The document discusses reducing power consumption in VLSI designs by merging single-bit flip-flops into multi-bit flip-flops and using an adiabatic clock. It first identifies mergeable flip-flops using a binary tree structure and builds a combinational table. The flip-flops are then merged according to the table. An adiabatic clock, resembling a sine wave, is added which further reduces power consumption and timing compared to just merging flip-flops. Power and timing calculations show that merging flip-flops reduces power by over 50% and using an adiabatic clock provides an additional 20% reduction in power with faster timing.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Design of c slotted microstrip antenna using artificial neural network modeleSAT Journals
Abstract In this paper, neural network model has been used to estimation of resonance frequency of a coaxial feed C-slotted Microstrip Antenna. The Multi-Layer Perceptron Feed forward back Propagation (MLPFFBP) and Radial basis function Artificial Neural Network (RBFANN) have been used to implement the neural network model. A relative performance analysis of the proposed neural network for different training algorithms. Number of neurons and number of hidden layer is also carried out for estimating the resonance frequency. The method of moment (MOM) based IE3D software was used to generate data dictionary for training and validation set of ANN. The results obtain using ANN are compared with simulation feeding and found quite satisfactory and also it is concluded that RBFANN network is more accurate and fast compared to MLPFFBP network algorithm. Index Terms: Artificial Neural Network, C slot, Microstrip Antenna, Multilayer Feed Forward Networks, Radial basis function Artificial Neural Network, Resonance frequency.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Design of c slotted microstrip antenna using artificial neural network modeleSAT Journals
Abstract In this paper, neural network model has been used to estimation of resonance frequency of a coaxial feed C-slotted Microstrip Antenna. The Multi-Layer Perceptron Feed forward back Propagation (MLPFFBP) and Radial basis function Artificial Neural Network (RBFANN) have been used to implement the neural network model. A relative performance analysis of the proposed neural network for different training algorithms. Number of neurons and number of hidden layer is also carried out for estimating the resonance frequency. The method of moment (MOM) based IE3D software was used to generate data dictionary for training and validation set of ANN. The results obtain using ANN are compared with simulation feeding and found quite satisfactory and also it is concluded that RBFANN network is more accurate and fast compared to MLPFFBP network algorithm. Index Terms: Artificial Neural Network, C slot, Microstrip Antenna, Multilayer Feed Forward Networks, Radial basis function Artificial Neural Network, Resonance frequency.
Spectroscopic studies on Mn2+ ions doped Cadmium Aluminum Fluoro Lead Borate ...IJERA Editor
This article reports on optical properties of Mn2+ (0.5 mol%): 49.5 B2O3 - 10PbO - 30CdO -10AlF3 glasses.
Optical absorption spectrum of the manganese ions doped glass exhibits broad absorption band at 473 nm.
Photoluminescence spectrum of Mn2+ (0.5 mol %): 49.5B2O3- 30CdO – 10PbO - 10AlF3 glass has revealed a red
emission at 618 nm with an excitation wavelength 467 nm.
Image Enhancement Using Filter To Adjust Dynamic Range of PixelsIJERA Editor
In this paper, we propose a novel algorithm for image enhancement in compressed (DCT) domain. Despite, few algorithms have been reported to enhance images in DCT domain proposed algorithm differs from previous algorithms in such a way that it enhances both dark and bright regions of an image equally well. In addition, it outperforms in enhancing the chromatic components as well as luminance components. Since the algorithm works in DCT domain, computational complexity is reduced reasonably.
Privacy Preservation and Restoration of Data Using Unrealized Data SetsIJERA Editor
In today’s world, there is an improved advance in hardware technology which increases the capability to store and record personal data about consumers and individuals. Data mining extracts knowledge to support a variety of areas as marketing, medical diagnosis, weather forecasting, national security etc successfully. Still there is a challenge to extract certain kinds of data without violating the data owners’ privacy. As data mining becomes more enveloping, such privacy concerns are increasing. This gives birth to a new category of data mining method called privacy preserving data mining algorithm (PPDM). The aim of this algorithm is to protect the easily affected information in data from the large amount of data set. The privacy preservation of data set can be expressed in the form of decision tree. This paper proposes a privacy preservation based on data set complement algorithms which store the information of the real dataset. So that the private data can be safe from the unauthorized party, if some portion of the data can be lost, then we can recreate the original data set from the unrealized dataset and the perturbed data set.
Efficient Design of Reversible Multiplexers with Low Quantum CostIJERA Editor
Multiplexing is the generic term used to designate the operation of sending one or more analogue or digital
signals over a common transmission line at dissimilar times or speeds and as such, the scheme we use to do just
that is called a Multiplexer. In digital electronics, multiplexers are similarly known as data selectors as they can
“select” each input line, are made from individual Analogue Switches encased in a single IC package as
conflicting to the “mechanical” type selectors such as standard conservative switches and relays. In today era,
reversibility has become essential part of digital world to make digital circuits more efficient. In this paper, we
have proposed a new method to reduce quantum cost and power for various multiplexers. The results are
simulated in Xilinx by using VHDL language.
As a new material, the researches on polyvinyl alcohol fiber cement stabilized macadam are also less. This
article studies the effect of different volume fraction of fiber length on the compressive strength and splitting
tensile strength of cement stabilized macadam.To promote polyvinyl alcohol fiber cement stabilized macadam’s
application,it has theoretical significance and engineering application value.
Research onidentify stadia of interchange exit ramp in mountainous urban freewayIJERA Editor
Theidentify stadia of interchange exit ramp hasgreat influence on capacity and safety levels of urbanexpressway,combining with car psychological theory and driverscharacteristics,based on design speed and driver's reaction time, driversoperating characteristics and the cause of the accident on interchange exit ramp was analyzed and the identify stadia threshold under different design speedwas determined. The resultindicates that: the requirements of specification for identify stadia has some limitations, it should be modified appropriately.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Trust Your Cloud Service Provider: User Based Crypto ModelIJERA Editor
In Data Storage as a Service (STaaS) cloud computing environment, the equipment used for business operations
can be leased from a single service provider along with the application, and the related business data can be
stored on equipment provided by the same service provider. This type of arrangement can help a company save
on hardware and software infrastructure costs, but storing the company’s data on the service provider’s
equipment raises the possibility that important business information may be improperly disclosed to others [1].
