Performance Analysis of a Priority Based Buffer-Aided Relaying
Research Paper | Journal Paper
Vol.7 , Issue.6 , pp.1006-1011, Jun-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i6.10061011
Abstract
Wireless Body Area Network (WBAN) is a collection of low power sensing devices which are either implant inside human body or on-body devices. This network helps to transmit vital parameters of body over wireless network to the remote server. Among different categories of body parameters some of are supposed to be vital and required to transmit faster than others, so that necessary actions can be made in time. In this paper we have studied various literatures on conventional WBAN, IoT based WBAN, Buffer-Aided Relaying Frame work etc. and proposed a model to handle priority based on-body sensor data(e.g. Heart Rate Data, Blood Sugar Data and EEG data) along with relaying node with buffer. The priority level is analyzed by a priority analyzer node. This model is simulated using Java Modelling Tool (JMT) and various performance matrices like Response Time, Throughput, Queue Time, Utilization, etc. are analyzed in terms of simulation graphs. Our model out performs for prioritized data than the non-prioritized data as represented in the result section.
Key-Words / Index Term
WBAN, Relay-Buffer, QoS, Throughput, Response Time
References
[1] G. Cai, Y. Fang, J. Wen, G. Han and X. Yang, “QoS- Aware Buffer-Aided Relaying Implant WBAN for Helthcare IoT: Opportunities and Challenges”, arXiv:1902.04443v1 [cs.NI], Ithaca,New York, USA, pp.1-8, 2019.
[2] H. Pervaiz, M. A. Imran, S. Mumtaz, A. Dulaimi and N. Thomos, “Editorial: Spectrom Extensions for 5G and Beyond 5G Networks”, Trans Emerging Tel. Tech., Vol. 29, no. 30, pp. e3519, Oct. 2018
[3] IEEE Standard for Local and Metropolitan Area Networks-Part 15.6: Wireless Body Area Networks, IEEE Std. 802.15.6-2012, 2012.
[4] A. K. Teshome, B. Kibret, and T. H. Lai, “A Review of Implant Communication Technology in WBAN: Progresses and Challenges”, IEEE Reviews in Biomedical Engineering, Vol. 99, no. PP, pp.1-13, Jun. 2018.
[5] A. Samanta and S.Misra, “Dynamic Connectivity Establishment and Cooperative Scheduling for QoS-aware Wireless Body Area Networks”, IEEE Transaction on Mobile Computing, Vol. 99, no. PP, pp. 1-14, March, 2018
[6] Y. Liao, M. S. Leeson, M. D. Higgins, C. Bai “An Incremental Relay Based Cooperative Routing Protocol for Wireless In-body Sensor Networks”, In the Proceedings of the 2016 IEEE 12th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), New York , USA, pp.1-6, 2016. ISBN No.:978-1-5090-0725-7.
[7] P. Singh, A. Jasuja “IoT Based Low-Cost Distant Patient ECG Monitoring System”, 2017 International Conference on Comuting, Communication and Automation(ICCCA 2017), Greater Noida, India, pp.1-5, 2017. ISBN No. 978-1-5090-6472-4
[8] A. Strielkina, V. Kharchenko and D. Uzun “A markov Model of Helthcare Internet of Things System Considering Failures of Components”, ICT based Conference in Education, Research and Industrial Applications Intigrations, Harmonization and Knowledge Transfer, Kyiv Ukraine, pp.530-543, 2018.
[9] S. N. Shah and R. H. Jhaveri “Recent Research on Wireless Body Area Networks: A Survey”, International Journal of Computer Applications (0975-8887), Vol.142, Issue.11, pp.42-48, 2016.
[10] F. Wu, T. Wu and M. R. Yuce “An Internet-of-Things(IoT) Network System for Connected Safety and Health Monitoring Applications”, sensors,MDPI, Vol.19(1), Issue.21, 2018.
[11] L. He, J. Li, W. Lu and J. Huang “A Cloud-Based WBAN System for Health Management”, International Conference on eBussiness, eCommerce, eManagement, eLearning and eGovernance 2015 (IC5E 2015), London,England, pp.1-10, 2015.
[12] A. Meharouech, J. Elias and A. Mehaoua “Moving Towards Body-to-Body Sensor Networks for Ubiquitous Applications: A Survey”, Journal of Sensor and Actuator Networks,MDPI, Vol.8(2), Issue.27, 2019.
[13] A. Thapa and S. Shin, “QoS Provisioning in Wireless Body Area Networks: A review on MAC Aspects”, KSII Transactions on Internet and Information Systems, Vol.6, Issue.5, pp.1267-1285, 2012.
[14] Y. Liao, M. Leeson, M. Higgins, and C. Bai, “Analysis of in-to-out wireless body area network systems: towards QoS-aware health Internet of things applications,” Electronics, vol. 5, issue. 4, pp. 38, 2016
Citation
S. P. Swain, P. K. Swain, "Performance Analysis of a Priority Based Buffer-Aided Relaying," International Journal of Computer Sciences and Engineering, Vol.7, Issue.6, pp.1006-1011, 2019.
