Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Uday Rai

A low cost design and simple to implement, CMOS NP Domino logic is presented. The NP Domino logic designs require fewer transistors and are compatible with full Domino logic. The performance of NP Domino logic is also better compared to... more
A low cost design and simple to implement, CMOS NP Domino logic is presented. The NP Domino logic designs require fewer transistors and are compatible with full Domino logic. The performance of NP Domino logic is also better compared to the standard Domino logic implementations. Dynamic domino logic are very good but had many challenges like monotonicity, leakage, charge sharing and noise problems. These problems are totally eliminated in the CMOS NP Domino logic (which is also known as Zipper circuits) without any penalty in performance or silicon area utilization. This paper compares NP Domino logic with static CMOS and domino (dynamic) logic design implementations.
The hard target penetration process is very complex, it contains axial de-acceleration vibration and some weak interfering random signals. This is a non-stationary random vibrating signal. Although filtering method based on Hard threshold... more
The hard target penetration process is very complex, it contains axial de-acceleration vibration and some weak interfering random signals. This is a non-stationary random vibrating signal. Although filtering method based on Hard threshold and Soft threshold method is effective on some extend, but it cannot completely remove the high-g acceleration signal components which is related to vibration and interference. As such this paper proposes a new method which analyzes the multivariate signal through Recursive Least Squares Adaptive Wavelet Transformation. Further with the similar signal and multivariate processing this paper compares the RLS Adaptive and Hard/Soft Threshold in Mat lab Simulation Software.
For any organization, banks, office, etc. the security is the first priority to keep their document secure. There are different types of security system like: lock and key system, password lock system, etc. but those systems are not so... more
For any organization, banks, office, etc. the security is the first priority to keep their document secure. There are different types of security system like: lock and key system, password lock system, etc. but those systems are not so secure and hence consume more time and can be break easily using duplicate key. The best security system is fingerprint door lock and unlocks system. This system can’t be hacked and neither consumes much time and hence our security system will be stronger. This system has been designed in such a way that only authorized person can only access the system. Operation of this system is much easier than the previous system and can be installed easily. In future this system can be upgraded or we can add latest technology like voice recognition system, retina recognition system and automatic fire alarm system. Here we have used the biometric as a security system using the Arduino as a controller. For locking and unlocking the door we have used solenoid lock ...
This paper present the application of Maximum Likelihood Estimation (ML) algorithm for the cluster head selection with an unequal clustering protocol. In wireless sensor network it is generally found that each sensor node has their own... more
This paper present the application of Maximum Likelihood Estimation (ML) algorithm for the cluster head selection with an unequal clustering protocol. In wireless sensor network it is generally found that each sensor node has their own limitation of power source which is generally not rechargeable. Therefore, an energy efficient clustering, routing and transmission scheduling has been always a priority that reduces the energy hole problem and increase the network lifetime.
A low cost design and simple to implement, CMOS NP Domino logic is presented. The NP Domino logic designs require fewer transistors and are compatible with full Domino logic. The performance of NP Domino logic is also better compared to... more
A low cost design and simple to implement, CMOS NP Domino logic is presented. The NP Domino logic designs require fewer transistors and are compatible with full Domino logic. The performance of NP Domino logic is also better compared to the standard Domino logic implementations. Dynamic domino logic are very good but had many challenges like monotonicity, leakage, charge sharing and noise problems. These problems are totally eliminated in the CMOS NP Domino logic (which is also known as Zipper circuits) without any penalty in performance or silicon area utilization. This paper compares NP Domino logic with static CMOS and domino (dynamic) logic design implementations.
The hard target penetration process is very complex, it contains axial de-acceleration vibration and some weak interfering random signals. This is a non-stationary random vibrating signal. Although filtering method based on Hard threshold... more
The hard target penetration process is very complex, it contains axial de-acceleration vibration and some weak interfering random signals. This is a non-stationary random vibrating signal. Although filtering method based on Hard threshold and Soft threshold method is effective on some extend, but it cannot completely remove the high-g acceleration signal components which is related to vibration and interference. As such this paper proposes a new method which analyzes the multivariate signal through Recursive Least Squares Adaptive Wavelet Transformation. Further with the similar signal and multivariate processing this paper compares the RLS Adaptive and Hard/Soft Threshold in Mat lab Simulation Software.
For any organization, banks, office, etc. the security is the first priority to keep their document secure. There are different types of security system like: lock and key system, password lock system, etc. but those systems are not so... more
For any organization, banks, office, etc. the security is the first priority to keep their document secure. There are different types of security system like: lock and key system, password lock system, etc. but those systems are not so secure and hence consume more time and can be break easily using duplicate key. The best security system is fingerprint door lock and unlocks system. This system can’t be hacked and neither consumes much time and hence our security system will be stronger. This system has been designed in such a way that only authorized person can only access the system. Operation of this system is much easier than the previous system and can be installed easily. In future this system can be upgraded or we can add latest technology like voice recognition system, retina recognition system and automatic fire alarm system. Here we have used the biometric as a security system using the Arduino as a controller. For locking and unlocking the door we have used solenoid lock ...
In Wireless Sensor Network, the total energy consumption determines the lifetime of the entire network. As a result, a number of recently-designed energy-efficient routing algorithm stated that clustering approach has an important issue... more
In Wireless Sensor Network, the total energy consumption determines the lifetime of the entire network. As a result, a number of recently-designed energy-efficient routing algorithm stated that clustering approach has an important issue for organizing a network into a connected hierarchy and increasing the network lifetime. The clustering hierarchical model consists in two main steps, cluster heads selection and assignment of each node to one cluster. This paper proposes an enhancement of Low Energy Adaptive Clustering with deterministic cluster-head selection by introducing a new parameter for electing cluster-head. Nodes having the highest remaining energy and the lowest energy variance consumption become cluster heads with high probability. The additional variance parameter takes into account energy consumption dispersion if the considered node is elected as cluster-head. This dispersion highly depends on the relative positioning of the node to the base station. Variance keeps the energy consumption of the node in the preceding rounds. This is useful for predicting node status when elected as cluster-head in the current round in order to balance the network energy. Simulation results show that our proposal extends the networks lifetime compared to recent cluster-based protocol. More-over, the energy consumption is balanced between the wireless sensor nodes.
A low cost design and simple to implement, CMOS NP Domino logic is presented. The NP Domino logic designs require fewer transistors and are compatible with full Domino logic. The performance of NP Domino logic is also better compared to... more
A low cost design and simple to implement, CMOS NP Domino logic is presented. The NP Domino logic designs require fewer transistors and are compatible with full Domino logic. The performance of NP Domino logic is also better compared to the standard Domino logic implementations. Dynamic domino logic are very good but had many challenges like monotonicity, leakage, charge sharing and noise problems. These problems are totally eliminated in the CMOS NP Domino logic (which is also known as Zipper circuits) without any penalty in performance or silicon area utilization. This paper compares NP Domino logic with static CMOS and domino (dynamic) logic design implementations.