Volume-1 (International Conference on Emerging Trend in Engineering and Management Research (ICETEMR-2016))
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | VLSI Implementation of Self Time Adder Using Recursive Approach |
Country | : | India |
Authors | : | M.Anand || A.Saravanan Asst Proff |
Abstract: A brief presents a parallel single-rail self-timed adder. It is based on a recursive formulation for performing multibit binary addition. The operation is parallel for those bits that do not need any carry chain propagation. Thus, the design attains logarithmic performance over random operand conditions without any special speedup circuitry or look-ahead schema. A practical implementation is provided along with a completion detection unit............
Keywords -Asynchronous circuits, binary adders, CMOS design, digital arithmetic
[2]. M. Pedram, Q. Wu and X. Wu, "A new design of double edge triggered flip-flops," Proc. Asia and South Pacific Design Automation Conference, pp. 417-421, 1998.
[3]. W. Chung, T. Lo and M. Sachdev, "A comparative analysis of low-power low-voltage dual-edge-triggered flip-flops," IEEE Trans. on VLSI Systems, vol. 10, no. 6, pp. 913-918, December 2002.
[4]. A.L. Fisher and H.T. Kung, "Synchronizing large VLSI processor arrays," IEEE Trans. On Computers, vol. C-34, no. 8, pp. 734-740, August 1985.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Coordinated Qos Aware User Scheduling And Power Allocation Scheme For Ofdma System |
Country | : | India |
Authors | : | S. Vadivukkarasi |
Abstract: In recent years many papers have been published for energy-efficient resource allocation in a cellular OFDMA system. In this paper we carried out combined user scheduling and power optimization based on per subcarrier or per base station for each with maximum transmits power in coordinated BS. Here three definitions of the energy efficiency are considered for system design with channel rate and the power level.....
[2]. 3GPP TS 36.300, E-UTRA and E-UTRAN: Overall Description: Stage 2(Release 8), 2008.
[3]. R.Pabst, B. Walke, D. Schultz, P. Herhold, and etc., "Relay-based deployment concepts for wireless and mobile broadband radio," IEEE Comm. Magazine, Vol. 42, No. 9, 2004, pp. 80– 89.
[4]. V. Genc, S. Murphy, Y. Yu, and J. Murphy, "IEEE 802.16j relay-based wireless access networks: A nover view," IEEE Wireless Comm., Vol. 15, 2008, pp. 56–65.
[5]. L. Huang, M. Rong, L. Wang, Y. Xue, and E. Schulz, "Resource scheduling for ofdma/tdd based relay enhanced cellular networks," IEEE WCNC, 2007, pp. 1544–1548,.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Convergence Routing Analysis in IPv6 Networks |
Country | : | India |
Authors | : | S.Arun Kumar and S.Mari Rajan |
Abstract: Internetworking is widely spread and used for different applications and in all domains. Their growth continues at an amazing rate sustained by its high penetration in both home networks and mobile markets. The internet is a worldwide publicly accessible system of interconnected computer networks, since IPV4 in network enables data sharing between two or more computers which minimize time and energy wastages.......
Keywords: IPv4, IPv6, RIP, EIGRP.
[1]. Franck Le and João Luís Sobrinho, Member, IEEE,"Interconnecting Routing Instances", IEEE/Acm Transactions On Networking, Vol. 22, No. 2, April 2014.
[2]. M. Goyal, M. Soperi, E. Baccelli, G. Choudhury, A. Shaikh, H. Hosseini,and K. Trivedi, "Improving convergence speed and scalability in ospf: A survey," IEEE Commun. Surveys Tut., vol. 14, no. 2, pp.443–463, 2nd Quart., 2012.