An Effective approach of Data Migration from Private to Public cloud using E-LSB with Improvisation Technique
Research Paper | Journal Paper
Vol.7 , Issue.6 , pp.1012-1015, Jun-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i6.10121015
Abstract
Cloud computing has recently became a most important and mainly discussed topic in the Technological industry. Almost all organizations use the Cloud, because it provides an easy and cost efficient way of using applications,which provides scalability for various systems. Still, it is not clear upto now how and when cloud computing should be used and where actually to be implemented. Existing applications are often written in such a way that it actually does not really fit a cloud environment well. Also, certain quality attributes like performance, security or portability integrity scalability network issues can be affected. Much more studies are actually needed on how existing systems should be used into the Cloud so that it can be transferred and it is checked what are the consequences of the migration. So in the proposed system we have developed an approach for enhancing the security of the data while migrating data on the cloud environment with the help of Cryptography and Stegnographic approach. In this mechanism, data is first entered or uploaded into the system and migrated on cloud.
Key-Words / Index Term
cloud computing, public cloud platform, migration
References
[1] Mr. Shrikant D. Bhopale,"Cloud Migration Benefits and Its Challenges Issue", IOSR Journal of Computer Engineering (IOSR-JCE) ISSN : 2278-0661, ISBN : 2278-8727, PP : 40-45
[2] Neetu Kishore and Seema Sharma,"Secured Data Migration from Enterprise to Cloud Storage – Analytical Survey",BIJIT -BVICAM’s International Journal of Information Technology Bharati Vidyapeeth’s Institute of Computer Applications and Management (BVICAM), New Delhi (INDIA)
[3] Rabi Prasad Padhy, Manas Ranjan Patra,Suresh Chandra Satapathy, "Cloud Computing: Security Issues and Research Challenges", IRACST - International Journal of Computer Science and Information Technology & Security (IJCSITS) ,Vol. 1, No. 2, December 2011
[4] Shyamli Dewan, Devendra Kumar, Sandeep Gonnade,"Secure Data Migration across Cloud System Using Third Party Auditor (TPA)", International Journal of Innovative Research in Science, Engineering and Technology, Vol. 4, Issue 6, June 2015
[5] Noor Ibrahim Hussein, Mervat Hashem,"Security Migration Requirements: From Legacy System to Cloud and from Cloud to Cloud", 2nd International Symposium on Computer, Communication, Control and Automation (3CA 2013)
[6] Sultan Ullah,Zheng Xuefeng, "Cloud Computing Research Challenges", 2013
[7] Prashant Pant, Sanjeev Thakur,"Data Migration Across The Clouds", International Journal of Soft Computing and Engineering (IJSCE), ISSN: 2231-2307, Volume-3, Issue-2, May 2013
[8] Wei Hao, I-Ling Yen and Bhavani Thuraisingham,"Dynamic Service and Data Migration in the Clouds", 2009 33rd Annual IEEE International Computer Software and Applications Conference
[9] Rashmi Rao, Pawan Prakash, "Improving security for data migration in cloud computing using randomized encryption technique", IOSR Journal of Computer Engineering (IOSR-JCE), ISSN: 2278-8727Volume 11, Issue 6
[10] Rajeshri Vaidya, and Prof. Sumedh Pundkar,"Large Data migration within Cloud Environments using Compression and Encryption Technique", International Journal of Innovative and Emerging Research in Engineering, Volume 2, Issue 2, 2015
[11] Mohammad Manzurul Islam, Sarwar Morshed and Parijat Goswami,"Cloud Computing: A Survey on its limitations and Potential Solutions", IJCSI International Journal of Computer Science Issues, Vol. 10, Issue 4, No 2, July 2013
Citation
Pallavi, Dinesh Kumar, "An Effective approach of Data Migration from Private to Public cloud using E-LSB with Improvisation Technique," International Journal of Computer Sciences and Engineering, Vol.7, Issue.6, pp.1012-1015, 2019.
Review Paper on Massive MIMO Systems with Channel State Information
Review Paper | Journal Paper
Vol.7 , Issue.6 , pp.1016-1021, Jun-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i6.10161021
Abstract
In a cellular network, the demand for high throughput and reliable transmission is increasing in large scale. One of the architectures proposed for 5G wireless communication to satisfy the demand is Massive MIMO system. The massive system is equipped with the large array of antennas at the Base Station (BS) serving multiple single antenna users simultaneously i.e., number of BS antennas are typically more compared to the number of users in a cell. The advantages of massive MIMO can be achieved only if Channel State Information (CSI) is known at BS uplink and downlink operate on orthogonal channels - TDD and FDD modes. Depending on slow/fast channel fading conditions, several authors suggested adaptive LMS, RLS and NLMS based channel estimators, which either require statistical information of the channel or are not efficient enough in terms of performance or computations. In order to overcome the above effects, the work focuses on the QR-RLS based channel estimation method for cell free Massive MIMO systems.
Key-Words / Index Term
Massive MIMO, Channel State Information, Square Root-Recursive Least Square (QR-RLS)
References
[1] Pilot Contamination Mitigation Technique over Weibull Fading in Massive MIMO System”, 2nd International Conference on Inventive Communication and Computational Technologies (ICICCT), IEEE 2018.
[2] Kai Liu, Cheng Tao, Liu Liu, Tao Zhou and Yinsheng Liu, “Asymptotic Analysis for Low Resolution Massive MIMO Systems with MMSE Receiver”, China Communication, IEEE 2018.
