Series-1 (May - Jun. 2024)May - Jun. 2024 Issue Statistics
- Citation
- Abstract
- Reference
- Full PDF
- Index Page
- Cover Paper
ABSTRACT: The multiplication is one of the most important arithmetic function in Digital signal processing, ALU and various communication systems. The Multiplication method require more hardware resources and more time than other arithmetic and logical circuits such as Addition, Subtraction etc. But the need for fast computation along with low on chip area and the low power dissipation is increased in recent times. In recent years....
Keywords: Vedic Multiplier, 180 nm, Cadence Virtuoso, Transistor count
[1]
M. Durga Madhuri, G. Sweta Sree, D. Raghunadh, G. Panduranga Vittal,And Ch.Suryanarayana5. Implementation Of High Speed Vedic Multiplier. International Journal Of Innovative Science And Research Technology, 2, 2017.
[2]
Ahsan Rafiq, Shabbir Majeed Chaudhry, Kamran Sadiq Awan And Muhammad Usman. An Efficient Architecture Of Modified Booth Multiplier Using Hybrid Adder. In 2021 International Bhurban Conference On Applied Sciences And Technologies (Ib- Cast), Pages 648–656, 2021.
[3]
J. Jayakumar. Design Of Low Power Multiplier Using Cadence Tool. International Journal For Technological Research In Engineering, Volume 3, March-2016.
[4]
V. Rajmohan And O. Uma Maheswari. Low Power Modified Wallace Tree Multiplier Using Cadence Tool. World Engineering& Applied Sciences Journal, L 7, 2016.
[5]
Er. Harjinder Singh, Er. Mandeep Sing And Er. Gaurav Mittal . Design Of Low Power Vedic Multiplier By Using 180nm Technology. Internatonal Journal Of Innovative Research In Technology, 1:25–31, 2014.
- Citation
- Abstract
- Reference
- Full PDF
ABSTRACT: Securing online transactions through the implementation of Multi-Factor Authentication (MFA) is a paramount concern in an organization or business enterprise's. The research reviews, understanding, emphasized and applying different MFA types, such as knowledge factors (something you know), possession factors (something you have), and inherence factors (something you are), to fortify online financial security within Abakaliki metropolis of Ebony State- Nigeria.. It also addressed regulatory and compliance considerations related to MFA across various industries, providing a clear view of the subject with the area under study. The research depicts a comprehensive understanding of how to enhance online transaction security using Multi-Factor Authentication within Abakaliki Metropolitan area of Ebonyi State- Nigeria.
Keywords: Multi-factor, Authentication, Online, Transaction, Ebonyi-State
[1]. Aloul, F. (2012). Two Factor Authentication Using Mobile Phones. 2012 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA).
[2]. Bonneau, J.; Herley, C.; Van Oorschot, P.C.; Stajano, F. Passwords and the Evolution of Imperfect Authentication. Commun. ACM 2015, 58, 78–87. [Google Scholar] [CrossRef]
[3]. Dimitrios C. Tselios, Ilias K. Savvas and M-Tahar Kechadi (2016). International Journal of Monitoring and Surveillance Technologies Research (pp. 42-61).
[4]. Florencio, D., & Herley, C. (2007). A Large-Scale Study of Web Password Habits. Proceedings of the 16th International Conference on World Wide Web.
[5]. Gunson, N.; Marshall, D.; Morton, H.; Jack, M. User Perceptions of Security and Usability of Single-Factor and Two-Factor Authentication in Automated Telephone Banking. Comput. Secur. 2011, 30, 208–220. [Google Scholar] [CrossRef].
- Citation
- Abstract
- Reference
- Full PDF
ABSTRACT: Irregular heartbeats due to abnormal electrical heart activity are symptom of Cardiovascular disease (CVD), it is a source of stroke, blood clots, heart failure and other heart-related complications. Most of the developed Electrocardiogram (ECG) based automatic cardiac arrhythmia detection systems require the availability of a large data with all arrhythmias for the training process, and cannot be updated without adequate data and cost. Therefore, this paper aims to develop a continual learning method by introducing incrementally new arrhythmias.....
Keywords: Electrocardiogram classification; continual learning; catastrophic forgetting; generative model, contrastive learning.
