Pub Date : 2014-08-28DOI: 10.1109/TechSym.2014.6808048
Chandranath Adak, B. Chaudhuri
In this paper, a text line identification method is proposed. The text lines of printed document are easy to segment due to uniform straightness of the lines and sufficient gap between the lines. But in handwritten documents, the line is nonuniform and interline gaps are variable. We take Rabindranath Tagore's manuscript as it is one of the most difficult manuscripts that contain doodles. Our method consists of a preprocessing stage to clean the document image. Then we separate doodles from the manuscript to get the textual region. After that we identify the text lines on the manuscript. For text line identification, we use window examination, black run-length smearing, horizontal histogram and connected component analysis.
{"title":"Text line identification in Tagore's manuscript","authors":"Chandranath Adak, B. Chaudhuri","doi":"10.1109/TechSym.2014.6808048","DOIUrl":"https://doi.org/10.1109/TechSym.2014.6808048","url":null,"abstract":"In this paper, a text line identification method is proposed. The text lines of printed document are easy to segment due to uniform straightness of the lines and sufficient gap between the lines. But in handwritten documents, the line is nonuniform and interline gaps are variable. We take Rabindranath Tagore's manuscript as it is one of the most difficult manuscripts that contain doodles. Our method consists of a preprocessing stage to clean the document image. Then we separate doodles from the manuscript to get the textual region. After that we identify the text lines on the manuscript. For text line identification, we use window examination, black run-length smearing, horizontal histogram and connected component analysis.","PeriodicalId":265072,"journal":{"name":"Proceedings of the 2014 IEEE Students' Technology Symposium","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130761018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-01DOI: 10.1109/TECHSYM.2014.6808065
Debashri Roy, P. Ghosal, Nabanita Das
During recent days, the large problem space of very large scale integrated (VLSI) circuits has led global routing problem to a NP Complete one. With the advent of three dimensional integrated circuits (3D IC) the problem has become more complex. In this paper, a multi-objective global routing technique is formulated using fuzzy logic to get rid of the limitations of deterministic approaches. During global routing the decision is taken from a fuzzy logic expert system depending upon some generated pre-routing guiding information. Proposed approach is mainly focused on the modern generation 3D ICs. This primary work is mainly incorporated in the standard cell design for 3D ICs. A two-pin global router tool is designed based on the proposed algorithm resulting 85-97% routability in negligible time for ISPD'98 benchmarks.
{"title":"A thermal and congestion driven global router for 3D integrated circuits","authors":"Debashri Roy, P. Ghosal, Nabanita Das","doi":"10.1109/TECHSYM.2014.6808065","DOIUrl":"https://doi.org/10.1109/TECHSYM.2014.6808065","url":null,"abstract":"During recent days, the large problem space of very large scale integrated (VLSI) circuits has led global routing problem to a NP Complete one. With the advent of three dimensional integrated circuits (3D IC) the problem has become more complex. In this paper, a multi-objective global routing technique is formulated using fuzzy logic to get rid of the limitations of deterministic approaches. During global routing the decision is taken from a fuzzy logic expert system depending upon some generated pre-routing guiding information. Proposed approach is mainly focused on the modern generation 3D ICs. This primary work is mainly incorporated in the standard cell design for 3D ICs. A two-pin global router tool is designed based on the proposed algorithm resulting 85-97% routability in negligible time for ISPD'98 benchmarks.","PeriodicalId":265072,"journal":{"name":"Proceedings of the 2014 IEEE Students' Technology Symposium","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127234279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-01DOI: 10.1109/TECHSYM.2014.6807929
N. Gupta, V. Kumar
A novel non-uniform slotted substrate integrated waveguide leaky wave antenna has been proposed. These nonuniform slots are used to reduce the side lobes and to improve the radiation efficiency. The proposed structure has enhanced antenna gain and reduced reflection loss. This leaky wave antenna works in TE10 mode. Three modes are propagating in the structure; leaky wave mode, proper waveguide mode and surface wave mode. The proposed non-uniform leaky wave antenna scans efficiently from broadside to end-fires. This type of substrate integrated waveguide leaky wave antenna has very narrow beam that scans with frequency change. The current flow on the top wall is interrupted by periodic non-uniform slots, which results the leakage. The leakage is only due the fast waves.
