Pub Date : 2018-07-01DOI: 10.1109/ICSCAN.2018.8541171
S. Karthik, T. Selvakumar, M. Guruesakkiraj, V. H. Sudan, S. A. Kumar
In the teaching profession commonly the last quantity or the broken pieces of chalk is not utilized and 30 percent of chalk is wasted. On such scenario we could reverse these small pieces to whole new one. In electrical mode a motor of 100 RPM is powered to powder the small pieces of chalk by crasher. The powder is further mixed with water to develop slurry and consequential poured to mould cavity to get desire shape which is fixed with heating coil to obtain chalk by drying it.
{"title":"Mini Chalk Recycling Machine","authors":"S. Karthik, T. Selvakumar, M. Guruesakkiraj, V. H. Sudan, S. A. Kumar","doi":"10.1109/ICSCAN.2018.8541171","DOIUrl":"https://doi.org/10.1109/ICSCAN.2018.8541171","url":null,"abstract":"In the teaching profession commonly the last quantity or the broken pieces of chalk is not utilized and 30 percent of chalk is wasted. On such scenario we could reverse these small pieces to whole new one. In electrical mode a motor of 100 RPM is powered to powder the small pieces of chalk by crasher. The powder is further mixed with water to develop slurry and consequential poured to mould cavity to get desire shape which is fixed with heating coil to obtain chalk by drying it.","PeriodicalId":378798,"journal":{"name":"2018 IEEE International Conference on System, Computation, Automation and Networking (ICSCA)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121881149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/ICSCAN.2018.8541191
B. Vicknesh, N. Shriram, M. Srivatsan, Prof. Anjan Kumar Dash
The focus of this project is 5-bar parallel manipulator. There are many approaches to eliminate the singularities of this kind of manipulators, like redundant actuation, connecting two inverse kinematic solutions without a singularity, topology of self-motion manifolds of redundant manipulators, self-motion, extending the link length by prismatic joints etc. In this project, a novel approach is proposed to eliminate the singularities from the workspace. This investigation is proposed to be carried out for 2-DOF planar parallel manipulator to establish the concept. One of the base actuators (motors) is fixed to a linear actuator. This linear actuator extends when the end-effector is in the proximity of singularity loci. As the manipulator clears out of the singularity condition, then again, the parallel manipulator is reverted back to the original position by the linear actuator. Mathematically, when the manipulator attains a singularity condition, the Jacobian matrix loses/gains rank. A reconfiguration of the manipulator to a defined degree at this instance ensures a change in the determinant of the Jacobian matrix to a non-zero value, thereby avoiding the singularity condition. Once the singularity loci are avoided, the base length is reverted to its actual state by the linear actuator for the same trajectory of the end–effector within the defined workspace of the manipulator. As a result, the used trajectories remain unaffected by the effect of singularities and thus improve the efficiency of the parallel manipulator significantly.
{"title":"OVERCOMING SINGULARITIES IN PARALLEL MANIPULATORS BY CHANGE IN BASE LENGTH","authors":"B. Vicknesh, N. Shriram, M. Srivatsan, Prof. Anjan Kumar Dash","doi":"10.1109/ICSCAN.2018.8541191","DOIUrl":"https://doi.org/10.1109/ICSCAN.2018.8541191","url":null,"abstract":"The focus of this project is 5-bar parallel manipulator. There are many approaches to eliminate the singularities of this kind of manipulators, like redundant actuation, connecting two inverse kinematic solutions without a singularity, topology of self-motion manifolds of redundant manipulators, self-motion, extending the link length by prismatic joints etc. In this project, a novel approach is proposed to eliminate the singularities from the workspace. This investigation is proposed to be carried out for 2-DOF planar parallel manipulator to establish the concept. One of the base actuators (motors) is fixed to a linear actuator. This linear actuator extends when the end-effector is in the proximity of singularity loci. As the manipulator clears out of the singularity condition, then again, the parallel manipulator is reverted back to the original position by the linear actuator. Mathematically, when the manipulator attains a singularity condition, the Jacobian matrix loses/gains rank. A reconfiguration of the manipulator to a defined degree at this instance ensures a change in the determinant of the Jacobian matrix to a non-zero value, thereby avoiding the singularity condition. Once the singularity loci are avoided, the base length is reverted to its actual state by the linear actuator for the same trajectory of the end–effector within the defined workspace of the manipulator. As a result, the used trajectories remain unaffected by the effect of singularities and thus improve the efficiency of the parallel manipulator significantly.","PeriodicalId":378798,"journal":{"name":"2018 IEEE International Conference on System, Computation, Automation and Networking (ICSCA)","volume":"270 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133975688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/ICSCAN.2018.8541176
A. Sivaranjani, S. Senthilrani, B. Ashokumar, A. Murugan
Computer vision is becoming popular at the present days in agricultural area with an assortment of technological improvements for grading, sorting, classification. Though there are much technical advancement, cashew grading and sorting are still difficult task in daily market. In this research work we discussed about the computer vision based grading system and also an overview of deep Convolution Neural Network (CNN). The CNN with deep layer has tremendous achievement in many image classification applications. The deep CNN which itself extract the features of the image for classification was the added advantage. In this work the various parameters are considered for optimization of CNN. This work portrays the importance grading cashew nut and also proposed a framework for computer vision based grading system for cashew nut using deep CNN.
