Browse Items (11858 total)
Sort by:
-
Design of Lowpower 4-bit Flash ADC Using Multiplexer Based Encoder in 90nm CMOS Process
This work describes a 4-bit Flash ADC with low power consumption. The performance metrics of a Flash ADC depend on the kind of comparator and encoder used. Hence open-loop comparator and mux-based encoder are used to obtain improved performance. Simulation results show that the simulated design consumes 0.265mW of power in 90nm CMOS technology using cadence-virtuoso software. The circuit operates with an operating frequency of 100MHz and a supply voltage of 1V. The Author(s). -
Design of Machine Learning Model for Health Care Index during COVID- 19
Predicting stock prices and index movement in the field of finance is always challenging. The events in the macro-economic framework affect the trends of the market and the COVID-19 pandemic was a major reason for the slowdown of the global economies in the short run. It was assumed that the healthcare industry has completely been transformed due to changing behavioral habits of individuals. The study presents the time series approach with the help of historical prices on the Bombay Stock Exchanges (BSE) Health Care Index, both in the long and short run, using the ARIMA model. The period of the study is from February 1999 to August 2020. The ARIMA equations are used to forecast the future price movement of the Health Care Index till December 2020. The findings reveal that the market will continue with the same volatility, and investors should give due attention to analysis and logical reasoning rather than following their feeling of overconfidence. 2024 Taylor & Francis Group, LLC. -
Design of new access control structure for provenance based on secret sharing
Access control is one of the important elements in providing confidentiality to the secured data. Access specifiers helps us understand degree of rights given to the users in utilizing data records in a right manner. Tampering the records by unauthorized parties is a high concern in secure communication. Tamper detection plays an important role in trouble shooting an issue associated with network/ host intrusion scenario. The advances in information technology have driven the modern world to focus on the Web for digital information. People across the globe rely on the internet for all the data from generic information to distribution of personal data over heterogeneous networks. Technology has grown so wide to an extent, where almost all of the financial transactions are taking place through online portals. On the other hand, there has been high rise in the security threats towards users confidential data. This information is however shared by the online users while performing financial transaction in e-commerce portals. In order to maintain security mechanism over the untrusted networks various authentication techniques available in this regard. All these security procedures are said to be stubborn and adequate on contextual basis, on the other hand over a period of time the intruders would find out ways to break into systems. Data theft and intrusion into the information systems would increase on a daily basis if defensive measures are not in place. In this concern a new mechanism for securing the data using majority voting concept is proposed. Majority voting for securing the provenance data is applied. Provenance data is data of origin, genesis data and often observed as sensitive data. Provenance is a record of events, timestamps, versions, transformations occurred for the data of interest. Elicitation of an entity's genesis is termed provenance. This understanding is called as data provenance for data objects and their relationships. In most of the cases provenance data is tend to be sensitive, and a small variation or regulation paves way to changes to entire lineage of the connected data. This origin needs to be protected and only approved parties should have right to use the data. Specific description or classification of an instance's historical record or data object is called data provenance. It has many implications in different disciplines in terms of its significance for the acquisition of data flow mechanisms. Personal control of data privacy is a common scenario and various solutions towards security exists. In this regard a unique model is proposed where control of data and its related allies is available with several bodies but however not one; and if access control is to be permitted for a cause based on context, all the entities holding their right keys will