Pub Date : 2015-03-16DOI: 10.1109/EDCAV.2015.7060530
R. Narasimman, Anil Prabhakar, N. Chandrachoodan
We present the design of a wide range and high resolution time to digital converter (TDC) on FPGA. The multiplexers present in the dedicated carry chain on the FPGA are used in the presented architecture to create the delay line for the conversion. The TDC has been implemented on Spartan-3E FPGA from Xilinx and a resolution of about 30 ps was achieved. The TDC was calibrated against test signals generated using the digital clock manager and varying lengths of wire to generate the controlled delays. With the high resolution TDC implemented, we have realized a wide range (coarse grain and fine grain) TDC and demonstrated the same by performing the jitter measurements for the applied input pulse.
{"title":"Implementation of a 30 ps resolution time to digital converter in FPGA","authors":"R. Narasimman, Anil Prabhakar, N. Chandrachoodan","doi":"10.1109/EDCAV.2015.7060530","DOIUrl":"https://doi.org/10.1109/EDCAV.2015.7060530","url":null,"abstract":"We present the design of a wide range and high resolution time to digital converter (TDC) on FPGA. The multiplexers present in the dedicated carry chain on the FPGA are used in the presented architecture to create the delay line for the conversion. The TDC has been implemented on Spartan-3E FPGA from Xilinx and a resolution of about 30 ps was achieved. The TDC was calibrated against test signals generated using the digital clock manager and varying lengths of wire to generate the controlled delays. With the high resolution TDC implemented, we have realized a wide range (coarse grain and fine grain) TDC and demonstrated the same by performing the jitter measurements for the applied input pulse.","PeriodicalId":277103,"journal":{"name":"2015 International Conference on Electronic Design, Computer Networks & Automated Verification (EDCAV)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133635333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-03-16DOI: 10.1109/EDCAV.2015.7060532
Navdeep Singh, L. Kaur
Diabetic Retinopathy occurs in patients who suffer from diabetes for many years and as a result of which the vision gets affected. The affect can be low to severe depending on the extent to which the disease has occurred. There are two stages of the disease. The early stage is Non proliferative diabetic retinopathy (NPDR) and later is Proliferative diabetic retinopathy (PDR). In NPDR, various problems may occur such as macular edema which is swelling in the central retina and retinal ischemia which occurs due to poor blood flow. In PDR, the advanced stage of NPDR, new blood vessels starts growing in the retina known as neovascularization. The extraction of retinal blood vessels if done at early stages can be very helpful in diagnosing the severity of the disease and accordingly the treatment can be followed. In later stages, treatment is not very effective. In this paper various blood vessel segmentation techniques are discussed. Besides segmentation techniques, retinal image enhancement techniques are also discussed. The evaluation of techniques is done on publically available databases DRIVE and STARE. These databases contain retinal images along with the ground truth images which are accurately marked by the experts for the purpose of evaluation of the techniques. The paper also discusses various metrics which are frequently used for the evaluation of image segmentation techniques.
{"title":"A survey on blood vessel segmentation methods in retinal images","authors":"Navdeep Singh, L. Kaur","doi":"10.1109/EDCAV.2015.7060532","DOIUrl":"https://doi.org/10.1109/EDCAV.2015.7060532","url":null,"abstract":"Diabetic Retinopathy occurs in patients who suffer from diabetes for many years and as a result of which the vision gets affected. The affect can be low to severe depending on the extent to which the disease has occurred. There are two stages of the disease. The early stage is Non proliferative diabetic retinopathy (NPDR) and later is Proliferative diabetic retinopathy (PDR). In NPDR, various problems may occur such as macular edema which is swelling in the central retina and retinal ischemia which occurs due to poor blood flow. In PDR, the advanced stage of NPDR, new blood vessels starts growing in the retina known as neovascularization. The extraction of retinal blood vessels if done at early stages can be very helpful in diagnosing the severity of the disease and accordingly the treatment can be followed. In later stages, treatment is not very effective. In this paper various blood vessel segmentation techniques are discussed. Besides segmentation techniques, retinal image enhancement techniques are also discussed. The evaluation of techniques is done on publically available databases DRIVE and STARE. These databases contain retinal images along with the ground truth images which are accurately marked by the experts for the purpose of evaluation of the techniques. The paper also discusses various metrics which are frequently used for the evaluation of image segmentation techniques.","PeriodicalId":277103,"journal":{"name":"2015 International Conference on Electronic Design, Computer Networks & Automated Verification (EDCAV)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123014291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-03-16DOI: 10.1109/EDCAV.2015.7060559
A. Bhattacharya, Subhasis Koley, A. Banerjee
Post-silicon validation is an important step in the chip design life cycle. This involves observing the signal elements of the chip to check if the signals have the expected values. The process essentially requires observing the circuit behaviour (i.e. the signal values) on giving known inputs, and checking for correctness and conformance. The size of the trace buffer which stores the values of the signals during the post-silicon validation step, limits the number of signals that can be observed. Deciding the best signal set to monitor given the constraint on the size of the trace buffer is an important task. In this paper, we present an algorithm for signal selection, that allows us to select signals which, on traced, gives us better restoration than existing techniques.
