Pub Date : 2012-07-26DOI: 10.1109/ICCCNT.2012.6395938
Mahendra Pratap Yadav
With the explosive growth of information sources available on the WWW, it has become an important tool for users in order to find, extract, filter and evaluate the desired information and resources. The main purpose of this paper is to study the customer's behavior using the Web mining techniques and its application in e-commerce to mine customer behavior. The concept of Web mining describing the process of Web data mining in detail: source data collection, data pre-processing, pattern discovery, pattern analysis and cluster analysis. With the advanced information technologies, server are now able to collect and store mountains of data, describing their numerous contributions and different customer profiles, from which they seek to derive information about their customer's requirements. Conventional methods are no longer appropriate for these business situations to find the customer behavior. The principle of data mining is to cluster customer segments by using K-Means algorithm in which input data comes from web log of various e-commerce websites. Hence, determine the relationship between Web data mining and e-commerce and also to apply Web mining technology in e-commerce.
{"title":"Mining the customer behavior using web usage mining in e-commerce","authors":"Mahendra Pratap Yadav","doi":"10.1109/ICCCNT.2012.6395938","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6395938","url":null,"abstract":"With the explosive growth of information sources available on the WWW, it has become an important tool for users in order to find, extract, filter and evaluate the desired information and resources. The main purpose of this paper is to study the customer's behavior using the Web mining techniques and its application in e-commerce to mine customer behavior. The concept of Web mining describing the process of Web data mining in detail: source data collection, data pre-processing, pattern discovery, pattern analysis and cluster analysis. With the advanced information technologies, server are now able to collect and store mountains of data, describing their numerous contributions and different customer profiles, from which they seek to derive information about their customer's requirements. Conventional methods are no longer appropriate for these business situations to find the customer behavior. The principle of data mining is to cluster customer segments by using K-Means algorithm in which input data comes from web log of various e-commerce websites. Hence, determine the relationship between Web data mining and e-commerce and also to apply Web mining technology in e-commerce.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130568421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-07-26DOI: 10.1109/ICCCNT.2012.6395967
S. Ravichandran, D. Sathya, R. Shanmugapriya, G. Isvariyaa
The main objective of this paper is to have a best association between customer and organisation. This method is proposed in order to discover knowledge from huge amount of data and to use the data efficiently because of great demand. Banking is the most commonly used application for financial section. In which, Enterprise Resource Planning (ERP) model is most widely used in order to cost control, accounting and e-business & analyses. The request of the customers are routed automatically to the next department when one department finishes their work of the customer's request and each department have access to the single database that holds the customers new request. Customer Relationship Management (CRM) model is responsible for receiving the request and sending responses to the customers quickly and directly. The request includes queries, complaints, suggestions, and orders. These requests are forwarded to inner view ERP through query generator. In this paper, we proposed a model that integrates the customer queries, transactions, databases and all other specifications used in ERP Systems, then use data mining techniques to integrate decision making and forecasting. Using ERP characteristics, data gathered from central database are in cluster format which is based on action taken against the queries generated by customers. Later the clustered data's are used by Apriori algorithm to extract new rules and patterns for the enhancement of an organisation.
