首页 > 最新文献

International Conference on Information Communication and Embedded Systems (ICICES2014)最新文献

英文 中文
Multi radio clustering protocol for mobile networks 移动网络的多无线电集群协议
M. Hemakumar, G. Nagalalli
Communication and data networking field are being changed by the use of wireless networks, which enables user to communicate and access application and information without wires anywhere and anytime. This emerging and innovative technology while used in the computer networks which are supporting more flexibility and mobility. But one of the most considerable factors is power consumption. Because majority of nodes while using single radio platform (WLAN) in Wi-Fi area, power consumption becomes larger. So we propose a novel distributed clustering approach for energy saving using (LPR) and (HPR) within a single platform and this approach is based on clustering the nodes within the Wi-Fi area. By selecting a CHCs and GWNs among the member nodes, we have considered nodes highest residual energy level, signal strength and topology features. Cluster head coordinators (CHCs) to control the member nodes within the cluster. Here the cluster heads are act as a Coordinator between WLAN and PAN, and these cluster heads are responsible to make transmission process and forwarding data packets via the secondary radio interface (PAN) with their member nodes and the Gateway nodes (GWNs) are used to bridge the clusters to avoid the cluster head failures. Communication between the neighboring clusters on behalf of their cluster heads, Gateway nodes are used. So the clusters are independently controlled and dynamically reconfigured the nodes. Based on this, we presenting a Multi-Radio clustering protocol (MRCP) using Ns2, which effectively reforms the clusters and prolong the network lifetime, according to the user's application, power and bandwidth.
无线网络的使用正在改变通信和数据网络领域,使用户能够随时随地无需电线进行通信和访问应用程序和信息。这种新兴的创新技术在计算机网络中使用,支持更大的灵活性和移动性。但最重要的因素之一是功耗。由于大多数节点在Wi-Fi区域内使用单无线平台(WLAN),功耗变大。因此,我们提出了一种基于Wi-Fi区域内节点聚类的新型分布式聚类方法,用于在单个平台内使用(LPR)和(HPR)节能。通过在成员节点中选择chc和gwn,我们考虑了节点的最高剩余能级、信号强度和拓扑特征。集群头协调器(CHCs)用于控制集群内的成员节点。在这里,簇头作为WLAN和PAN之间的协调器,这些簇头负责通过从无线接口(PAN)与其成员节点进行传输和转发数据包,网关节点(gwn)用于桥接集群以避免簇头故障。相邻集群之间的通信代表它们的集群头,网关节点被使用。因此,集群是独立控制的,并动态地重新配置节点。在此基础上,我们提出了一种基于Ns2的多无线聚类协议(MRCP),根据用户的应用、功率和带宽,有效地对聚类进行了改造,延长了网络的生存期。
{"title":"Multi radio clustering protocol for mobile networks","authors":"M. Hemakumar, G. Nagalalli","doi":"10.1109/ICICES.2014.7034062","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7034062","url":null,"abstract":"Communication and data networking field are being changed by the use of wireless networks, which enables user to communicate and access application and information without wires anywhere and anytime. This emerging and innovative technology while used in the computer networks which are supporting more flexibility and mobility. But one of the most considerable factors is power consumption. Because majority of nodes while using single radio platform (WLAN) in Wi-Fi area, power consumption becomes larger. So we propose a novel distributed clustering approach for energy saving using (LPR) and (HPR) within a single platform and this approach is based on clustering the nodes within the Wi-Fi area. By selecting a CHCs and GWNs among the member nodes, we have considered nodes highest residual energy level, signal strength and topology features. Cluster head coordinators (CHCs) to control the member nodes within the cluster. Here the cluster heads are act as a Coordinator between WLAN and PAN, and these cluster heads are responsible to make transmission process and forwarding data packets via the secondary radio interface (PAN) with their member nodes and the Gateway nodes (GWNs) are used to bridge the clusters to avoid the cluster head failures. Communication between the neighboring clusters on behalf of their cluster heads, Gateway nodes are used. So the clusters are independently controlled and dynamically reconfigured the nodes. Based on this, we presenting a Multi-Radio clustering protocol (MRCP) using Ns2, which effectively reforms the clusters and prolong the network lifetime, according to the user's application, power and bandwidth.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77914535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
