Version-2 (July-August 2017)
Version-1 Version-2 Version-3 Version-4 Version-5
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Breast cancer is one of the most common cancers worldwide. In developed countries, among one in eight women develop breast cancer at some stage of their life. Early diagnosis of breast cancer plays a very important role in treatment of the disease. With the goal of identifying genes that are more correlated with the prognosis of breast cancer. An algorithm based on Trapezoidal and Rayleigh distributions. property is used for the detection of the cancer tumors. Fuzzy logic and markov random fields work in real time. We also try to show its performance by comparing it with the existing real time algorithm that uses only markov random fields. This is not only suitable for the detection of the tumors, but also suitable for various general applications like in the detection of object in an image etc
Keywords: Tumors, Rayleigh distribution texture, Segmentation, Fuzzy Logic.
[1] Mohammad Aslam. C, Dr. Satya Narayana. D, Dr. Padma Priya. K, Segmentation of RumexObtusifolius using Simple Trapezoidal and Rayleigh distributions., Unpublished.
[2] Ajay NageshBasavanhally, ShridarGanesan, Shannon Agner, James Peter Monaco, Michael D. Feldman, John E. Tomaszewski, GyanBhanot and AnantMadabhushi, Computerized Image-Based Detection and Grading of Lymphocytic Infiltration in HER2+ Breast Cancer Histopathology, IEEE Transactions on Biomedical Engineering, vol. 57, no. 3, pp.642-653, march 2010.
[3] O.P.Verma, Vein Jain and RajiniGumber, Simple Fuzzy Rule Based Edge Detection, J Inf Process Syst, Vol.9, No.4, pp.575-591, December 2013.
[4] Santosh Hiremath, Valentyn A. Tolpekin, Gerie van der Heijden, Alfred Stein, Segmentation of Rumex obtusifoliususing Gaussian Markov random fields, Machine Vision and Applications (2013) 24:845–854, Springer.
[5] Jung LengFoo, GoMiyano, ThomLobe, EliotWiner,Tumor segmentation from computed tomography image data using a probabilistic pixel selection approach, Computers in Biology and Medicine 41 (2011) 56–65, ELSEVIER
- Citation
- Abstract
- Reference
- Full PDF
Abstract: The wireless communication has experienced phenomenal growth over the past decades, especially in the areas of mobile ad-hoc network (MANET) and in wireless sensor network (WSN). WSN is broadly used in the field of environmental monitoring, industrial process monitoring and tactical systems. So, the security and the efficiency of the network are the major concern in the wireless communication. The attack occurs during interaction between the trading peers as a transaction takes place. In this paper we develop an energy efficient and secure scheme against malicious attacks..........
Keywords: GI, Malicious Node, MANET, NS-2, Wireless Communication, WSN.
[1] A. Perrig, R. Szewczyk, J. Tygar, V. Wen and D. Culler, "SPINS: Security Protocols for Sensor Networks," Wireless Networks, Volume 8, Issue 5, pp. 521-534, 2002.
[2] C. Karlof and D. Wagner, "Secure routing in wireless sensor networks: attacks and countermeasures," Ad Hoc Networks, Volume 1, Issue 2-3, pp. 293-315, 2003.
[3] A. Abduvaliev, S. Lee and Y.-K. Lee, "Simple hash based message authentication scheme for wireless sensor networks," in 9th International Symposium on Communications and Information Technology, ISCIT 2009, Icheon, South Korea, 2009.
[4] Technical Report of Univ of Massachussets Amherst 2006–052: BN LevineC. ShieldsBN Margolin2006A survey of solutions to the sybil attack.Technical Report of Univ of Massachussets Amherst2006–052.
