Proceedings of the Fourth International Conference on Microelectronics, Computing and Communication Systems: MCCS 2019 9789811555459, 9789811555466

This book presents high-quality papers from the Fourth International Conference on Microelectronics, Computing & Com

353 21 50MB

English Pages 1078 [1052] Year 2021

Report DMCA / Copyright

DOWNLOAD PDF FILE

Table of contents :
Preface
Acknowledgements
Contents
About the Editors
Diode Switch-Based 17-Level Inverter with Lesser Power Electronic Elements
1 Introduction
2 Proposed Inverter Topology
3 Modes of Operation
4 Comparison with Other Topologies
5 Simulation and Experimental Results
6 Conclusion
References
28 GHz 5G Receiver Design Using 65 Nm CMOS and Performance Analysis Through Simulation
1 Introduction
2 Designing of RF Components
2.1 Designing of Low Noise Amplifier and Matching Circuits
2.2 Modified LNA Circuit for Gain and Bandwidth Improvement
2.3 Designing of Image Rejection Filter
2.4 Designing of Down Converter
3 Measurements Setup
4 Results and Discussion
4.1 Performance of LNA
4.2 Performance Parameters of Down Converter
4.3 Performance Parameters of Receiver
5 Conclusion
References
Study and Implementation of Ladder Logic Conversion to VHDL for Field Programmable Gate Array (FPGA)-Based Programmable Logic Controllers (PLC)
1 Introduction
2 Related Works
3 Methodology
4 Results and Simulations
5 Conclusion
References
Automated Monitoring and Regulation of User-Friendly Greenhouse Using Arduino
1 Introduction
2 Important Features of the Proposed Automation System
3 Component Description
3.1 Arduino UNO
3.2 Soil Moisture Sensor
3.3 Temperature and Humidity Sensor
3.4 Relay Module
3.5 Light-Dependent Resistor (LDR)
3.6 Cooling Fan
3.7 A.C. Water Pump
3.8 Heat Radiator
4 System Architecture and Working
5 Conclusion
References
An Involution Function-Based Symmetric Stream Cipher
1 Introduction
1.1 Symmetric Key Cryptography or Secret Key Cryptography
1.2 Asymmetric Key Cryptography or Public Key Cryptography
1.3 Hash Functions
2 Proposed Work
3 Result and Discussion
4 Conclusion and Further Scopes
References
Multi-objective Optimization of Block Size Based on CPU Power and Network Bandwidth for Blockchain Applications
1 Introduction
2 Related Work
3 Motivation
4 Implementation and Results
5 Conclusion and Results
References
Alamouti Code Generator in Optical Domain Using Mach–Zehnder Interferometer
1 Introduction
2 Design of Alamouti Code Generator
3 Conclusion
References
A Real-Time Road Congestion-Based Hybrid Approach for Finding the Optimized Route
1 Introduction
2 Related Work
3 Proposed Work
4 Optimal Path Finding Algorithm
5 Simulation and Result Analysis
6 Conclusion
References
Sentiment Analysis of Audio Diary
1 Introduction
2 Historical Background
3 Methodology
4 Results and Case Studies
5 Conclusion
References
ISA-Based PI + FODN AGC of Multi-source System
1 Introduction
2 Modeling of System
2.1 Proposed System
2.2 Proposed Controller
3 Interactive Search Algorithm (ISA)
4 Simulation Results
5 Conclusion
Appendix
References
Assessing Overall Software Defect-Based Risk Using Analytic Hierarchy Process
1 Introduction
2 Research Method
2.1 Developing a Model
2.2 Assigning Weights to Criteria
2.3 Consistency
3 Statistical Analysis
4 Conclusion
References