have to agree and share on a common platform for accessing the data. Combining these shares in a peculiar pattern allows the grant for accessing data. The method of allocating controls to multiple bodies and allowing grants based on the combination of stakes is called a mechanism for secret sharing. Share separation may be derived from the concept of visual encryption methodology We integrate concepts of secret sharing and provenance to provide an indigenous solution for parameters of information security namely confidentiality, integrity and availability. It is with the availability of exceptional wireless internet access in mobile motivated situations, users and usage data has become massive with respect to media. For example, financial related operations carried out over online platforms by users in many ways were found insecure and unauthenticated. Procedure with appropriate algorithms are available for safe data communication in various modes, however lacks to attain high accuracy and performance with regards to the basic goals of security; confidentiality, integrity, availability at a significant level. Security is the main aspect of any communications among untrusted networks in the current world. Sincere gratitude to many researchers for their tremendous contributions to effective security algorithms despite various threats that compromise the computer systems vulnerabilities. The origin of the data, i.e., by which the transaction thread was created, is the pertinent question to be answered while the financial operation is finalized. This definition of 'data antiquity ' has received good interest from researchers in different fields for many decades and is often termed as data provenance. However, security in provenance has made some progress with recent research, particularly in the field of cyber security. This study emphases on the safety characteristics of data provenance with a distinctive cryptographic approach. The combination of these principles produces unique results for safeguarding the genesis data. -
Design of personalized diet and physical activities recommendation framework for hypothyroid patients
These days, hypothyroid disease is quickly growing among individuals. In India, one out of eight women experiences hypothyroid disorder because of iodine deficiency. It is necessary to maintain the thyroid hormone levels because it may lead to thyroid cancer. There is a need to consume an adequate amount of iodine intake and other nutrients required to balance thyroid hormones levels. So, patients should follow a customized daily diet and exercise plan to meet their nutritional needs. These recommendations help hypothyroid patients to enhance their metabolism and to adjust thyroid hormones levels. Most of the existing online systems usually provide diet recommendations in general forms. Such recommendations are insufficient for any patient suffering from a specific disease. This paper provides a personalized recommendation framework to provide appropriate diet plans and physical activities to patients. These recommendations are based on their clinical data and personal choices. Validation of recommendations can be made by combining both domains like human expertise and computer technologies. BEIESP. -
Design of pseudo stator generator
In today's energy generation scenario, the extensive use of conventional sources are causing lot of environmental issues. It is necessary that humankind should come up with a strategy to produce clean energy. Even though we cannot completely stop relying on non-renewable sources of energy, lot of research is happening to find the ideal substitute for conventional sources of energy and also for migrating towards renewable energy sources from conventional sources. Its gaining popularity because of the fact that availability of fossil fuels are reducing at an alarming rate. Thus, these research works will aid in producing clean energy and also make the existing systems more efficient. A better substitution would be to design a machine which would use less conventional sources of energy and gives required output. Thus it is necessary to come up with a new technology which would suffice the above stated requirements. The proposed project is an novel idea aimed at designing an alternator which has higher power output at lower RPM when compared to conventional alternators. This model finds application in automobiles, WECS, Aerospace, hybrid vehicles in the near future. 2016 IEEE. -
Design of Reconfigurable Filter Structure Based on FRM for Wideband Channelizer?