[5] N. Sastry and D. Wagner, "Security considerations for IEEE 802.15.4 networks," in Proceedings of the 2004 ACM workshop on Wireless security - WiSe '04, Philadelphia, PA, USA, 2004
- Citation
- Abstract
- Reference
- Full PDF
Abstract: The importance of WSN as a enabling technology for the future development of IOT has been widely accepted. IOT is a culmination of physical world with the cyber world. A lot of literature in the recent past have optimized the performance of WSN in terms of energy conservation, energy harvesting, path and latency optimization. The major work in the WSN related to MAC and network layer issues. In order to take the advantage of WSN, to create a robust IOT infrastructure routing protocols in the wsn need to be revisited. So in this paper, the cluster-based routing protocols that appear to be applicable...........
[1] Davood Izadi, Jemal Abawajay, and Sara Ghanavati, "alternative clustering scheme in WSN", IEEE Sensors Journal, vol.15,no. 7,
JULY 2015.
[2] Ebin Deni Raj, "An efficient cluster head selection Algorithm for WSN-EDRLEACH", In IOSRJCE, vol. 2, pp. 39-44, 2012.
[3] Simrandeep Kaur, V.Sulochna Verma, "Design and Implementation of RLE Data compression", In IJIST, vol. 2, no. 4, 2012.
[4] Ankit Tripathi, Sanjeev Gupta, Bharti Chourasiya, "Survey on Data Aggregation Techniques in WSN", International Journal of
Advanced Research in Computer and Communication Engineering, vol. 3, issue 7, JULY 2014.
[5] G.Nivetha, "Energy Optimization Routing Techniques in WSN", In IJARCSSE, vol. 2, issue 7, JULY 2012..
- Citation
- Abstract
- Reference
- Full PDF
Abstract: As internet is in enormous demand and it acts as a repository for the data and knowledge, there is unremitting demand for real time implementation of cryptographic algorithms so that one can secure its data over this decentralized network and help in preserving the security of the system. Blowfish is a symmetric key cryptographic algorithm. It is a Feistel network, iterating a simple encryption function 16 times. The block size is 64 bits, and the key can be any length up to 448 bits...........
Keywords: cryptography, Xtea, Blowfish, LFSR, FPGA
[1] Thomas Eisenbarth, Sandeep Kumar,ChristofPaar and Axel Poschmann and Leif Uhsadel " A Survey of Lightweight-Cryptography Implementations" IEEE Design & Test of Computers-November–December 2007.
[2] KiranKumar.V.G, SudeshJeevanMascarenhas, and Sanath Kumar published article "Design And Implementation Of Tiny Encryption Algorithm" et al. Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622,Vol. 5, Issue 6, ( Part -2) June 2015, pp.94-97
[3] Rashikohili and manojkumar is presented article "FPGA Implementation of Cryptographic Algorithms using Multi-Encryption Technique" International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 5, May 2013
[4] ManjuSuresh Neema M published an article "Hardware implementation of blowfish algorithm for the secure data transmission in Internet of Things", Global Colloquium in Recent Advancement and Effectual Researches in Engineering, Science and Technology (RAEREST 2016)
[5] Niladree De, JaydebBhaumik presented article "A Modified XTEA" International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-2, Issue-2, May 2012.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Viterbi decoders are widely used in digital communication which dissipates huge quantity of power. High speed and low power of system can be achieved by applying asynchronous technique to the digital system. In this work we have designed VD with 4-state, 1/2-code rate synchronous and asynchronous Viterbi decoder. Dynamic power can be lower by reducing switching activity and this is occurring due to designing VD from Hybrid Register Exchange Method. Soft decision decoding technique is being used since it can correct more number of errors than hard decision. Results shows that the...........
Keywords: Viterbi Algorithm (VA), Viterbi decoder (VD), Branch Metric Unit (BMU), Add-Compare- Select (ACS), State Metric Unit (SMU), Hybrid Register Exchange Method (HREM)..
[1] Mohamed Kawokgy C. André T. Salama, "Low-Power Asynchronous Viterbi Decoder for Wireless Applications", ISLPED? 2004, August 9-11, 2004, Newport Beach, California, USA.
