IRD India

Displaying 1-40 of 310 results

  • White Papers // Jun 2015

    Mining With Big Data Using HACE

    With a fast growth of networking, streaming, data storage and its collection capacity, big data are now unfolding fastly in all fields of science, medical, engineering, politics, entertainment, social media etc. with all this autonomous sources having complex and evolving relationships between the, heterogeneous data is accumulated, this is a...

    Provided By IRD India

  • White Papers // Jun 2015

    Proactive Source Routing Protocol for Mobile Ad Hoc Networks Using BFST Algorithm

    Opportunistic data forwarding has drawn much attention in the research community of multihop wireless networking, with most research conducted for stationary wireless networks. One of the reasons why opportunistic data forwarding has not been widely utilized in Mobile Ad hoc NETworks (MANETs) is the lack of an efficient lightweight proactive...

    Provided By IRD India

  • White Papers // Jun 2015

    GSM Based Fuel Theft Detector Using Microcontroller

    In this paper, the authors have focused on developing an enhancement of the vehicle alarm security system via SMS. The system will manipulate a mobile phone to send SMS. Even though the SMS can be sent using the features available in the mobile, the objective of this experiment is to...

    Provided By IRD India

  • White Papers // May 2015

    Design of High Throughput AXI Compliant DDR3 Controller

    In this paper, the authors describe the implementation of AXI compliant DDR3 memory controller. It discusses the overall architecture of the DDR3 controller along with the detailed design and operation of its individual sub blocks, the pipelining implemented in the design to increase the design throughput. It also discusses the...

    Provided By IRD India

  • White Papers // May 2015

    Automatic Saline Level Monitoring System Using Microcontroller ATMEGA 328

    In this paper, the authors propose an automatic, low cost saline level measurement system using microcontroller ATMEGA 328.The main building blocks of the proposed system are microcontroller ATMEGA 328, Bluetooth module and IR sensors. The system contains two LEDs. The status of the saline can be given in two forms...

    Provided By IRD India

  • White Papers // May 2015

    Controller Area Network to Ethernet Conversion Using Raspberry Pi

    Controller Area Network (CAN) and Ethernet both use Carrier Sense Multiple Access with Collision Detection (CSMA/CD) as a media access control method. Beyond that, the CAN protocol is based on CSMA/ CD/AMP (Carrier-Sense Multiple Access/Collision Detection with Arbitration on Message Priority) protocol. Due to CSMA/CD in Ethernet as soon as...

    Provided By IRD India

  • White Papers // May 2015

    A Survey on Shortest Path Estimation Using RDBMS Over Graph

    Recently with the advancement of social networking sites vast amount of data emerges out, which is usually in the form of graph data. Many graph search queries are in use to access and retrieve this data. Shortest path computation is required in many applications for their faster execution and can...

    Provided By IRD India

  • White Papers // May 2015

    On Clouds the Authentication of Data Storage Using Decentralized Access Control by Unidentified Way

    The authors propose the secure data storage in clouds for a new decentralized access. The cloud verifies the authenticity of the series without knowing the user's identity in the proposed scheme. Their feature is that only valid users can able to decrypt the stored information. It prevents from the replay...

    Provided By IRD India

  • White Papers // May 2015

    On the Utilization Aspect of Document Data for Mining the Side Information

    In text mining applications, side-information is also available along with the text documents. This side-information can be like document provenance information, links existing inside the document, web logs based on user-access behavior, or non-textual attributes which exist in the text document. Such attributes will contain remarkable amount of information for...

    Provided By IRD India

  • White Papers // May 2015

    Design and Implementation of Spartan 6 Series FPGA Board and Application of PID Controller for Robots

    The Spartan-6 family of field-programmable gate arrays is one of the latest devices and specifically designed to meet the needs of high volume, cost-sensitive consumer electronic applications. The thirteen-member family offers densities ranging from 3,840 to 147,443 logic cells and system gates. The Spartan-6 family builds on the success of...

    Provided By IRD India

  • White Papers // May 2015

    A Novel Approach for Implementation of AES Algorithm on NOC

    Network-on-Chip (NoC) is the scalable platform where billion transistors have been integrated on to a single chip. NoC architecture is an mxn mesh of processing elements where resources are placed on the slots formed by the switches. Each switch is connected to one resource and four neighboring switches, and each...