[3] Ali Bulut and Ali Ozg Yılmaz, “Oversampling in One-Bit Quantized Massive MIMO Systems and Performance Analysis”, Transactions on Wireless Communications, Vol. 12, Issue 07, IEEE 2018.
[4] Dhanushka Kudathanthirige and Gayan Amarasuriya, “Massive MIMO NOMA Downlink”, International Conference of IEEE 2018.
[5] I. Ahmed, H. Khammari, A. Shahid, A. Musa, K. S. Kim, E. D. Poorter, and I. Moerman, “A survey on hybrid beamforming techniques in 5G: Architecture and system model perspectives,” IEEE Communications Surveys and Tutorials, vol. 20, no. 4, pp. 3060–3097, Fourth quarter 2018.
[6] H. Q. Ngo A. Ashikhmin H. Yang E. G. Larsson T. L. Marzetta "Cell-free massive MIMO versus small cells" IEEE Trans. Wireless Commun. vol. 16 no. 3 pp. 1834-1850 Mar. 2017.
[7] Huang A. Burr "Compute-and-forward in cell-free massive MIMO: Great performance with low backhaul load" Proc. IEEE Int. Conf. Commun. (ICC) pp. 601-606 May 2017.
[8] A. F. Molisch, V. V. Ratnam, S. Han, Z. Li, S. L. H. Nguyen, L. Li, and K. Haneda, “Hybrid beamforming for massive MIMO: A survey,” IEEE Comm. Mag., vol. 55, no. 9, pp. 134–141, 2017.
[9] F. Sohrabi and W. Yu, “Hybrid digital and analog beamforming design for large-scale antenna arrays,” IEEE Journal of Selected Topics in Signal Processing, vol. 10, no. 3, pp. 501–513, April 2016.
[10] M. Liu, Y. andElkashlan, Z. Ding, and G. K. Karagiannidis, “Fairness of User Clustering in MIMO Non-Orthogonal Multiple Access Systems,” IEEE Commun. Lett., vol. 20, no. 7, pp. 1465–1468, Jul. 2016.
[11] Z. Ding and H. V. Poor, “Design of Massive-MIMO-NOMA With Limited Feedback,” IEEE Signal Process. Lett., vol. 23, no. 5, pp. 629– 633, May 2016.
[12] H. Q. Ngo A. Ashikhmin H. Yang E. G. Larsson T. L. Marzetta "Cell-free massive MIMO: Uniformly great service for everyone" Proc. IEEE Int. Workshop Signal Process. Adv. Wireless Commun. (SPAWC) pp. 201-205 Jun. 2015
[13] E. Nayebi A. Ashikhmin T. L. Marzetta H. Yang "Cell-free massive MIMO systems" Proc. 49th Asilomar Conf. Signals Syst. Comput. pp. 695-699 Nov. 2015.
[14] L. Lu, G. Y. Li, A. L. Swindlehurst, A. Ashikhmin, and R. Zhang, “An overview of massive MIMO: Benefits and challenges,” EEE J. Sel. Topics Signal Process., vol. 8, no. 5, pp. 742–758, Oct 2014.
[15] O. E. Ayach, S. Rajagopal, S. Abu-Surra, Z. Pi, and R. W. Heath, “Spatially sparse precoding in millimeter wave MIMO systems,” IEEE Transactions on Wireless Communications, vol. 13, no. 3, pp. 1499–1513, March 2014.
[16] F. Rusek, D. Persson, B. K. Lau, E. G. Larsson, T. L. Marzetta, O. Edfors, and F. Tufvesson, “Scaling up mimo: Opportunities and challenges with very large arrays,” IEEE Signal Process. Mag., vol. 30, no. 1, pp. 40–60, Jan 2013.
[17] S. Payami and F. Tufvesson, “Channel measurements and analysis for very large array systems at 2.6 ghz,” Proc. 6th Eur. Conf. on Antennas and Propag. (EUCAP), pp. 433–437, March 2012.
[18] S. Payami, N. Mysore Balasubramanya, C. Masouros, and M. Sellathurai, “Phase shifters versus switches: An energy efficiency perspective on hybrid beamforming,” IEEE Wireless Communications Letters, vol. 8, no. 1, pp. 13–16, Feb 2012.
[19] T. L. Marzetta, “Noncooperative cellular wireless with unlimited num- bers of base station antennas,” IEEE Trans. Wireless Commun., vol. 9, no. 11, pp. 3590–3600, Nov. 2010.
Citation
Tamanna Rajput, Munna Lal Jatav, "Review Paper on Massive MIMO Systems with Channel State Information," International Journal of Computer Sciences and Engineering, Vol.7, Issue.6, pp.1016-1021, 2019.