Reliable and Privacy Preserving Blockchain Based Medical Data Sharing Digital Ledger
1 Introduction
1.1 General Background
1.2 Introduction
1.3 Blockchain
1.4 Paper Organization
2 Related Work
2.1 Network Selection
2.2 Consensus Algorithm
3 Reliable and Privacy Preserving Medical Blockchain
3.1 Overview
3.2 Problem Definition
4 Design Principles
4.1 Ethereum Smart Contracts
4.2 Hyper-ledger Fabric
5 System Implementation and Performance Analysis
6 Conclusion
7 Future Works
References
Survey on Lightweight Cryptography Algorithm for Data Privacy in Internet of Things
1 Introduction
1.1 IoT Applications
1.2 IoT Architectures
1.3 IoT Attacks
1.4 Security Challenges in IoT
1.5 Cryptography Overview for IoT
1.6 Lightweight Cryptography
1.7 Organization of Paper
2 Survey on Lightweight Cryptography Algorithm Protocol for Security in IoT
3 Comparison of Different Lightweight Cryptographic Algorithm Protocol
4 Future Direction
5 Conclusion
References
nTunnel FET (nTFET) Reliability Study Against Positive Bias Temperature Instability (PBTI) for Different Device Architectures
1 Introduction
2 Device Structure and Simulation Framework
3 Model Calibration
4 Results and Discussion
5 Conclusion
References
Three-Phase Space Vector Modulated Z-Source Inverter
1 Introduction
2 Z-Source Inverter
3 Principal of Operation
4 Investigation of ZSI Circuit
5 Simulation and Result
6 Conclusion
References
Optimum Cavity Length of a pTFET-Based Biosensor for Successful and Accurate Sensing of a Wide Range of Biomolecules
1 Introduction
2 Device Structure and Simulation Framework
3 Model Calibration
4 Results and Discussion
5 Conclusion
References
Spectrum Sensing in Cognitive Radio with SNR Wall Estimation
1 Introduction
2 System Model
3 Gershgorin Test Statistics
4 Algorithm
5 Comparison of Test Statistics
5.1 Energy Detection Method
5.2 Cyclostationary Feature Detection
5.3 Matched Filter Detection
5.4 Generalized Likelihood Ratio Test (GLRT)
5.5 Hadamard Ratio Test
5.6 Volume-Based Detector
6 SNR Walls in Spectrum Sensing
7 Conclusion
References
Feature-Based Segmentation of Brain Tumor in MRI Images
1 Introduction
2 Proposed Method
2.1 Image Enhancement
2.2 Feature Extraction
2.3 Training Section
2.4 Feature-Based Classification
2.5 DSS Field Selection
2.6 Region Growing
2.7 Region Refinement
3 Result and Discussion
4 Conclusion
References
A Synthesis of Reversible Digital Circuits to Solve the Boolean Satisfiability
1 Introduction
2 Motivation
3 Synthesis of Reversible Digital Circuits
3.1 Combinational Function Representation
3.2 A Reversible Circuit Structure
3.3 Gate Transformation
3.4 Fan-Out Stem Transformation
3.5 The Controller Architecture
4 Experimental Results
5 Conclusions
References
An Improved Method for Detection of Laryngeal Cancer and Its Stages
1 Introduction
2 Review of Related Works
3 Proposed Innovation
4 Results
5 Conclusion
References
IoT-Based Secure Communication to Enhance Blockchain Model
1 Introduction
2 Related Work
2.1 Blockchain
2.2 Hash Function in Blockchain
2.3 IoT–Blockchain
2.4 Security in IoT
3 Proposed Work
3.1 Verification
4 Results
5 Conclusion
References
Tuberculosis Bacteria Segmentation in Acid Fast Stained Images
1 Introduction
2 Proposed Method
2.1 Contrast Enhancement
2.2 Bacteria Region Masking
