International Conference On Progressive Research In Applied Sciences, Engineering And Technology (ICPRASET 2K18)
(Volume-8)

ECE

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Obfuscating Dsp Circits via High Level Transformations
Country
::
India
Authors
::
Angel Priya || S.Lakshmi
Page
::
01-06

To Design Obfuscated Circuits For Digital Signal Processing (DSP) Applications Using High-Level Transformations, A Key-Based Obfuscating Finite-State Machine (FSM), And A Reconfigurator. The Goal Is To Design DSP Circuits That Are Harder To Reverse Engineer. High-Level Transformations Of Iterative Data- Flow Graphs Have Been Exploited For Area-Speed-Power Tradeoffs. This Is The First Attempt To Develop A Design Flow To Apply High-Level Transformations That Not Only Meet These Tradeoffs, But Also Simultaneously Obfuscate The Architectures Both Structurally And Functionally. Several Modes Of Operations Are Introduced For Obfuscation Where The Outputs Are Meaningful From A Signal Processing Point Of View, But Are Functionally Incorrect..........

 

Keywords: - Digital Signal Processing (DSP), Functional Obfuscation, Hardware Security, High-Level Transformations, Intellectual Property (IP) Protection, Obfuscation, Reconfigurable Design, Structural Obfuscation.

[1] R. S. Chakraborty And S. Bhunia, "RTL Hardware IP Protection Using Key-Based Control And Data flow Obfuscation," In Proc. 23rd Int. Conf. VLSI Design, Jan. 2010, Pp. 405–410.
[2] R. S. Chakraborty And S. Bhunia, "HARPOON: An Obfuscationbasedsoc Design Methodology For Hardware Protection," IEEE Trans. Comput.-Aided Design Integr. Circuits Syst., Vol. 28, No. 10, Pp. 1493–1502, Oct. 2009.
[3] R. S. Chakraborty And S. Bhunia, "Hardware Protection And Authentication Through Netlist Level Obfuscation," In Proc. Int.
Conf. Comput.-Aided Design, Nov. 2008, Pp. 674–677
[4] W. P. Griffin, A. Raghunathan, And K. Roy, "CLIP: Circuit Level IC Protection Through Direct Injection Of Process Variations,"
IEEE Trans. Very Large Scale Integr. (VLSI) Syst., Vol. 20, No. 5, Pp. 791–803, May 2012.
[5] F. Koushanfar And Y. Alkabani, "Provably Secure Obfuscation Of Diverse Watermarks For Sequential Circuits," In Proc. Int.
Symp.Hardw.-Oriented Security Trust, Jun. 2010, Pp. 42–47.

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Gradient Differencing Based Traffic Density Estimation for Intelligent Traffic Control System
Country
::
india
Authors
::
P.Jeya Stella || N.Senthil Kumar
Page
::
07-13

The Project Presents Traffic Congestion Avoidance System Based On Traffic Density Estimation Using Image Processing Algorithms Such As Background Subtraction, Otsu Thresholding And Mathematical Morphology. Traffic Congestion Has Become A Major Problem In Every Large City Of The World. To Ensure A Reliable Transportation System It Is Important To Have An Intelligent Traffic Control System. So Image Processing Techniques Are More Reliable And Promising One For This Smart Control System. Here Two Different Methods Based Object Detection Will Be Performed Which Are Gradient Detection And Direct Image Subtraction............


Keywords: - Hardcoded Versus Intelligent Traffic Control, Junction Traffic Simulation, Reduced Traffic Congestion; Signal Control, Switching Algorithm Traffic Density Calculation, Video And Image Processing.

[1] Matlab Image Processing And Video Processing Toolbox Http://Www.Mathworks.In/Products/Image/
[2] Image Subtraction Technique From Matlab
[3] Http://Www.Mathworks.In/Help/Images/Ref/Imsubtract.Html
[4] Automatic Traffic Density Estimation And Vehicle Classification For Traffic Surveillance Systems Using Neural
Networks.Mcajournal.Cbu.Edu.Tr/Volume14/Vol14No3p187.Pdf
[5] Khekare, G.S.; Sakhare, A.V., "A Smart City Framework For Intelligent Traffic System Using VANET," Automation, Computing,
Communication, Control And Compressed Sensing (Imac4s), 2013 International Multi-Conference On , Vol., No., Pp.302,305, 22-23 March 2013