Survey Paper on PAPR Reduction for MIMO-OFDM Systems using Different PTS Scheme
Survey Paper | Journal Paper
Vol.7 , Issue.6 , pp.1022-1026, Jun-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i6.10221026
Abstract
In recent time, the demand for multimedia data services has grown up rapidly. One of the most promising multi-carrier system, Orthogonal Frequency Division Multiplexing (OFDM) forms basis for all 4G wireless communication systems due to its large capacity to allow the number of subcarriers, high data rate and ubiquitous coverage with high mobility. OFDM is significantly affected by peak-to-average-power ratio (PAPR). Unfortunately, the high PAPR inherent to OFDM signal envelopes will occasionally drive high power amplifiers (HPAs) to operate in the nonlinear region of their characteristic curve. The nonlinearity of the HPA exhibits amplitude and phase distortions, which cause loss of orthogonality among the subcarriers, and hence, inter-carrier interference (ICI) is introduced in the transmitted signal. Not only that, high PAPR also leads to in-band distortion and out-of-band radiation. This paper emphasis mainly on the PAPR reduction of OFDM system using partial transmits sequence (PTS) and precoding techniques. Some other techniques such as amplitude clipping have low-complexity; on the other hand, they suffer from various problems such as in-band distortion and out-of-band expansion. Signal companding methods have low-complexity, good distortion and spectral properties; however, they have limited PAPR reduction capabilities. Advanced techniques such as coding, partial transmit sequences (PTS) and selected mapping (SLM), have also been considered for PAPR reduction.
Key-Words / Index Term
PTS, STBC, MIMO, OFDM, PAPR
References
[1] Francisco Sandoval, Gwenael Poitau, and François Gagnon, “On Optimizing the PAPR of OFDM Signals With Coding, Companding, and MIMO”, 2019 IEEE. Translations and content mining are permitted for academic, IEEE 2019.
[2] Andrey Ivanov, Artyom Volokhatyi, Dmitry Lakontsev and Dmitry Yarotsky, “Unused beam reservation for PAPR reduction in Massive MIMO system”, International Conference on IEEE 2018.
[3] Thana Udomsripaiboon, “Adjustable Dynamic Range for PAPR Clipping Technique in Large-Scale MIMO-OFDM Systems”, 15th International Conference on Electrical Engineering / Electronics, Computer, Telecommunications and Information Technology, ECTI-NCON2018.
[4] Ankur Vora and Kyoung-Don Kang, “Index Modulation with PAPR and Beamforming for 5G MIMO-OFDM”, International Conference of Wireless System, IEEE 2018.
[5] Weijun Zhang, Zibin Weng, Lei Wang, “Design of a Dual-band MIMO Antenna for 5G Smartphone Application”, International Conference of Wireless System, IEEE 2018.
[6] Junhui Zhao, Shanjin Ni and Yi Gong, “Peak-to-Average Power Ratio Reduction of FBMC/OQAM Signal Using a Joint Optimization Scheme”, Received March 24, 2017, accepted April 26, 2017, date of publication May 19, 2017, date of current version August 29, 2017.
[7] Ashna Kakkar, Sai Nitesh Garsha,Ojasvi Jain and Kritika, “Improvisation in BER and PAPR by using hybrid reduction techniques in MIMO-OFDM employing channel estimation techniques”, 7th International Advance Computing Conference, IEEE 2017.
[8] Ho-Lung Hung, Yung-Fa Huang, Ching-Chuan and Rung-Ching Chen, “Performance of PTS-Based Firefly Algorithm Scheme for PAPR Reduction in SFBC MIMO-OFDM Communication Systems”, International Symposium on Computer, Consumer and Control, IEEE 2016.
[9] P. Kothai and R. Prabhu M.E., “PAPR Reduction in MIMO OFDM Using Adaptive SLM Scheme”, International Journal for Research in Applied Science & Engineering Technology (IJRASET), Vol. 03, No. 05, pp. 729-735, May 2015.
[10] Muhammet Nuri Seyman, Necmi Taspmar, "Channel estimation based on neural network in space time block coded MIMO-OFDM system", Digital Signal Processing, Vol. 23, No.1, pp. 275-280, Jan. 2013.
[11] P. Mukunthan and, P Dananjayan," PAPR Reduction based on a Modified PTS with Interleaving and Pulse Shaping method for STBC MIMO-OFDM System", IEEE ICCCNT`12 , 26th _28th July 2012, Coimbatore, India.
[12] L. Yang, K. K. Soo, S. li, and Y. M. SU, ``PAPR Reduction Using Low Complexity PTS to Construct of OFDM Signals Without Side Information``, IEEE Transactions on Broadcasting, Vol. 57, No. 2, June 2011.
[13] S. B. Slimane. Reducing the peak-to-average poser ratio of OFDM signal through precoding. IEEE Trans Vehicular Technology, 56(2) 686–695, mar 2007.
[14] Tao Jiang and Guangxi Zhu. Nonlinear companding transform for reducing peak-to average power ratio of OFDM signals. Broadcasting, IEEE Transactions on, 50(3):342 – 346, sept. 2004.
[15] H. Ochiai and H. Imai. Performance of the deliberate clipping with adaptive symbol selection for strictly band-limited OFDM systems, IEEE Journals on Selected Areas in Communications, 18(11) :2270–2277, November 2000.
[16] Jose Tellado, Peak to Average Power Ratio Reduction for Multicarrier Modulation. PhD thesis, University of Stanford, Stanford, 1999.
[17] S.H. Muller and J.B. Huber, OFDM with reduced peak-to-average power ratio by optimum combination of partial transmit sequences [J]. IEEE Electronic Letter, 1997, 33(5): 368-369.
[18] R.W. Bauml, R.F.H. Fisher and J.B. Huber, Reducing the peak-to average power ratio of multicarrier modulation by selected mapping[J] IEEE Electronic Letter, 1996, 32(22): 2056-2057.