A reconfigurable FIR bank of filters are essential for digital channelizer in wideband system. FRM is a extensively used method to generate a sharp transition width sub-bands or channels for digital channelizer. The aim of this work is to design multiple non-uniform sharp transition width FIR bank of filters with reduced number of multipliers and group delay for wideband channelizer. The design parameters of the proposed structure are evaluated in an efficient way. The proposed structure is designed based on FRM filters and exponential modulation (EM) technique. The performance of the proposed structure is illustrated with the help of an example. Result shows that the number of multipliers of the proposed structure is less compared to other existing techniques. 2022 IEEE. -
Design of Reconfigurable FRM Channelizer using Resource Shared Non-maximally Decimated Masking Filters
This paper presents a reconfigurable frequency response masking (FRM) wideband channelizer architecture which is characterized by low computational and hardware complexity. The proposed hardware efficient architecture is realized by incorporating resource shared non-maximally decimated filter bank in the implementation of the FRM wideband channelizer structure. The coefficients of the proposed architecture are optimized and made multiplier-free using Pareto based meta-heuristic algorithm in the canonic signed digit (CSD) space for reducing the total power consumption of the architecture. The architecture is finally designed and synthesized using Xilinx Vivado and Cadence RTL Encounter compiler for the area and power analysis and is compared with existing channnelizer architectures. The comparison highlights the advantages of the proposed architecture in terms of hardware complexity, power and workload in realizing sharp wideband channel filters. 2020, Springer Science+Business Media, LLC, part of Springer Nature. -
Design of reconfigurable multiplier-less filter structure based on IFIR for digital channelizer
The flexibility in frequency allocation is essential for high throughput satellites (HTS). The digital channelizer based transponder system has a crucial role in enhancing the performance of HTS. In this work, the design and implementation of a low computational complexity digital channelizer for HTS is proposed. The proposed reconfigurable filter structure for digital channelizer is to generate non-uniform and sharp transition width FIR filters for transponder of the satellite systems. The multipliers and group delay needed in the digital channelizer that employ the proposed structure are reduced when compared to FRM and traditional IFIR based digital channelizer. An example is used to illustrate the effectiveness of the proposed design. Results reveal that the proposed structure has a lower multiplier complexity than existing techniques. The proposed structure once implemented effectively, the power dissipation and hardware complexity are reduced. With the help of CSD, MOABC, and SIDC-CSE optimization, the filters used in this structure are made multiplier-less. Hence this structure is adaptable for the digital channelizer in the transponder of the satellite communication systems. 2023 Elsevier GmbH -
Design of Smart and Secured Healthcare Service Using Deep Learning with Modified SHA-256 Algorithm
Background: The modern era of human society has seen the rise of a different variety of diseases. The mortality rate, therefore, increases without adequate care which consequently causes wealth loss. It has become a priority of humans to take care of health and wealth in a genuine way. Methods: In this article, the authors endeavored to design a hospital management system with secured data processing. The proposed approach consists of three different phases. In the first phase, a smart healthcare system is proposed for providing an effective health service, especially to patients with a brain tumor. An application is developed that is compatible with Android and Microsoft-based operating systems. Through this application, a patient can enter the system either in person or from a remote place. As a result, the patient data are secured with the hospital and the patient only. It consists of patient registration, diagnosis, pathology, admission, and an insurance service module. Secondly, deep-learning-based tumor detection from brain MRI and EEG signals is proposed. Lastly, a modified SHA-256 encryption algorithm is proposed for secured medical insurance data processing which will help detect the fraud happening in healthcare insurance services. Standard SHA-256 is an algorithm which is secured for short data. In this case, the security issue is enhanced with a long data encryption scheme. The algorithm is modified for the generation of a long key and its combination. This can be applicable for insurance data, and medical data for secured financial and disease-related data. Results: The deep-learning models provide highly accurate results that help in deciding whether the patient will be admitted or not. The details of the patient entered at the designed portal are encrypted in the form of a 256-bit hash value for secured data management. 2022 by the authors. -
Design of Triple Tuned Passive Harmonic Power Filter - A Novel Approach
