首页 > 最新文献

2014 International Conference on Computational Intelligence and Communication Networks最新文献

英文 中文
An Optimal Selection of Routing Protocol for Different Sink Placements in a Wireless Sensor Network for Landslide Detection System 滑坡探测系统无线传感器网络中不同Sink位置路由协议的最优选择
Suhaib Ahmed, A. Mahajan, Swastik Gupta, Ashish Suri
The capability of Wireless Sensor Network to provide real-time monitoring and prediction of events has enabled its use in designing networks for safety critical applications such as Landslide Detection and Monitoring. To prolong the network lifetime, an energy aware clustering approach is necessary. However in a centralized clustering mechanism, the sink node performs the necessary computations of cluster formation after receiving the information from all nodes regarding their location and energy levels. This paper presents an optimal location for sink placement so as to maximize the output parameters such as Throughput, End-to-End Delay, Jitter and Data Received, of various routing protocols and correspondingly select the best routing protocol and sink location.
无线传感器网络提供实时监测和预测事件的能力使其能够用于设计安全关键应用的网络,如滑坡探测和监测。为了延长网络的生命周期,需要一种能量感知的聚类方法。而在集中式聚类机制中,汇聚节点在接收到所有节点的位置和能级信息后,进行必要的聚类计算。为了使各种路由协议的吞吐量、端到端延迟、抖动和数据接收等输出参数最大化,本文提出了一个最优的sink放置位置,并相应地选择最佳的路由协议和sink位置。
{"title":"An Optimal Selection of Routing Protocol for Different Sink Placements in a Wireless Sensor Network for Landslide Detection System","authors":"Suhaib Ahmed, A. Mahajan, Swastik Gupta, Ashish Suri","doi":"10.1109/CICN.2014.87","DOIUrl":"https://doi.org/10.1109/CICN.2014.87","url":null,"abstract":"The capability of Wireless Sensor Network to provide real-time monitoring and prediction of events has enabled its use in designing networks for safety critical applications such as Landslide Detection and Monitoring. To prolong the network lifetime, an energy aware clustering approach is necessary. However in a centralized clustering mechanism, the sink node performs the necessary computations of cluster formation after receiving the information from all nodes regarding their location and energy levels. This paper presents an optimal location for sink placement so as to maximize the output parameters such as Throughput, End-to-End Delay, Jitter and Data Received, of various routing protocols and correspondingly select the best routing protocol and sink location.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78925100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Dual Band Notched Small Square Monopole UWB Antenna with Enhanced Bandwidth 增强带宽双频段陷波小方单极超宽带天线
A. Singh, Krishna Rathore, P. Sharma, R. K. Raj
This paper presents a small square monopole antenna with dual band-notched function which works for UWB applications. In this antenna there is a square radiating patch with an E-shaped slot, and a C-shaped slot at the middle of the patch and two L-shaped slot and one V-shaped strip in the ground plane which gives a wide fractional bandwidth of more than 140% (3.4-20 GHz) is consisted. The presented antenna has been successfully simulated, and shows the bandwidth for the voltage standing wave ratio 2 with two notched bands. The presented antenna has a small size of 10× 12 mm2. This antenna gives good radiation behavior within the UWB frequency band it is shown by simulated results.
