Vol 4 Issue 3-1

 

INTERNATIONAL JOURNAL OF ELECTRONICS & COMMUNICATION TECHNOLOGY (IJECT)-VOL IV ISSUE III, VER. 1 JULY TO SEPT 2013


International Journal of Electronics & Communication Technology Vol. 4 Issue 3, Ver. 1
S.No. Research Topic Paper ID
   1 Early Estimation of Delay Characteristics of Braun Multiplier

A.M.V. Pathi, B. Prudhvi Raj, Abdul Rahaman Shaik, M.Dileep

Abstract

HDL program describing the digital system is technology independent, but the synthesis tool that generates the circuit requires a technology file attached to it. The absence of such file causes the problem of non-possibility of time delay extraction. Here is a solution, based on modeling of the time delay in the HDL description of a Braun multiplier circuit. Top-Down design of large digital system has many advantages over the conventional bottom up approach. However, some important information about the components of the digital system at the bottom level is critical to satisfy design and timing constraints. The layout of the predesigned components, an inverter and a full adder, based on the 0.5mm CMOS technology, were completed. The extraction of their parasitic capacitance and propagation delay was also done. The extracted time delay will be used in the HDL description program of a Braun multiplier. The results of the extraction and modeling of the time delay, along with the HDL description of the multiplier will be presented. Generally the time delay and the parasitic capacitance and resistance are usually extracted at later stage of the design, at the post-layout simulation. However, it is beneficial to introduce such extraction or estimation at earlier stage to reduce the number of iterations to reach the optimum solution.
Full Paper

IJECT/43/1/C-769
   2 Digital Image Watermarking Using Alpha Blending Technique

Deepika Chaudhary, Virender Kumar

Abstract

The integrity and authenticity of digital image have become more important in the past few years with the fast improvement of digital technologies. A Digital image watermarking is a valid solution of protecting illegal manipulation of digital image. In this paper , DWT technique based on 3-level discrete wavelet transform is used for watermark embedding and extraction . In this technique girl’s image is used as host image and watermark is moon’s image which is embedded into lower frequency sub-band of host image using alpha blending technique. Various values of MAD’s, MSE’s, PSNR’s, S_MSE’s, SNR’s are analyzed for watermarked image quality.
Full Paper

IJECT/43/1/C-770
   3 Advances in Mobile Communication by Implementation of Smart Antennas

Vivek Kumar, Manju Jain, Deepak Rajouria, Vikas Kumar

Abstract

The antenna is one of the fundamental distinctions between a wired and a wireless system. The design of the antenna impacts the development of each component-from the circuit design to the receiver structure and coding technique, as well as the channel access protocol – employed in future wireless communication networks. The adoption of smart antenna techniques in future wireless systems is expected to have a significant impact on the efficient use of the spectrum, the minimization of the cost of establishing new wireless networks, the optimization of service quality, and realization of transparent operation across multi technology wireless networks. This paper presents brief account on smart antenna (SA) system in context of architecture, evolution and distinction of smart / adaptive antenna from the basic format of antenna. Further, about the radiation pattern of the antenna and why it is highly preferred in its relative field is explained. The capabilities of smart / adaptive antenna are easily employable to Cognitive Radio and OFDMA system.
Full Paper

IJECT/43/1/C-771
   4 Comparison Between Logarithmic Function and Hybrid Intensity Transfer Function for Image Enhancement

Ina Singhal, Virender Kumar

Abstract

Normally Image Enhancement is subjectively judged, with no reliable manner of quantifying the results of an enhancement. There is a need for an effective method of quantifying performance to select optimal parameters. In this paper, we will introduce about the techniques for that enhancement named as a logarithmic measure and Hybrid Intensity Transfer Function using logarithmic functions for both shadows and highlights which can be applied to grey scale images to improve their quality.
Full Paper

IJECT/43/1/C-772
   5 ICI Cancellation Using Modified Repeated Correlative Coding for OFDM Systems

