MIT Publications

Displaying 1-30 of 30 results

  • White Papers // Aug 2014

    Design Simulation and Analysis of NMOS Characteristics for Varying Oxide Thickness

    The Metal-Oxide-Semiconductor Field-Effect Transistor (MOSFET) is the most used semiconductor device today. With high yield, low cost and dense packaging is considerations that have pushed the MOSFET to the status of the most widely used device in information technology hardware. This paper effects of varying oxide thickness have been analyzed...

    Provided By MIT Publications

  • White Papers // Jan 2014

    Implementation of Decoders for High Speed Memory Applications

    In this paper, the authors are to design all the necessary components required to form a 5 - 32 bit decoder using NOR logic at 180 nm & 350 nm technologies. Most important aspect is to size the basic component of decoder (i.e., transistor) for a particular load. Discrete quantities...

    Provided By MIT Publications

  • White Papers // Jan 2014

    Design of CMOS Full Adder Application Specific Integrated Circuit

    Application specific full custom design integrated circuit is a methodology for making a logic cell, circuit or layout specification. Full custom design circuit is the part of Application Specific Integrated Circuit (ASIC). A gate array or uncommitted logic array as an approach to the design and manufacture of application specific...

    Provided By MIT Publications

  • White Papers // Jan 2014

    Comparative Analysis of Conventional CMOS and Adiabatic Logic Gates

    In this paper, the authors deal with comparative study of conventional CMOS circuits with CMOS based reversible logic circuits employing adiabatic switching methods. The power dissipation an important characteristics are tested by means of SPICE circuit simulation techniques for a CMOS AND-OR-Inverter (AOI) gate. Results from both conventional and adiabatic...

    Provided By MIT Publications

  • White Papers // Aug 2013

    Adiabatic Logic Circuits: A Retrospect

    With ever-increasing growth in VLSI technologies the number of gates per chip area is constantly increasing, while the gate switching energy does not decrease at the same rate, so the power dissipation rises and heat removal becomes more difficult and expensive. Then, to limit the power dissipation adiabatic operation promises...

    Provided By MIT Publications

  • White Papers // Aug 2013

    Power Efficient Adiabatic Switching Circuits

    In this paper, the authors deal with design opportunities of CMOS based reversible logic circuits employing adiabatic switching methods. The power dissipation an important characteristics are tested by means of SPICE circuit simulation techniques for a CMOS transmission gate based reversible logic circuits, such as controlled NOT gates & controlled...

    Provided By MIT Publications

  • White Papers // Aug 2013

    Systolic and Semi-Systolic Multiplier

    Systolic architectures (also referred to as systolic arrays) represent a network of Processing Elements (PEs) that rhythmically compute and pass the data through the system. Systolic arrays are a family of parallel computer architectures capable of using a very large number of processors simultaneously for important computations in applications such...

    Provided By MIT Publications

  • White Papers // Aug 2013

    Performance Comparison of Two Classifiers Built by Using Actual and Unrealized Datasets

    Decision trees are tree shaped structures that represent sets of decisions. These decisions generate rules for the classification of a dataset.C4.5 is an important classification algorithm. Data security is essential for every data owner. Unrealization approach is based on dataset complementation approach and is an important privacy protecting approach. In...

    Provided By MIT Publications

  • White Papers // Jan 2013

    Use of Artificial Neural Network in the Field of Security

    Today, building a secure channel is one of the most challenging areas of research and development in modern communication. Cryptography enables the two parties to communicate over an insecure channel so that an attacker cannot understand and decrypt the original message. Public key cryptography is available in many forms but...

    Provided By MIT Publications

  • White Papers // Jan 2013

    A Survey on Impact of Embedded System on Teaching

    In this paper, the authors introduce the purpose and signification of the course of embedded system, and then expounds the main teaching content of embedded system which students must learn, such as the structure of hardware, boot loader and device driver, embedded real-time operation system, debug method for embedded system,...