Some researchers have suggested that user data stored on a service-provider’s equipment must be encrypted [2].
Encrypting data prior to storage is a common method of data protection, and service providers may be able to
build firewalls to ensure that the decryption keys associated with encrypted user data are not disclosed to
outsiders. However, if the decryption key and the encrypted data are held by the same service provider, it raises
the possibility that high-level administrators within the service provider would have access to both the
decryption key and the encrypted data, thus presenting a risk for the unauthorized disclosure of the user data. we
in this paper provides an unique business model of cryptography where crypto keys are distributed across the
user and the trusted third party(TTP) with adoption of such a model mainly the CSP insider attack an form of
misuse of valuable user data can be treated secured.
Challenges and Proposed Solutions for Cloud ForensicIJERA Editor
Cloud computing is a heavily evolving topic in information technology (IT). Rather than creating, deploying and managing a physical IT infrastructure to host their software applications, organizations are increasingly deploying their infrastructure into remote, virtualized environments, often hosted and managed by third parties. Due to this large scale, in case an attack over the network of cloud, it’s a great challenge to investigate to cloud. There is a very low research done to develop the theory and practice of cloud forensic. The investigator has huge challenge of getting the IP address of the culprit as there is dynamic IP in cloud computing. Also one among many problems is that the customer is only concerned of security and threat of unknown. The cloud service provider never lets customer see what is behind "virtual curtain" which leads customer more doubting for the security and threat issue. In cloud forensics, the lack of physical access leads to big challenge for investigator. In this paper we are presenting few common challenges which arise in cloud forensic and proposed solution to it. We will also discuss the in brief about cloud computing and cloud forensic.
Diagnosis Chest Diseases Using Neural Network and Genetic Hybrid AlgorithmIJERA Editor
The back propagation algorithm is most popular algorithm in feed forward neural network with the multi-layer. It measures the output error and calculates the gradient of the error and adjusting the ANN weight moving along the descending gradient direction. Back propagation is used to learn and store by mapping relations of input- output model. A genetic algorithm is having a random probability distribution or pattern that may be analyses statistically but may not be predicted precisely. Genetic algorithm is an iterative procedure that generates new population for individual from the old one. In my paper I am proposing to implement the back propagation algorithm and genetic algorithm to compare the output accuracy percent for medical diagnosis on various chest diseases (Asthme, tuberculosis, lung cancer, pneumonia).
Ultrasonic and Volumetric Investigations of -Butyrolactone with Aliphatic Al...IJERA Editor
Densities () and speeds of sound (u) have been determined for the binary liquid mixtures of -butyrolactone (GBL) with 1-propanol (1-Pro), 2-propanol (2-Pro), 1-butanol (1-But) and 2-butanol (2-But) at 303.15, 308.15, and 313.15 K and entire composition range. From the experimental results, the excess molar volume (VE), and deviation in isentropic compressibility (s) were calculated. The computed properties have been fitted to a Redlich-Kister type polynomial equation to derive binary coefficients and standard deviations.
Communication Performance Over A Gigabit Ethernet NetworkIJERA Editor
A present computing imposes heavy demands on the optical communication network. Gigabit Ethernet technology can provide the required bandwidth to meet these demands. However, it has also involve the communication Impediment to progress from network media to TCP(Transfer control protocol) processing. In this paper, present an overview of Gigabit per second Ethernet technology and study the end-to-end Gigabit Ethernet communication bandwidth and retrieval time. Performance graphs are collected using NetPipe in this clearly show the performance characteristics of TCP/IP over Gigabit Ethernet. These indicate the impact of a number of factors such as processor speeds, network adaptors, versions of the Linux Kernel or opnet softwar and device drivers, and TCP/IP(Internet protocol) tuning on the performance of Gigabit Ethernet between two Pentium II/350 PCs. Among the important conclusions are the marked superiority of the 2.1.121 and later development kernels and 2.2.x production kernels of Linux or opnet softwar used and that the ability to increase the MTU(maximum transmission unit) Further than the Ethernet standard of 1500 could significantly enhance the throughput reachable.
Messages addressed to specific users can be decrypted by Key Generation Centre (KGC) by generating their private keys. Data owner wants the data to be delivered only to specified user and not to unauthorized person that is the data owner makes their private data accessible only to authorized person. We propose attribute based encryption and escrow problem which means written agreement delivered to a third party to overcome this problem. Attribute based Encryption (ABE) is a type of public-key encryption in which the private key of a user and the cipher text are dependent upon attributes. It is a promising cryptographic approach.
Apprehension of Youth towards Social Networking Sites: Two Sides of a CoinIJERA Editor
Social networking sites are wide area of research. Rapid growth in Technology and Human Resources provides us new platform to build social networks. Today it has become highest point of concern to be aware of social networking sites and built networks. Since few years Social networking site has become very popular. There are different social networking sites for different purpose fulfillment. Orkut fails in the race of Social Networking Sites as compare to facebook. Although Facebook came in existence later but able to attract more crowd. It is user-friendly. Everything which is developed as pros and cons it depends upon the user if they took advantage of technology and develops personality as well as build social networks or get involve themselves in illegal things such as hacking and use wrong sources. The advantages and disadvantages of the social networking sites are mentioned in this research paper.
Future Internet: Challenge And Research TrendIJERA Editor
This article first presents the Challenges of the current Internet and concept of Future Internet Research, motivation for future Internet. Challenges and limitations of Current Internet are reason of Future Internet Researches. In order to provide Future Internet’s service, the Future Internet testbed must be deployed as foundation, and many countries such as USA, Europe and Asia are striving research of Future Internet and deployment of the Future Internet. This paper describe countries which are active on Future Internet research and summarizes the Trends of the Future Internet.