[1]. A. Sahu, H. GM, M. K. Gourisaria, S. S. Rautaray, and M. Pandey, "Cardiovascular risk assessment using data mining inferencing and feature engineering techniques," International Journal of Information Technology, vol. 13, no. 5, pp. 2011–2023, 2021.
[2]. American Heart Association, "Heart disease, stroke and research statistics at-a-glance," Retrieved on April, vol. 1, p. 2016, 2016.
[3]. S. Mendis, P. Puska, B. Norrving, and World Health Organization, Global atlas on cardiovascular disease prevention and control. World Health Organization, 2011.
[4]. R. Mehra, "Global public health problem of sudden cardiac death," Journal of electrocardiology, vol. 40, no. 6, pp. S118–S122, 2007.
[5]. C. Ye, M. T. Coimbra, and B. V. Kumar, "Arrhythmia detection and classification using morphological and dynamic features of ECG signals," 2010, pp. 1918–1921..
- Citation
- Abstract
- Reference
- Full PDF
ABSTRACT: The Serial Peripheral Interface (SPI) and Inter-Integrated Circuit (I2C) protocols are widely used for communication between microcontrollers, sensors, and other digital devices. The correctness and reliability of these protocols are essential for proper system functioning. Therefore, it is necessary to verify these protocols thoroughly to ensure that they are error-free. In this paper, a novel verification environment is proposed for the verification of SPI and I2C protocols using SystemVerilog. Since....
Key Word: Code coverage; functional coverage; SPI; I2C; System Verilog
[1]. Chetan N, and R. Krishna, "Verification of SPI protocol Single Master Multiple Slaves using System verilog and Universal Verification Methodology (UVM)", International Journal of Engineering Research and Applications, Vol. 11, Issue 7, July 2021.
[2]. Ananthula Srinivas, M.Kiran Kumar, and Jugal Kishore Bhandari., Design and Verification of Serial Peripheral Interface", International Journal of Engineering development and Research, Vol. 1, Issue 3, Dec. 2014, pp. 130 -136.
[3]. System Verilog Tutorial: https://www.chipverify.com/systemverilog/systemverilog tutorial[4]. F.Leens, "An Introduction to I2C and SPI Protocols," IEEE Instrumentation & Measurement Magazine, pp. 8-13, February 2009, DOI: 10.1109/MIM.2009.4762946
[5]. M.Sukhanya, and K.Gavaskar, "Functional Verification Environment for I2C Master Controller using System Verilog", 2017 4th International Conference on Signal Processing, Communications and Networking (ICSCN - 2017), March 16 – 18, 2017, Chennai, INDIA, DOI: 10.1109/ICSCN.2017.8085732.
- Citation
- Abstract
- Reference
- Full PDF
ABSTRACT: The RAW (Restricted Access Window) component of the IoT network is deployed to reduce traffic and channel contention in dense and heterogeneous sensor network environment. It divides sensor nodes into groups and slots, allowing channel access only to one RAW slot at a time. Several algorithms and improved channel utilization optimization models have been proposed to optimize the RAW parameters, to ensure a contention free network or....
KEYWORDS: Resource allocation, station, network, nodes, simulation
[1]. Tian, L., Famaey, J., &Latre, S, "Evaluation of the IEEE 802.11ah Restricted Access Window mechanism for dense IoT networks", IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM), PP-1-10, 2016.
[2]. Slaoui, S. C., Dafir, Z., &Lamari, Y. (2018). E-Transitive: an enhanced version of the Transitive heuristic for clustering categorical data. Procedia Computer Science, 127, 26–34.
[3]. Gohar, A., Kyong H.K., & Ki-II, K. (2002). Adaptive TDMA Scheduling for Real-Time Flows in Cluster-Based Wireless Sensor Networks. Computer Science and Information System 13(2):475-492.
[4]. U., S., & A. V., B. (2018). Performance analysis of IEEE 802.11ah wireless local area network under the restricted access window-based mechanism. International Journal of Communication Systems, e3888
[5]. Michael Collins (2015). The Forward-Backward Algorithm. International Journal of Communication System, Volume 32, Issue 7, PP-1-20, 2019