Pub Date : 2014-05-08DOI: 10.1109/ICACCCT.2014.7019243
C. Suresh Kumar, A. Julian
Today's technology has innumerable wearable solutions to alleviate the problems of disabled persons. The solution presented here is for the visually impaired persons and proposes to develop a wearable device that uses embedded system technology for data input functionalities in a hand glove based keyboard. The hand mounted keypad is easily adaptable by the user and provides flexibility as no prior knowledge is required to handle the hand mounted wearable device. The key glove acts as a prototype which enables the user to have the total functionality of a keyboard in one hand. Key glove is attached with alpha numeric keypad buttons that are mounted on the gloves. The character or number is generated by using mode Selection. (Alpha/Num). The hand mounted keypad can be interfaced with any kind of display device. It can be used for the visually impaired person to send message/call from one person to another using GSM modem. The GSM modem is attached with the gloves. Reply Message from others can be converted into text to voice format using Robo voice shield. The efficiency of the proposed work is evaluated with reference to decreased error rate and increased speed of operation. Voice conversion is also added to this device.
{"title":"Wearable messaging device for visually impaired person","authors":"C. Suresh Kumar, A. Julian","doi":"10.1109/ICACCCT.2014.7019243","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019243","url":null,"abstract":"Today's technology has innumerable wearable solutions to alleviate the problems of disabled persons. The solution presented here is for the visually impaired persons and proposes to develop a wearable device that uses embedded system technology for data input functionalities in a hand glove based keyboard. The hand mounted keypad is easily adaptable by the user and provides flexibility as no prior knowledge is required to handle the hand mounted wearable device. The key glove acts as a prototype which enables the user to have the total functionality of a keyboard in one hand. Key glove is attached with alpha numeric keypad buttons that are mounted on the gloves. The character or number is generated by using mode Selection. (Alpha/Num). The hand mounted keypad can be interfaced with any kind of display device. It can be used for the visually impaired person to send message/call from one person to another using GSM modem. The GSM modem is attached with the gloves. Reply Message from others can be converted into text to voice format using Robo voice shield. The efficiency of the proposed work is evaluated with reference to decreased error rate and increased speed of operation. Voice conversion is also added to this device.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"235 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122834313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-08DOI: 10.1109/ICACCCT.2014.7019419
B. Balamurugan, P. Venkata krishna, Lakshmi G. V. Rajya, N. Saravana Kumar
Cloud computing is a paradigm shift from traditional computing offers services that can use ubiquitous internet to transmit data and other functionalities. The health care plays a vital role involved in mundane activities of human life. In proposed work, the efficient framework for health care system using Cloud is achieved through the segmentation algorithm and deployed. Albeit, the layered design of data storage is well-organized for huge critical data and developed with high level security and access control. The framework overcomes the impact created by attacks withstand along with security and privacy flaws of the Cloud. The integration and data sharing of hospital information is made possible using hybrid Cloud. Our framework utilizes the algebraic way of data possession for Cloud auditing those results is cost effective method for overall health care systems with high level of security standards.
{"title":"Layered storage architecture for health system using cloud","authors":"B. Balamurugan, P. Venkata krishna, Lakshmi G. V. Rajya, N. Saravana Kumar","doi":"10.1109/ICACCCT.2014.7019419","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019419","url":null,"abstract":"Cloud computing is a paradigm shift from traditional computing offers services that can use ubiquitous internet to transmit data and other functionalities. The health care plays a vital role involved in mundane activities of human life. In proposed work, the efficient framework for health care system using Cloud is achieved through the segmentation algorithm and deployed. Albeit, the layered design of data storage is well-organized for huge critical data and developed with high level security and access control. The framework overcomes the impact created by attacks withstand along with security and privacy flaws of the Cloud. The integration and data sharing of hospital information is made possible using hybrid Cloud. Our framework utilizes the algebraic way of data possession for Cloud auditing those results is cost effective method for overall health care systems with high level of security standards.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125570763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-08DOI: 10.1109/ICACCCT.2014.7019434
A. Prasanthi, Sindhu T.K
FACTS, is an effective means to enhance capacity of existing power transmission network to their maximum limits. This paper deals with an approach for the optimal allocation of FACTS devices in a power system network to improve line loadability and provide voltage support and thus minimize total generation cost. Minimizing total generation cost implies optimal scheduling of generation by different generator units to satisfy load demand. The same objective is analysed in a normal power system and to a system with the integration of wind energy. In the wind energy integrated system the objective function is to minimize the standard deviation of voltage in the system so as to reduce the voltage flicker. As FACTS devices are costly devices and improper placement leads to voltage instability, optimal allocation of FACTS devices is important. Particle Swarm Optimization method is used for optimization and is implemented using MATLAB programming.