[3]. C. Filsfils, P. Francois, M. Shand, B. Decraene, J. Uttaro, N. Leymann, and M. Horneffer, "Loop-free alternate (LFA) applicability in service provider (SP) networks," Internet Engineering Task Force, RFC 6571 (Informational), Jun. 2012 [Online].Available: http://www.ietf.org/rfc/rfc6571.txt
[4]. A. Kvalbein, A. F. Hansen, T. Čičic, S. Gjessing, and O. Lysne, "Multiple routing configurations for fast IP network recovery," IEEE/ACM Trans. Netw., vol. 17, no. 2, pp. 473–486, Apr. 2009.
[5]. P. Francois and O. Bonaventure, "Avoiding transient loops during the convergence of link-state routing protocols," IEEE/ACM Trans. Netw.,vol. 15, no. 6, pp. 1280–1292, Dec. 2007.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Memory-Efficient Hardware Implementation Of Parallel String Matching For Complex Clamav Virus Signatures |
Country | : | India |
Authors | : | P.Brindhavathi || S.Vijay |
Abstract: High speed and always-on network access is becoming common place around the world, creating a demand for increased network security. Network Intrusion Detection Systems (NIDS) attempt to detect and prevent attacks from the network using pattern-matching rules in a way similar to anti-virus software. For the low-cost hardware-based intrusion detection systems for complex regex patterns, this project work proposed a memory-efficient token based detection methods..........
[1]. F. Yu, Z. Chen, Y. Diao, T. V. Lakshman and R. H. Katz, "Fast and Memory-Efficient Regular Expression Matching for Deep Packet Inspection". In Proc. of ANCS, 2006.
[2]. A. V. Aho and M. J. Corasick. Efficient string matching: An aid to bibliographic search. Communications of the ACM,18(6):333–340, 1975.
[3]. D. Pao, N.L. Or and R.C.C. Cheung, "A memory-based NFA regular expression match engine for signature-based intrusion detection", Computer Communications, Vol.36, pp. 1255-1267, 2013.
[4]. T. H. Lee, "Generalized Aho-Corasick algorithm for signature based anti-virus applications", IEEE Int. Conf. Computer, Communications and Networks, pp. 792-797, 2007.
[5]. D. Pao, X. Wang, X. Wang, C. Cao and Y. Zhu, "String searching engine for virus scanning", IEEE Trans. Comput., Vol. 60,pp. 1596–1609, 2011.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Smart Alert System For Vehicles |
Country | : | India |
Authors | : | R.Ramkumar || S.Dinesh || S.Naveen Kumar || Mrs. G.Prathipa |
Abstract: The Rapid growth of technology and infrastructure has made our lives easier. The advent of technology has also increased the traffic hazards and the road accidents take place frequently which causes huge loss of life and property because of the poor emergency facilities. Road accidents are one of the major causes of mortality around the world and over 1,300,000 people are killed annually in the road accidents.......
Keywords –GSM, GPS, zigbee transceiver with atmega2560
[1]. Manuel Fogue, Piedad Garrido, Francisco J. Martinez, Juan-Carlos Cano, Carlos T. Calafate, Pietro Manzoni, "A System for Automatic Notification and Severity Estimation of Automotive Accidents", IEEE Transactions on Mobile Computing, vol.13, no. 5, pp. 948-963, May 2014, doi:10.1109/TMC.2013.35
[2]. A.Sriram and P.Ramya "Automatic Accident Notification System using GPS & GSM with 3G Technology for Video Monitoring" International Journal of Emerging Trends in Electrical and Electronics (IJETEE) Vol. 1, Issue. 2, March-2013.