Nowadays, there is a race between active and passive harmonic filters and still ambiguity persists. It is a proven fact that active harmonic filters (AHFs) are costly solutions though have proved better than passive harmonic filters. Except sizing and resonance problems, tuned passive harmonic filters (TPHFs) are proved to give economical solutions with little compromise on their performance. The accurate design of TPHFs gives a greater impact on its performance. The triple-TPHF (TTPHF) is essential to alleviate first three dominant ac side current harmonics simultaneously at the high voltage direct current (HVdc) converters and it is proved better than the single and double TPHFs. Existing equivalent methods of TTPHF design failed to give satisfactory performance under dynamic conditions. Hence, this article introduces a novel parametric method-based design of TTPHF, which will give better performance under static and dynamic loading conditions. The results also reveal that the proposed TTPHF design method will perform better than the existing methods. 2021 IEEE. -
Design optimisation and fabrication of amino acid based molecularly imprinted sensor for the selective determination of food additive tartrazine
In this work, we developed a new molecularly imprinted polymer detector for tartrazine's rapid and selective detection. Electropolymerisation using L-Methionine resulted in the polymer immobilised on the carbon fibre paper electrode's surface. MIP film was formed by electropolymerisation in the presence of the template tartrazine. The polymer frame comprises cavities after template removal, which can specifically bind to the analyte molecule. Without pre-treatment, the developed sensor MIPMet/CFP detects tartrazine in beverage samples precisely and rapidly. The sensor has a linear response in the concentration range of 0.6 nM- 160 nM, high sensitivity (601964 AM-1cm?2), and a low detection limit of 27 pM under optimum conditions. MIPMet/CFP sensor displayed the ability to distinguish target analyte from interferants selectively. The performance of the MIPMet/CFP sensor in assessing tartrazine in different saffron powder and packed juice samples suggests that it could be used to detect tartrazine fast and effectively. 2022 Elsevier Ltd -
Design Optimization of Electrical Connector Assembly using FEA
Due to the increasing number of devices and systems connected to an electric system, the need for reliable and high-quality electrical connectors has become more prevalent. This project aims to optimize the design of an electrical connector during its two most critical stages: insertion and retention of housing using FEA. A structural analysis is performed during the insertion and retention stages of housing. This process involves calculating the dimensional deformations and maximum strains developed during the steps mentioned above to determine the reliable functioning of electrical contacts. The input geometry is fed to the finite element analysis. The forces applied on the connectors latch on their respective connection are ensured to be under the limit. The analysis and simulation results are reflected to validate the safe forces in the connector assembly and a proper justification for an experimental set up in the laboratory. 2022, Books and Journals Private Ltd.. All rights reserved. -
Design requirements of a spectropolarimeter for solar extreme-ultraviolet observations and characterization of a K-mirror based on Brewster's angle
Measuring the linear polarization signal in extreme-ultraviolet (EUV) spectral lines, produced by the Hanle effect, offers a promising technique for studying magnetic fields in the solar corona. The required signal-to-noise ratio for detecting the Hanle polarization signals is on the order of 101 (off-limb) to 106 (disk center). Measuring such low signals in the photon starved observations demands highly efficient instruments. In this paper, we present the design of an instrument, SpectroPOLarimeter for Extreme-ultraviolet Observations (SPOLEO), which utilizes reflective components with suitable mirror coatings and thicknesses to minimize the throughput losses. We analyze the system performance within the spectral range from 740 to 800 The K-mirror-based polarimeter model provides a polarizing power of 20%40% in this wavelength range. Based on the system throughput and polarizing power, we discuss various possibilities for achieving the required signal-to-noise ratio, along with their limitations. Due to lack of facilities for fabrication and testing in the EUV, we have calibrated a prototype of the reflection-based polarimeter setup in the laboratory at the visible wavelength of 700 nm. 2024 Optica Publishing Group. -
Design space exploration of optimized hybrid SVPWM techniques based on spatial region for three level VSI
