首页 > 最新文献

Proceedings of the 2014 IEEE Students' Technology Symposium最新文献

英文 中文
Text line identification in Tagore's manuscript 泰戈尔手稿中的文本线识别
Pub Date : 2014-08-28 DOI: 10.1109/TechSym.2014.6808048
Chandranath Adak, B. Chaudhuri
In this paper, a text line identification method is proposed. The text lines of printed document are easy to segment due to uniform straightness of the lines and sufficient gap between the lines. But in handwritten documents, the line is nonuniform and interline gaps are variable. We take Rabindranath Tagore's manuscript as it is one of the most difficult manuscripts that contain doodles. Our method consists of a preprocessing stage to clean the document image. Then we separate doodles from the manuscript to get the textual region. After that we identify the text lines on the manuscript. For text line identification, we use window examination, black run-length smearing, horizontal histogram and connected component analysis.
本文提出了一种文本行识别方法。打印文档的文本行由于线条的直线度均匀,线条之间有足够的间距,容易分割。但在手写文件中,线条是不均匀的,行间间隙是可变的。我们选择泰戈尔的手稿,因为它是包含涂鸦的最难的手稿之一。我们的方法包括一个预处理阶段来清理文档图像。然后我们将涂鸦从手稿中分离出来,得到文本区域。然后,我们在手稿上识别文本行。对于文本行识别,我们使用窗口检查,黑游程涂抹,水平直方图和连接成分分析。
{"title":"Text line identification in Tagore's manuscript","authors":"Chandranath Adak, B. Chaudhuri","doi":"10.1109/TechSym.2014.6808048","DOIUrl":"https://doi.org/10.1109/TechSym.2014.6808048","url":null,"abstract":"In this paper, a text line identification method is proposed. The text lines of printed document are easy to segment due to uniform straightness of the lines and sufficient gap between the lines. But in handwritten documents, the line is nonuniform and interline gaps are variable. We take Rabindranath Tagore's manuscript as it is one of the most difficult manuscripts that contain doodles. Our method consists of a preprocessing stage to clean the document image. Then we separate doodles from the manuscript to get the textual region. After that we identify the text lines on the manuscript. For text line identification, we use window examination, black run-length smearing, horizontal histogram and connected component analysis.","PeriodicalId":265072,"journal":{"name":"Proceedings of the 2014 IEEE Students' Technology Symposium","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130761018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A thermal and congestion driven global router for 3D integrated circuits 热和拥塞驱动的3D集成电路全局路由器
Pub Date : 2014-05-01 DOI: 10.1109/TECHSYM.2014.6808065
Debashri Roy, P. Ghosal, Nabanita Das
During recent days, the large problem space of very large scale integrated (VLSI) circuits has led global routing problem to a NP Complete one. With the advent of three dimensional integrated circuits (3D IC) the problem has become more complex. In this paper, a multi-objective global routing technique is formulated using fuzzy logic to get rid of the limitations of deterministic approaches. During global routing the decision is taken from a fuzzy logic expert system depending upon some generated pre-routing guiding information. Proposed approach is mainly focused on the modern generation 3D ICs. This primary work is mainly incorporated in the standard cell design for 3D ICs. A two-pin global router tool is designed based on the proposed algorithm resulting 85-97% routability in negligible time for ISPD'98 benchmarks.
