首页 > 最新文献

2014 International Conference on Electronic Systems, Signal Processing and Computing Technologies最新文献

英文 中文
A Modified Approach of Key Manipulation in Cryptography Using 2D Graphics Image 一种改进的二维图形图像密码密钥处理方法
Pratik Shrivastava, Retesh Jain, K. Raghuwanshi
Cryptography is basically securing the data during the communication between different systems. To provide the security of data during communication in cryptography we together require the Algorithm and Key. The confidentiality and integrity of the data during communication depends partially on algorithm and partially on key. Due to human memorizability the size of key in cryptography is limited. 2Dimension graphics image have the property that by visualising or by listening its dimension it is not possible to design exactly the same pattern. In this paper a modified approach is being proposed for increasing the security of the data. For increasing the security we are basically concentrating on the key part of the cryptography we basically uses the 2Dimension graphics image which is designed by the user. 2Dimension Graphics image is composed of pixels in which each pixel have different or same ASCII value. From the large collection of pixel the proposed algorithm will generate any size of key which can be used in encryption as well as in decryption.
密码学基本上是在不同系统之间的通信期间保护数据。在密码学中,为了保证数据在通信过程中的安全性,我们需要算法和密钥。通信过程中数据的保密性和完整性部分取决于算法,部分取决于密钥。由于人的可记忆性,密码中密钥的大小是有限的。二维图形图像具有这样的特性,即通过可视化或通过聆听其维度来设计完全相同的图案是不可能的。本文提出了一种改进的方法来提高数据的安全性。为了提高安全性,我们基本上集中在加密的关键部分,我们基本上使用由用户设计的二维图形图像。二维图形图像由像素组成,其中每个像素具有不同或相同的ASCII值。该算法从大量的像素集合中生成任意大小的密钥,这些密钥既可以用于加密,也可以用于解密。
{"title":"A Modified Approach of Key Manipulation in Cryptography Using 2D Graphics Image","authors":"Pratik Shrivastava, Retesh Jain, K. Raghuwanshi","doi":"10.1109/ICESC.2014.40","DOIUrl":"https://doi.org/10.1109/ICESC.2014.40","url":null,"abstract":"Cryptography is basically securing the data during the communication between different systems. To provide the security of data during communication in cryptography we together require the Algorithm and Key. The confidentiality and integrity of the data during communication depends partially on algorithm and partially on key. Due to human memorizability the size of key in cryptography is limited. 2Dimension graphics image have the property that by visualising or by listening its dimension it is not possible to design exactly the same pattern. In this paper a modified approach is being proposed for increasing the security of the data. For increasing the security we are basically concentrating on the key part of the cryptography we basically uses the 2Dimension graphics image which is designed by the user. 2Dimension Graphics image is composed of pixels in which each pixel have different or same ASCII value. From the large collection of pixel the proposed algorithm will generate any size of key which can be used in encryption as well as in decryption.","PeriodicalId":335267,"journal":{"name":"2014 International Conference on Electronic Systems, Signal Processing and Computing Technologies","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115845271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Comparative Analysis of Various Cluster Detection Techniques for Data Mining 数据挖掘中各种聚类检测技术的比较分析
Prashant Vats, Manju Mandot, A. Gosain
Data mining is a knowledge discovery technique, used for exploring the new facts and relationships among data. It enables a user to uncover hidden information among available datasets. Cluster detection is one of the major techniques, which is used for data mining. In the Cluster detection techniques, User performs mining of data by searching for cluster of elements that are similar to each other. Each implementation of the cluster detection techniques adopts a method of comparing the value of individual datasets with those in their centroids. So, in this paper we have enlisted a few of them. Based on certain parameters, we have carried out a comprehensive analysis of various clustering techniques.
