Pub Date : 2019-07-01DOI: 10.1109/ICCES45898.2019.9002411
Nikita Pawar, B. Tiple
Now-a-days demand forecasting is used in many countries for military applications such as spare parts of aircraft and for improving budget efficiency. In supply chain management demand forecasting is a major issue. Currently, time series technique is used to demand forecast but this technique resulted in lack of accuracy and improvement in accuracy is needed. So this paper focused on comparing the features which leads to improvement in the accuracy and propose a system for demand forecasting of spare parts of anti-aircraft missiles, which are based on machine learning and neural networks such that equipment's are properly utilized and alongwith that budget is also maintained. We have compared the existing features with the new features added and applied algorithms and looked upon at the accuracy. Experimental results proves that the new features added gave higher accuracy. Here, we also present an end-to-end boosting system called XGBoost and Multi-layer Perceptron. These new techniques were compared with traditional Machine Learning techniques. This experiment is conducted on the Vietnam War dataset.
{"title":"Analysis on Machine Learning Algorithms and Neural Networks for Demand Forecasting of Anti-Aircraft Missile Spare Parts","authors":"Nikita Pawar, B. Tiple","doi":"10.1109/ICCES45898.2019.9002411","DOIUrl":"https://doi.org/10.1109/ICCES45898.2019.9002411","url":null,"abstract":"Now-a-days demand forecasting is used in many countries for military applications such as spare parts of aircraft and for improving budget efficiency. In supply chain management demand forecasting is a major issue. Currently, time series technique is used to demand forecast but this technique resulted in lack of accuracy and improvement in accuracy is needed. So this paper focused on comparing the features which leads to improvement in the accuracy and propose a system for demand forecasting of spare parts of anti-aircraft missiles, which are based on machine learning and neural networks such that equipment's are properly utilized and alongwith that budget is also maintained. We have compared the existing features with the new features added and applied algorithms and looked upon at the accuracy. Experimental results proves that the new features added gave higher accuracy. Here, we also present an end-to-end boosting system called XGBoost and Multi-layer Perceptron. These new techniques were compared with traditional Machine Learning techniques. This experiment is conducted on the Vietnam War dataset.","PeriodicalId":348347,"journal":{"name":"2019 International Conference on Communication and Electronics Systems (ICCES)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115416907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-07-01DOI: 10.1109/ICCES45898.2019.9002601
D. Keerthi, A. Shobha Rani, T. Basavaraju
The tremendous growth in the usage of internet technology has pawed way for advancement of diverse wireless networks. One of the domain of wireless networks that have gathered a lot of attention from researchers is Wireless Mesh Network (WMN). WMN is preferred because of its numerous advantages like better coverage area, communication with other networks, cost effectiveness, increased network capacity and is compatible with all IEEE 802.11 standards. Low Capacity, management of the traffic and gateway nodes and end to end fairness problem are the major issues in the employment of WMNs. In order to reduce the existing challenges in WMNs load balancing plays a vital role. In our work we have proposed a load balancing protocol to overcome the problem of congestion using residual energy and delay. The simulation results are derived and they prove that our proposed protocol enhances the performance and life time of WMN compared to standard protocol with reference to residual energy, throughput, packets received jitter and delay.