    Provided By IRD India

  • White Papers // May 2015

    Analysis of Harmonics in Five Phase Inverter Drive with Double Tuned Filter Using Simulink/LATLAB

    The advancement in present technologies high speed electronics is generates unwanted harmonics in the line voltages and currents. Mitigation of harmonics is the present challenge and the best solution is to implement with the filters. This paper presents the design of double tuned filter to reduce the voltage/current harmonics produced...

    Provided By IRD India

  • White Papers // May 2015

    Fault Tolerant Linear State Machine Design Approach for Safety Critical Systems Implemented on FPGA

    In this paper, the authors propose a new method for the design of fault tolerant linear state machines with initial state 0 and one dimensional input and one-dimensional output. It is shown that the LFSR-implementation of the transfer function of a linear automaton can be utilized to correct transient errors...

    Provided By IRD India

  • White Papers // May 2015

    A Modified Switching Median Filter Using Fuzzy Logic

    Digital images get corrupted by impulse noise when acquired by a defective sensor or when transmitted through a faulty channel. This paper presents a new Fuzzy Switching Median (FSM) filter employing fuzzy techniques in image processing. This filter is able to remove salt-and-pepper noise in digital images while preserving image...

    Provided By IRD India

  • White Papers // May 2015

    Sustainable HR: A Need for a Sustainable Enterprise

    In status quo the word "Sustainability" is a commonly used word. It's a challenge for everyone everywhere beginning from environment to economy. But, the modern competitive and globalized business world has expanded the meaning and the value of sustainability. This paper represents the role of human capital and its management...

    Provided By IRD India

  • White Papers // Apr 2015

    Design and Implementation of Secured Data Embedding Method using Quick-Response Code and COLOR LSB

    Steganography is the study of concealing the reality in the data which the users are sending. The objective of steganography is to implant a mystery message inside a bit of unsusceptible data. The consequence of steganography relies on upon the mystery of the cover carrier. After the steganographic bearer is...

    Provided By IRD India

  • White Papers // Apr 2015

    An Efficient String-Join Architecture Using Map-Reduce Approach

    The string relationship join, that happens to identify similar string-pairs from string-sets, gets comprehensive interest in DataBase (DB) and data retrieval programs. For this challenge, the refine and filter structure is typically implemented by the existent investigation work initially and then different streaming techniques have also been proposed. In the...

    Provided By IRD India

  • White Papers // Apr 2015

    Document Clustering using K-Medoids

    People are always in search of matters for which they are prone to use internet, but again it has huge assemblage of data due to which it becomes difficult for the reader to get the most accurate data. To make it easier for people to gather accurate data, similar information...

    Provided By IRD India

  • White Papers // Mar 2015

    Establishing Secure Mining of Item Set in a Databases that is Dispersed Horizontally

    The authors propose transaction databases where the user requirements changes accordingly. The association is for predict the user needs with the given data. Before, there were some algorithms which are fast and not secure one, another set of algorithm which has a security based protocol but the processing time is...

    Provided By IRD India

  • White Papers // Mar 2015

    Data Mining with Big Data: A Survey

    Big data is a new term for a large and complicated data set that it becomes difficult to process using a traditional data management tools. Big data are now growing rapidly in all science and engineering domains, including biological, physical and bio-medical sciences. Big data mining is the art of...

    Provided By IRD India

  • White Papers // Mar 2015

    Effective Secure Multi-Keyword Top-K Retrieval Over Relational Databases

    Keyword has emerging as a promising pattern for data outsourcing and high-quality data services. However, concerns of sensitive information on potentially cause privacy problems. Data encryption protects data security to some extent, but at the cost of compromised efficiency. Searchable Symmetric Encryption (SSE) allows retrieval of encrypted data. In this...

    Provided By IRD India

  • White Papers // Mar 2015

    Parallel Mining of High Utility Itemsets From Large Transactional Databases

    In this paper, the authors generate the high utility (profitable) item sets in a parallel environment, by considering the both profit and quantity of each item. The parallel mining of high utility item sets will take very less time than mining with the single system over large number of transactions....

    Provided By IRD India

  • White Papers // Mar 2015

    Robust Traffic Congestion Reduction Strategies, Through Public Networking in Android Smart Phone

    The randomly and frequently disorder of public population growing enable the traffic congestion and that is root cause of evolution and generation of traffic congestion. It is evaluated and can effect in transport planning decision. It is being found that various factors that enables congestion cost, estimates and the evaluation...