[3]. Ashish Kushwaha, Gaurav Katiyar, Harshita Katiyar,Hemant Yadav, Mr.Shikhar Saxena "GPS And GSM Based Accident Alarm System"National Student Conference On "Advances in Electrical & Information Communication Technology"AEICT-2014
[4]. Ashwini Burde , S. P. Pingat "Next Generation Vehicular Traffic Management Using VANET Technology" (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 4 (5) , 2013, 715-720
[5]. Srinivetha. R, Gopi. R "Alert Message Dissemination Protocol for VANET to Improve Road Safety" International Journal of Emerging Technology and Advanced Engineering Volume 4, Issue 1, January 2014.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Base Station Power Requirement Analysis For Maximized Performance Level For Wcdma Based 3g Services |
Country | : | India |
Authors | : | N.Senbagapriya || Nelavala Rajesh |
Abstract: In recent years many Radiation Measurement at various places have been carried out at various types with different traffic rate and sizes. The new topology analysis an output power level distributions of radio base stations (RBSs) and user devices connected to a WCDMA based 3G mobile communication network and relate the results to realistic human exposure to radio frequency (RF) electromagnetic field (EMF) emitted by the corresponding RBSs and the devices.
[1]. Mukeshagrawal, bjornthors , 'Power Level Distributions of Radio Base Station Equipment and User Devices in a 3G Mobile Communication Network in India and the Impact on Assessments of Realistic RF EMF Exposure' July 23, 2015.
[2]. D. Colombiet al., 'Downlink power distributions for 2G and 3G mobile communication networks',Radiat. Protection Dosimetry, vol. 157, no. 4,pp. 477_487, Dec. 2013.
[3]. D. Colombi, B. Thors, N. Wirén, L.-E. Larsson, and C. Tornevik, 'Measurements of downlink power level distributions in LTE networks', inProc. Int. Conf. Electromagn. Adv. Appl. (ICEAA), Turin, Italy, Sep. 2012,pp. 98_101.
[4]. A. Bürgi, D. Scanferla, and H. Lehmann, 'Time averaged transmitter power and exposure to electromagnetic fields from mobile phone base stations', Int. J. Environ. Res. Public Health, vol. 11, no. 8, pp. 8025_8037,Aug. 2012.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Incorporated Rendering Associated With Modeling, Propagation In Addition To Detection With Worms Throughout Outbox Attacker |
Country | : | India |
Authors | : | E.Subhashini || Mrs.S.Sudha.MCA,M.phil,(ph.d) |
Abstract: E-mail malware poses critical threats. These malwares could cause the computer to be compromised. Malware / virus is modeled and its spreaded into other computers to easily. Once one node is affected it becomes compromised. If it starts to sending mail of virus infected file to rest of it's another nodes to which it is attached. User mailbox infectious at it's active state......
Keywords -malware,infected,filtering,nodes,penetration,propagation
[1]. Cong Jin, Jun Liu, and Qinghua Deng "Network Virus Propagation ModelBased on Effects of Removing Time and User Vigilance"2009.
[2]. G. Serazzi and S. Zanero, "Computer Virus Propagation Models,"Proc. 11th IEEE/ACM Int'l Conf. Modeling, Analysis and Simulations of Computer and Telecomm. Systems (MASCOTS '03), pp. 1-10, Oct 2003.
[3]. Nuno G. Rodrigues, Ant´onio Nogueira and Paulo Salvador "Fighting Botnets - A Systematic Approach" Instituto de Telecomunicac¸ ˜oes/University of Aveiro Campus de Santiago, 3810-193 Aveiro, Portugal 2012.
[4]. R. Pastor-Satorras and A. Vespignani, "Epidemic Spreading in Scale-Free Networks," Physical Rev. Letters, vol. 86, pp. 3200-3203,2001.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Smart Grid System Based On Cloud Cognitive Radio Using Beamforming Approach In Wireless Sensor Network |
Country | : | India |
Authors | : | P.Gopa || Mr.T.Nadana Ravishankar |
Abstract: In this paper at wireless network we use the cognitive radio (CR) channels for communication. The performance of the process is limited by the self-interference which occur in the CR system. To overcome that problem beam forming method is used effectively which reduces the self-interference of smart meter channels. MMSE method is the main concept in the beam forming method utilized in the smart meter system. MMSE will provide accurate channel estimation and noise plus interference to reduce the self-interference in the CR system....
Keywords :Cognitive radio, Beam forming, Self-inference.