{"title":"Rule-base data mining systems for customer queries","authors":"S. Ravichandran, D. Sathya, R. Shanmugapriya, G. Isvariyaa","doi":"10.1109/ICCCNT.2012.6395967","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6395967","url":null,"abstract":"The main objective of this paper is to have a best association between customer and organisation. This method is proposed in order to discover knowledge from huge amount of data and to use the data efficiently because of great demand. Banking is the most commonly used application for financial section. In which, Enterprise Resource Planning (ERP) model is most widely used in order to cost control, accounting and e-business & analyses. The request of the customers are routed automatically to the next department when one department finishes their work of the customer's request and each department have access to the single database that holds the customers new request. Customer Relationship Management (CRM) model is responsible for receiving the request and sending responses to the customers quickly and directly. The request includes queries, complaints, suggestions, and orders. These requests are forwarded to inner view ERP through query generator. In this paper, we proposed a model that integrates the customer queries, transactions, databases and all other specifications used in ERP Systems, then use data mining techniques to integrate decision making and forecasting. Using ERP characteristics, data gathered from central database are in cluster format which is based on action taken against the queries generated by customers. Later the clustered data's are used by Apriori algorithm to extract new rules and patterns for the enhancement of an organisation.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130718432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-07-26DOI: 10.1109/ICCCNT.2012.6396066
M. Rajesh, D. Muruganandam
A disaster is a deviation from planned or expected behavior or a course of event that endangers or adversely affects people, property, or the environment. This paper proposes a realtime accident prevention system combining signal processing and zigbee technique, that gets triggered by rash driving. The objective is to detect speed patterns in the driver's driving and alert the guard if certain patterns repeatedly occur. Several patterns are identified which are linked to irresponsible driving. The fluctuations in acceleration and deceleration for a period of time is measured by a sensor attached to the accelerator and the footbrake. This sensor gives inputs to the microcontroller kit, based on the amount of pressure on the accelerator / brake. The microcontroller in the system ascertains the traffic conditions, based on these variations in speed. Once the driving pattern matches the pre-defined pattern of rash driving in heavy or low traffic region, an alarm is sent to the driver along with the speed recommended. If the vehicle continues to travel in the same manner as before, an Zbee module in a Zigbee network sends an alert, giving details of the vehicle, the date and time of violation to the nearest control room. This will allow early response and rescue of accidents.
{"title":"On proposing automobile accident prevention system (A2PS) using wireless sensors and zigbee technology","authors":"M. Rajesh, D. Muruganandam","doi":"10.1109/ICCCNT.2012.6396066","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6396066","url":null,"abstract":"A disaster is a deviation from planned or expected behavior or a course of event that endangers or adversely affects people, property, or the environment. This paper proposes a realtime accident prevention system combining signal processing and zigbee technique, that gets triggered by rash driving. The objective is to detect speed patterns in the driver's driving and alert the guard if certain patterns repeatedly occur. Several patterns are identified which are linked to irresponsible driving. The fluctuations in acceleration and deceleration for a period of time is measured by a sensor attached to the accelerator and the footbrake. This sensor gives inputs to the microcontroller kit, based on the amount of pressure on the accelerator / brake. The microcontroller in the system ascertains the traffic conditions, based on these variations in speed. Once the driving pattern matches the pre-defined pattern of rash driving in heavy or low traffic region, an alarm is sent to the driver along with the speed recommended. If the vehicle continues to travel in the same manner as before, an Zbee module in a Zigbee network sends an alert, giving details of the vehicle, the date and time of violation to the nearest control room. This will allow early response and rescue of accidents.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129670993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-07-26DOI: 10.1109/ICCCNT.2012.6396058
V. Ravi, T. Thyagarajan, S. Y. Priyadharshni
Model predictive control (MPC) has become the leading form of advanced multivariable control in the chemical process industry. The objective of this work is to introduce a gain scheduling control strategy for multivariable MPC. The method of approach is to design multiple linear MPC controllers. This strategy maintains performance of multiple linear MPC controllers over a wide range of operating levels. One important contribution is that the strategy combines several multiple linear MPC controllers, each with their own linear state space model describing process dynamics at a specific level of operation. One of the linear MPC controller output is selected as gain scheduling adaptive controller's output based on the current value of the measured process variable. The tuning parameters for the MPC controller are obtained using real coded Genetic Algorithm (GA). The capabilities of the gain scheduling adaptive (GSA) control strategy for MPC controller are investigated on Two Conical Tank Interacting Level System (TCTILS) through computer simulation.