Burning Behavior of Liquid Fuel DropletsIJERA Editor
Ignition of flammable liquids by hot surfaces is well known to automotive and aviation industries. However, only a limited data regarding hot surface ignition (HSI) of pure and commercial fuels is available in literature. Further, relatively few studies have determined the ignition delay and to our knowledge the combustion lifetime. In the present work, we have generated results from an efficient, reproducible, yet simple experimental setup involving a liquid fuel droplet, a horizontal heated stainless steel plate and quiescent environment. Tests were conducted for diesel, biodiesel and its blends as well as vegetable oils, applied/used as single droplets under variety of conditions to the heated surface. The droplet size range was approximately between 1500 micron to 2000 micron. The objective of this experiment was to determine the minimum temperatures for HSI and also the temperatures where 100% probability of ignition was expected. Further, from this experiment, we were also able to obtain the ignition delay and droplet lifetime. As an extension to this study, a separate droplet combustion model was developed to closely study the general burning behavior of these droplets by generating temperature and species concentration profiles. The droplet mass burning rate was also determined. The results obtained in the present work were in a general agreement with the experimental and modeling observations of other studies.
Provider Aware Anonymization Algorithm for Preserving M - PrivacyIJERA Editor
In this paper, we consider the collaborative data publishing problem for anonymizing horizontally partitioned
data at multiple data providers. We consider a new type of “insider attack” by colluding data providers who may
use their own data records (a subset of the overall data) in addition to the external background knowledge to
infer the data records contributed by other data providers. The paper addresses this new threat and makes several
contributions. First, we introduce the notion of m-privacy, which guarantees that the anonymized data satisfies a
given privacy constraint against any group of up to m colluding data providers. Second, we present heuristic
algorithms exploiting the equivalence group monotonicity of privacy constraints and adaptive ordering
techniques for efficiently checking m-privacy given a set of records. Finally, we present a data provider-aware
anonymization algorithm with adaptive m- privacy checking strategies to ensure high utility and m-privacy of
anonymized data with efficiency. Experiments on real-life datasets suggest that our approach achieves better or
comparable utility and efficiency than existing and baseline algorithms while providing m-privacy guarantee.
A Study on Physico-Chemical Characteristics of Borewell Water In Sugar Town, ...IJERA Editor
Groundwater is a natural resource for drinking water .In addition to the population growth, urbanization and industrialization also extend the demand of water. Providing safe drinking water supply to the ever growing urban and sub-urban population is going to be a challenge to the civil authorities, city planners, policy makers and environmentalists. Groundwater is a major source of drinking water in both urban and rural areas of Mandya. Mandya city is rapidly raising population, changing lifestyle and intense competition among users- agriculture, industry and domestic sectors is driving the groundwater table lower. Besides, discharge of untreated wastewater through bores and leachate from unscientific disposal of solid wastes also contaminate groundwater, thereby reducing quality of fresh water resources.
The present work is aimed at assessing the water quality index for the ground water samples of Sugar town, Mandya city. The groundwater samples of about 40 samples were collected and subjected for a comprehensive physicochemical analysis. The purposes of this investigation are to provide an overview of present ground water quality for the following 12 parameters such as pH, total hardness, calcium, magnesium, chloride, nitrate, sulphate, total dissolved solids, iron, fluoride, alkalinity are to be considered for calculating the WQI. The results are analyzed by WQI method for predicting water quality. Water Quality Index (WQI) is a very useful and effective way for assessing the quality of water. WQI is a very useful tool for communicating the information on overall quality of water.
An Empirical Study of the Applications of Classification Techniques in Studen...IJERA Editor
University servers and databases store a huge amount of data including personal details, registration details, evaluation assessment, performance profiles, and many more for students and lecturers alike. main problem that faces any system administration or any users is data increasing per-second, which is stored in different type and format in the servers, learning about students from a huge amount of data including personal details, registration details, evaluation assessment, performance profiles, and many more for students and lecturers alike. Graduation and academic information in the future and maintaining structure and content of the courses according to their previous results become importance. The paper objectives are extract knowledge from incomplete data structure and what the suitable method or technique of data mining to extract knowledge from a huge amount of data about students to help the administration using technology to make a quick decision. Data mining aims to discover useful information or knowledge by using one of data mining techniques, this paper used classification technique to discover knowledge from student’s server database, where all students’ information were registered and stored. The classification task is used, the classifier tree C4.5, to predict the final academic results, grades, of students. We use classifier tree C4.5 as the method to classify the grades for the students .The data include four years period [2006-2009]. Experiment results show that classification process succeeded in training set. Thus, the predicted instances is similar to the training set, this proves the suggested classification model. Also the efficiency and effectiveness of C4.5 algorithm in predicting the academic results, grades, classification is very good. The model also can improve the efficiency of the academic results retrieving and evidently promote retrieval precision.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Spectroscopic studies on Mn2+ ions doped Cadmium Aluminum Fluoro Lead Borate ...IJERA Editor
This article reports on optical properties of Mn2+ (0.5 mol%): 49.5 B2O3 - 10PbO - 30CdO -10AlF3 glasses.
Optical absorption spectrum of the manganese ions doped glass exhibits broad absorption band at 473 nm.
Photoluminescence spectrum of Mn2+ (0.5 mol %): 49.5B2O3- 30CdO – 10PbO - 10AlF3 glass has revealed a red
emission at 618 nm with an excitation wavelength 467 nm.
Image Enhancement Using Filter To Adjust Dynamic Range of PixelsIJERA Editor
In this paper, we propose a novel algorithm for image enhancement in compressed (DCT) domain. Despite, few algorithms have been reported to enhance images in DCT domain proposed algorithm differs from previous algorithms in such a way that it enhances both dark and bright regions of an image equally well. In addition, it outperforms in enhancing the chromatic components as well as luminance components. Since the algorithm works in DCT domain, computational complexity is reduced reasonably.
Privacy Preservation and Restoration of Data Using Unrealized Data SetsIJERA Editor
In today’s world, there is an improved advance in hardware technology which increases the capability to store and record personal data about consumers and individuals. Data mining extracts knowledge to support a variety of areas as marketing, medical diagnosis, weather forecasting, national security etc successfully. Still there is a challenge to extract certain kinds of data without violating the data owners’ privacy. As data mining becomes more enveloping, such privacy concerns are increasing. This gives birth to a new category of data mining method called privacy preserving data mining algorithm (PPDM). The aim of this algorithm is to protect the easily affected information in data from the large amount of data set. The privacy preservation of data set can be expressed in the form of decision tree. This paper proposes a privacy preservation based on data set complement algorithms which store the information of the real dataset. So that the private data can be safe from the unauthorized party, if some portion of the data can be lost, then we can recreate the original data set from the unrealized dataset and the perturbed data set.