[1]. Benvenuto.N and Tomasin.S, (2002) "On the comparison between OFDM and single-carrier modulation witha DFE using a frequency-domain feedforwardfilter,"IEEE Trans. Commun., vol. 50, no. 6.
[2]. Boyd. S and Vandenberghe. L,(2004) "Convex Optimization" Cambridge, U.K. Cambridge Univ. Press.
[3]. Donoho.I. D. D, Tsaig.Y, and Starck.J, (2006) "Sparse Solution of Underdetermined Linear Equations by Stagewise Orthogonal Matching Pursuit".
[4]. Falconer.A.B-S.D, Ariyavisitakul.S.Land Eidson.B, (2002)"Frequency domain equalization for single-carrier broadband wireless systems," IEEE Commun. Mag., vol. 40, no. 4, pp. 58–66.
[5]. Ginis.J. M. C. G, (2001) "On the relation between V-BLAST and the GDFE," IEEE Commun. Lett., vol. 5, no. 9, pp. 364–366.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | FPGA Implementation of Token-Based Clam AV Regex Virus Signatures with Early Detection |
Country | : | India |
Authors | : | Rajalakshmi.R || Anbarasan.A |
Abstract: This paper describes hardware architecture for high speed regex pattern matching with ClamAV virus database. The proposed method is incorporated with a new technique namely early detection in matching the regex patterns. With the information reduction approach, instead of viewing the pattern matching as byte sequences, the input byte stream is transformed into a token stream..........
Keywords: non-deterministic finite automaton, parallel processing, network intrusion detection, gated latch, memory-based
[1]. ClamAV anti-virus system, http://www.clamav.net
[2]. Snort: http://www.Snort.org
[3]. F. Yu, Z. Chen, Y. Diao, T. V. Lakshman and R. H. Katz, "Fast and Memory-Efficient Regular Expression Matching for Deep Packet Inspection". In Proc. of ANCS, 2006.
[4]. T. H. Lee, "Generalized Aho-Corasick algorithm for signature based anti-virus applications", IEEE Int. Conf. Computer, Communications and Networks, pp. 792-797, 2007.
[5]. Nga Or, Xing Wang and Derek Pao, "Memory-Based Hardware Architectures to Detect ClamAV Virus Signatures with Restricted Regular Expression Features", IEEE Transactions on Computers, no. 1, pp. 1, 2015.2439274
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Robust Multiple Signal Detector Based On Amc For Radar Signals |
Country | : | India |
Authors | : | J.Heera Priyatharsini || P. Sangeetha || D.Balasubramaniam |
Abstract: Flexibility and versatility of digital techniques grew in the front-end signal processing and with the advent of integrated digital circuitry, high speed signal processors were developed and realized. Radar continued to grow in the recent years by keeping the future developments in mind and with better digital capability. Significant contributions in DSP in Radar have been in MTI processing, Automatic Detection and extraction of signal, Image reconstruction........
Keywords –Pulsed radar, Automatic Modulation Classifier, FPGA, Digital Signal Processing, Moving Target Indicator Processing
[1]. Azzouz, E. E., and Nandi, A. K. Procedure for automatic recognition of analogue and digital modulations. IEE Proceedings, Part F: Communications, Radar and Signal Processing, 143, 5 (1996), 259–266.
[2]. Dobre, O. A., Abdi, A., Bar-Ness, Y., and Su, W. Survey of automatic modulation classification techniques: Classical approaches and new trends. IET Communications, 1, 2 (2007), 137–156.
[3]. Grajal, J., Yeste-Ojeda, O., S´anchez, M. A., Garrido, M., and L´opez-Vallejo, M. Real time FPGA implementation of an automatic modulation classifier for electronic warfare applications. In European Signal Processing Conference, Barcelona, Spain, 2011.
[4]. Huang, C.-Y., and Polydoros, A. Likelihood methods for MPSK modulation classification. IEEE Transactions on Communications, 43, 234 (1995), 1493–1504.