicly available datasets that are used to test the tracking algorithms.","PeriodicalId":106496,"journal":{"name":"2019 1st International Conference on Advanced Technologies in Intelligent Control, Environment, Computing & Communication Engineering (ICATIECE)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114844457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-01DOI: 10.1109/ICATIECE45860.2019.9063832
D. Vinutha, G. Raju
Hadoop is a MapReduce open source implementation [1]. In homogeneous environment MapReduce can complete the parallel computing without major obstacles. load imbalance in the cluster is caused by heterogeneous nodes. We propose a dynamic load balancing model for heterogeneous clusters in this paper. In this a monitoring module is used to collect the real time information of each node. Load balancing is achieved by allocating the data dynamically based on computing capability and current load of a node. The results indicate the proposed algorithm reduced the execution time and balancing the load in the nodes of a cluster is achieved.
{"title":"Dynamic Load Balancing Algorithm for Heterogeneous Hadoop Cluster","authors":"D. Vinutha, G. Raju","doi":"10.1109/ICATIECE45860.2019.9063832","DOIUrl":"https://doi.org/10.1109/ICATIECE45860.2019.9063832","url":null,"abstract":"Hadoop is a MapReduce open source implementation [1]. In homogeneous environment MapReduce can complete the parallel computing without major obstacles. load imbalance in the cluster is caused by heterogeneous nodes. We propose a dynamic load balancing model for heterogeneous clusters in this paper. In this a monitoring module is used to collect the real time information of each node. Load balancing is achieved by allocating the data dynamically based on computing capability and current load of a node. The results indicate the proposed algorithm reduced the execution time and balancing the load in the nodes of a cluster is achieved.","PeriodicalId":106496,"journal":{"name":"2019 1st International Conference on Advanced Technologies in Intelligent Control, Environment, Computing & Communication Engineering (ICATIECE)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124521389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-01DOI: 10.1109/ICATIECE45860.2019.9063802
Dipti Ashok Belurgikar, J. Kanak Kshirsagar, K. Dhananjaya, N. Vineeth
Students and other individuals who want to create, share and send certificates that contain private or sensitive information, like academic transcripts or digital badges, can do so with an added layer of security. In this paper, we have proposed a system which is focused on verification of personal portfolio using the trending blockchain technology. This is a decentralized system which can be expanded to any professional domain where your personal identity attributes and certificates are mandatory. We aim to create a nation-wide coherent, simple, and universal atmosphere to provide a standardized platform for identity management in a permanent, transparent and secure way.
{"title":"Identity Solutions for Verification using Blockchain Technology","authors":"Dipti Ashok Belurgikar, J. Kanak Kshirsagar, K. Dhananjaya, N. Vineeth","doi":"10.1109/ICATIECE45860.2019.9063802","DOIUrl":"https://doi.org/10.1109/ICATIECE45860.2019.9063802","url":null,"abstract":"Students and other individuals who want to create, share and send certificates that contain private or sensitive information, like academic transcripts or digital badges, can do so with an added layer of security. In this paper, we have proposed a system which is focused on verification of personal portfolio using the trending blockchain technology. This is a decentralized system which can be expanded to any professional domain where your personal identity attributes and certificates are mandatory. We aim to create a nation-wide coherent, simple, and universal atmosphere to provide a standardized platform for identity management in a permanent, transparent and secure way.","PeriodicalId":106496,"journal":{"name":"2019 1st International Conference on Advanced Technologies in Intelligent Control, Environment, Computing & Communication Engineering (ICATIECE)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122919670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-01DOI: 10.1109/ICATIECE45860.2019.9063620
Ravi Kumar R, Radha Gupta, Karthiyayini O, Ravinder Singh Kuntal, Vatsala G A
In this article a comparative study on the effectiveness of Real-coded Genetic Algorithm (RGA) approach in finding the compromised near-to-optimal solution and to by-pass the allocation rule of (m+n−1) for a Fuzzified Multi-Objective Transportation Problem (FMOTP) is discussed. For this purpose, some benchmark problems with well-defined membership function were considered and several changes have been made in the execution of Genetic Algorithm with real codes. The performance of the RGA Approach in obtaining the compromised near-to-optimal solution is compared with the traditional methods, namely as Interactive approach and Fuzzy programming approach. The obtained results reveal that, the applied RGA technique is more advantageous and effective after incorporating some changes according to the problem statement. This approach gives more than one compromised near-to-optimal solutions as well as bypasses the allocation rule of (m +n − 1), which is a great advantage in solving FMOTP. Two numerical examples have been considered and discussed to demonstrate this advent.