    Provided By IRD India

  • White Papers // Mar 2015

    Improved Software Development Effort Estimation Based on Four Fuzzy Logic Functions

    The systems and software development industry is characterized by a paradigm of project failure. One of the known contributing causes of these project failures is poor requirements engineering and management, which has been repeatedly and widely discussed and documented. But there are other factors also like poor software project management...

    Provided By IRD India

  • White Papers // Mar 2015

    Semantic Based String Matching Algorithm for Mining Service Information

    Web crawlers are one of the most crucial components used by the search engines to collect pages from the Web. It is an intelligent means of browsing used by the search engine. The requirement of a web crawler that downloads most relevant web pages from such a large web is...

    Provided By IRD India

  • White Papers // Mar 2015

    Accurate Results on Shared Memory Multi-Core Processors

    As days are passing, technology is taking its force towards its smartness. But, there are some devices which are to be modified for better accurate results. Parallel processing is the simultaneous use of more than one CPU or processor core to execute a program or multiple computational threads. Ideally, parallel...

    Provided By IRD India

  • White Papers // Mar 2015

    Graphene Based Transistor: G-FET

    It has come to a time, when the search beyond silicon for using it in transistors has gained serious importance. If the researcher's prediction is to be substantiated in today's world, then a post silicon age in the semi-conductor industry is to be ushered soon. In this paper, graphene-derived nano-materials...

    Provided By IRD India

  • White Papers // Mar 2015

    Design of Fast Multipliers Using Vedic Mathematics

    Vedic mathematics is the ancient mathematics which has unique technique of mental calculation with help of simple rules and principles based on 16 sutras. Urdhava-Tiryagbhyam sutra is one among the 16 sutra in Vedic mathematics. Urdhava-Tiryagbhyam multiplier provides high speed and regularity in layout or even combination of them. Binary...

    Provided By IRD India

  • White Papers // Feb 2015

    Data Anonymization Technique for Privacy Preservation on Mapreduce Framework

    Cloud computing is a revolutionary computing approach, which provides massive storage and computational capability. Cloud computing is a computing paradigm which enables flexible, on-demand and low cost usage of resources. These advantage, are the causes of privacy and security issues, which arises because data owned by different users are stored...

    Provided By IRD India

  • White Papers // Feb 2015

    Wireless Residential Lighting Control and Home Security for Real Time Application

    In the current global scenario, remote lighting control is one of the challenges in residential buildings. Using GSM modem and RF communication for controlling lights through mobile phone and remote control respectively and inclusion of motion sensors to the wireless lighting control network enables intelligent lighting solutions unleashing great benefits...

    Provided By IRD India

  • White Papers // Feb 2015

    16-Bit Low Power Booth Encoded Multiplier Design Using GDI CMOS Logic

    Gate Diffusion Input (GDI) a new technique of designing a low-power digital combinational circuit is described. The technique allows reducing power consumption, propagation delay and area of digital circuits while maintaining low complexity of logic design. The GDI approach allows implementation of a wide range of complex logic functions using...

    Provided By IRD India

  • White Papers // Feb 2015

    One to Many Data Linkage Using One Class Clustering Tree

    In many domains one-to-many data linkage is an essential task, however, many of the publications have not addressed this paper. Traditionally, data linkage is performed among the entities of similar type, however, developing linkage techniques that link between matching entities of different types is also very important. In this paper,...

    Provided By IRD India

  • White Papers // Feb 2015

    Enhance Image using Dynamic Histogram and Data Hiding Technique

    The inconspicuous world of technology the task of secure data transfer stood futile. There are many ways to make data secure with the processing techniques. The data is insinuated in a host and converted using encryption methods for further transfer. The host medium is mutated using some principles of alteration...

    Provided By IRD India

  • White Papers // Jan 2015

    Design of Low Power Digital CMOS Comparator

    In this paper, the authors propose a comparator design using conventional digital CMOS cells featuring wide-range and high-speed operation. The Comparison is most basic arithmetic operation that determines whether one number is greater than, less than or equal to the other number. Their comparator uses a novel scalable parallel prefix...

    Provided By IRD India

  • White Papers // Dec 2014

    Project Management- Is It Managing Technical Skills or Human Skills?