DT-CWT: Feature level image fusion based on dual-tree complex wavelet transform DT-CWT:基于双树复小波变换的特征级图像融合
S. P. Prashanth Kumar, Maruthi G, Asst. Professor
Image fusion is the process of combining information from two or more sensed or acquired images into a single composite image that is more informative and becomes more suitable for visual processing or computer processing. Image fusion fully utilizes much complementary and redundant information of the original images. The aim of image fusion is to integrate complementary and redundant information from multiple images to create a composite image that contains a better description of the scene than any of the individual source images. The objective is to reduce uncertainty, minimize redundancy in the output, and maximize relevant information pertaining to an application or a task. This paper focuses on feature level image fusion based on dual-tree complex wavelet transform (DT-CWT). A dual-tree complex wavelet transforms and watershed transform is used to segment the features of the input images, either jointly or separately, to produce the region map. Characteristics of each region are calculated and a region-based approach is used to fuse the images, region by region. The images used are already registered. Misregistration is a major source of error in image fusion.
图像融合是将来自两个或多个感测或获取的图像的信息组合成一个信息量更大且更适合于视觉处理或计算机处理的单个复合图像的过程。图像融合充分利用了原始图像的大量互补和冗余信息。图像融合的目的是将来自多个图像的互补和冗余信息整合在一起,以创建一个复合图像,该图像比任何单个源图像都能更好地描述场景。目标是减少不确定性,最小化输出中的冗余,并最大化与应用程序或任务相关的信息。研究了基于双树复小波变换(DT-CWT)的特征级图像融合。采用双树复小波变换和分水岭变换对输入图像的特征进行联合或分离分割,得到区域图。计算每个区域的特征,并使用基于区域的方法逐区域融合图像。使用的图像已经注册。配准错误是图像融合的主要误差来源。
{"title":"DT-CWT: Feature level image fusion based on dual-tree complex wavelet transform","authors":"S. P. Prashanth Kumar, Maruthi G, Asst. Professor","doi":"10.1109/ICICES.2014.7033982","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033982","url":null,"abstract":"Image fusion is the process of combining information from two or more sensed or acquired images into a single composite image that is more informative and becomes more suitable for visual processing or computer processing. Image fusion fully utilizes much complementary and redundant information of the original images. The aim of image fusion is to integrate complementary and redundant information from multiple images to create a composite image that contains a better description of the scene than any of the individual source images. The objective is to reduce uncertainty, minimize redundancy in the output, and maximize relevant information pertaining to an application or a task. This paper focuses on feature level image fusion based on dual-tree complex wavelet transform (DT-CWT). A dual-tree complex wavelet transforms and watershed transform is used to segment the features of the input images, either jointly or separately, to produce the region map. Characteristics of each region are calculated and a region-based approach is used to fuse the images, region by region. The images used are already registered. Misregistration is a major source of error in image fusion.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77999377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Secured elliptic curve cryptosystems for scan based VLSI architecture 基于扫描的VLSI结构的安全椭圆曲线密码系统
K. Sridhar, M. Raguram, B. Prakash, S. Koushighan, S. Saravanan
Ellipti curve Cryptosystem used in cryptograhy chips undergoes side channel threats, where the attackers deciphered the secret key from the scan path through finding the memory element position by applying reverse enginering process in montgomery algorithm used in Elliptic device. Hence we propose the modified scan path architecture through the addition of extra electronic componet inorder to protect the secret key against the threats. The modified elliptic curve crypro scan architecture written in verilog code and simulated using model Sim Tool. The hardware module core is synthesised using Xillinx Spartan III Field Programable Gatted Array (FPGA) kit. The perfomance utilization is reported with the help of generated synsthesis result.