近年来,超大规模集成电路(VLSI)的大问题空间使得全局路由问题成为NP完全问题。随着三维集成电路(3D IC)的出现,这个问题变得更加复杂。本文利用模糊逻辑提出了一种多目标全局路由技术,克服了确定性方法的局限性。在全局路由过程中,模糊逻辑专家系统根据生成的预路由引导信息进行决策。提出的方法主要针对现代3D集成电路。这项主要工作主要包含在3D集成电路的标准单元设计中。基于所提出的算法设计了一个双引脚全局路由工具,在ISPD'98基准测试中获得了85-97%的可达性,可忽略时间。
{"title":"A thermal and congestion driven global router for 3D integrated circuits","authors":"Debashri Roy, P. Ghosal, Nabanita Das","doi":"10.1109/TECHSYM.2014.6808065","DOIUrl":"https://doi.org/10.1109/TECHSYM.2014.6808065","url":null,"abstract":"During recent days, the large problem space of very large scale integrated (VLSI) circuits has led global routing problem to a NP Complete one. With the advent of three dimensional integrated circuits (3D IC) the problem has become more complex. In this paper, a multi-objective global routing technique is formulated using fuzzy logic to get rid of the limitations of deterministic approaches. During global routing the decision is taken from a fuzzy logic expert system depending upon some generated pre-routing guiding information. Proposed approach is mainly focused on the modern generation 3D ICs. This primary work is mainly incorporated in the standard cell design for 3D ICs. A two-pin global router tool is designed based on the proposed algorithm resulting 85-97% routability in negligible time for ISPD'98 benchmarks.","PeriodicalId":265072,"journal":{"name":"Proceedings of the 2014 IEEE Students' Technology Symposium","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127234279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Transverse non-uniform slotted substrate integrated waveguide leaky-wave antenna 横向非均匀槽基板集成波导漏波天线
Pub Date : 2014-05-01 DOI: 10.1109/TECHSYM.2014.6807929
N. Gupta, V. Kumar
A novel non-uniform slotted substrate integrated waveguide leaky wave antenna has been proposed. These nonuniform slots are used to reduce the side lobes and to improve the radiation efficiency. The proposed structure has enhanced antenna gain and reduced reflection loss. This leaky wave antenna works in TE10 mode. Three modes are propagating in the structure; leaky wave mode, proper waveguide mode and surface wave mode. The proposed non-uniform leaky wave antenna scans efficiently from broadside to end-fires. This type of substrate integrated waveguide leaky wave antenna has very narrow beam that scans with frequency change. The current flow on the top wall is interrupted by periodic non-uniform slots, which results the leakage. The leakage is only due the fast waves.
提出了一种新型的非均匀缝隙基板集成波导漏波天线。利用这些不均匀的狭缝可以减小侧叶,提高辐射效率。该结构提高了天线增益,降低了反射损耗。这种漏波天线在TE10模式下工作。三种模态在结构中传播;漏波模式、固有波导模式和表面波模式。所提出的非均匀漏波天线具有从舷侧到端火的有效扫描。这种类型的基板集成波导漏波天线具有非常窄的波束,可以随频率变化进行扫描。顶壁上的电流流动被周期性的非均匀槽所打断,从而导致泄漏。泄漏只是由快波引起的。
{"title":"Transverse non-uniform slotted substrate integrated waveguide leaky-wave antenna","authors":"N. Gupta, V. Kumar","doi":"10.1109/TECHSYM.2014.6807929","DOIUrl":"https://doi.org/10.1109/TECHSYM.2014.6807929","url":null,"abstract":"A novel non-uniform slotted substrate integrated waveguide leaky wave antenna has been proposed. These nonuniform slots are used to reduce the side lobes and to improve the radiation efficiency. The proposed structure has enhanced antenna gain and reduced reflection loss. This leaky wave antenna works in TE10 mode. Three modes are propagating in the structure; leaky wave mode, proper waveguide mode and surface wave mode. The proposed non-uniform leaky wave antenna scans efficiently from broadside to end-fires. This type of substrate integrated waveguide leaky wave antenna has very narrow beam that scans with frequency change. The current flow on the top wall is interrupted by periodic non-uniform slots, which results the leakage. The leakage is only due the fast waves.","PeriodicalId":265072,"journal":{"name":"Proceedings of the 2014 IEEE Students' Technology Symposium","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129232360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Design of modified rhomboidal dualband antenna for Bluetooth and UWB applications 用于蓝牙和超宽带应用的改进菱形双频天线的设计
Pub Date : 2014-05-01 DOI: 10.1109/TECHSYM.2014.6808077
A. Singh, G. Pandey, S. Kalraiya, H. Singh, M. K. Meshram
A compact size, low profile microstrip fed dual band planer monopole antenna is presented. The shape of main radiating element is modified rhomboidal that covers ultrawideband (UWB) frequency range. Further, to make dual band antenna without affecting the UWB range, stair shaped strip in elliptical shaped slot is loaded on main radiating element. The dual band antenna covers 2.36 to 2.49 GHz (Bluetooth) and 3.1GHz to 17 GHz (UWB) frequency bands. The antenna is designed on FR4 substrate of size 35 × 24 × 1.6mm3. The parametric analysis, impedance bandwidth, input impedance, gain etc. of antenna are computed using Ansoft HFSS.
