首页 > 最新文献

2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)最新文献

英文 中文
Bit error rate analysis of cognitive radio under fading channels 衰落信道下认知无线电误码率分析
P. Saranya, V. Saravanan, M. Divya
The Silver code has been proposed as a 2 × 2 space time block code that accomplish the optimal diversity - multiplexing gain tradeoff for a multiple antenna system in Cognitive Radio Network. In this paper the decoding methodology for the Silver code is analyzed, followed by performance analyzing with the Alamouti code and V-BLAST in Rayleigh fading environments. Simulation results show that the Silver Code outrun both the Alamouti code and V-BLAST at high SNR levels.
银码是一种实现认知无线网络中多天线系统分集-复用增益最佳权衡的2x2空时分组码。本文首先分析了Silver码的译码方法,然后分析了Alamouti码和V-BLAST码在瑞利衰落环境下的性能。仿真结果表明,在高信噪比下,银码的性能优于Alamouti码和V-BLAST码。
{"title":"Bit error rate analysis of cognitive radio under fading channels","authors":"P. Saranya, V. Saravanan, M. Divya","doi":"10.1109/STARTUP.2016.7583992","DOIUrl":"https://doi.org/10.1109/STARTUP.2016.7583992","url":null,"abstract":"The Silver code has been proposed as a 2 × 2 space time block code that accomplish the optimal diversity - multiplexing gain tradeoff for a multiple antenna system in Cognitive Radio Network. In this paper the decoding methodology for the Silver code is analyzed, followed by performance analyzing with the Alamouti code and V-BLAST in Rayleigh fading environments. Simulation results show that the Silver Code outrun both the Alamouti code and V-BLAST at high SNR levels.","PeriodicalId":355852,"journal":{"name":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123382827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A survey on real time authentication and tampering detection in digital video 数字视频实时认证与篡改检测研究进展
V. Vijayalakshmi, R. Vasitha, V. Vanitha, M. Gayathri
The field of Real Time Authentication on videos follows rapid improvements in recent years because of the common counterfeits and illegal sharing of Digital media. Real Time Authentication for videos is becoming popular to secure the personal videos. People today have become well aware of the intrusions of their personal videos and are very reluctant to share on internet. This paper provides a wide survey of different Real Time Authentication algorithms and techniques and plug out their merits and demerits.
近年来,由于数字媒体的假冒和非法共享现象普遍存在,视频实时认证领域得到了快速发展。为了保证个人视频的安全,视频实时认证越来越受欢迎。今天的人们已经意识到他们的个人视频被侵犯,并且非常不愿意在互联网上分享。本文对各种实时认证算法和技术进行了广泛的综述,并指出了它们的优缺点。
{"title":"A survey on real time authentication and tampering detection in digital video","authors":"V. Vijayalakshmi, R. Vasitha, V. Vanitha, M. Gayathri","doi":"10.1109/STARTUP.2016.7583926","DOIUrl":"https://doi.org/10.1109/STARTUP.2016.7583926","url":null,"abstract":"The field of Real Time Authentication on videos follows rapid improvements in recent years because of the common counterfeits and illegal sharing of Digital media. Real Time Authentication for videos is becoming popular to secure the personal videos. People today have become well aware of the intrusions of their personal videos and are very reluctant to share on internet. This paper provides a wide survey of different Real Time Authentication algorithms and techniques and plug out their merits and demerits.","PeriodicalId":355852,"journal":{"name":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121443671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hybrid approach for video compression using block matching motion estimation 基于块匹配运动估计的混合视频压缩方法
Rohini K. Akotkar, S. Kasturiwala
Video is a collection chronological frame in a sequence. Video compression means reducing the size of video. To discard the redundancies present in video some video compression technique are involved. In video sequence there are two types of technique are present that are temporal redundancy and spatial redundancy. In this paper, we discuss about hybrid technique. Hybrid means combination of two technique i.e. efficient three step search algorithm (E3SS) and cross hexagonal search algorithm (CHS). There for E3SS used for core search and CHS is used for fine search so it occupies less disk space and file transferring is faster. In today's date block matching algorithm for motion estimation is powerful technique for high compression ratio and to reduce computational complexity. motion estimation calculate the position of pixel and it is a custom to calculate the pixel from current frame to reference frame. The main approach of motion estimation is reducing the search point and redundancy present in video. The experiment result shows that the proposal algorithm performs better than previous proposed block matching algorithms and required less computation.
