IJIEEB Vol. 7, No. 4, Jul. 2015
Cover page and Table of Contents: PDF (size: 570KB)
REGULAR PAPERS
In this paper, a new multiplier is presented which uses modified fourteen transistor adder and optimized hybrid counter for partial product reduction step. Conventional adder is modified to improve Wallace tree functionality. Reducing critical path in counter structure can reduce VLSI area in whole multiplier structure. This paper uses a new structure in partial product reduction step to increase speed. Four to two compressors are used in modified Wallace structure to minimize the critical path. In final addition step of algorithm a new carry lookahead network is presented which adds two final operands efficiently. It uses dynamic CMOS in transistor level to reduce power consumption. Proposed multiplier reduces critical path, increases speed and decreases wiring problems in compare with previous algorithms efficiently. A new Booth encoder is presented in radix 16 circuitry. It decreases number of partial products while hardware overhead is minimized.
[...] Read more.Video is a significant medium in data communication through which enormous information could be conveyed in less time. Video Streaming helps us play the streamed data immediately without waiting for the entire file to get downloaded. When the quality of service of video streaming is considered, delay and jitter act as very important parameters, as video streams received late cannot be played and become useless hence wasting the network resources. In Vehicular Adhoc Networks, a special type of Mobile Adhoc Networks, the two possible usages of video streams are in infotainment applications and in the safety applications. In either case, these parameters play a major role. One of the vital techniques that are applied to reduce the delay encountered is Network coding. This paper simulates the transfer of the video streams from one vehicle to another in a group of vehicles in Vehicular Adhoc Networks. Network coding is applied on the video packets here. The routes are established with routing protocols OLSR, AODV and DSDV in the above mentioned scenarios. Node density is varied and these parameters of interest are monitored and analyzed.
[...] Read more.In modern Web, where users log to social networks has become a daily activity, the success of these applications to attract more users is often justified by offering social presence to the user on these virtual spaces. Developing applications in software engineering domain is a collaborative task that requires implementing more sophisticated tools to support all suitable collaboration aspects. Web-based IDEs have experienced a series of changes compared to their desktop versions, tending therefore to become more able to implement new collaboration approaches and mechanisms. Within the lack of social aspect in web-based IDEs, collaboration between developers does not seem to be optimal. This article presents a study of social networks resources that can be operated through the use of Application Programming Interfaces (APIs) thus providing a social aspect to web-based IDEs. It points how we can use these resources to create new collaborative experience in software engineering field.
[...] Read more.Web service are the technology of a choice when developing business applications that needs to be loosely coupled, platform independent and capable to cross enterprise boundaries. The interactions that occur between web services need to be captured because such interactions would be very useful if captured using appropriate structures and analyzed for various purposes such as assessing the responsiveness of a web service to complete peer's requests. Since the invocations of web services (WS) are dynamic, the behaviour of the WS will be dynamic depending on how the invocations discover, and get serviced by WSs. For this reason if the states of the behaviour of a WS can be captured and assessed, then tuning the WS and its performance improvement can be engineered at any stage. This work is presented in this paper.
[...] Read more.Efficient Database design is the key part of software development. A properly built database acts as the backbone of the software system and makes enhancing software more easily and quickly. Quality Function Deployment and data mining itself are very gordian processes. Thus, there is strong need of database for handling complex transactions of Quality Function Deployment along with data mining and accessing precise and up-to-date information concerned to this. Forecasting in Quality Function Deployment can be time consuming when computed manually. Hence, development of data mining driven forecasting software tool can give better results and also save time. This paper focuses on the database design for the development of data mining driven forecasting software tool for Quality Function Deployment. Here, first brief discussion on Quality Function Deployment and data mining followed by its concise literature review is presented. Later on, the integrated value chain needed by data mining driven forecasting system for Quality Function deployment is discussed. Then the flow chart illustrating the processes of the software tool is intended. Afterwards the tabulated schemas of logical part of database have been presented. Finally, the ER-diagram for the software and described the relationships among the tables have been designed followed by conclusion. Recognizing the general architecture and structural component of database system will lend a hand to designers and engineers successfully build up and sustain forecasting software tool.
[...] Read more.Emotion recognition is an important research area in speech recognition. The features of the emotions will affect the recognition efficiency of the speech recognition systems. Various techniques are used in identifying the emotions. In this paper a novel methodology for identification of emotions generated from speech signals has been addressed. This system is proposed using Skew Gaussian mixture model. The proposed model has been experimented over a gender independent emotion database. In order to extract the features from the speech signals cepstral coefficients are used. The developed model is tested using real-time speech data set and also using the standard and data set of Berlin. This model is evaluated in the presence of noise and without noise the efficiency of the model is evaluated and is presented by using confusion matrix.
[...] Read more.The enormous growth of smartphones was impelled by the idea to make a mobile phone offer more than just cellular telephony. One of the prime factors that initiated the age of smartphones (e.g. iOS, Android, RIM, etc.) was inarguably the capability of wireless sharing of images, music etc. among the users; which was possible due to Bluetooth Technology (IEEE 802.15). Today customers of the cheapest phone in world demand to have an inbuilt Bluetooth stack. Apart from sharing files, especially media, Bluetooth provides us with a lot more functionality, like streaming audio to a home entertainment system, allowing to share an Internet connection over DUN profile, a remote car locking and security system, a few to mention. Though the IEEE 802.15 stack has its own security mechanism, sometimes a system might require an additional security architecture running collaboratively with the in-built security to authorize an inbound pairing request. A simple example of the authorization paradox is that the standard security mechanism cannot help a Bluetooth system that was paired to multiple devices, to decide which of the paired devices to authorize to execute a certain task. For example, a device may be required to allow a smartphone Bluetooth stack to stream audio but restrict it from transferring files. Here need of a profile specific authorization is felt but it is beyond the scope of IEEE 802.15.
To understand it better, let us assume that a home theater system has a Bluetooth link which allows smart phones to stream audio to it over A2D Audio sharing profile. Such a home theater system (e.g. HT-DZ350 by Sony) can be connected to any smartphone and play the streamed music. Each time a device disconnects, the Bluetooth stack resets itself and identity of the Bluetooth stack on the smartphone is lost. Since Bluetooth radio waves can penetrate walls and windows, it may be possible that a neighbor of mine connected her smartphone to the Home theater system and played an unwanted music. Sometimes this can be fatal in some remote controlled instruments unless proper security mechanisms are installed.
Proposed in this thesis is a novel, generic and extensible framework to prevent unauthorized access over Bluetooth serial port profile; which is independent of any Cryptographic algorithm or approach. The thesis also suggests different architectures for differently equipped hardware systems, because the performance of the system under an augmented security stack will be different for different devices with varying hardware resources.