{"title":"Energy-Delay Based Route Request Scheme for Load Balanced Routing in Wireless Mesh Networks","authors":"D. Keerthi, A. Shobha Rani, T. Basavaraju","doi":"10.1109/ICCES45898.2019.9002601","DOIUrl":"https://doi.org/10.1109/ICCES45898.2019.9002601","url":null,"abstract":"The tremendous growth in the usage of internet technology has pawed way for advancement of diverse wireless networks. One of the domain of wireless networks that have gathered a lot of attention from researchers is Wireless Mesh Network (WMN). WMN is preferred because of its numerous advantages like better coverage area, communication with other networks, cost effectiveness, increased network capacity and is compatible with all IEEE 802.11 standards. Low Capacity, management of the traffic and gateway nodes and end to end fairness problem are the major issues in the employment of WMNs. In order to reduce the existing challenges in WMNs load balancing plays a vital role. In our work we have proposed a load balancing protocol to overcome the problem of congestion using residual energy and delay. The simulation results are derived and they prove that our proposed protocol enhances the performance and life time of WMN compared to standard protocol with reference to residual energy, throughput, packets received jitter and delay.","PeriodicalId":348347,"journal":{"name":"2019 International Conference on Communication and Electronics Systems (ICCES)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124192634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-07-01DOI: 10.1109/ICCES45898.2019.9002041
Anupama J Nair, Rizwana Rasheed, KM Maheeshma, L. Aiswarya, K. R. Kavitha
Analysis of micro array data for disease prediction is an arduous machine learning job. Due to its high proportions and low samples, the computational risk is high. To increase the efficiency of the classifier a Signal-to-Noise Ratio algorithm can be used to get the most relevant genes. Then to these selected gene datasets, an ensemble-based classification algorithm is applied to get an efficient classifier for future prediction. The ensemble-based algorithm is an optimal combination of a set of learner algorithms. Our research focuses on 3 main classification algorithms namely SVM, KNN and Decision Tree which increases the performance and give confidence to the result. The ensemble is done using majority voting method which outperforms the base classifier.
{"title":"An Ensemble-Based Feature Selection and Classification of Gene Expression using Support Vector Machine, K-Nearest Neighbor, Decision Tree","authors":"Anupama J Nair, Rizwana Rasheed, KM Maheeshma, L. Aiswarya, K. R. Kavitha","doi":"10.1109/ICCES45898.2019.9002041","DOIUrl":"https://doi.org/10.1109/ICCES45898.2019.9002041","url":null,"abstract":"Analysis of micro array data for disease prediction is an arduous machine learning job. Due to its high proportions and low samples, the computational risk is high. To increase the efficiency of the classifier a Signal-to-Noise Ratio algorithm can be used to get the most relevant genes. Then to these selected gene datasets, an ensemble-based classification algorithm is applied to get an efficient classifier for future prediction. The ensemble-based algorithm is an optimal combination of a set of learner algorithms. Our research focuses on 3 main classification algorithms namely SVM, KNN and Decision Tree which increases the performance and give confidence to the result. The ensemble is done using majority voting method which outperforms the base classifier.","PeriodicalId":348347,"journal":{"name":"2019 International Conference on Communication and Electronics Systems (ICCES)","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124224181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-07-01DOI: 10.1109/ICCES45898.2019.9002065
S. M. Rathod, S. Apte
Recently, many industries are using autonomous robots due to their high performance and reliability and which remains as a great help for human beings. Autonomous cars are considered as one of the most trending topics all over the web a car with no steering wheels, pedal, and with the most advanced technology autopilot. An autonomous vehicle is able to recognize there surrounding and finding the path there itself. Autonomous robot senses their surrounding with the help of different sensors such as Lidar, radar, ultrasonic sensor, infrared sensor; GPS etc. the control system used in autonomous vehicle read the information from the surrounding and find the appropriate path as well as the various obstacles are present on the path. Most of the autonomous vehicles are used for the obstacle detection purpose. In this project, the obstacle detection system is developed and the IR sensor usually used for the distance measurement. The sensor-based four-wheeled autonomous electric robot used to move the vehicle in the predefined path and avoid the obstacle during motion using the data logged from the IR sensor. Suppose during motion the robot doesn't have enough space to pass through the obstacle it must be stopped there itself or otherwise it moves by avoiding the obstacle. The system can be designed in Simulink environment.