Ritika, Garima Saini

Abstract

In this paper modified repeated correaltive coding is proposed to combat the inter-carrier interference (ICI) caused by the frequency offset in orthogonal frequency division multiplexing communication systems. A combination of Self ICI cancellation symmetric conjugate symbol repetition and correlative coding scheme has been used to reduce the effect of ICI in OFDM. The proposed scheme provides better BER than regular OFDM system, Self cancellation OFDM system for Rayleigh channel.
Full Paper

IJECT/43/1/C-773
   6 Cross-layer Design Security in Cognitive Radio Cellular Networks

Ahmadzai Ahmadi, Dr. Bhima Prabhakara Rao

Abstract

Existing research on cellular networks has explored the handoff issues, mainly focusing on cell selection and resource management in the last couple of decades. Especially, no special attention is given to either time or location-varying spectrum availability or switching delay in traversing the spectrum distributed over a wide frequency range, which makes conventional handoff schemes infeasible in CR cellular networks. However, recent research has mainly focused on spectrum mobility, but does not consider the effect of mobile users across multiple cells. This paper proposes a spectrum-aware mobility management scheme for CR cellular networks. To support spectrum mobility while maintaining maximum cell capacity, the spectrum mobility management function determines a proper handoff type and target cell for CR users experiencing PU activities by considering both spectrum utilization and stochastic connectivity models. Cognitive radio has three goals: low power, high speed and safety. Based on all kinds of different situations, these three goals have different important degree. Data transmission from a frequency switch to another frequency band can produce delay. This switching delay can cause malicious attacks in physical layer, such as deliberately continuous jam channel interference etc. So, it is worth studying cross-layer design security.
Full Paper

IJECT/43/1/C-774
   7 Building Linux Kernel and Modules for OMAP 4430 Based PANDABOARD

Mayur P. Punamiya, Ajit S. Gundale

Abstract

In this paper, we are demonstrating how to build Linux Kernel and USB Gadget Modules for OMAP 4430 based Pandaboard. We are using Mentor Graphics Sourcery Codebench for this purpose. We are also discussing certain kernel build utilities such as menuconfig.
Full Paper

IJECT/43/1/C-775
   8 MOSFET Based Design Analysis and Simulation of ZETA Converter

Niraj Kumar, Ramjee Prasad Gupta

Abstract

This paper deals with the analysis, design and simulation of MOSFET based ZETA converter for high frequency and high power application.The design modelling and simulink is carried out in MATLAB-SIMULINK software for100V & 200,50HZ. Using zeta converter. The wide variation of ac input voltage and output voltage is possible.the simulation result of zeta converter are possible with proportional integral controller for controlled output voltage.
Full Paper

IJECT/43/1/C-776
   9 BER & PAPR Performance of SC-FDMA-DSCDMA System in Rayleigh Fading for 4G Wireless Communication

Deepak Kedia, Arti Modi

Abstract

This paper evaluates the performance of Single Carrier Frequency Division Multiple Access-Direct Sequence Code Division Multiple Access (SC-FDMA-DSCDMA). Bit Error Rate and PAPR performance of SC-FDMA-DSCDMA with QPSK modulation technique in Rayleigh fading channel is analyzed. SC-FDMADSCDMA is a multiple access technique which has significantly lower PAPR than SC-FDMA system but its BER performance is closer to SC-FDMA. Simulation results show that SC-FDMADSCDMA performs better than any other OFDM-CDMA based system for wireless communication.
Full Paper

IJECT/43/1/C-777
   10 FPGA Implementation of 4-Bit and 8-Bit Barrel Shifters

Reshmi Maity, Niladri Pratap Maity

Abstract

A Barrel shifter is an electronic circuit that has the ability to shift data words in a single operation over standard shift left or shift right registers that utilize more than one clock cycle. In this paper we have designed the 4-bit and 8-bit barrel shifters, obtained simulations of the same using Xilinx 12.1 Integrated Software Environment (ISE) project navigator and ISE Simulator (ISim), then implemented the design in Xilinx Virtex-V Field Programmable Gate Array (FPGA) device. The core can be used to design for further development of 32-bit, 64-bit and so on for various applications.
Full Paper