{"title":"An Improvised Algorithm For Computer Vision Based Cashew Grading System Using Deep CNN","authors":"A. Sivaranjani, S. Senthilrani, B. Ashokumar, A. Murugan","doi":"10.1109/ICSCAN.2018.8541176","DOIUrl":"https://doi.org/10.1109/ICSCAN.2018.8541176","url":null,"abstract":"Computer vision is becoming popular at the present days in agricultural area with an assortment of technological improvements for grading, sorting, classification. Though there are much technical advancement, cashew grading and sorting are still difficult task in daily market. In this research work we discussed about the computer vision based grading system and also an overview of deep Convolution Neural Network (CNN). The CNN with deep layer has tremendous achievement in many image classification applications. The deep CNN which itself extract the features of the image for classification was the added advantage. In this work the various parameters are considered for optimization of CNN. This work portrays the importance grading cashew nut and also proposed a framework for computer vision based grading system for cashew nut using deep CNN.","PeriodicalId":378798,"journal":{"name":"2018 IEEE International Conference on System, Computation, Automation and Networking (ICSCA)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114202967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
‘Data’ had always an important asset of scientific study i.e. measurement, analysis, recording, representation, validation etc. Initially, data generation were increasing gradually along with Computer Generations. As per rapid growth of Computer technologies, ‘Data generation’ have been increased exponentially. Enhancement in data carries responsibility of ‘ethics’, whose fetches individual or distributed ‘morality’ towards its applications; ‘privacy’ towards users & services data; ‘transparencies’ towards scheduled activities or transections among consumers & providers; ‘trust’ towards AI agents and feedback systems. Countries have approached applications of modern technologies with limitations, different adoptions and regulations to prevent, privacy, confidentialities, social culture, transparency, human rights and security. Sometimes, careless attitude and blind faith may lead to data theft, hack and unpleased uses. Advance technologies may invade the individuality with different attributes using your attitude and open data. The objective of this paper is to identify evolution of ‘data ethics’ mind set and its different set of thought-wings, influence and penitration of digital data world(open data) in human life and their believes wrt trust, faith towards individual and group privacy,transperencies.Latest technologies and their ethical issues, training and principals related to ethical assessment have been looked over.