视频是一个按时间顺序排列的集合。视频压缩意味着减小视频的大小。为了消除视频中存在的冗余,涉及到一些视频压缩技术。在视频序列中存在两种技术:时间冗余和空间冗余。本文对混合技术进行了讨论。混合是指高效三步搜索算法(E3SS)和交叉六边形搜索算法(CHS)两种技术的结合。其中E3SS用于核心搜索,CHS用于精细搜索,因此占用的磁盘空间更少,文件传输速度更快。在当前的运动估计中,数据块匹配算法是一种有效的压缩比高、计算复杂度低的技术。运动估计计算像素的位置,从当前帧到参考帧计算像素是一种习惯。运动估计的主要方法是减少视频中存在的搜索点和冗余。实验结果表明,该算法比以往提出的块匹配算法性能更好,计算量更少。
{"title":"Hybrid approach for video compression using block matching motion estimation","authors":"Rohini K. Akotkar, S. Kasturiwala","doi":"10.1109/STARTUP.2016.7583911","DOIUrl":"https://doi.org/10.1109/STARTUP.2016.7583911","url":null,"abstract":"Video is a collection chronological frame in a sequence. Video compression means reducing the size of video. To discard the redundancies present in video some video compression technique are involved. In video sequence there are two types of technique are present that are temporal redundancy and spatial redundancy. In this paper, we discuss about hybrid technique. Hybrid means combination of two technique i.e. efficient three step search algorithm (E3SS) and cross hexagonal search algorithm (CHS). There for E3SS used for core search and CHS is used for fine search so it occupies less disk space and file transferring is faster. In today's date block matching algorithm for motion estimation is powerful technique for high compression ratio and to reduce computational complexity. motion estimation calculate the position of pixel and it is a custom to calculate the pixel from current frame to reference frame. The main approach of motion estimation is reducing the search point and redundancy present in video. The experiment result shows that the proposal algorithm performs better than previous proposed block matching algorithms and required less computation.","PeriodicalId":355852,"journal":{"name":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","volume":"285 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115901198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Detecting camera based traitor and fraudulent apps on smartphone 在智能手机上检测基于摄像头的叛徒和欺诈应用程序
V. Manogajapathi, Jayakumar Loganathan, R. Sekhar
In recent trends, android smartphones are rapidly in use by a number of users because of its user friendly and open source architecture. There are millions of android applications are available in the open market place. But we cannot trust most of the apps, which may steal the user privacy content or any confidential data. However, some works have studied mobile phones, multimedia securities and also android permissions. In this paper, to focus on the security issues related to camera based attacks on smartphones. The fraudulent application and its traitor can be detected by using the defense system that detects the attacks. By use of the defense system the users can be saved before getting into the vulnerability. To evaluate the defense system we have proposed a camera based fraudulent application for feasibility study and also we analyzed the performance of the system with the fraudulent applications from the open android market.
在最近的趋势中,android智能手机由于其用户友好和开源架构而迅速被许多用户使用。在开放的市场上有数百万的android应用程序。但我们不能相信大多数应用程序,它们可能会窃取用户的隐私内容或任何机密数据。然而,也有一些作品研究了手机、多媒体证券以及android权限。在本文中,重点关注与基于摄像头的智能手机攻击相关的安全问题。通过检测攻击的防御系统,可以检测欺诈应用及其叛逆者。通过使用防御系统,可以在用户进入漏洞之前进行保护。为了评估该防御系统,我们提出了一种基于摄像头的欺诈应用程序进行可行性研究,并与公开的android市场上的欺诈应用程序进行了性能分析。
{"title":"Detecting camera based traitor and fraudulent apps on smartphone","authors":"V. Manogajapathi, Jayakumar Loganathan, R. Sekhar","doi":"10.1109/STARTUP.2016.7583987","DOIUrl":"https://doi.org/10.1109/STARTUP.2016.7583987","url":null,"abstract":"In recent trends, android smartphones are rapidly in use by a number of users because of its user friendly and open source architecture. There are millions of android applications are available in the open market place. But we cannot trust most of the apps, which may steal the user privacy content or any confidential data. However, some works have studied mobile phones, multimedia securities and also android permissions. In this paper, to focus on the security issues related to camera based attacks on smartphones. The fraudulent application and its traitor can be detected by using the defense system that detects the attacks. By use of the defense system the users can be saved before getting into the vulnerability. To evaluate the defense system we have proposed a camera based fraudulent application for feasibility study and also we analyzed the performance of the system with the fraudulent applications from the open android market.","PeriodicalId":355852,"journal":{"name":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130063448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Enhancing security of encrypted data sharing on social networks 加强社交网络上加密数据共享的安全性
Prajakta D. Chutke, M. K. Hadap
This paper is motivated by the recognition of the need for a finer grain and more personalized privacy in data publication of social networks. We will propose a privacy protection scheme that not only prevents the disclosure of identity of users but also the disclosure of Selected features in users' profiles. An individual user can select which features of her profile she wishes to conceal. We want to group nodes with as similar neighborhood information as possible so that we can change as few labels as possible and add as few noisy nodes as possible. In this application, we will use hybrid cryptography for providing security while sharing the information. The encryption helps for cryptographic purpose and it also provides attribute base encryption this involves over many people that decrypts the cipher text. It involves the different users and allow to decrypt it based on their policies.