{"title":"Considering multi-cycle influences for signal selection for Post Silicon Validation","authors":"A. Bhattacharya, Subhasis Koley, A. Banerjee","doi":"10.1109/EDCAV.2015.7060559","DOIUrl":"https://doi.org/10.1109/EDCAV.2015.7060559","url":null,"abstract":"Post-silicon validation is an important step in the chip design life cycle. This involves observing the signal elements of the chip to check if the signals have the expected values. The process essentially requires observing the circuit behaviour (i.e. the signal values) on giving known inputs, and checking for correctness and conformance. The size of the trace buffer which stores the values of the signals during the post-silicon validation step, limits the number of signals that can be observed. Deciding the best signal set to monitor given the constraint on the size of the trace buffer is an important task. In this paper, we present an algorithm for signal selection, that allows us to select signals which, on traced, gives us better restoration than existing techniques.","PeriodicalId":277103,"journal":{"name":"2015 International Conference on Electronic Design, Computer Networks & Automated Verification (EDCAV)","volume":"276 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123161606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-03-16DOI: 10.1109/EDCAV.2015.7060539
N. Gogoi, P. Sahu
An optically controlled two mode interference coupler based on index-guided multimode plasmonic waveguide is proposed with silicon core and GaAsInP as the cladding on the two sides. Optically controlled switching operation is observed by refractive index modulation of GaAsInP due to launching of optical pulse. The optical pulse-controlled coupling characteristics of the proposed device are studied for nonlinear switching action.
{"title":"Numerical modelling for a basic switching unit based on nonlinear plasmonic two mode waveguide","authors":"N. Gogoi, P. Sahu","doi":"10.1109/EDCAV.2015.7060539","DOIUrl":"https://doi.org/10.1109/EDCAV.2015.7060539","url":null,"abstract":"An optically controlled two mode interference coupler based on index-guided multimode plasmonic waveguide is proposed with silicon core and GaAsInP as the cladding on the two sides. Optically controlled switching operation is observed by refractive index modulation of GaAsInP due to launching of optical pulse. The optical pulse-controlled coupling characteristics of the proposed device are studied for nonlinear switching action.","PeriodicalId":277103,"journal":{"name":"2015 International Conference on Electronic Design, Computer Networks & Automated Verification (EDCAV)","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115891241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-03-16DOI: 10.1109/EDCAV.2015.7060550
Kaushik Chandra Deva Sarma, Santanu Sharma
This paper presents a method for determining the depletion width of single and double gate Junction Less transistor. By solving 1D Poisson's equation the depletion width expression is obtained. The variation of depletion width for both n-channel and p-channel device with doping concentration, gate voltage, drain to source voltage and dielectric constant of gate dielectric are shown.
{"title":"A method for determination of depletion width of single and double gate junction less transistor","authors":"Kaushik Chandra Deva Sarma, Santanu Sharma","doi":"10.1109/EDCAV.2015.7060550","DOIUrl":"https://doi.org/10.1109/EDCAV.2015.7060550","url":null,"abstract":"This paper presents a method for determining the depletion width of single and double gate Junction Less transistor. By solving 1D Poisson's equation the depletion width expression is obtained. The variation of depletion width for both n-channel and p-channel device with doping concentration, gate voltage, drain to source voltage and dielectric constant of gate dielectric are shown.","PeriodicalId":277103,"journal":{"name":"2015 International Conference on Electronic Design, Computer Networks & Automated Verification (EDCAV)","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116915231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-03-16DOI: 10.1109/EDCAV.2015.7060547
R. Deka, J. C. Dutta
Acetylcholine sensitive field effect transistor (AchFET) has been modeled and simulated to use as circuit element in a neuron circuit. AchFET has been modeled using enzyme kinetics and site binding theory. Based on the simulated characteristics, it is used as an analog of variable conductance in the Hodgkin-Huxley electrical model of neuron that was used to study the resistance and capacitance properties of a patch of squid axon membrane. PSPICE simulation of the circuit using AchFET gives satisfactory reproduction of sodium and potassium currents and simulated electronic action potential is very similar to the experimentally recorded one. Due to the simplicity of this circuit, it may be used as an ideal unit in neurology to study the receptor function and electrical activity of neuron.