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
VLSI Implementation of Rsa Encryption and Decryption Method Using Montgomery Modular Multiplier
Country
::
India
Authors
::
K.Geetha Devi || Dr.V.R.Vijaykumar
Page
::
14-18

The Rivest Shamir And Adleman (Rsa) Encryption And Decryption Algorithm Is Used The Performance In Popular Public Key Cryptosystem For Mutual Authenticate.The Main Step Used In The Algorithm Is Modular Exponentiation Which Can Be Done By A Sequence Of Modular Multiplication. The Modular Multiplication Is The Major Factor, In Many Crypto Systems,The Rsa Two-Key System And In The Proposed Digital Signature Standard Dss. One Of The Most Efficient Algorithm Of Modular Multiplication Is The Montgomery Multiplication.Modified Radix-4 Modular Multiplication Was Developed Based On Montgomery Multiplication Technique.Carry Select Adder With Technique Of Scg, Fsc, Hsg To Avoid, Carry Propagation, Delay, And Also Reduced The Area, Which Present A Very Fast Algorithm Was Presented And Used For Computing Modular Reduction.Minimized Of Power, Delay And Area.Vlsi Design Of A Configurable Rsa Public Key Cryptosystem Supporting The 1024-Bit Based On Montgomery Algorithm Achieving Comparable Clock Cycles Of Current Relevant Works But With Smaller Die Size.

 

Keywords: - Decryption,Encryption,Carry Select Adder,Montgomery Multiplier,Mutual Authentication.

[1] T. Blum And C. Paar,(2001), 'High-Radix Rsa Montgomery Modular Exponentiation On Reconfigurable Hardware'vol.5, No. 7,
Pp-70-77.
[2] V. Bunimov, M. Schimmler, And B. Tolg,(2002) 'A Complexity-Effective Version Of Montgomery's Algorihm' Vol.15,No.16,Pp-
71-81.
[3] S.-R. Kuang, J.-P. Wang, K.-C. Chang, And H.-W. Hsu,(2013) 'Energy-Efficient High-Throughput Montgomery Modular
Multipliers For Rsa Cryptosystems' Vol.8,No.2,Pp-25-37.
[4] C. Mcivor, M. Mcloone, And J. V. Mccanny, (2004),'Modified Montgomery Modular Multiplication And Rsa Exponentiation
Techniques' Vol.8,No.2,Pp-29-38.
[5] Miyamoto, N. Homma, T. Aoki, And A. Satoh,(2011), 'Systematic Design Of Rsa Processors Based On High-Radix Montgomery
Multipliers' Vol.4,No.4,Pp-367-371.

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Detection and Segmentation of Tumor and Edema of a Brain Using Artificial Neural Network
Country
::
India
Authors
::
Ilaiyaraja S || Ruth Darthi M || Snega R || Vaishnavi R
Page
::
19-25

Brain Tumor Segmentation In Magnetic Resonance Imaging (Mri) Is Considered A Complex Procedure Because Of The Variability Of Tumor Shapes And The Complexity Of Determining The Tumor Location, Size, And Texture. In This Paper, A Method For Fully Automated Segmentation And Classification Of Brain Tumor With No User Intervention Has Been Developed. Here We Propose Morphological Level Sets Segmentation To Isolate Tumor, White Matter, Grey Matter And Edema Regions. Initially Input Image Is Pre- Processed Using Edge Preserved Anisotropic Diffusion Filter Which Evolves Using Orientation Driven Edge Preserved Smoothening Operations. This Intensity Normalized Image Set Is Capable Of Level Set Functions, I.E., The Interface Of A Level Set Function Can Either Expand Or Shrink Toward The Object Boundary. Finally Shape And Texture Feature Attributes Are Extracted For Neural Network Classification.

 

Keywords - Anisotropic Diffusion Filter , Brain Tumor , Edge Preserved Smoothing Operations, Magnetic Resonance Image (Mri), , Morphological Level Sets Segmentation.

