Pub Date : 2016-12-01DOI: 10.1109/ICSPCOM.2016.7980621
Sreedhar Vineel R. Kaipu, Kriti Vaish, Sneha Komatireddy, Akshat Sood, M. Goswami
This paper presents the design of a third order, low power fully integrated phase-locked loop (PLL) with a wide range of 1.7GHz to 2.5GHz using UMC180nm CMOS technology. The model designed has a conventional Integer-N PLL based frequency synthesizer architecture with design modifications to the voltage controlled oscillator (VCO). The post layout results reveal that the jitter of the PLL after it has settled at a frequency of 2GHz at 14.1µs is around 35.26ps. The total power consumption of this PLL is 274.346uW when operated on 1.4/1.8V at an output frequency of 2GHz. This design takes an area of 0.11862 mm2 and can be used for ZigBee applications.
{"title":"Design of a low power wide range phase locked loop using 180nm CMOS technology","authors":"Sreedhar Vineel R. Kaipu, Kriti Vaish, Sneha Komatireddy, Akshat Sood, M. Goswami","doi":"10.1109/ICSPCOM.2016.7980621","DOIUrl":"https://doi.org/10.1109/ICSPCOM.2016.7980621","url":null,"abstract":"This paper presents the design of a third order, low power fully integrated phase-locked loop (PLL) with a wide range of 1.7GHz to 2.5GHz using UMC180nm CMOS technology. The model designed has a conventional Integer-N PLL based frequency synthesizer architecture with design modifications to the voltage controlled oscillator (VCO). The post layout results reveal that the jitter of the PLL after it has settled at a frequency of 2GHz at 14.1µs is around 35.26ps. The total power consumption of this PLL is 274.346uW when operated on 1.4/1.8V at an output frequency of 2GHz. This design takes an area of 0.11862 mm2 and can be used for ZigBee applications.","PeriodicalId":213713,"journal":{"name":"2016 International Conference on Signal Processing and Communication (ICSC)","volume":"9 49","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131437008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/ICSPCOM.2016.7980555
P. Puri
This paper describes a single amplify-and-forward relay assisted multiple user-pair free space optical (FSO) communication system. It is assumed a line-of-sight link does not exist between the nodes of a user-pair and the communication link between them is established using a relay. Among the multiple user-pairs, the user-pair having the maximum instantaneous signal-to-noise ratio is selected by the relay. For the considered system model, closed form expression of the system outage probability is derived in terms of the Meijer's-G function considering independent but not necessarily identically distributed (i.n.i.d.) fading channels. It is shown by numerical analysis that by carrying out user-pair selection the system performance significantly improves.
{"title":"User-pair selection in amplify-and-forward based FSO networks","authors":"P. Puri","doi":"10.1109/ICSPCOM.2016.7980555","DOIUrl":"https://doi.org/10.1109/ICSPCOM.2016.7980555","url":null,"abstract":"This paper describes a single amplify-and-forward relay assisted multiple user-pair free space optical (FSO) communication system. It is assumed a line-of-sight link does not exist between the nodes of a user-pair and the communication link between them is established using a relay. Among the multiple user-pairs, the user-pair having the maximum instantaneous signal-to-noise ratio is selected by the relay. For the considered system model, closed form expression of the system outage probability is derived in terms of the Meijer's-G function considering independent but not necessarily identically distributed (i.n.i.d.) fading channels. It is shown by numerical analysis that by carrying out user-pair selection the system performance significantly improves.","PeriodicalId":213713,"journal":{"name":"2016 International Conference on Signal Processing and Communication (ICSC)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115162659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/ICSPCOM.2016.7980586
J. Panda, Satvik Maurya, Radhika Dang, B. Narayanapuram
In this paper we use the Dual Tree Complex Wavelet Transform (DT - CWT) to watermark an image using a binary watermark which is blind in nature. It was observed that when Just Noticeable Difference (JND) of the image is used as a strength multiplier of the watermark while embedding the binary image in the DT - CWT coefficients of the host image, there is a significant improvement in the robustness of the watermarking technique. Finally, we test and compare the robustness of the non - JND watermarking procedure with the JND technique to measure the performance of the watermark against the effect of various attacks. The experimental result indicates that the use of JND in the image watermarking scheme can improve the robustness of the watermarked image against various image processing and noise based attacks especially JPEG compression and image rotation.