Efficient Design of Reversible Multiplexers with Low Quantum CostIJERA Editor
Multiplexing is the generic term used to designate the operation of sending one or more analogue or digital
signals over a common transmission line at dissimilar times or speeds and as such, the scheme we use to do just
that is called a Multiplexer. In digital electronics, multiplexers are similarly known as data selectors as they can
“select” each input line, are made from individual Analogue Switches encased in a single IC package as
conflicting to the “mechanical” type selectors such as standard conservative switches and relays. In today era,
reversibility has become essential part of digital world to make digital circuits more efficient. In this paper, we
have proposed a new method to reduce quantum cost and power for various multiplexers. The results are
simulated in Xilinx by using VHDL language.
As a new material, the researches on polyvinyl alcohol fiber cement stabilized macadam are also less. This
article studies the effect of different volume fraction of fiber length on the compressive strength and splitting
tensile strength of cement stabilized macadam.To promote polyvinyl alcohol fiber cement stabilized macadam’s
application,it has theoretical significance and engineering application value.
Research onidentify stadia of interchange exit ramp in mountainous urban freewayIJERA Editor
Theidentify stadia of interchange exit ramp hasgreat influence on capacity and safety levels of urbanexpressway,combining with car psychological theory and driverscharacteristics,based on design speed and driver's reaction time, driversoperating characteristics and the cause of the accident on interchange exit ramp was analyzed and the identify stadia threshold under different design speedwas determined. The resultindicates that: the requirements of specification for identify stadia has some limitations, it should be modified appropriately.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Trust Your Cloud Service Provider: User Based Crypto ModelIJERA Editor
In Data Storage as a Service (STaaS) cloud computing environment, the equipment used for business operations
can be leased from a single service provider along with the application, and the related business data can be
stored on equipment provided by the same service provider. This type of arrangement can help a company save
on hardware and software infrastructure costs, but storing the company’s data on the service provider’s
equipment raises the possibility that important business information may be improperly disclosed to others [1].
Some researchers have suggested that user data stored on a service-provider’s equipment must be encrypted [2].
Encrypting data prior to storage is a common method of data protection, and service providers may be able to
build firewalls to ensure that the decryption keys associated with encrypted user data are not disclosed to
outsiders. However, if the decryption key and the encrypted data are held by the same service provider, it raises
the possibility that high-level administrators within the service provider would have access to both the
decryption key and the encrypted data, thus presenting a risk for the unauthorized disclosure of the user data. we
in this paper provides an unique business model of cryptography where crypto keys are distributed across the
user and the trusted third party(TTP) with adoption of such a model mainly the CSP insider attack an form of
misuse of valuable user data can be treated secured.
Challenges and Proposed Solutions for Cloud ForensicIJERA Editor
Cloud computing is a heavily evolving topic in information technology (IT). Rather than creating, deploying and managing a physical IT infrastructure to host their software applications, organizations are increasingly deploying their infrastructure into remote, virtualized environments, often hosted and managed by third parties. Due to this large scale, in case an attack over the network of cloud, it’s a great challenge to investigate to cloud. There is a very low research done to develop the theory and practice of cloud forensic. The investigator has huge challenge of getting the IP address of the culprit as there is dynamic IP in cloud computing. Also one among many problems is that the customer is only concerned of security and threat of unknown. The cloud service provider never lets customer see what is behind "virtual curtain" which leads customer more doubting for the security and threat issue. In cloud forensics, the lack of physical access leads to big challenge for investigator. In this paper we are presenting few common challenges which arise in cloud forensic and proposed solution to it. We will also discuss the in brief about cloud computing and cloud forensic.
Diagnosis Chest Diseases Using Neural Network and Genetic Hybrid AlgorithmIJERA Editor
The back propagation algorithm is most popular algorithm in feed forward neural network with the multi-layer. It measures the output error and calculates the gradient of the error and adjusting the ANN weight moving along the descending gradient direction. Back propagation is used to learn and store by mapping relations of input- output model. A genetic algorithm is having a random probability distribution or pattern that may be analyses statistically but may not be predicted precisely. Genetic algorithm is an iterative procedure that generates new population for individual from the old one. In my paper I am proposing to implement the back propagation algorithm and genetic algorithm to compare the output accuracy percent for medical diagnosis on various chest diseases (Asthme, tuberculosis, lung cancer, pneumonia).
Ultrasonic and Volumetric Investigations of -Butyrolactone with Aliphatic Al...IJERA Editor
Densities () and speeds of sound (u) have been determined for the binary liquid mixtures of -butyrolactone (GBL) with 1-propanol (1-Pro), 2-propanol (2-Pro), 1-butanol (1-But) and 2-butanol (2-But) at 303.15, 308.15, and 313.15 K and entire composition range. From the experimental results, the excess molar volume (VE), and deviation in isentropic compressibility (s) were calculated. The computed properties have been fitted to a Redlich-Kister type polynomial equation to derive binary coefficients and standard deviations.
Communication Performance Over A Gigabit Ethernet NetworkIJERA Editor
A present computing imposes heavy demands on the optical communication network. Gigabit Ethernet technology can provide the required bandwidth to meet these demands. However, it has also involve the communication Impediment to progress from network media to TCP(Transfer control protocol) processing. In this paper, present an overview of Gigabit per second Ethernet technology and study the end-to-end Gigabit Ethernet communication bandwidth and retrieval time. Performance graphs are collected using NetPipe in this clearly show the performance characteristics of TCP/IP over Gigabit Ethernet. These indicate the impact of a number of factors such as processor speeds, network adaptors, versions of the Linux Kernel or opnet softwar and device drivers, and TCP/IP(Internet protocol) tuning on the performance of Gigabit Ethernet between two Pentium II/350 PCs. Among the important conclusions are the marked superiority of the 2.1.121 and later development kernels and 2.2.x production kernels of Linux or opnet softwar used and that the ability to increase the MTU(maximum transmission unit) Further than the Ethernet standard of 1500 could significantly enhance the throughput reachable.
