Manuscripts

Recent Papers

Design of Aging Aware Reliable Multiplier Using Mixed Bypassing Technique

Digital multipliers have many numbers of DSP applications. The overall performance leans on the output of the multiplier. When we apply a negative bias to the PMOS transistor, there occurs temperature instability. The minimum voltage at which the PMOS transistor is ON will be increased whereas it decreases the multiplier speed. Similarly, if we apply a positive bias to the NMOS transistor, temperature instability occurs.This degrades the transistors speed and the system fails because there is a violation in time. There exists an aging-aware multiplier with adaptive hold logic (AHL) circuit. This circuit provides higher throughput through the variable latency. In the existing method, Row or Column bypassing is done to reduce the aging effect. Our desired structure is that we are bypassing column and row together so that the throughput can be increased. We are implementing our advanced design in real time applications like FIR filters.

Published by: Gowthami .G, S. Suganya, Karthika .G, Deepika .D, Indhumathi .N

Author: Gowthami .G

Paper ID: V3I2-1200

Paper Status: published

Published: March 10, 2017

Full Details

Analysis and Improved Performance of ANN Based Chaotic Generator

The main objective of this research paper is to analysis on the improved performance of ANN based chaotic generator. We are analyzing the performance of chaotic generator model during encryption and description and produced outcomes compare with earlier published work scenario. In this work Encryption and decryption of binary value has been completed by the same value. Chaotic neural network algorithm used for producing the random chaotic sequence.[1][2] Produced random chaotic sequence value is the encrypted binary ASCII values of A to Z sequence of original ASCII Code binary value, with a same initial parameter. This paper provides a review on the use of improved the performance of ANN based chaotic generator and provides high range of security in the field of cryptography.

Published by: Sona Mishra, Amit Mishra

Author: Sona Mishra

Paper ID: V3I2-1199

Paper Status: published

Published: March 10, 2017

Full Details

Design & Optimization of Finfet Based Schmitt Trigger Using Leakage Reduction Techniques

In this proposed work we are applying valuable power gating schemes to FinFET based Schmitt trigger to enhance its performance by reducing the leakage current in standby mode (off-state mode). The power gating schemes like Sleep Transistor approach and Multi-Threshold CMOS (MTCMOS) and Double-Threshold CMOS(DTCMOS) have been analysed and simulated which shows the tremendous reduction in the leakage current thus increasing the stability of the design. In this paper, different consecutive designs of PULL-UP and PULL-DOWN networks of NMOS and PMOS are applied to FinFET based Schmitt trigger one after another. Due to this treatment of PULL-UP and PULL-DOWN network, controlled voltage supply is obtained and the current driving capability of the design is increased, the hence less Gate leakage current is formed. This provides the motivation to explore the design of low leakage FinFET based Schmitt trigger. Simulation is performed on the cadence virtuoso tool in 45nm technology and simulation results revealed that there is a significant reduction in leakage current for this proposed design.

Published by: Priyadharshini .M, Anitha .R, Saranya .P, Sindhu .M, Sindhu .K

Author: Priyadharshini .M

Paper ID: V3I2-1198

Paper Status: published

Published: March 10, 2017

Full Details

Automated Diagnosis of Heart Disease using Random Forest Algorithm

The accurate diagnosis of heart diseases, is one of the most important biomedical problems whose administration is imperative. In the proposed work, decision support system is made by three data mining techniques namely Classical Random Forest, Modified Random Forest and Weighted Random Forest. The classical random forests construct a collection of trees. In Modified Random Forest, the tree is constructed dynamically with an online fitting procedure. A random forest is a substantial modification of bagging. Forest construction is based on three step process . 1. Forest construction 2. The polynomial fitting procedure 3.The termination criterion In Weighted Random Forest, The Attribute Weighting Method is used for improving Accuracy of Modified Random Forest. There are Two Techniques are Used in Attribute Weighting: 1. Averaged One-Dependence Estimators (AODE) 2. Decision Tree-based Attribute Weighted Averaged One-dependence Estimator( DTWAODE).

Published by: Priya Rajendra Patil, S. A Kinariwala

Author: Priya Rajendra Patil

Paper ID: V3I2-1197

Paper Status: published

Published: March 9, 2017

Full Details

Privacy Preserving and Secure Data Integrity Protection Security in Regenerating Coding Based Public Cloud Storage

Now a day’s use of cloud computing is rapidly increasing. Cloud infrastructure is being a common solution adopted by large organizations for storing and accessing data. It provides the current need for data storage with a flexible and dynamic storage that can grow. In this paper, we describe the design and development of a cloud computing based secure cloud data storage using encryption. Cloud data storage is a major solution to overcome this problem. These mechanisms to provide data integrity and security for client’s data in cloud storages. In users should be able to just use the cloud storage as if it is local, without worrying about the need to verify its integrity. This understands the trend in terms of complexity and strength of a secured solution and provides some insights of what is still left in such area of research. Cloud data storage provide better privacy as well as ensure data availability and reliability can be achieved by dividing the user’s data block into data pieces. Cloud storage is of critical importance so that users can resort to a third party auditor (TPA) to check the integrity of outsourced data and be worry-free.

Published by: Monika B. Thakare, N. M Dhande

Author: Monika B. Thakare

Paper ID: V3I2-1196

Paper Status: published

Published: March 9, 2017

Full Details

Self Operated Petrol Pump

In current days fuel stations are operated manually. These fuel pumps are time-consuming and require more manpower. To place fuel stations in distant area it very costly to provide excellent facility to the consumers all these problem are sorted out by the use of unmanned petrol pump which requires less time to operate and it is effective and can be installed anywhere the customer self-going to avail the services the payment is done by electronic clearing system. The simple and proper use of microcontroller and GSM technology provides a total security and atomization in the distribution of fuel. It has easy operated mobile phone system and graphics user interface (GUI). It interfaces with high-speed fuel dispenser which is convenient for the consumer to operate. In our system the password will be provided to the user and customer has to enter this password on the LCD provided by the fuel station which will help the petrol company to create authentication for the user also the distribution of the fuel is not possible until it gets verified by the database. In short, we provide a secure system for fuel distribution. The advancement of this project can help industry financially.

Published by: Pooja Ashok Dalavi, C. R. Dongarsane, Sunaina Golandag, Snehal Powar

Author: Pooja Ashok Dalavi

Paper ID: V3I2-1194

Paper Status: published

Published: March 9, 2017

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X