本文提出了一种适用于超宽带应用的具有双陷波功能的小方形单极天线。该天线有一个带e型槽的方形辐射贴片,贴片中间有一个c型槽,接平面上有两个l型槽和一个v型带,其分数带宽超过140% (3.4-20 GHz)。所设计的天线已成功地进行了仿真,并给出了两个陷波带的电压驻波比2的带宽。该天线的尺寸很小,为10× 12 mm2。仿真结果表明,该天线在超宽带频段内具有良好的辐射性能。
{"title":"Dual Band Notched Small Square Monopole UWB Antenna with Enhanced Bandwidth","authors":"A. Singh, Krishna Rathore, P. Sharma, R. K. Raj","doi":"10.1109/CICN.2014.26","DOIUrl":"https://doi.org/10.1109/CICN.2014.26","url":null,"abstract":"This paper presents a small square monopole antenna with dual band-notched function which works for UWB applications. In this antenna there is a square radiating patch with an E-shaped slot, and a C-shaped slot at the middle of the patch and two L-shaped slot and one V-shaped strip in the ground plane which gives a wide fractional bandwidth of more than 140% (3.4-20 GHz) is consisted. The presented antenna has been successfully simulated, and shows the bandwidth for the voltage standing wave ratio 2 with two notched bands. The presented antenna has a small size of 10× 12 mm2. This antenna gives good radiation behavior within the UWB frequency band it is shown by simulated results.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75960981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Implementation of TCP Sequence Number Reference Model in Linux Kernel TCP序列号参考模型在Linux内核中的实现
Dr. Dhananjay M Dakhane, P. Deshmukh
It is observed that covert channels can be easily implemented in TCP/IP stack. It is easily achieved by embedding the covert message in the various header fields seemingly filled with "Random" data such as TCP Sequence Number (SQN), IP Identification (ID) etc. Such manipulation of these fields which seems "random" at first sight but might be detected with the help of various techniques. In this research paper we are proposing Sequence Number Reference Model as a Proof-of-Concept for sending the covert message using TCP Sequence Number (SQN) field without changing the semantics of its header field. Covert message in the packet cannot be detected by the conventional covert channel detection techniques since not a single bit of this header field is modified. We are providing a mechanism by which sender can send the covert message and receiver can interpret the same in spite of the fact that the actual covert message will not be carried by the sequence number field of TCP header.
观察到隐蔽通道可以很容易地在TCP/IP协议栈中实现。这很容易通过将隐蔽消息嵌入到看似充满“随机”数据(如TCP序列号(SQN), IP标识(ID)等)的各种报头字段中来实现。这种对这些领域的操纵乍一看似乎是“随机的”,但在各种技术的帮助下可能会被发现。在本研究中,我们提出序列号参考模型作为概念验证,在不改变其报头字段语义的情况下,使用TCP序列号(SQN)字段发送隐蔽消息。数据包中的隐蔽消息不能被传统的隐蔽通道检测技术检测到,因为这个报头字段的一个位都没有被修改。我们提供了一种机制,通过这种机制,发送方可以发送隐蔽消息,接收方可以解释相同的消息,尽管实际的隐蔽消息不会由TCP报头的序列号字段携带。
{"title":"The Implementation of TCP Sequence Number Reference Model in Linux Kernel","authors":"Dr. Dhananjay M Dakhane, P. Deshmukh","doi":"10.1109/CICN.2014.104","DOIUrl":"https://doi.org/10.1109/CICN.2014.104","url":null,"abstract":"It is observed that covert channels can be easily implemented in TCP/IP stack. It is easily achieved by embedding the covert message in the various header fields seemingly filled with \"Random\" data such as TCP Sequence Number (SQN), IP Identification (ID) etc. Such manipulation of these fields which seems \"random\" at first sight but might be detected with the help of various techniques. In this research paper we are proposing Sequence Number Reference Model as a Proof-of-Concept for sending the covert message using TCP Sequence Number (SQN) field without changing the semantics of its header field. Covert message in the packet cannot be detected by the conventional covert channel detection techniques since not a single bit of this header field is modified. We are providing a mechanism by which sender can send the covert message and receiver can interpret the same in spite of the fact that the actual covert message will not be carried by the sequence number field of TCP header.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73439675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Formalization of Entities for Agent Based Simulation Using Situation Calculus: A Specific Case Study of Fire Emergency Response 基于智能体的情境演算模拟的实体形式化——以火灾应急响应为例
Mainak Bandyopadhyay, Varun Singh
The current research presents a predicate logic based framework for formalizing various entities participating in Agent based Simulations. In the proposed technique the properties and actions of basic entities of Agent based Simulation (ABS) are represented using the axioms of Situation Calculus theory. The proposed framework has been used for the formalization of Agent based Simulation of Fire Emergency Response, and subsequently checked using SWI PROLOG SHELL.