数据挖掘是一种知识发现技术,用于探索数据之间新的事实和关系。它使用户能够发现可用数据集中的隐藏信息。聚类检测是用于数据挖掘的主要技术之一。在聚类检测技术中,User通过搜索彼此相似的元素簇来进行数据挖掘。每一种聚类检测技术的实现都采用一种将单个数据集的值与其质心中的值进行比较的方法。因此,在本文中,我们列出了其中的一些。基于一定的参数,我们对各种聚类技术进行了综合分析。
{"title":"A Comparative Analysis of Various Cluster Detection Techniques for Data Mining","authors":"Prashant Vats, Manju Mandot, A. Gosain","doi":"10.1109/ICESC.2014.67","DOIUrl":"https://doi.org/10.1109/ICESC.2014.67","url":null,"abstract":"Data mining is a knowledge discovery technique, used for exploring the new facts and relationships among data. It enables a user to uncover hidden information among available datasets. Cluster detection is one of the major techniques, which is used for data mining. In the Cluster detection techniques, User performs mining of data by searching for cluster of elements that are similar to each other. Each implementation of the cluster detection techniques adopts a method of comparing the value of individual datasets with those in their centroids. So, in this paper we have enlisted a few of them. Based on certain parameters, we have carried out a comprehensive analysis of various clustering techniques.","PeriodicalId":335267,"journal":{"name":"2014 International Conference on Electronic Systems, Signal Processing and Computing Technologies","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128260456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Augmented Execution in Mobile Cloud Computing: A Survey 移动云计算中的增强执行:调查
V. Jagtap, Karishma Pawar, Ajeet Ram Pathak
As the technology is developing with a huge rate, the functionality of smartphone is also getting higher. But the smartphones have some resource constraints like processing power, battery capacity, limited bandwidth for connecting to the Internet, etc. Therefore, to improve the performance of smartphone in terms of processing power, battery and memory, the technology namely, augmented execution is the best solution in the mobile cloud computing (MCC) scenario. Mobile cloud computing works as the combination of mobile computing and cloud computing. Augmented execution alleviates the problem of resource scarcity of smartphone. To get the benefits from the resource-abundant clouds, massive computation intensive tasks are partitioned and migrated to the cloud side for the execution. After executing the task at the cloud side, the results are sent back to the smartphone. This method is called as the computation offloading. The given survey paper focuses on the partitioning techniques in mobile cloud computing.
随着技术的飞速发展,智能手机的功能也越来越高。但智能手机有一些资源限制,比如处理能力、电池容量、连接互联网的带宽有限等。因此,为了提高智能手机在处理能力、电池和内存方面的性能,增强执行技术是移动云计算(MCC)场景下的最佳解决方案。移动云计算是移动计算和云计算的结合。增强执行缓解了智能手机资源稀缺的问题。为了从资源丰富的云中获得好处,大量计算密集型任务被分区并迁移到云中执行。在云端执行任务后,结果被发送回智能手机。这种方法称为计算卸载。本文主要研究移动云计算中的分区技术。
{"title":"Augmented Execution in Mobile Cloud Computing: A Survey","authors":"V. Jagtap, Karishma Pawar, Ajeet Ram Pathak","doi":"10.1109/ICESC.2014.46","DOIUrl":"https://doi.org/10.1109/ICESC.2014.46","url":null,"abstract":"As the technology is developing with a huge rate, the functionality of smartphone is also getting higher. But the smartphones have some resource constraints like processing power, battery capacity, limited bandwidth for connecting to the Internet, etc. Therefore, to improve the performance of smartphone in terms of processing power, battery and memory, the technology namely, augmented execution is the best solution in the mobile cloud computing (MCC) scenario. Mobile cloud computing works as the combination of mobile computing and cloud computing. Augmented execution alleviates the problem of resource scarcity of smartphone. To get the benefits from the resource-abundant clouds, massive computation intensive tasks are partitioned and migrated to the cloud side for the execution. After executing the task at the cloud side, the results are sent back to the smartphone. This method is called as the computation offloading. The given survey paper focuses on the partitioning techniques in mobile cloud computing.","PeriodicalId":335267,"journal":{"name":"2014 International Conference on Electronic Systems, Signal Processing and Computing Technologies","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130288916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An Approach to Balance the Load with Security for Distributed File System in Cloud 云环境下分布式文件系统的负载与安全平衡方法
Vidya N. Chiwande, Animesh R. Tayal
A file system is used for the organization, storage, retrieval, naming, sharing, and protection of files. Distributed file system has certain degrees of transparency to the user and the system such as access transparency, [2] location transparency, failure transparency, heterogeneity, replication transparency etc. [1][2] NFS (Network File System), RFS (Remote File Sharing), Andrew File System (AFS) are examples of Distributed file system. Distributed file systems are generally used for cloud computing applications based on [4] the MapReduce programming model. A MapReduce program consist of a Map () procedure that performs filtering and a Reduce () procedure that performs a summary operation. However, in a cloud computing environment, sometimes failure is occurs and nodes may be upgraded, replaced, and added in the system. Therefore load imbalanced problem arises. To solve this problem, load rebalancing algorithm is implemented in this paper so that central node should not overloaded. The implementation is done in hadoop distributed file system. As apache hadoop is used, security issues are arises. To solve these security issues and to increase security, [17]Kerberos authentication protocol is implemented to handle multiple nodes. This paper shows real time implementation experiment on cluster.