{"title":"Fuzzified Multi-Objective Transportation Problem: A Real coded Genetic Algorithm approach to the Compromised near-to-Optimal solution","authors":"Ravi Kumar R, Radha Gupta, Karthiyayini O, Ravinder Singh Kuntal, Vatsala G A","doi":"10.1109/ICATIECE45860.2019.9063620","DOIUrl":"https://doi.org/10.1109/ICATIECE45860.2019.9063620","url":null,"abstract":"In this article a comparative study on the effectiveness of Real-coded Genetic Algorithm (RGA) approach in finding the compromised near-to-optimal solution and to by-pass the allocation rule of (m+n−1) for a Fuzzified Multi-Objective Transportation Problem (FMOTP) is discussed. For this purpose, some benchmark problems with well-defined membership function were considered and several changes have been made in the execution of Genetic Algorithm with real codes. The performance of the RGA Approach in obtaining the compromised near-to-optimal solution is compared with the traditional methods, namely as Interactive approach and Fuzzy programming approach. The obtained results reveal that, the applied RGA technique is more advantageous and effective after incorporating some changes according to the problem statement. This approach gives more than one compromised near-to-optimal solutions as well as bypasses the allocation rule of (m +n − 1), which is a great advantage in solving FMOTP. Two numerical examples have been considered and discussed to demonstrate this advent.","PeriodicalId":106496,"journal":{"name":"2019 1st International Conference on Advanced Technologies in Intelligent Control, Environment, Computing & Communication Engineering (ICATIECE)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124245072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-01DOI: 10.1109/ICATIECE45860.2019.9063825
Poornima Anand Bommannavar, R. Krishnan, S. Shahedha
Cloud Computing is growing exponentially across organizations in various domains and it has a vast impact on the way software gets developed and tested. The web based applications these days have configuration settings different from deployment requirements. The main focus of Cloud Computing is to deliver reliable, secured, fault-tolerant and elastic infrastructures for hosting an E-Commerce application. Scheduling policies and allocation policies for resources which affect the performance and utilization of cloud infrastructure (i.e. hardware, software services) for various E-Commerce application under varying load and system size is highly challenging problem to deal with. Performance analysis and optimal resource management policies allows cloud service providers to improve their Quality of Service (QOS). This work focuses on the process of selecting the best resource estimation policy for a given workload from various policies such as, Maximum Log-Likelihood, Maximum Product of Spacing Estimator, and Probability Weighted Movements. Detailed experimentation has been carried out for using the Amazon Web Service(AWS) public cloud, mimicking it on the cloudsim simulator. The modeling of workload is quiet challenging due to the unavailability of trace logs for analysis. Hence, in this paper, workload is generated based on application model for E-commerce application considering varying user behavior relating to different user profiles. The amount of resources consumed is closely monitored and a resource usage model has been developed and validated to choose the best estimation policy.