提出了一种小尺寸、低轮廓微带馈电双频平面单极天线。主辐射元件的形状为改进的菱形,覆盖超宽带频率范围。为了在不影响超宽带范围的情况下制作双频天线,在主辐射单元上加载椭圆槽内的阶梯形带。双频天线覆盖2.36 ~ 2.49 GHz(蓝牙)频段和3.1 ~ 17 GHz(超宽带)频段。天线设计在尺寸为35 × 24 × 1.6mm3的FR4基板上。利用Ansoft HFSS软件对天线的参数分析、阻抗带宽、输入阻抗、增益等进行了计算。
{"title":"Design of modified rhomboidal dualband antenna for Bluetooth and UWB applications","authors":"A. Singh, G. Pandey, S. Kalraiya, H. Singh, M. K. Meshram","doi":"10.1109/TECHSYM.2014.6808077","DOIUrl":"https://doi.org/10.1109/TECHSYM.2014.6808077","url":null,"abstract":"A compact size, low profile microstrip fed dual band planer monopole antenna is presented. The shape of main radiating element is modified rhomboidal that covers ultrawideband (UWB) frequency range. Further, to make dual band antenna without affecting the UWB range, stair shaped strip in elliptical shaped slot is loaded on main radiating element. The dual band antenna covers 2.36 to 2.49 GHz (Bluetooth) and 3.1GHz to 17 GHz (UWB) frequency bands. The antenna is designed on FR4 substrate of size 35 × 24 × 1.6mm3. The parametric analysis, impedance bandwidth, input impedance, gain etc. of antenna are computed using Ansoft HFSS.","PeriodicalId":265072,"journal":{"name":"Proceedings of the 2014 IEEE Students' Technology Symposium","volume":"354 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113958624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A cascade framework for unoccluded and occluded pedestrian detection 一个用于未封闭和闭塞行人检测的级联框架
Pub Date : 2014-05-01 DOI: 10.1109/TECHSYM.2014.6807915
Aayush Ankit, Irfan Riaz Ahmad, Hyunchu Shin
This paper presents a novel pedestrian detection framework for efficient detection of both unoccluded and occluded pedestrians, thereby proposing an efficient technique for pedestrian detection in real-time environment. Our framework consists of two layers of detection, the first layer using full body detectors for accurate detection of unoccluded pedestrians and then a cascaded layer of part based detectors to efficiently detect the occluded pedestrians. The full body detectors based techniques are state-of-the art for unoccluded pedestrian detection and the part based model is a viable choice for partially occluded pedestrian detection. In our part based model, we use six parts; three horizontal parts and three vertical parts thereby creating a model that is robust to varying degrees and types of occlusions. Each detection layer utilizes multiple modalities (cues) namely; intensity, dense stereo and dense flow. The use of part based detectors as the cascaded layer also increases the unoccluded pedestrian detection rate by correctly detecting the pedestrians that had been misclassified by the first layer. Thus, the second layer of part based detectors has a synergic effect on the first layer.
