The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We present the design and implementation of Scepter, a system with explicit infrastructure support to reduce energy consumption and improve battery life of mobile devices. Scepter focuses on effective techniques that can reduce the total number of bits transmitted to communicate the same information from a mobile device to a base station. Scepter combines multiple techniques into a single unified...
Mobile users often connect through WiFi access points and frequently find themselves behind NATs that are built into common off-the-shelf home access points or enterprise wireless deployments. Punching a hole through the NATs to establish a P2P connection can be a challenging task for lay users. We present our system, ANT, that utilizes Audio signaling for NAT Traversal. With ANT, unlike other NAT...
The CT scan medical imaging requires huge amount of computations for reconstructing the images. Modified Fast Radon Transform (MFRT) uses FFT based parallel algorithm for reconstruction of 2D/3D CT images from its sonogram data using convolution operation by concurrent 1D FFT/IFFT and matrix multiplications. To achieve optimum hardware utilization with low power consumption an FFT module, based on...
JPEG2000 image compression system consists of two main algorithms namely, discrete wavelet transform (DWT) and embedded block coding with optimized truncation (EBCOT). These algorithms are compute intensive and require efficient VLSI implementation for real time applications. Bit plane coder (BPC) and MQ coder are the two cores of the EBCOT algorithm. All processes to be executed by the MQ coder are...
This paper presents a design technique for multiple bit error correctable (fault tolerant) polynomial basis (PB) multipliers over GF(2m). These multipliers are the building blocks in certain types of cryptographic hardware, e.g. the Elliptic Curve Crypto systems (ECC). One of the drawbacks in the existing techniques is their inability to correct multiple bit errors at the outputs. Also, much attention...
In comparison to Random Overlay Networks, Semantic Overlay Networks are very efficient for category based content searches. However, problem arises when geographical locality is of interest in search ranking. We propose suitable measures to adapt SONs for spatial locality ranking of a search. We evolve GeoSONs that exploit the SON hierarchy in the search domain and are capable of different types of...
In this paper, we consider migration of virtual machines in a data center to minimize network power consumption. Network power is consumed when switches are turned on, and conserved when they are turned off; the optimization problem then is to site virtual machines within the data center to achieve connectivity and desired bandwidth while turning on as few switches as possible. Depending upon specifics...
Recently, there has been a tremendous growth in the number of installed distributed computing platforms such as those for content distribution networks, cloud computing infrastructures, and distributed data centers. Such distributed platforms need a scalable end-to-end (e2e) network monitoring component to provide Quality of Service (QoS) guarantees to the services and improve the overall performance...
An important aspect in understanding and classifying protein-protein interactions (PPI) is to analyze their interfaces in order to distinguish between transient and obligate complexes. We propose a classification approach to discriminate between these two types of complexes. Our approach has two important aspects. First, we have used desolvation energies - amino acid and atom type - of the residues...
Due to exponential behavior of gate-oxide leakage current with temperature and technology scaling, leakage power plays important role in nano - CMOS circuit. In this paper, we present simultaneous scheduling and binding algorithm for optimizing leakage current during behavioral synthesis. It uses TED (Taylor Expansion Diagram) for generating optimized DFG (Data Flow Graph). Once DFG is obtained, it...
In this paper, a novel methodology, based on discrete wavelet transform (DWT) is developed for extraction of characteristic features from twelve - lead Electrocardiogram recordings. The first step of this method is to denoise the signal using DWT technique. A multiresolution approach along with thresholding is used for the detection of R - Peaks in each cardiac beats. Followed, by this other fiducial...
This paper presents Loading Status for all Branches in chronological order at different Conditions in Radial Distribution Systems using Reactive Loading Index. Although under different loading conditions for all the branches the identified weakest branch remains same but the corresponding loading at different branches in chronological order has been categorically identified for different values other...
In this paper a high frequency low voltage low power tunable highly linear transconductor is presented. Shift level biasing is used at the inputs of both the amplifiers of a cross coupled differential pair for tuning. Bias currents of cross coupled differential amplifiers are adjusted to cancel third harmonic distortion. The proposed circuit is simulated in Cadence VIRTUOSO environment with UMC 0...
Low-k1 lithography results in features that suffer from poor lithographic yield in the presence of process variation. The problem is especially pronounced for lower level metals used for local routing, where bi-directionality gives rise to lithography unfriendly layout patterns. However, one can modify such wires without significantly affecting design behavior. In this paper, we propose to simultaneously...
Energy efficient communication in mobile ad hoc networks (MANET) is a very stringent issue due to the power-constraint in each mobile node. Thus designing a suitable energy efficient multicast routing protocol for optimum use of existing power and to render good system performance simultaneously is a real challenge. In this paper, we proposed a routing algorithm for multicasting that ensures efficient...
Development of novel high energy diode pumped solid state lasers is necessary for various large-scale projects in laser-plasma research. Once available and technically mature, these new lasers are expected to benefit many other applications as well.
Embedded block coding with optimized truncation (EBCOT) is a key algorithm in JPEG 2000 image compression system. In this algorithm, output generated by the bit plane coder (BPC) is supplied to an MQ coder. Though several high speed BPC architectures are available, overall performance EBCOT algorithm is getting restricted by the speed of an MQ coder. Therefore, we propose a high speed, area efficient...
We study the problem of distributed scheduling in wireless networks, where each node makes individual scheduling decisions based on heterogeneously delayed network state information (NSI). This leads to inconsistency in the views of the network across nodes, which, coupled with interference, makes it challenging to schedule for high throughputs. We characterize the network throughput region for this...
Concurrent error detection and correction is an effective way to mitigate fault attacks in cryptographic hardware. Recent work on differential power analysis shows that even mathematically-secure cryptographic protocols may be vulnerable at the physical implementation level. By measuring energy consumed by a working digital circuit, it is possible to gain valuable information about the encryption...
In this paper, we propose a novel robust unsupervised image content understanding approach that segments an image into its constituent parts automatically. The aim of this algorithm is to produce precise segmentation of images using intensity information along with neighbourhood relationships. Here, automatic hierarchical discovery of classes or clusters in images takes place rather than generating...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.