    Provided By MIT Publications

  • White Papers // Jan 2013

    Hardware Implementation of Decimation in Time FFT

    The Fast Fourier Transform (FFT) is an indispensable operation in many digital signal processing applications but yet is deemed computationally expensive when performed on a conventional general purpose processors. This paper explains the implementation of radix-22 single-path delay feedback pipelined DIT- FFT processor. This architecture has the same multiplicative complexity...

    Provided By MIT Publications

  • White Papers // Jan 2013

    An Analytical Report on Low Power VLSI Methods

    In recent days every application must need power management. In this paper, the authors present a various techniques to handle the power management in IC. Power dissipation in a IC is based on power used by the IC and also by heat dissipation. To reduce energy use or to minimize...

    Provided By MIT Publications

  • White Papers // Aug 2012

    A Review of Security Issues in Mobile Adhoc Networks

    Mobile Ad-hoc NETwork (MANET) is a multi-hop network, self-organizing, infrastructure less. Due to the absence of any fixed infrastructure, it becomes difficult to make use of the existing routing techniques for network services, and this wireless and distributed nature of MANETs poses a number of challenges to system security designers...

    Provided By MIT Publications

  • White Papers // Aug 2012

    Secure Cloud Computing Through IT Auditing

    Cloud computing is an advanced technology that provides resources over the Internet and they act as extremely informative services to those who use the service. In this paper, the authors discuss the origin of cloud computing and framework for providing secure cloud computing through IT auditing. It involves checklists which...

    Provided By MIT Publications

  • White Papers // Aug 2012

    Authentication and Key Management in Wireless Mesh Network

    A wireless mesh network is a new and emerging wireless technology and it also becomes a popular choice for internet service providers as it allows a fast, easy and inexpensive network deployment. Wireless mesh network does not rely on any fixed infrastructure as most of the wireless networks do. Before...

    Provided By MIT Publications

  • White Papers // Aug 2012

    Selection of Relevant Feature for Intrusion Attack Classification by Analyzing KDD Cup 99

    Security is one of most important issue in network management and detection of intrusion based security attacks play vital role in it. To have a holistic picture of the network intrusion detection, selection of appropriate feature is very important; it reduces analysis effort and time too. Identification of most astute...

    Provided By MIT Publications

  • White Papers // Aug 2012

    Various Types of Circuit Breakers Used in Power System for Smooth Working of the Transmission Line

    Once a power system is established it is necessary to protect it from faults (whether internal or external). The authors use some protecting and sensing device like circuit breakers, relays, fuses etc. Circuit breaker is a mechanical device capable of making, carrying and breaking currents under normal circuit conditions and...

    Provided By MIT Publications

  • White Papers // May 2012

    Interrupt Based Switching for Multi-Cluster FlexRay Systems

    This paper deals with a new straightforward approach to significantly increase the bandwidth usage in FlexRay networks. The authors propose a new hardware component, termed FlexWay that facilitates partitioning the network into multiple clusters. This component provides a switching service that enables the execution of synchronous communications inside each cluster....

    Provided By MIT Publications

  • White Papers // Jan 2012

    Challenges in Integrated WIMAX-WIMESH Network Security

    The term WIMAX refers to Worldwide Interoperability for Microwave AXcess. It is also known as IEEE 802.16 protocol. The term WIMESH is an abbreviation for Wireless Mesh. It is also known as IEEE 802.11s protocol. WIMAX and WIMESH have emerged as promising broadband access solutions for the latest generation of...

    Provided By MIT Publications

  • White Papers // Jan 2012

    Multi-Core Paradigm

    Thing that never changes in field of everyday computing are requirement for faster speed and more performance and the user didn't get satisfied even with new technologies. Each and every new technology and performance advances in processor leads to next level of increased performance demands from consumers. The performance criteria...

    Provided By MIT Publications

  • White Papers // Jan 2012

    Seminal Description of Datamining Approaches with Reference to Rough Set Approach

    This overview provides a description of some of the most common data mining algorithms in use today. The authors have broken the discussion into two sections, each with a specific theme: classical techniques: statistics, neighborhoods and clustering, contemporary techniques: trees, networks and rules. In recent years, data mining has emerged...

