首页 > 最新文献

2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)最新文献

英文 中文
Multi agent based audio steganography 基于多智能体的音频隐写
T. Kartheeswaran, V. Senthooran, T. D. D. L. Pemadasa
Today's Information Technology grows rapidly with new technologies and need more security for the data transmission over the internet. Steganography is one of the solutions to ensure the data secure over the internet. An audio steganography is a method to transfer concealed information by changing the cover audio file without degrading the quality of the original file. The cover medium before steganography and stego medium after steganography should have the same characteristics of a good steganographic system. The Agent technology involves distributing the services with flexible manner. As most of the applications are created as services in present computing scenario and data security also can be served as a service. Agent-based steganography will improve the efficiency of the secure steganographic system and it will be more convenient in terms of flexibility and availability. In this research paper, we present a trusted communication platform for multi-agents that are able to hide the confidential message in the cover audio stream according to the user request and retrieve the hidden information from the stego audio file. This system provides high availability and flexibility in this context and a more feasible way to trust the message transmission. This work is currently being done and designing part of this work has been done successfully with satisfied results.
当今的信息技术随着新技术的发展而迅速发展,对互联网上数据传输的安全性要求更高。隐写术是确保互联网上数据安全的解决方案之一。音频隐写是一种在不降低原始文件质量的情况下通过改变覆盖音频文件来传输隐藏信息的方法。隐写前的覆盖介质和隐写后的隐写介质应具有良好的隐写系统的相同特征。Agent技术涉及到以灵活的方式分配业务。由于在当前的计算场景中,大多数应用程序都是作为服务创建的,数据安全也可以作为服务来提供。基于代理的隐写技术将提高安全隐写系统的效率,在灵活性和可用性方面更加方便。在本文中,我们提出了一种基于多智能体的可信通信平台,该平台能够根据用户的请求隐藏隐藏在隐藏音频流中的机密信息,并从隐藏音频文件中检索隐藏信息。该系统在这种情况下提供了高可用性和灵活性,并提供了一种更可行的消息信任传输方式。这项工作目前正在进行中,设计部分工作已经成功完成,效果令人满意。
{"title":"Multi agent based audio steganography","authors":"T. Kartheeswaran, V. Senthooran, T. D. D. L. Pemadasa","doi":"10.1109/ICCIC.2015.7435706","DOIUrl":"https://doi.org/10.1109/ICCIC.2015.7435706","url":null,"abstract":"Today's Information Technology grows rapidly with new technologies and need more security for the data transmission over the internet. Steganography is one of the solutions to ensure the data secure over the internet. An audio steganography is a method to transfer concealed information by changing the cover audio file without degrading the quality of the original file. The cover medium before steganography and stego medium after steganography should have the same characteristics of a good steganographic system. The Agent technology involves distributing the services with flexible manner. As most of the applications are created as services in present computing scenario and data security also can be served as a service. Agent-based steganography will improve the efficiency of the secure steganographic system and it will be more convenient in terms of flexibility and availability. In this research paper, we present a trusted communication platform for multi-agents that are able to hide the confidential message in the cover audio stream according to the user request and retrieve the hidden information from the stego audio file. This system provides high availability and flexibility in this context and a more feasible way to trust the message transmission. This work is currently being done and designing part of this work has been done successfully with satisfied results.","PeriodicalId":276894,"journal":{"name":"2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)","volume":"32 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114097308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Non-invasive tracking and monitoring glucose content using near infrared spectroscopy 使用近红外光谱法无创跟踪和监测葡萄糖含量
M. Tamilselvi, G. Ramkumar
Diabetes is deliberate as one of the major contributors of crystallize infirmity and death in non-infectious diseases. Common method for determination of blood glucose concentration is using a self-monitoring glucose meter. This process requires pricking the finger and pry out the blood from the forearm and doing the chemical analysis with the help of disposable test strips. The pain and difficulty caused by this method have lead to the evolution of a noninvasive method. This method makes use of a near infrared sensor for transmission and reception of rays from fingertip. Near-infrared (NIR) is passing through the fingertip, before and after obstructing the flow of blood. By explicate the variation in received signal intensity achieved after reflection in both the cases, glucose present in blood can be predicted and wirelessly transmitted to a remote PC. The results show the potential of glucose measurement using Near-infrared.