2.3 Marking the Specified Bacteria
2.4 Complete Bacteria Extraction
3 Simulation Results and Discussion
3.1 Segmentation Evaluation Parameters
3.2 Dice Similarity Coefficient (DSC)
4 Conclusion
References
Condition Monitoring of PV-Wind System Using Stockwell Transform
1 Introduction
2 System Development
3 Theoretical Backgrounds
4 Fault Analysis in PV Array
5 Feature Extraction
6 Practical Validation
7 Conclusion
References
An Investigation on Photocatalytic Dye Degradation of Rhodamine 6G Dye with Fe- and Ag-Doped TiO2 Thin Films
1 Introduction
2 Experimental Details
3 Results and Discussion
3.1 Structural Characterizations
3.2 Crystallite Size
3.3 Average Strain
3.4 Dislocation Density
3.5 Morphological Characterizations
3.6 Optical Characterizations
3.7 Photocatalytic Activity Study
4 Conclusion
References
MMaSA—A Modified Matrix Synthesis Approach for Thermal-Aware Gate Array Placement
1 Introduction
2 Definitions Related to the Proposed Gate Array Placement
3 The Proposed Thermal Model
4 Implementation, Results and Analysis
5 Conclusion
References
Computation of Absorption Coefficient for Pöschl–Teller Potential in Double Quantum Well Structure for Photodetector Applications
1 Introduction
2 Mathematical Formulation
3 Results and Discussion
4 Conclusion
References
QoS-Based ACO Routing Protocols in MANETs: A Review
1 Introduction
2 Basic Ant Colony Algorithm
3 Taxonomy of ACO-Based MANETs Routing Protocols
4 Review of QOS-Aware ACO Routing Protocols
5 Comparative Analysis
6 Conclusion
References
A Novel NOR Gate-Based Dynamic Power Gating Technique in SRAM
1 Introduction
2 Operation of 6T SRAM Cell
3 Proposed Approach
4 Simulation Results
5 Conclusion
References
Multi-level Encryption Based on Fractional Fourier Transform, Double Random Phase Encoding Combined with Chaos, and Arnold Transform
1 Introduction
2 Preliminaries for Proposed Work
2.1 2D-Coupled Logistic Map
2.2 Double Random Phase Encoding
2.3 Fractional Fourier Transform
2.4 Arnold Transform
3 Proposed Work
4 Computational Results
4.1 Key Space Analysis
4.2 Sensitivity Analysis
4.3 Statistical Analysis
5 Conclusion
References
SEPIC-Boost CSCCC-Based SPWM Inverter with MPPT Technique
1 Introduction
2 Analysis and Design of the Proposed System
2.1 MPPT Algorithm
2.2 Control Mechanism
2.3 SIMO Converter
2.4 SIMO-Based SPWM Inverter
3 Simulation Results
3.1 MPPT Pulse Input
3.2 SEPIC Converter Output
3.3 Boost Converter Output
3.4 CSC Converter Output
3.5 Voltage Across Inductor L1
3.6 Voltage Across Inductor L2
3.7 Voltage Across Inverter Load
3.8 SPWM Pulse
4 Conclusion
References
A Fuzzy Logic Approach for Software Cost Prediction
1 Introduction
1.1 Fuzzy Logic
1.2 Fuzzy Rules
1.3 Fuzzy Logic System
2 Literature Review
3 Proposed Framework
3.1 Data Analysis
3.2 Fuzzy Rules
4 Evaluation Criteria
4.1 Magnitude of Relative Error (MRE)
4.2 Multiple Regression
5 Experimental Results
6 Conclusion
References
Cost-Effective Resource Provisioning in Cloud Using Cooperative Coevolutionary Genetic Algorithm
1 Introduction
1.1 Resource Provisioning Schemes
2 Related Work
2.1 Resource Provisioning Techniques
3 Research Methodology
3.1 Profit-Scaling Model
4 Conclusion
References
Design of 2–7 GHz Voltage-Controlled Oscillator Using Multi-stage Current Starved Configuration