用于加密芯片的椭圆曲线密码系统面临侧信道威胁,攻击者利用椭圆器件中montgomery算法中的逆向工程过程,通过查找存储元件位置,从扫描路径上解密密钥。因此,我们提出了一种改进的扫描路径架构,通过增加额外的电子元件来保护密钥免受威胁。用verilog代码编写了改进的椭圆曲线crypro扫描架构,并使用model Sim Tool进行了仿真。硬件模块核心使用Xillinx Spartan III现场可编程门控阵列(FPGA)套件进行合成。利用生成的合成结果报告了性能利用率。
{"title":"Secured elliptic curve cryptosystems for scan based VLSI architecture","authors":"K. Sridhar, M. Raguram, B. Prakash, S. Koushighan, S. Saravanan","doi":"10.1109/ICICES.2014.7034009","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7034009","url":null,"abstract":"Ellipti curve Cryptosystem used in cryptograhy chips undergoes side channel threats, where the attackers deciphered the secret key from the scan path through finding the memory element position by applying reverse enginering process in montgomery algorithm used in Elliptic device. Hence we propose the modified scan path architecture through the addition of extra electronic componet inorder to protect the secret key against the threats. The modified elliptic curve crypro scan architecture written in verilog code and simulated using model Sim Tool. The hardware module core is synthesised using Xillinx Spartan III Field Programable Gatted Array (FPGA) kit. The perfomance utilization is reported with the help of generated synsthesis result.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78065512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Fault-tolerance of reconfigurable logic in memory using AGT 利用AGT实现内存中可重构逻辑的容错
C. Subashini, T. Mohanapriya, U. Rajaram
Fault handling is an important metric for many operating environments. The traditional technique for improving reliability of system is by replicating the system component. This paper explains about the Adaptive group testing technique for isolating the faults which is present in the memory of the system. The memory element contains many cell and these cells are grouped into number of blocks. These blocks are tested. The test vectors are produced sly LFSR and this is introduced into the circuit to validate the correct working of the system. This work is incorporated into FPGA to provide an adaptive hardware system with self-isolating properties. This approach increases the performance of the system. This testing is designed using hardware description language called VHDL.
故障处理是许多操作环境的一个重要指标。提高系统可靠性的传统方法是对系统部件进行复制。本文介绍了一种用于隔离系统内存故障的自适应组测试技术。存储单元包含许多单元,这些单元被分组成若干块。这些块是经过测试的。通过LFSR产生测试矢量,并将其引入电路以验证系统的正确工作。该工作被集成到FPGA中,以提供具有自隔离特性的自适应硬件系统。这种方法提高了系统的性能。这个测试是用硬件描述语言VHDL设计的。
{"title":"Fault-tolerance of reconfigurable logic in memory using AGT","authors":"C. Subashini, T. Mohanapriya, U. Rajaram","doi":"10.1109/ICICES.2014.7034177","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7034177","url":null,"abstract":"Fault handling is an important metric for many operating environments. The traditional technique for improving reliability of system is by replicating the system component. This paper explains about the Adaptive group testing technique for isolating the faults which is present in the memory of the system. The memory element contains many cell and these cells are grouped into number of blocks. These blocks are tested. The test vectors are produced sly LFSR and this is introduced into the circuit to validate the correct working of the system. This work is incorporated into FPGA to provide an adaptive hardware system with self-isolating properties. This approach increases the performance of the system. This testing is designed using hardware description language called VHDL.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78954743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Effective optimization of video transmission in WLAN 无线局域网视频传输的有效优化
V. Nagesh, K. D. Dattatreya
The prevalence of high-definition (HD) cameras, televisions, Blu-Ray players, and DVD recorders means that almost all video content is now captured and recorded digitally and much of it in HD. MPEG-2, H.264/AVC, and VC-1 are the most popular codecs in use today, and these rely on decorrelating transforms, motion estimation, intra prediction, and variable-length entropy coding (VLC) to achieve good picture quality at high compression ratios. Alongside the need for efficient video compression, there is a critical requirement for error resilience, in particular in association with wireless networks which are characterized by highly dynamic variations in error rate and bandwidth. Compression techniques based on prediction and variable-length coding render an encoded bit stream highly sensitive to channel errors. In the paper, techniques such as pyramid vector quantization (PVQ) have been implemented for increasing the ability to prevent error propagation through the use of fixed-length codeword in the Wireless Environment. In the paper, frame performance of the video has been observed in the pyramid vector section which offers greater compression performance in various techniques.
