Pub Date : 1900-01-01DOI: 10.1109/ICCCI.2018.8441220
Krishna B Vamshi, A. Pandey, Kumar A. P. Siva
This paper discusses a new topic model based approach for opinion mining and sentiment analysis of text reviews posted in web forums or social media site which are mostly in unstructured in nature. In recent years, opinions are exchanged in clouds about any product, person, event or any interested topic. These opinions help in decision making for choosing a product or getting feedback about any topic. Opinion mining and sentiment analysis are related in a sense that opining mining deals with analyzing and summarizing expressed opinions whereas sentiment analysis classifies opinionated text into positive and negative. Aspect extraction is a crucial problem in sentiment analysis. Model proposed in the paper utilizes topic model for aspect extraction and support vector machine learning technique for sentiment classification of textual reviews. The goal is to automate the process of mining attitudes, opinions and hidden emotions from text.
{"title":"Topic Model Based Opinion Mining and Sentiment Analysis","authors":"Krishna B Vamshi, A. Pandey, Kumar A. P. Siva","doi":"10.1109/ICCCI.2018.8441220","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441220","url":null,"abstract":"This paper discusses a new topic model based approach for opinion mining and sentiment analysis of text reviews posted in web forums or social media site which are mostly in unstructured in nature. In recent years, opinions are exchanged in clouds about any product, person, event or any interested topic. These opinions help in decision making for choosing a product or getting feedback about any topic. Opinion mining and sentiment analysis are related in a sense that opining mining deals with analyzing and summarizing expressed opinions whereas sentiment analysis classifies opinionated text into positive and negative. Aspect extraction is a crucial problem in sentiment analysis. Model proposed in the paper utilizes topic model for aspect extraction and support vector machine learning technique for sentiment classification of textual reviews. The goal is to automate the process of mining attitudes, opinions and hidden emotions from text.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124058195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICCCI.2018.8441459
S. Yadav, Ankit Kumar Patel, K. Jaiswal, A. Pandey, Rajeev Singh
A novel design of square and circular ring triple band microstrip patch antenna is designed for satellite applications. The overall dimension of proposed antenna is (21×25mm2) and it consists of a defected ground structure. The antenna characteristics return loss, gain, group delay, VSWR, radiation pattern and radiation efficiency are discussed. Due to this shape of antenna, its provide triple band at resonating frequencies of 4.17 GHz, 7.48 GHz, 9.3GHz, with the respective impedance bandwidth 5.51%, 1.87% and 15.77% on FR4 substrate, with gain of 6.62 dBi, 4 dBi and 5.12 dBi. The proposed antenna is designed and simulated by HFSStool.
{"title":"A Novel Design of Square and Circular Ring Triple Band Microstrip Patch Antenna for Satellite Application","authors":"S. Yadav, Ankit Kumar Patel, K. Jaiswal, A. Pandey, Rajeev Singh","doi":"10.1109/ICCCI.2018.8441459","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441459","url":null,"abstract":"A novel design of square and circular ring triple band microstrip patch antenna is designed for satellite applications. The overall dimension of proposed antenna is (21×25mm2) and it consists of a defected ground structure. The antenna characteristics return loss, gain, group delay, VSWR, radiation pattern and radiation efficiency are discussed. Due to this shape of antenna, its provide triple band at resonating frequencies of 4.17 GHz, 7.48 GHz, 9.3GHz, with the respective impedance bandwidth 5.51%, 1.87% and 15.77% on FR4 substrate, with gain of 6.62 dBi, 4 dBi and 5.12 dBi. The proposed antenna is designed and simulated by HFSStool.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124898121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICCCI.2018.8441310
Sriparna Banerjee, S. S. Chaudhuri
This paper contains a novel haze-removal algorithm, where the evaluation of the desired channel containing pixels with minimum intensity values is carried out using a patch-independent method in contrast to most of the existing methods, where this was done by dividing the images into several patches of fixed size. This helps to overcome the halo-artifacts, which are mainly present along the edges, where there is a sharp change of intensities due to non-uniform transmission within the patches. Here the atmospheric light evaluated by using a binary Support Vector Machine classifier and transmission estimation is performed by introducing a constant K1, whose value is dependent on the pixel intensity values in respective color channels. The contrast enhancement of the haze-free images obtained after scene radiance recovery and removal of artifacts present mostly in the sky region is done by using log-sigmoid function and a constant K2, whose values are dependent on standard deviation values and mean values of histograms of each color channel respectively. Moreover satisfactory results are obtained by performing comparative study of qualitative and quantitative analyses of output images obtained by applying this proposed method on hazy images with respect to various, noteworthy existing methods.