[2] Matheus Trevisan Moreira and Ney Laert Vilar Calazans, "Proposal of an Exploration of Asynchronous Circuits Templates and their Applications", TECHNICAL REPORT SERIES, Number 077, March, 2014, http://www.inf.pucrs.br.
[3] Dr H. Meliani, A. Guellal, "Comparison Between Viterbi Algorithm Soft and Hard Decision Decoding".
[4] Johanna Tuominen, Juha Plosila, "Asynchronous Viterbi Decoder in Action Systems", TUCS Technical Report No 710, September 2005.
[5] S. L. Haridas and Dr. N. K. Choudhari.2010 "A low power Viterbi decoder design with minimum transition hybrid register exchange processing for wireless applications". International journal of VLSI design & Communication Systems (VLSICS) Vol.1, No.4, December 2010..
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Antenna array is significant to achieve high gain and directivity. 22-Element planar phased array is designed in this paper to increase gain. The existed methodology to design broadband planar phased array like current sheet array technique has drawbacks of high VSWR and low gain. Impedance matching is also a challenging constraint with respect to array. In this paper, we attempted to solve all these problems and to increase gain over a frequency range of 4 – 20 GHz............
Keywords: Antenna array, Printed Dipole Antenna, VSWR, Coaxial cable, Antenna Gain.
[1] Seetaiah Kilaru, Y V Narayana and Gandhiraja R.Energy efficiency in Cognitive Radio Network: Green Technology towards next generation networks. Springer Microelectronics, Electromagnetics and Telecommunications, pp 305-313, 2016. DOI: 10.1007/978-81-322-2728-1_27
[2] Kilaru, Seetaiah, and Y. Ashwini Prasad. "K Sai kiran." NV Sarath Chandra "Design and Analysis of Heterogenious networks" International Journal of Applied Engineering Research (IJAER), ISSN: 0973-4562.
[3] Seetaiah kilaru . " Public Safety Communication using Relay node in LTE- Advanced Technology ", International Journal of Engineering Research & Technology (IJERT) , ISSN: 2278-0181 , Vol 2(11), 2013, www.ijert.org, pp 1767-1772
[4] Kilaru, Seetaiah, and Aditya Gali. "Improving Quality of Service of Femto Cell Using Optimum Location Identification." International Journal of Computer Network and Information Security(IJCNIS) 7.10 (2015): 35-43. DOI: 10.5815/ijcnis.2015.10.04
[5] Kilaru, Seetaiah. "Ability of OFDMA in Handling Interference of Femto Cells Under Random Access Process." Journal of Engineering Science and Technology Review 7.2 (2014): 133-136 .
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Review on Various types of Microstrip Antennas for Wireless Communication |
Country | : | India |
Authors | : | Y.Aruna || E.Kavitha |
: | 10.9790/2834-1204023642 |
Abstract: Innovation of new types of antennas that is smart antennas (adaptive array antenna or multiple antenna) plays very important role in recent trends. Antenna is the major part in wireless communication systems. Antenna is the transition region between transmitter and freespace or viceversa. Antennas are used to transform electromagnetic energy in Omni direction or in point to point communication. In this paper we present the study of different types of Microstrip patch antenna and...........
Keywords: Microstrip antenna, types of antennas in wireless communications
[1] "Various Types of Antenna with Respect to their Applications: A Review", International journal of multidisciplinary sciences and engineering ,vol.7,no.3,march 2016.
[2] Antennas and wave propagation by John D Kraus and K.D Prasad.
[3] "Microstrip Antenna" by Anuj Mehta International Journal of Science and Technology Reaserch Volume 4, Issue 03, March 2015
[4] M. T. Islam, M. N. Shakib, and N. Misran, "Multi-slotted microstrip patch antenna for wireless communication," Progress In Electromagnetics Research Letters, Vol. 10, 11-18, 2009.