文件系统用于文件的组织、存储、检索、命名、共享和保护。分布式文件系统对用户和系统具有一定程度的透明性,如访问透明性、[2]位置透明性、故障透明性、异构性、复制透明性等[1][2]。NFS (Network file system)、RFS (Remote file Sharing)、Andrew file system (AFS)都是分布式文件系统的例子。分布式文件系统一般用于基于[4]MapReduce编程模型的云计算应用。MapReduce程序由执行过滤的Map()过程和执行汇总操作的Reduce()过程组成。然而,在云计算环境中,有时会出现故障,可能会对系统进行升级、替换和添加节点。因此产生了负载不平衡问题。为了解决这一问题,本文实现了负载再平衡算法,使中心节点不过载。在hadoop分布式文件系统中实现。在使用apache hadoop时,会出现安全问题。为了解决这些安全问题并提高安全性,[17]采用Kerberos身份验证协议来处理多节点。本文给出了在集群上的实时实现实验。
{"title":"An Approach to Balance the Load with Security for Distributed File System in Cloud","authors":"Vidya N. Chiwande, Animesh R. Tayal","doi":"10.1109/ICESC.2014.51","DOIUrl":"https://doi.org/10.1109/ICESC.2014.51","url":null,"abstract":"A file system is used for the organization, storage, retrieval, naming, sharing, and protection of files. Distributed file system has certain degrees of transparency to the user and the system such as access transparency, [2] location transparency, failure transparency, heterogeneity, replication transparency etc. [1][2] NFS (Network File System), RFS (Remote File Sharing), Andrew File System (AFS) are examples of Distributed file system. Distributed file systems are generally used for cloud computing applications based on [4] the MapReduce programming model. A MapReduce program consist of a Map () procedure that performs filtering and a Reduce () procedure that performs a summary operation. However, in a cloud computing environment, sometimes failure is occurs and nodes may be upgraded, replaced, and added in the system. Therefore load imbalanced problem arises. To solve this problem, load rebalancing algorithm is implemented in this paper so that central node should not overloaded. The implementation is done in hadoop distributed file system. As apache hadoop is used, security issues are arises. To solve these security issues and to increase security, [17]Kerberos authentication protocol is implemented to handle multiple nodes. This paper shows real time implementation experiment on cluster.","PeriodicalId":335267,"journal":{"name":"2014 International Conference on Electronic Systems, Signal Processing and Computing Technologies","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132563260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Classification of Indian Classical Instruments Using Spectral and Principal Component Analysis Based Cepstrum Features 基于倒谱特征的频谱和主成分分析对印度古典乐器的分类
Sneha Gaikwad, A. Chitre, Y. Dandawate
In applications such as music information and database retrieval systems, classification of musical instruments plays an important role. The proposed work presents automatic classification of Indian Classical instruments based on spectral and MFCC features using well trained back propogation neural network classifier. Musical instruments such as Harmonium, Santo or and Tabla are considered for an experimentation. The spectral features such as amplitude and spectral range along with Mel Frequency Cepstrum Coefficients are considered as features. Being features are not distinguished, classification is done using non parametric classifiers such as neural networks. Being number of cepstrum coefficients are large important coefficients are selected using Principal Component Analysis. It has been observed that using 42 samples for training and 18 for testing, back propogation neural network provides accuracy of 98%. The present work can be extended for more number of Hindustani and Carnitic classical musical Instruments.