{"title":"Epistemological View: Data Ethics, Privacy & Trust on Digital Platform","authors":"Rajeshwari Harsh, Gaurav Acharya, Sunita Chaudhary","doi":"10.1109/ICSCAN.2018.8541166","DOIUrl":"https://doi.org/10.1109/ICSCAN.2018.8541166","url":null,"abstract":"‘Data’ had always an important asset of scientific study i.e. measurement, analysis, recording, representation, validation etc. Initially, data generation were increasing gradually along with Computer Generations. As per rapid growth of Computer technologies, ‘Data generation’ have been increased exponentially. Enhancement in data carries responsibility of ‘ethics’, whose fetches individual or distributed ‘morality’ towards its applications; ‘privacy’ towards users & services data; ‘transparencies’ towards scheduled activities or transections among consumers & providers; ‘trust’ towards AI agents and feedback systems. Countries have approached applications of modern technologies with limitations, different adoptions and regulations to prevent, privacy, confidentialities, social culture, transparency, human rights and security. Sometimes, careless attitude and blind faith may lead to data theft, hack and unpleased uses. Advance technologies may invade the individuality with different attributes using your attitude and open data. The objective of this paper is to identify evolution of ‘data ethics’ mind set and its different set of thought-wings, influence and penitration of digital data world(open data) in human life and their believes wrt trust, faith towards individual and group privacy,transperencies.Latest technologies and their ethical issues, training and principals related to ethical assessment have been looked over.","PeriodicalId":378798,"journal":{"name":"2018 IEEE International Conference on System, Computation, Automation and Networking (ICSCA)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115106229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/ICSCAN.2018.8541183
M. Rekha, M. Kowsalya
In this paper, determination of optimal Proportional-Integral (PI) controller values for a Single-Ended Primary-Inductor converter SEPIC is taken place using Particle Swarm Optimization. The optimization has good computational efficiency and convergence characteristics. The SEPIC converter comprises of buck and boost operation depending on the duty cycle. Maximum power is tracked from the photovoltaic PV using Maximum Power Point Tracking system. The controller’s PI value is tuned to resulting better efficiency of the converter with MPPT as input. The simulation is executed in MATLAB/Simulink.
{"title":"Evaluation of PSO Tuned PI Controller for Single-Ended Primary-Inductor Converter","authors":"M. Rekha, M. Kowsalya","doi":"10.1109/ICSCAN.2018.8541183","DOIUrl":"https://doi.org/10.1109/ICSCAN.2018.8541183","url":null,"abstract":"In this paper, determination of optimal Proportional-Integral (PI) controller values for a Single-Ended Primary-Inductor converter SEPIC is taken place using Particle Swarm Optimization. The optimization has good computational efficiency and convergence characteristics. The SEPIC converter comprises of buck and boost operation depending on the duty cycle. Maximum power is tracked from the photovoltaic PV using Maximum Power Point Tracking system. The controller’s PI value is tuned to resulting better efficiency of the converter with MPPT as input. The simulation is executed in MATLAB/Simulink.","PeriodicalId":378798,"journal":{"name":"2018 IEEE International Conference on System, Computation, Automation and Networking (ICSCA)","volume":"825 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126103090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/ICSCAN.2018.8541248
Neha Titre, Antara S. Bhattacharya
With the rapid development of network and information technology, data are woven into every corner of our lives, such as websites, social networks, public platforms, etc. Along with the convenience and immediacy of data acquisition, big data technologies, and many other new data analysis tools have been succeeded and applied in various fields of people’s lives, which have generated huge social impact and economic benefits. Generally, data should be stored in databases for easy access and utilization. It consists of the enhancement of the MongoDB level based access control model with privacy keys for security and monitor. The proposed monitor is easily used into any MongoDB deployment control with high protection for data security.
{"title":"Access DataPrivacy Management Control inMongoDB","authors":"Neha Titre, Antara S. Bhattacharya","doi":"10.1109/ICSCAN.2018.8541248","DOIUrl":"https://doi.org/10.1109/ICSCAN.2018.8541248","url":null,"abstract":"With the rapid development of network and information technology, data are woven into every corner of our lives, such as websites, social networks, public platforms, etc. Along with the convenience and immediacy of data acquisition, big data technologies, and many other new data analysis tools have been succeeded and applied in various fields of people’s lives, which have generated huge social impact and economic benefits. Generally, data should be stored in databases for easy access and utilization. It consists of the enhancement of the MongoDB level based access control model with privacy keys for security and monitor. The proposed monitor is easily used into any MongoDB deployment control with high protection for data security.","PeriodicalId":378798,"journal":{"name":"2018 IEEE International Conference on System, Computation, Automation and Networking (ICSCA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129976293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/ICSCAN.2018.8541222
D. Poonguzhali, Dr. M. Ezhilarasan
The paper presents the feature extraction of level-1 and level-2 fingerprint features. The level-1 features are based on ridges and level-2 features are based on minutiae of the fingerprint, which are used for authentication. The level-1 and level-2 feature level fusion is proposed to enhance the accuracy rate of unibiometric fingerprint authentication system. The performance of this system is evaluated on two publicly available databases and our own database. Fusion scheme is decided depending on the type of information available. Choosing the fusion scheme is important for any multibiometric system as it has significant impact over the performance of the multibiometric system. The identification rate is more in concatenated feature set than for individual feature set. The proposed FFV uses the much richer grey-level information of the fingerprint image. It is also capable of dealing with fingerprints of low quality images from which features cannot be extracted reliably. The results shows that the proposed FFV method outperforms other competing approaches with both EER and DI.