1 Introduction
2 Current Starved VCO
3 Design Of VCO
4 Simulation Results
5 Conclusion
References
Rectenna for Wireless Power Transmission
1 Introduction
1.1 What Is Rectenna?
1.2 Power Transmission
1.3 Power Conversion Efficiency
2 Design Parameters
2.1 Antenna
2.2 Rectifier Circuit
3 Results and Discussion
4 Conclusion
References
An Energy-Efficient LEACH Routing Protocol for Wireless Sensor Networks
1 Introduction
2 Related Work
3 Proposed Routing Protocol
4 Simulation and Result Analysis
5 Conclusion
References
Power Management of Pedaling System with SPV System: An Alternate Option of Power Generation Without Emission
1 Introduction
2 Theory
2.1 GBPS
2.2 SPV System
2.3 On-Site and Off-Site Solar Power Generation
3 Experimental Investigation
3.1 Electrical Response of GBPS
3.2 Electrical Power from GBPS System
3.3 Development of Solar Plant
4 Result Analysis
4.1 SPV System Without GBPS for Load
4.2 SPV System with GBPS
4.3 Power Generation of SPV with GBPS in Off-Peak Hours
5 Conclusions
References
Calculating Threshold Voltage Shift for Shallow Implanted Short-Channel MOSFET in Presence of High-K Dielectric
1 Introduction
2 Mathematical Formulation
3 Results and Discussions
4 Conclusion
References
Healthcare Recommendation System
1 Introduction
2 Motivation
3 Problem Statement
4 Methodology
5 Proposed Model
6 Collaborative Filtering Methodology
7 Recommendation Algorithm
8 Clinical Prediction Model for Survival Analysis
9 Conclusions and Future Research
References
Comparative Study of Logic Performance of Hybrid CMOSFETs at Deca-Nanometer Regime
1 Introduction
2 Device Structure and Simulation Setup
3 Results and Discussion
4 Conclusion
References
Student Performance Prediction Using Classification Algorithms
1 Introduction
2 Background Study and Related Works
3 Proposed Methodology
3.1 Data Processing
3.2 Implementation of Classification Algorithms
4 Experiments and Results
5 Conclusion
References
Effect of Integrated Competency Management and Human Resource Development at the Level of Efficiency of Workforce
1 Introduction
2 Viable Integration of Development of Human Resource and Management of Competency
2.1 Management of Competency
2.2 Competency Types
2.3 Outline of Competency
3 Competent Human Resource Management
3.1 Human Resource Development as a Base for Knowledge Management
3.2 Impact of Performance Management
3.3 Personal Level Competence
4 Human Resource Development
4.1 Strategic Planning for Human Resource Development
4.2 HRD Criterion and Tendency
4.3 Developmental Activities Through HRD
5 Interrelationship Among Human Resource Development, Competence and Knowledge Management
6 Conclusion
References
Predicting Type 2 Diabetes Using Logistic Regression
1 Introduction
2 Methodology
3 Result and Discussion
3.1 Research Objective
3.2 Research Methodology
3.3 Discussion
4 Conclusion
References
FPGA Implementation of PICO Cipher
1 Introduction
2 Algorithm Overview
3 Proposed Architectures
3.1 Proposed Serial Architecture
3.2 Reduced Datapath Architecture with Memory-Based Key Scheduling
4 Hardware Evaluation
5 Discussion of Results
6 Conclusion
References
VLSI Implementation of ESF and QTL Lightweight Ciphers
1 Introduction
2 Algorithm Overview
2.1 ESF Cipher
2.2 QTL
3 Proposed Hardware Architecture of ESF and QTL Cipher
3.1 Eight-Sided Fortress
3.2 QTL
4 Simulation Platform
4.1 Metrics
4.2 Environments
4.3 Configurations
5 Results and Discussion