The performance of a multilevel inverter depends upon design and selection of an appropriate modulation technique. Space vector pulse width modulation (SVPWM) technique offers more flexibility than other pulse width modulation (PWM) techniques. However, conventional SVPWM technique becomes more complex for multilevel inverter because of increased number of space vectors and redundant switching states. This paper presents a design space exploration method of hybrid SVPWM techniques for three level voltage source inverter (VSI) to reduce total harmonic distortion (THD) and switching loss over wide linear modulation range. A new parameter Harmonic Loss (product of weighted total harmonic distortion factor of the line voltage (Vwthd) and normalized switching loss) is introduced as an objective function, and a spatial region identification algorithm is proposed to determine the optimized switching sequences for hybrid SVPWM technique. Two optimized hybrid SVPWM techniques are proposed based on the optimized switching sequences for three level VSI. The proposed hybrid SVPWM techniques are implemented on a low cost PIC microcontroller (PIC 18F452) and applied on an experimental prototype of three phase three level VSI with an induction motor as load. The experimental results are demonstrated to validate the performance of the proposed hybrid SVPWM techniques. 2021, The Author(s), under exclusive licence to Springer-Verlag GmbH, DE part of Springer Nature. -
Design techniques in carry select adder using parallel prefix adder for improved switching energy
A new architecture of Carry select adder has been proposed with improved switching energy using parallel prefix adder. The conventional Carry select adder is the use of two Ripple Carry Adder (RCA) and a multiplexer. The findings in this work are the replacement of one RCA block by Brent Kung adder and the other RCA block by excess-1 converter. Simulation results show that the proposed Carry select adder is proved to have improved switching energy when compared with the other adders in 45nm CMOS process. 2021 Wydawnictwo SIGMA-NOT. All rights reserved. -
Design, analysis and fabrication of EV with level-1 autonomous vehicle capability
The fact to this day remains true and the same for over a hundred years the Automobile industry and vehicles, in general, have become the pivoting point in our day to day lives. We might as well call it a necessary evil. Although it is very true that they have made our lives more convenient when we speak in terms of transportation; the pollution that conventional IC engine vehicles produce hasn't done much to create a cleaner environment especially with Global warming on the rise as we speak. The simplest remedy would be is to replace IC engine vehicles with Electric one, EV. A Problem common to both conventional IC engine vehicles and EV's alike is the accidents occurring due to collision caused by human error on-road. While safety measures have greatly been taken in order to reduce the damage done to the driver and passengers in the event of a collision it would be far better to avoid the collision altogether. Thus having at least, a Level-1 Autonomous Vehicles capability where the system alerts the driver in the event of a crash or collision and deploy full braking capability. Thanks to increasing urbanization and the advent of modern technology the need of the hour of the 21st century has given rise to high demands for employment in the motorized transport sectors. The authors were successfully able to design, analyze and fabricate an EV with Level-1 Autonomous Vehicles capability. The successful implementation of this project will help in reducing not only pollution and accidents occurring on-road due to vehicle collision but also pave paths in alimenting Level-1 Autonomous Vehicles capability in EV's inexpensively. 2020 Author(s). -
Design, Analysis and Validation of Electric Vehicle Control and Safety for Different Path Profiles and Braking Conditions
Energy conservation and Environmental pollution are two major challenges today for our society. Currently, utilization of the latest technology, to reduce energy consumption and harmful emissions from vehicles, is gaining significance in the contexts related to automobile, energy and power industries. Considerations of these contexts enable us to form a more realistic newlineperspective and a need for developing fuel efficient, comfortable and affordable electric vehicles. The importance of design and development of electric vehicle (EV) is better perceived when, there is a major impact on our future society due to (i) the energy saving aspect from newlineboth the customer side on individual expenditure as well as from the national economy viewpoint and (ii) the huge benefit due to reduction of emissions from internal combustion engines using fossil fuels. EV offers the best solution which not only avoids emissions but overcome the dependency on petroleum resources as well. Due to fewer moving parts, monitoring and controlling of EV are also smooth and relatively much easier. The embedded control techniques used in EV also contribute for a better controllable, observable, predictable newlineand efficient vehicle drive. This current research work focuses mainly on Electric Vehicle Mobility and Control aspects for a deeper study. This research work addresses topics related to mathematical modelling and simulation studies for design and analysis of EV control and safety. Validations of the several case studies done during this research are supported by software tools namely MATLAB/Simulink and IPG Carmaker Virtual Driving Simulation Platform. Starting from modelling, throughout the various stages of this work, realistic vehicle parameters and specifications are considered. The newlinedifferent levels of testing, validation and trial runs of the model-based designs are also validated by software in loop and hardware in loop approaches. Automotive Safety Integrity Level B/C hardware was used for the implementation purpose.