{"title":"Analysis of robustness of an image watermarking algorithm using the Dual Tree Complex Wavelet Transform and Just Noticeable Difference","authors":"J. Panda, Satvik Maurya, Radhika Dang, B. Narayanapuram","doi":"10.1109/ICSPCOM.2016.7980586","DOIUrl":"https://doi.org/10.1109/ICSPCOM.2016.7980586","url":null,"abstract":"In this paper we use the Dual Tree Complex Wavelet Transform (DT - CWT) to watermark an image using a binary watermark which is blind in nature. It was observed that when Just Noticeable Difference (JND) of the image is used as a strength multiplier of the watermark while embedding the binary image in the DT - CWT coefficients of the host image, there is a significant improvement in the robustness of the watermarking technique. Finally, we test and compare the robustness of the non - JND watermarking procedure with the JND technique to measure the performance of the watermark against the effect of various attacks. The experimental result indicates that the use of JND in the image watermarking scheme can improve the robustness of the watermarked image against various image processing and noise based attacks especially JPEG compression and image rotation.","PeriodicalId":213713,"journal":{"name":"2016 International Conference on Signal Processing and Communication (ICSC)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132689653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/ICSPCOM.2016.7980573
Abhishek Kashyap, R. Parmar, B. Suresh, Megha Agarwal, Hariom Gupta
Digital Images are everywhere, in newspapers, on the covers of the magazine, in courtrooms and all over the internet. Throughout the day, we are exposed to them and most of the time we trust what we see. Due to the presence of powerful editing software in the market, there is uncertainty on the credibility of the digital images as these might be manipulated, therefore we propose the methodology to identify the duplicated image based on edge analysis method. The proposed method is able to identify forged area of an image and it's accuracy is 81.50% with in small processing time.
{"title":"Detection of digital image forgery using wavelet decomposition and outline analysis","authors":"Abhishek Kashyap, R. Parmar, B. Suresh, Megha Agarwal, Hariom Gupta","doi":"10.1109/ICSPCOM.2016.7980573","DOIUrl":"https://doi.org/10.1109/ICSPCOM.2016.7980573","url":null,"abstract":"Digital Images are everywhere, in newspapers, on the covers of the magazine, in courtrooms and all over the internet. Throughout the day, we are exposed to them and most of the time we trust what we see. Due to the presence of powerful editing software in the market, there is uncertainty on the credibility of the digital images as these might be manipulated, therefore we propose the methodology to identify the duplicated image based on edge analysis method. The proposed method is able to identify forged area of an image and it's accuracy is 81.50% with in small processing time.","PeriodicalId":213713,"journal":{"name":"2016 International Conference on Signal Processing and Communication (ICSC)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134474041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/ICSPCOM.2016.7980630
S. Pratiher, S. Mukhopadhyay, Ritwik Barman, S. Pratiher, S. Dey, S. Banerjee, P. Panigrahi
Recurrence quantification analysis (RQA) deals with the nonlinear and non-stationarity of dynamical systems and quantifies the recurrence number and duration of phase space trajectory. In this paper, RQA has been used to analyze the phase transitions of rainfall and temperature fluctuations as well as their transient interdependencies, of places in and around districts of West Bengal, India. This is followed by a unit root nonstationary linear forecasting using ARIMA method. Mean square error of −0.497, validates the efficacy of the proposed methodology in forecasting.
{"title":"Recurrence quantification & ARIMA based forecasting of rainfall-temperature dynamics","authors":"S. Pratiher, S. Mukhopadhyay, Ritwik Barman, S. Pratiher, S. Dey, S. Banerjee, P. Panigrahi","doi":"10.1109/ICSPCOM.2016.7980630","DOIUrl":"https://doi.org/10.1109/ICSPCOM.2016.7980630","url":null,"abstract":"Recurrence quantification analysis (RQA) deals with the nonlinear and non-stationarity of dynamical systems and quantifies the recurrence number and duration of phase space trajectory. In this paper, RQA has been used to analyze the phase transitions of rainfall and temperature fluctuations as well as their transient interdependencies, of places in and around districts of West Bengal, India. This is followed by a unit root nonstationary linear forecasting using ARIMA method. Mean square error of −0.497, validates the efficacy of the proposed methodology in forecasting.","PeriodicalId":213713,"journal":{"name":"2016 International Conference on Signal Processing and Communication (ICSC)","volume":"11 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133043134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/ICSPCOM.2016.7980542
K. Sharma, Amita Rana, B. Aneja
the paper presents a cognitive radio networks which proposes a novel method of channel assessment analysis with dynamic channel allocation with the help of priority scheduling and improvement in data transmission. The paper first deals with the selection of a novel approach to sense the available spectrum in the area and then simulate a co-operative spectrum sensing system. The co-operative spectrum sensing system is a fuzzy-logic based decision making centre that assigns priority to the channels sensed by secondary users in the network. The decision is made by considering various parameters of the secondary users present in the network such as- distance, mobility and spectrum utilization efficiency. The next part of the proposed system is a fuzzy based model to design an adaptive modulation coding system for the cognitive radio user. This model adaptively suggests the change required for the data transmission rate by taking inputs as- SNR of the channel, BER and the present modulation scheme. The paper works on the improvement of the transmission by changing the modulation scheme for the secondary transmission whenever required to maintain an average bit-error rate (BER).