Citation
Pooja Gautam, Munna Lal Jatav, "Survey Paper on PAPR Reduction for MIMO-OFDM Systems using Different PTS Scheme," International Journal of Computer Sciences and Engineering, Vol.7, Issue.6, pp.1022-1026, 2019.
Analysis of Soil Nutrition Analysis with HART Protocol a Review
Review Paper | Journal Paper
Vol.7 , Issue.6 , pp.1027-1031, Jun-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i6.10271031
Abstract
The IoT, the idea of getting real-world objects connected with each other, will change the way users arrange, get and expend data drastically. IoT empowers different applications (crop development observing and determination, water system choice help, and so on) in Digital Agriculture domain. Wireless HART is modern network protocols in WSNs which system of multiple small sensors (nodes), limited energy sources, used to sense any given sensing region (environment) of interest. Nodes in HARTs are provided with low power and are employed in a hazardous environment where replacement of the battery or any fault evaluation in the sensor network is impossible. With the help of this approach which gives continuous data about the terrains and harvests that will enable ranchers to settle on right choices.
Key-Words / Index Term
Internet of Things (IoTs), Wireless Sensor Network (WSN), Highway Addressable Remote Transducer (HART)
References
[1] Tao Li and Ze Dong, “Design and Implementation of Field Bus Device Management System based on HART Protocol”, 2nd IEEE Advanced Information Management, Communicates, Electronic and Automation Control Conference, IEEE 2018.
[2] Mahfuzulhoq Chowdhury, Eckehard Steinbach, Fellow, IEEE, Wolfgang Kellerer, “Context-Aware Task Migration for HART-Centric Collaboration over FiWi Based Tactile Internet Infrastructures”, IEEE Transactions on Parallel and Distributed Systems, IEEE 2018.
[3] Yun-Shuai Yu, Chun-Hung Chen and Kelvin Cheng, “Design and Implementation of a Remote HART Configurator”, Proceedings of IEEE International Conference on Applied System Innovation 2018.
[4] Cristian Patrascioiu and Grigore Stamatescu, “Monitoring pH with HART Communication”, 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, IEEE 2017.
[5] Sindhu R, Joseph Mathewy, Sreedhanya L R, and Lajitha C S, “Design of HART Compliant Analog Input Module for Indigenous SCADA System”, International Conference on IEEE 2017.
[6] Shylaja S.N. and Dr. Veena M.B., “Real-Time Monitoring of Soil Nutrient Analysis using WSN”, International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS-2017).
[7] Alexandros Ladas, Nikolaos Pavlatos, Nuwan Weerasinghe and Christos Politis, “Multipath Routing Approach to Enhance Resiliency and Scalability in Ad-hoc Networks, Ad-hoc and Sensor Networking Symposium, PP. No. 01-06, IEEE 2016.
[8] Pornchai Pongpipatpakdee, Teerawat Thepmanee, Sawai Pongswatd, and Apinai Rerkratn, “Integration of Wireless HART network system into SCADA software for Operation & Management”, Proceedings of the SICE Annual Conference, Tsukuba, Japan, September 20-23, 2016.
Citation
Ayushi Singh, Abhishek Mishra, Mohammed Ahmed, "Analysis of Soil Nutrition Analysis with HART Protocol a Review," International Journal of Computer Sciences and Engineering, Vol.7, Issue.6, pp.1027-1031, 2019.
Design High Speed Radix-4 Complex Multiplier using CBL Adder
Research Paper | Journal Paper
Vol.7 , Issue.6 , pp.1032-1035, Jun-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i6.10321035
Abstract
The main objective of this research paper is to design architecture for radix-4 complex Vedic multiplier by rectifying the problems in the existing method and to improve the speed by using the common Boolean logic (CBL). The multiplier algorithm is normally used for higher bit length applications and ordinary multiplier is good for lower order bits. These two methods are combined to produce the high speed multiplier for higher bit length applications. The problem of existing architecture is reduced by removing bits from the remainders. The proposed algorithm is implementation Xilinx software with Vertex-7 device family.
Key-Words / Index Term
Vedic Multiplier, Complex Multiplier, Common Boolean Logic Adder, Xilinx Software
References
[1] D. Kalaiyarasi and M. Saraswathi, “Design of an Efficient High Speed Radix-4 Booth Multiplier for both Signed and Unsigned Numbers”, 4th International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB), IEEE 2018.
[2] Prof. S. B. Patil, Miss. Pritam H. Langade, “Design of Improved Systolic Array Multiplier and Its Implementation on FPGA”, International Journal of Engineering Research and General Science Volume 3, Issue 6, November-December, 2015
[3] Elisardo Antelo, Paolo Montuschi and Alberto Nannarelli, “Improved 64-bit Radix-16 Booth Multiplier Based on Partial Product Array Height Reduction”, IEEE Transactions On Circuits And Systems—I: Regular Papers, Vol. 64, No. 2, February 2017.
[4] Kavita and Jasbir Kaur, “Design and Implementation of an Efficient Modified Booth Multiplier using VHDL”, Special Issue: Proceedings of 2nd International Conference on Emerging Trends in Engineering and Management, ICETEM 2013.
[5] Shiann-Rong Kuang, Jiun-Ping Wang and Cang-Yuan Guo, “Modified Booth Multipliers With a Regular Partial Product Array”, IEEE Transactions On Circuits And Systems—Ii: Express Briefs, Vol. 56, No. 5, May 2009.