[5] "A Spirally slotted Microstrip antenna with improved bandwidth for lower C-band applications", International Journal of Advances in Engineering Science and Technology, ISSN 2319-1120.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: In recent years, one of the primary reasons that intruders can be successful is that most of the information they acquire from a system is in the form they can read and understand. Hence, Cryptography is one of the important features in secure communication .It makes use of key to encrypt the data so that the data sent cannot be accessed by unauthorized users. This paper focuses on Lightweight symmetric cryptography. Lightweight cryptography is used for resource-limited devices..........
Keywords: Cryptography, IDEA, Light Weight Cryptography, SIMON, Xilinx
[1] AdyinAysu,Ege, Ege Gulcan and Patrick Schaumont, "SIMONsays: Break Area Records of Block Ciphers on FPGAs", IEEE Embedded Systems Letters, Vol.6, No.2, June 2014.
[2] William Stallings fifth edition of "Cryptography and Network Security Principles and Practice".
[3] T. Eisenbarth, S. Kumar, C. Paar, A. Poschmann, and L. Uhsadel.A Survey of Lightweight-Cryptography Implementations.In IEEE Design & Test, Volume 24, Issue 6, pages 522–33, 2007. 21.
[4] Ray Beaulieu, Douglas Shors, Jason Smith, Stefan Treatman-Clark, Bryan Weeks, Louis Wingers, "The simon and speck of lightweight block ciphers," National Security Agency 9800 Savage Road, Fort Meade, MD 20755, USA, June 2013.
[5] Thaduri, M., Yoo, S.M. and Gaede, R., "An efficient implementation of IDEA encryption algorithm using VHDL", 2004 Elsevier
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Implementation of SCN Based Content Addresable Memory |
Country | : | India |
Authors | : | Shruthi H Shetty || Ashwath Rao || Megha N |
: | 10.9790/2834-1204024852 |
Abstract: Most memory devices store and retrieve data by addressing specific memory locations. As a result, this path often becomes the limiting factor for systems that rely on fast memory accesses. CAM is introduced employing a new mechanism for associativity between the input tags and the corresponding address of the output data. The proposed CAM is based on a recently developed sparse clustered network (SCN) that on-average will eliminate most of the parallel comparisons performed during a search. SCN-CAM is suitable for low-power applications, where frequent and parallel look-up operations are required. In this paper the SCN-CAM is implemented in HDL
Keywords: Content Addressable Memory, CAM cell, Sparse Clustered Networks
[1] Hooman Jarollahi , Vincent Gripon, Naoya Onizawa and Warren J. Gross, "Algorithm and Architecture for a ow-Power Content-Addressable Memory Based on Sparse Clustered Networks" IEEE Transactions On Very arge cale Integration (V I) ystems, Vol. 23, No. 4, April 2015
[2] Dejan Georgiev, " ow Power Concept For Content Addressable Memory (Cam) Chip Design", International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering Vol. 2, Issue 7, July 2013
[3] Kostas Pagiamtzis and Ali heikholeslami, "Content-Addressable Memory (CAM) Circuits and Architectures: A Tutorial and urvey", IEEE Journal Of olid-state Circuits, Vol. 41, No. 3, March 2006
[4] Shanq-Jang Ruan, Chi-Yu Wu, and Jui-Yuan Hsieh, " ow Power Design of Precomputation-Based Content-Addressable Memory", IEEE Transactions On Very Large Scale Integration (VLSI) Systems, Vol. 16, No. 3, March 2008
[5] A. Agarwal et al., "A 28× 28 b high-speed wide-and match-line content addressable memory in 32 nm CMO ," in Proc. ESSCIRC, pp. 83–86, Sep. 2011.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Computationof SRT and CORDIC Division Algorithms |
Country | : | India |
Authors | : | Sumiksha || Praveen Kumar Konda || Savidhan Shetty |
: | 10.9790/2834-1204025356 |
Abstract: With increasing on chip complexities the on chip area is a major concern. Today users desire every gadget to be small enough, particularly the hand held systems. The design of a fast divider is an important issue in high-speed computing .Many of the DSP applications try to closely simulate real time images. Speed, clarity and resemblance to real time objects are some of the issues to be addressed to achieve this goal. Trigonometric function calculation is one of the primary tasks performed in DSP applications. The paper presents a fast radix-2 SRT division algorithm and CORDIC division algorithm..........