[1] D. D. Langleben And G. M. Segall, "Pet In Differentiation Of Recurrent Brain Tumor From Radiation Injury," J. Nucl. Med., Vol.
41, Pp. 1861–1867 , 2000.
[2] A. Demirhan And ˙I. Guler,¨ "Image Segmentation Using Self-Organizing Maps And Gray Level Co-Occurrence Matrices," J. Fac. Eng. Arch. Gazi Univ., Vol. 25, No. 2, Pp. 285–291, 2010.
[3] M. Kaus, S. K. Warfield, F. A. Jolesz, And R. Kikinis, "Adaptive Template Moderated Brain Tumor Segmentation In Mri," In Proc. Bildverarbeitung Fur¨ Die Medizin, 1999, Pp. 102–106.
[4] H.-H. Chang, D. J. Valentino, G. R. Duckwiler, And A. W. Toga, "Segmentation Of Brain Mr Images Using A Charged Fluid
Model," Ieee Trans. Biomed. Eng., Vol. 54, No. 10, Pp. 1798–1813, Oct. 2007.
[5] J. J. Corso, E. Sharon, S. Dube, S. El-Saden, U. Sinha, And A. Yuille, "Efficient Multilevel Brain Tumor Segmentation With
Integrated Bayesian Model Classification," Ieeetrans.Med. Imag., Vol. 27, No. 5, Pp. 629–640, May 2008.

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
A Novel Quadrature Spatial Modulation Based On Interleave MIMO Cognitive Radio Systems
Country
::
India
Authors
::
Kanimozhi.R || Anandan .R
Page
::
26-31

Quadrature Spatial Modulation (QSM) Is A High Spectral Efficiency Multiple-Input Multiple Output (MIMO) Technique Used To Improve The Spectral Efficiency Of Wireless Communication Systems. The Main Concept Of QSM Is To Extend The Spatial Constellation Of Conventional Spatial Modulation (SM) In Both Inphase And Quadrature Components Of The Data Symbol. In This Paper QSM-Based On Interleave Division Multiplexing (IDM) Has Not Been Introduced In The Literature As A Multiple Antenna System, So We Introduced A Novel Scheme Which Is Called QSM-IDM. The Antenna Sets Are Also Applied To A Spreader Before Using Them To Assign An Antenna Number For Information Transmission................

 

Keywords - Interleaver Division Multiplexing (IDM) - Multiple Input Multiple Output (MIMO) – Spatial Modulation (SM) - Quadrature Spatial Modulation (QSM)

[1] M. Di Renzo, H. Haas, A. Ghrayeb, S. Sugiura, And L. Hanzo, "Spatial Modulation For Generalized MIMO: Challenges,
Opportunities, And Implementation," Proc. Of The IEEE, Vol. 102, No. 1, Pp. 56–103, Jan. 2014.
[2] J. Jeganathan, A. Ghrayeb, L. Szczecinski, And A. Ceron, "Space Shift Keying Modulation For MIMO Channels," IEEE Trans.
Wireless Commun., Vol. 8, No. 7, Pp. 3692–3703, Jul. 2009.
[3] R. Mesleh, H. Haas, S. Sinanovi´C, C. W. Ahn, And S. Yun, "Spatial Modulation," IEEE Trans. On Veh. Tech., Vol. 57, No. 4, Pp. 2228 – 2241, Jul. 2008.
[4] J. Jeganathan, A. Ghrayeb, And L. Szczecinski, "Spatial Modulation: Optimal Detection And Performance Analysis," IEEE
Commun. Lett., Vol. 12, No. 8, Pp. 545–547, Aug. 2008.
[5] A. Stavridis, S. Sinanovic, M. Di Renzo And H. Haas, "Energy Evaluation Of Spatial Modulation At A Multi-Antenna Base
Station," In IEEE 78th Vehicular Technology Conference (VTC Fall), 2013, Las Vegas, NV, 2013, Pp. 1-5.

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
High Performance Flex Ray Communication Controller for Fpga -Based Automated System
Country
::
India
Authors
::
Merlin Metilda.G || B. Hemalatha
Page
::
32-36

In Recent Most Advanced Applications We Can Use The Benefit From Tight Coupling Of The Embedded Computing Units With The Communication Interface, Thereby Providing Functionality Beyond The Flex Ray Standard. Such An Approach Is Highly Suited To Implementation On Reconfigurable Architectures. In This Paper We Presents Highly Pipelined Fsm Based Flex Relay Protocol That Consists Of A Reconfigurable Processing Module, Including Reconfigurable Compute Units And Output Control Logic, Cam Memory Units, And Peripheral Circuits. Flex Ray Communication Controller (Cc) Which Integrates Configurable Extensions That Augment The Cc's Capabilities Beyond Those Defined By The Flex Ray Standard. The Main Core Comprises Of Protocol Engine (Pe) Which Implements The Protocol Behavior, And The Controller Host Interface (Chi) Which Interfaces To The Host Ecu............