{"title":"Obstacle Detection Using Sensor Based System For An Four Wheeled Autonomous Electric Robot","authors":"S. M. Rathod, S. Apte","doi":"10.1109/ICCES45898.2019.9002065","DOIUrl":"https://doi.org/10.1109/ICCES45898.2019.9002065","url":null,"abstract":"Recently, many industries are using autonomous robots due to their high performance and reliability and which remains as a great help for human beings. Autonomous cars are considered as one of the most trending topics all over the web a car with no steering wheels, pedal, and with the most advanced technology autopilot. An autonomous vehicle is able to recognize there surrounding and finding the path there itself. Autonomous robot senses their surrounding with the help of different sensors such as Lidar, radar, ultrasonic sensor, infrared sensor; GPS etc. the control system used in autonomous vehicle read the information from the surrounding and find the appropriate path as well as the various obstacles are present on the path. Most of the autonomous vehicles are used for the obstacle detection purpose. In this project, the obstacle detection system is developed and the IR sensor usually used for the distance measurement. The sensor-based four-wheeled autonomous electric robot used to move the vehicle in the predefined path and avoid the obstacle during motion using the data logged from the IR sensor. Suppose during motion the robot doesn't have enough space to pass through the obstacle it must be stopped there itself or otherwise it moves by avoiding the obstacle. The system can be designed in Simulink environment.","PeriodicalId":348347,"journal":{"name":"2019 International Conference on Communication and Electronics Systems (ICCES)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125365863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-07-01DOI: 10.1109/ICCES45898.2019.9002410
T. Aishwarya Lakshmi, B. Hariharan, P. Rekha
Wireless Sensor Network (WSN) is widely used in Internet of Things (IoT) based Precision Agriculture (PA) to increase the crop productivity and yield. Parameters like pH, temperature, soil moisture, air humidity are measured in PA for monitoring the field remotely. The nodes used for WSN's are low-cost tiny sensor node that monitors the environmental parameters and collects the data and transfers these data to sink. These nodes are energy constraint as they are placed remotely and are equipped with batteries which have limited power. Minimizing the energy usage and maximizing the lifetime of the network are the major challenge faced by the sensor nodes. In this paper, we address some of the existing energy efficient routing protocols for precision agriculture.
{"title":"A Survey on Energy Efficient Routing Protocol for IoT Based Precision Agriculture","authors":"T. Aishwarya Lakshmi, B. Hariharan, P. Rekha","doi":"10.1109/ICCES45898.2019.9002410","DOIUrl":"https://doi.org/10.1109/ICCES45898.2019.9002410","url":null,"abstract":"Wireless Sensor Network (WSN) is widely used in Internet of Things (IoT) based Precision Agriculture (PA) to increase the crop productivity and yield. Parameters like pH, temperature, soil moisture, air humidity are measured in PA for monitoring the field remotely. The nodes used for WSN's are low-cost tiny sensor node that monitors the environmental parameters and collects the data and transfers these data to sink. These nodes are energy constraint as they are placed remotely and are equipped with batteries which have limited power. Minimizing the energy usage and maximizing the lifetime of the network are the major challenge faced by the sensor nodes. In this paper, we address some of the existing energy efficient routing protocols for precision agriculture.","PeriodicalId":348347,"journal":{"name":"2019 International Conference on Communication and Electronics Systems (ICCES)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124940234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-07-01DOI: 10.1109/ICCES45898.2019.9002530
Dhaval Bagal, Pallavi Saindane
Libraries play the most important role when it comes to books and reading. Today, libraries have become a great source of information. If we look upon the procedure that most of the conventional libraries in the world follow, we see a great amount of drudgery involved. In this paper, we propose a smart library system, which eliminates most of this drudgery in the conventional library management systems. Using face recognition and QR code based technology, the system automates and eases the tasks of Book Issue, Book Return and Book Search. It resembles ‘Just walk out technology’ implemented by Amazon in the Amazon Go stores. The proposed system enjoins self-issue and self-return procedures along with the dynamic search feature which provides the real-time location of the books. The proposed system significantly expedites the process of issue, return and search thus avoiding long queues at the reception counter/librarian's desk.