Keywords: cadence.CORDIC, Fastdivider, SRT, Xilinx.
[1] V. Sharma, "FPGA Implementation of EEAS CORDIC based Sine and Cosine Generator," M. Tech Thesis, Dept. of Electronics and Communication Engineering, Thapar University, Patiala, 2009.
[2] J. Volder, "The CORDIC Trigonometric Computing Technique," IRE Transactions on Electronic Computing,Vol EC-8, Sept 1959, pp. 330-334.
[3] R. K. Jain, B. Tech Thesis, "Design and FPGA Implementation of CORDIC-based 8-point 1D DCT Processor" , NIT Rourkela, Rourkela, Orissa, 2011.
[4] Er. ManojArora, Er. R S Chauhan, Er.LalitBagga," FPGA Prototyping of Hardware Implementation of CORDIC Algorithm", International Journal of Scientific & Engineering Research, Volume 3, Issue 1, January-2012 1 ISSN 2229-5518
[5] J. E. Robertson, "A new class of digital division methods," IRE Trans. Electronic Computers, vol. EC-7, pp. 218–222, Sept. 1958...
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Computing Non-Restoring and Newton Raphson's Method for Division |
Country | : | India |
Authors | : | Lavanya B K || Savidhan Shetty || Akshatha D |
: | 10.9790/2834-1204025760 |
Abstract: Division is one of the most time consuming and complex arithmetic operation. They are employed in various digital circuit designs and software applications. Many algorithms are suitable for implementing division in hardware. In this paper we implement the Newton Raphson's and Non-Restoring division algorithm, which is synthesized and simulated to check its accuracy. Newton Raphson's algorithm is one of the fastest division algorithms which is used to calculate the quotient............
Keywords: CLA, Add-shift, non-restoring, Newton's method, multiplexer
[1] Shovan Roy , "A Non-restoring Division Algorithm ," IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 16, Issue 4, Ver. VII (Jul – Aug. 2014), pp. 27-30
[2] Ms. M.U. Buradkar, Prof. P. P. Zode ," 32-Bit Signed/Unsigned Fixed Point Non-Restoring Square-Root Operation Using VHDL" National Conference on Architecture, Software system and Green computing, International Journal of Computational Engineering Research (IJCER) ISSN: 2250-3005
[3] N. Louvet, J. M. Muller and A. Panhaleux, "Newton-Raphson algorithms for floating-point division using an FMA," ASAP 2010 21st IEEE International Conference on Application-specific Systems, Architectures and Processors, Rennes, France, 2010, pp. 200-207
[4] M´ario P. V´estias and Hor´acio C. Neto, "Revisiting The Newton-raphson Iterative Method For Decimal Division", 21st IEEE International Conference on Field Programmable Logic and Applications on, 2011
[5] Liang-Kai Wang and M. J. Schulte, "Decimal floating-point division using Newton-Raphson iteration," Application-Specific Systems, Architectures and Processors, 2004. Proceedings. 15th IEEE International Conference on, 2004, pp. 84-95...
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Generation of ultra low side lobes is one of most challenging in design of antenna arrays for EMI suppression problems. Using conventional methods like binomial and chebyshev techniques, side lobe levels are reduced to some extent but not adequate. In this paper generation of very low side lobes beyond -40dB is presented using different evolutionary techniques like genetic algorithm, particle swarm optimization and simulated annealing. Very narrow beam patterns are obtained which can be used for point to point communication with less electromagnetic interference.