目前的研究提出了一种基于谓词逻辑的框架,用于形式化参与基于Agent的仿真的各种实体。在该技术中,基于Agent的仿真(ABS)的基本实体的性质和行为用情景演算理论的公理来表示。提出的框架已用于基于Agent的火灾应急响应模拟的形式化,并随后使用SWI PROLOG SHELL进行检查。
{"title":"Formalization of Entities for Agent Based Simulation Using Situation Calculus: A Specific Case Study of Fire Emergency Response","authors":"Mainak Bandyopadhyay, Varun Singh","doi":"10.1109/CICN.2014.248","DOIUrl":"https://doi.org/10.1109/CICN.2014.248","url":null,"abstract":"The current research presents a predicate logic based framework for formalizing various entities participating in Agent based Simulations. In the proposed technique the properties and actions of basic entities of Agent based Simulation (ABS) are represented using the axioms of Situation Calculus theory. The proposed framework has been used for the formalization of Agent based Simulation of Fire Emergency Response, and subsequently checked using SWI PROLOG SHELL.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86830848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Extensive Survey on Feature Extraction Techniques for Facial Image Processing 人脸图像处理中的特征提取技术综述
Vivek Pali, S. Goswami, L. Bhaiya
In this research paper an extensive literature survey on different types of feature extraction techniques is reported. To provide an extensive survey, we not only categorize existing feature extraction techniques but also provide detailed descriptions of representative approaches within each category. These techniques are simply classified into four major categories, namely, feature based approach, appearance based approach, template-based and part-based approaches. The aim of this paper is to report an illustrative and comparative study of most popular feature extraction methods which are generally used in face recognition problems. This paper provides an up-to-date comprehensive survey of existing face recognition researches. We are motivated by the lack of direct and detailed independent comparisons of all possible algorithm implementations in available literature. After extensive research on these feature extraction techniques we found that different feature extraction techniques yield prominent results for different image processing applications.
本文对不同类型的特征提取技术进行了广泛的文献综述。为了提供一个广泛的调查,我们不仅对现有的特征提取技术进行了分类,而且对每个类别中的代表性方法进行了详细的描述。这些技术可以简单地分为四大类,即基于特征的方法、基于外观的方法、基于模板的方法和基于部件的方法。本文的目的是对最常用的特征提取方法进行说明和比较研究,这些方法通常用于人脸识别问题。本文对现有的人脸识别研究进行了全面的综述。我们的动机是缺乏对现有文献中所有可能的算法实现的直接和详细的独立比较。经过对这些特征提取技术的广泛研究,我们发现不同的特征提取技术对不同的图像处理应用产生了显著的效果。
{"title":"An Extensive Survey on Feature Extraction Techniques for Facial Image Processing","authors":"Vivek Pali, S. Goswami, L. Bhaiya","doi":"10.1109/CICN.2014.43","DOIUrl":"https://doi.org/10.1109/CICN.2014.43","url":null,"abstract":"In this research paper an extensive literature survey on different types of feature extraction techniques is reported. To provide an extensive survey, we not only categorize existing feature extraction techniques but also provide detailed descriptions of representative approaches within each category. These techniques are simply classified into four major categories, namely, feature based approach, appearance based approach, template-based and part-based approaches. The aim of this paper is to report an illustrative and comparative study of most popular feature extraction methods which are generally used in face recognition problems. This paper provides an up-to-date comprehensive survey of existing face recognition researches. We are motivated by the lack of direct and detailed independent comparisons of all possible algorithm implementations in available literature. After extensive research on these feature extraction techniques we found that different feature extraction techniques yield prominent results for different image processing applications.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87653294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
An AADL Model-Based Safety Analysis Method for Flight Control Software 基于AADL模型的飞控软件安全性分析方法
Zhang Tao, Yechun Jiang, Junda Ye, Cheng Jing, Huamin Qu
This paper proposes a model-based software safety analysis method for flight control software. Firstly, the AADL architecture model and error model of flight control software are constructed separately. Then we convert the AADL model of flight control software into extended Markov chain model. We can evaluate safety of software component by calculate the probability of component state in different hazardous levels with the extended Markov chain model. Finally, safety of entire flight control software system can be calculated according to AADL error states composition relation, which can avoid states explosion problem of Markov chain model.