IJECT/43/1/C-778
   11 Analysis Adaptive Beam Former Desighn Using Direct Matrix Inversion

JacobJohn, Dr.V.Sailaja, O.Sudhakar

Abstract

The smart antenna is a new technology that can be used in GSM and CDMA mobile communications. In the past, constant modulus algorithm is used in smart antenna systems. In this technique has low convergence speed and high computation complexity. So, to avoid CMA drawbacks Direct Matrix Inversion (DMI) algorithm has been proposed. In DMI algorithm the weight of antenna arrays can be adjusted to form certain amount of adaptive beam to track corresponding users automatically and at the same time to minimize interference arising from other users by introducing nulls in their directions. Thus interferences can be suppressed and the desired signals can be extracted. The DMI algorithm has fast convergence speed and low computation complexity. The experimental results shows the convergence of the array for two interference, amplitude response of different antenna arras and error response of DMI algorithm.
Full Paper

IJECT/43/1/C-779
   12 GPS & GSM Based Speed Regulation System

N. Krishna Chaitanya, D. Thirupathi Reddy

Abstract

India holds the distinction of registering the highest number of accidents in the world. Exceeding the limits or driving too fast is one of the most important factors contributing to traffic crashes therefore actions are required to properly monitor and regulate the vehicle speeds. In an attempt to bring down the number of road accidents caused due to intentional or unintentional over speeding of vehicles in urban areas, proposed here is a design of speed regulation device. This paper deals with creating an onboard speed regulation system which can monitor as well as control their instantaneous speed in comparison with the maximum permissible speed of that location. The location is obtained using the of GPS and GSM system.
Full Paper

IJECT/43/1/C-780
   13 A Novel Approach of Kalman Filtering Algorithm for Speech Enhancement

P.L.Ashwini, J.S.S.Ramaraju, Y.Chalapathi Rao

Abstract

Quality and intelligibility of speech signals might significantly deteriorate in the presence of background noise, especially when the speech signal is degraded by environmental noise. In particular, speech coders and Automatic Speech Recognition (ASR) systems that were designed or trained to act on clean speech signals might be rendered useless in the presence of background noise. The conventional kalman filter algorithm for speech enhancement uses Auto regressive model that it requires a lot of matrix operations automatically reduces efficiency and increases computational time of the clean speech signal. We propose a novel approach of Kalman filtering algorithm for speech enhancement is adaptive filter to eliminate matrix operations and reduces time by only constantly updating state vector of speech signal. A Noval Kalman filtering algorithm along with perceptual weighting filter was proposed to enhance the speech better than conventional method. Our simulation results shows Perceptual weighted filter method effective for speech enhancement, compared to the conventional Techniques.
Full Paper

IJECT/43/1/C-781
   14 A Novel Approach for Automated Number Plate Recognition

SK.Ameer, J.S.S.Ramaraju, Y.Chalapathi Rao, S.Karuna

Abstract

Number plate recognition systems have received a lot of attention from the research community to recognize vehicles. Many techniques are difficult to identify non standard number plate characters. In this paper we propse a novel method for number plate recognization. Automated Number Plate Recognition (“ANPR”) technology takes the information extracted from the license plates is mainly used for traffic monitoring, access control, parking, motorway road tolling, etc. In this work an intelligent real time On Line Number Plate Recognition System which caters to the need for intelligent traffic management system, in order to cope up with constantly increasing traffic on today’s roads has been developed. Automated Number Plate Recognition (ANPR) algorithms in images are generally composed of four processing steps, namely, Image acquisition, Number plate detection and extraction, Character segmentation, is done through fusion of spectral analysis and connected component analysis and Character recognition is done using support vector machines. Finally, simulation results shows our recognization system gives better performance and more efficient for recognization and database checking.
Full Paper