{"title":"Transverse non-uniform slotted substrate integrated waveguide leaky-wave antenna","authors":"N. Gupta, V. Kumar","doi":"10.1109/TECHSYM.2014.6807929","DOIUrl":"https://doi.org/10.1109/TECHSYM.2014.6807929","url":null,"abstract":"A novel non-uniform slotted substrate integrated waveguide leaky wave antenna has been proposed. These nonuniform slots are used to reduce the side lobes and to improve the radiation efficiency. The proposed structure has enhanced antenna gain and reduced reflection loss. This leaky wave antenna works in TE10 mode. Three modes are propagating in the structure; leaky wave mode, proper waveguide mode and surface wave mode. The proposed non-uniform leaky wave antenna scans efficiently from broadside to end-fires. This type of substrate integrated waveguide leaky wave antenna has very narrow beam that scans with frequency change. The current flow on the top wall is interrupted by periodic non-uniform slots, which results the leakage. The leakage is only due the fast waves.","PeriodicalId":265072,"journal":{"name":"Proceedings of the 2014 IEEE Students' Technology Symposium","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129232360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-01DOI: 10.1109/TECHSYM.2014.6808077
A. Singh, G. Pandey, S. Kalraiya, H. Singh, M. K. Meshram
A compact size, low profile microstrip fed dual band planer monopole antenna is presented. The shape of main radiating element is modified rhomboidal that covers ultrawideband (UWB) frequency range. Further, to make dual band antenna without affecting the UWB range, stair shaped strip in elliptical shaped slot is loaded on main radiating element. The dual band antenna covers 2.36 to 2.49 GHz (Bluetooth) and 3.1GHz to 17 GHz (UWB) frequency bands. The antenna is designed on FR4 substrate of size 35 × 24 × 1.6mm3. The parametric analysis, impedance bandwidth, input impedance, gain etc. of antenna are computed using Ansoft HFSS.
{"title":"Design of modified rhomboidal dualband antenna for Bluetooth and UWB applications","authors":"A. Singh, G. Pandey, S. Kalraiya, H. Singh, M. K. Meshram","doi":"10.1109/TECHSYM.2014.6808077","DOIUrl":"https://doi.org/10.1109/TECHSYM.2014.6808077","url":null,"abstract":"A compact size, low profile microstrip fed dual band planer monopole antenna is presented. The shape of main radiating element is modified rhomboidal that covers ultrawideband (UWB) frequency range. Further, to make dual band antenna without affecting the UWB range, stair shaped strip in elliptical shaped slot is loaded on main radiating element. The dual band antenna covers 2.36 to 2.49 GHz (Bluetooth) and 3.1GHz to 17 GHz (UWB) frequency bands. The antenna is designed on FR4 substrate of size 35 × 24 × 1.6mm3. The parametric analysis, impedance bandwidth, input impedance, gain etc. of antenna are computed using Ansoft HFSS.","PeriodicalId":265072,"journal":{"name":"Proceedings of the 2014 IEEE Students' Technology Symposium","volume":"354 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113958624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-01DOI: 10.1109/TECHSYM.2014.6807915
Aayush Ankit, Irfan Riaz Ahmad, Hyunchu Shin
This paper presents a novel pedestrian detection framework for efficient detection of both unoccluded and occluded pedestrians, thereby proposing an efficient technique for pedestrian detection in real-time environment. Our framework consists of two layers of detection, the first layer using full body detectors for accurate detection of unoccluded pedestrians and then a cascaded layer of part based detectors to efficiently detect the occluded pedestrians. The full body detectors based techniques are state-of-the art for unoccluded pedestrian detection and the part based model is a viable choice for partially occluded pedestrian detection. In our part based model, we use six parts; three horizontal parts and three vertical parts thereby creating a model that is robust to varying degrees and types of occlusions. Each detection layer utilizes multiple modalities (cues) namely; intensity, dense stereo and dense flow. The use of part based detectors as the cascaded layer also increases the unoccluded pedestrian detection rate by correctly detecting the pedestrians that had been misclassified by the first layer. Thus, the second layer of part based detectors has a synergic effect on the first layer.