高清摄像机、电视、蓝光播放器和DVD录影机的普及意味着现在几乎所有的视频内容都是以数字方式捕获和录制的,而且其中大部分是高清的。MPEG-2、H.264/AVC和VC-1是目前使用的最流行的编解码器,它们依赖于去相关变换、运动估计、帧内预测和变长熵编码(VLC)来在高压缩比下实现良好的图像质量。除了需要有效的视频压缩外,还有一个关键的错误弹性要求,特别是与以错误率和带宽的高度动态变化为特征的无线网络相关。基于预测和变长编码的压缩技术使得编码后的比特流对信道错误高度敏感。在本文中,金字塔矢量量化(PVQ)等技术已被实现,以提高通过在无线环境中使用固定长度码字来防止错误传播的能力。本文在金字塔矢量截面上观察了视频的帧性能,该截面在各种技术中具有更好的压缩性能。
{"title":"Effective optimization of video transmission in WLAN","authors":"V. Nagesh, K. D. Dattatreya","doi":"10.1109/ICICES.2014.7033992","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033992","url":null,"abstract":"The prevalence of high-definition (HD) cameras, televisions, Blu-Ray players, and DVD recorders means that almost all video content is now captured and recorded digitally and much of it in HD. MPEG-2, H.264/AVC, and VC-1 are the most popular codecs in use today, and these rely on decorrelating transforms, motion estimation, intra prediction, and variable-length entropy coding (VLC) to achieve good picture quality at high compression ratios. Alongside the need for efficient video compression, there is a critical requirement for error resilience, in particular in association with wireless networks which are characterized by highly dynamic variations in error rate and bandwidth. Compression techniques based on prediction and variable-length coding render an encoded bit stream highly sensitive to channel errors. In the paper, techniques such as pyramid vector quantization (PVQ) have been implemented for increasing the ability to prevent error propagation through the use of fixed-length codeword in the Wireless Environment. In the paper, frame performance of the video has been observed in the pyramid vector section which offers greater compression performance in various techniques.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83920019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic cluster based energy controlled routing in Wireless Sensor Networks 基于动态聚类的无线传感器网络能量控制路由
H. Shalma, R. Rajesh
Fault tolerance has been identified as key challenges in the design and operations of Wireless Sensor Network (WSNs). Failures are inevitable in wireless sensor networks due to inhospitable environment and unattended deployment. Therefore, it is necessary to detect the networks for recovery from the failure to sustain it. WSNs are self-organized using clustering algorithms to conserve energy. The sensor nodes are organized in several small clusters where there are cluster heads in each cluster. These CHs (Cluster Heads) gather data from their local clusters aggregate them & send them to the base station with shortest distance as a forwarding metric using Dijkstra algorithm. The proposed scheme is supposed to be an efficient fault detection and recovery mechanism to make the network fault-tolerant and achieve reliability, latency and energy efficiency. Performance analysis and evaluation will be made using several scenarios of wireless sensor networks.