IJECT/43/1/C-782
   15 A New Concept of Face Identification Based on Logical Features and Nonlinear Mappings

S.Karuna, A.Renuka Narasimha, Y.Chalapathi Rao, SK.Ameer

Abstract

The low quality of facial images significantly degrades the performance of conventional face recognition systems. These Low- Resolution (LR) images are common in practice, usually caused by the limited accuracy of available hardware and capturing device. Canonical correlation analysis is applied to establish the coherent subspaces between the Principal Component Analysis (PCA) based features of High-Resolution (HR) and LR face images. For the problem of low identification rate on low resolution face images. We focus on to find meaningful projections of the data. However, we are facing an unsupervised problem where we don’t have access to any labels. in which case PCA in not a suitable technique. In this paper a new nonlinear form of PCA method is proposed i.e., Kernel principal component analysis. It can efficiently compute principal components in high dimensional feature spaces, related to input space by some nonlinear mappings. The recognition performance for face identification based on logical features and nonlinear mappings in order to increase the recognition rate on inputs of low quality images. We apply nonlinear mappings based on linear combinations of Radial Basis Functions (RBFs) to bridge the LR and HR features for recognition of a single LR image with a wide range of variations Finally, Our simulation results shows higher recognization rate and low computational complexity, Compared with other methods, our method is robust to pose and expression variations and achieves higher identification rate.
Full Paper

IJECT/43/1/C-783
   16 Selection Design of Initial Radius and Performance Evaluation of Reduced Complexity in Sphere Decoder for MIMO Systems

Anirudh Sharma, Garima Mathur, Dr. M.Salim, R.P.Yadav

Abstract

Soft iterative decoding techniques have shown to a great extent result in terms of Bit Error Rate performance in wireless communication. By using MIMO system we attain high multiplexing gain. However, this is only possible if an expedient detection technique is used. ML detection technique allows soft decisions for each received bit along with good error performance. In this paper we propose new technique for decoding Multiple Input – Multiple Output (MIMO) system, which combine Sphere Decoding (SD) with Zero Forcing (ZF) ,MMSE and V-BLAST techniques to make accessible near optimal low complexity and high performance modified sphere decoding algorithm. Simulation results on a QPSK Modulation with 4 transmit and 4 receiveantennas show that the propose sphere decoder can achieve the near-optimal performance.
Full Paper

IJECT/43/1/C-784
   17 HSV and Gradient Based Shadow Removal Algorithm for Foreground Detection in Video Surveillance System

M.V.V.S.Chowdary, K Durga Gangarao

Abstract

In the recent years, the field has seen many advances, but the solutions have many restrictions: people must be moving, the image resolution must be high and the background must be simple. This paper aims to develop an efficient method for detecting and removing of shadows in a low resolution image with complicated scenes also. And we proposed an accurate algorithm to prevent moving shadows from being misclassified as part of moving objects in video target segmentation. Firstly, moving objects in the videos were achieved through background subtraction using morphological process. Then, moving shadows were eliminated by a shadow detection algorithm. Finally, we have to perform a morphological reconstruction algorithm to recover the foreground distorted after shadow removal process and also we will represent the mapping for tracking the particular moving object. The experimental results proved its validity and accuracy in various fixed outdoor video scenes.
Full Paper

IJECT/43/1/C-785
   18 A Compact High Pass Filter Using Defected Ground Structure Technique

Abhisar Khokhar, Dr. P.K Singhal

Abstract

In this paper, a compact high pass filter is proposed using a very popular concentric ring type Defected Ground Structure (DGS). Defected Ground structure used in this design consists of double concentric split rings each having different size, shape and inverse split gaps. On the signal plane, a pair of C-shaped coupled lines is used to prevent transmission at low frequencies. High pass filter proposed has cut-off frequency of 1.1 GHz and size of 22× 15mm2 which is quite small in comparison to conventional high pass filters operating at the same frequency.
Full Paper