在音乐信息和数据库检索系统等应用中,乐器分类起着重要的作用。本文利用训练良好的反向传播神经网络分类器,提出了基于频谱和MFCC特征的印度古典乐器自动分类方法。乐器如Harmonium, Santo或Tabla被认为是一种实验。频谱特征如振幅和频谱范围以及Mel频率倒谱系数被认为是特征。由于无法区分特征,因此使用神经网络等非参数分类器进行分类。当倒谱系数较大时,采用主成分分析法选择重要系数。研究发现,使用42个样本进行训练,18个样本进行测试,反向传播神经网络的准确率达到98%。目前的工作可以扩展到更多的印度斯坦和北欧古典乐器。
{"title":"Classification of Indian Classical Instruments Using Spectral and Principal Component Analysis Based Cepstrum Features","authors":"Sneha Gaikwad, A. Chitre, Y. Dandawate","doi":"10.1109/ICESC.2014.52","DOIUrl":"https://doi.org/10.1109/ICESC.2014.52","url":null,"abstract":"In applications such as music information and database retrieval systems, classification of musical instruments plays an important role. The proposed work presents automatic classification of Indian Classical instruments based on spectral and MFCC features using well trained back propogation neural network classifier. Musical instruments such as Harmonium, Santo or and Tabla are considered for an experimentation. The spectral features such as amplitude and spectral range along with Mel Frequency Cepstrum Coefficients are considered as features. Being features are not distinguished, classification is done using non parametric classifiers such as neural networks. Being number of cepstrum coefficients are large important coefficients are selected using Principal Component Analysis. It has been observed that using 42 samples for training and 18 for testing, back propogation neural network provides accuracy of 98%. The present work can be extended for more number of Hindustani and Carnitic classical musical Instruments.","PeriodicalId":335267,"journal":{"name":"2014 International Conference on Electronic Systems, Signal Processing and Computing Technologies","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132565830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Energy Efficient Scheduling Strategy for Data Collection in Wireless Sensor Networks 无线传感器网络中数据采集的节能调度策略
Prerana Shrivastava, S. Pokle
Wireless Sensor Networks represents a new pattern for extracting the data from the environment for many agricultural, industrial and scientific applications. Data gathering protocols are formulated for configuring the network and collecting the information from the desired environment. Sensors have limited battery power and the communication module consumes the maximum power in the sensors. A key challenging issue in case of wireless sensor networks is to decide on a fixed pattern for the purpose of data collection. For this it is very important to schedule the various activities of the sensors which would lead to the reduction in the energy consumption by the network as a whole. In this paper we have focused on two major aspects. One is the construction of data gathering tree and the other is the energy efficient scheduling. Here we have proposed a scheduling strategy which makes use of TDMA and schedules the activities of a subset of a sensors into different groups with successive time slots thereby reducing the state transition and hence the energy consumption. The proposed scheduling algorithm has been simulated in NS-2.32 and the performance has been evaluated on the various performance metrics of Wireless Sensor Networks. The simulation result shows that our proposed scheduling strategy improves the performance metrics like Delivery Ratio and Energy as compared to the traditional method of scheduling.