{"title":"Optimal placement and rating of FACTS devices for congestion management in power system without and with wind energy integration","authors":"A. Prasanthi, Sindhu T.K","doi":"10.1109/ICACCCT.2014.7019434","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019434","url":null,"abstract":"FACTS, is an effective means to enhance capacity of existing power transmission network to their maximum limits. This paper deals with an approach for the optimal allocation of FACTS devices in a power system network to improve line loadability and provide voltage support and thus minimize total generation cost. Minimizing total generation cost implies optimal scheduling of generation by different generator units to satisfy load demand. The same objective is analysed in a normal power system and to a system with the integration of wind energy. In the wind energy integrated system the objective function is to minimize the standard deviation of voltage in the system so as to reduce the voltage flicker. As FACTS devices are costly devices and improper placement leads to voltage instability, optimal allocation of FACTS devices is important. Particle Swarm Optimization method is used for optimization and is implemented using MATLAB programming.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127140273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-08DOI: 10.1109/ICACCCT.2014.7019227
R. Dhaya, M. Poongodi
Now a day's mobile devices like Smartphone, tablets and Personal Digital Assistants etc. were playing most essential part in our daily lives. A high-end mobile device performs the same functionality as computers. Android based smart phone has become more vulnerable, because of an open source operating system. Anyone can develop a new application and post it into android market. These types of applications were not verified by authorized company. So it may include malevolent applications it may be virus, spyware, worms, etc. which can cause system failure, wasting memory resources, corrupting data, stealing personal information and also increases the maintenance cost. Due to these reasons, the mobile phone security or mobile security is very essential one in mobile computing. In the existing system is not able to detect new viruses, due to the limitation of updated signatures. The proposed system aims to motivate static code analysis based malware detection using search based machine learning algorithm which is called N-gram analysis and it detects the unnoticed malicious characteristics or vulnerabilities in the mobile applications.
{"title":"Detecting software vulnerabilities in android using static analysis","authors":"R. Dhaya, M. Poongodi","doi":"10.1109/ICACCCT.2014.7019227","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019227","url":null,"abstract":"Now a day's mobile devices like Smartphone, tablets and Personal Digital Assistants etc. were playing most essential part in our daily lives. A high-end mobile device performs the same functionality as computers. Android based smart phone has become more vulnerable, because of an open source operating system. Anyone can develop a new application and post it into android market. These types of applications were not verified by authorized company. So it may include malevolent applications it may be virus, spyware, worms, etc. which can cause system failure, wasting memory resources, corrupting data, stealing personal information and also increases the maintenance cost. Due to these reasons, the mobile phone security or mobile security is very essential one in mobile computing. In the existing system is not able to detect new viruses, due to the limitation of updated signatures. The proposed system aims to motivate static code analysis based malware detection using search based machine learning algorithm which is called N-gram analysis and it detects the unnoticed malicious characteristics or vulnerabilities in the mobile applications.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114280433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-08DOI: 10.1109/ICACCCT.2014.7019405
A. S. Deepiga, Senthil Velan S, C. Babu
Service Oriented Architecture (SOA) is an architectural style used to provide services to consumers that promotes loose coupling between services. The scattered and tangled functionalities modeled in an SOA application can be redesigned using Aspect Oriented Programming (AOP). This results in two sets of services, the first set having services for the base functionalities and the other modeling cross-cutting functionalities. During compilation, cross-cutting functionalities in the second set are woven to the functionalities modeled in the first set. By introducing AOP in SOA, the quality attributes such as re-usability, extendibility and maintainability can be improved. The objective of this paper is to perform an empirical investigation by quantitatively measuring the effect of introducing Aspect Orientation (AO) in SOA by developing with multiple versions of a given application. An AO based SOA application (University Automation System) for automating the functionalities of a typical University with multiple versions has been developed as an experimental test bed. An equivalent set of versions without introducing aspectization are also developed in parallel. The values of the AOP metrics are measured for the different versions of University Automation System both aspectized and unaspectized. The measured values show that the quality attributes namely maintainability, reusability and extendibility improve whereas the complexity of the application decreases during the evolution of the case study application.