{"title":"A fuzzy-logic based framework for dynamic channel allocation with improved transmission in cognitive radio","authors":"K. Sharma, Amita Rana, B. Aneja","doi":"10.1109/ICSPCOM.2016.7980542","DOIUrl":"https://doi.org/10.1109/ICSPCOM.2016.7980542","url":null,"abstract":"the paper presents a cognitive radio networks which proposes a novel method of channel assessment analysis with dynamic channel allocation with the help of priority scheduling and improvement in data transmission. The paper first deals with the selection of a novel approach to sense the available spectrum in the area and then simulate a co-operative spectrum sensing system. The co-operative spectrum sensing system is a fuzzy-logic based decision making centre that assigns priority to the channels sensed by secondary users in the network. The decision is made by considering various parameters of the secondary users present in the network such as- distance, mobility and spectrum utilization efficiency. The next part of the proposed system is a fuzzy based model to design an adaptive modulation coding system for the cognitive radio user. This model adaptively suggests the change required for the data transmission rate by taking inputs as- SNR of the channel, BER and the present modulation scheme. The paper works on the improvement of the transmission by changing the modulation scheme for the secondary transmission whenever required to maintain an average bit-error rate (BER).","PeriodicalId":213713,"journal":{"name":"2016 International Conference on Signal Processing and Communication (ICSC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117109799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/ICSPCOM.2016.7980553
Mathew H. Henderson, B. Rawat
This research presents a novel approach to improving power consumption in a coherent optical network. The rationale of this paper is to examine a method of reutilizing an optical carrier wave at the receiving end of a transport system. This method provides a means to save energy associated with the creation of the carrier wave for the purpose of data transmission at the distant end. In this embodiment, an amplitude shift key modulated signal with homodyne coherent detection is considered. Factors such as comparative power losses and bit-error rates are examined.
{"title":"Carrier reutilization in a coherent optical network","authors":"Mathew H. Henderson, B. Rawat","doi":"10.1109/ICSPCOM.2016.7980553","DOIUrl":"https://doi.org/10.1109/ICSPCOM.2016.7980553","url":null,"abstract":"This research presents a novel approach to improving power consumption in a coherent optical network. The rationale of this paper is to examine a method of reutilizing an optical carrier wave at the receiving end of a transport system. This method provides a means to save energy associated with the creation of the carrier wave for the purpose of data transmission at the distant end. In this embodiment, an amplitude shift key modulated signal with homodyne coherent detection is considered. Factors such as comparative power losses and bit-error rates are examined.","PeriodicalId":213713,"journal":{"name":"2016 International Conference on Signal Processing and Communication (ICSC)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115143299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/ICSPCOM.2016.7980578
A. Pandey, D. Rajpoot
In today's era, the increasing demand of recommendation system has shown its applicability in a variety of applications. Such system makes use of various data mining techniques and algorithms in order to identify the accurate choice of item from billion of products for a particular user. This system is classified into various parts namely, Collaborative filtering, Content based filtering, Knowledge based filtering and Hybrid approach. However, recommendation system has inadvertently been an attack target since its inception. For instance, it is faced with many challenges such as gray sheep problems, shilling attacks, synonymy, scalability, data sparsity, cold start that affects the overall performance of the system. Among these challenges, cold start problem is of prime concern as it makes the system complex by not containing any prior rating history and involves three cases: recommendation for new user, recommendation for new product and recommendation of new product for new user. Therefore, in this paper, recommendation for new user in system has been focused. For such system, demographic trend by finding similarity between old user and new user has been followed. The proposed work is based on movie recommendation and has been implemented using MovieLens Dataset.