    With the fast changing world and technological developments, project management as a science and art has developed by leaps and bounds. This paper aims to study what are the skills required by a manager to be an excellent project manager. The human skills are analyzed to know its elements. The...

    Provided By IRD India

  • White Papers // Dec 2014

    Delay Redundant Multi Operand Adder Using Cyclic Combinational Method

    In this paper, the authors propose the efficient implementation of multioperand redundant compressor trees in modern FPGAs by using their fast carry resources. Their approaches strongly reduce delay and they generally present no area overhead compared to a CPA tree. Moreover, they could be defined at a high level based...

    Provided By IRD India

  • White Papers // Dec 2014

    An Efficient Implementation of 4X4 Vedic Multiplier Using Power Gating Method

    In this paper, the authors propose a various multipliers implemented using CMOS logic style and their comparative analysis on the basis of power and PDP (Power Delay Product). A variety of multipliers have been reported in the literature but power dissipation and area used by these multiplier circuits are relatively...

    Provided By IRD India

  • White Papers // Dec 2014

    Dynamic Resource Scheduling & Monitoring in Cloud Computing

    Cloud computing allows clients to range upwards and downwards their resource convention based on requirements. Many of cloud versions come from resources multiplexing by using virtualization technology. To decrease energy wastage by idle server, the traditional way is to keep a server to sleep throughout unused period, with a alternative...

    Provided By IRD India

  • White Papers // Dec 2014

    Robust Node Clone Detection in Arbitrary Wireless Networks

    Wireless networks have an impact of responsiveness in ancient times as a result of their wide variety of vicinity. In general, WSNs include 100s or even 1000s of inexpensive, source constrained, scattered sensor nodes, which frequently spread within the scrutiny vicinity arbitrarily. Consider process upbringing is poor, protection mechanisms are...

    Provided By IRD India

  • White Papers // Dec 2014

    A Novel Design of All Digital Phase Locked Loop for VLSI Applications

    The design of the ADPLL must intend to have a phase detection system with higher phase accuracy for minimum phase error. The need for All Digital Phase Locked Loop (ADPLL) was required basically because the microprocessors do not have enough processing power at such high frequencies even though with integrated...

    Provided By IRD India

  • White Papers // Oct 2013

    Microcontroller Controlled IGBT Z-Source Matrix Converter

    In this paper, the authors present a single phase z-source buck-boost matrix converter which can buck and boost the output voltage with step change frequency i.e. both the voltage and the frequency can be steeped up or steeped down. Also, this converter uses a safe-commutation technique to conduct current in...

    Provided By IRD India

  • White Papers // Aug 2014

    Inverter with Three Phase Preventer & Selector for Industrial Application

    In this competing world where efficient and effective production takes place, industries uses 3 phase supply that cannot afford a failure of even a single phase. Failures of any phases make appliances prone to erratic functioning and may even lead to failure of that appliance. Goal is to build a...

    Provided By IRD India

  • White Papers // Apr 2015

    An Efficient String-Join Architecture Using Map-Reduce Approach

    The string relationship join, that happens to identify similar string-pairs from string-sets, gets comprehensive interest in DataBase (DB) and data retrieval programs. For this challenge, the refine and filter structure is typically implemented by the existent investigation work initially and then different streaming techniques have also been proposed. In the...

    Provided By IRD India

  • White Papers // Aug 2014

    A Roadmap to Varied Density Dataset Issue of DBSCAN and Its Variants

    Clustering or cluster analysis, an unsupervised learning, is the process of grouping the objects of similar kind. Clustering plays an outstanding role in data mining applications and is the subject of active research in several fields such as statistics, pattern recognition and machine learning. Thousands of clustering algorithms have been...

    Provided By IRD India

  • White Papers // Feb 2014

    Survey of Mapreduce Optimization Methods

    MapReduce is a widely used data-parallel programming model for large-scale data analysis. The framework is shown to be scalable to thousands of computing nodes and reliable on commodity clusters. MapReduce provides simple programming interfaces with two functions: map and reduce. The functions can be automatically executed in parallel on a...

    Provided By IRD India

  • White Papers // Aug 2013

    FPGA Implementation of a Reduct Generation Algorithm Based on Rough Set Theory

    Rough Set Theory (RST), proposed by researchers in 1982, is a mathematical tool for classification and analysis of imprecise, uncertain, incomplete or vague information and knowledge. Using various concepts in RST, classification of objects in various classes is done by removing irrelevant and redundant data by using attribute reduction algorithm....