6 Conclusion
References
Optimal Allocation of AVR and DGs in Distribution Systems Using HSA
1 Introduction
2 Problem Formulation
2.1 Objective Function
2.2 Weighted Sum Approach
2.3 Automatic Voltage Regulator (AVR) Model
2.4 Harmony Search Algorithm
3 Proposed Approach
4 Results
5 Conclusion
References
ARM Microcontroller Based Safety and Surveillance System
1 Introduction
2 Literature Review
3 Proposed System
4 Proposed System Architecture
5 Advantages
6 Conclusion
References
Attenuation of Millimeter Wave in Storm Layers with Spherical and Non-spherical Dust Particles
1 Introduction
2 Method
3 Scattering from Dust Particles
3.1 Extinction Cross section
4 Non-spherical Particle
5 Analytical Treatment of Attenuation
6 Conclusion
References
VLSI Implementation of Tunable Band-Pass Notch IIR Filter for Localization of Hot spots in Proteins
1 Introduction
2 RRM Model and Filter Based Hot Spot Detection
2.1 Resonance Recognition Model
2.2 Hot spot Region Detection Using Digital Filters
2.3 Tuning of Band-Pass Notch IIR Digital Filter
3 Hardware Implementation of Band-Pass Notch Digital IIR Filter
3.1 Implementation of Band-Pass Notch IIR Filter System
3.2 Controller FSM
3.3 VLSI Realization of IIR ANF
4 Results and Discussion
4.1 Simulation Result
4.2 Synthesis Result
5 Conclusion
References
Smart Data Logger for Solar and Wind Power Generation
1 Introduction
2 Proposed System
3 System Algorithm
4 Results and Discussions
5 Conclusion
References
Deep Learning-Based Alzheimer Disease Detection
1 Introduction
2 Proposed Methodology
2.1 Data Preprocessing
2.2 Network Architecture
3 Experiments and Results Discussion
3.1 Dataset
3.2 Hyper Parameters
3.3 Experimental Setup and Evaluation
4 Conclusion
References
Novel Low-Complex 4 × 4 and 16 × 16 Intra-prediction Architecture for Error Concealment for H.264
1 Introduction
2 Basics of Intra-frame Coding
2.1 Detail Analysis of 4 × 4 Prediction Modes
2.2 Intra 16 × 16 Prediction Modes
2.3 Selection Criteria for Mode Selection
2.4 General Architecture for Intra-predication
3 Proposed Architecture
4 Proposed Intra-prediction Selection Method
4.1 Sum of Absolute Differences (SAD)
5 Experimental Analysis
5.1 Result Analysis of Implementation
6 Conclusion
References
Genetic Algorithm-Based Image Watermarking Using Multiple Location
1 Introduction
2 Background
3 Proposed Framework
3.1 Embedding of Watermark Image
3.2 Extraction of Watermark Image
3.3 Embedding at Different Multiple Location
3.4 Genetic Algorithm
4 Experimental Results
5 Conclusion
References
Fuzzy Supervisory Expert Tuner for PID Controller
1 Introduction
2 Proposed Fuzzy Supervised PID Tuning Scheme
3 Simulation Results
4 Conclusion
References
Smart Racking and Retailing Using IOT
1 Introduction
2 Methods and Material
3 Discussion
4 Conclusion
References
Fuzzy Rule-Based Supervisory PID Auto-Tuner for TRMS Process
1 Introduction
2 TRMS Description
3 TRMS Schematic
4 Block Diagram Analysis of MIMO process
5 Proposed Control Approach
6 Simulation Results
7 Conclusion
References
Utilizing Cooperative-MIMO for an Event-Based Data Transmission in a Wireless Sensor Network
1 Introduction
2 Related Work
3 Network Operation and the Energy Model of the Proposed Protocol
3.1 Network Operation
3.2 Energy Model
4 Results and Discussion
5 Conclusion and Future Work
References
Rapid Modeling of a Fast-Steering Mirror Assembly from Time Response Data
1 Introduction
2 Experimental Setup