{"title":"Resolving Cold Start problem in recommendation system using demographic approach","authors":"A. Pandey, D. Rajpoot","doi":"10.1109/ICSPCOM.2016.7980578","DOIUrl":"https://doi.org/10.1109/ICSPCOM.2016.7980578","url":null,"abstract":"In today's era, the increasing demand of recommendation system has shown its applicability in a variety of applications. Such system makes use of various data mining techniques and algorithms in order to identify the accurate choice of item from billion of products for a particular user. This system is classified into various parts namely, Collaborative filtering, Content based filtering, Knowledge based filtering and Hybrid approach. However, recommendation system has inadvertently been an attack target since its inception. For instance, it is faced with many challenges such as gray sheep problems, shilling attacks, synonymy, scalability, data sparsity, cold start that affects the overall performance of the system. Among these challenges, cold start problem is of prime concern as it makes the system complex by not containing any prior rating history and involves three cases: recommendation for new user, recommendation for new product and recommendation of new product for new user. Therefore, in this paper, recommendation for new user in system has been focused. For such system, demographic trend by finding similarity between old user and new user has been followed. The proposed work is based on movie recommendation and has been implemented using MovieLens Dataset.","PeriodicalId":213713,"journal":{"name":"2016 International Conference on Signal Processing and Communication (ICSC)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115403454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/ICSPCOM.2016.7980575
A. Joshi, Nikita Airee, Bhavya Shukla, S. Bali
In this paper, we evaluate the performance of a 2×1 Alamouti Space Time Block Code system in multipath fading environments in terms of Bit Error Rate (BER). The system is evaluated for varying modulation schemes at the transmitter namely BPSK, QPSK, 8PSK and 16QAM. Besides, the system performance in case of perfect channel side information (CSI) and estimated channel information is also compared. Pilot symbols orthogonal to each other are used for channel estimation using Least Square method while linear and cubic spline interpolation techniques are applied to evaluate channel for non-pilot data symbols. Rayleigh and Rician (K-factor = 10 dB) fading conditions are used as the wireless channel models.
{"title":"Extensive performance analysis of STBC system with and without perfect CSI in various fading channels","authors":"A. Joshi, Nikita Airee, Bhavya Shukla, S. Bali","doi":"10.1109/ICSPCOM.2016.7980575","DOIUrl":"https://doi.org/10.1109/ICSPCOM.2016.7980575","url":null,"abstract":"In this paper, we evaluate the performance of a 2×1 Alamouti Space Time Block Code system in multipath fading environments in terms of Bit Error Rate (BER). The system is evaluated for varying modulation schemes at the transmitter namely BPSK, QPSK, 8PSK and 16QAM. Besides, the system performance in case of perfect channel side information (CSI) and estimated channel information is also compared. Pilot symbols orthogonal to each other are used for channel estimation using Least Square method while linear and cubic spline interpolation techniques are applied to evaluate channel for non-pilot data symbols. Rayleigh and Rician (K-factor = 10 dB) fading conditions are used as the wireless channel models.","PeriodicalId":213713,"journal":{"name":"2016 International Conference on Signal Processing and Communication (ICSC)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121569302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/ICSPCOM.2016.7980561
N. Narang, S. Dubey, P. S. Negi, V. N. Ojha
A dual-band Electric (E-) field probe of 950MHz and 2.45GHz (bandwidth of 100MHz and 300MHz respectively) based on coplanar waveguide (CPW)-fed microstrip antenna is used to measure the E-field strength inside the transverse electromagnetic (TEM) cell. The paper discusses the design, optimization, fabrication and characterization of the E-field probe. Theoretical, simulated and measured E-field strength has been reported. For validation purpose, the results are compared against theoretical values and standard E-field probe and are found in agreement.
{"title":"Precise E-field measurement inside TEM cell at GSM frequencies using microstrip E-field probe","authors":"N. Narang, S. Dubey, P. S. Negi, V. N. Ojha","doi":"10.1109/ICSPCOM.2016.7980561","DOIUrl":"https://doi.org/10.1109/ICSPCOM.2016.7980561","url":null,"abstract":"A dual-band Electric (E-) field probe of 950MHz and 2.45GHz (bandwidth of 100MHz and 300MHz respectively) based on coplanar waveguide (CPW)-fed microstrip antenna is used to measure the E-field strength inside the transverse electromagnetic (TEM) cell. The paper discusses the design, optimization, fabrication and characterization of the E-field probe. Theoretical, simulated and measured E-field strength has been reported. For validation purpose, the results are compared against theoretical values and standard E-field probe and are found in agreement.","PeriodicalId":213713,"journal":{"name":"2016 International Conference on Signal Processing and Communication (ICSC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128907643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}