提出了一种基于模型的飞控软件安全性分析方法。首先,分别建立了飞控软件的AADL体系结构模型和误差模型;然后将飞控软件的AADL模型转化为扩展马尔可夫链模型。利用扩展马尔可夫链模型,计算软件构件在不同危险等级下的状态概率,从而对软件构件的安全性进行评价。最后,根据AADL误差状态组成关系计算整个飞控软件系统的安全性,避免了马尔可夫链模型的状态爆炸问题。
{"title":"An AADL Model-Based Safety Analysis Method for Flight Control Software","authors":"Zhang Tao, Yechun Jiang, Junda Ye, Cheng Jing, Huamin Qu","doi":"10.1109/CICN.2014.240","DOIUrl":"https://doi.org/10.1109/CICN.2014.240","url":null,"abstract":"This paper proposes a model-based software safety analysis method for flight control software. Firstly, the AADL architecture model and error model of flight control software are constructed separately. Then we convert the AADL model of flight control software into extended Markov chain model. We can evaluate safety of software component by calculate the probability of component state in different hazardous levels with the extended Markov chain model. Finally, safety of entire flight control software system can be calculated according to AADL error states composition relation, which can avoid states explosion problem of Markov chain model.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87674313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Analysis of AOMDV, AODV, DSR, and DSDV Routing Protocols for Wireless Sensor Network 无线传感器网络中的AOMDV、AODV、DSR和DSDV路由协议分析
Bijan Paul, K. A. Bhuiyan, K. Fatema, P. Das
In wireless sensor network (WSN), data collecting from the environment and sending that data to be processed and evaluated is the most important issues. Hence performance evaluation and comparison between routing protocols is required because performance of any routing protocol can be changed or very with various parameters such as speed, seed time, pause time, number of node, and traffic scenario (network topology). In this paper routing protocol AODV, AOMDV, DSR and DSDV has been analyzed by comparing the different performance matrices such as packet delivery ratio (PDR), loss packet ratio (LPR), and average end to end delay (Average End to End) with varying pause time and number of node under TCP & CBR connection via network simulator NS2.35 for wireless sensor network.
在无线传感器网络(WSN)中,从环境中采集数据并发送数据进行处理和评估是最重要的问题。因此,需要对路由协议进行性能评估和比较,因为任何路由协议的性能都可能随着速度、种子时间、暂停时间、节点数量和流量场景(网络拓扑)等各种参数而发生变化。本文通过网络模拟器NS2.35对无线传感器网络在TCP & CBR连接下不同暂停时间和节点数下的路由协议AODV、AOMDV、DSR和DSDV的不同性能矩阵进行了分析,如包投递率(PDR)、丢包率(LPR)和平均端到端时延(average end to end)。
{"title":"Analysis of AOMDV, AODV, DSR, and DSDV Routing Protocols for Wireless Sensor Network","authors":"Bijan Paul, K. A. Bhuiyan, K. Fatema, P. Das","doi":"10.1109/CICN.2014.88","DOIUrl":"https://doi.org/10.1109/CICN.2014.88","url":null,"abstract":"In wireless sensor network (WSN), data collecting from the environment and sending that data to be processed and evaluated is the most important issues. Hence performance evaluation and comparison between routing protocols is required because performance of any routing protocol can be changed or very with various parameters such as speed, seed time, pause time, number of node, and traffic scenario (network topology). In this paper routing protocol AODV, AOMDV, DSR and DSDV has been analyzed by comparing the different performance matrices such as packet delivery ratio (PDR), loss packet ratio (LPR), and average end to end delay (Average End to End) with varying pause time and number of node under TCP & CBR connection via network simulator NS2.35 for wireless sensor network.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85080401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Estimating Time-of-Flight of Multi-superimposed Ultrasonic Echo Signal through Envelope 利用包络估计多重叠加超声回波信号的飞行时间
Zhenkun Lu
The accurate estimation of ultrasonic Time-Of-Flight (TOF) is essential in ultrasonic non-destructive testing (NDT). In this paper, a new method for TOF estimation through envelope is proposed. Firstly, the Hilbert transform (HT) is used in ultrasonic signal processing in order to extract the envelope of the echo and to reduce the computational burden. Then, the wavelet denoising technique is applied to the extracted noisy envelope to improve the estimation accuracy. Finally, the Space Alternating Generalized Expectation-Maximization (SAGE) algorithm is adopted to estimate the parameters of M-superimposed echoes. Numerical simulation and experimental results have been carried out to show the performances of the proposed method in estimating TOF of ultrasonic signal.