    Provided By IRD India

  • White Papers // Aug 2013

    Analog Performance of Nanoscale Germanium-on-Insulator PMOSFETs

    In this paper, the authors present a non-charge sheet approach to calculate the drain current based on accurate computation of 2D surface potential taking into account the influence of the fixed charge and interface-trapped charge densities for fully depleted GeOI p-MOSFETs. An effective carrier concentration depending on the bias conditions...

    Provided By IRD India

  • White Papers // Aug 2013

    Design and Comparative Performance Analysis of 1-T DRAM Cell with Nanoscale SOI and MOS Structures

    Presently, low power device design and implementation have got a significant role to play in VLSI circuit design. VLSI circuit efficiency, either memory or processor can be significantly improved through a combination of device scaling, new device structures and material property improvement to its fundamental limits. Since, conventional silicon technology...

    Provided By IRD India

  • White Papers // Nov 2013

    Implementation and Verification of Audio Codec Controller Using Low Power Techniques

    Today, the low power or power efficiency is a key design requirement for nano-meter designs. As technologies have shrunk, leakage power consumption has grown exponentially, thus requiring power reduction techniques. In this paper, the authors focus on the implementation of micro architecture design, verification and place and route layout using...

    Provided By IRD India

  • White Papers // Jul 2013

    Protected Remote Control Engine of Field Programmable Network Hardware

    To develop a secured system between a node and a programmable system network hardware device which will provide information check and add redundancy of sequence number over the internet by sending a control message. Thus here, FPGA hardware provides maximum speed with output in no time thereby increasing the speed...

    Provided By IRD India

  • White Papers // Aug 2013

    Implementation of Single Phase Grid Tied Photovoltaic System by Employing Embedded Controller

    In this paper, the authors present simulation and hardware implementation of single phase grid tied photo-voltaic system. A grid tied PV system is one in which solar power system is connected to the load and power grid. This enables them to sell surplus energy to the electricity board. Compared to...

    Provided By IRD India

  • White Papers // Apr 2013

    Design and Implementation of Wireless Transceiver System Based on FPGA

    Design of wireless data transmission system in short distance by using FPGA and RF chip RF2401 is introduced in this paper: the wireless data communication system constitutes of SOPC (the core of the system) embedded in FPGA and the necessary peripheral circuits. The paper also introduces the usage of the...

    Provided By IRD India

  • White Papers // Jul 2013

    An Novel Approach to Mine Rare Association Rules Based on Multiple Minimum Support Approach

    In the paper, the authors discuss a new approach to extract rare association rules that can be defined as the rules containing the rare items or infrequent items in the dataset. For extracting rare item sets, various efforts have been done. One of them is MS Apriori method which finds...

    Provided By IRD India

  • White Papers // Jun 2014

    Impact of Ascending and Descending Input Patterns on Sorting Techniques

    Sorting is a process of arranging elements in an orderly manner, based on the value of a certain key which exists for each element. This key may be the value of the element itself or some other property associated with it. Sorting plays an important role in computer science as...

    Provided By IRD India

  • White Papers // Aug 2014

    Development of Real Time Area Based and Particle Filter Based Tracking on PandaBoard

    Particle filter-based tracking has been a well exploited area of research. In this paper, the authors discuss the development and realization of intelligent computer vision based target tracking algorithms on PandaBoard ARM based embedded platform. The algorithm tracks moving targets at real-time. The integration level in the embedded platform is...

    Provided By IRD India

  • White Papers // May 2015

    Analysis of Harmonics in Five Phase Inverter Drive with Double Tuned Filter Using Simulink/LATLAB

    The advancement in present technologies high speed electronics is generates unwanted harmonics in the line voltages and currents. Mitigation of harmonics is the present challenge and the best solution is to implement with the filters. This paper presents the design of double tuned filter to reduce the voltage/current harmonics produced...

    Provided By IRD India

  • White Papers // Sep 2014

    High Dimensional Data Clustering Using Cuckoo Search Optimization Algorithm

    The amount of data available over Internet and World Wide Web is increasing exponentially. Retrieving data that is more close to user's query effectively and efficiently is a challenging task in Information Retrieval (IR) system. Clustering of documents is one of the solutions to this. Clustering is the process of...