在非传染性疾病中,糖尿病被认为是晶状体弱和死亡的主要原因之一。常用的测定血糖浓度的方法是使用自我监测血糖仪。这个过程需要刺破手指,从前臂中取出血液,并借助一次性试纸进行化学分析。这种方法带来的痛苦和困难导致了一种无创方法的发展。这种方法利用近红外传感器来传输和接收来自指尖的射线。近红外(NIR)是通过指尖,前后阻碍血液流动。通过解释两种情况下反射后接收信号强度的变化,可以预测血液中的葡萄糖并将其无线传输到远程PC。结果显示了近红外测量葡萄糖的潜力。
{"title":"Non-invasive tracking and monitoring glucose content using near infrared spectroscopy","authors":"M. Tamilselvi, G. Ramkumar","doi":"10.1109/ICCIC.2015.7435728","DOIUrl":"https://doi.org/10.1109/ICCIC.2015.7435728","url":null,"abstract":"Diabetes is deliberate as one of the major contributors of crystallize infirmity and death in non-infectious diseases. Common method for determination of blood glucose concentration is using a self-monitoring glucose meter. This process requires pricking the finger and pry out the blood from the forearm and doing the chemical analysis with the help of disposable test strips. The pain and difficulty caused by this method have lead to the evolution of a noninvasive method. This method makes use of a near infrared sensor for transmission and reception of rays from fingertip. Near-infrared (NIR) is passing through the fingertip, before and after obstructing the flow of blood. By explicate the variation in received signal intensity achieved after reflection in both the cases, glucose present in blood can be predicted and wirelessly transmitted to a remote PC. The results show the potential of glucose measurement using Near-infrared.","PeriodicalId":276894,"journal":{"name":"2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114158540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Design of experimental test bed to evaluate effectiveness of software protection mechanisms against buffer overflow attacks through emulation 设计了实验测试平台,通过仿真来评估软件保护机制对缓冲区溢出攻击的有效性
V. Srikanth, N. R. Kisore
To date a number of comprehensive techniques have been proposed to defend against buffer overflow attacks. While in theory these techniques aim to detect and defend against all forms of buffer overflows, in practice attackers constantly find techniques to bypass these protection mechanisms. In addition quite many of the mechanisms proposed in literature are never absorbed into a production system as these techniques suffer from performance issues such as high operational overhead in terms of system memory and/or CPU cycles and incompatibility with legacy systems. Further, none of the proposed security mechanisms guarantee 100% assurance against an attacker. On the other hand with the increase in the amount of digital data and the number of devices connected to the internet, the amount of information lost in the event of a large scale cyber attack is ever increasing. While often theoretical study of security is sufficient to identify the weakness of IT systems, an empirical evaluation is necessary to perform cost benefit benefit between the number computer hijacked (is an indirect measure of amount of information lost) in the event of a large scale cyber attack and the buffer overflow protection mechanism adopted. In this paper we propose an architecture for creation of an experimental test bed to evaluate the effectiveness of a buffer overflow protection mechanism by measuring overhead incurred versus it's effectiveness in defending against a large scale cyber attack.