{"title":"Log sigmoid function based patch independent image haze removal method","authors":"Sriparna Banerjee, S. S. Chaudhuri","doi":"10.1109/ICCCI.2018.8441310","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441310","url":null,"abstract":"This paper contains a novel haze-removal algorithm, where the evaluation of the desired channel containing pixels with minimum intensity values is carried out using a patch-independent method in contrast to most of the existing methods, where this was done by dividing the images into several patches of fixed size. This helps to overcome the halo-artifacts, which are mainly present along the edges, where there is a sharp change of intensities due to non-uniform transmission within the patches. Here the atmospheric light evaluated by using a binary Support Vector Machine classifier and transmission estimation is performed by introducing a constant K1, whose value is dependent on the pixel intensity values in respective color channels. The contrast enhancement of the haze-free images obtained after scene radiance recovery and removal of artifacts present mostly in the sky region is done by using log-sigmoid function and a constant K2, whose values are dependent on standard deviation values and mean values of histograms of each color channel respectively. Moreover satisfactory results are obtained by performing comparative study of qualitative and quantitative analyses of output images obtained by applying this proposed method on hazy images with respect to various, noteworthy existing methods.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129074411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICCCI.2018.8441397
J. Avila, S. Prem, S. Rajapradeepa, K. Thenmozhi
With the tremendous growth and increased use of wireless technology for communication, corruption of data due to channel noise and hacking of data by the intruders become inevitable. One of the vital attacks in the physical layer of the cognitive radio is Primary User Emulation Attack (PUEA). Cognitive radio has risen as a solution for spectrum shortage issue raised due to the excessive usage of wireless devices. This manuscript focusses on mitigating the PUEA with the aid of some special sequences known as authentication tag. The tag is generated in two ways- gold codes are treated as authentication tag and Pseudo Noise (PN) are considered as tag. The tags are embedded with the signal and transmitted to the cognitive radio. Mitigating the PUEA eliminates the wastage of bandwidth and results in effective dynamic spectrum access.
{"title":"Authentication Based Primary User Emulation Attack Mitigation in Cognitive Radio","authors":"J. Avila, S. Prem, S. Rajapradeepa, K. Thenmozhi","doi":"10.1109/ICCCI.2018.8441397","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441397","url":null,"abstract":"With the tremendous growth and increased use of wireless technology for communication, corruption of data due to channel noise and hacking of data by the intruders become inevitable. One of the vital attacks in the physical layer of the cognitive radio is Primary User Emulation Attack (PUEA). Cognitive radio has risen as a solution for spectrum shortage issue raised due to the excessive usage of wireless devices. This manuscript focusses on mitigating the PUEA with the aid of some special sequences known as authentication tag. The tag is generated in two ways- gold codes are treated as authentication tag and Pseudo Noise (PN) are considered as tag. The tags are embedded with the signal and transmitted to the cognitive radio. Mitigating the PUEA eliminates the wastage of bandwidth and results in effective dynamic spectrum access.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127962396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICCCI.2018.8441238
J. Immanuel, Ajay Joshua, S. George
The use of EEG signals taken from human brain showcases promising information for detecting lies and false intent in a person with increased accuracy. The physical changes detected by and EEG device are concomitant to human reaction and cannot be controlled by a person. Blinking is one such component that changes when a person lies. Blink rate cannot be simply calculated by physical observation. There are certain other methods to detect blink rate, making use of ocular tracking devices however, this method of using EEG signals to extract ocular characteristics allows this methodology to be combined with other techniques to detect lies using EEG signals. This means that a single EEG acquisition device can be used as a comprehensive lie detector. A person's blink rate decreases drastically while they are lying and then increases rapidly moments after. This can be used to check if a response to a question is true or false. For the purpose of this study we have collected data from 10 subjects, taking 10 readings from each. We have studied the number of blinks and thus the blinks per minute of a subject during and after they have told a lie. The results were then used to check if the accuracy of our method. The outcomes of the study showed a decrease in blink rate during a lie with 95.12% accuracy. This proves that blink characteristics extracted from EEG datasets can be used as an effective means to detect lies in a subject. This method provides an alternative to the existing polygraph tests used in lie detection which can conceivably be made admissible in court in the future.