本文的动机是认识到在社交网络的数据发布中需要更精细的粒度和更个性化的隐私。我们将提出一种隐私保护方案,该方案不仅可以防止泄露用户的身份,还可以防止泄露用户配置文件中的选定功能。个人用户可以选择她想要隐藏的个人资料的哪些特征。我们希望将具有尽可能相似邻域信息的节点分组,以便我们可以尽可能少地更改标签并添加尽可能少的噪声节点。在此应用程序中,我们将使用混合加密技术在共享信息的同时提供安全性。加密有助于密码学目的,它还提供了基于属性的加密,这涉及到许多人解密密文。它涉及到不同的用户,并允许基于他们的策略对其进行解密。
{"title":"Enhancing security of encrypted data sharing on social networks","authors":"Prajakta D. Chutke, M. K. Hadap","doi":"10.1109/STARTUP.2016.7583902","DOIUrl":"https://doi.org/10.1109/STARTUP.2016.7583902","url":null,"abstract":"This paper is motivated by the recognition of the need for a finer grain and more personalized privacy in data publication of social networks. We will propose a privacy protection scheme that not only prevents the disclosure of identity of users but also the disclosure of Selected features in users' profiles. An individual user can select which features of her profile she wishes to conceal. We want to group nodes with as similar neighborhood information as possible so that we can change as few labels as possible and add as few noisy nodes as possible. In this application, we will use hybrid cryptography for providing security while sharing the information. The encryption helps for cryptographic purpose and it also provides attribute base encryption this involves over many people that decrypts the cipher text. It involves the different users and allow to decrypt it based on their policies.","PeriodicalId":355852,"journal":{"name":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115076224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Optimal route discovery in duty cycled wireless sensor network: A review 占空比无线传感器网络中最优路由发现的研究进展
M. Kalmegh, S. R. Jain
The WSN networks employing duty cycle technique in geographic routing has a task to find out the path from sensor to Base Station of the network to send the sensed data will be accomplished by several existing mechanism given over the last few decades. Discovering the optimized route in WSN depends upon the number of hops used to transfer the data packets. However, the nodes selected in the path may be overloaded due to heavy traffic. This can increase the delay in transmitting sensed data to the Base Station which will contribute in the overall delay of the network. Rediscovering routes can result in data loss and increasing communication overheads. In this paper, we present the comparison of different approaches in multi-path routing in terms of energy consumption and broadcasting delay in WSNs. We present and compare algorithms and techniques that aim to address the sleep/wake scheduling issue, which are divided into distributed and centralized manners. Meanwhile, the routing strategies, QoS parameters like average delay, packet loss ratio, and throughput are discussed.