{"title":"Gain scheduling adaptive model predictive controller for two conical tank interacting level system","authors":"V. Ravi, T. Thyagarajan, S. Y. Priyadharshni","doi":"10.1109/ICCCNT.2012.6396058","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6396058","url":null,"abstract":"Model predictive control (MPC) has become the leading form of advanced multivariable control in the chemical process industry. The objective of this work is to introduce a gain scheduling control strategy for multivariable MPC. The method of approach is to design multiple linear MPC controllers. This strategy maintains performance of multiple linear MPC controllers over a wide range of operating levels. One important contribution is that the strategy combines several multiple linear MPC controllers, each with their own linear state space model describing process dynamics at a specific level of operation. One of the linear MPC controller output is selected as gain scheduling adaptive controller's output based on the current value of the measured process variable. The tuning parameters for the MPC controller are obtained using real coded Genetic Algorithm (GA). The capabilities of the gain scheduling adaptive (GSA) control strategy for MPC controller are investigated on Two Conical Tank Interacting Level System (TCTILS) through computer simulation.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124284770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-07-26DOI: 10.1109/ICCCNT.2012.6477848
G. Cheng, E. Ayeh, Ziming Zhang
Computational visual attention systems, which aim at detecting salient regions in images, have been the subject of research for more than two decades. In this paper, we propose a novel approach (SEC) to detect salient regions in static images. This method is composed of two modules: segmentation-based entropy computation to determine the information content of clusters and local color contrast computation to enhance the saliency. DBSCAN is used first to segment the image. Then, the entropies of the resulting segments are computed. Spatial information of each segment size and cohesion is employed to adjust the entropy in terms of distinctiveness. Color contrast between adjacent segments is then computed and combined with spatial information to determine the most salient regions within the input image. We conducted two types of experiments, and compared visually and quantitatively with existing methods.
{"title":"Detecting salient regions in static images","authors":"G. Cheng, E. Ayeh, Ziming Zhang","doi":"10.1109/ICCCNT.2012.6477848","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6477848","url":null,"abstract":"Computational visual attention systems, which aim at detecting salient regions in images, have been the subject of research for more than two decades. In this paper, we propose a novel approach (SEC) to detect salient regions in static images. This method is composed of two modules: segmentation-based entropy computation to determine the information content of clusters and local color contrast computation to enhance the saliency. DBSCAN is used first to segment the image. Then, the entropies of the resulting segments are computed. Spatial information of each segment size and cohesion is employed to adjust the entropy in terms of distinctiveness. Color contrast between adjacent segments is then computed and combined with spatial information to determine the most salient regions within the input image. We conducted two types of experiments, and compared visually and quantitatively with existing methods.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":"253 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114077274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-07-26DOI: 10.1109/ICCCNT.2012.6396102
B. Vijayalakshmi, C. Ram Kumar
Wireless Sensor Networks (WSN) is a significant technology that has a considerable attraction in many areas, particularly in health sector. On the other hand Wireless Mesh Networks (WMN), which are an extension of LAN, have far better range and also reduce the amount of cabling needed to connect to the backbone network. In this paper a scheme that is Wireless Sensor based Mesh Networks, which is an integration of the above two technologies has been used for monitoring the patients status as follows: The patient's temperature, heart beat and pressure is monitored automatically using a bio-medical kit that is connected with the patient. A LCD is provided with the kit that is used to notify the nurse about the patient's health status. The information is then sent to a mesh node through Zigbee technology. The mesh node is generally a PC that helps the duty doctor to monitor all the wards that are present in the hospital. This ensures that the patient's health status is monitored even in the absence of the nurse. From the mesh node, a SMS is sent to specified doctors through GSM connection. With the help of the information got through SMS, the doctors can be able to attend the patient very quickly. Since the monitoring is done automatically there is no need for any person to look after the patient.