{"title":"Modeling and simulation of a NEUOROBIOFET for application in neurology","authors":"R. Deka, J. C. Dutta","doi":"10.1109/EDCAV.2015.7060547","DOIUrl":"https://doi.org/10.1109/EDCAV.2015.7060547","url":null,"abstract":"Acetylcholine sensitive field effect transistor (AchFET) has been modeled and simulated to use as circuit element in a neuron circuit. AchFET has been modeled using enzyme kinetics and site binding theory. Based on the simulated characteristics, it is used as an analog of variable conductance in the Hodgkin-Huxley electrical model of neuron that was used to study the resistance and capacitance properties of a patch of squid axon membrane. PSPICE simulation of the circuit using AchFET gives satisfactory reproduction of sodium and potassium currents and simulated electronic action potential is very similar to the experimentally recorded one. Due to the simplicity of this circuit, it may be used as an ideal unit in neurology to study the receptor function and electrical activity of neuron.","PeriodicalId":277103,"journal":{"name":"2015 International Conference on Electronic Design, Computer Networks & Automated Verification (EDCAV)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123686376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-03-16DOI: 10.1109/EDCAV.2015.7060558
D. Ravilla, Chandra Shekar Reddy Putta
The purpose of a hash function is to produce a "fingerprint" of a message or data for authentication. The strength of the Hash code against brute-force attacks depends on the length of the hash code produced by the algorithm. Constructing the Message Authentication Codes (MAC) from Cryptographic hash functions (SHA-256) gives faster execution in software than symmetric block ciphers like Data Encryption Standard (DES) and also the library code for cryptographic hash functions are widely available. Here we implemented the HMAC-SHA 256 Algorithm for the message authentication and Data Integrity. This algorithm is introduced in hybrid routing protocol for Mobile network environment and the performance of the protocol is analyzed by calculating throughput, packet delivery ration and end-to-end delays of the network The simulation is carried out using Network Simulator 2 (NS2). We observed that there is an improvement in throughput and packet delivery ratio at the cost of more processing time.
{"title":"Implementation of HMAC-SHA256 algorithm for hybrid routing protocols in MANETs","authors":"D. Ravilla, Chandra Shekar Reddy Putta","doi":"10.1109/EDCAV.2015.7060558","DOIUrl":"https://doi.org/10.1109/EDCAV.2015.7060558","url":null,"abstract":"The purpose of a hash function is to produce a \"fingerprint\" of a message or data for authentication. The strength of the Hash code against brute-force attacks depends on the length of the hash code produced by the algorithm. Constructing the Message Authentication Codes (MAC) from Cryptographic hash functions (SHA-256) gives faster execution in software than symmetric block ciphers like Data Encryption Standard (DES) and also the library code for cryptographic hash functions are widely available. Here we implemented the HMAC-SHA 256 Algorithm for the message authentication and Data Integrity. This algorithm is introduced in hybrid routing protocol for Mobile network environment and the performance of the protocol is analyzed by calculating throughput, packet delivery ration and end-to-end delays of the network The simulation is carried out using Network Simulator 2 (NS2). We observed that there is an improvement in throughput and packet delivery ratio at the cost of more processing time.","PeriodicalId":277103,"journal":{"name":"2015 International Conference on Electronic Design, Computer Networks & Automated Verification (EDCAV)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117031405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-03-16DOI: 10.1109/EDCAV.2015.7060560
R. Subadar, Rajkishur Mudoi
In this paper, the outage probability and average bit error rate of a multiuser, multiple input multiple output (MIMO) systems has been incorporated with transmit antenna selection maximal ratio combining (TAS/MRC) over Rayleigh fading channels considering exponential correlation. Exponential correlation is observed when antennas are placed in a linear array in a receiver. A closed form analytical expressions for the outage probability and the ABER for binary modulations have been derived. Outage probability and ABER have been studied for various levels of correlation with different level of diversity order. Finally, obtained analytical expressions have been validated by Monte-Carlo simulation.