    Provided By MIT Publications

  • White Papers // Jan 2011

    Preemptive Multipath - Adhoc on Demand Distance Vector Routing Protocol

    A Mobile Ad hoc NETwork (MANET) consists of a set of mobile hosts capable of communicating with each other without the assistance of base stations. The topology of ad-hoc networks changes rapidly. The Ad hoc On Demand Distance Vector (AODV) routing protocol and other on demand routing protocols suffers with...

    Provided By MIT Publications

  • White Papers // Jan 2011

    E-Security Problems, Policies for Networked Information Systems

    With the rapid growth of e-commerce, governmental and corporate agencies are taking extra precautions when it comes to protecting information. The development of e-security as a discipline has enabled organizations to discover a wider array of similarities between attacks occurring across their security environment and develop appropriate countermeasures. To further...

    Provided By MIT Publications

  • White Papers // Jan 2011

    Optimize Handover and Channel Allocation Procedure in Communication Network

    Wireless communication is reveling its fastest growth period in history, due to enabling technologies which allow extensive deployment. Handover is a critical feature in cellular systems and therefore handover algorithms are under extensive research. A handover priority queuing method, which can be used to show rapid handovers with a smaller...

    Provided By MIT Publications

  • White Papers // Jan 2011

    Low Power High Gain CMOS LNA for WLAN and ISM Band Applications

    There is rapid development in the field of wireless communication which makes demand for low-cost, high-performance and high-integration technology. System On a Chip (SOC) implementation is also one of the key areas of development these days. The wide acceptance of wireless products is due to the advancement of device technology,...

    Provided By MIT Publications

  • White Papers // Jan 2011

    Design of a Broadband CPW-Fed Monopole Antenna for WLAN Operations

    In this paper, a novel broadband design of a Co-Planar Waveguide (CPW)-fed planar monopole antenna with double plus shape slots is proposed. The design considerations for achieving broadband operation of the proposed plus sign slot antenna are discussed, and theoretical results are presented. The antenna operates in single wide frequency...

    Provided By MIT Publications

  • White Papers // Jan 2011

    Low Power PH Sensor for Wireless Sensor Network Node Agricultural Application

    A Wireless Sensor Networks (WSN) is now widely used in precision agriculture applications. Sensors play an important role in WSN. The measurement of soil pH is arguably the most widely performed test in the chemical laboratory, the use of pH sensitive Field-Effect Transistors (pHFETS) is proposed for remote monitoring of...

    Provided By MIT Publications

  • White Papers // Jan 2011

    Mitigation of Non-Linear Distortion Using PTS With Minimal Control Synthesis Method in OFDM System

    Orthogonal Frequency Division Multiplexing (OFDM) is a strong candidate for future wireless communication because it is marked by its higher frequency multiplicity and greater immunity to multipath fading. However, the main drawback of OFDM is its high amplitude fluctuations measured by Peak-to-Average Power ratio (PAPR), which leads to power inefficiency...

    Provided By MIT Publications

  • White Papers // Jan 2011

    Performance Analysis of Routing Protocol in Mobile Ad Hoc Network Using NS-2

    The MANET routing protocols DSDV, DSR and AODV are the most promising routing protocols. The people can be used in MANET to route packets between mobile nodes. The main objective of this paper comparing the performance of DSDV, DSR and AODV routing protocols under different performance metrics like Throughput, Packet...

    Provided By MIT Publications

  • White Papers // Jan 2011

    Impact of Security and Quality Attributes of 3-G Based M-Commerce Systems Based on B2C Operation

    A year ago, everyone was talking about the great opportunities for 3G, and accessing the Internet from one's mobile terminal. Today 3-G network has grown up. Mobile-commerce (m-commerce) systems have been developed at a significant rate in recent years. M-commerce can be viewed as a subset of e-commerce and refers...