{"title":"Patient monitoring system using Wireless Sensor based Mesh Network","authors":"B. Vijayalakshmi, C. Ram Kumar","doi":"10.1109/ICCCNT.2012.6396102","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6396102","url":null,"abstract":"Wireless Sensor Networks (WSN) is a significant technology that has a considerable attraction in many areas, particularly in health sector. On the other hand Wireless Mesh Networks (WMN), which are an extension of LAN, have far better range and also reduce the amount of cabling needed to connect to the backbone network. In this paper a scheme that is Wireless Sensor based Mesh Networks, which is an integration of the above two technologies has been used for monitoring the patients status as follows: The patient's temperature, heart beat and pressure is monitored automatically using a bio-medical kit that is connected with the patient. A LCD is provided with the kit that is used to notify the nurse about the patient's health status. The information is then sent to a mesh node through Zigbee technology. The mesh node is generally a PC that helps the duty doctor to monitor all the wards that are present in the hospital. This ensures that the patient's health status is monitored even in the absence of the nurse. From the mesh node, a SMS is sent to specified doctors through GSM connection. With the help of the information got through SMS, the doctors can be able to attend the patient very quickly. Since the monitoring is done automatically there is no need for any person to look after the patient.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":"89 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120870761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-07-26DOI: 10.1109/ICCCNT.2012.6395988
M. Qayyum, M. Husamuddin
Data Replication Techniques in Mobile Adhoc Networks is presented in this paper and discussed about the Data Replication Technique for Real-Time Ad Hoc Mobile Databases (DREAM); Collaborative Allocation and Deallocation of Replicas with Efficiency (CADRE); Consistency and Load Based Efficicient Allocation of Replicas (CLEAR); Expanding Ring Replication; Distributed Hash Table Replication (DHTR); Hara's Data Replication Schemes; An Economic Model for Effcient Dynamic Replication in Mobile-P2P networks (EcoRep).
{"title":"Data repliation techniques in MANETS","authors":"M. Qayyum, M. Husamuddin","doi":"10.1109/ICCCNT.2012.6395988","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6395988","url":null,"abstract":"Data Replication Techniques in Mobile Adhoc Networks is presented in this paper and discussed about the Data Replication Technique for Real-Time Ad Hoc Mobile Databases (DREAM); Collaborative Allocation and Deallocation of Replicas with Efficiency (CADRE); Consistency and Load Based Efficicient Allocation of Replicas (CLEAR); Expanding Ring Replication; Distributed Hash Table Replication (DHTR); Hara's Data Replication Schemes; An Economic Model for Effcient Dynamic Replication in Mobile-P2P networks (EcoRep).","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":"29 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120978709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-07-26DOI: 10.1109/ICCCNT.2012.6396010
H. Reddy, N. Sathisha, A. Kumari, K. Raja
The steganography is used to hide information and communicate in secure way to the destination. In this paper we propose Secure Steganography using Hybrid Domain Technique (SSHDT). The cover image of different formats and sizes are considered and resized to dimensions of power of 2. The Daubechies Lifting Wavelet Transforms (LWT) is applied on cover image to generate four sub bands XA, XH, XV and XD. The XD band is considered and divided into two equal blocks say upper and lower for payload embedding. The payload of different formats are considered and resized to dimensions of power of 2. The payload is fragmented into four equal blocks. The integer Haar LWT is applied on two diagonal sub bands to generate F1 and F2 blocks and remaining two diagonal sub bands are retained in the spatial domain itself say S1 and S2. The S1, S2. F1 and F2 matrix are converted into single columns. The bit reversal is applied on each element of a column to scramble the payload index bit positions. The cube root is applied on coefficient of index value to scale down the magnitudes. The integer part is considered for embedding in XD band only of cover image to generate stego object. The Decision Factor Based Manipulation (DFBM) is used to scramble further stego object to improve security to the payload. Dubechies Inverse LWT (ILWT) is applied on XA, XH, XV and XD stego object to obtain stego image in spatial domain. it is observed that PSNR and embedding capacity of the proposed algorithm is better compared to the existing algorithm.