迄今为止,已经提出了许多全面的技术来防御缓冲区溢出攻击。虽然理论上这些技术的目的是检测和防御所有形式的缓冲区溢出,但实际上攻击者不断找到绕过这些保护机制的技术。此外,文献中提出的许多机制从未被吸收到生产系统中,因为这些技术受到性能问题的影响,例如系统内存和/或CPU周期方面的高操作开销以及与遗留系统的不兼容性。此外,所建议的安全机制都不能100%保证不受攻击者的攻击。另一方面,随着数字数据量的增加和连接到互联网的设备数量的增加,在大规模网络攻击事件中丢失的信息量也在不断增加。虽然通常对安全的理论研究足以识别IT系统的弱点,但有必要进行经验评估,以便在大规模网络攻击事件中被劫持的计算机数量(是信息丢失量的间接衡量标准)与所采用的缓冲区溢出保护机制之间进行成本效益评估。在本文中,我们提出了一个用于创建实验测试平台的架构,通过测量所产生的开销与防御大规模网络攻击的有效性来评估缓冲区溢出保护机制的有效性。
{"title":"Design of experimental test bed to evaluate effectiveness of software protection mechanisms against buffer overflow attacks through emulation","authors":"V. Srikanth, N. R. Kisore","doi":"10.1109/ICCIC.2015.7435701","DOIUrl":"https://doi.org/10.1109/ICCIC.2015.7435701","url":null,"abstract":"To date a number of comprehensive techniques have been proposed to defend against buffer overflow attacks. While in theory these techniques aim to detect and defend against all forms of buffer overflows, in practice attackers constantly find techniques to bypass these protection mechanisms. In addition quite many of the mechanisms proposed in literature are never absorbed into a production system as these techniques suffer from performance issues such as high operational overhead in terms of system memory and/or CPU cycles and incompatibility with legacy systems. Further, none of the proposed security mechanisms guarantee 100% assurance against an attacker. On the other hand with the increase in the amount of digital data and the number of devices connected to the internet, the amount of information lost in the event of a large scale cyber attack is ever increasing. While often theoretical study of security is sufficient to identify the weakness of IT systems, an empirical evaluation is necessary to perform cost benefit benefit between the number computer hijacked (is an indirect measure of amount of information lost) in the event of a large scale cyber attack and the buffer overflow protection mechanism adopted. In this paper we propose an architecture for creation of an experimental test bed to evaluate the effectiveness of a buffer overflow protection mechanism by measuring overhead incurred versus it's effectiveness in defending against a large scale cyber attack.","PeriodicalId":276894,"journal":{"name":"2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120953220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
LSB based image steganography using PN sequence & GCD transform 基于LSB的PN序列和GCD变换图像隐写
R. K. Pathak, S. Meena
This paper has been proposed for the image steganography. It is based on a modification of LSB (least significant bit) of pixels and this modification is the replacement of LSB bits of the cover image (CI) pixels that carries the most significant bits (MSB) of data image (DI). This makes the algorithm modest. In steganography of image, security is also a major concern. Here, key based PN (Pseudo Number) sequence is generated. It is used to provide security to algorithm against the stegano-analytic attack. The algorithm also has been improved to detect and locate tampering done by malicious attackers. This is obtained by conversion of image into a fixed point image using GCD (Gaussian convolution and de-convolution) transform.
本文提出了一种用于图像隐写的方法。它基于像素的LSB(最低有效位)的修改,这种修改是替换包含数据图像(DI)的最高有效位(MSB)的覆盖图像(CI)像素的LSB位。这使得算法适度。在图像隐写术中,安全性也是一个重要的问题。在这里,生成基于密钥的PN(伪数字)序列。它用于为算法提供抗隐写分析攻击的安全性。该算法还改进了检测和定位恶意攻击者所做的篡改。这是通过使用GCD(高斯卷积和反卷积)变换将图像转换为定点图像而获得的。
{"title":"LSB based image steganography using PN sequence & GCD transform","authors":"R. K. Pathak, S. Meena","doi":"10.1109/ICCIC.2015.7435692","DOIUrl":"https://doi.org/10.1109/ICCIC.2015.7435692","url":null,"abstract":"This paper has been proposed for the image steganography. It is based on a modification of LSB (least significant bit) of pixels and this modification is the replacement of LSB bits of the cover image (CI) pixels that carries the most significant bits (MSB) of data image (DI). This makes the algorithm modest. In steganography of image, security is also a major concern. Here, key based PN (Pseudo Number) sequence is generated. It is used to provide security to algorithm against the stegano-analytic attack. The algorithm also has been improved to detect and locate tampering done by malicious attackers. This is obtained by conversion of image into a fixed point image using GCD (Gaussian convolution and de-convolution) transform.","PeriodicalId":276894,"journal":{"name":"2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)","volume":"221 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116071384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Detection and localization of text from natural scene images using texture features 利用纹理特征从自然场景图像中检测和定位文本
T. Kumuda, L. Basavaraj
Text in camera captured images contains important and useful information. Text in images can be used for identification, indexing and retrieval. Detection and localization of text from camera captured images is still a challenging task due to high variability of text appearance. In this paper we propose an efficient algorithm, for detecting and localizing text in natural scene images. The method is based on texture feature extraction using first and second order statistics. The entire work is divided into two stages. Text regions are detected in the first stage using texture features. Discriminative functions are used to filter out non-text regions. In the second stage the detected text regions are merged and localized. An experimental results obtained shows that the proposed approach detects and localizes texts of various sizes, fonts, orientations and languages efficiently.
