Series-1 (Jan. -Feb. 2020)Jan. -Feb. 2020 Issue Statistics
- Citation
- Abstract
- Reference
- Full PDF
- Index Page
- Cover Paper
ABSTRACT: Co-ordinate rotation Digital computer is the full form of CORDIC is the uncomplicated and structured algorithm to enumerate the problem defined functions such as real and complex multiplications, division, square root etc using simple addition, subtraction and operations like level shifters, hyperbolic and logarithmic functions, calculation of trigonometric. Rectangular to polar and polar to rectangular is an important operations in CORDIC which are generally used in ALUs, wireless communications, DSP processors etc. This type of conversion needs a hardware application of square root and arctangent circuits. The outcome of these applications gives complexity in hardware design, area and power consumption. The CORDIC algorithm is used to overcome these parameters. This paper proposes the experimental results based on various methodologies on design.
Keywords: CORDIC, FPGA, Standard cells, VLSI
[1]. Realization of Cordic Algorithm in DDS: Novel Approach towards Digital Modulators in MATLAB and VHDL, Miss. Prajakta J. Katkar, Dr.Yogesh S. Angal, Department of Electronics and Telecommunication JSPM's BSIOTR COE, Wagholi. Pune, India, 2015 International Conference on Information Processing (ICIP) Vishwakarma Institute of Technology. Dec 16-19, 2015.
[2]. VLSI Architecture Design and Implementation for Application Specific CORDIC Processor, Amritakar Mandal, K. C Tyagi, Brajesh Kumar Kaushik, 2010 International Conference on Advances in Recent Technologies in Communication and Computing.
[3]. VLSI implementation of synchronizer and pipelined CORDIC in OFDM receiver for fourth generation wireless LAN applications, Sudhakara Reddy Penubolu, Ramachandra Reddy Gudheti, 2011 IEEE 3rd International Conference on Communication Software and Networks.
[4]. FPGA Implementation and Power Efficient CORDIC based ADPLL for Signal Processing and Application, Akarshika Singhal, Anjana Goen, TanutrushnaMohapatra, Dept. of Electronics and Communication Engineering, Rustamji Institute of Technology, Gwalior, M.P., India, 2017 7th International Conference on Communication Systems and Network Technologies.
[5]. Real-time FPGA implementation of Hough Transform using gradient and CORDIC algorithm, Si Mahmoud Karabernou and Fayçal Terranti, Image and Vision Computing, Volume 23, Issue 11, 1 October 2005
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | HUB Floating-point Addition Using Unbiased Rounding |
Country | : | India |
Authors | : | Akbar Shaik || Dr.SK.Fairooz |
: | 10.9790/4200-10010914 |
ABSTRACT: Half-unit-biased (HUB) is a new design that is based on the displacement of the digits represented by half the unit last performed. This arrangement makes the two's complement and round operations closest by avoiding any carry propagation. This saves energy, time and area consumption. Given that the IEEE floating point standard uses unbiased rounding as the default mode, this feature is also desirable for HUB approaches. In this article, we study unbiased rounding for HUB floating point addition both within independent operation and within FMA. We show two different options to eliminate bias by eliminating the sum results either partially or completely. Implementation results of the proposed architecture to help designers decide what their best option.
Keywords: HUB format, unbiased rounding, Floating point , IEEE.
[1]. E. Alpaydin, Machine learning : the new AI, 2016.
[2]. M. Kubat, An Introduction to Machine Learning, 2015, no. August.
[3]. J. A. Stankovic, "Research directions for the internet of things," IEEE Internet of Things Journal, vol. 1, no. 1, pp. 3–9, Feb 2014.
[4]. F. K. Shaikh, S. Zeadally, and E. Exposito, "Enabling technologies for green Internet of Things," IEEE Systems Journal, vol. PP, no. 99, pp. 983–994, Jun 2015.
[5]. R. Murphy, T. Sterling, and C. Dekate, "Advanced architectures and execution models to support green computing," Computing in Science and Engineering, vol. 12, no. 6, pp. 38–47, Nov 2010.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Adaptive Differential Pulse Code Modulation using speech compression algorithm |
Country | : | India |
Authors | : | J. Venkateswara Rao |
: | 10.9790/4200-10011519 |
ABSTRACT: The aim of this project, was to compress audio data in such a way so that the quality was preserved but was given at a lower bit rate, utilizing a PIC32 microcontroller. The speech compression algorithm used is known as adaptive differential pulse code modulation or ADPCM. The ADPCM algorithm can be broken down into two major components, the encoding process and the decoding process. In an effort to give audio capabilities to a microcontroller, a C implementation of a simplified ADPCM algorithm was developed and programmed onto the PIC32. During the testing phase, the C implementation for the PIC32 was compared to a working MATLAB implementation......