超声飞行时间(TOF)的准确估计在超声无损检测中至关重要。本文提出了一种利用包络估计TOF的新方法。首先,将希尔伯特变换(Hilbert transform, HT)应用于超声信号处理中,提取回波包络,减少计算量;然后,对提取的噪声包络进行小波去噪,提高估计精度。最后,采用空间交替广义期望最大化(SAGE)算法对m叠加回波参数进行估计。数值模拟和实验结果表明了该方法在估计超声信号TOF方面的有效性。
{"title":"Estimating Time-of-Flight of Multi-superimposed Ultrasonic Echo Signal through Envelope","authors":"Zhenkun Lu","doi":"10.1109/CICN.2014.74","DOIUrl":"https://doi.org/10.1109/CICN.2014.74","url":null,"abstract":"The accurate estimation of ultrasonic Time-Of-Flight (TOF) is essential in ultrasonic non-destructive testing (NDT). In this paper, a new method for TOF estimation through envelope is proposed. Firstly, the Hilbert transform (HT) is used in ultrasonic signal processing in order to extract the envelope of the echo and to reduce the computational burden. Then, the wavelet denoising technique is applied to the extracted noisy envelope to improve the estimation accuracy. Finally, the Space Alternating Generalized Expectation-Maximization (SAGE) algorithm is adopted to estimate the parameters of M-superimposed echoes. Numerical simulation and experimental results have been carried out to show the performances of the proposed method in estimating TOF of ultrasonic signal.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88430907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Study on the Evolution of Internet of Things Industry Chain Based on Synergy Theory 基于协同理论的物联网产业链演进研究
Shi-hai Tian, Lei Sun
To study the basis and power source of the evolution of IOT (Internet of Things) industry chain, according to the synergy theory, a co-evolution dynamic model which is multivariable and nonlinear is established by using gray system modeling method. It is approved that telecom operator is the order parameter of IOT industry chain, leading and dominating the whole industry chain's evolution. Furthermore, two kinds of co evolution modes in which telecom operators act as the kernel are proposed. It provides a theoretical basis for the IOT industry chain's both integration and upgrade.
为研究物联网产业链演化的基础和动力来源,根据协同理论,运用灰色系统建模方法,建立了多变量非线性的协同演化动态模型。电信运营商是物联网产业链的订单参数,主导和支配着整个产业链的演进。在此基础上,提出了以电信运营商为核心的两种协同进化模式。为物联网产业链的整合升级提供理论基础。
{"title":"Study on the Evolution of Internet of Things Industry Chain Based on Synergy Theory","authors":"Shi-hai Tian, Lei Sun","doi":"10.1109/CICN.2014.140","DOIUrl":"https://doi.org/10.1109/CICN.2014.140","url":null,"abstract":"To study the basis and power source of the evolution of IOT (Internet of Things) industry chain, according to the synergy theory, a co-evolution dynamic model which is multivariable and nonlinear is established by using gray system modeling method. It is approved that telecom operator is the order parameter of IOT industry chain, leading and dominating the whole industry chain's evolution. Furthermore, two kinds of co evolution modes in which telecom operators act as the kernel are proposed. It provides a theoretical basis for the IOT industry chain's both integration and upgrade.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90905524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
LVCMOS Based Thermal Aware Energy Efficient Vedic Multiplier Design on FPGA 基于LVCMOS的热感知节能吠陀乘法器的FPGA设计
Kavita Goswami, B. Pandey
In this work, we are integrating thermal aware design approach in energy efficient Vedic multiplier on FPGA. In the beginning of this universe, Veda describes heat receiving from the Sun god as Suryamrit (Surya i.e. Sun +Amrit i.e. Nectar= Suryamrit i.e. Nectar coming from the Sun God). Now, whole world is feeling anxious about temperature. How our thinking pattern is changing with evolution of mankind? This paper deals with that question and the whole work is going in direction to get solution of this problem with mechanism of ambient (room) temperature scaling and energy efficient LVCMOS I/O standard. LVCMOS is an acronym for low voltage complementary metal oxide semiconductor. In this Vedic multiplier, we are using three LVCMOS I/O standard. LVCMOS12 is available only in 65nm and 40nm FPGA. Rest LVCMOS18 and LVCMOS25 is available among 40nm, 65nm and 90nm FPGA. In order to test the thermal sustainability of our Vedic multiplier, we are testing it in three different room temperature 20°C, 30°C, and 40°C. Using LVCMOS25, there is 12.99%, 19.23% and 10.28% reduction in power dissipation on 90nm, 65nm and 40nm respectively. For LVCMOS25, when our Vedic multiplier design is migrated from 40nm design to 90nm design, there is 87.72% reduction in power dissipation of Vedic multiplier when temperature is constant 20°C.