相机捕获的图像中的文本包含重要和有用的信息。图像中的文本可用于识别、索引和检索。由于文本外观的高度可变性,从相机捕获的图像中检测和定位文本仍然是一项具有挑战性的任务。本文提出了一种有效的自然场景图像文本检测和定位算法。该方法基于一阶和二阶统计量提取纹理特征。整个工作分为两个阶段。在第一阶段使用纹理特征检测文本区域。判别函数用于过滤掉非文本区域。在第二阶段,对检测到的文本区域进行合并和定位。实验结果表明,该方法能够有效地检测和定位不同大小、字体、方向和语言的文本。
{"title":"Detection and localization of text from natural scene images using texture features","authors":"T. Kumuda, L. Basavaraj","doi":"10.1109/ICCIC.2015.7435688","DOIUrl":"https://doi.org/10.1109/ICCIC.2015.7435688","url":null,"abstract":"Text in camera captured images contains important and useful information. Text in images can be used for identification, indexing and retrieval. Detection and localization of text from camera captured images is still a challenging task due to high variability of text appearance. In this paper we propose an efficient algorithm, for detecting and localizing text in natural scene images. The method is based on texture feature extraction using first and second order statistics. The entire work is divided into two stages. Text regions are detected in the first stage using texture features. Discriminative functions are used to filter out non-text regions. In the second stage the detected text regions are merged and localized. An experimental results obtained shows that the proposed approach detects and localizes texts of various sizes, fonts, orientations and languages efficiently.","PeriodicalId":276894,"journal":{"name":"2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127745924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
A novel sparse ensemble pruning algorithm using a new diversity measure 基于新分集度量的稀疏集合剪枝算法
Sanyam Shukla, Jivitesh Sharma, Shankul Khare, Samruddhi Kochkar, Vanya Dharni
Extreme learning machine is state of art supervised machine learning technique for classification and regression. A single ELM classifier can however generate faulty or skewed results due to random initialization of weights between input and hidden layer. To overcome this instability problem ensemble methods can be employed. Ensemble methods may have problem of redundancy i.e. ensemble may contain several redundant classifiers which can be weak or highly correlated classifiers. Ensemble pruning can be used to remove these redundant classifiers. The pruned ensemble should not only be accurate but diverse as well in order to correctly classify boundary instances. This work proposes an ensemble pruning algorithm which tries to establish a tradeoff between accuracy and diversity. The paper also proposes a metric which scores classifiers based on their diversity and contribution towards the ensemble. The results show that the pruned ensemble performs equally well or in some cases even better as compared to the unpruned set in terms of accuracy and diversity. The results of the experiments show that the proposed algorithm performs better than VELM. The proposed algorithm reduces the ensemble size to less than 60 % of the original ensemble size (original ensemble size is set to 50).
极限学习机是目前最先进的用于分类和回归的监督机器学习技术。然而,由于输入层和隐藏层之间的权重随机初始化,单个ELM分类器可能会产生错误或倾斜的结果。为了克服这种不稳定性问题,可以采用集成方法。集成方法可能存在冗余问题,即集成可能包含多个冗余分类器,这些分类器可以是弱分类器,也可以是高度相关的分类器。集成修剪可以用来删除这些冗余的分类器。为了对边界实例进行正确的分类,剪枝集合不仅要精确而且要多样化。这项工作提出了一种集成剪枝算法,它试图在准确性和多样性之间建立一种权衡。本文还提出了一种基于分类器的多样性和对整体贡献的评分指标。结果表明,在准确性和多样性方面,与未修剪的集合相比,修剪后的集合表现同样好,在某些情况下甚至更好。实验结果表明,该算法的性能优于VELM算法。该算法将集合大小减小到小于原始集合大小的60%(原始集合大小设置为50)。
{"title":"A novel sparse ensemble pruning algorithm using a new diversity measure","authors":"Sanyam Shukla, Jivitesh Sharma, Shankul Khare, Samruddhi Kochkar, Vanya Dharni","doi":"10.1109/ICCIC.2015.7435815","DOIUrl":"https://doi.org/10.1109/ICCIC.2015.7435815","url":null,"abstract":"Extreme learning machine is state of art supervised machine learning technique for classification and regression. A single ELM classifier can however generate faulty or skewed results due to random initialization of weights between input and hidden layer. To overcome this instability problem ensemble methods can be employed. Ensemble methods may have problem of redundancy i.e. ensemble may contain several redundant classifiers which can be weak or highly correlated classifiers. Ensemble pruning can be used to remove these redundant classifiers. The pruned ensemble should not only be accurate but diverse as well in order to correctly classify boundary instances. This work proposes an ensemble pruning algorithm which tries to establish a tradeoff between accuracy and