Messages addressed to specific users can be decrypted by Key Generation Centre (KGC) by generating their private keys. Data owner wants the data to be delivered only to specified user and not to unauthorized person that is the data owner makes their private data accessible only to authorized person. We propose attribute based encryption and escrow problem which means written agreement delivered to a third party to overcome this problem. Attribute based Encryption (ABE) is a type of public-key encryption in which the private key of a user and the cipher text are dependent upon attributes. It is a promising cryptographic approach.
Apprehension of Youth towards Social Networking Sites: Two Sides of a CoinIJERA Editor
Social networking sites are wide area of research. Rapid growth in Technology and Human Resources provides us new platform to build social networks. Today it has become highest point of concern to be aware of social networking sites and built networks. Since few years Social networking site has become very popular. There are different social networking sites for different purpose fulfillment. Orkut fails in the race of Social Networking Sites as compare to facebook. Although Facebook came in existence later but able to attract more crowd. It is user-friendly. Everything which is developed as pros and cons it depends upon the user if they took advantage of technology and develops personality as well as build social networks or get involve themselves in illegal things such as hacking and use wrong sources. The advantages and disadvantages of the social networking sites are mentioned in this research paper.
Future Internet: Challenge And Research TrendIJERA Editor
This article first presents the Challenges of the current Internet and concept of Future Internet Research, motivation for future Internet. Challenges and limitations of Current Internet are reason of Future Internet Researches. In order to provide Future Internet’s service, the Future Internet testbed must be deployed as foundation, and many countries such as USA, Europe and Asia are striving research of Future Internet and deployment of the Future Internet. This paper describe countries which are active on Future Internet research and summarizes the Trends of the Future Internet.
Burning Behavior of Liquid Fuel DropletsIJERA Editor
Ignition of flammable liquids by hot surfaces is well known to automotive and aviation industries. However, only a limited data regarding hot surface ignition (HSI) of pure and commercial fuels is available in literature. Further, relatively few studies have determined the ignition delay and to our knowledge the combustion lifetime. In the present work, we have generated results from an efficient, reproducible, yet simple experimental setup involving a liquid fuel droplet, a horizontal heated stainless steel plate and quiescent environment. Tests were conducted for diesel, biodiesel and its blends as well as vegetable oils, applied/used as single droplets under variety of conditions to the heated surface. The droplet size range was approximately between 1500 micron to 2000 micron. The objective of this experiment was to determine the minimum temperatures for HSI and also the temperatures where 100% probability of ignition was expected. Further, from this experiment, we were also able to obtain the ignition delay and droplet lifetime. As an extension to this study, a separate droplet combustion model was developed to closely study the general burning behavior of these droplets by generating temperature and species concentration profiles. The droplet mass burning rate was also determined. The results obtained in the present work were in a general agreement with the experimental and modeling observations of other studies.
Provider Aware Anonymization Algorithm for Preserving M - PrivacyIJERA Editor
In this paper, we consider the collaborative data publishing problem for anonymizing horizontally partitioned
data at multiple data providers. We consider a new type of “insider attack” by colluding data providers who may
use their own data records (a subset of the overall data) in addition to the external background knowledge to
infer the data records contributed by other data providers. The paper addresses this new threat and makes several
contributions. First, we introduce the notion of m-privacy, which guarantees that the anonymized data satisfies a
given privacy constraint against any group of up to m colluding data providers. Second, we present heuristic
algorithms exploiting the equivalence group monotonicity of privacy constraints and adaptive ordering
techniques for efficiently checking m-privacy given a set of records. Finally, we present a data provider-aware
anonymization algorithm with adaptive m- privacy checking strategies to ensure high utility and m-privacy of
anonymized data with efficiency. Experiments on real-life datasets suggest that our approach achieves better or
comparable utility and efficiency than existing and baseline algorithms while providing m-privacy guarantee.
A Study on Physico-Chemical Characteristics of Borewell Water In Sugar Town, ...IJERA Editor
Groundwater is a natural resource for drinking water .In addition to the population growth, urbanization and industrialization also extend the demand of water. Providing safe drinking water supply to the ever growing urban and sub-urban population is going to be a challenge to the civil authorities, city planners, policy makers and environmentalists. Groundwater is a major source of drinking water in both urban and rural areas of Mandya. Mandya city is rapidly raising population, changing lifestyle and intense competition among users- agriculture, industry and domestic sectors is driving the groundwater table lower. Besides, discharge of untreated wastewater through bores and leachate from unscientific disposal of solid wastes also contaminate groundwater, thereby reducing quality of fresh water resources.
The present work is aimed at assessing the water quality index for the ground water samples of Sugar town, Mandya city. The groundwater samples of about 40 samples were collected and subjected for a comprehensive physicochemical analysis. The purposes of this investigation are to provide an overview of present ground water quality for the following 12 parameters such as pH, total hardness, calcium, magnesium, chloride, nitrate, sulphate, total dissolved solids, iron, fluoride, alkalinity are to be considered for calculating the WQI. The results are analyzed by WQI method for predicting water quality. Water Quality Index (WQI) is a very useful and effective way for assessing the quality of water. WQI is a very useful tool for communicating the information on overall quality of water.
An Empirical Study of the Applications of Classification Techniques in Studen...IJERA Editor
University servers and databases store a huge amount of data including personal details, registration details, evaluation assessment, performance profiles, and many more for students and lecturers alike. main problem that faces any system administration or any users is data increasing per-second, which is stored in different type and format in the servers, learning about students from a huge amount of data including personal details, registration details, evaluation assessment, performance profiles, and many more for students and lecturers alike. Graduation and academic information in the future and maintaining structure and content of the courses according to their previous results become importance. The paper objectives are extract knowledge from incomplete data structure and what the suitable method or technique of data mining to extract knowledge from a huge amount of data about students to help the administration using technology to make a quick decision. Data mining aims to discover useful information or knowledge by using one of data mining techniques, this paper used classification technique to discover knowledge from student’s server database, where all students’ information were registered and stored. The classification task is used, the classifier tree C4.5, to predict the final academic results, grades, of students. We use classifier tree C4.5 as the method to classify the grades for the students .The data include four years period [2006-2009]. Experiment results show that classification process succeeded in training set. Thus, the predicted instances is similar to the training set, this proves the suggested classification model. Also the efficiency and effectiveness of C4.5 algorithm in predicting the academic results, grades, classification is very good. The model also can improve the efficiency of the academic results retrieving and evidently promote retrieval precision.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
DUAL EDGE-TRIGGERED D-TYPE FLIP-FLOP WITH LOW POWER CONSUMPTIONijcsit
In this paper, a novel low-power dual edge-triggered (DET) D-type flip-flop is proposed. This design achieves dual edge-triggered with two parallel data paths work in opposite phases of the clock single. Among them, a latch circuit structure employs differential input data signals which deposits very little capacitance on the clock line is accomplished. For fair comparison, four previously reported DET flipflops along with the proposed DETFF (DET flip-flop) are compared in terms of power consumption and power-delay product (PDP), under different data activities and different data rates. Several HSPICE simulation results show that the proposed DETFF is superior in power reduction at different parameters as compared to the existing DETFFs. Hence, the proposed DETFF is well suited for low power applications.