{"title":"Performance of multiuser TAS/MRC-MIMO systems over Rayleigh fading channels with exponential correlation","authors":"R. Subadar, Rajkishur Mudoi","doi":"10.1109/EDCAV.2015.7060560","DOIUrl":"https://doi.org/10.1109/EDCAV.2015.7060560","url":null,"abstract":"In this paper, the outage probability and average bit error rate of a multiuser, multiple input multiple output (MIMO) systems has been incorporated with transmit antenna selection maximal ratio combining (TAS/MRC) over Rayleigh fading channels considering exponential correlation. Exponential correlation is observed when antennas are placed in a linear array in a receiver. A closed form analytical expressions for the outage probability and the ABER for binary modulations have been derived. Outage probability and ABER have been studied for various levels of correlation with different level of diversity order. Finally, obtained analytical expressions have been validated by Monte-Carlo simulation.","PeriodicalId":277103,"journal":{"name":"2015 International Conference on Electronic Design, Computer Networks & Automated Verification (EDCAV)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126692120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-03-16DOI: 10.1109/EDCAV.2015.7060562
Pranay Yadav
In the field of digital image processing impulse noise removal from color images is one of the most challenging tasks for researchers. A Modified Adaptive Threshold Median Filter (MATMF) is presented for impulse noise removal for both low and high-density noise levels. In this paper, we have proposed filter for color image random valued impulse noise reduction. For color images, impulse noise removal there are two main stages, firstly, the detection of the impulse noises on the basis of maximum and minimum value of pixels in a small window. In the second stage removal of noise on the basics median calculation. In the filtering stage, the noise-free pixels remain unchanged in all RGB frames, windows and noisy pixels are restored using a median filter. Experimental results show that proposed method is superior to the conventional methods in Peak Signal Noise Ratio [8] (PSNR) values and Mean Square Error (MSE) of the image performs, with and without noise compared. The mathematical analysis describes that the analysis of the noisy pixels and use of noise-free pixels for the de-noising purpose provide much better results and provides better visual quality of de-noised image and provide good quality in human persecution.
{"title":"Color image noise removal by modified adaptive threshold median filter for RVIN","authors":"Pranay Yadav","doi":"10.1109/EDCAV.2015.7060562","DOIUrl":"https://doi.org/10.1109/EDCAV.2015.7060562","url":null,"abstract":"In the field of digital image processing impulse noise removal from color images is one of the most challenging tasks for researchers. A Modified Adaptive Threshold Median Filter (MATMF) is presented for impulse noise removal for both low and high-density noise levels. In this paper, we have proposed filter for color image random valued impulse noise reduction. For color images, impulse noise removal there are two main stages, firstly, the detection of the impulse noises on the basis of maximum and minimum value of pixels in a small window. In the second stage removal of noise on the basics median calculation. In the filtering stage, the noise-free pixels remain unchanged in all RGB frames, windows and noisy pixels are restored using a median filter. Experimental results show that proposed method is superior to the conventional methods in Peak Signal Noise Ratio [8] (PSNR) values and Mean Square Error (MSE) of the image performs, with and without noise compared. The mathematical analysis describes that the analysis of the noisy pixels and use of noise-free pixels for the de-noising purpose provide much better results and provides better visual quality of de-noised image and provide good quality in human persecution.","PeriodicalId":277103,"journal":{"name":"2015 International Conference on Electronic Design, Computer Networks & Automated Verification (EDCAV)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115898452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-03-16DOI: 10.1109/EDCAV.2015.7060542
Sudip Ghosh, Subhojit Chatterjee, S. Maity, H. Rahaman
This paper presents a new algorithm on wavelet based robust and invisible digital image watermarking for multimedia security. The proposed algorithm has been designed, implemented and verified using MATLAB R2014a simulation for both embedding and extraction of the watermark and the results of which shows significant improvement in performance metrics like PSNR, SSIM, Mean Correlation, MSE than the other existing algorithms in the current literature. The cover image considered here in our algorithm is of the size (256×256) and the binary watermark image size is taken as (16×16).
{"title":"A new algorithm on wavelet based robust invisible digital image watermarking for multimedia security","authors":"Sudip Ghosh, Subhojit Chatterjee, S. Maity, H. Rahaman","doi":"10.1109/EDCAV.2015.7060542","DOIUrl":"https://doi.org/10.1109/EDCAV.2015.7060542","url":null,"abstract":"This paper presents a new algorithm on wavelet based robust and invisible digital image watermarking for multimedia security. The proposed algorithm has been designed, implemented and verified using MATLAB R2014a simulation for both embedding and extraction of the watermark and the results of which shows significant improvement in performance metrics like PSNR, SSIM, Mean Correlation, MSE than the other existing algorithms in the current literature. The cover image considered here in our algorithm is of the size (256×256) and the binary watermark image size is taken as (16×16).","PeriodicalId":277103,"journal":{"name":"2015 International Conference on Electronic Design, Computer Networks & Automated Verification (EDCAV)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129524251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}