在无线传感器网络(WSNs)的设计和运行中,容错已经被认为是一个关键的挑战。由于恶劣的环境和无人值守的部署,无线传感器网络不可避免地会出现故障。因此,有必要检测网络从故障中恢复以维持它。无线传感器网络采用聚类算法自组织以节约能量。传感器节点被组织在几个小集群中,每个集群中都有簇头。这些CHs(簇头)从它们的本地簇中收集数据,并使用Dijkstra算法将它们作为转发度量发送到距离最短的基站。提出的方案是一种有效的故障检测和恢复机制,使网络容错,实现可靠性、时延和能效。将使用无线传感器网络的几种场景进行性能分析和评估。
{"title":"Dynamic cluster based energy controlled routing in Wireless Sensor Networks","authors":"H. Shalma, R. Rajesh","doi":"10.1109/ICICES.2014.7033856","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033856","url":null,"abstract":"Fault tolerance has been identified as key challenges in the design and operations of Wireless Sensor Network (WSNs). Failures are inevitable in wireless sensor networks due to inhospitable environment and unattended deployment. Therefore, it is necessary to detect the networks for recovery from the failure to sustain it. WSNs are self-organized using clustering algorithms to conserve energy. The sensor nodes are organized in several small clusters where there are cluster heads in each cluster. These CHs (Cluster Heads) gather data from their local clusters aggregate them & send them to the base station with shortest distance as a forwarding metric using Dijkstra algorithm. The proposed scheme is supposed to be an efficient fault detection and recovery mechanism to make the network fault-tolerant and achieve reliability, latency and energy efficiency. Performance analysis and evaluation will be made using several scenarios of wireless sensor networks.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88941336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Privacy conserving and secure distribution of personal health information using cloud 使用云保护隐私和安全分发个人健康信息
E. Kamalakannan, K. S. Arvind
Handle the privacy information in the cloud faces the lot of security issues. If we maintain the medical information in the cloud means we need to provide the more security protection for the sensitive information's. Personal Health Information system is the system for preserving the privacy and distributing the information in secret way using Cloud Computing. Storing the medical information in third party cloud server, there is the chance for viewing and there is the chance for the information leakage. So here we need to protect the sensitive information's. The better way to protect the medical information's is, storing the sensitive information in the form of cipher text. In this paper we made a detailed study on Attribute Based Encryption and Attribute Based Broadcast Encryption for securing the Personal Health Information. And also in this paper we present the Personal Health Information system and we implement the system from different angle for securing the Personal Health Information with the help of Asymmetric key Cryptography and Message Digest. And also we are using the Attribute Based Broadcast Encryption. And we present the Time Granularity based log record scheme. To maintaining the log record we using the Third Party Auditor for strong back end protection. We show the experimental result of the PHIS in this paper.
在云中处理隐私信息面临着许多安全问题。如果我们将医疗信息保存在云端,就意味着我们需要为敏感信息提供更多的安全保护。个人健康信息系统是利用云计算技术对个人健康信息进行保密和秘密分发的系统。将医疗信息存储在第三方云服务器上,有被查看的可能,也有信息泄露的可能。所以这里我们需要保护敏感信息。较好的保护医疗信息的方法是将敏感信息以密文的形式存储。本文对基于属性的加密和基于属性的广播加密进行了详细的研究,以保证个人健康信息的安全。本文还介绍了个人健康信息系统,并从不同的角度实现了该系统,利用非对称密钥加密和消息摘要技术实现了个人健康信息的安全。我们还使用了基于属性的广播加密。提出了基于时间粒度的日志记录方案。为了维护日志记录,我们使用第三方审核员进行强大的后端保护。本文给出了公共卫生信息系统的实验结果。