In this paper, a novel low-power dual edge-triggered (DET) D-type flip-flop is proposed. This design achieves dual edge-triggered with two parallel data paths work in opposite phases of the clock single. Among them, a latch circuit structure employs differential input data signals which deposits very little capacitance on the clock line is accomplished. For fair comparison, four previously reported DET flipflops along with the proposed DETFF (DET flip-flop) are compared in terms of power consumption and power-delay product (PDP), under different data activities and different data rates. Several HSPICE simulation results show that the proposed DETFF is superior in power reduction at different parameters as compared to the existing DETFFs. Hence, the proposed DETFF is well suited for low power applications.
Power and Delay Analysis of Logic Circuits Using Reversible GatesRSIS International
This paper determines the propagation delay and on
chip power consumed by each basic and universal gates and
basic arithmetic functions designed using existing reversible
gates through VHDL. Hence a designer can choose the best
reversible gates to use for any logic circuit design. The paper
does a look up table analysis of truth tables of the reversible
gates to find the occurrence of the AND OR, NAND, NOR and
basic arithmetic functions, useful to build complex combinational
digital logic circuits.
For the recent CMOS feature sizes power dissipation becomes an overriding concerns for VLSI circuit design. We propose a novel approach named tri-state buffer with common data bus which reduces the total power & delay of elastic buffer. The paper presents a design and implementation of tri-state buffer mechanism. This design offers also the advantage of third state (High Impedance state) of tri-state buffer. The proposed elastic buffer design using tri-state buffer is implemented in Cadence tools. The obtained result shows that our design is effective in terms 20.50 % reduction in total power, 89.67% reduction in delay.
A Low Power Row and Column Compression for High-Performance Multiplication on...ijsrd.com
Digital system design in a remarkable and emerging field now days. Users are using digital devices for almost each and everything in daily life like calculator for calculation, Digital cameras for photo shot and video recording, Mobiles for communication, Computer to connect all over the world etc. In fact, increasing demand for manageable digital electronics products for computing and communication, as well as for other applications, has necessitated longer battery life, lower weight, high speed and lower power consumption. However, the two design criteria are often in conflict by improving one particular aspect of the design constrains the other. The demand for high speed processing has been increasing as a result of expanding computer and signal processing applications. In majority of digital signal processing (DSP) applications, multiplication and accumulation are the most critical operations.
— Parallel Prefix adders have been one of the most
notable among several designs proposed in the past. The
advantage of utilizing the flexibility in implementing these
structures based upon through put requirements. Due to
continuing integrating intensity and the growing needs of
portable devices, low power and high performance designs are of
prime importance. The classical parallel prefix adder structures
presented in the literature over the years optimize for logic depth,
area, and fan-out and interconnect count of logic circuits. In this
proposed system, Kogge-Stone adder which is one of types of
parallel prefix adder is used. Kogge stone is the fastest adder
because of its minimum fan-out. When parallel prefix adder is
compared with classical adders it is advantageous in every aspect.
The study reveals that Parallel Prefix adder has the least power
delay product when compared with its peer existing adder
structures (Ripple carry adder, Carry save adders etc).
Simulation results are verified using Xilinx 10.1 and
MODELSIM 6.4a softwares.
Efficient FPGA implementation of high speed digital delay for wideband beamfor...journalBEEI
In this paper, the authors present an FPGA implementation of a digital delay for beamforming applications. The digital delay is based on a Parallel Farrow Filter. Such architecture allows to reach a very high processing rate with wideband signals and it is suitable to be used with Time-Interleaved Analog to Digital Converters (TI-ADC). The proposed delay has been simulated in MATLAB, implemented on FPGA and characterized in terms of amplitude and phase response, maximum clock frequency and area.
Implementation of a High Speed and Power Efficient Reliable Multiplier Using ...iosrjce
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Design the High Speed Kogge-Stone Adder by UsingIJERA Editor
In this Technical era the high speed and low area of VLSI chip are very- very essential factors. Day by day number of transistors and other active and passive elements are growing on VLSI chip. In Integral part of the processor adders play an important role. In this paper we are using proposed kogge-stone adders for binary addition to reduce the size and increase the efficiency or processors speed. Proposing kogge stone adder provides less components, less path delay and better speed compare to other existing kogge stone adder and other adders. Here we are comparing the kogge stone adders of different-different word size from other adders. The design and experiment can be done by the aid of Xilinx 14.1i Spartan 3 device family.
D-Flip Flop Layout: Efficient in Terms of Area and Power IJEEE
Flip flop forms the very basic element for the sequential circuits which are synchronous. This paper talks about D-Flip flop, which has been made area and power efficient with the aid of software tools DSCH 3.1 and Microwind 3.1. D-flip flop is implemented through Nand gates. Layout of DFF designed through auto generated and semi custom is compared, analyses and finally the results are computed showing 57% improvement in area and approximately 2 % reduction in power. CMOS 90nm technology has been used and efforts are made to reduce area and power.
POWER REDUCTION IN VLSI SYSTEMS BY USING MULTI-BIT FLIP-FLOPSEditor IJMTER
The utilization of power has turned into a smoldering issue in current VLSI design.
Power consumption can be reduced by substituting some flip-flops with less multi-bit flip-flops.
Multi-bit flip-flops are one of the strategies for reducing the clock power consumption. This project
concentrates on reducing of clock force utilizing multi-bit flip-flops by clock synchronization.