diversity. The paper also proposes a metric which scores classifiers based on their diversity and contribution towards the ensemble. The results show that the pruned ensemble performs equally well or in some cases even better as compared to the unpruned set in terms of accuracy and diversity. The results of the experiments show that the proposed algorithm performs better than VELM. The proposed algorithm reduces the ensemble size to less than 60 % of the original ensemble size (original ensemble size is set to 50).","PeriodicalId":276894,"journal":{"name":"2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127768826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Comparative study of Mamdani & Takagi-Sugeno models for spectrum access in cognitive radio networks 认知无线电网络中频谱接入的Mamdani和Takagi-Sugeno模型的比较研究
Deepak Kumar, Pankaj Verma
Rapid growth of wireless services demands more and more spectrum, but spectrum is limited resource. Recent studies show that the spectrum which is allocated to licensed users or primary users (PUs) is not fully utilized. To address this problem Cognitive Radio (CR) comes into the picture, which will detect the vacant spectrum and use it when the same is available. But in the scenario of multiple unlicensed users or secondary users (SUs), which SU will access the spectrum is an issue in the cognitive radio networks. In this paper, two Fuzzy Logic Models i.e. Mamdani and Takagi-Sugeno are used for the selection of SU to access the spectrum based upon the input parameters: spectrum efficiency, mobility of SU and distance between PU & SU. On the basis of these input parameters, 27 fuzzy rules are framed. Based upon these rules, output is obtained which shows the selection possibility of a SU to access the spectrum. A comparison is shown between two models by computing the correlation value for each of the inputs parameter.
无线业务的快速发展对频谱的需求越来越大,而频谱是一种有限的资源。最近的研究表明,分配给授权用户或主用户(pu)的频谱没有得到充分利用。为了解决这个问题,认知无线电(CR)出现了,它将检测空频谱并在可用时使用它。但在多个未授权用户或辅助用户(SU)的情况下,哪些SU将访问频谱是认知无线网络中的一个问题。本文采用Mamdani和Takagi-Sugeno两种模糊逻辑模型,根据输入参数:频谱效率、SU的迁移率和PU与SU之间的距离来选择SU接入频谱,并根据这些输入参数构建了27条模糊规则。根据这些规则得到的输出显示了一个SU接入频谱的选择可能性。通过计算每个输入参数的相关值,可以对两个模型进行比较。
{"title":"Comparative study of Mamdani & Takagi-Sugeno models for spectrum access in cognitive radio networks","authors":"Deepak Kumar, Pankaj Verma","doi":"10.1109/ICCIC.2015.7435712","DOIUrl":"https://doi.org/10.1109/ICCIC.2015.7435712","url":null,"abstract":"Rapid growth of wireless services demands more and more spectrum, but spectrum is limited resource. Recent studies show that the spectrum which is allocated to licensed users or primary users (PUs) is not fully utilized. To address this problem Cognitive Radio (CR) comes into the picture, which will detect the vacant spectrum and use it when the same is available. But in the scenario of multiple unlicensed users or secondary users (SUs), which SU will access the spectrum is an issue in the cognitive radio networks. In this paper, two Fuzzy Logic Models i.e. Mamdani and Takagi-Sugeno are used for the selection of SU to access the spectrum based upon the input parameters: spectrum efficiency, mobility of SU and distance between PU & SU. On the basis of these input parameters, 27 fuzzy rules are framed. Based upon these rules, output is obtained which shows the selection possibility of a SU to access the spectrum. A comparison is shown between two models by computing the correlation value for each of the inputs parameter.","PeriodicalId":276894,"journal":{"name":"2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132216206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
SRAM cell with improved stability and reduced leakage current for subthreshold region of operation SRAM电池与改进的稳定性和减少泄漏电流的亚阈值区域的操作
P. Sreelakshmi, Kirti S. Pande, N. S. Murty
In this paper, a Modified Differential 8T SRAM cell is proposed for subthreshold region of operation. Forward Body biasing technique is used to improve the drivability of transistors and sleep transistor logic is used to reduce the leakage current in standby mode. The proposed design is implemented with 45 nm CMOS technology and is simulated using Cadence Virtuoso Simulator. At 0.5 V supply voltage, the read SNM and write SNM are 98 mV and 112 mV respectively and these are 32% and 21% higher than there reported in literature. The leakage current and power consumption of the cell are 3.26 fA and 1.63 fW respectively.