2.1 Fast-Steering Mirror Assembly
2.2 Digital Drive (D-Drive) Module
2.3 Modulation Input: MOD
2.4 Monitor Output: MON
2.5 Arbitrary Waveform Generator (AWG)
2.6 Digital Storage Oscilloscope (DSO)
3 Modeling Methodology
4 System Identification
4.1 Parameter Estimation Based onTwo- or Three-Point of Step Response [13]
4.2 Parameter Estimation Based on Two- or Three-Point of Step Response [14]
5 Model Validation
6 Conclusion
References
RF Front-End Band-Pass Filters for GPS Receiver
1 Introduction
2 GPS Receiver
2.1 Receiver Architecture
2.2 Superheterodyne Receiver
3 RF BPF for Front-End GPS Receiver
3.1 BPF Using Coupled Lines
3.2 BPF Using Shorted Stub
4 Conclusion
References
Comparative Study of Parameter Estimation Methods for a Single Diode PV Module
1 Introduction
2 Problem Formulation
2.1 Analytical Method
2.2 Newton–Raphson Method
2.3 Harmony Search Algorithm
3 Results
4 Conclusion
References
Estimation of MMW Attenuation in Dust Storms Under Rayleigh Approximation
1 Introduction
2 Method
3 Scattering from Dust Particles
4 Absorption Cross Section
5 Scattering Cross Section
6 Extinction Cross Section
7 Scattering Cross Section Based on Dipole Radiation Concept
8 Analytical Treatment of Attenuation
9 Numerical Computation
10 Discussion of Results
References
Solar Power and Water Quality Monitoring Using Wireless Sensor Network with ZigBee
1 Introduction
2 WSN Technology
3 Zigbee Technology
4 Proposed Block Diagram for Domestic Applications
5 Results and Discussion
6 Conclusions
References
Designing and Implementing a Fully Differential Amplifier Using Current Conveyor of Third Generation
1 Introduction
2 Proposed Work
3 Current Conveyors and Its Three Generations
3.1 Advantages of Third-Generation Current Conveyors
3.2 CMOS Implementation of CCIII
3.3 Current and Voltage Mode Design
3.4 Current and Voltage Mode Design
4 Experimental Results
4.1 Parameter Description
4.2 Simulation Results
4.3 Performance Evaluation of Impedance for Current Mode Current Conveyor
4.4 Performance Evaluation of Impedance for Current Mode Current Conveyor
4.5 Voltages and Current Measurements
5 Voltages and Current Measurements
References
A New Adiabatic Multiplier for Low-Power Application-Specific Signal Processors and Estimation of Performance Parameters
1 Introduction
2 Adiabatic Logic
3 Adiabatic Vedic Multiplier
4 Simulation Results
5 Conclusion
References
Smart Public Transport Using BT5
1 Introduction
2 Literature Review
3 Methodology
3.1 Project Description
3.2 Technical Specifications
3.3 Design Approach
3.4 Codes and Standards
4 Results
5 Conclusion
References
GLAD Assisted In2O3 NW-TiO2 NW Heterostructure for Enhanced UV-Vis Absorption
1 Introduction
2 Experimental
3 Result and Discussion
4 Conclusion
References
Diabetes Diagnosis Prediction Using Ensemble Approach
1 Introduction
2 Related Works
2.1 Confusion Matrix
2.2 Cross Validation
2.3 Dataset
3 Proposed System
3.1 Generating Dataset
3.2 Data Preprocessing
3.3 Training and Classification
4 Implementation
5 Results
6 Conclusion
References
An 86 DB Gain 18.06 mVrms Input-Referred Noise LNA for Bio-Medical Applications
1 Introduction
2 LNA Design
2.1 Beta Multiplier Reference Circuit Gain Stage
2.2 CMOS Inverter-Based Second Gain Stage
3 OTA Design
4 Results and Discussions
5 Conclusion
References
Electrical Characterization of Sb2Se3 for Memory Applications
1 Introduction
2 The Experiment
3 Results and Discussions