IJECT/43/1/C-786
   19 Signature Verification Based on Texture Features of Image

Saba Mushtaq, Ajaz Hussain Mir

Abstract

Signatures are one of the most important and commonly used tool for human identification. This paper proposes an offline signature verification method based on texture analysis of the image. A sample of signatures is used to represent a particular person. For each known writer sample of fifteen genuine signatures are taken. Forged signatures are also used to test the efficiency of the system. For each signature gray level run length matrix features are extracted and the inter-class distances and intra class distances have been calculated. For each test signature the intraclass threshold is compared to the inter-class threshold for the claimed signature to be verified using Euclidean distance model. Results showed that signature texture feature can be reasonably used for personal verification. Texture based feature extraction technique consistently outperformed the traditional grid based feature extraction technique. Accuracy of 85% was achieved with the Euclidean distance classifier with FAR and FRR as low 13.33% and 16.4%.
Full Paper

IJECT/43/1/C-787
   20 Leakage Power Reduction in CMOS Circuits Using Leakage Controlled PMOS Technique in Nano Scale

Giddi Srinivasarao, M. Vinod Kumar

Abstract

In deep submicron technologies, leakage power becomes a key for a low power design due to its ever increasing proportion in chip’s total power consumption. Power dissipation is an important consideration in the design of CMOS VLSI circuits. High power consumption leads to reduction in battery life in case of battery powered applications and affects reliability packaging and cooling costs. We propose a technique called LCPMOS for designing CMOS gates which significantly cuts down the leakage current without increasing the dynamic power dissipation. LCPMOS, a technique to tackle the leakage problem in CMOS circuits, uses single additional leakage control transistor, driven by the output from the pull up and pull down networks, which is placed in a path from pull down network to ground which provides the additional resistance thereby reducing the leakage current in the path from supply to ground. The main advantage as compared to other techniques is that LCPMOS technique does not require any additional control and monitoring circuitry, thereby limits the area and also decreases the power dissipation in active state. Along with this, the other advantage with LCPMOS technique is that it reduces the leakage power to an extent of 91.54%, which is more efficient in aspects of area and power dissipation compared to other leakage power reduction techniques.
Full Paper

IJECT/43/1/C-788
   21 Denoising and Restoration of Image Using Wavelets

Ashish Garg, Sandhya sharma, Vipin Gupta

Abstract

Image denoising and restoration is required in many practical image processing methods .Quality of image transmitted as digital images is a major means of communication in the todays age. The image during transmission is corrupted with noise. It includes Gaussian noise, Impulse (salt and pepper) noise. The received output image need to be denoised before it can be used further. This paper discuss various wavelet based denoising algorithms, that denoise image by an easy and highly reliable process. After discussing image denoising methods applied in wavelet domain of the noisy observation, the paper provides an introduction to restoration, or process of removing blur from an image, which is an ill-conditioned process. Here I discuss various restoration techniques commonly used by us, and regularized methods to solve the problem of ill-conditioning. An introduction to basic image concepts, and wavelets is given in the Unlike the Fourier transform, whose basis functions are sinusoids, wavelet transforms are based on small waves, called wavelets, of varying frequency and limited duration. Wavelets gives a new approach to signal processing and analysis called multiresolution theory. Multiresolution theory consists techniques like subband coding from signal processing ,quadrature filtering, etc. Multiresolution theory is concerned with the representation and analysis of signals (or images) at more than one resolution. Thus, it provides a complete framework for wavelets, denoising, and restoration using wavelets. Various techniques of denoising and restoration are also implemented at the end, to build a deep insight of the topic.
Full Paper

IJECT/43/1/C-789
   22 An Area Efficient Low Power Fully Dynamic Latched Comparator in Nano Scale Technologies