无线传感器网络代表了一种从环境中提取数据的新模式,适用于许多农业、工业和科学应用。数据采集协议是为了配置网络和收集所需环境的信息而制定的。传感器的电池电量有限,通信模块消耗传感器中最大的功率。在无线传感器网络的情况下,一个关键的具有挑战性的问题是确定一个固定的模式为目的的数据收集。为此,对传感器的各种活动进行调度是非常重要的,这将导致整个网络能耗的降低。在本文中,我们主要关注两个方面。一个是数据采集树的构建,另一个是节能调度。在这里,我们提出了一种调度策略,该策略利用TDMA并将传感器子集的活动调度到具有连续时间段的不同组中,从而减少了状态转移,从而减少了能量消耗。提出的调度算法在NS-2.32中进行了仿真,并在无线传感器网络的各种性能指标上进行了性能评估。仿真结果表明,与传统的调度方法相比,我们提出的调度策略提高了交付率和能量等性能指标。
{"title":"Energy Efficient Scheduling Strategy for Data Collection in Wireless Sensor Networks","authors":"Prerana Shrivastava, S. Pokle","doi":"10.1109/ICESC.2014.35","DOIUrl":"https://doi.org/10.1109/ICESC.2014.35","url":null,"abstract":"Wireless Sensor Networks represents a new pattern for extracting the data from the environment for many agricultural, industrial and scientific applications. Data gathering protocols are formulated for configuring the network and collecting the information from the desired environment. Sensors have limited battery power and the communication module consumes the maximum power in the sensors. A key challenging issue in case of wireless sensor networks is to decide on a fixed pattern for the purpose of data collection. For this it is very important to schedule the various activities of the sensors which would lead to the reduction in the energy consumption by the network as a whole. In this paper we have focused on two major aspects. One is the construction of data gathering tree and the other is the energy efficient scheduling. Here we have proposed a scheduling strategy which makes use of TDMA and schedules the activities of a subset of a sensors into different groups with successive time slots thereby reducing the state transition and hence the energy consumption. The proposed scheduling algorithm has been simulated in NS-2.32 and the performance has been evaluated on the various performance metrics of Wireless Sensor Networks. The simulation result shows that our proposed scheduling strategy improves the performance metrics like Delivery Ratio and Energy as compared to the traditional method of scheduling.","PeriodicalId":335267,"journal":{"name":"2014 International Conference on Electronic Systems, Signal Processing and Computing Technologies","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131697769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Selection of Digital Controller for Power System and Power Electronics Applications 电力系统和电力电子应用中数字控制器的选择
U. Mujumdar, D. R. Tutkane
Power converters exhibiting higher efficiency, faster response and better control is need of the day. Sophisticated control algorithms are required for the implementation of these converters. This has increased the use of digital controllers in power system and power electronics applications. Selection of a digital controller for power control application is a challenge as there are variety of architectures, specifications, development platforms and design requirements. A right selection is possible only if the application requirements and digital controller capabilities are exactly known. This paper is an attempt to discuss the different aspects of digital controller required for power applications. In initial part of the paper, review of various power system and power electronics applications requiring the digital controller has been taken while the later part of the paper discusses about digital controller specifications to be considered.
功率变换器具有更高的效率,更快的响应和更好的控制是当今的需求。这些变换器的实现需要复杂的控制算法。这增加了数字控制器在电力系统和电力电子应用中的使用。为功率控制应用选择数字控制器是一项挑战,因为存在各种架构,规格,开发平台和设计要求。只有在应用需求和数字控制器功能完全已知的情况下,才有可能做出正确的选择。本文试图讨论电力应用所需的数字控制器的不同方面。在论文的开头部分,回顾了各种电力系统和电力电子应用对数字控制器的要求,而论文的后半部分讨论了数字控制器的规格。
{"title":"Selection of Digital Controller for Power System and Power Electronics Applications","authors":"U. Mujumdar, D. R. Tutkane","doi":"10.1109/ICESC.2014.97","DOIUrl":"https://doi.org/10.1109/ICESC.2014.97","url":null,"abstract":"Power converters exhibiting higher efficiency, faster response and better control is need of the day. Sophisticated control algorithms are required for the implementation of these converters. This has increased the use of digital controllers in power system and power electronics applications. Selection of a digital controller for power control application is a challenge as there are variety of architectures, specifications, development platforms and design requirements. A right selection is possible only if the application requirements and digital controller capabilities are exactly known. This paper is an attempt to discuss the different aspects of digital controller required for power applications. In initial part of the paper, review of various power system and power electronics applications requiring the digital controller has been taken while the later part of the paper discusses about digital controller specifications to be considered.","PeriodicalId":335267,"journal":{"name":"2014 International Conference on Electronic Systems, Signal Processing and Computing Technologies","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130871509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An FPGA-Based Novel Architecture for the Fixed-Point Binary Antilogarithmic Computation 一种基于fpga的定点二进制反对数计算新架构
J. Pandey, A. Karmakar, C. Shekhar, S. Gurunarayanan
Emerging embedded system applications require low power, fast and area-efficient implementation of complex arithmetic operations. Modern field-programmable gate array (FPGA) is a suitable candidate for implementing any reasonably complex architecture within minimal design time. Apart from the logic resources, most of the FPGAs contain hard-macro elements. By using a fixed-point data path, the available FPGA macro elements can be used to design an architecture that is much more complex. The realization of the complex arithmetic elements can be simpler by using a logarithmic number system. In this paper, a novel architecture and the FPGA realization of an antilogarithmic computing circuit is proposed. The proposed antilogarithmic circuit uses piecewise linear approximation method. The same architecture works for both the positive and negative binary numbers. A unique barrel-shifter is designed which shifts the input data to the left or right by the required amount. The proposed architecture is implemented in the Xilinx Virtex-5 xc5vfx70t device. The device utilization shows that the architecture utilizes a minimal FPGA resource. We have also performed error analysis of the approximation result. The error analysis shows that error associated with the positive numbers is 0.16% while that for the negative numbers is 0.8%. The error can be further minimized by taking more bits for the fractional bit representation.