3.1 X-Ray Diffraction
3.2 I-V Characteristics
3.3 Dynamic Response
3.4 R-T Characteristics
3.5 Temperature Stability (Resistance versus Time)
3.6 Endurance (Resistance versus No. of Cycles)
4 Conclusion
References
Novel Single Balancing Circuitry for Modular Cell for Electric Vehicle Applications
1 Introduction
2 Cell Balancing Strategy
3 Proposed Single Balancing Circuitry
3.1 Switched Capacitor Balancing Method
3.2 Flowchart of Balancing Algorithm
4 Simulation Results and Analysis
5 Conclusion and Future Scope
References
Classification of Big Data Using Spark Framework
1 Introduction
2 Related Work
3 Methodology
3.1 Spark Framework
3.2 Multinomial Logistic Algorithm
3.3 Multilayer Perceptron Model
4 Experimental Setup
5 Results
6 Concluding Remarks
References
Encryption and Authentication of Data Using the IPSEC Protocol
1 Introduction
2 Related Works
3 Description of the IPSEC Protocol Standard
4 Proposed DMVPN Solution
5 Conclusion
References
Location Privacy Protection in Mobile Wireless Networks Through Hidden Forest and Fog Computing
1 Introduction
2 Literature Review
3 Proposed Methodology (1) [Hidden Forest]
3.1 Hidden Forest
3.2 Density of Visible Lattice Points in Z2
3.3 The Traditional Method to Find Hidden Forests
3.4 The CRT Algorithm
3.5 An Algorithm to Construct a Hidden Forest Using CRT Algorithm
3.6 An Application: The N = 2 Cases
4 Proposed Methodology (2) [Fog Computing]
4.1 An Algorithm to Implement Fog Computing
4.2 Fog Computing Technology Applied into Hidden Forest
4.3 Final Coordinates Generated
5 Comparative Study
6 Results and Data sets
7 Conclusion and Future Scope
References
Design and Characterization of DC-to-DC Converters Using Active Inductor
1 Introduction
2 Active Inductors
3 Basic Active Inductor
4 Resistive Feedback Active Inductor
5 Regulated Cascade Active Inductor
6 Weng-Kuo Active Inductor
7 DC–DC Converters with Active Inductors
8 Result and Conclusion
References
Analysis of Dispersion Compensation Techniques Used in Optical Fiber Communication
1 Introduction
2 Theory
2.1 Simulation of Dispersion Compensation Techniques
3 Simulation Setup
4 Result and Discussion
4.1 Simulation Result of DCF and Their Different Schemes
4.2 Simulation Result of Dispersion Compensation Using Techniques FBG
5 Conclusion
References
MBFF for Power Reduction of an SoC Partition
1 Introduction
2 MBFF Implementation
3 Results and Discussion
4 Conclusion and Future Scope
References
Analysis and Enhancement of Biometric-Based Multi-Server Authentication Scheme Using Chebyshev Chaotic Map
1 Introduction
2 Related Works
3 Preliminaries
4 Review of Protocol [1]
5 Security Analysis of Protocol [1]
6 Modifications proposed in Protocol [1]
7 Performance comparisons
8 Conclusions
References
Characteristic Analysis and Pattern Recognition of Arc Sound Under Typical Penetration Status in Mig Welding
1 Introduction
2 Literature Review
3 Signal Collection
4 Wavelet de-Noising
5 Short-Time Windowing
6 Feature Extraction
7 Experimental Procedure
8 Results
9 Conclusions
References
A 0.48 mW High Performance 4-Bit Flash ADC for System-on-Chip Applications in 90 nm CMOS Technology
1 Introduction
2 Circuit Configuration
2.1 Threshold Inverter Quantizer (TIQ) Comparator
2.2 Wallace Tree Encoder
2.3 Multiplexer-Based Encoder
2.4 Proposed Design
3 Realization Measurement
4 Measurement Results
4.1 DNL and INL Analysis
4.2 Process Corner Analysis
5 Conclusion