{"title":"A Study on Using Blink Parameters from EEG Data for Lie Detection","authors":"J. Immanuel, Ajay Joshua, S. George","doi":"10.1109/ICCCI.2018.8441238","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441238","url":null,"abstract":"The use of EEG signals taken from human brain showcases promising information for detecting lies and false intent in a person with increased accuracy. The physical changes detected by and EEG device are concomitant to human reaction and cannot be controlled by a person. Blinking is one such component that changes when a person lies. Blink rate cannot be simply calculated by physical observation. There are certain other methods to detect blink rate, making use of ocular tracking devices however, this method of using EEG signals to extract ocular characteristics allows this methodology to be combined with other techniques to detect lies using EEG signals. This means that a single EEG acquisition device can be used as a comprehensive lie detector. A person's blink rate decreases drastically while they are lying and then increases rapidly moments after. This can be used to check if a response to a question is true or false. For the purpose of this study we have collected data from 10 subjects, taking 10 readings from each. We have studied the number of blinks and thus the blinks per minute of a subject during and after they have told a lie. The results were then used to check if the accuracy of our method. The outcomes of the study showed a decrease in blink rate during a lie with 95.12% accuracy. This proves that blink characteristics extracted from EEG datasets can be used as an effective means to detect lies in a subject. This method provides an alternative to the existing polygraph tests used in lie detection which can conceivably be made admissible in court in the future.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126097829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICCCI.2018.8441210
N. Chidambaram, K. Vineela, Matthew J Jebin, J. Balaji, P. Raj
In this era of silicon age, the internet services have become an indispensable part of human life. People moving fast towards the digitized world and sending an information have never been much easier from the onset of file transfer applications, cloud-based applications, messengers and email services. Big companies and startups prefer cloud-based software solutions due to its accessibility, security and easy sharing features. Unfortunately, “Where there are rivers, there are potholes”. Crackers and unethical hackers exist in the environment, who make this digitization a ‘nightmare’ for newcomers and existing users. Millions of security breaches have occurred in decades in which few of them are highly severe. The hackers stole highly sensitive information such as personal and official. And this incident left with millions of information at risk of spamming, phishing attacks and etc. The proposed approach focuses the transferring file securely (TranSecure) from the authenticated user. Therefore there requires features for encrypting the data such that even if it is stolen it will be indecipherable. Thus the user's privacy is still satisfied. This demand brings out the idea of the approach which securely transmits data between users along with first in class encryption and compression for security and storage space conservation respectively.