    Provided By IRD India

  • White Papers // Nov 2014

    Design of Parallel Prefix Tree Structure for CMOS Comparator

    In this paper, the authors propose a comparator design using conventional digital CMOS cells featuring wide-range and high-speed operation. The comparison is most basic arithmetic operation that determines whether one number is greater than, less than or equal to the other number. Their comparator uses a novel scalable parallel prefix...

    Provided By IRD India

  • White Papers // Jul 2014

    Development of Turbo Decoder for Wireless Sensor Network and Its Implementation on FPGA

    Turbo codes have recently been considered for energy-constrained wireless communication applications, since they facilitate low transmission energy consumption. This paper proposes the performance of turbo codes using BPSK modulation technique over the AWGN (Additive White Gaussian Noise) and Rayleigh channel. The performance of turbo codes consisting of an encoder, a...

    Provided By IRD India

  • White Papers // Aug 2013

    Influence of Work Function Engineering on the Short Channel Effects of Nanoscale GeOI MOSFFETs

    In the past few years, MOSFETs using germanium channel have received potential consideration for future nano-electronic devices due largely to enhanced carrier mobility in Ge. The authors present a model based on 2D surface potential approach for the nanoscale GeOI MOSFETs to compute various device parameters related to short channel...

    Provided By IRD India

  • White Papers // Aug 2013

    Optimisation of Web Preprocessing in Web Usage Mining

    Web usage mining is to discover and extract useful information. It helps in better understanding and better serves the needs of web-based applications. The data should be preprocessed to improve the efficiency and ease of the mining process. The proper analysis of web log file is beneficial to manage the...

    Provided By IRD India

  • White Papers // Apr 2013

    A Reconfigurable FIR Filter Architecture to Trade Off Filter Performance for Dynamic Power Consumption

    In order to achieve the goals of business, various channel of communications to customers have to be developed through technology. In the present day banking, total automation of banking operation and is an imperative for all banks to attract more customers, provide efficient service and survive the competition, apart from...

    Provided By IRD India

  • White Papers // Apr 2013

    Off-Grid Portable Photovoltaic System Operating at Low Power Conditions

    A new approach to portable photo-voltaic systems which described in this paper is of very low power 5W and main purpose is for recharging or powering small portable electronics devices. The objects of this paper are: the optimization of photo-voltaic cells connection with regard to portable conditions; a non-standard topology...

    Provided By IRD India

  • White Papers // Jul 2013

    An Efficient Query Processing Search Using Textual and Spatial Relevances

    Geographic search engine query processing is different in that it requires a combination of textual and spatial data, it retrieves a document that is relevant to the query keywords and the location with respects to ranks the documents that are retrieved according to textual and spatial relevance to the query....

    Provided By IRD India

  • White Papers // Jul 2013

    AutoEpsDBSCAN : DBSCAN with Eps Automatic for Large Dataset

    Emergence of modern techniques for scientific data collection has resulted in large scale accumulation of data pertaining to diverse fields. Conventional database querying methods are inadequate to extract useful information from huge data banks. Cluster analysis is a primary method for database mining. It is either used as a stand-alone...

    Provided By IRD India

  • White Papers // Dec 2013

    Multi-Core CUDA Architecture for Parallelization of Hierarchical Text Clustering

    Text clustering is the problem of dividing text documents into groups, such that documents in same group are similar to one another and different from documents in other groups. Because of the general tendency of texts forming hierarchies, text clustering is best performed by using a hierarchical clustering method. An...

    Provided By IRD India

  • White Papers // Dec 2013

    High Speed Systolic Array Discrete Cosine Transform Architecture with Fast Convolution

    Discrete Cosine Transform (DCT) is the function which is used widely in many image and signal processing standard applications. High throughput with low power architecture is a major concern but there is a limitation in designing such architecture. When the architecture performs in high throughput rate at the operating time...

    Provided By IRD India

  • White Papers // Oct 2013

    VHDL Implementation of 1553 Protocol Using Actel IP Core

    To implement a MIL-STD-1553 compatible system, the options that exist are to use a stand-alone integrated circuit or an IP core. Today, with most digital logic being implemented on FPGAs, the choice of an IP core is advantageous. One such IP core is core 1553BRM from Actel. Core 1553BRM provides...