Key Word: Digital Signal Processing, Adaptive Pulse Code Modulation, Microcontroller
[1]. https://www.mathworks.com/matlabcentral/fileexchange/6480-adpcm-encoder-and-decoder?focused=5056015&tab=function
[2]. Adaptive differential pulse-code modulation http://en.wikipedia.org/wiki/Adaptive_differential_pulsecode_modulation
[3]. Pulse-code modulation http://en.wikipedia.org/wiki/Pulse-code_modulation
[4]. DPCM https://supportforums.cisco.com/docs/DOC-1423 [4] AVR336: ADPCM Decoder http://atmel.com/dyn/resources/prod_documents/doc2572.pdf
[5]. Using the ADPCM Algorithm in Dialogic® Voice Processing http://www.dialogic.com/~/media/products/docs/appnotes/10532_Dialog ic _ADPCM_Algorithm_an.pdf
[6]. Palnitkar, S. (2006). A Guide to Digital Design and Synthesis (2nd ed). India: Dorling Kindersley Pvt. Ltd.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Indexing Images Using AMR for Efficient Storing And Retrieval |
Country | : | India |
Authors | : | M.Anandha Kumar || Prof. M. Shanmuga Priya |
: | 10.9790/4200-10012028 |
ABSTRACT: In-memory memory mechanisms become the new trend for multiple high-performance systems such as Database and Real-time processing systems. With the proliferation of social networks and mobile multimedia applications, Approximate Nearest Neighbor (ANN) search has become even more demanding as it needs to maintain high search accuracy over a massive amount of multimedia content. To achieve a high search accuracy, ANN search framework focus on two main process: i) the efficient index/storage ii) the similarity search. An approximate media storm indexing mechanism was introduced to handle fast incoming images. This mechanism indexes the new....
Keywords: ANN, Multimedia Content, Indexing Mechanism, Map-Reduce Framework, Query based Image Retrieval.
[1]. H. Zhang, G. Chen, B. C. Ooi, K. Tan, and M. Zhang, "In-memory big data management and processing: A survey," IEEE Transition Knowledge Data Eng., vol. 27, no. 7, pp. 1920–1948, 2015.
[2]. R. Want, B. N. Schilit, and S. Jenson, "Enabling the internet of things," IEEE Computer, no. 1, pp. 28–35, 2015.
[3]. D. Moise, D. Shestakov, G. T. Gudmundsson, and L. Amsaleg,"Terabyte-scale image similarity search: Experience and best practice,"in Proceedings IEEE International Conference on Big Data, 2013,pp. 674–682.
[4]. M. Muja and D. G. Lowe, "Scalable nearest neighbour algorithmsfor high dimensional data," IEEE Transactions on Pattern Analysisand Machine Intelligence, vol. 36, no. 11, pp. 2227–2240, 2014.
[5]. S. Antaris and D. Rafailidis, "Similarity search over the cloud based on image descriptors‟ dimensions value cardinalities," IEEE Transactions on Multimedia Computing, Communications and Applications,vol. 11, no. 4, p. 51, 2015
- Citation
- Abstract
- Reference
- Full PDF
ABSTRACT: The proposed T shaped resonator structure can be used as the building block of improved design filters with tunable operating frequency. Micro strip antenna is an electrical antenna which consists of a metallic patch on a grounded substrate. To minimize the interference with using tunable notch bands. Micro strip antennas were primarily used for space borne applications which uses frequencies of the microwave range. The main intention of this project is to design and characterize Rectangular Microstrip patch antenna to operate with UHF-band frequency of 240MHz. In this development, a Rectangular Micro strip antenna resonating at 240MHz frequency has been designed and characterized using HFSS(High Frequency Structural Simulator) software. The parameters of the antenna in the element of the bandwidth, radiation pattern, and return loss have been found out using the HFSS software. The specific frequency chosen here is used for space communications, radar applications, amateur radio, other terrestrial communications and networking.
Key Word: Circular polarized, Patch antenna, UHF satcom, HFSS
[1]. Federal Communications Commission, Washington, DC, USA, "Federal Communications Commission revision of Part 15 of the commission's rules regarding ultra-wideband transmission system from 3.1 to 10.6 MHz," 2002.
[2]. J. Kim, C. S. Cho, and J.W. Lee, "5.2 MHz notched ultra-wideband antenna using slot-type SRR," Electron. Lett., vol. 42, no. 6, pp. 315–316, Mar. 2006.