{"title":"Librany - A Face Recognition and QR Code Technology based Smart Library System","authors":"Dhaval Bagal, Pallavi Saindane","doi":"10.1109/ICCES45898.2019.9002530","DOIUrl":"https://doi.org/10.1109/ICCES45898.2019.9002530","url":null,"abstract":"Libraries play the most important role when it comes to books and reading. Today, libraries have become a great source of information. If we look upon the procedure that most of the conventional libraries in the world follow, we see a great amount of drudgery involved. In this paper, we propose a smart library system, which eliminates most of this drudgery in the conventional library management systems. Using face recognition and QR code based technology, the system automates and eases the tasks of Book Issue, Book Return and Book Search. It resembles ‘Just walk out technology’ implemented by Amazon in the Amazon Go stores. The proposed system enjoins self-issue and self-return procedures along with the dynamic search feature which provides the real-time location of the books. The proposed system significantly expedites the process of issue, return and search thus avoiding long queues at the reception counter/librarian's desk.","PeriodicalId":348347,"journal":{"name":"2019 International Conference on Communication and Electronics Systems (ICCES)","volume":"23 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120931787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-07-01DOI: 10.1109/ICCES45898.2019.9002230
Supriya Naik, Ebha Koley
In this paper fault detection and classification scheme using K nearest neighbor (KNN) has been presented for AC/DC transmission line with DFIG (doubly fed induction generator). The power system model consist of 1000 MW synchronous generator, 510 MW wind far, three phase transmission line of 500 kV and 30km length and HVDC line of 1000 MW. The model has been implemented with the corresponding parameters in MATLAB and simulated for different scenario. The raw current and voltage acquired for the sensors have been processed by performing discrete wavelet transform to the derive the discriminatory attributes with maximum disparity between the healthy and faulty cases. Following feature extraction, the required tasks of fault detection and classification scheme in A C and HVDC lines have been achieved using KNN. Further, the efficacy of the proposed KNN based scheme has been validated for varying fault scenarios pertaining to wide variation in fault resistance, inception angle of fault and fault location. For all tested cases, the proposed scheme is able to achieve a fault detection and classification accuracy of 1 00%.
{"title":"Fault Detection and Classification scheme using KNN for AC/HVDC Transmission Lines","authors":"Supriya Naik, Ebha Koley","doi":"10.1109/ICCES45898.2019.9002230","DOIUrl":"https://doi.org/10.1109/ICCES45898.2019.9002230","url":null,"abstract":"In this paper fault detection and classification scheme using K nearest neighbor (KNN) has been presented for AC/DC transmission line with DFIG (doubly fed induction generator). The power system model consist of 1000 MW synchronous generator, 510 MW wind far, three phase transmission line of 500 kV and 30km length and HVDC line of 1000 MW. The model has been implemented with the corresponding parameters in MATLAB and simulated for different scenario. The raw current and voltage acquired for the sensors have been processed by performing discrete wavelet transform to the derive the discriminatory attributes with maximum disparity between the healthy and faulty cases. Following feature extraction, the required tasks of fault detection and classification scheme in A C and HVDC lines have been achieved using KNN. Further, the efficacy of the proposed KNN based scheme has been validated for varying fault scenarios pertaining to wide variation in fault resistance, inception angle of fault and fault location. For all tested cases, the proposed scheme is able to achieve a fault detection and classification accuracy of 1 00%.","PeriodicalId":348347,"journal":{"name":"2019 International Conference on Communication and Electronics Systems (ICCES)","volume":"50 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123724398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-07-01DOI: 10.1109/ICCES45898.2019.9002167
M. Sagar, G. Hegde
In recent technology of digital signal processing applications, we have number of modulation and demodulation techniques. In this domain multiplexing technique is having greatest importance as it has a transmission and reception part with secure systems for communication. Thus orthogonal frequency division multiplexing (OFDM) is superior to other multiplexing techniques, which has multiple carriers with very much robust frequency selective distorted channels. OFDM will have a number of modules such as serial to parallel converter, modulator, IFFT, FFT, demodulator and so on. The Proposed work will concentrate on arithmetic operations in OFDM with re-modified technique using large integer values such as addition, and multiplications. This large integer based arithmetic operation technique were designed using Schönhage-Strassen algorithm (SSA). Thus the proposed method will focus on this SSA algorithm based arithmetic operations with Number Theoretic Transform (NTT) and Inverse Number Theoretic transform (INTT) method. Proposed method of OFDM will replace FFT-IFFT to NTT-INTT method and this application is developed in Verilog HDL and synthesized in Xilinx vivado 15.4. It proved better results in terms of area and delay when compared with conventional design.