在地理路由中采用占空比技术的WSN网络有一个任务,即找到从传感器到网络基站的路径来发送感知数据,这将由过去几十年给出的几种现有机制来完成。在WSN中发现经过优化的路由取决于数据包传输的跳数。但是,由于流量过大,路径上选择的节点可能会过载。这会增加向基站传输感测数据的延迟,从而导致网络的整体延迟。重新发现路由可能导致数据丢失并增加通信开销。在本文中,我们从能量消耗和无线传感器网络广播延迟的角度比较了不同的多路径路由方法。我们提出并比较了旨在解决睡眠/唤醒调度问题的算法和技术,这些算法和技术分为分布式和集中式方式。同时对路由策略、平均时延、丢包率、吞吐量等QoS参数进行了讨论。
{"title":"Optimal route discovery in duty cycled wireless sensor network: A review","authors":"M. Kalmegh, S. R. Jain","doi":"10.1109/STARTUP.2016.7583933","DOIUrl":"https://doi.org/10.1109/STARTUP.2016.7583933","url":null,"abstract":"The WSN networks employing duty cycle technique in geographic routing has a task to find out the path from sensor to Base Station of the network to send the sensed data will be accomplished by several existing mechanism given over the last few decades. Discovering the optimized route in WSN depends upon the number of hops used to transfer the data packets. However, the nodes selected in the path may be overloaded due to heavy traffic. This can increase the delay in transmitting sensed data to the Base Station which will contribute in the overall delay of the network. Rediscovering routes can result in data loss and increasing communication overheads. In this paper, we present the comparison of different approaches in multi-path routing in terms of energy consumption and broadcasting delay in WSNs. We present and compare algorithms and techniques that aim to address the sleep/wake scheduling issue, which are divided into distributed and centralized manners. Meanwhile, the routing strategies, QoS parameters like average delay, packet loss ratio, and throughput are discussed.","PeriodicalId":355852,"journal":{"name":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116888885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Object recognition for blind people using portable camera 便携式相机在盲人物体识别中的应用
Vikky Mohane, C. Gode
For blind persons it is very essential to recognize a product of their daily use so we implied a method to identify product in their everyday routine by use of camera. To separate a object from un-necessary background, movement based technique is used to spot object of concern from the video by instructing person to shake the object that gives moving object area by K-means clustering background separation technique. After detection of moving area feature extraction SIFT technique is used to take out key points of that product and that key-point is matched with the data base images if it matches efficiently then it identify a product and produce name of that product to blind persons in speech. Instead of OCR we used SIFT because in OCR orientation of camera must be towards label of product and for blind person it is very tough to locate label efficiently whereas in SIFT product orientation is not a big deal as key-points can be matched from any position.
对于盲人来说,识别他们日常使用的产品是非常重要的,因此我们提出了一种使用相机识别他们日常生活中的产品的方法。为了将目标从不必要的背景中分离出来,采用基于运动的技术,通过K-means聚类背景分离技术,指示人们摇动目标,从而从视频中找出关注的目标。在检测到移动区域特征提取后,利用SIFT技术提取出该产品的关键点,并将该关键点与数据库图像进行匹配,如果匹配有效,则对该产品进行识别,并将该产品的名称显示给语音盲人。我们使用SIFT代替OCR,因为在OCR中相机的方向必须朝着产品的标签,对于盲人来说很难有效地定位标签,而在SIFT中产品的方向不是什么大问题,因为关键点可以从任何位置匹配。
{"title":"Object recognition for blind people using portable camera","authors":"Vikky Mohane, C. Gode","doi":"10.1109/STARTUP.2016.7583932","DOIUrl":"https://doi.org/10.1109/STARTUP.2016.7583932","url":null,"abstract":"For blind persons it is very essential to recognize a product of their daily use so we implied a method to identify product in their everyday routine by use of camera. To separate a object from un-necessary background, movement based technique is used to spot object of concern from the video by instructing person to shake the object that gives moving object area by K-means clustering background separation technique. After detection of moving area feature extraction SIFT technique is used to take out key points of that product and that key-point is matched with the data base images if it matches efficiently then it identify a product and produce name of that product to blind persons in speech. Instead of OCR we used SIFT because in OCR orientation of camera must be towards label of product and for blind person it is very tough to locate label efficiently whereas in SIFT product orientation is not a big deal as key-points can be matched from any position.","PeriodicalId":355852,"journal":{"name":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121514510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Use of Neural Networks in cryptography: A review 神经网络在密码学中的应用综述
Pranita P. Hadke, S. Kale
In cryptography secret information is made unreadable for an unauthorized user. There are many cryptographic algorithms are available, but they are more complex techniques and requires more computational power. This paper gives a review of how Neural Networks contributes a help in cryptography and how neural network and cryptography together can be used for security.
在密码学中,机密信息对于未经授权的用户是不可读的。有许多可用的加密算法,但它们是更复杂的技术,需要更多的计算能力。本文综述了神经网络对密码学的帮助,以及神经网络和密码学如何一起用于安全性。
{"title":"Use of Neural Networks in cryptography: A review","authors":"Pranita P. Hadke, S. Kale","doi":"10.1109/STARTUP.2016.7583925","DOIUrl":"https://doi.org/10.1109/STARTUP.2016.7583925","url":null,"abstract":"In cryptography secret information is made unreadable for an unauthorized user. There are many cryptographic algorithms are available, but they are more complex techniques and requires more computational power. This paper gives a review of how Neural Networks contributes a help in cryptography and how neural network and cryptography together can be used for security.","PeriodicalId":355852,"journal":{"name":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130304532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
Parallel clustering of large data set on Hadoop using data mining techniques 利用数据挖掘技术在Hadoop上实现大数据集的并行聚类
K. S. Chaturbhuj, Gauri Chaudhary
Traditional data processing techniques are not enough to handle rapidly growing data. Hadoop can be used for processing such large data. K-means is the traditional clustering method which is simple, scalable and can easily implement but K-means converges to local minima from starting position and sensitive to initial centers. K-means required number of clusters in advance. Particle Swarm Optimization i.e PSO is mimic behavior based algorithm used to introduce the connectivity principle in the centroid based clustering algorithm that will gives optimum centroid and hence find better clusters. We used PSO for finding initial centroids and K-means to find better clusters. Hadoop is used for fast and parallel processing of large datasets.