新兴的嵌入式系统应用需要低功耗、快速和高效地实现复杂的算术运算。现代现场可编程门阵列(FPGA)是在最短的设计时间内实现任何合理复杂架构的合适人选。除了逻辑资源外,大多数fpga都包含硬宏元素。通过使用定点数据路径,可用的FPGA宏元素可用于设计更复杂的体系结构。复杂算术元素的实现可以用对数数制来简化。本文提出了一种新的反对数计算电路的结构和FPGA实现方法。所提出的反对数电路采用分段线性逼近方法。相同的体系结构适用于正数和负数二进制。设计了一种独特的移桶器,将输入数据向左或向右移动所需的量。提出的架构在Xilinx Virtex-5 xc5vfx70t设备中实现。器件利用率表明,该架构利用了最小的FPGA资源。并对逼近结果进行了误差分析。误差分析表明,与正数相关的误差为0.16%,与负数相关的误差为0.8%。通过为小数位表示取更多的位,可以进一步减小误差。
{"title":"An FPGA-Based Novel Architecture for the Fixed-Point Binary Antilogarithmic Computation","authors":"J. Pandey, A. Karmakar, C. Shekhar, S. Gurunarayanan","doi":"10.1109/ICESC.2014.13","DOIUrl":"https://doi.org/10.1109/ICESC.2014.13","url":null,"abstract":"Emerging embedded system applications require low power, fast and area-efficient implementation of complex arithmetic operations. Modern field-programmable gate array (FPGA) is a suitable candidate for implementing any reasonably complex architecture within minimal design time. Apart from the logic resources, most of the FPGAs contain hard-macro elements. By using a fixed-point data path, the available FPGA macro elements can be used to design an architecture that is much more complex. The realization of the complex arithmetic elements can be simpler by using a logarithmic number system. In this paper, a novel architecture and the FPGA realization of an antilogarithmic computing circuit is proposed. The proposed antilogarithmic circuit uses piecewise linear approximation method. The same architecture works for both the positive and negative binary numbers. A unique barrel-shifter is designed which shifts the input data to the left or right by the required amount. The proposed architecture is implemented in the Xilinx Virtex-5 xc5vfx70t device. The device utilization shows that the architecture utilizes a minimal FPGA resource. We have also performed error analysis of the approximation result. The error analysis shows that error associated with the positive numbers is 0.16% while that for the negative numbers is 0.8%. The error can be further minimized by taking more bits for the fractional bit representation.","PeriodicalId":335267,"journal":{"name":"2014 International Conference on Electronic Systems, Signal Processing and Computing Technologies","volume":"229 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122580100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Digital Watermarking in Video for Copyright Protection 基于版权保护的视频数字水印
Anita Jadhav, Megha M. Kolhekar
In this paper we describe specific application of digital watermarking: Video watermarking for Copyright protection. Literature survey suggests that most video watermarking techniques use static 3D Discrete Cosine Transform technique. In this paper, we show the result of implementation of static 3 D DCT. We observe that this scheme works well on correlated videos. But it does not take care of scene change in the video. Hence we propose dynamic size 3D-DCT technique (by "scene change detection") for embedding binary/ gray scale/ color watermark on a color digital video and compare our results with existing fixed length 3D-DCT technique.