{"title":"FPGA Implementation of 8-bit SSA Multiplier for designing OFDM Transceiver","authors":"M. Sagar, G. Hegde","doi":"10.1109/ICCES45898.2019.9002167","DOIUrl":"https://doi.org/10.1109/ICCES45898.2019.9002167","url":null,"abstract":"In recent technology of digital signal processing applications, we have number of modulation and demodulation techniques. In this domain multiplexing technique is having greatest importance as it has a transmission and reception part with secure systems for communication. Thus orthogonal frequency division multiplexing (OFDM) is superior to other multiplexing techniques, which has multiple carriers with very much robust frequency selective distorted channels. OFDM will have a number of modules such as serial to parallel converter, modulator, IFFT, FFT, demodulator and so on. The Proposed work will concentrate on arithmetic operations in OFDM with re-modified technique using large integer values such as addition, and multiplications. This large integer based arithmetic operation technique were designed using Schönhage-Strassen algorithm (SSA). Thus the proposed method will focus on this SSA algorithm based arithmetic operations with Number Theoretic Transform (NTT) and Inverse Number Theoretic transform (INTT) method. Proposed method of OFDM will replace FFT-IFFT to NTT-INTT method and this application is developed in Verilog HDL and synthesized in Xilinx vivado 15.4. It proved better results in terms of area and delay when compared with conventional design.","PeriodicalId":348347,"journal":{"name":"2019 International Conference on Communication and Electronics Systems (ICCES)","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128444381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-07-01DOI: 10.1109/ICCES45898.2019.9002270
K. Aneesh, S. Darshan Singh, M. Abhishek, T. Shreekanth
Several cardiac disorders can be diagnosed by meticulous analysis of ECG signals. The quality of signal determines the accuracy of diagnosis. Usually the size of ECG signals is huge and they are associated with noise. By compressing the ECG signals, they can be stored and transmitted easily. Hence, it is important to pre-process (denoise) and compress it to a maximum extent. In the recent past many works have been done on ECG compression. Compression techniques have been done using time-domain as well transform domain techniques. In this work an approach through Principal Component Analysis (PCA) has been proposed to compress the pre-processed ECG signal and de-compress it efficiently, such that maximum amount of variance is retained. This algorithm has been tested for 28 ECG signals from the MIT-BIH database. In order to analyze the performance of the algorithm, CR (compression ratio) and PRD (Percent Root Mean Square Difference) have been considered as performance parameters and are calculated. The proposed method achieves a good CR along with small PRD in comparison with algorithms that has been proposed by other researchers.