{"title":"Empirical investigation of introducing Aspect Oriented Programming across versions of an SOA application","authors":"A. S. Deepiga, Senthil Velan S, C. Babu","doi":"10.1109/ICACCCT.2014.7019405","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019405","url":null,"abstract":"Service Oriented Architecture (SOA) is an architectural style used to provide services to consumers that promotes loose coupling between services. The scattered and tangled functionalities modeled in an SOA application can be redesigned using Aspect Oriented Programming (AOP). This results in two sets of services, the first set having services for the base functionalities and the other modeling cross-cutting functionalities. During compilation, cross-cutting functionalities in the second set are woven to the functionalities modeled in the first set. By introducing AOP in SOA, the quality attributes such as re-usability, extendibility and maintainability can be improved. The objective of this paper is to perform an empirical investigation by quantitatively measuring the effect of introducing Aspect Orientation (AO) in SOA by developing with multiple versions of a given application. An AO based SOA application (University Automation System) for automating the functionalities of a typical University with multiple versions has been developed as an experimental test bed. An equivalent set of versions without introducing aspectization are also developed in parallel. The values of the AOP metrics are measured for the different versions of University Automation System both aspectized and unaspectized. The measured values show that the quality attributes namely maintainability, reusability and extendibility improve whereas the complexity of the application decreases during the evolution of the case study application.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122306530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-08DOI: 10.1109/ICACCCT.2014.7019287
M. Anitha, G. Ananthi
This paper deals with performance analysis such as outage probability and transmission capacity of Multiple Input Multiple Output (MIMO) ad-hoc network with channel state information at transmitter (CSIT). Network formed by scattering a fixed and finite number of nodes in a given area. This type of nodal arrangement is a Binomial point process (BPP) where area or volume of deployment is finite and number of nodes in disjoint sets is dependent. In this paper, Transmit Beamforming is used at the transmitter, while the receiver uses partial zero forcing to cancel certain interferers using some of its spatial receive degrees of freedom (SRDOF) with CSIT case. The distribution of internode distance is characterized in a Binomial network where the number of nodes is independently distributed. Using this binomial distribution, the Euclidean distance is derived to design outage probability that provide the upper bound and lower bound on the transmission capacity of an ad-hoc network. The simulation results and theoretical results are presented in lieu of validating results.
{"title":"MIMO ad hoc networks with CSIT in a Binomial field","authors":"M. Anitha, G. Ananthi","doi":"10.1109/ICACCCT.2014.7019287","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019287","url":null,"abstract":"This paper deals with performance analysis such as outage probability and transmission capacity of Multiple Input Multiple Output (MIMO) ad-hoc network with channel state information at transmitter (CSIT). Network formed by scattering a fixed and finite number of nodes in a given area. This type of nodal arrangement is a Binomial point process (BPP) where area or volume of deployment is finite and number of nodes in disjoint sets is dependent. In this paper, Transmit Beamforming is used at the transmitter, while the receiver uses partial zero forcing to cancel certain interferers using some of its spatial receive degrees of freedom (SRDOF) with CSIT case. The distribution of internode distance is characterized in a Binomial network where the number of nodes is independently distributed. Using this binomial distribution, the Euclidean distance is derived to design outage probability that provide the upper bound and lower bound on the transmission capacity of an ad-hoc network. The simulation results and theoretical results are presented in lieu of validating results.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122207314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-08DOI: 10.1109/ICACCCT.2014.7019408
Mukesh Kant Tripathi, V. Sehgal
Nowadays cloud computing receiving a great deal of attention. Cloud computing is a subscription based service which offers dynamic, scalable, shared and elastic resources like storage, softwares, computing power etc. from by remote cloud data centers to the customers like government authority, business organizations, individuals etc. Trust is an important factor in cloud computing. The facilities provide by cloud computing is too attractive for customers but it has a distributed and non-transparent nature due to this there may be some obstacles in using cloud computing services, because users lose their control over data and they are not sure about whether cloud providers can be trusted or not. They are confused with cloud providers regarding trust issue. This paper mainly focuses on inter-clouds for establishing trust in cloud computing environment. The aim is to promote the use of inter-clouds in cloud computing environment.