传统的数据处理技术不足以处理快速增长的数据。Hadoop可以用来处理如此大的数据。K-means是传统的聚类方法,具有简单、可扩展、易于实现的特点,但K-means从起始位置收敛到局部极小值,对初始中心敏感。k -表示所需的簇数。粒子群优化(Particle Swarm Optimization, PSO)是一种基于模拟行为的算法,它将连通性原理引入到基于质心的聚类算法中,从而给出最优质心,从而找到更好的聚类。我们使用PSO来寻找初始质心,使用K-means来寻找更好的聚类。Hadoop用于快速并行处理大型数据集。
{"title":"Parallel clustering of large data set on Hadoop using data mining techniques","authors":"K. S. Chaturbhuj, Gauri Chaudhary","doi":"10.1109/STARTUP.2016.7583955","DOIUrl":"https://doi.org/10.1109/STARTUP.2016.7583955","url":null,"abstract":"Traditional data processing techniques are not enough to handle rapidly growing data. Hadoop can be used for processing such large data. K-means is the traditional clustering method which is simple, scalable and can easily implement but K-means converges to local minima from starting position and sensitive to initial centers. K-means required number of clusters in advance. Particle Swarm Optimization i.e PSO is mimic behavior based algorithm used to introduce the connectivity principle in the centroid based clustering algorithm that will gives optimum centroid and hence find better clusters. We used PSO for finding initial centroids and K-means to find better clusters. Hadoop is used for fast and parallel processing of large datasets.","PeriodicalId":355852,"journal":{"name":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117314948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Design of low voltage flip-flop based on complementary pass-transistor adiabatic logic circuit 基于互补通管绝热逻辑电路的低压触发器设计
D. S. Bhutada
This paper presents To design a low voltage flip-flops based on CPAL circuit. The Complementary Pass-Transistor Adiabatic Logic is used to release flip-flops circuits with DTCMOS (Dual Threshold CMOS) techniques. All circuits are simulated using 180nm Tanner model technology by varying supply voltages. Based on the simulation results, the flip-flop working along with the power-gating technique is realized by CPAL which work on low voltage medium which help to increase speed of the execution. We use Ac power supply which work as low power characteristics of complementary pass-transistor logic (CPL) circuit. Power-clock scheme is more suitable for the design of flip-flops using two phase sequential circuits because it helps to decrease more transistors. The Adiabatic flip-flop has large energy saving over wide range of frequencies.
本文介绍了一种基于CPAL电路的低压触发器的设计。互补通管绝热逻辑用于释放触发器电路与DTCMOS(双阈值CMOS)技术。所有电路均采用180nm Tanner模型技术,通过改变电源电压进行模拟。根据仿真结果,利用工作在低压介质上的CPAL实现了与功率门控技术同时工作的触发器,提高了执行速度。我们使用交流电源作为低功耗特性的互补通管逻辑(CPL)电路。功率时钟方案更适合使用两相顺序电路的触发器设计,因为它有助于减少更多的晶体管。绝热触发器在宽频率范围内具有较大的节能效果。
{"title":"Design of low voltage flip-flop based on complementary pass-transistor adiabatic logic circuit","authors":"D. S. Bhutada","doi":"10.1109/STARTUP.2016.7583922","DOIUrl":"https://doi.org/10.1109/STARTUP.2016.7583922","url":null,"abstract":"This paper presents To design a low voltage flip-flops based on CPAL circuit. The Complementary Pass-Transistor Adiabatic Logic is used to release flip-flops circuits with DTCMOS (Dual Threshold CMOS) techniques. All circuits are simulated using 180nm Tanner model technology by varying supply voltages. Based on the simulation results, the flip-flop working along with the power-gating technique is realized by CPAL which work on low voltage medium which help to increase speed of the execution. We use Ac power supply which work as low power characteristics of complementary pass-transistor logic (CPL) circuit. Power-clock scheme is more suitable for the design of flip-flops using two phase sequential circuits because it helps to decrease more transistors. The Adiabatic flip-flop has large energy saving over wide range of frequencies.","PeriodicalId":355852,"journal":{"name":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115929444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1