{"title":"Fortified File Transfer Framework - A TranSecure Model","authors":"N. Chidambaram, K. Vineela, Matthew J Jebin, J. Balaji, P. Raj","doi":"10.1109/ICCCI.2018.8441210","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441210","url":null,"abstract":"In this era of silicon age, the internet services have become an indispensable part of human life. People moving fast towards the digitized world and sending an information have never been much easier from the onset of file transfer applications, cloud-based applications, messengers and email services. Big companies and startups prefer cloud-based software solutions due to its accessibility, security and easy sharing features. Unfortunately, “Where there are rivers, there are potholes”. Crackers and unethical hackers exist in the environment, who make this digitization a ‘nightmare’ for newcomers and existing users. Millions of security breaches have occurred in decades in which few of them are highly severe. The hackers stole highly sensitive information such as personal and official. And this incident left with millions of information at risk of spamming, phishing attacks and etc. The proposed approach focuses the transferring file securely (TranSecure) from the authenticated user. Therefore there requires features for encrypting the data such that even if it is stolen it will be indecipherable. Thus the user's privacy is still satisfied. This demand brings out the idea of the approach which securely transmits data between users along with first in class encryption and compression for security and storage space conservation respectively.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125495645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICCCI.2018.8441240
Ankit Kumar Patel, A. Pandey, S. Yadav, Sweta Singh, Rajeev Singh
In this paper the radiation characteristics of designed antenna is presented under simultaneous excitation of both ground and patch. The designed antenna operates at multiple frequency bands in 1–100 GHz frequency range. The first four resonating modes have the fractional bandwidth of 29.8%, 8.54%, 16.23% and 12.6% with order by in the frequency range of 2.9-3.9 GHz, 9.5-10.35 GHz, 15.15-17.95 GHz and 20.45-23.2 GHz respectively. The practical implementation of the proposed antenna is suitable for WiMAX (3.5 GHz), satellite communication (S, X, Ku, Ka-band), vehicle speed detection, closed range targeting radar, SHF, RF engineering and millimeter waves (30–100 GHz). With the utilization of half ground structure the designed antenna averts a major surface-wave loss to obtain the multiband behavior for the given design structure. The presented strip line antenna has reasonably good gain and low VSWR $pmb{(< 2)}$ for all operating bands.
{"title":"A Multiband Strip Line Antenna with Half Ground Structure","authors":"Ankit Kumar Patel, A. Pandey, S. Yadav, Sweta Singh, Rajeev Singh","doi":"10.1109/ICCCI.2018.8441240","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441240","url":null,"abstract":"In this paper the radiation characteristics of designed antenna is presented under simultaneous excitation of both ground and patch. The designed antenna operates at multiple frequency bands in 1–100 GHz frequency range. The first four resonating modes have the fractional bandwidth of 29.8%, 8.54%, 16.23% and 12.6% with order by in the frequency range of 2.9-3.9 GHz, 9.5-10.35 GHz, 15.15-17.95 GHz and 20.45-23.2 GHz respectively. The practical implementation of the proposed antenna is suitable for WiMAX (3.5 GHz), satellite communication (S, X, Ku, Ka-band), vehicle speed detection, closed range targeting radar, SHF, RF engineering and millimeter waves (30–100 GHz). With the utilization of half ground structure the designed antenna averts a major surface-wave loss to obtain the multiband behavior for the given design structure. The presented strip line antenna has reasonably good gain and low VSWR $pmb{(< 2)}$ for all operating bands.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122292438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICCCI.2018.8441228
R. Maidhili, G. Karthik
Wireless sensor networks (WSN) comprises of many clusters with sensor nodes. All the sensor nodes in the cluster joins together and dnamically broadcast the latest sensed data in the network. Due to the dispersed quality and forwarding nature of WSNs, they are almost used in all the real time applications for which multi user authentication is necessitous which can still lead to impersonation attacks (Attacker node act as legitimate node and sends bogus broadcast messages in the network). An Identity based scheme along with sink node is proposed in order to provide a secure broadcast authentication and minimizes the transmission rates and computation based on ECC (Elliptical Curve Cryptography). Initially the sink node generates public and private keys based on node ID using ECC and distributes the private key to the node in the network and public key to the user. The user encrypts and broadcast the control message using the public key to validate its authentication while the node decrypts the broadcast message using its private key provided by the sink. If the signature gets validated the node and the user will authenticate each other, else the connection will be refused which can prevent impersonation attack. In the attack scenario, if the attacker pretends to be a legitimate user and sends bogus broadcast messages, the attacker is dredged due to the mismatch that occurs while the signature is verified. This authentication scheme provides high security and daunts the attacker from the network. WSN consumes high energy during data transmission. To improvise the energy efficiency this project exploits low energy consumption MAC protocols. An energy-efficient data collection is done in WSNs by integrating IEEE 802.15.4/ZigBee standards in MAC layer. The main objective of the proposed work is to perform broadcast after authentication, to prevent resource consuming attacks through authentication and to reduce the energy wastage along with security in WSN communication.