Key words: - Functional Obfuscation, Hardware Security, High-Level Transformations, Intellectual Property (Ip) Protection, Obfuscation, Reconfigurable Design, Structural Obfuscation.

[1] S. Chakraborty, M. Lukasiewycz, C. Buckl, S. Fahmy, N. Chang, S. Park, Y.Kim, P. Leteinturier, And H. Adlkofer, "Embedded
Systems And Software Challenges In Electric Vehicles," In Proc. Design, Automation And Test In Europe (Date) Conference,
2012.
[2] S. Shreejith, S. A. Fahmy, And M. Lukasiewycz, "Reconfigurable Computing In Next-Generation Automotive Networks," Ieee
Embedded Systems Letters, Vol. 5, No. 1, Pp. 12–15, 2013.
[3] I. Sheikh, M. Hanif, And M. Short, "Improving Information Throughput And Transmission Predictability In Controller Area
Networks," In Proc. International Symposium On Industrial Electronics (Isie). Ieee, 2010, Pp. 1736–1741. [
[4] J. K ¨ Otz And S. Poledna., "Making Flexray A Reality In A Premium Car," In Proc. Of The Sae International, 2008. [5]. Flexray
Communications System, Protocol Specification Version 2.1 Revision A, Flexray Consortium Std., December 2005.

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Retinal Disease Screening Through Local Binary Patterns
Country
::
India
Authors
::
S.Nandhini || J.Sudhakar
Page
::
37-42

Exudates That Appears As Bright Yellow Or White Lesions In Color Fundus Images, Is An Important Symptom Of Diabetic Retinopathy. In This Paper, An Efficient Image Based Method For The Automatic Detection Of Exudates, Is Presented And Validated. To Identify The Exudates, The Proposed Approach Performs A Hierarchical Correlation Clustering On The Input Retinal Images. Ten Different Features, Based On Dynamic Shape, Colour, Contrast And Brightness, Are Extracted For Each Patient Segment. Based On The Values Of The Feature Vectors, Each Patient Segment Is Categorized As Mild, Moderate And Severe Using Random Forest (Rf) Classifier. The Proposed Matlab App. Is Validated On Per-Image Basis Using Four Different Publicly Available Databanks................

 

Keywords - Color Fundus Images, Diabetic Retinopathy, Exudates, Lesions, Random Forest Classifier.

[1] Luca Giancardo, "Quality Analysis Of Retina Images For The Automatic Diagnosis Of Diabetic Retinopathy",
Http://Gradvibot.Ubourgogne.Fr/Thesis1/Giancardo_Luca.Pd
[2] R. Klein, B. Klein, S. Moss, M. Davis, And D. Demets, "The Wisconsin Epidemiologic Study Of Diabetic Retinopathy", Arch.
Ophthalmology, Vol. 102, No. 4, 1984 Pp. 520–526.
[3] Kempen Jh, O'colmain Bj, Leske Mc, Et Al., Arch Ophthalmol (2004), Pp. 552–563.
[4] D. Klein, B. E. Klein, S. E. Moss Et Al, "The Wisconsin Epidemiologic Study Of Diabetic Retinopathy", Ophthalmol., Vol. 94,
1986, Pp. 1389–1400.
[5] S.R. Salomao. R.K.H. Mitsuhiro, And R. B.Jr., "Visual Impairment And Blindness: An Overview Of Prevalence And Cause In
Brazil," Anals Of The Brazilian Academy Of Sciences, Vol. 81. Pp. 539-549, 2009.

 

EEE

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
A Sign Language To Text Or Speech For Deaf And Dumb
Country
::
India
Authors
::
Ms.S.R.AKSHAYA, M.E || Rakshana.R || Gayathri.K || Porkodi.M
Page
::
43-48

This is an approach for designing and implementing a smart glove for deaf and dumb people. There have been several researches done in order to find an easier way for non-vocal people to communicate with vocal people and express themselves to the hearing world. This research aims to develop a sign to English languagetranslator based on smart glove interfaced wirelessly with micro controller and text/voice presenting devices. An approach has been developed and programmed to display English text. In this system is focused with the objective of reducing the communication gap between the normal people and vocally disabled. The whole system has been implemented, programmed, cased and tested with very good results.

 

Keywords- Smart glove, sign language, gesture recognition.