    Provided By MIT Publications

  • White Papers // Jan 2011

    Preemptive Multipath - Adhoc on Demand Distance Vector Routing Protocol

    A Mobile Ad hoc NETwork (MANET) consists of a set of mobile hosts capable of communicating with each other without the assistance of base stations. The topology of ad-hoc networks changes rapidly. The Ad hoc On Demand Distance Vector (AODV) routing protocol and other on demand routing protocols suffers with...

    Provided By MIT Publications

  • White Papers // Jan 2011

    E-Security Problems, Policies for Networked Information Systems

    With the rapid growth of e-commerce, governmental and corporate agencies are taking extra precautions when it comes to protecting information. The development of e-security as a discipline has enabled organizations to discover a wider array of similarities between attacks occurring across their security environment and develop appropriate countermeasures. To further...

    Provided By MIT Publications

  • White Papers // Jan 2011

    Optimize Handover and Channel Allocation Procedure in Communication Network

    Wireless communication is reveling its fastest growth period in history, due to enabling technologies which allow extensive deployment. Handover is a critical feature in cellular systems and therefore handover algorithms are under extensive research. A handover priority queuing method, which can be used to show rapid handovers with a smaller...

    Provided By MIT Publications

  • White Papers // Jan 2011

    Low Power High Gain CMOS LNA for WLAN and ISM Band Applications

    There is rapid development in the field of wireless communication which makes demand for low-cost, high-performance and high-integration technology. System On a Chip (SOC) implementation is also one of the key areas of development these days. The wide acceptance of wireless products is due to the advancement of device technology,...

    Provided By MIT Publications

  • White Papers // Jan 2011

    Design of a Broadband CPW-Fed Monopole Antenna for WLAN Operations

    In this paper, a novel broadband design of a Co-Planar Waveguide (CPW)-fed planar monopole antenna with double plus shape slots is proposed. The design considerations for achieving broadband operation of the proposed plus sign slot antenna are discussed, and theoretical results are presented. The antenna operates in single wide frequency...

    Provided By MIT Publications

  • White Papers // Jan 2011

    Low Power PH Sensor for Wireless Sensor Network Node Agricultural Application

    A Wireless Sensor Networks (WSN) is now widely used in precision agriculture applications. Sensors play an important role in WSN. The measurement of soil pH is arguably the most widely performed test in the chemical laboratory, the use of pH sensitive Field-Effect Transistors (pHFETS) is proposed for remote monitoring of...

    Provided By MIT Publications

  • White Papers // Jan 2011

    Mitigation of Non-Linear Distortion Using PTS With Minimal Control Synthesis Method in OFDM System

    Orthogonal Frequency Division Multiplexing (OFDM) is a strong candidate for future wireless communication because it is marked by its higher frequency multiplicity and greater immunity to multipath fading. However, the main drawback of OFDM is its high amplitude fluctuations measured by Peak-to-Average Power ratio (PAPR), which leads to power inefficiency...

    Provided By MIT Publications

  • White Papers // May 2012

    Interrupt Based Switching for Multi-Cluster FlexRay Systems

    This paper deals with a new straightforward approach to significantly increase the bandwidth usage in FlexRay networks. The authors propose a new hardware component, termed FlexWay that facilitates partitioning the network into multiple clusters. This component provides a switching service that enables the execution of synchronous communications inside each cluster....

    Provided By MIT Publications

  • White Papers // Jan 2011

    Performance Analysis of Routing Protocol in Mobile Ad Hoc Network Using NS-2

    The MANET routing protocols DSDV, DSR and AODV are the most promising routing protocols. The people can be used in MANET to route packets between mobile nodes. The main objective of this paper comparing the performance of DSDV, DSR and AODV routing protocols under different performance metrics like Throughput, Packet...