{"title":"A Framework for Level-1 and Level-2 Feature Level Fusion","authors":"D. Poonguzhali, Dr. M. Ezhilarasan","doi":"10.1109/ICSCAN.2018.8541222","DOIUrl":"https://doi.org/10.1109/ICSCAN.2018.8541222","url":null,"abstract":"The paper presents the feature extraction of level-1 and level-2 fingerprint features. The level-1 features are based on ridges and level-2 features are based on minutiae of the fingerprint, which are used for authentication. The level-1 and level-2 feature level fusion is proposed to enhance the accuracy rate of unibiometric fingerprint authentication system. The performance of this system is evaluated on two publicly available databases and our own database. Fusion scheme is decided depending on the type of information available. Choosing the fusion scheme is important for any multibiometric system as it has significant impact over the performance of the multibiometric system. The identification rate is more in concatenated feature set than for individual feature set. The proposed FFV uses the much richer grey-level information of the fingerprint image. It is also capable of dealing with fingerprints of low quality images from which features cannot be extracted reliably. The results shows that the proposed FFV method outperforms other competing approaches with both EER and DI.","PeriodicalId":378798,"journal":{"name":"2018 IEEE International Conference on System, Computation, Automation and Networking (ICSCA)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124023182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/ICSCAN.2018.8541214
Sourajit Saha, Md. Asif Bin Khaled, Md. Saiful Islam, Nisha Saha Puja, Mahady Hasan
There are several tasks that human excel at and computers do not and vice-versa. Just until a few years ago computers were as good as a storage for images and videos. However, in the past 6 years with the boon in artificial neural network, labeled data and computation power; machines have started becoming smart at tasks like recognizing images, detecting different objects in images, captioning images, understanding and summarizing videos, detecting semantic actions in videos and so on. Deep learning researchers and practitioners have started demonstrating notable performance of AI(Artificial Intelligence) on many different tasks that pushes the boundaries and as a continuation of that process, we took one specific problem to solve using deep learning that even human can not solve. We have taken Bangla handwritten characters, then trained them applying several deep learning techniques such as Convolutional Neural Network and Recurrent Neural Network to predict the sex of the writer. Consequently, we have got 91.85% accuracy rate and also demonstrated further analysis of the results that we got.
{"title":"Detecting Sex From Handwritten Examples","authors":"Sourajit Saha, Md. Asif Bin Khaled, Md. Saiful Islam, Nisha Saha Puja, Mahady Hasan","doi":"10.1109/ICSCAN.2018.8541214","DOIUrl":"https://doi.org/10.1109/ICSCAN.2018.8541214","url":null,"abstract":"There are several tasks that human excel at and computers do not and vice-versa. Just until a few years ago computers were as good as a storage for images and videos. However, in the past 6 years with the boon in artificial neural network, labeled data and computation power; machines have started becoming smart at tasks like recognizing images, detecting different objects in images, captioning images, understanding and summarizing videos, detecting semantic actions in videos and so on. Deep learning researchers and practitioners have started demonstrating notable performance of AI(Artificial Intelligence) on many different tasks that pushes the boundaries and as a continuation of that process, we took one specific problem to solve using deep learning that even human can not solve. We have taken Bangla handwritten characters, then trained them applying several deep learning techniques such as Convolutional Neural Network and Recurrent Neural Network to predict the sex of the writer. Consequently, we have got 91.85% accuracy rate and also demonstrated further analysis of the results that we got.","PeriodicalId":378798,"journal":{"name":"2018 IEEE International Conference on System, Computation, Automation and Networking (ICSCA)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132454859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/ICSCAN.2018.8541200
S. Rajkumar, Dr. K. Sedhuraman, D. Murugadhan
In aircraft electric motor driven fuel delivery system, the motor must be characterized by high power density, reliability, small size, less weight and high speed. The high speed operation, high power density and fault tolerance makes switched reluctance motor an ideal candidate for high speed aerospace applications. This paper investigates the application potential of Nickel and Ferrite materials in high-speed switched reluctance motor. Two configurations of (a) Nickel material with smooth frame and (b) Ferrite material with smooth frame have been studied using finite element analysis to obtain their nodal temperature distributions in different parts of stator and rotor frames. The study reveals that the Ferrite and Nickel metals based stator and rotor frame has a better thermal capability and it provides desirable feature in high speed aerospace applications.