{"title":"Energy Efficient and Secure Multi-User Broadcast Authentication Scheme in Wireless Sensor Networks","authors":"R. Maidhili, G. Karthik","doi":"10.1109/ICCCI.2018.8441228","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441228","url":null,"abstract":"Wireless sensor networks (WSN) comprises of many clusters with sensor nodes. All the sensor nodes in the cluster joins together and dnamically broadcast the latest sensed data in the network. Due to the dispersed quality and forwarding nature of WSNs, they are almost used in all the real time applications for which multi user authentication is necessitous which can still lead to impersonation attacks (Attacker node act as legitimate node and sends bogus broadcast messages in the network). An Identity based scheme along with sink node is proposed in order to provide a secure broadcast authentication and minimizes the transmission rates and computation based on ECC (Elliptical Curve Cryptography). Initially the sink node generates public and private keys based on node ID using ECC and distributes the private key to the node in the network and public key to the user. The user encrypts and broadcast the control message using the public key to validate its authentication while the node decrypts the broadcast message using its private key provided by the sink. If the signature gets validated the node and the user will authenticate each other, else the connection will be refused which can prevent impersonation attack. In the attack scenario, if the attacker pretends to be a legitimate user and sends bogus broadcast messages, the attacker is dredged due to the mismatch that occurs while the signature is verified. This authentication scheme provides high security and daunts the attacker from the network. WSN consumes high energy during data transmission. To improvise the energy efficiency this project exploits low energy consumption MAC protocols. An energy-efficient data collection is done in WSNs by integrating IEEE 802.15.4/ZigBee standards in MAC layer. The main objective of the proposed work is to perform broadcast after authentication, to prevent resource consuming attacks through authentication and to reduce the energy wastage along with security in WSN communication.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131289329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICCCI.2018.8441245
M. Maheswari, B. Murugeshwari
Error correction code with higher error correction capability with minimum redundant bit is the need of the day for on-chip interconnect link. Hence, in this paper an energy competent low redundancy error correction code with more error correction is proposed. The proposed error correction code is capable of correcting single random error as well as burst errors of up to triple bits. The proposed code has redundancy bits same as that of the single error correction- double error detection (SEC-DED) Hamming code and has small increase in the decoder complexity to make it to correct up to triple burst errors. The proposed code has been implemented using 180 nm technology using verilog coding. The performance of the code has been assessed based on area and power consumption of codec as well as router placed with codec and without codec. The proposed code occupies up to 29 % less area compared to 25% less power compared to the existing codes. Also the performance of the code for residual error rate, link swing voltage and link power consumption have been analyzed and is found to be minimum compared to other codes.