{"title":"A cascade framework for unoccluded and occluded pedestrian detection","authors":"Aayush Ankit, Irfan Riaz Ahmad, Hyunchu Shin","doi":"10.1109/TECHSYM.2014.6807915","DOIUrl":"https://doi.org/10.1109/TECHSYM.2014.6807915","url":null,"abstract":"This paper presents a novel pedestrian detection framework for efficient detection of both unoccluded and occluded pedestrians, thereby proposing an efficient technique for pedestrian detection in real-time environment. Our framework consists of two layers of detection, the first layer using full body detectors for accurate detection of unoccluded pedestrians and then a cascaded layer of part based detectors to efficiently detect the occluded pedestrians. The full body detectors based techniques are state-of-the art for unoccluded pedestrian detection and the part based model is a viable choice for partially occluded pedestrian detection. In our part based model, we use six parts; three horizontal parts and three vertical parts thereby creating a model that is robust to varying degrees and types of occlusions. Each detection layer utilizes multiple modalities (cues) namely; intensity, dense stereo and dense flow. The use of part based detectors as the cascaded layer also increases the unoccluded pedestrian detection rate by correctly detecting the pedestrians that had been misclassified by the first layer. Thus, the second layer of part based detectors has a synergic effect on the first layer.","PeriodicalId":265072,"journal":{"name":"Proceedings of the 2014 IEEE Students' Technology Symposium","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127749383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-01DOI: 10.1109/TECHSYM.2014.6808050
Moupiya Ukil, K. Sorathia
This paper presents a design case defining a shift in teaching methodology. On exploring the different teaching methods adapted by teachers in Indian schools, lack of interactivity and increasing disinterest was exposed. In order to overcome this, the focus was to introduce a fun and interactive environment in schools. While interviewing school students it was found that they face difficulties in visualizing the 3D solid shapes during blackboard teaching sessions. Hence, they are not able to grasp all the facts taught in the class. The design opportunities gathered after primary research lead to the key facts of this project. The target audience was middle school children and the aim was to teach 3D shapes such as cube, cuboid and cylinder using TUI (Tangible User Interface). The design constituted of tokens with fiducial markers, which were used as educational tools on interacting with the tabletop interface. The outcome of the design motivated students for viewing, sharing and presenting the concepts behind the 3D shapes.
{"title":"Re-defining learning experience for kids","authors":"Moupiya Ukil, K. Sorathia","doi":"10.1109/TECHSYM.2014.6808050","DOIUrl":"https://doi.org/10.1109/TECHSYM.2014.6808050","url":null,"abstract":"This paper presents a design case defining a shift in teaching methodology. On exploring the different teaching methods adapted by teachers in Indian schools, lack of interactivity and increasing disinterest was exposed. In order to overcome this, the focus was to introduce a fun and interactive environment in schools. While interviewing school students it was found that they face difficulties in visualizing the 3D solid shapes during blackboard teaching sessions. Hence, they are not able to grasp all the facts taught in the class. The design opportunities gathered after primary research lead to the key facts of this project. The target audience was middle school children and the aim was to teach 3D shapes such as cube, cuboid and cylinder using TUI (Tangible User Interface). The design constituted of tokens with fiducial markers, which were used as educational tools on interacting with the tabletop interface. The outcome of the design motivated students for viewing, sharing and presenting the concepts behind the 3D shapes.","PeriodicalId":265072,"journal":{"name":"Proceedings of the 2014 IEEE Students' Technology Symposium","volume":"161 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115932271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-01DOI: 10.1109/TECHSYM.2014.6808069
R. Manjula, R. Datta
Wireless Sensor Networks (WSNs) are deployed to monitor the assets (endangered species) and report the locations of these assets to the Base Station (BS) also known as Sink. The hunter (adversary) attacks the network at one or two hops away from the Sink, eavesdrops the wireless communication links and traces back to the location of the asset to capture them. The existing solutions proposed to preserve the privacy of the assets lack in energy efficiency as they rely on random walk routing technique and fake packet injection technique so as to obfuscate the hunter from locating the assets. In this paper we present an energy efficient privacy preserved routing algorithm where the event (i.e., asset) detected nodes called as source nodes report the events' location information to the Base Station using phantom source (also known as phantom node) concept and a-angle anonymity concept. Routing is done using existing greedy routing protocol. Comparison through simulations shows that our solution reduces the energy consumption and delay while maintaining the same level of privacy as that of two existing popular techniques.