[6] S. Vassiliadis, E. Schwarz, and D. Hanrahan, “A general proof for overlapped multiple-bit scanning multiplications,” IEEE Trans. Comput., vol. 38, no. 2, pp. 172–183, Feb. 1989.
[7] D. Dobberpuhl et al., “A 200-MHz 64-b dual-issue CMOS microprocessor,” IEEE J. Solid-State Circuits, vol. 27, no. 11, pp. 1555–1567, Nov. 1992.
[8] E. M. Schwarz, R. M. A. III, and L. J. Sigal, “A radix-8 CMOS S/390 multiplier,” in Proc. 13th IEEE Symp. Comput. Arithmetic (ARITH), Jul. 1997, pp. 2–9.
[9] J.Clouser etal.,“A600-MHz superscalar floating-point processor,” IEEE J. Solid-State Circuits, vol. 34, no. 7, pp. 1026–1029, Jul. 1999.
[10] S. Oberman, “Floating point division and square root algorithms and implementation in the AMD-K7 microprocessor,” in Proc. 14th IEEE Symp. Comput. Arithmetic (ARITH), Apr. 1999, pp. 106–115.
[11] R. Senthinathan et al., “A 650-MHz, IA-32 microprocessor with enhanced data streaming for graphics and video,” IEEE J. Solid-State Circuits, vol. 34, no. 11, pp. 1454–1465, Nov. 1999.
Citation
Jagrati Nayak, Prashant Purohit, "Design High Speed Radix-4 Complex Multiplier using CBL Adder," International Journal of Computer Sciences and Engineering, Vol.7, Issue.6, pp.1032-1035, 2019.
Optimization of Secure Data for Steganography and Digital Watermarking Scheme
Research Paper | Journal Paper
Vol.7 , Issue.6 , pp.1036-1040, Jun-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i6.10361040
Abstract
“Steganography” is a technique that thwarts unauthorized users to have access to the crucial data, to invisibility and payload capacity using the different technique like discrete cosine transform (DCT) and discrete wavelet transform (DWT).The available methods till date result in good robustness but they are not independent of file format. The aim of this research work is to develop a independent of file format and secure hiding data scheme. The independent of file format and secure hiding data scheme in increased by combining DWT and least significant bits (LSB) technique. Accordingly an efficient scheme is developed here that are having better MSE and PSNR against different characters.
Key-Words / Index Term
Discrete Wavelet Transform, SVD, PSNR, MSE
References
[1] N. Senthil Kumaran, and S. Abinaya, “Comparison Analysis of Digital Image Watermarking using DWT and LSB Technique”, International Conference on Communication and Signal Processing, April 6-8, 2016, India.
[2] Aase, S.O., Husoy, J.H. and Waldemar, P. (2014) A Critique of SVD-Based Image Coding Systems, IEEE International Symposium on Circuits and Systems VLSI, Orlando, FL, Vol. 4, Pp. 13-16.
[3] Ahmed, F. and Moskowitz, I.S. (2014) Composite Signature Based Watermarking for Fingerprint Authentication, ACM Multimedia and Security Workshop, New York, Pp.1-8.
[4] Akhaee, M.A., Sahraeian, S.M.E. and Jin, C. (2013) Blind Image Watermarking Using a Sample Projection Approach, IEEE Transactions on Information Forensics and Security, Vol. 6, Issue 3, Pp.883-893.
[5] Ali, J.M.H. and Hassanien, A.E. (2012) An Iris Recognition System to Enhance E-security Environment Based on Wavelet Theory, Advanced Modeling and Optimization, Vol. 5, No. 2, Pp. 93-104.
[6] Al-Otum, H.M. and Samara, N.A. (2009) A robust blind color image watermarking based on wavelet-tree bit host difference selection, Signal Processing, Vol. 90, Issue 8, Pp. 2498-2512.
[7] Ateniese, G., Blundo, C., De Santis, A. and Stinson, D.R. (1996) Visual cryptography for general access structures, Information Computation, Vol. 129, Pp. 86-106.
[8] Baaziz, N., Zheng, D. and Wang, D. (2011) Image quality assessment based on multiple watermarking approach, IEEE 13th International Workshop on Multimedia Signal Processing (MMSP), Hangzhou, Pp.1-5.
[9] Bao, F., Deng, R., Deing, X. and Yang, Y. (2008) Private Query on Encrypted Data in Multi-User Settings, Proceedings of 4th International Conference on Information Security Practice and Experience (ISPEC 2008), Pp. 71-85, 2008.
[10] Barni, M. and Bartolini, F. (2004) Watermarking systems engineering: Enabling digital assets security and other application, Signal processing and communications series, Marcel Dekker Inc., New York.
[11] Barni, M., Bartolini, F. and Piva, A. (2001) Improved Wavelet based Watermarking Through Pixel-Wise Masking, IEEE Transactions on Image Processing, Vol. 10, Pp. 783-791.
Citation
Avinash Rai, Vivek Todkar, "Optimization of Secure Data for Steganography and Digital Watermarking Scheme," International Journal of Computer Sciences and Engineering, Vol.7, Issue.6, pp.1036-1040, 2019.