{"title":"Privacy conserving and secure distribution of personal health information using cloud","authors":"E. Kamalakannan, K. S. Arvind","doi":"10.1109/ICICES.2014.7033880","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033880","url":null,"abstract":"Handle the privacy information in the cloud faces the lot of security issues. If we maintain the medical information in the cloud means we need to provide the more security protection for the sensitive information's. Personal Health Information system is the system for preserving the privacy and distributing the information in secret way using Cloud Computing. Storing the medical information in third party cloud server, there is the chance for viewing and there is the chance for the information leakage. So here we need to protect the sensitive information's. The better way to protect the medical information's is, storing the sensitive information in the form of cipher text. In this paper we made a detailed study on Attribute Based Encryption and Attribute Based Broadcast Encryption for securing the Personal Health Information. And also in this paper we present the Personal Health Information system and we implement the system from different angle for securing the Personal Health Information with the help of Asymmetric key Cryptography and Message Digest. And also we are using the Attribute Based Broadcast Encryption. And we present the Time Granularity based log record scheme. To maintaining the log record we using the Third Party Auditor for strong back end protection. We show the experimental result of the PHIS in this paper.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83758050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
VHDL implementation of IEEE 754 floating point unit ieee754浮点单元的VHDL实现
Anjana Sasidharan, P. Nagarajan
IEEE-754 specifies interchange and arithmetic formats and methods for binary and decimal floating-point arithmetic in computer programming world. The implementation of a floating-point systemusing this standard can be done fully in software, or in hardware, or in any combination of software and hardware. This project propose VHDL implementation of IEEE-754 Floating point unit. In proposed work the pack, unpack and rounding mode was implemented using the VHDL language and simulation was verified.
IEEE-754规定了计算机编程世界中二进制和十进制浮点运算的交换和算术格式和方法。使用此标准的浮点系统的实现可以完全在软件中完成,也可以在硬件中完成,或者在软件和硬件的任何组合中完成。本课题提出IEEE-754浮点单元的VHDL实现。本文采用VHDL语言实现了包、解包和舍入模式,并进行了仿真验证。
{"title":"VHDL implementation of IEEE 754 floating point unit","authors":"Anjana Sasidharan, P. Nagarajan","doi":"10.1109/ICICES.2014.7033999","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033999","url":null,"abstract":"IEEE-754 specifies interchange and arithmetic formats and methods for binary and decimal floating-point arithmetic in computer programming world. The implementation of a floating-point systemusing this standard can be done fully in software, or in hardware, or in any combination of software and hardware. This project propose VHDL implementation of IEEE-754 Floating point unit. In proposed work the pack, unpack and rounding mode was implemented using the VHDL language and simulation was verified.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79727120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Microstrip circular antenna array design for radar applications 雷达应用的微带圆形天线阵列设计
Angeline M. Flashy, A. Shanthi
The design and characteristics of the double sided microstrip circular antenna array are presented. The single sided antenna array is placed on the top layer and the double sided antenna array is placed on both the top and bottom layers to obtain the desired antenna characterilstics. The single sided antenna array is designed for single band at 6.3-6.6 GHz for C band and the double sided antenna array is designed for dual bands at 6.05-7 GHz and 9-10 GHz to support C band and X band Weather Radar applications. The single band antenna array shows directional radiation pattern with the gain value of 6.74 dBi at 6.44 GHz and dual band at 3.12 dBi at 6.5 GHz and 3.8 dBi at 9.5 GHz. The single sided single band and double sided dual band antenna provides directional radiation pattern with high gain.