{"title":"An energy-efficient routing technique for privacy preservation of assets monitored with WSN","authors":"R. Manjula, R. Datta","doi":"10.1109/TECHSYM.2014.6808069","DOIUrl":"https://doi.org/10.1109/TECHSYM.2014.6808069","url":null,"abstract":"Wireless Sensor Networks (WSNs) are deployed to monitor the assets (endangered species) and report the locations of these assets to the Base Station (BS) also known as Sink. The hunter (adversary) attacks the network at one or two hops away from the Sink, eavesdrops the wireless communication links and traces back to the location of the asset to capture them. The existing solutions proposed to preserve the privacy of the assets lack in energy efficiency as they rely on random walk routing technique and fake packet injection technique so as to obfuscate the hunter from locating the assets. In this paper we present an energy efficient privacy preserved routing algorithm where the event (i.e., asset) detected nodes called as source nodes report the events' location information to the Base Station using phantom source (also known as phantom node) concept and a-angle anonymity concept. Routing is done using existing greedy routing protocol. Comparison through simulations shows that our solution reduces the energy consumption and delay while maintaining the same level of privacy as that of two existing popular techniques.","PeriodicalId":265072,"journal":{"name":"Proceedings of the 2014 IEEE Students' Technology Symposium","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124360349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-01DOI: 10.1109/TECHSYM.2014.6808046
Krishnendu Dhar, A. Chatterjee, S. Chatterjee
This paper proposes the design of an energy efficient, high speed and low power full subtractor using Gate Diffusion Input (GDI) technique. The entire design has been performed in 150nm technology and on comparison with a full subtractor employing the conventional CMOS transistors, transmission gates and Complementary Pass-Transistor Logic (CPL), respectively it has been found that there is a considerable amount of reduction in Average Power consumption (Pavg), delay time as well as Power Delay Product (PDP). Pavg is as low as 13.96nW while the delay time is found to be 18.02pico second thereby giving a PDP as low as 2.51×10-19 Joule for 1 volt power supply. In addition to this there is a significant reduction in transistor count compared to traditional full subtractor employing CMOS transistors, transmission gates and CPL, accordingly implying minimization of area. The simulation of the proposed design has been carried out in Tanner SPICE and the layout has been designed in Microwind.