本文提出了一种改进的差分8T SRAM单元,用于阈下区域的工作。采用正向体偏置技术提高晶体管的可驱动性,采用休眠晶体管逻辑降低待机状态下的漏电流。该设计采用45纳米CMOS技术实现,并使用Cadence Virtuoso模拟器进行仿真。在0.5 V电源电压下,读SNM和写SNM分别为98 mV和112 mV,比文献报道的高32%和21%。电池的漏电流为3.26 fA,功耗为1.63 fW。
{"title":"SRAM cell with improved stability and reduced leakage current for subthreshold region of operation","authors":"P. Sreelakshmi, Kirti S. Pande, N. S. Murty","doi":"10.1109/ICCIC.2015.7435750","DOIUrl":"https://doi.org/10.1109/ICCIC.2015.7435750","url":null,"abstract":"In this paper, a Modified Differential 8T SRAM cell is proposed for subthreshold region of operation. Forward Body biasing technique is used to improve the drivability of transistors and sleep transistor logic is used to reduce the leakage current in standby mode. The proposed design is implemented with 45 nm CMOS technology and is simulated using Cadence Virtuoso Simulator. At 0.5 V supply voltage, the read SNM and write SNM are 98 mV and 112 mV respectively and these are 32% and 21% higher than there reported in literature. The leakage current and power consumption of the cell are 3.26 fA and 1.63 fW respectively.","PeriodicalId":276894,"journal":{"name":"2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)","volume":"168 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116096329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Low power clock Optimized Digital De-Skew Buffer with improved duty cycle correction 低功耗时钟优化数字去斜缓冲器与改进的占空比校正
L. Puneeth, N. S. Murty
In this paper, we propose an architecture for Optimized Digital De-Skew Buffer (ODDB) with improved duty cycle correction using modified edge combiner and interpolator. The transmission gate based edge combiner suffers from the problem of glitches during the setup time and overshoots and undershoots afterwards. Our NAND gate based modified edge combiner, along with the interpolator, removes the glitches, drastically reduces the overshoots and undershoots and improves the duty cycle correction to deliver stable 50% duty cycle clock. A latch based clock gating circuit is used to reduce the power consumption of the ODDB. Half Delay Line blocks are used to introduce the delay and are designed using Coarse Delay Units and Fine Delay lines. The architecture is simulated using Cadence NCSim and the clock is optimized for setup time, hold time and power consumption using the Cadence SoC Encounter. The ODDB is designed and implemented using 45 nm CMOS technology with 1.1 V power supply and is optimized for 500MHz operation. The power consumption and total cell area of the ODDB are 40.6 μW and 354.312 μm2 respectively. A 6% power saving is achieved at the cost of 14% area overhead by implementing clock gating feature in ODDB. The modified edge combiner and interpolator have also been implemented using 45nm FinFET technology (BSIM CMG) and power reduction of 19% and 45% respectively are achieved when compared to the 45nm CMOS implementation.