[3]. Q. X. Chu and Y. Y. Yang, "A compact ultra wideband antenna with 3.4/5.5 MHz dual band-notched characteristics," IEEE Trans. Antennas Propag., vol. 56, no. 12, pp. 3637–3644, Dec. 2008.
[4]. H. Zhang, R. Zhou, Z.Wu, H. Xin, and R. W. Ziolkowski, "Designs of ultra wideband (UWB) printed elliptical monopole antennas with slots," Microw. Opt. Technol. Lett., vol. 52, no. 2, pp. 466–471, Feb. 2010.
[5]. D. Sarkar and K. V. Srivastava, "SRR-loaded antipodal Vivaldi antenna for UWB applications with tunable notch function," in Proc. URSI Commission B EMTS, Hiroshima, Japan, 2013, pp. 466–469.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Analysis Of Distributed Denial Of Service Defense Mechanisms |
Country | : | India |
Authors | : | J. Britto Dennis || Dr.M.Shanmuga priya |
: | 10.9790/4200-10013543 |
ABSTRACT: Denial of Service (DoS) and Distributed Denial Service (DDoS) attacks are a large scale and coordinated attack on availability of a network resource or a victim system. Researchers have come up with more suitable solutions to the DoS and DDoS problems. However, attackers are enriching their capability of DoS attacks and develop the new attacks. This paper lays down the survey of DoS attacks and its different countermeasures that are available in the literature. We discuss and analyze these real time attacks based on the solitude mechanism used, methods, ease of deployment and the network overhead involved. Our onerous survey study presented in this paper provides a platform for the study of evolution of DDoS attacks and their defense mechanisms moreover, a proposed method for avoiding DDoS attacks is also included in this summary.
Key Word: Firewall, DDoS attack, Ingress monitoring, CAPTCHA, Puzzle, Countermeasure
[1]. Mary L.Bailey, Burra Gopal, Michael A. Pagels, Larry L.Peterson, Prasenjit Sarkar,"TCP SYN Flooding Attack and the FireWall- SYNDefender" 1996.
[2]. Van c Van, "A Defense against address spoofing using Active Networks" IEEE/ACM Transactions on Networking, 1997.
[3]. P.Ferguson and D.Senie, "RFC 2267: Network Ingress Filtering: Defeating Denial of Service Attacks Which Employ IP Source Address Spoofing," ftp://ftp.internic.net/rfc/rfc2267.txt, Jan 1998.
[4]. Oliver Spats check, Larry L. Peterson, "Defending against Denial of Service Attacks in Scout" Proc of the 3rd Symposium on OS Design and Implementation, Feb 1999.
[5]. Robert Stone, "Center Track: An IP Overlay Network for Tracking DoS Floods" 9th USENIX Security Symposium, Aug 2000
[6]. Gitae Kim and Tony Bogovic, "Active Ingress Monitoring (AIM): An Intrusion Isolation Scheme in Active Networks", 2001.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Multilayered Information Security in Quantum Image |
Country | : | India |
Authors | : | Kalaiarasi G || StanelyKarunakaran W |
: | 10.9790/4200-10014448 |
ABSTRACT: The internet users are regularly increasing day by day. After the launching of the 4G or IMT-Advanced services, communication over internet increased drastically. People across all the communities like social, economic, business, financial, etc. are doing communication or exchanging their valued documents over internet. The demand for securing the data in efficient way has been increased. As, cryptography is the best way to secure the communication. This work implements the chaotic algorithm which guarantees the security of the information. The proposed encryption/decryption algorithm is devised based on NEQR quantum image representation. Simulation analysis shows that the proposed quantum image encryption approach is robust, realizable, and has high efficiency compared with its classical counterpart.
Key Word: chaotic systems, cryptography, Quantum Image, Qubits, NEQR
[1]. B. Sun et al., ``A multi-channel representation for images on quantum computers using the RGBacolor space,'' in Proc. IEEE 7th Int. Symp.Intell. Signal Process., Sep. 2011, pp. 1_6.
[2]. C. E. Shannon," Communication theory of secrecy systems", Bell Labs Tech. J., vol. 28, no. 4, pp. 656_715, Oct. 1949.
[3]. D. Deutsch, ``Quantum theory, the Church_Turing principle and the universal quantum computer,'' Proc. R. Soc. Lond. A, Math. Phys. Sci., vol. 400, no. 1818, pp. 97_117, 1985.
[4]. E. AVAROĞLU , "Pseudo Random Number Generator Based on Arnold's Cat Map and Statistical Analysis," Turkey, 2011.
[5]. J. I. Latorre. (2005). ``Image compression and entanglement.'' [Online]. Available: https://arxiv.org/abs/quant-ph/0510031