本文提出了一种新的行人检测框架,可以有效地检测未遮挡和遮挡的行人,从而为实时环境下的行人检测提供了一种有效的技术。我们的框架由两层检测组成,第一层使用全身检测器精确检测未遮挡的行人,然后是基于部分检测器的级联层,以有效检测遮挡的行人。基于全身检测器的行人检测技术是目前无遮挡行人检测的最新技术,基于局部的行人检测模型是部分遮挡行人检测的可行选择。在基于零件的模型中,我们使用了六个零件;三个水平部分和三个垂直部分,从而创建一个对不同程度和类型的闭塞具有鲁棒性的模型。每个检测层利用多个模态(线索),即;强度大,密集立体,密集流动。使用基于部分的检测器作为级联层,通过正确检测被第一层错误分类的行人,提高了未包含行人的检测率。因此,第二层基于部分的检测器对第一层具有协同效应。
{"title":"A cascade framework for unoccluded and occluded pedestrian detection","authors":"Aayush Ankit, Irfan Riaz Ahmad, Hyunchu Shin","doi":"10.1109/TECHSYM.2014.6807915","DOIUrl":"https://doi.org/10.1109/TECHSYM.2014.6807915","url":null,"abstract":"This paper presents a novel pedestrian detection framework for efficient detection of both unoccluded and occluded pedestrians, thereby proposing an efficient technique for pedestrian detection in real-time environment. Our framework consists of two layers of detection, the first layer using full body detectors for accurate detection of unoccluded pedestrians and then a cascaded layer of part based detectors to efficiently detect the occluded pedestrians. The full body detectors based techniques are state-of-the art for unoccluded pedestrian detection and the part based model is a viable choice for partially occluded pedestrian detection. In our part based model, we use six parts; three horizontal parts and three vertical parts thereby creating a model that is robust to varying degrees and types of occlusions. Each detection layer utilizes multiple modalities (cues) namely; intensity, dense stereo and dense flow. The use of part based detectors as the cascaded layer also increases the unoccluded pedestrian detection rate by correctly detecting the pedestrians that had been misclassified by the first layer. Thus, the second layer of part based detectors has a synergic effect on the first layer.","PeriodicalId":265072,"journal":{"name":"Proceedings of the 2014 IEEE Students' Technology Symposium","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127749383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Re-defining learning experience for kids 重新定义孩子的学习体验
Pub Date : 2014-05-01 DOI: 10.1109/TECHSYM.2014.6808050
Moupiya Ukil, K. Sorathia
This paper presents a design case defining a shift in teaching methodology. On exploring the different teaching methods adapted by teachers in Indian schools, lack of interactivity and increasing disinterest was exposed. In order to overcome this, the focus was to introduce a fun and interactive environment in schools. While interviewing school students it was found that they face difficulties in visualizing the 3D solid shapes during blackboard teaching sessions. Hence, they are not able to grasp all the facts taught in the class. The design opportunities gathered after primary research lead to the key facts of this project. The target audience was middle school children and the aim was to teach 3D shapes such as cube, cuboid and cylinder using TUI (Tangible User Interface). The design constituted of tokens with fiducial markers, which were used as educational tools on interacting with the tabletop interface. The outcome of the design motivated students for viewing, sharing and presenting the concepts behind the 3D shapes.
本文提出了一个设计案例,定义了教学方法的转变。在探索印度学校教师采用的不同教学方法时,暴露出互动性不足和越来越不感兴趣。为了克服这一点,重点是在学校引入一个有趣和互动的环境。在对小学生的访谈中,我们发现他们在黑板教学中对三维立体图形的视觉化存在困难。因此,他们不能掌握课堂上教的所有知识。在初步研究后收集的设计机会导致了这个项目的关键事实。目标受众是中学生,目的是教授三维形状,如立方体,长方体和圆柱体使用TUI(有形用户界面)。设计由带有基准标记的令牌组成,作为与桌面界面交互的教育工具。设计的结果激发了学生们观看、分享和展示3D形状背后的概念。
{"title":"Re-defining learning experience for kids","authors":"Moupiya Ukil, K. Sorathia","doi":"10.1109/TECHSYM.2014.6808050","DOIUrl":"https://doi.org/10.1109/TECHSYM.2014.6808050","url":null,"abstract":"This paper presents a design case defining a shift in teaching methodology. On exploring the different teaching methods adapted by teachers in Indian schools, lack of interactivity and increasing disinterest was exposed. In order to overcome this, the focus was to introduce a fun and interactive environment in schools. While interviewing school students it was found that they face difficulties in visualizing the 3D solid shapes during blackboard teaching sessions. Hence, they are not able to grasp all the facts taught in the class. The design opportunities gathered after primary research lead to the key facts of this project. The target audience was middle school children and the aim was to teach 3D shapes such as cube, cuboid and cylinder using TUI (Tangible User Interface). The design constituted of tokens with fiducial markers, which were used as educational tools on interacting with the tabletop interface. The outcome of the design motivated students for viewing, sharing and presenting the concepts behind the 3D shapes.","PeriodicalId":265072,"journal":{"name":"Proceedings of the 2014 IEEE Students' Technology Symposium","volume":"161 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115932271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An energy-efficient routing technique for privacy preservation of assets monitored with WSN 基于WSN监控的资产隐私保护节能路由技术