通过对心电信号的细致分析,可以诊断出几种心脏疾病。信号的质量决定了诊断的准确性。通常心电信号的大小非常大,并且与噪声有关。通过对心电信号进行压缩,可以方便地存储和传输心电信号。因此,重要的是预处理(去噪)和压缩到最大程度。近年来,人们对心电压缩进行了大量的研究。压缩技术是利用时域和变换域技术来实现的。在这项工作中,提出了一种通过主成分分析(PCA)的方法来压缩预处理的心电信号并有效地解压缩,从而保留最大的方差。该算法已对来自MIT-BIH数据库的28个心电信号进行了测试。为了分析算法的性能,以压缩比CR (compression ratio)和均方根差百分比PRD (Percent Root Mean Square Difference)作为性能参数进行计算。与其他研究人员提出的算法相比,该方法获得了良好的CR和较小的PRD。
{"title":"Two-Dimensional ECG Signal Compression Based on Region of Interest Using PCA","authors":"K. Aneesh, S. Darshan Singh, M. Abhishek, T. Shreekanth","doi":"10.1109/ICCES45898.2019.9002270","DOIUrl":"https://doi.org/10.1109/ICCES45898.2019.9002270","url":null,"abstract":"Several cardiac disorders can be diagnosed by meticulous analysis of ECG signals. The quality of signal determines the accuracy of diagnosis. Usually the size of ECG signals is huge and they are associated with noise. By compressing the ECG signals, they can be stored and transmitted easily. Hence, it is important to pre-process (denoise) and compress it to a maximum extent. In the recent past many works have been done on ECG compression. Compression techniques have been done using time-domain as well transform domain techniques. In this work an approach through Principal Component Analysis (PCA) has been proposed to compress the pre-processed ECG signal and de-compress it efficiently, such that maximum amount of variance is retained. This algorithm has been tested for 28 ECG signals from the MIT-BIH database. In order to analyze the performance of the algorithm, CR (compression ratio) and PRD (Percent Root Mean Square Difference) have been considered as performance parameters and are calculated. The proposed method achieves a good CR along with small PRD in comparison with algorithms that has been proposed by other researchers.","PeriodicalId":348347,"journal":{"name":"2019 International Conference on Communication and Electronics Systems (ICCES)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131034617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-07-01DOI: 10.1109/ICCES45898.2019.9002086
Dheeraj Punia, Brahmjit Singh
Secure encryption algorithms with advanced key executive techniques constantly help to achieve privacy, verification, and security of the data and curtail the overheads of the system. Currently, the prominent cryptographic technique is the Advance Encryption Standard (AES). The 128-bit pipelined cipher AES components adopt the symmetric-block cipher algorithm for encryption of the data. Our application achieves a high-level of encryption of 25.6 Gbps with an effective inter-and-intra-round layout. This module is designed on Xilinx ISE® Design Suite 14.7 and optimized for faster conversion speeds as the module is based on the pipeline architecture to perform the repeated array of operations known as the round. The designed module is suitable for high-security data communication, image processing, and other embedded applications. Pipelined architecture reduces the time associated with each encryption process and decreases the total time it takes for a plaintext block to encrypt.
具有高级密钥执行技术的安全加密算法不断帮助实现数据的隐私、验证和安全性,并减少系统的开销。目前,主要的加密技术是高级加密标准AES (advanced Encryption Standard)。128位流水线密码AES组件采用对称分组密码算法对数据进行加密。我们的应用程序通过有效的轮间和轮内布局实现了25.6 Gbps的高级加密。该模块是在Xilinx ISE®Design Suite 14.7上设计的,并针对更快的转换速度进行了优化,因为该模块基于流水线架构来执行称为轮的重复操作数组。设计的模块适用于高安全性的数据通信、图像处理等嵌入式应用。流水线架构减少了与每个加密过程相关的时间,并减少了明文块加密所需的总时间。
{"title":"Speed Optimization of the AES Algorithm Using Pipeline Hardware Architecture","authors":"Dheeraj Punia, Brahmjit Singh","doi":"10.1109/ICCES45898.2019.9002086","DOIUrl":"https://doi.org/10.1109/ICCES45898.2019.9002086","url":null,"abstract":"Secure encryption algorithms with advanced key executive techniques constantly help to achieve privacy, verification, and security of the data and curtail the overheads of the system. Currently, the prominent cryptographic technique is the Advance Encryption Standard (AES). The 128-bit pipelined cipher AES components adopt the symmetric-block cipher algorithm for encryption of the data. Our application achieves a high-level of encryption of 25.6 Gbps with an effective inter-and-intra-round layout. This module is designed on Xilinx ISE® Design Suite 14.7 and optimized for faster conversion speeds as the module is based on the pipeline architecture to perform the repeated array of operations known as the round. The designed module is suitable for high-security data communication, image processing, and other embedded applications. Pipelined architecture reduces the time associated with each encryption process and decreases the total time it takes for a plaintext block to encrypt.","PeriodicalId":348347,"journal":{"name":"2019 International Conference on Communication and Electronics Systems (ICCES)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129331436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}