介绍了双面微带圆形天线阵的设计和特点。在顶层放置单面天线阵列,在顶层和底层同时放置双面天线阵列,以获得所需的天线特性。单面天线阵列设计用于C波段的6.3-6.6 GHz单频段,双面天线阵列设计用于6.05-7 GHz和9-10 GHz双频段,以支持C波段和X波段天气雷达应用。单波段天线阵列呈现定向辐射方向图,6.44 GHz时增益值为6.74 dBi, 6.5 GHz时增益值为3.12 dBi, 9.5 GHz时增益值为3.8 dBi。单面单频和双面双频天线提供高增益的定向辐射方向图。
{"title":"Microstrip circular antenna array design for radar applications","authors":"Angeline M. Flashy, A. Shanthi","doi":"10.1109/ICICES.2014.7034053","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7034053","url":null,"abstract":"The design and characteristics of the double sided microstrip circular antenna array are presented. The single sided antenna array is placed on the top layer and the double sided antenna array is placed on both the top and bottom layers to obtain the desired antenna characterilstics. The single sided antenna array is designed for single band at 6.3-6.6 GHz for C band and the double sided antenna array is designed for dual bands at 6.05-7 GHz and 9-10 GHz to support C band and X band Weather Radar applications. The single band antenna array shows directional radiation pattern with the gain value of 6.74 dBi at 6.44 GHz and dual band at 3.12 dBi at 6.5 GHz and 3.8 dBi at 9.5 GHz. The single sided single band and double sided dual band antenna provides directional radiation pattern with high gain.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83374652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Adaptive traffic management with VANET in V to I communication using greedy forwarding algorithm 基于贪婪转发算法的V对I通信中VANET的自适应流量管理
R. Yugapriya, P. Dhivya, M. Dhivya, S. Kirubakaran
Vehicular ad hoc networks (VANETs) are used to collect and aggregate real-time speed and position information on individual vehicles to optimize signal control at traffic intersections. VANET can be used to group vehicles into approximately equal-sized platoons, which can then be scheduled using OJF. Greedy forwarding algorithm is proposed to use in the traffic management as it offer the better transfer. Vehicle to infrastructure method is used to transfer the message from the platoon to the vehicle thus increases the safety. The road block information is transfer from platoon to V to I and from one V to I it is transfer to another. Greedy Forwarding algorithm is used to forwarded message to the neighboring node which is "closest" to the destination. In this paper Greedy Forwarding is used to increase the delivery rate and throughput. This algorithm is also used to reduce the load traffic. Greedy algorithm has computationally efficient and can find the error in early stage. Under heavy vehicular traffic load, the greedy algorithm performs the same as the platooning algorithm but still produces low delays, and high throughput.
车辆自组织网络(VANETs)用于收集和汇总单个车辆的实时速度和位置信息,以优化交通交叉口的信号控制。VANET可用于将车辆分组成大约相等大小的队列,然后可以使用OJF进行调度。由于贪心转发算法具有较好的传输性能,因此提出将其应用于流量管理中。采用车辆到基础设施的方法将信息从队列传递到车辆,从而提高了安全性。路障信息从排传递到V再传递到I,从一个V再传递到另一个V。贪婪转发算法用于将消息转发到距离目标“最近”的相邻节点。本文采用贪婪转发来提高传输速率和吞吐量。该算法还用于减少负载流量。贪心算法计算效率高,能在早期发现错误。在车辆交通负荷较大的情况下,贪婪算法的性能与队列算法相同,但仍然具有低延迟和高吞吐量。
{"title":"Adaptive traffic management with VANET in V to I communication using greedy forwarding algorithm","authors":"R. Yugapriya, P. Dhivya, M. Dhivya, S. Kirubakaran","doi":"10.1109/ICICES.2014.7034067","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7034067","url":null,"abstract":"Vehicular ad hoc networks (VANETs) are used to collect and aggregate real-time speed and position information on individual vehicles to optimize signal control at traffic intersections. VANET can be used to group vehicles into approximately equal-sized platoons, which can then be scheduled using OJF. Greedy forwarding algorithm is proposed to use in the traffic management as it offer the better transfer. Vehicle to infrastructure method is used to transfer the message from the platoon to the vehicle thus increases the safety. The road block information is transfer from platoon to V to I and from one V to I it is transfer to another. Greedy Forwarding algorithm is used to forwarded message to the neighboring node which is \"closest\" to the destination. In this paper Greedy Forwarding is used to increase the delivery rate and throughput. This algorithm is also used to reduce the load traffic. Greedy algorithm has computationally efficient and can find the error in early stage. Under heavy vehicular traffic load, the greedy algorithm performs the same as the platooning algorithm but still produces low delays, and high throughput.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88510947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
International Conference on Information Communication and Embedded Systems (ICICES2014)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1