Pub Date : 2014-05-01 DOI: 10.1109/TECHSYM.2014.6808069
R. Manjula, R. Datta
Wireless Sensor Networks (WSNs) are deployed to monitor the assets (endangered species) and report the locations of these assets to the Base Station (BS) also known as Sink. The hunter (adversary) attacks the network at one or two hops away from the Sink, eavesdrops the wireless communication links and traces back to the location of the asset to capture them. The existing solutions proposed to preserve the privacy of the assets lack in energy efficiency as they rely on random walk routing technique and fake packet injection technique so as to obfuscate the hunter from locating the assets. In this paper we present an energy efficient privacy preserved routing algorithm where the event (i.e., asset) detected nodes called as source nodes report the events' location information to the Base Station using phantom source (also known as phantom node) concept and a-angle anonymity concept. Routing is done using existing greedy routing protocol. Comparison through simulations shows that our solution reduces the energy consumption and delay while maintaining the same level of privacy as that of two existing popular techniques.
部署无线传感器网络(wsn)来监测资产(濒危物种),并将这些资产的位置报告给基站(BS),也称为Sink。猎人(对手)攻击距离接收器一到两跳的网络,窃听无线通信链路并追踪到资产的位置以捕获它们。为了保护资产的隐私,现有的解决方案依赖于随机行走路由技术和假包注入技术,从而使猎人无法定位资产,因此缺乏能源效率。在本文中,我们提出了一种节能的隐私保护路由算法,其中事件(即资产)检测节点称为源节点,使用幻影源(也称为幻影节点)概念和a角匿名概念向基站报告事件的位置信息。路由是使用现有的贪婪路由协议完成的。通过仿真比较表明,我们的解决方案在保持与现有两种流行技术相同的隐私水平的同时减少了能耗和延迟。
{"title":"An energy-efficient routing technique for privacy preservation of assets monitored with WSN","authors":"R. Manjula, R. Datta","doi":"10.1109/TECHSYM.2014.6808069","DOIUrl":"https://doi.org/10.1109/TECHSYM.2014.6808069","url":null,"abstract":"Wireless Sensor Networks (WSNs) are deployed to monitor the assets (endangered species) and report the locations of these assets to the Base Station (BS) also known as Sink. The hunter (adversary) attacks the network at one or two hops away from the Sink, eavesdrops the wireless communication links and traces back to the location of the asset to capture them. The existing solutions proposed to preserve the privacy of the assets lack in energy efficiency as they rely on random walk routing technique and fake packet injection technique so as to obfuscate the hunter from locating the assets. In this paper we present an energy efficient privacy preserved routing algorithm where the event (i.e., asset) detected nodes called as source nodes report the events' location information to the Base Station using phantom source (also known as phantom node) concept and a-angle anonymity concept. Routing is done using existing greedy routing protocol. Comparison through simulations shows that our solution reduces the energy consumption and delay while maintaining the same level of privacy as that of two existing popular techniques.","PeriodicalId":265072,"journal":{"name":"Proceedings of the 2014 IEEE Students' Technology Symposium","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124360349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Design of an energy efficient, high speed, low power full subtractor using GDI technique 采用GDI技术设计了一种节能、高速、低功耗的全减法器
Pub Date : 2014-05-01 DOI: 10.1109/TECHSYM.2014.6808046
Krishnendu Dhar, A. Chatterjee, S. Chatterjee
This paper proposes the design of an energy efficient, high speed and low power full subtractor using Gate Diffusion Input (GDI) technique. The entire design has been performed in 150nm technology and on comparison with a full subtractor employing the conventional CMOS transistors, transmission gates and Complementary Pass-Transistor Logic (CPL), respectively it has been found that there is a considerable amount of reduction in Average Power consumption (Pavg), delay time as well as Power Delay Product (PDP). Pavg is as low as 13.96nW while the delay time is found to be 18.02pico second thereby giving a PDP as low as 2.51×10-19 Joule for 1 volt power supply. In addition to this there is a significant reduction in transistor count compared to traditional full subtractor employing CMOS transistors, transmission gates and CPL, accordingly implying minimization of area. The simulation of the proposed design has been carried out in Tanner SPICE and the layout has been designed in Microwind.