Pyla Rajesh, Shaik Mastan Vali

Abstract

In this paper, three different types of fully dynamic latched comparators are simulated and their performance parameters such as power speed and input-referred offset voltages are compared. Comparing with pre-amplifier based latched comparators all performance parameters of these comparators are well defined. An area efficient fully dynamic latched comparator, which consumes low power, used for the high speed ADC applications, is proposed in this paper. The proposed design is different from the conventional circuit by replacing a new latch for low power supply voltage operation, which offers the great advantages such as low power, high speed and area efficient. All the three comparators are simulated in 90nm technology and performance parameters are noted using Hspice. Scaling down the transistors lengths to 65nm and 45nm technologies and power is calculated for dynamic latched comparators using Hspice.
Full Paper

IJECT/43/1/C-790
   23 Automatic Segmentation Using Maximum Likelihood EM Algorithm

Poornima. J, Dr. R. Pugazendi

Abstract

Numerous improvements have been carried out to increase the performance of the existing algorithms. But most of them tend to meet inadequate results. An automatic threshold approach using fuzziness measure is presented in this paper. Here the image with noise is loaded by using Salt and Pepper technique. Using Recursive Weighted Median Filter (RWM) the input image with noise can be filtered to get the output without noise. This work is an improvement over the existing method. In the existing methods OTSU’s technique, Fuzzy C Mean (FCM), Fuzzy Set Theory (FST) are used. In the proposed method Expectation and Maximization (EM) Algorithm have been performed. Two initial regions of gray levels, located at the boundaries of the histogram are defined. Then, using an index of fuzziness, a similarity process is started to find the threshold point. The system is used for testing the image segmentation for Magnetic Resonance Imaging (MRI) images. Later the results are compared for its performance.
Full Paper

IJECT/43/1/C-791
   24 Overview of the ASIC Design Flow From RTL to GDSII

Komalpreet Kaur, Gurpreet Singh

Abstract

This paper presents an overview to various stages involved in the Application-Specific Integrated Circuit (ASIC) design flow from RTL to GDSII. The input to the design process is the circuit description at the register transfer level (RTL) and the final output from the design process is the full chip layout in the graphics data system II (GDSII) format. The entire design flow is briefly described in this paper, starting from concept to chip tape-out .The Electronic Design Automation (EDA) tools take the RTL design through the synthesis and verification stages at the gate level and switch level to eventually produce a physical design described in graphics data system II (GDSII) format that is ready to signoff for fabrication and manufacturing test. GDSII is a database file format used as the industry standard for IC layout data exchange. GDSII is the file used by the foundry to fabricate the ASIC. GDSII files are considered to be a final output the IC design cycle and are passed to IC foundries for IC fabrication.
Full Paper

IJECT/43/1/C-792
   25 Design and Simulation of Reconfigurable Dual Microstrip Patch Antenna for Cognitive Radio

S. Arivazhagan, R.Ahila Priyadharshini, D.M.Shermiln Reena

Abstract

A frequency reconfigurable dual patch element C-slot antenna operating at wideband and multiband mode is being presented for Cognitive Radio systems. The antenna consists of a dual patch element, two switches embedded with PIN diode, two chip capacitor. Antenna is made to operate in dual band mode and wide band mode at a frequency range of 5 – 7 GHz. This frequency tuning between two bands is obtained by switching the two patch elements ON and OFF. Dual band mode is obtained by switching either one of the two patch elements to “ON” state and wide band mode is achieved by switching “ON” both the patch elements. The dimension and position of the C-slot is used to control the operating frequency in the dual band mode without affecting the performance of wide band mode. Patch antenna with the absence of C-slot operates in single band mode. Thus two dual band and one wide band operation are achieved using the same antennadimension which overcomes the need for increasing the surface area. The modeling and simulation of reconfigurable antenna is computed using Agilent’s ADS.
Full Paper

IJECT/43/1/C-793
   26 Preserving Location Privacy from Bottleneck Area in Wireless Sensor Networks