Keywords: EMI, GA, PSO, SA and Side lobe level.
[1] Constantine A.Balanis, Antenna theory analysis and design (third edition, A john wiley &sons, inc., publication).
[2] R. Mittra , Neng-Tien Huang, Wenhua Yu , A novel technique for solving EMI/EMC problem between large antennas mounted on complex platforms, IEEE Antennas and Propagation Society International Symposium 2006.
[3] Akdagli, A Guney, K and Karaboga, Pattern nulling of linear antenna arrays by controlling only the element positions with the use of improved touring ant colony optimization algorithm, Journal of Electromagnetic Waves and Applications, 16: 1423–1441,2002.
[4] Yu-Bo Tian and Jian Qian, Improve the performance of a linear array by changing the spaces among array elements in terms of Genetic Algorithm, IEEE Transactions On Antennas and propagation, vol 53, No.7, july 2005.
[5] Johnson, J.M. and Rahmat-Samii, V., Genetic algorithms in engineering electromagnetics , IEEE Transactions on Antennas and Propagation, Vol. 39, No. 4, pp. 7-21, August 1997....
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A VHDL Implementation of UART with Error Coding Algorithms |
Country | : | India |
Authors | : | Deepika S S || Ashwin Kumar || Nisha |
: | 10.9790/2834-1204026973 |
Abstract: Inan industrial working environment employing multiprocessor communication using UART, noise may affect the data and data may be received with errors. The working of the system may be affected due to these kind of errors resulting in an improper control. Several existing UART designs are incorporating error detection logic. In this technique, it requires retransmission of data frames when errors are detected. Thus Linear block codes like hamming code which have forward.......
Keywords: Error coding, SECDED, Hamming code, Manchester code, Xilinx
[1] SindhujaMuppalla, Koteshwara Rao Vaddempudi, "A Novel VHDL Implementation of UART with Single Error Correction and Double Error DetectionCapability" SPACES-Dept of ECE, KL UNIVERSITY, 2015.
[2] Naresh Patel, Vatsalkumar Patel and Vikaskumar Patel, "VHDL Implementation of UART with Status Register" International Conference on Communication Systems and Network, May 2012.
[3] R.W. Hamming, "Error detecting and error correcting codes", The Bell System Technical journal Vol. XXIX, American Telephone and Telegraph company,Vol. 2, April 1950.
[4] PallaviUpase and PravinChoudhari "Overview of Error Mitigation Techniques in UART Communication" International Journal of Innovative Research in Computer and Communication Engineering, Vol. 4, Issue 3, March 2016
[5] Anjali.V P. Satishkumar, "Manchester Encoder and Decoder with Clock Recovery Unit and Invalid Detector" Computer Engineering and Intelligent, Vol.6, No.2, 2015...
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Cryptography offers high security for communication and networking. Elliptic Curve Cryptography (ECC) provides similar level of security to conventional integer-based publickey algorithms, but with much shorter keys. ECC over binary field is of special interest because the operations in binary field are thought more space and time efficient. It replaces RSA because of its increased security with lesser number of key bits. This paper proposes an efficient pipelined architecture of elliptic curve scalar multiplication (ECSM) over GF(2m). The architecture uses a bit-parallel finite............