本文提出了一种采用栅极扩散输入(GDI)技术的节能、高速、低功耗全减法器的设计方案。整个设计已在150nm技术下进行,并与采用传统CMOS晶体管,传输门和互补通管逻辑(CPL)的全减法器进行比较,分别发现平均功耗(Pavg),延迟时间以及功率延迟积(PDP)有相当大的降低。Pavg低至13.96nW,而延迟时间被发现为18.02皮秒,从而给出1伏电源的PDP低至2.51×10-19焦耳。除此之外,与采用CMOS晶体管、传输门和CPL的传统全减法器相比,晶体管数量显著减少,因此意味着面积最小化。在Tanner SPICE中对所提出的设计进行了仿真,并在Microwind中进行了布局设计。
{"title":"Design of an energy efficient, high speed, low power full subtractor using GDI technique","authors":"Krishnendu Dhar, A. Chatterjee, S. Chatterjee","doi":"10.1109/TECHSYM.2014.6808046","DOIUrl":"https://doi.org/10.1109/TECHSYM.2014.6808046","url":null,"abstract":"This paper proposes the design of an energy efficient, high speed and low power full subtractor using Gate Diffusion Input (GDI) technique. The entire design has been performed in 150nm technology and on comparison with a full subtractor employing the conventional CMOS transistors, transmission gates and Complementary Pass-Transistor Logic (CPL), respectively it has been found that there is a considerable amount of reduction in Average Power consumption (Pavg), delay time as well as Power Delay Product (PDP). Pavg is as low as 13.96nW while the delay time is found to be 18.02pico second thereby giving a PDP as low as 2.51×10-19 Joule for 1 volt power supply. In addition to this there is a significant reduction in transistor count compared to traditional full subtractor employing CMOS transistors, transmission gates and CPL, accordingly implying minimization of area. The simulation of the proposed design has been carried out in Tanner SPICE and the layout has been designed in Microwind.","PeriodicalId":265072,"journal":{"name":"Proceedings of the 2014 IEEE Students' Technology Symposium","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114991078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Color Pass: An intelligent user interface to resist shoulder surfing attack 彩色通行证:一个智能的用户界面,以抵御肩冲浪攻击
Pub Date : 2014-05-01 DOI: 10.1109/TECHSYM.2014.6807906
Nilesh Chakraborty, S. Mondal
Classical PIN entry mechanism is widely used for authenticating a user. It is a popular scheme because it nicely balances the usability and security aspects of a system. However, if this scheme is to be used in a public system then the scheme may suffer from shoulder surfing attack. In this attack, an unauthorized user can fully or partially observe the login session. Even the activities of the login session can be recorded which the attacker can use it later to get the actual PIN. In this paper, we propose an intelligent user interface, known as Color Pass to resist the shoulder surfing attack so that any genuine user can enter the session PIN without disclosing the actual PIN. The Color Pass is based on a partially observable attacker model. The experimental analysis shows that the Color Pass interface is safe and easy to use even for novice users.