在本文中,我们提出了一种优化的数字去斜缓冲器(ODDB)的架构,该架构使用改进的边缘组合器和插值器改进了占空比校正。基于传输门的边缘合成器在设置过程中存在小故障和过冲和欠冲问题。我们基于NAND门的改进边缘组合器,以及插值器,消除了小故障,大大减少了过调和欠调,并提高了占空比校正,以提供稳定的50%占空比时钟。采用基于锁存器的时钟门控电路来降低ODDB的功耗。采用半延迟线块引入延迟,采用粗延迟线和细延迟线设计。该架构使用Cadence NCSim进行模拟,并使用Cadence SoC Encounter对时钟进行了设置时间、保持时间和功耗优化。ODDB采用45纳米CMOS技术设计和实现,电源为1.1 V,并针对500MHz工作进行了优化。ODDB的功耗为40.6 μW,电池总面积为354.312 μm2。通过在ODDB中实现时钟门控特性,以14%的面积开销为代价实现了6%的功耗节省。改进的边缘合并器和插补器也使用45纳米FinFET技术(BSIM CMG)实现,与45纳米CMOS实现相比,功耗分别降低了19%和45%。
{"title":"Low power clock Optimized Digital De-Skew Buffer with improved duty cycle correction","authors":"L. Puneeth, N. S. Murty","doi":"10.1109/ICCIC.2015.7435687","DOIUrl":"https://doi.org/10.1109/ICCIC.2015.7435687","url":null,"abstract":"In this paper, we propose an architecture for Optimized Digital De-Skew Buffer (ODDB) with improved duty cycle correction using modified edge combiner and interpolator. The transmission gate based edge combiner suffers from the problem of glitches during the setup time and overshoots and undershoots afterwards. Our NAND gate based modified edge combiner, along with the interpolator, removes the glitches, drastically reduces the overshoots and undershoots and improves the duty cycle correction to deliver stable 50% duty cycle clock. A latch based clock gating circuit is used to reduce the power consumption of the ODDB. Half Delay Line blocks are used to introduce the delay and are designed using Coarse Delay Units and Fine Delay lines. The architecture is simulated using Cadence NCSim and the clock is optimized for setup time, hold time and power consumption using the Cadence SoC Encounter. The ODDB is designed and implemented using 45 nm CMOS technology with 1.1 V power supply and is optimized for 500MHz operation. The power consumption and total cell area of the ODDB are 40.6 μW and 354.312 μm2 respectively. A 6% power saving is achieved at the cost of 14% area overhead by implementing clock gating feature in ODDB. The modified edge combiner and interpolator have also been implemented using 45nm FinFET technology (BSIM CMG) and power reduction of 19% and 45% respectively are achieved when compared to the 45nm CMOS implementation.","PeriodicalId":276894,"journal":{"name":"2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122100769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Performance analysis of MIMO-based transmission techniques for image quality in 4G wireless network 基于mimo的4G无线网络图像质量传输技术性能分析
Deepak N R, S. Balaji
The use of Multiple Inputs Multiple Outputs (MIMO) over the wireless network is increasing rapidly in present years and is expected to be more in future too. The multiple transmit antennas and receive antennas can be introduced in the next generation of wireless network standards for image communication in real time. The image communication has the requirement of large bandwidth. The image data representation requires large information that leads data at high rates and it in turns the high communication energy with distortions in the transmitted image. Various competing MIMO transmission techniques, namely, ODQ, BST, OBST, RO and CO are used to improve the image quality. The paper discussed the few transmission techniques of MIMO for image quality over the 4G wireless network.
多输入多输出(MIMO)在无线网络上的使用近年来迅速增加,预计未来也会更多。在下一代无线网络标准中可以引入多发射天线和多接收天线,实现实时图像通信。图像通信对带宽有较大的要求。图像数据表示需要大量的信息以高速率传输数据,这反过来又需要传输图像中的高通信能量和失真。各种相互竞争的MIMO传输技术,即ODQ、BST、OBST、RO和CO被用来提高图像质量。本文讨论了4G无线网络中MIMO图像质量的几种传输技术。
{"title":"Performance analysis of MIMO-based transmission techniques for image quality in 4G wireless network","authors":"Deepak N R, S. Balaji","doi":"10.1109/ICCIC.2015.7435774","DOIUrl":"https://doi.org/10.1109/ICCIC.2015.7435774","url":null,"abstract":"The use of Multiple Inputs Multiple Outputs (MIMO) over the wireless network is increasing rapidly in present years and is expected to be more in future too. The multiple transmit antennas and receive antennas can be introduced in the next generation of wireless network standards for image communication in real time. The image communication has the requirement of large bandwidth. The image data representation requires large information that leads data at high rates and it in turns the high communication energy with distortions in the transmitted image. Various competing MIMO transmission techniques, namely, ODQ, BST, OBST, RO and CO are used to improve the image quality. The paper discussed the few transmission techniques of MIMO for image quality over the 4G wireless network.","PeriodicalId":276894,"journal":{"name":"2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)","volume":"263 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124291380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1