云计算在各个领域的组织中呈指数级增长,它对软件开发和测试的方式产生了巨大的影响。如今,基于web的应用程序的配置设置与部署需求不同。云计算的主要焦点是为托管电子商务应用程序提供可靠、安全、容错和弹性的基础设施。各种电子商务应用程序在不同负载和系统规模下影响云基础设施(即硬件、软件服务)的性能和利用率的资源调度策略和分配策略是一个极具挑战性的问题。性能分析和最优资源管理策略允许云服务提供商提高其服务质量(QOS)。这项工作侧重于从各种策略(如最大对数似然、间隔估计器的最大乘积和概率加权运动)中为给定工作负载选择最佳资源估计策略的过程。使用Amazon Web Service(AWS)公共云进行了详细的实验,并在cloudsim模拟器上进行了模拟。由于无法获得用于分析的跟踪日志,工作负载的建模非常具有挑战性。因此,本文根据电子商务应用程序的应用程序模型生成工作负载,考虑与不同用户配置文件相关的不同用户行为。所消耗的资源量被密切监视,资源使用模型被开发和验证,以选择最佳的估计策略。
{"title":"Optimal Resource Estimation Policy Selection for Ecommerce Applications in Cloud","authors":"Poornima Anand Bommannavar, R. Krishnan, S. Shahedha","doi":"10.1109/ICATIECE45860.2019.9063825","DOIUrl":"https://doi.org/10.1109/ICATIECE45860.2019.9063825","url":null,"abstract":"Cloud Computing is growing exponentially across organizations in various domains and it has a vast impact on the way software gets developed and tested. The web based applications these days have configuration settings different from deployment requirements. The main focus of Cloud Computing is to deliver reliable, secured, fault-tolerant and elastic infrastructures for hosting an E-Commerce application. Scheduling policies and allocation policies for resources which affect the performance and utilization of cloud infrastructure (i.e. hardware, software services) for various E-Commerce application under varying load and system size is highly challenging problem to deal with. Performance analysis and optimal resource management policies allows cloud service providers to improve their Quality of Service (QOS). This work focuses on the process of selecting the best resource estimation policy for a given workload from various policies such as, Maximum Log-Likelihood, Maximum Product of Spacing Estimator, and Probability Weighted Movements. Detailed experimentation has been carried out for using the Amazon Web Service(AWS) public cloud, mimicking it on the cloudsim simulator. The modeling of workload is quiet challenging due to the unavailability of trace logs for analysis. Hence, in this paper, workload is generated based on application model for E-commerce application considering varying user behavior relating to different user profiles. The amount of resources consumed is closely monitored and a resource usage model has been developed and validated to choose the best estimation policy.","PeriodicalId":106496,"journal":{"name":"2019 1st International Conference on Advanced Technologies in Intelligent Control, Environment, Computing & Communication Engineering (ICATIECE)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126766202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-01DOI: 10.1109/ICATIECE45860.2019.9063856
Perumalla Giridhar, Dr Priyanka Choudhury
The AHB (Advanced High-performance Bus) is a high-performance bus in AMBA (Advanced Microcontroller Bus Architecture) family. It is a standard for intercommunication of modules in a system. AHB standards are defined by ARM and supports the communication of on-chip memories processors and interfaces of off-chip external memory. In this paper we present, design and perform verification of AHB which support one master and four slaves. In this work, the design of the AHB Protocol is developed comprising of the basic blocks such as Master, Slave, decoder and multiplexers. This AMBA-AHB protocol can be used in any application provided the design should be an AHB compliant. The building blocks of the design master, slaves, decoder and multiplexers are developed in Verilog. The verification environment is developed in system Verilog (SV). QuestaSim (Advanced verification tool from Mentor Graphics) is used to simulate and verify the design and calculate code and functional coverages.
{"title":"Design and Verification of AMBA AHB","authors":"Perumalla Giridhar, Dr Priyanka Choudhury","doi":"10.1109/ICATIECE45860.2019.9063856","DOIUrl":"https://doi.org/10.1109/ICATIECE45860.2019.9063856","url":null,"abstract":"The AHB (Advanced High-performance Bus) is a high-performance bus in AMBA (Advanced Microcontroller Bus Architecture) family. It is a standard for intercommunication of modules in a system. AHB standards are defined by ARM and supports the communication of on-chip memories processors and interfaces of off-chip external memory. In this paper we present, design and perform verification of AHB which support one master and four slaves. In this work, the design of the AHB Protocol is developed comprising of the basic blocks such as Master, Slave, decoder and multiplexers. This AMBA-AHB protocol can be used in any application provided the design should be an AHB compliant. The building blocks of the design master, slaves, decoder and multiplexers are developed in Verilog. The verification environment is developed in system Verilog (SV). QuestaSim (Advanced verification tool from Mentor Graphics) is used to simulate and verify the design and calculate code and functional coverages.","PeriodicalId":106496,"journal":{"name":"2019 1st International Conference on Advanced Technologies in Intelligent Control, Environment, Computing & Communication Engineering (ICATIECE)","volume":"11 7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129066080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}