经典的PIN输入机制被广泛用于用户身份验证。它是一种流行的方案,因为它很好地平衡了系统的可用性和安全性。然而,如果此方案用于公共系统,则该方案可能遭受肩冲浪攻击。在这种攻击中,未经授权的用户可以完全或部分地观察登录会话。甚至登录会话的活动也可以被记录下来,攻击者可以在以后使用它来获取实际的PIN。在本文中,我们提出了一种称为Color Pass的智能用户界面来抵抗肩部冲浪攻击,以便任何真正的用户都可以在不泄露实际PIN的情况下输入会话PIN。颜色通道基于部分可观察的攻击者模型。实验分析表明,即使对于新手用户,Color Pass界面也是安全且易于使用的。
{"title":"Color Pass: An intelligent user interface to resist shoulder surfing attack","authors":"Nilesh Chakraborty, S. Mondal","doi":"10.1109/TECHSYM.2014.6807906","DOIUrl":"https://doi.org/10.1109/TECHSYM.2014.6807906","url":null,"abstract":"Classical PIN entry mechanism is widely used for authenticating a user. It is a popular scheme because it nicely balances the usability and security aspects of a system. However, if this scheme is to be used in a public system then the scheme may suffer from shoulder surfing attack. In this attack, an unauthorized user can fully or partially observe the login session. Even the activities of the login session can be recorded which the attacker can use it later to get the actual PIN. In this paper, we propose an intelligent user interface, known as Color Pass to resist the shoulder surfing attack so that any genuine user can enter the session PIN without disclosing the actual PIN. The Color Pass is based on a partially observable attacker model. The experimental analysis shows that the Color Pass interface is safe and easy to use even for novice users.","PeriodicalId":265072,"journal":{"name":"Proceedings of the 2014 IEEE Students' Technology Symposium","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128474385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
A survey on image retrieval performance of different bag of visual words indexing techniques 不同视觉词包标引技术的图像检索性能研究
Pub Date : 2014-05-01 DOI: 10.1109/TECHSYM.2014.6807922
Jit Mukherjee, J. Mukhopadhyay, Pabitra Mitra
In this paper a survey has been carried out over image retrieval performances of bag of visual words (BoVW) method using different indexing techniques. Bag of visual word method is a content based image retrieval technique, where images are represented as a sparse vector of occurrences of visual words. In this paper different indexing techniques are used to compute near similar visual word vectors of a query image. Locality sensitive hashing, SR-tree based indexing and naive L1 and L2 norm based distance metric calculation are used here. Standard datasets like, UKBench [19], holiday dataset [9] and images from SMARAK1 are used for performance analysis.
本文对不同标引技术下视觉词袋法的图像检索性能进行了研究。视觉词袋方法是一种基于内容的图像检索技术,将图像表示为视觉词出现的稀疏向量。本文使用不同的索引技术来计算查询图像的近似视觉词向量。这里使用了位置敏感哈希、基于sr树的索引和朴素的基于L1和L2范数的距离度量计算。标准数据集,如UKBench[19],假日数据集[9]和来自SMARAK1的图像用于性能分析。
{"title":"A survey on image retrieval performance of different bag of visual words indexing techniques","authors":"Jit Mukherjee, J. Mukhopadhyay, Pabitra Mitra","doi":"10.1109/TECHSYM.2014.6807922","DOIUrl":"https://doi.org/10.1109/TECHSYM.2014.6807922","url":null,"abstract":"In this paper a survey has been carried out over image retrieval performances of bag of visual words (BoVW) method using different indexing techniques. Bag of visual word method is a content based image retrieval technique, where images are represented as a sparse vector of occurrences of visual words. In this paper different indexing techniques are used to compute near similar visual word vectors of a query image. Locality sensitive hashing, SR-tree based indexing and naive L1 and L2 norm based distance metric calculation are used here. Standard datasets like, UKBench [19], holiday dataset [9] and images from SMARAK1 are used for performance analysis.","PeriodicalId":265072,"journal":{"name":"Proceedings of the 2014 IEEE Students' Technology Symposium","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129547435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
期刊
Proceedings of the 2014 IEEE Students' Technology Symposium
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1