    Provided By MIT Publications

  • White Papers // Jan 2011

    Impact of Security and Quality Attributes of 3-G Based M-Commerce Systems Based on B2C Operation

    A year ago, everyone was talking about the great opportunities for 3G, and accessing the Internet from one's mobile terminal. Today 3-G network has grown up. Mobile-commerce (m-commerce) systems have been developed at a significant rate in recent years. M-commerce can be viewed as a subset of e-commerce and refers...

    Provided By MIT Publications

  • White Papers // Jan 2013

    Use of Artificial Neural Network in the Field of Security

    Today, building a secure channel is one of the most challenging areas of research and development in modern communication. Cryptography enables the two parties to communicate over an insecure channel so that an attacker cannot understand and decrypt the original message. Public key cryptography is available in many forms but...

    Provided By MIT Publications

  • White Papers // Aug 2012

    A Review of Security Issues in Mobile Adhoc Networks

    Mobile Ad-hoc NETwork (MANET) is a multi-hop network, self-organizing, infrastructure less. Due to the absence of any fixed infrastructure, it becomes difficult to make use of the existing routing techniques for network services, and this wireless and distributed nature of MANETs poses a number of challenges to system security designers...

    Provided By MIT Publications

  • White Papers // Aug 2012

    Secure Cloud Computing Through IT Auditing

    Cloud computing is an advanced technology that provides resources over the Internet and they act as extremely informative services to those who use the service. In this paper, the authors discuss the origin of cloud computing and framework for providing secure cloud computing through IT auditing. It involves checklists which...

    Provided By MIT Publications

  • White Papers // Aug 2012

    Authentication and Key Management in Wireless Mesh Network

    A wireless mesh network is a new and emerging wireless technology and it also becomes a popular choice for internet service providers as it allows a fast, easy and inexpensive network deployment. Wireless mesh network does not rely on any fixed infrastructure as most of the wireless networks do. Before...

    Provided By MIT Publications

  • White Papers // Jan 2012

    Challenges in Integrated WIMAX-WIMESH Network Security

    The term WIMAX refers to Worldwide Interoperability for Microwave AXcess. It is also known as IEEE 802.16 protocol. The term WIMESH is an abbreviation for Wireless Mesh. It is also known as IEEE 802.11s protocol. WIMAX and WIMESH have emerged as promising broadband access solutions for the latest generation of...

    Provided By MIT Publications

  • White Papers // Aug 2012

    Selection of Relevant Feature for Intrusion Attack Classification by Analyzing KDD Cup 99

    Security is one of most important issue in network management and detection of intrusion based security attacks play vital role in it. To have a holistic picture of the network intrusion detection, selection of appropriate feature is very important; it reduces analysis effort and time too. Identification of most astute...

    Provided By MIT Publications

  • White Papers // Jan 2013

    A Survey on Impact of Embedded System on Teaching

    In this paper, the authors introduce the purpose and signification of the course of embedded system, and then expounds the main teaching content of embedded system which students must learn, such as the structure of hardware, boot loader and device driver, embedded real-time operation system, debug method for embedded system,...

    Provided By MIT Publications

  • White Papers // Jan 2013

    Hardware Implementation of Decimation in Time FFT

    The Fast Fourier Transform (FFT) is an indispensable operation in many digital signal processing applications but yet is deemed computationally expensive when performed on a conventional general purpose processors. This paper explains the implementation of radix-22 single-path delay feedback pipelined DIT- FFT processor. This architecture has the same multiplicative complexity...

    Provided By MIT Publications

  • White Papers // Aug 2013

    Adiabatic Logic Circuits: A Retrospect

    With ever-increasing growth in VLSI technologies the number of gates per chip area is constantly increasing, while the gate switching energy does not decrease at the same rate, so the power dissipation rises and heat removal becomes more difficult and expensive. Then, to limit the power dissipation adiabatic operation promises...

    Provided By MIT Publications

  • White Papers // Aug 2013

    Power Efficient Adiabatic Switching Circuits

    In this paper, the authors deal with design opportunities of CMOS based reversible logic circuits employing adiabatic switching methods. The power dissipation an important characteristics are tested by means of SPICE circuit simulation techniques for a CMOS transmission gate based reversible logic circuits, such as controlled NOT gates & controlled...