{"title":"Secure steganography using hybrid domain technique","authors":"H. Reddy, N. Sathisha, A. Kumari, K. Raja","doi":"10.1109/ICCCNT.2012.6396010","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6396010","url":null,"abstract":"The steganography is used to hide information and communicate in secure way to the destination. In this paper we propose Secure Steganography using Hybrid Domain Technique (SSHDT). The cover image of different formats and sizes are considered and resized to dimensions of power of 2. The Daubechies Lifting Wavelet Transforms (LWT) is applied on cover image to generate four sub bands XA, XH, XV and XD. The XD band is considered and divided into two equal blocks say upper and lower for payload embedding. The payload of different formats are considered and resized to dimensions of power of 2. The payload is fragmented into four equal blocks. The integer Haar LWT is applied on two diagonal sub bands to generate F1 and F2 blocks and remaining two diagonal sub bands are retained in the spatial domain itself say S1 and S2. The S1, S2. F1 and F2 matrix are converted into single columns. The bit reversal is applied on each element of a column to scramble the payload index bit positions. The cube root is applied on coefficient of index value to scale down the magnitudes. The integer part is considered for embedding in XD band only of cover image to generate stego object. The Decision Factor Based Manipulation (DFBM) is used to scramble further stego object to improve security to the payload. Dubechies Inverse LWT (ILWT) is applied on XA, XH, XV and XD stego object to obtain stego image in spatial domain. it is observed that PSNR and embedding capacity of the proposed algorithm is better compared to the existing algorithm.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123039919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-07-26DOI: 10.1109/ICCCNT.2012.6396104
R. Valli, P. Dananjayan
The major issue in wireless sensor network (WSN) is the power control since it is impossible to recharge or replace the batteries of the sensors. The sensors transmit at high power to make its transmission successful. Transmitting at high power not only reduces the lifetime of the nodes and that of the network, it also introduces excessive interference. Therefore, every node should transmit at minimal power while satisfying the quality of service (QoS) requirements. This paper proposes a power control game with error control coding (ECC) while considering the QoS requirements. The performance of the power control game satisfying QoS delay constraints with Reed Solomon (RS) and Multivariate Interpolation Decoded RS code (MIDRS) code for WSN is evaluated in terms of bit error rate (BER), throughput and delay.
{"title":"Power control with QoS constraints in WSN using game theoretic approach","authors":"R. Valli, P. Dananjayan","doi":"10.1109/ICCCNT.2012.6396104","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6396104","url":null,"abstract":"The major issue in wireless sensor network (WSN) is the power control since it is impossible to recharge or replace the batteries of the sensors. The sensors transmit at high power to make its transmission successful. Transmitting at high power not only reduces the lifetime of the nodes and that of the network, it also introduces excessive interference. Therefore, every node should transmit at minimal power while satisfying the quality of service (QoS) requirements. This paper proposes a power control game with error control coding (ECC) while considering the QoS requirements. The performance of the power control game satisfying QoS delay constraints with Reed Solomon (RS) and Multivariate Interpolation Decoded RS code (MIDRS) code for WSN is evaluated in terms of bit error rate (BER), throughput and delay.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129209151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-07-26DOI: 10.1109/ICCCNT.2012.6396061
V. Dandu, B. Ramkumar, H. Kittur
In this work we evaluated arrival profile of the HPM based multiplier partial products reduction tree in two ways: 1.manual delay, area calculation through logical effort, 2.ASIC implementation. Based on the arrival profile, we worked with some recently proposed optimal adders and finally we proposed an optimal hybrid adder for the final addition in HPM based parallel multiplier. This work derives some mathematical expressions to find the size of different regions in the partial product arrival profile which helps to design optimal adder for each region. This work evaluates the performance of proposed hybrid adder in terms of area, power and delay using 90nm technology. This work deals with manual calculation for 8-b and ASIC simulation of different adder designs for 8-b, 16-b, 32-b and 64-b multiplier bit sizes.
{"title":"Optimization of hybrid final adder for the high performance multiplier","authors":"V. Dandu, B. Ramkumar, H. Kittur","doi":"10.1109/ICCCNT.2012.6396061","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6396061","url":null,"abstract":"In this work we evaluated arrival profile of the HPM based multiplier partial products reduction tree in two ways: 1.manual delay, area calculation through logical effort, 2.ASIC implementation. Based on the arrival profile, we worked with some recently proposed optimal adders and finally we proposed an optimal hybrid adder for the final addition in HPM based parallel multiplier. This work derives some mathematical expressions to find the size of different regions in the partial product arrival profile which helps to design optimal adder for each region. This work evaluates the performance of proposed hybrid adder in terms of area, power and delay using 90nm technology. This work deals with manual calculation for 8-b and ASIC simulation of different adder designs for 8-b, 16-b, 32-b and 64-b multiplier bit sizes.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132613765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}