Design and Analysis of Single and Double Precision Floating Point Matrix Multiplier using Partition Multiplier Method
Research Paper | Journal Paper
Vol.7 , Issue.6 , pp.1041-1044, Jun-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i6.10411044
Abstract
Due to advancement of new technology in the field of VLSI and Embedded system, there is an increasing demand of high speed and low power consumption processor. Speed of processor greatly depends on its multiplier as well as adder performance. In spite of complexity involved in floating point arithmetic, its implementation is increasing day by day. Due to which high speed adder architecture become important. Several adder architecture designs have been developed to increase the efficiency of the adder. In this paper, we introduce an architecture that performs high speed IEEE 754 floating point multiplier using carry select adder (CSA). Here we are introduced two carry select based design. These designs are implementation Xilinx Vertex device family.
Key-Words / Index Term
IEEE754, Single Precision Floating Point (SP FP), Double Precision Floating Point (DP FP), Binary to Execess-1 Converter
References
[1] Lakshmi kiran Mukkara and K.Venkata Ramanaiah, “A Simple Novel Floating Point Matrix Multiplier VLSI Architecture for Digital Image Compression Applications”, 2nd International Conference on Inventive Communication and Computational Technologies (ICICCT 2018) IEEE.
[2] Soumya Havaldar, K S Gurumurthy, “Design of Vedic IEEE 754 Floating Point Multiplier”, IEEE International Conference On Recent Trends In Electronics Information Communication Technology, May 20-21, 2016, India.
[3] Ragini Parte and Jitendra Jain, “Analysis of Effects of using Exponent Adders in IEEE- 754 Multiplier by VHDL”, 2015 International Conference on Circuit, Power and Computing Technologies [ICCPCT] 978-1-4799-7074-2/15/$31.00 ©2015 IEEE.
[4] Ross Thompson and James E. Stine, “An IEEE 754 Double-Precision Floating-Point Multiplier for Denormalized and Normalized Floating-Point Numbers”, International conference on IEEE 2015.
[5] M. K. Jaiswal and R. C. C. Cheung, “High Performance FPGA Implementation of Double Precision Floating Point Adder/Subtractor”, in International Journal of Hybrid Information Technology, vol. 4, no. 4, (2011) October.
[6] B. Fagin and C. Renard, "Field Programmable Gate Arrays and Floating Point Arithmetic," IEEE Transactions on VLS1, vol. 2, no. 3, pp. 365-367, 1994.
[7] N. Shirazi, A. Walters, and P. Athanas, "Quantitative Analysis of Floating Point Arithmetic on FPGA Based Custom Computing Machines," Proceedings of the IEEE Symposium on FPGAs for Custom Computing Machines (FCCM"95), pp.155-162, 1995.
[8] Malik and S. -B. Ko, “A Study on the Floating-Point Adder in FPGAs”, in Canadian Conference on Electrical and Computer Engineering (CCECE-06), (2006) May, pp. 86–89.
[9] D. Sangwan and M. K. Yadav, “Design and Implementation of Adder/Subtractor and Multiplication Units for Floating-Point Arithmetic”, in International Journal of Electronics Engineering, (2010), pp. 197-203.
[10] L. Louca, T. A. Cook and W. H. Johnson, “Implementation of IEEE Single Precision Floating Point Addition and Multiplication on FPGAs”, Proceedings of 83rd IEEE Symposium on FPGAs for Custom Computing Machines (FCCM‟96), (1996), pp. 107–116.
[11] Jaenicke and W. Luk, "Parameterized Floating-Point Arithmetic on FPGAs", Proc. of IEEE ICASSP, vol. 2, (2001), pp. 897-900.
[12] Lee and N. Burgess, “Parameterisable Floating-point Operations on FPGA”, Conference Record of the Thirty-Sixth Asilomar Conference on Signals, Systems, and Computers, (2002).
[13] M. Al-Ashrafy, A. Salem, W. Anis, “An Efficient Implementation of Floating Point Multiplier”, Saudi International Electronics, Communications and Photonics Conference (SIECPC), (2011) April 24-26, pp. 1-5.
Citation
Manjusha Kumari, Vijay Yadav, "Design and Analysis of Single and Double Precision Floating Point Matrix Multiplier using Partition Multiplier Method," International Journal of Computer Sciences and Engineering, Vol.7, Issue.6, pp.1041-1044, 2019.
Simulation of Wide Area Network for Multiple Offices Connectivity Using Enhanced Interior Gateway Routing Protocol (EIGRP)
Review Paper | Journal Paper
Vol.7 , Issue.6 , pp.1045-1050, Jun-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i6.10451050
Abstract
Wide Area Network (WAN) is a critical important functionality of modern businesses because latency, jitter and packet loss associated with WAN often causes performance of applications to degrade, the outage of WAN link often causes one or more sites to be offline and the lead time to either install a new WAN link or to increase the capacity of existing WAN link can be quite lengthy. This paper focuses on the summary of the key components of some of the emerging approaches to WAN architecture and design and concludes with a call to action that outlines a project plan that network organizations can use to evolve their WAN. The motivation for this paper is to reduce the cost of transmission lines and equipment and improve network performance and response time. The approach taken in the design is based on approaching the high availability service problem from three perspectives; network resiliency, device resiliency and operational resiliency. Top down methodology which considers requirement analysis before technology selection is used. Packet tracer and operating Cisco IOS software are the design tools employed in the implementation of this paper.