Diminishment of the clock power consumption with two single bit flip-flops are synchronized with
single clock pulse. Uniting single bit flip-flops into one multi-bit flip-flop evades duplicate inverters,
brings down the aggregate clock power utilization which lessens the total area. A mixture table is
fabricated to acquire a multi-bit flip-flop which can store the flip-flops that can be consolidated. This
task concentrates on D flip-flop which builds the loading of the clock signal. QCL adder is utilized as
an application for multi-bit flip-flop. Highest ‘1’ bit finding algorithm is utilized to discover the
highest 1 bit from the yield of QCL adder. This calculation checks the yield of QCL adder in each
one cycle.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Similar to Design and Implementation of Multibit Flip flops by Using Single Phase Adiabatic Clock (20)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Design and Implementation of Multibit Flip flops by Using Single Phase Adiabatic Clock
1. A. Bhvaya Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 5, Issue 7, (Part - 4) July 2015, pp.101-105
www.ijera.com 101 | P a g e
Design and Implementation of Multibit Flip flops by Using Single
Phase Adiabatic Clock
A. Bhavya, Dr. B.L. Malleswari
M. Tech VLSI Design, Department of Electrical, Electronics & Communication Engg. SRI DEVI WOMENS
ENGINEERING COLLEGE V.N.PALLY, Near Gandipet, R.R Dist(500075)
Department of Electrical, Electronics & Communication Engg. SRI DEVI WOMENS ENGINEERING
COLLEGE V.N.PALLY, Near Gandipet, R.R Dist (500075)
ABSTRACT
As technology advances, a system on chip (SOC) design can contain more and more components that lead to a
high power density. Now-a-days in IC's, the power consumed by clocking gradually takes a dominant part. .
Power, Area, Performance has become a main issue in VLSI design. In previous designs they have performed a
co-ordinate transformation to identify the flip-flops that can be merged and their legal regions. A combinational
table is formed by that flip-flops. Finally they used hierarchical way to merge the flip-flops. Due to this design
the power consumption can be reduced by replacing some flip-flops by fewer multi-bit flip-flops. We have
proposed an single phase adiabatic clock in for further reduction of the power. In our design also first we will
identify the mergeable flip-flops, build a combinational table from mergeable flip-flops and all the flip-flops are
divided into sub regions to check whether they are working properly or not and finally these flip-flops are
combined together, at this point we are giving an single phase adiabatic clock as input to those flip-flops for the
reduction of power consumption and timing.
Index Terms -- Clock power reduction, merging, multi bit flip-flops, Adiabatic clock
I. Introduction
As technology advances, an system on chip
(SOC) design can contain more and more
components that leads to high power density [1]. A
heavy growth recently has done by portable
multimedia and communication devices. Main
advantage of these products is long battery life. In
many products, main portion of circuits is occupied
by multi-bit flip flops and delay buffers. By reducing
the power consumption, we can increase battery life
and also we can reduce the overheating problem of
the circuit, but increases packaging or cooling.
Therefore, the consideration of power consumption in
complex SOCs has become a heavy challenge to
designers. Now-a-days VLSI designs, power
consumed by clocking has taken a maximum portion
of the whole design especially for those who design
deeply scaled CMOS technologies.
Thus, several methodologies have been proposed
to reduce the power consumption of clocking. In the
recent years, as the process technology advances,
feature size of IC is shrank, the minimum size of
clock drivers can trigger more than one flip-flop [3].
The required circuit and the power consumption
can be reduced, when smaller flip-flops are replaced
by larger bits of multi flip-flops[2].
In previous designs they have performed a co-
ordinate transformation to identify the flip-flops
which can be merged. A combinational table is
formed by that flip-flops. Finally hierarchical way is
used to merge the flip-flops. By using this design the
power consumption is reduced by replacing some
flip-flops by fewer multi-bit flip-flops. In our
proposed design a single phase adiabatic clock is
used for further reduction of the power and timing.
1.1 Multi-Bit Flip-Flops
Combination of two or more flip flops is known
as multi-bit flip flops. In multi-bit flip flops a single
clock is shared between all flip flops, due to this
power consumption can be reduced.
A single-bit flip-flop has two latches (Master
latch and slave latch). The latches need “Clk” and
“Clk’ ” signal to perform operations.
Fig 1.1(A) Single bit flip-flop
RESEARCH ARTICLE OPEN ACCESS
2. A. Bhvaya Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 5, Issue 7, (Part - 4) July 2015, pp.101-105
www.ijera.com 102 | P a g e
Fig 1.1(B) Example of merging two 1-bit flip-flops
into one 2-bit flip-flop.
(a) Two 1-bit flip-flops (before merging). (b) 2-bit
flip-flop (after merging).
Multi-bit flip-flop cells are capable of decreasing
the power consumption because they have shared
Inverter inside the flip-flop and they can minimize
clock skew at the same time. To obtain these benefits,
the ASIC design must meet the following
requirements. The single-bit flip-flops we want to
replace with multi-bit flip-flop must have same clock
condition and same set/reset condition.
Fig 1.1(C) Schematic of 2bit flip-flop
Fig 1.1(D) Waveform of 2bit flip-flop
II. Adiabatic Logic
In modern computer system design power, area
and timing consumption became a high. During past
years several effective power management design
techniques have been developed.
The word adiabatic is taken from Greek language
which means “impassible” and implies the
thermodynamic principle of state change with no loss
of gain or heat [5].
2.1 Purpose of Adiabatic logic
Adiabatic switching is also known as alternative
CMOS logic, with no loss or gain of energy.
The below circuits operates when given supply is
given at vdd.When the input supply is given at in
then the output is appeared at outbar. The output will
be hign when the input supply is given at inbar . This
circuit operates when the vdd voltage is not greater
that 1.8v [6].
Fig 2.1(a) Schematic of Adiabatic circuit
Fig 2.1(b) Waveform of adiabatic circuit
III. Formulation of problem
3.1 Identification of Mergeable Flip-flops
The identification of mergeable flip flops can be
done by using binary tree concept.