References
Design of 4-Bit Multiplexer-Based Encoder for Analog to Digital Converter
1 Introduction
2 Multiplexer-Based Encoder
3 Simulation and Result
4 Conclusion
References
Design of a 4-Bit Wallace Tree Encoder for Flash ADC in 90 Nm CMOS Technology
1 Introduction
2 Wallace Tree Encoder
3 Simulation Results
4 Comparative Study
5 Conclusion
References
Opinion Mining of Restaurant Reviews and Comparison of Different Classifiers
1 Introduction
2 Related Work
3 System Architecture and Classification
3.1 Review Collection
3.2 Review Classification
3.3 Rating Calculation
4 Analysis and Comparison of Different Classifier Algorithms
5 Conclusion
References
A Novel Deployment Scheme to Enhance the Coverage in Wireless Sensor Network
1 Introduction
2 Related Work
3 Proposed Scheme
4 Simulation and Results
5 Conclusion
References
Fractional Frequency Reuse Scheme for Noise-Limited Cellular Networks
1 Introduction
1.1 System Model
1.2 Fractional Frequency Reuse(FFR)
2 Problem Formulation
2.1 Secrecy Outage Probability without FFR
2.2 Secrecy Outage Probability with FFR
3 Simulation and Results
4 Conclusion
5 Future Work
References
Real-Time Monitoring of PM2.5 with IoT
1 Introduction
2 Methodology
2.1 Flowchart
2.2 Diagram
2.3 Working
2.4 Calculation of Particulate Matter Concentration
2.5 Validation of Results
3 Comparative Study
4 Conclusion
References
FPGA Implementation of Digital Watermarking System for Robust Detection Using Discrete Wavelet Transform
1 Introduction
2 Literature Survey
3 DWT Mathematical Analysis
3.1 Block Diagram of Watermark Embedding Process
4 Architecture Flow of FPGA Implementation
4.1 Finite State Machine
5 Implementation of Haar Wavelet
5.1 Memory Allocation for Host and Watermark Images
5.2 First-Level DWT Decomposition of Host Image
5.3 First-Level DWT Decomposition of Watermark Image
5.4 Watermark Embedding Process
5.5 Inverse DWT for Host Image
6 Results and Discussion
6.1 Initialization of Clocking Wizard
6.2 Simulation of VGA Timing
6.3 Simulation of State Machine Timing and State Machine Transition
7 Conclusion
References
Smart Communication in Coal Mines
1 Introduction
2 Historical View of Communication on Coal Mines
3 Need for Voice Communication
4 Modern Means of Communication in Coal Mines
4.1 Extraction’s Method
4.2 Communication Techniques
5 Personal Emergency Device
6 Impact Tracking System and Its Core Components
6.1 Wi-Fi Access Points as a Readers
6.2 Zone Display Units
6.3 Collision Avoidance Systems
7 Conclusion
References
FPGA-Based Smart Irrigation System
1 Introduction
2 Significance of Irrigation
3 Methods of Irrigation
3.1 Channel System
3.2 Sprinkler System
3.3 Drip System
3.4 Smart Irrigation System
4 System Components
4.1 Soil Moisture Sensor
4.2 Temperature Sensor
4.3 Humidity Sensor
4.4 Field Module
4.5 Control Module
5 Conclusion
References
Smart Healthcare System Using IoT
1 Introduction
2 Related Work
3 System Overview
4 Architectural Details
4.1 Nordic nRF52832 Microcontroller
4.2 Sensor Network
4.3 Piezoelectric Buzzer
4.4 User Interface
4.5 Ambulance Tracking Device
5 Conclusion
References
Author Index

Proceedings of the Fourth International Conference on Microelectronics, Computing and Communication Systems: MCCS 2019
 9789811555459, 9789811555466

  • 0 0 0
  • Like this paper and download? You can publish your own PDF file online for free in a few minutes! Sign Up
File loading please wait...
Recommend Papers