{"title":"Design of an energy efficient, high speed, low power full subtractor using GDI technique","authors":"Krishnendu Dhar, A. Chatterjee, S. Chatterjee","doi":"10.1109/TECHSYM.2014.6808046","DOIUrl":"https://doi.org/10.1109/TECHSYM.2014.6808046","url":null,"abstract":"This paper proposes the design of an energy efficient, high speed and low power full subtractor using Gate Diffusion Input (GDI) technique. The entire design has been performed in 150nm technology and on comparison with a full subtractor employing the conventional CMOS transistors, transmission gates and Complementary Pass-Transistor Logic (CPL), respectively it has been found that there is a considerable amount of reduction in Average Power consumption (Pavg), delay time as well as Power Delay Product (PDP). Pavg is as low as 13.96nW while the delay time is found to be 18.02pico second thereby giving a PDP as low as 2.51×10-19 Joule for 1 volt power supply. In addition to this there is a significant reduction in transistor count compared to traditional full subtractor employing CMOS transistors, transmission gates and CPL, accordingly implying minimization of area. The simulation of the proposed design has been carried out in Tanner SPICE and the layout has been designed in Microwind.","PeriodicalId":265072,"journal":{"name":"Proceedings of the 2014 IEEE Students' Technology Symposium","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114991078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-01DOI: 10.1109/TECHSYM.2014.6807906
Nilesh Chakraborty, S. Mondal
Classical PIN entry mechanism is widely used for authenticating a user. It is a popular scheme because it nicely balances the usability and security aspects of a system. However, if this scheme is to be used in a public system then the scheme may suffer from shoulder surfing attack. In this attack, an unauthorized user can fully or partially observe the login session. Even the activities of the login session can be recorded which the attacker can use it later to get the actual PIN. In this paper, we propose an intelligent user interface, known as Color Pass to resist the shoulder surfing attack so that any genuine user can enter the session PIN without disclosing the actual PIN. The Color Pass is based on a partially observable attacker model. The experimental analysis shows that the Color Pass interface is safe and easy to use even for novice users.
{"title":"Color Pass: An intelligent user interface to resist shoulder surfing attack","authors":"Nilesh Chakraborty, S. Mondal","doi":"10.1109/TECHSYM.2014.6807906","DOIUrl":"https://doi.org/10.1109/TECHSYM.2014.6807906","url":null,"abstract":"Classical PIN entry mechanism is widely used for authenticating a user. It is a popular scheme because it nicely balances the usability and security aspects of a system. However, if this scheme is to be used in a public system then the scheme may suffer from shoulder surfing attack. In this attack, an unauthorized user can fully or partially observe the login session. Even the activities of the login session can be recorded which the attacker can use it later to get the actual PIN. In this paper, we propose an intelligent user interface, known as Color Pass to resist the shoulder surfing attack so that any genuine user can enter the session PIN without disclosing the actual PIN. The Color Pass is based on a partially observable attacker model. The experimental analysis shows that the Color Pass interface is safe and easy to use even for novice users.","PeriodicalId":265072,"journal":{"name":"Proceedings of the 2014 IEEE Students' Technology Symposium","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128474385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-01DOI: 10.1109/TECHSYM.2014.6807922
Jit Mukherjee, J. Mukhopadhyay, Pabitra Mitra
In this paper a survey has been carried out over image retrieval performances of bag of visual words (BoVW) method using different indexing techniques. Bag of visual word method is a content based image retrieval technique, where images are represented as a sparse vector of occurrences of visual words. In this paper different indexing techniques are used to compute near similar visual word vectors of a query image. Locality sensitive hashing, SR-tree based indexing and naive L1 and L2 norm based distance metric calculation are used here. Standard datasets like, UKBench [19], holiday dataset [9] and images from SMARAK1 are used for performance analysis.
{"title":"A survey on image retrieval performance of different bag of visual words indexing techniques","authors":"Jit Mukherjee, J. Mukhopadhyay, Pabitra Mitra","doi":"10.1109/TECHSYM.2014.6807922","DOIUrl":"https://doi.org/10.1109/TECHSYM.2014.6807922","url":null,"abstract":"In this paper a survey has been carried out over image retrieval performances of bag of visual words (BoVW) method using different indexing techniques. Bag of visual word method is a content based image retrieval technique, where images are represented as a sparse vector of occurrences of visual words. In this paper different indexing techniques are used to compute near similar visual word vectors of a query image. Locality sensitive hashing, SR-tree based indexing and naive L1 and L2 norm based distance metric calculation are used here. Standard datasets like, UKBench [19], holiday dataset [9] and images from SMARAK1 are used for performance analysis.","PeriodicalId":265072,"journal":{"name":"Proceedings of the 2014 IEEE Students' Technology Symposium","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129547435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}