In computer science, a binary tree is defined as
tree data structure. In binary tree format each node
has at most two children, they are left child and
the right child. From a graph theory, binary (and K-
ary) trees as defined as arborescences. A binary tree
is also known as bifurcating arborescence a term
which actually appears in some very old
programming books, before the modern computer
science terminology. It is also possible to interpret a
binary tree as an undirected, rather than a directed
graph, in which case a binary tree is an ordered,
rooted tree. A binary tree is a special case of an
ordered K-ary tree, where k is 2.
3. A. Bhvaya Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 5, Issue 7, (Part - 4) July 2015, pp.101-105
www.ijera.com 103 | P a g e
Fig 3.1 Example of labelled binary tree
3.2 Combinational Table
We will build a combination table, which records
all possible combinations of flip-flops to get feasible
flip-flops before replacements. Thus, we can replace
flip-flops depending on the combinational table. Each
time we use only one combination of flip-flops, to
reduce the search time [1].
For simplicity we use a binary tree to represent
one combination.. A flip-flop in L is demoted by each
node in the tree. The types of flip-flops denoted by
leaves will constitute the type of the flip-flop in the
root. For each node, the bit width of the
corresponding flip-flop equals to the bit width
summation of flip-flops denoted by its left and right
child. In the beginning, we initialize a combination ni
for each kind of flip-flops in L (. Then, in order to
represent all combinations by using a binary tree, we
may add pseudo types, which denote those flip-flops
that are not provided by the library. For example,
assume that a library only supports two kinds of flip-
flops whose bit widths are 1 and 4, respectively. In
order to use a binary tree to denote a combination
whose bit width is 4, there must exist flip-flops
whose bit widths are 2 and 3 in L.Thus, we have to
create two pseudo types of flip-flops with 2- and 3-bit
if L does not provide these flip-flops.
Fig 3.2(A). Example of building the combination
table. (a) Initialize the library L and the combination
table T . (b) Pseudo types are added into L, and the
corresponding binary tree is also build for each
combination in T. (c) New combination n3 is
obtained from combining two n1s. (d) New
combination n4 is obtained from combining n1 and
n3, and the combination n5 is obtained from
combining two n3s. (e) New combination n6 is
obtained from combining n1 and n4. (f) Last
combination table is obtained after deleting the
unused combination in (e).
Fig 3.2(B) Schematic of 8bits using combinational
table
Fig 3.3(C) waveform of 8bits using combinational
table
3.4 Merging of flip-flops
To reduce the complexity, we first divide the
whole placement region into several sub regions, and
use the combination table to replace flip-flops in each
sub region. Then, several sub regions are combined
into a larger sub region and the flip-flops are replaced
again so that those flip-flops in the neighbouring sub
regions can be replaced further. Finally, those flip-
flops with pseudo types are deleted in the last stage
because they are not provided by the supported
library [1].
4. A. Bhvaya Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 5, Issue 7, (Part - 4) July 2015, pp.101-105
www.ijera.com 104 | P a g e
Fig 3.4(A). Example of replacements of flip-flops. (a)
Sets of flip-flops before merging. (b) Two 1-bit flip-
flops, f1 and f2, are replaced by the 2-bit flip-flop f3.
(c) Two 1-bit flip-flops, f4 and f5, are replaced by the
2-bit flip-flop f6. (d) Two 2-bit flip-flops, f7 and f8,
are replaced by the 4-bit flip-flop f9. (e) Two 2-bit
flip-flops, f3 and f6, are replaced by the 4-bit flip-flop
f10. (f) Sets of flip-flops after merging.
Fig 3.4(B) Merging of 8bit flip-flops
Fig 3.4(C) Waveform of 8bits of merging flip-flops
3.5 Addition of adiabatic clock to merging flip-
flops
Adiabatic clock is used for power reduction in
sequential circuits. Adiabatic clock resembles a sine
wave.
Fig 3.5(A) Sine wave which resembles an adiabatic
clock
Fig 3.5(B)Addition of adiabatic clock to merging
flip-flops
Fig 3.5(C) Waveform of adiabatic clock
IV. Results
Power calculations and timing is shown in below
table
Power
and
Timing
Combination
of 8bit flip
flops
Merging
of 8bit
flip flops
Using
Adiabatic
clock
Power(W) 2.515E-3 770.6E-6 697.6E-6
Timing(s) 0.15 0.15 0.02
Table 4. Power and Timing calculations for different
regions
5. A. Bhvaya Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 5, Issue 7, (Part - 4) July 2015, pp.101-105
www.ijera.com 105 | P a g e
V. Conclusion
Identification of mergeable flip flops can be done
by using binary tree format and later those megeable
flip flops are formed as multi-bits by using
combinational table until further reduction of flip
flops cannot be done. By using combinational table
the flip flops are merged to check whether those flip
flops are working properly or not. From the above
results we can conclude that power and timing are
reduced by using single phase adiabatic clock. As the
multi-bits increases the power consumption and
timing also reduces using adiabatic clock.
References
[1.] "Effective and Efficient Approach for Power
Reduction by Using Multi-Bit Flip-Flops"
by Ya-Ting. Shyu, J.M. Lin, C.P. Huang,
C.W. Lin, Ying-Zu Lin, and S-J Chang,
IEEE Transactions on Very Large Scale
Integration (VLSI) Systems, Vol 21, NO.4,
April 2013.
[2.] "A Survey of post-placement techniques of
Multi-Bit Flip-Flops" by S.K. Priya, P.M.
Krishnammal, B.Sivaranjini, International
Journal of Engineering Research and
Development, Vol.10, Issue 3(March 2014) ,
PP. 11-18.
[3.] "Clock Network Power Saving Using Multi-
Bit Flip-Flops in Multiple Voltage Island
Design" by Jhen-Hong He, Li-Wei Huang,
Jui-Hung Hung, Yu-Cheng Lin, Guo-syuan
Liou, Tsai-Ming Hsieh, Proceedings of the
2nd International Conference on Computer
Science and Electronics Engineering
(ICCSEE 2013)
[4.] "Power Aware Placement" by Yongseok
Cheon, Pei-Hsin Ho, Andrew B. Kahng,
Sherief Reda, QinkeWang.
[5.] "Side-Channel Analysis Aspects of
Lightweight Block Ciphers" by Carsten
Rolfes, February 28, 2009.
[6.] "New Single Phase Adiabatic Logic
Family" by Mihail Cutitaru, Lee A. Belfore.