Lijo Jacob, Amithab.M, Parameshachari B D, Muruganatham C, H S Divakara Murthy, S B Ershad

Abstract

In wireless sensor networks, adversaries can make use of the traffic information to locate the monitored objects, e.g., to hunt endangered animals or kill soldiers. In this paper, we first define a hotspot phenomenon that causes an obvious inconsistency in the network traffic pattern due to the large volume of packets originating from a small area. Second, we develop a realistic adversary model, assuming that the adversary can monitor the network traffic in multiple areas, rather than the entire network or only one area. Using this model, we introduce a novel attack called Hotspot-Locating where the adversary uses traffic analysis techniques to locate hotspots. Finally, we propose a cloud-based scheme for efficiently protecting source nodes’ location privacy against Hotspot-Locating attack by creating a cloud with an irregular shape of fake traffic, to counteract the inconsistency in the traffic pattern and camouflage the source node in the nodes forming the cloud. To reduce the energy cost, clouds are active only during data transmission and the intersection of clouds creates a larger merged cloud, to reduce the number of fake packets and also boost privacy preservation. Simulation and analytical results demonstrate that our scheme can provide stronger privacy protection than routing-based schemes and requires much less energy than global-adversary-based scheme
Full Paper

IJECT/43/1/C-794
   27 A Study of Various Image Compression Techniques

Renu Sharma

Abstract

This paper addresses the area of image compression as it is applicable to various fields of image processing. On the basis of evaluating and analyzing the current image compression techniques this paper presents the Principal Component Analysis approach applied to image compression. PCA approach is implemented in two ways – PCA Statistical Approach & PCA Neural Network Approach. It also includes various benefits of using image compression techniques.
Full Paper

IJECT/43/1/C-795
   28 Analyzing of Short Range Underwater Optical Wireless Communications Link

Mazin Ali A. Ali

Abstract

This paper analyze underwater optical wireless communication link based on free space optical communication link. We had a comparison between the wavelengths (405, 650) nm under the same conditions. The main focus of this paper is to analyzing the effect of water attenuation (absorption, scattering and total) on communication link. The analyzing included the receiver signal power, link margin, data rate and the signal to noise ratio. It is concluded from the analysis that the wavelength 650nm is the best from the wavelength 450nm. On the other hand the pure sea and clean ocean water is the best from the other water types under the same operation conditions.
Full Paper

IJECT/43/1/C-796
   29 A Weighted Modulo 2n+1 Adders by Partitioned Parallel-Prefix Computation method

Kiran Babu Bathula, Dr. V. Sailaja

Abstract

In this paper, we propose a low complexity design of weighted modulo 2n+1 adder, derived by decomposition of parallel-prefix computation into several blocks of smaller input bit-widths. Besides, we have proposed a novel Enhanced Circular Carry Generation (ECCG) unit to process the carry-bits produced by all the parallelprefixcomputation units (of small input bit-widths) to obtain the final modulo sum efficiently in terms of area-delay product. We have implemented the proposed adders using 0.13 μm CMOS technology; and from the synthesis results we find that our proposed adder outperforms the previously reported weighted modulo 2n+1 adder. It offers a saving of area-delay product up to 49% over the existing methods.
Full Paper

IJECT/43/1/C-797
   30 Performance Analysis of a Cognitive Radio User in Presence of Fading and Non-Fading Environments

K.W. Rajesh Kumar, D. Shyam Babu, G. Rajavali

Abstract

Cognitive radio systems offer the opportunity to improve spectrum utilization while avoiding the interference to primary users. In this paper shows the performance of a cognitive radio networks based under the outage probability and it is depends on the primary users. Cognitive radio users should control their transmission power. On the other hand, the interference from primary network may degrade the performance of cognitive radio network. So we evaluate performance of a Cognitive Radio (CR) user in faded and non-faded environments.
Full Paper

IJECT/43/1/C-798