    Provided By IRD India

  • White Papers // Oct 2013

    Synthesis Using 65nm Library of SPI Master-Slave with Wishbone Interface

    In this paper, the authors develop SPI master-slave with wishbone interface. It is designed to provide an interface between a microprocessor with a wishbone bus and SPI devices. With the development of the IC manufacturing, the communication between hardware devices became particularly important. The currently widely used protocols such as...

    Provided By IRD India

  • White Papers // Feb 2015

    One to Many Data Linkage Using One Class Clustering Tree

    In many domains one-to-many data linkage is an essential task, however, many of the publications have not addressed this paper. Traditionally, data linkage is performed among the entities of similar type, however, developing linkage techniques that link between matching entities of different types is also very important. In this paper,...

    Provided By IRD India

  • White Papers // Mar 2015

    Establishing Secure Mining of Item Set in a Databases that is Dispersed Horizontally

    The authors propose transaction databases where the user requirements changes accordingly. The association is for predict the user needs with the given data. Before, there were some algorithms which are fast and not secure one, another set of algorithm which has a security based protocol but the processing time is...

    Provided By IRD India

  • White Papers // Mar 2015

    Data Mining with Big Data: A Survey

    Big data is a new term for a large and complicated data set that it becomes difficult to process using a traditional data management tools. Big data are now growing rapidly in all science and engineering domains, including biological, physical and bio-medical sciences. Big data mining is the art of...

    Provided By IRD India

  • White Papers // Mar 2015

    Effective Secure Multi-Keyword Top-K Retrieval Over Relational Databases

    Keyword has emerging as a promising pattern for data outsourcing and high-quality data services. However, concerns of sensitive information on potentially cause privacy problems. Data encryption protects data security to some extent, but at the cost of compromised efficiency. Searchable Symmetric Encryption (SSE) allows retrieval of encrypted data. In this...

    Provided By IRD India

  • White Papers // Dec 2012

    Application Processor Queue Prioritization

    In the real-time telecommunication environment, there are many application processors interacting with each other in the form of messages. In the simplest scenario, the simple regular queue is used for the transfer of messages between application processors, but when there is a need for processing important messages, then a multi-queue...

    Provided By IRD India

  • White Papers // Jul 2014

    Sentiment Analysis-An Opinion Mining Tool

    For purchasing any product, to watch a movie one wants to know what other people think about that product and most of them are using internet for that purpose. With the growing availability and popularity of opinion-rich resources such as online review sites and personal blogs, new opportunities and challenges...

    Provided By IRD India

  • White Papers // Mar 2013

    Concept Based Mining in Text Clustering

    In text mining most techniques depends on statistical analysis of terms. Statistical analysis trances important terms within document only. However, this concept-based mining model analyses terms in sentence, document and corpus level. This mining model consist of sentence based concept analysis, document based and corpus based concept analysis and concept...

    Provided By IRD India

  • White Papers // Mar 2013

    Analysing Compression Performance for Real Time Database Systems

    Database compression and decompression is a susceptible problem in the database framework. Database compression is widely used in data management to improve the performance and save storage space. When the users have large amounts of data, the cost of the storage subsystem can easily exceed the cost of the user's...

    Provided By IRD India

  • White Papers // Jun 2013

    3G ATM Using Embedded Microcontroller

    The use of mobile handheld devices is expanding rapidly both within the business and individual context. These devices are now essential tools that offer competitive business advantages in today's growing world of ubiquitous computing environment. The technology advancement has made it possible to embed more facilities in mobile phones. While...

    Provided By IRD India

  • White Papers // Jun 2013

    Design and Implementation of a Modified Canny Edge Detector Based on FPGA

    In this paper, the authors present a distributed canny edge detection algorithm that results in significantly reduced memory requirements decreased latency and increased throughput with no loss in edge detection performance as compared to the original canny algorithm. The new algorithm uses a low-complexity 8-bin non-uniform gradient magnitude histogram to...

    Provided By IRD India

  • White Papers // Apr 2013

    Beam Forming Algorithm Implementation Using FPGA

    Beam-forming simply means transmit or receiving signals preferred in a particular direction over the other. Beam-forming actually taking into account the signal coming into the array of antennas from desired location moreover it nullifies or reduces the effect of undesired signals coming from a different direction. In this paper, the...

    Provided By IRD India