{"title":"THERMAL ANALYSIS AND TORQUE RIPPLE MINIMIZATION IN SWITCHED RELUCTANCE MOTOR WITH NICKEL-FERRITE MATERIAL","authors":"S. Rajkumar, Dr. K. Sedhuraman, D. Murugadhan","doi":"10.1109/ICSCAN.2018.8541200","DOIUrl":"https://doi.org/10.1109/ICSCAN.2018.8541200","url":null,"abstract":"In aircraft electric motor driven fuel delivery system, the motor must be characterized by high power density, reliability, small size, less weight and high speed. The high speed operation, high power density and fault tolerance makes switched reluctance motor an ideal candidate for high speed aerospace applications. This paper investigates the application potential of Nickel and Ferrite materials in high-speed switched reluctance motor. Two configurations of (a) Nickel material with smooth frame and (b) Ferrite material with smooth frame have been studied using finite element analysis to obtain their nodal temperature distributions in different parts of stator and rotor frames. The study reveals that the Ferrite and Nickel metals based stator and rotor frame has a better thermal capability and it provides desirable feature in high speed aerospace applications.","PeriodicalId":378798,"journal":{"name":"2018 IEEE International Conference on System, Computation, Automation and Networking (ICSCA)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130517886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/ICSCAN.2018.8541202
Siva Kanakala, K. Ashok Kumar, P. Dananjayan
The scaling of technology decreases the communication issues between components in the System on Chip (SoC). Network on Chip (NoC) has the new architecture to deal with the overheads of communication and it is build with routers and processing elements. The router of NoC is temporarily and/or permanently disabled due to the occurrence of faults. A disabled router gives severe impact on the entire system hence the correction of faults is curial not only for single router but also entire NoC system. A Modified Hamming Code (MHC) is presented for detection and correction transient faults. The encoded data input is categorized in groups and each MHC is applied to each group parallelly there by provides high reliability of this method. The simulation results prove that MHC yields reduced latency and increased speed when compared to conventional Hamming Code (HC).
技术的规模化减少了片上系统(SoC)中组件之间的通信问题。片上网络(Network on Chip, NoC)是由路由器和处理单元组成的,具有处理通信开销的新架构。NoC的路由器由于发生故障而暂时或永久禁用。路由器故障会对整个系统造成严重的影响,因此故障的修复不仅是单个路由器的问题,而且是整个NoC系统的问题。提出了一种改进的汉明码(MHC)来检测和校正暂态故障。输入的编码数据按组分类,每个MHC并行应用于每组,提供了高可靠性的方法。仿真结果表明,与传统的汉明码(HC)相比,MHC可以降低延迟并提高速度。
{"title":"High Reliability NoC switch using Modified Hamming Code with Transient Faults","authors":"Siva Kanakala, K. Ashok Kumar, P. Dananjayan","doi":"10.1109/ICSCAN.2018.8541202","DOIUrl":"https://doi.org/10.1109/ICSCAN.2018.8541202","url":null,"abstract":"The scaling of technology decreases the communication issues between components in the System on Chip (SoC). Network on Chip (NoC) has the new architecture to deal with the overheads of communication and it is build with routers and processing elements. The router of NoC is temporarily and/or permanently disabled due to the occurrence of faults. A disabled router gives severe impact on the entire system hence the correction of faults is curial not only for single router but also entire NoC system. A Modified Hamming Code (MHC) is presented for detection and correction transient faults. The encoded data input is categorized in groups and each MHC is applied to each group parallelly there by provides high reliability of this method. The simulation results prove that MHC yields reduced latency and increased speed when compared to conventional Hamming Code (HC).","PeriodicalId":378798,"journal":{"name":"2018 IEEE International Conference on System, Computation, Automation and Networking (ICSCA)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122912350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}