在这项工作中,我们将热感知设计方法集成到FPGA上的节能吠陀乘法器中。在这个宇宙的开始,吠陀将从太阳神接收的热量描述为苏利亚利特(苏利亚即太阳+阿姆利特即甘露=苏利亚利特即来自太阳神的甘露)。现在,全世界都在为温度感到焦虑。我们的思维模式是如何随着人类的进化而变化的?本文对这一问题进行了研究,并从环境(室内)温度缩放机制和节能LVCMOS I/O标准出发,朝着解决这一问题的方向发展。LVCMOS是低压互补金属氧化物半导体的缩写。在这个吠陀乘法器中,我们使用了三个LVCMOS I/O标准。LVCMOS12仅适用于65nm和40nm FPGA。其余LVCMOS18和LVCMOS25可用于40nm, 65nm和90nm FPGA。为了测试我们的吠陀乘数器的热可持续性,我们在三种不同的室温下进行测试,分别是20°C、30°C和40°C。采用LVCMOS25, 90nm、65nm和40nm的功耗分别降低12.99%、19.23%和10.28%。对于LVCMOS25,当我们的吠陀倍增器设计从40nm设计迁移到90nm设计时,当温度恒定为20℃时,吠陀倍增器的功耗降低了87.72%。
{"title":"LVCMOS Based Thermal Aware Energy Efficient Vedic Multiplier Design on FPGA","authors":"Kavita Goswami, B. Pandey","doi":"10.1109/CICN.2014.194","DOIUrl":"https://doi.org/10.1109/CICN.2014.194","url":null,"abstract":"In this work, we are integrating thermal aware design approach in energy efficient Vedic multiplier on FPGA. In the beginning of this universe, Veda describes heat receiving from the Sun god as Suryamrit (Surya i.e. Sun +Amrit i.e. Nectar= Suryamrit i.e. Nectar coming from the Sun God). Now, whole world is feeling anxious about temperature. How our thinking pattern is changing with evolution of mankind? This paper deals with that question and the whole work is going in direction to get solution of this problem with mechanism of ambient (room) temperature scaling and energy efficient LVCMOS I/O standard. LVCMOS is an acronym for low voltage complementary metal oxide semiconductor. In this Vedic multiplier, we are using three LVCMOS I/O standard. LVCMOS12 is available only in 65nm and 40nm FPGA. Rest LVCMOS18 and LVCMOS25 is available among 40nm, 65nm and 90nm FPGA. In order to test the thermal sustainability of our Vedic multiplier, we are testing it in three different room temperature 20°C, 30°C, and 40°C. Using LVCMOS25, there is 12.99%, 19.23% and 10.28% reduction in power dissipation on 90nm, 65nm and 40nm respectively. For LVCMOS25, when our Vedic multiplier design is migrated from 40nm design to 90nm design, there is 87.72% reduction in power dissipation of Vedic multiplier when temperature is constant 20°C.","PeriodicalId":6487,"journal":{"name":"2014 International Conference on Computational Intelligence and Communication Networks","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90995549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
期刊
2014 International Conference on Computational Intelligence and Communication Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1