Key-Words / Index Term
WAN, EIGRP, QoS and Top Down Methodology
References
[1] Black, U. (1997). Emerging Communications Technologies, 2nd ed., New Jersey: Prentice Hall.
[2] Pawlita, P.F. (1992). “Traffic measurements in data networks: recent measurement results and some implications”, IEEE Trans. Comms., April, Vol. Com.30, N0.4
[3] Verbiest (1988). “Broadband ISDN and Asynchronous Transfer Mode (ATM)”,@ IEEE Communications Magazine, September, Vol. 27, N0. 9
[4] Odinma-Okafor, A. (1991). “The characteristics of variable rate video signals”, Ph.D Thesis in Telecommunications Engineering, The University of London.
[5] Odinma-Okafor, A. and Cosmas, J. (1992). “Impact of time series and counting process approaches to video source modelling”, 9th UK Teletraffic Symposium, IEE, April.
[6] Grunenfelder, R., Cosmas, J., Manthorpe, S. and Odinma-Okafor, A. (1990). “The characterization of video codecs as autoregressive moving average processes and related queuing system performance”, IEEE J –SAC, April, Vol. 9, N0. 3, pp. 284-293.
[7] Brady P.T. (1965). “A technique for investigating on-off patterns of speech”, Bell Syst. Tech. Journal, Vol. XIV, January.
[8] Gruber, J.G. (1992). “A comparison of measured and calculated speech temporal parameters relevant to speech activity detection”, IEEE Trans. Comms. April, Vol. COM-30, N0. 4
[9] Milonas, A.C. (2000). “Enterprise networking for the new millennium”, Bell Labs. Tech. Journal, January – March, vol. 5, N0. 1, pp. 73-93.
[10] Weiss, W. (1998). “QoS with differential services”, Bell Labs Tech. Journal, October –December, pp. 48-62.
[11] Odinma, A.C. and Oborkhale, L. (2006). Quality of Service Mechanisms and Challenges for IP Networks, PJST, May, Vol. 7, N0. 1.
[12] Cisco (2010). Interconnecting Cisco Networking Devices: Part 2, Vol. Version 1.1, United Kingdom.
Citation
Amanze, B.C., Nwoke, B.C, Agoha, U.K, "Simulation of Wide Area Network for Multiple Offices Connectivity Using Enhanced Interior Gateway Routing Protocol (EIGRP)," International Journal of Computer Sciences and Engineering, Vol.7, Issue.6, pp.1045-1050, 2019.
Multi Security Algorithm Based Security Model to Achieve Confidentiality & Apply Authentication in Cloud Environment: A Survey
Survey Paper | Journal Paper
Vol.7 , Issue.6 , pp.1051-1054, Jun-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i6.10511054
Abstract
Due to the sharing of distributed resources through an insecure network in an open environment, cloud faces security issues therefore easy access of data is possible from anywhere. Also due to many reasons security and privacy, issue arises at the same time. Increasing demand of resources and development of new technology are the reason for the open and shared data storage. Therefore, this condition needs the secure data storage services in cloud environment. In the public cloud environment, the service provider is not the trusted provider. Different security issues for data in cloud environment is proposed in this paper with some methods for security services such as confidentiality, authorization and authentication.
Key-Words / Index Term
CloudComputing, Security, ECC, BLOWFISH
References
[1] Bih-Hwang Lee, Ervin Kusuma Dewi, “Data Security in Cloud Computing Using AES under HEROKU Cloud”. 27th Wireless and Optical Communications Conference, IEEE (WOCC2018), 2018.
[2] L. Foster, Y. Zhao, I. Raicu, S.Y. Lu, “Cloud computing and grid computing” 360-degree compared, in: Grid Computing Environments Workshop, GCE’08, Austin, TX, Nov. 12-16, 2008, pp. 1-10.
[3] J.W. Rittinghouse, J.F. Ransome, “Cloud Computing Implementation, Management, and Security”. CRC Press, Boca Raton, 2009.
[4] Deyan Chen; Hong Zhao, "Data Security and Privacy Protection Issues in Cloud Computing," in Computer Science and Electronics Engineering (ICCSEE), 2012 International Conference on , vol.1, no., pp.647-651, 23-25 March 2012.
[5] Vishwanath s Mahalle, Aniket K Shahade, “Enhancing the data security in Cloud by implementing hybrid (Rsa & Aes) encryption algorithm”. Power, Automation and communication (INAP), 2014.
[6] V. Chang, C.-S. Li, D. De Roure, G. Wills, R.J. Walters, and C. Chee, “The financial clouds review”. Cloud Computing Advancements in Design, Implementation, and Technologies, vol. 125, 2012.
[7] A. Lopez-Alt, E. Tromer, and V. Vaikuntanathan, “On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption”, in Proceedings of the forty-fourth annual ACM symposium on Theory of computing. ACM, 2012, pp. 1219-1234.
[8] M. Brenner, J. Wiebelitz, G. Von Voigt, and M. Smith, “Secret program execution in the cloud applying homomorphic encryption”, in 5th IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2011). IEEE,2011, PP.114-119.
Citation
Arpit Agrawal, Ankit Singh Yadav, "Multi Security Algorithm Based Security Model to Achieve Confidentiality & Apply Authentication in Cloud Environment: A Survey," International Journal of Computer Sciences and Engineering, Vol.7, Issue.6, pp.1051-1054, 2019.