Keywords: Cryptography, Elliptic curve cryptography, Karastuba-Ofman Multiplier, Scalar Multiplication, Galois field
[1] Lijuan Li and Shuguo Li, Member, IEEE "High-Performance Pipelined Architecture of Elliptic Curve Scalar Multiplication Over GF(2m)" IEEE Transactions On Very Large Scale Integration (VLSI) Systems, Vol. 24, No. 4, April 2016
[2] F. Rodríguez-Henríquez, N. A. Saqib, A. D. Pérez, and Ç. K. Koç, "Cryptographic Algorithms on Reconfigurable Hardware". New York, NY, USA: Springer-Verlag, 2006
[3] E. Wenger and M. Hutter, "Exploring the design space of prime field vs. binary field ECC-hardware implementations," in Proc. 16th Nordic Conf. Secure IT Syst. Inf. Security Technol. Appl. (NordSec), Tallinn, Estonia, Oct. 2011, pp. 256–271
[4] P. H. W. Leong and I. K. H. Leung, "A microcoded elliptic curve processor using FPGA technology," IEEE Trans. Very Large Scale Integr. (VLSI) Syst., vol. 10, no. 5, pp. 550–559, Oct. 2002
[5] W. N. Chelton and M. Benaissa, "Fast elliptic curve cryptography on FPGA," IEEE Trans, Very Large Scale Integr. (VLSI) Syst., vol. 16, no. 2, pp. 198–205, Feb. 2008....
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Wireless communication is the transfer of power or information between two or more points that are not connected by an electrical conductor. In the same way wireless network is the method through which we used wireless data connection between nodes. Heterogeneous network shows the use of multiple types of access nodes in wireless network consists of devices using different underlying Radio Access Technology (RAT). An effective spectrum vertical handoff strategies for heterogeneous wireless networks are presented in the thesis. A heterogeneous network consists of multiple tiers............
Keywords: Vertical handoff scheme, k-tier heterogeneous wireless network, receiving signal strength, signal to noise and interference ratio, radio access technology, throughput
[1] Steven Cherry. Forecast for cloud computing: up, up, and away. Spectrum, IEEE, 46(10):68– 68, 2009
[2] Shengdong Xie. Vertical handoff decision algorithm based on optimal grade of service. IETE Journal of Research (Medknow Publications & Media Pvt. Ltd.), 56(1), 2010.
[3] NP Singh and Brahmjit Singh. Performance enhancement of cellular network using adaptive soft handover algorithm. Wireless Personal Communications, 62(1):41–53, 2012.
[4] Sunghyun Cho, Edward W Jang, and John M Cioffi. Handover in multihop cellular networks. Communications Magazine, IEEE, 47(7):64–73, 2009.
[5] Snigdha Khanum and Mohammad Mahfuzul Islam. An enhanced model of vertical handoff decision based on fuzzy control theory & user preference. In Electrical Information and Communication Technology (EICT), 2013 International Conference on, pages 1–6. IEEE, 2014....
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Comparative Analysis of High Efficient Random Number Generator |
Country | : | India |
Authors | : | Shruthi K || Prasanna Kumar C || Akshatha |
: | 10.9790/2834-1204028791 |
Abstract: A detailed comparison among pseudo-random number generators (PRNGs) such as Linear Feedback Shift Register(LFSRs), Linear Congruential Generator (LCGs) and Combination of Linear Feedback Shift Register (LFSR) and Cellular Automata Shift Register(CASR) are presented in this paper. Linear PRNGs; such as LFSRs and LCGs can produce long-period random number sequences. When implemented, linear PRNGs are efficient in throughput rate and hardware cost............
Keywords: RNG, Linear Feedback Shift Register, LCG, Cellular Automata Shift Register, Xilinx
[1] M. Luby, Pseudorandomness and Cryptographic Applications, Princeton University Press, 1996.
[2] Random Number Generator (2011). Wikipedia website [Online]. Available:http://en.wikipedia.org/wiki/Hardware_random_number_generator.
[3] Jiang Hao, Li Zheying, "On the Production of Pseudo-random Numbers in Cryptography" in Journal Of Changzhou Teachers College of Technology, Vo1.7 , No. 4, Dec. 2001.
[4] D. E. Knuth, "The Art of Computer Programming", Vol. 2: Seminumerical Algorithms. Reading, MA: Addison-Wesley, 1969
[5] F. James, "A Review of Pseudo-random Number Generators," Computer Physics Communications 60, 1990....