{"title":"Random and Triple burst error correction code with low redundancy for Network-on-Chip link","authors":"M. Maheswari, B. Murugeshwari","doi":"10.1109/ICCCI.2018.8441245","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441245","url":null,"abstract":"Error correction code with higher error correction capability with minimum redundant bit is the need of the day for on-chip interconnect link. Hence, in this paper an energy competent low redundancy error correction code with more error correction is proposed. The proposed error correction code is capable of correcting single random error as well as burst errors of up to triple bits. The proposed code has redundancy bits same as that of the single error correction- double error detection (SEC-DED) Hamming code and has small increase in the decoder complexity to make it to correct up to triple burst errors. The proposed code has been implemented using 180 nm technology using verilog coding. The performance of the code has been assessed based on area and power consumption of codec as well as router placed with codec and without codec. The proposed code occupies up to 29 % less area compared to 25% less power compared to the existing codes. Also the performance of the code for residual error rate, link swing voltage and link power consumption have been analyzed and is found to be minimum compared to other codes.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133673899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICCCI.2018.8441482
Shubham Sarkar, Sujan Sarkar, Jishan Mehedi
An adder is a fundamental component of various Very Large-Scale Integration (VLSI) circuits like Central Processing Unit (CPU), Arithmetic Logic Unit (ALU), Memory Access Unit (MAU) etc. A various number of operations can be achieved by adders such as addition, subtraction, multiplication, division, exponentiation etc. The basic circuit of the adder is designed using logic gates. The demand for high-performance VLSI systems are increasing rapidly for use in small and portable devices. The speed related to operation depends upon the delay of the adder as it happens to be one of the most fundamental components of all the computing units and it is a very important parameter for high performance. There have been so many research works on reducing the delay associated with the adder. In this paper, we have done a comparative study of Carry Save Adder (CSA) and Carry Increment Adder (CIA) and proposed a hybrid adder circuit to decrease the delay associated with the adder to an optimum level. As CIA has favorable performance regarding propagation delay and CSA also happens to have good performance in higher bit operations. A simulation study has been carried out for comparative study, the coding has been done using Verilog hardware description language (HDL) and the simulation has been realized with the help of Xilinx ISE 14.7 environment. The result shows the effectiveness of the hybrid circuit proposed for propagation delay improvement.
加法器是各种超大规模集成电路(VLSI)的基本组件,如中央处理器(CPU)、算术逻辑单元(ALU)、内存访问单元(MAU)等。加法器可以实现各种各样的运算,如加、减、乘、除、取幂等。加法器的基本电路采用逻辑门设计。用于小型和便携式设备的高性能VLSI系统的需求正在迅速增加。与运算相关的速度取决于加法器的延迟,因为它恰好是所有计算单元中最基本的组件之一,它是高性能的一个非常重要的参数。关于如何减少加法器的延迟,已经有很多研究工作。本文对进位保存加法器(CSA)和进位增量加法器(CIA)进行了比较研究,提出了一种混合加法器电路,将加法器相关的延迟降低到最佳水平。由于CIA在传输延迟方面具有良好的性能,而CSA在高比特运算方面也具有良好的性能。采用Verilog硬件描述语言(HDL)进行编码,并在Xilinx ISE 14.7环境下实现仿真。实验结果表明,所提出的混合电路在改善传输延迟方面是有效的。
{"title":"Modified CSA-CIA for Reducing Propagation Delay","authors":"Shubham Sarkar, Sujan Sarkar, Jishan Mehedi","doi":"10.1109/ICCCI.2018.8441482","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441482","url":null,"abstract":"An adder is a fundamental component of various Very Large-Scale Integration (VLSI) circuits like Central Processing Unit (CPU), Arithmetic Logic Unit (ALU), Memory Access Unit (MAU) etc. A various number of operations can be achieved by adders such as addition, subtraction, multiplication, division, exponentiation etc. The basic circuit of the adder is designed using logic gates. The demand for high-performance VLSI systems are increasing rapidly for use in small and portable devices. The speed related to operation depends upon the delay of the adder as it happens to be one of the most fundamental components of all the computing units and it is a very important parameter for high performance. There have been so many research works on reducing the delay associated with the adder. In this paper, we have done a comparative study of Carry Save Adder (CSA) and Carry Increment Adder (CIA) and proposed a hybrid adder circuit to decrease the delay associated with the adder to an optimum level. As CIA has favorable performance regarding propagation delay and CSA also happens to have good performance in higher bit operations. A simulation study has been carried out for comparative study, the coding has been done using Verilog hardware description language (HDL) and the simulation has been realized with the help of Xilinx ISE 14.7 environment. The result shows the effectiveness of the hybrid circuit proposed for propagation delay improvement.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114551758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}