[1]. Starner T. and Pentland, A., "Visual recognition of American Sign Language using hidden Markov models," in Proceedings of the International Workshop on Automatic Face and Gesture Recognition, 1995.
[2]. Starner, T., Weaver, J., and Pentland, A., "Real-time American Sign Language recognition using desk and wearable computer based video," IEEE Transactions onPattern Analysis and Machine Intelligence, vol. 20, no. 12, pp. 1371-1375, 1998.
[3]. Bauer, B., Hienz, H., and Kraiss, K., "Video-based continuous sign language recognition using statistical methods," in ICPR 2000, pp. 463466, Vol II.
[4]. Bauer, B., Hienz, H., and Kraiss, K., "Video-based continuous sign language recognition using statistical methods," in ICPR 2000, pp. 463466, Vol II.
[5]. Brashear, H., Park, K.-H., Lee, S., Henderson, V., Hamilton, H., and Starner, T., "American Sign Language recognition in game development for deafchildren," in ASSETS 06, (New York, NY, USA), pp. 79-86, 2006.

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Smart Security Solution For Women Using IOT
Country
::
India
Authors
::
D.Mani Megalai || U.Leena Agaliya || K.Aarthi
Page
::
49-53

In the light of recent outrage in Delhi which shook the nation and woke us to the safety issues for women, people are finding up in different ways to defend. Here we introduce a device which ensures the protection of women. This helps to identify protect and call on resources to help the one out of dangerous situations. Anytime you senses danger, all you had to do, is hold on the button of the device. The device consists of a PIC microcontroller, GSM module, GPS modules. The system resembles a normal watch which when activated, tracks the place of the women using GPS (Global Positioning System) and sends emergency messages using GSM (Global System for Mobile communication), to contacts and the police control room. The main advantage of this system is that the user does not require a Smartphone unlike other applications that have been developed earlier. The use of sophisticated components ensures accuracy and makes it reliable. The GSM and GPS are presented in IOT modem itself.

 

Keywords - EMG Sensor, pepper spray, IOT modem, Shock sensor.

[1]. Tamil selvan, K.S, Murugesan, G, and Ashok, V. ―Embedded system based Smart Conveyor belt Security system for textile and Dyeing Industries‖, International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 6, No. 7, pp, 148-152, 2016
[2]. V.Ashok,P.P.Janarthanan, Mohana Sundaram," Certain Investigation on EC-A Algorithm for Energy Minimization in
Multiprocessor Systems", Journal of Advanced Research in Dynamical and Control Systems Vol. 9. Sp– 6, 2017
[3]. Alexandrous Plantelopoulous Nikolaos G. Bourbakis "A Survey on Wearable sensor based system for healthmonitoring and prognosis" IEEE Transaction on system Man and Cybernetics</em>vol.40 no. 1 January 2010.
[4]. Palve Pramod "GPS Based Advanced Soldier Tracking With Emergency Messages & Communication System" <em>International Journal of Advance Research in Computer Scienceand Management Studies Research Article</em> vol. 2 no. 6 June 2017.
[5]. Hock Beng Lim "A Soldier Heath Monitoring System forMilitaryApplications"<em>International Conference on Body Sensor
Networks Vol.2.15 April, 2016.

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
DFIG Based Wind Flicker Mitigation By Controlling Reactive Power
Country
::
India
Authors
::
M.Sathish || K.Senthamizhselvan || J.Vivek || M.Tamizharasan
Page
::
54-65

Upon the connection of wind generators (WGs) to distribution grids, significant flicker emission can appear, due to the low X/R ratios and low short-circuit levels at the points of connection. This paper proposes a reactive-power-based control scheme that aims for accurate cancellation of voltage flicker resulting from the grid connection of DFIG-based wind power. The control scheme operation is based on constructing the two-bus equivalent network of the detailed power system, via local measurements of voltage and active and reactive power flows at the DFIG terminals............. 

 

Keywords - DFIG, distributed generation, flicker, power quality, reactive power control, wind power.

[1] L. Sheng-yen, W. Li, K. Shun-chin, and C. hao Chang, "Evaluation of measured power quality results of a wind farm connected to Taiwan power system," IEEE Trans. on Ind. Appl., vol. 52, no. 1, pp. 42–49, Jan. – Feb. 2016.
[2] F. D. Kanellos and N. Hatziargyriou, "The effect of variable-speed wind turbines on the operation of weak distribution networks," IEEE Trans.