本文介绍了数字水印的具体应用:用于版权保护的视频水印。文献调查表明,大多数视频水印技术使用静态三维离散余弦变换技术。在本文中,我们展示了静态三维DCT的实现结果。我们观察到该方案在相关视频上效果良好。但是它不能处理视频中的场景变化。因此,我们提出了动态尺寸3D-DCT技术(通过“场景变化检测”),用于在彩色数字视频上嵌入二进制/灰度/彩色水印,并将我们的结果与现有的固定长度3D-DCT技术进行比较。
{"title":"Digital Watermarking in Video for Copyright Protection","authors":"Anita Jadhav, Megha M. Kolhekar","doi":"10.1109/ICESC.2014.29","DOIUrl":"https://doi.org/10.1109/ICESC.2014.29","url":null,"abstract":"In this paper we describe specific application of digital watermarking: Video watermarking for Copyright protection. Literature survey suggests that most video watermarking techniques use static 3D Discrete Cosine Transform technique. In this paper, we show the result of implementation of static 3 D DCT. We observe that this scheme works well on correlated videos. But it does not take care of scene change in the video. Hence we propose dynamic size 3D-DCT technique (by \"scene change detection\") for embedding binary/ gray scale/ color watermark on a color digital video and compare our results with existing fixed length 3D-DCT technique.","PeriodicalId":335267,"journal":{"name":"2014 International Conference on Electronic Systems, Signal Processing and Computing Technologies","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123321525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Strategic Subcarrier Allocation for Cooperative OFDMA Relaying Network 合作OFDMA中继网络的子载波策略分配
S. Lande, S. P. Shende, S. Pathak
Performance optimization of communication networks with quality of services (QOS) considerations for all active users is highly desirable. The growth of wireless multimedia applications requires high-speed and reliable communication over wireless channels of system. Throughput and fairness are important conflicting performance parameter in resource allocation for non-cooperative and cooperative OFDMA system for downlink transmission. Maximize the system throughput creates problem of unfairness among all user and while maintaining fairness, system throughput will degrade accordingly. In this paper, we proposed algorithm to provide a balanced approach to maintain throughput and fairness in the system and we designed the resources allocation algorithm for cooperative OFDMA system for downlink transmission, that algorithm maintain the fairness among the all user without affecting the throughput of the system. Our proposed subcarrier allocation fills the gap between the fairness-oriented and throughput-oriented algorithms and provides a balanced solution for subcarrier allocation in the system.
考虑到所有活动用户的服务质量(QOS)的通信网络性能优化是非常可取的。无线多媒体应用的发展要求系统在无线信道上进行高速、可靠的通信。在非合作和合作OFDMA下行传输系统中,吞吐量和公平性是资源分配中相互冲突的重要性能参数。最大化系统吞吐量会造成所有用户之间的不公平问题,在保持公平性的同时,系统吞吐量也会相应降低。本文提出了一种平衡系统吞吐量和公平性的算法,并设计了一种用于协同OFDMA系统下行传输的资源分配算法,该算法在不影响系统吞吐量的情况下保持了所有用户之间的公平性。我们提出的子载波分配算法填补了公平性导向算法和吞吐量导向算法之间的空白,为系统中的子载波分配提供了一种均衡的解决方案。
{"title":"Strategic Subcarrier Allocation for Cooperative OFDMA Relaying Network","authors":"S. Lande, S. P. Shende, S. Pathak","doi":"10.1109/ICESC.2014.37","DOIUrl":"https://doi.org/10.1109/ICESC.2014.37","url":null,"abstract":"Performance optimization of communication networks with quality of services (QOS) considerations for all active users is highly desirable. The growth of wireless multimedia applications requires high-speed and reliable communication over wireless channels of system. Throughput and fairness are important conflicting performance parameter in resource allocation for non-cooperative and cooperative OFDMA system for downlink transmission. Maximize the system throughput creates problem of unfairness among all user and while maintaining fairness, system throughput will degrade accordingly. In this paper, we proposed algorithm to provide a balanced approach to maintain throughput and fairness in the system and we designed the resources allocation algorithm for cooperative OFDMA system for downlink transmission, that algorithm maintain the fairness among the all user without affecting the throughput of the system. Our proposed subcarrier allocation fills the gap between the fairness-oriented and throughput-oriented algorithms and provides a balanced solution for subcarrier allocation in the system.","PeriodicalId":335267,"journal":{"name":"2014 International Conference on Electronic Systems, Signal Processing and Computing Technologies","volume":"232 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116203334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2014 International Conference on Electronic Systems, Signal Processing and Computing Technologies
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1