{"title":"Establishing trust in cloud computing security with the help of inter-clouds","authors":"Mukesh Kant Tripathi, V. Sehgal","doi":"10.1109/ICACCCT.2014.7019408","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019408","url":null,"abstract":"Nowadays cloud computing receiving a great deal of attention. Cloud computing is a subscription based service which offers dynamic, scalable, shared and elastic resources like storage, softwares, computing power etc. from by remote cloud data centers to the customers like government authority, business organizations, individuals etc. Trust is an important factor in cloud computing. The facilities provide by cloud computing is too attractive for customers but it has a distributed and non-transparent nature due to this there may be some obstacles in using cloud computing services, because users lose their control over data and they are not sure about whether cloud providers can be trusted or not. They are confused with cloud providers regarding trust issue. This paper mainly focuses on inter-clouds for establishing trust in cloud computing environment. The aim is to promote the use of inter-clouds in cloud computing environment.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125720075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-08DOI: 10.1109/ICACCCT.2014.7019320
Yashika Katyal, Suhas V. Alur, Shipra Dwivedi, R. Menaka
Depression is a common phenomenon in the present scenario. Due to the fast pace at which our lives move and immense pressure that we face adolescents, office goers and even the elders face depression. Diagnosing depression in the early curable stages is very important and may even save the life of a patient. EEG signal analysis has been used for medical research like epilepsy, sleep disorder, insomnia etc. Similarly, video signal analysis has been used for facial features detection, eye movement, emotion recognition etc. Collaborating both the methods accuracy of depression detection can be improved upon. This paper describes a novel method for combining both EEG signal analysis and facial emotion recognition through video analysis to successfully categorize depression into various levels. For this aim, power spectrum of three frequency bands (alpha, beta, and theta) and the whole bands of EEG are used as features along with standard deviation, mean and entropy.
{"title":"EEG signal and video analysis based depression indication","authors":"Yashika Katyal, Suhas V. Alur, Shipra Dwivedi, R. Menaka","doi":"10.1109/ICACCCT.2014.7019320","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019320","url":null,"abstract":"Depression is a common phenomenon in the present scenario. Due to the fast pace at which our lives move and immense pressure that we face adolescents, office goers and even the elders face depression. Diagnosing depression in the early curable stages is very important and may even save the life of a patient. EEG signal analysis has been used for medical research like epilepsy, sleep disorder, insomnia etc. Similarly, video signal analysis has been used for facial features detection, eye movement, emotion recognition etc. Collaborating both the methods accuracy of depression detection can be improved upon. This paper describes a novel method for combining both EEG signal analysis and facial emotion recognition through video analysis to successfully categorize depression into various levels. For this aim, power spectrum of three frequency bands (alpha, beta, and theta) and the whole bands of EEG are used as features along with standard deviation, mean and entropy.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121161322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-08DOI: 10.1109/ICACCCT.2014.7019318
Sharvari S S Deshpande, A. Wakankar
Polycystic Ovarian Syndrome (PCOS) is one of the most common hormonal disorder present in females in reproductive age group. Early detection and treatment of PCOS is important since it is often associated with obesity, type 2 diabetes mellitus, and high cholesterol levels. In this paper, automated detection of PCOS is done by calculating no of follicles in ovarian ultrasound image and then incorporating clinical, biochemical and imaging parameters to classify patients in two groups i.e. normal and PCOS affected. Number of follicles are detected by ovarian ultrasound image processing using preprocessing which includes contrast enhancement and filtering, feature extraction using Multiscale morphological approach and segmentation. Support Vector Machine algorithm is used for classification which takes into account all the parameters such as body mass index (BMI), hormonal levels, menstrual cycle length and no of follicles detected in ovarian ultrasound image processing. The results obtained are verified by doctors and compared with manual detection. The accuracy obtained for the proposed method is 95%.