    Provided By MIT Publications

  • White Papers // Jan 2014

    Implementation of Decoders for High Speed Memory Applications

    In this paper, the authors are to design all the necessary components required to form a 5 - 32 bit decoder using NOR logic at 180 nm & 350 nm technologies. Most important aspect is to size the basic component of decoder (i.e., transistor) for a particular load. Discrete quantities...

    Provided By MIT Publications

  • White Papers // Aug 2014

    Design Simulation and Analysis of NMOS Characteristics for Varying Oxide Thickness

    The Metal-Oxide-Semiconductor Field-Effect Transistor (MOSFET) is the most used semiconductor device today. With high yield, low cost and dense packaging is considerations that have pushed the MOSFET to the status of the most widely used device in information technology hardware. This paper effects of varying oxide thickness have been analyzed...

    Provided By MIT Publications

  • White Papers // Jan 2014

    Design of CMOS Full Adder Application Specific Integrated Circuit

    Application specific full custom design integrated circuit is a methodology for making a logic cell, circuit or layout specification. Full custom design circuit is the part of Application Specific Integrated Circuit (ASIC). A gate array or uncommitted logic array as an approach to the design and manufacture of application specific...

    Provided By MIT Publications

  • White Papers // Aug 2013

    Systolic and Semi-Systolic Multiplier

    Systolic architectures (also referred to as systolic arrays) represent a network of Processing Elements (PEs) that rhythmically compute and pass the data through the system. Systolic arrays are a family of parallel computer architectures capable of using a very large number of processors simultaneously for important computations in applications such...

    Provided By MIT Publications

  • White Papers // Jan 2013

    An Analytical Report on Low Power VLSI Methods

    In recent days every application must need power management. In this paper, the authors present a various techniques to handle the power management in IC. Power dissipation in a IC is based on power used by the IC and also by heat dissipation. To reduce energy use or to minimize...

    Provided By MIT Publications

  • White Papers // Jan 2014

    Comparative Analysis of Conventional CMOS and Adiabatic Logic Gates

    In this paper, the authors deal with comparative study of conventional CMOS circuits with CMOS based reversible logic circuits employing adiabatic switching methods. The power dissipation an important characteristics are tested by means of SPICE circuit simulation techniques for a CMOS AND-OR-Inverter (AOI) gate. Results from both conventional and adiabatic...

    Provided By MIT Publications

  • White Papers // Jan 2012

    Multi-Core Paradigm

    Thing that never changes in field of everyday computing are requirement for faster speed and more performance and the user didn't get satisfied even with new technologies. Each and every new technology and performance advances in processor leads to next level of increased performance demands from consumers. The performance criteria...

    Provided By MIT Publications

  • White Papers // Aug 2012

    Various Types of Circuit Breakers Used in Power System for Smooth Working of the Transmission Line

    Once a power system is established it is necessary to protect it from faults (whether internal or external). The authors use some protecting and sensing device like circuit breakers, relays, fuses etc. Circuit breaker is a mechanical device capable of making, carrying and breaking currents under normal circuit conditions and...

    Provided By MIT Publications

  • White Papers // Aug 2013

    Performance Comparison of Two Classifiers Built by Using Actual and Unrealized Datasets

    Decision trees are tree shaped structures that represent sets of decisions. These decisions generate rules for the classification of a dataset.C4.5 is an important classification algorithm. Data security is essential for every data owner. Unrealization approach is based on dataset complementation approach and is an important privacy protecting approach. In...

    Provided By MIT Publications

  • White Papers // Jan 2012

    Seminal Description of Datamining Approaches with Reference to Rough Set Approach

    This overview provides a description of some of the most common data mining algorithms in use today. The authors have broken the discussion into two sections, each with a specific theme: classical techniques: statistics, neighborhoods and clustering, contemporary techniques: trees, networks and rules. In recent years, data mining has emerged...

    Provided By MIT Publications