{"title":"Automated detection of Polycystic Ovarian Syndrome using follicle recognition","authors":"Sharvari S S Deshpande, A. Wakankar","doi":"10.1109/ICACCCT.2014.7019318","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019318","url":null,"abstract":"Polycystic Ovarian Syndrome (PCOS) is one of the most common hormonal disorder present in females in reproductive age group. Early detection and treatment of PCOS is important since it is often associated with obesity, type 2 diabetes mellitus, and high cholesterol levels. In this paper, automated detection of PCOS is done by calculating no of follicles in ovarian ultrasound image and then incorporating clinical, biochemical and imaging parameters to classify patients in two groups i.e. normal and PCOS affected. Number of follicles are detected by ovarian ultrasound image processing using preprocessing which includes contrast enhancement and filtering, feature extraction using Multiscale morphological approach and segmentation. Support Vector Machine algorithm is used for classification which takes into account all the parameters such as body mass index (BMI), hormonal levels, menstrual cycle length and no of follicles detected in ovarian ultrasound image processing. The results obtained are verified by doctors and compared with manual detection. The accuracy obtained for the proposed method is 95%.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127289710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-08DOI: 10.1109/ICACCCT.2014.7019486
N. S. Shymna Nizar, A. R. Krishna
Fast Fourier Transforms have become an integral part of any digital communication system and a wide variety of approaches have been tried in order to optimize the algorithm for a variety of parameters, primarily being memory and speed. Major problem in FFT calculation is the increased number of complex multiplication units. Folding transformations are used to design FFT architectures with reduced number of functional units. In the folding transformation, many butterflies in the same column can be mapped to one butterfly unit. A highly efficient pipelined folded FFT architecture for 8 point R2 FFT is presented here. When compared with the normal R2 FFT architecture, the pipelined architecture shows efficiency both in speed and area consumption. Futher reduction in the area can be obtained by using COordinate Rotation for DIgital Computer (CORDIC) algorithm, which is an add and shift algorithm that replaces complex twiddle factor multiplication. The FFT block is designed to be capable of computing 8 point FFT and employs R2 (Radix2) architecture which is simple, elegant and best suited for communication applications. VHDL coding is simulated and synthesized in Xilinx ISE Design Suite 12.1.
快速傅里叶变换已经成为任何数字通信系统的一个组成部分,并且已经尝试了各种各样的方法来优化各种参数的算法,主要是内存和速度。FFT计算的主要问题是复杂乘法单元数量的增加。折叠变换用于设计功能单元数量减少的FFT体系结构。在折叠变换中,同一列中的许多蝴蝶可以映射到一个蝴蝶单元。本文提出了一种用于8点R2 FFT的高效流水线折叠FFT架构。与普通的R2 FFT结构相比,流水线结构在速度和面积消耗方面都显示出效率。利用坐标旋转算法(COordinate Rotation for DIgital Computer, CORDIC)可以进一步缩小面积。CORDIC算法是一种取代复杂旋转因子乘法的加移位算法。FFT模块设计为能够计算8点FFT,采用简单,优雅,最适合通信应用的R2 (Radix2)架构。在Xilinx ISE Design Suite 12.1中模拟和合成了VHDL编码。
{"title":"An efficient folded pipelined architecture for Fast Fourier Transform using Cordic algorithm","authors":"N. S. Shymna Nizar, A. R. Krishna","doi":"10.1109/ICACCCT.2014.7019486","DOIUrl":"https://doi.org/10.1109/ICACCCT.2014.7019486","url":null,"abstract":"Fast Fourier Transforms have become an integral part of any digital communication system and a wide variety of approaches have been tried in order to optimize the algorithm for a variety of parameters, primarily being memory and speed. Major problem in FFT calculation is the increased number of complex multiplication units. Folding transformations are used to design FFT architectures with reduced number of functional units. In the folding transformation, many butterflies in the same column can be mapped to one butterfly unit. A highly efficient pipelined folded FFT architecture for 8 point R2 FFT is presented here. When compared with the normal R2 FFT architecture, the pipelined architecture shows efficiency both in speed and area consumption. Futher reduction in the area can be obtained by using COordinate Rotation for DIgital Computer (CORDIC) algorithm, which is an add and shift algorithm that replaces complex twiddle factor multiplication. The FFT block is designed to be capable of computing 8 point FFT and employs R2 (Radix2) architecture which is simple, elegant and best suited for communication applications. VHDL coding is simulated and synthesized in Xilinx ISE Design Suite 12.1.","PeriodicalId":239918,"journal":{"name":"2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies","volume":"171 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133119709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}