DESIGN AND EVALUATION OF A LOW-VOLTAGE PROCESS VARIATION-TOLERANT SRAM
[View]
1KANDAMURI DIMPLE TRIVENI,2P.SURYA NARAYANA
present three iterations of SRAM bit cells with nMOS-only based read ports aimed to greatly reduce data dependent read port leakage to enable 1k cells/RBL, improve read performance, and reduce area and power over conventional and 10T cell-based works.
1KANDAMURI DIMPLE TRIVENI,2P.SURYA NARAYANA
present three iterations of SRAM bit cells with nMOS-only based read ports aimed to greatly reduce data dependent read port leakage to enable 1k cells/RBL, improve read performance, and reduce area and power over conventional and 10T cell-based works.
EFFICIENT AND IMPROVED SECURITY FOR NON-VOLATILE MAIN MEMORY USING DSSC
[View]
1YEDIDA SRIDURGA,2S SAMBASIVARAO DANNINA
:The use of hardware encryption and new memory technologies such as phase change memory (PCM) are gaining popularity in a variety of server applications such as cloud systems
1YEDIDA SRIDURGA,2S SAMBASIVARAO DANNINA
:The use of hardware encryption and new memory technologies such as phase change memory (PCM) are gaining popularity in a variety of server applications such as cloud systems
LOW DENSITY SCALABLE BINARY COUNTER USING EFFICIENT SORTING NETWORK
[View]
1KATHIMANDA ANJALI,2S SAMBASIVARAO DANNINA
Parallel counters are enter components in numerous number juggling circuits, particularly quick multipliers
1KATHIMANDA ANJALI,2S SAMBASIVARAO DANNINA
Parallel counters are enter components in numerous number juggling circuits, particularly quick multipliers
POWER AND DENSITY OPTIMIZED SYMMETRIC PASS GATE USING GDI
[View]
1BUSI SUDHAKARA RAO, 2A.NAGA SUMAN
Internet of Things (IoT) devices have strict energy constraints as they often operate on a battery supply. The cryptographic operations within IoT devices consume substantial energy and are vulnerable to a class of hardware attacks known as side-channel attacks
1BUSI SUDHAKARA RAO, 2A.NAGA SUMAN
Internet of Things (IoT) devices have strict energy constraints as they often operate on a battery supply. The cryptographic operations within IoT devices consume substantial energy and are vulnerable to a class of hardware attacks known as side-channel attacks
CREDIT CARD FRAUD DETECTION USING MACHINE LEARNING ALGORITHM
[View]
Dr. M. Chaitanya Kishore Reddy1, Y. Srilatha2, P. Deepak3, M. Janaki4
Credit card fraud is a field with perpetrators performing illegal actions that may affect other individuals or companies negatively.
Dr. M. Chaitanya Kishore Reddy1, Y. Srilatha2, P. Deepak3, M. Janaki4
Credit card fraud is a field with perpetrators performing illegal actions that may affect other individuals or companies negatively.
HANDWRITTEN DIGIT RECOGNITION USING MACHINE LEARNING
[View]
SK. Mahaboob Basha1, D. Sudheer2, J. Vineetha3
In this Handwritten Digit Recognition project,we will recognize handwritten Digits, i.e. from 0-9.
SK. Mahaboob Basha1, D. Sudheer2, J. Vineetha3
In this Handwritten Digit Recognition project,we will recognize handwritten Digits, i.e. from 0-9.
SECURE MOBILE, SHORT MESSAGE SERVICE SPAM DETECTION USING MACHINE LEARNING ALGORITHMS
[View]
N. Narasimha Rao 1, Y. Srinivas2, K. Bhandhavya3
The Each day site visitors of Short Message Service (SMS) continues growing.
N. Narasimha Rao 1, Y. Srinivas2, K. Bhandhavya3
The Each day site visitors of Short Message Service (SMS) continues growing.
SENSING AND DETECTING HIDDEN
[View]
1A. Gopala krishna, 2Ponnaganti Srilatha, 3Nrusimhadevara V L L Alekhya, 4Katabattulasuresh
As technology development in the monitoring devices is a great fortune to the society, but misusing of this technology will create a suspicious environment like hidden cameras
1A. Gopala krishna, 2Ponnaganti Srilatha, 3Nrusimhadevara V L L Alekhya, 4Katabattulasuresh
As technology development in the monitoring devices is a great fortune to the society, but misusing of this technology will create a suspicious environment like hidden cameras
TO DEVELOP A DECENTRALIZED APPLICATION TO DEMONSTRATE
[View]
Dr.M. Chaitanya Kishore Reddy.1, K.Keerthana.2, P.Padma Soumya3,K. Vijay Kumar
Blockchain Technology is a relatively new approach in the field of information technology.
Dr.M. Chaitanya Kishore Reddy.1, K.Keerthana.2, P.Padma Soumya3,K. Vijay Kumar
Blockchain Technology is a relatively new approach in the field of information technology.
DETECTING FAKE ONLINE REVIEWS USING SUPERVISED AND SEMI-SUPERVISED LEARNING
[View]
Mr .B .B. K. Prasad1 , B. Naga Siva Likhitha2 , K.Ramesh3
Online reviews have a great impact on today’s business and commerce.
Mr .B .B. K. Prasad1 , B. Naga Siva Likhitha2 , K.Ramesh3
Online reviews have a great impact on today’s business and commerce.
POTHOLE DETECTION ON ROADS USING IMAGE PROCESSING
[View]
ROHITH BALA JASWANTH. B 1, S. L. V. B. V. MAHITHA 2, V. PADMINI 3, V. SAI KRISHNA 4, S. NAGA PHANI 5.
: In order to progress, potholes must be inspected as one of the most prevalent forms of road defects.
ROHITH BALA JASWANTH. B 1, S. L. V. B. V. MAHITHA 2, V. PADMINI 3, V. SAI KRISHNA 4, S. NAGA PHANI 5.
: In order to progress, potholes must be inspected as one of the most prevalent forms of road defects.
APC AND OMS BASED LUT DESIGN FOR HIGH THROUGHPUT DIF IMPLEMENTATION
[View]
1CHINTAPALLI HIMABINDU¸2MANDAVILLI SRI HARI
: Digital Intermediate Frequency (DIF) is the vital innovation in digit filters. DIF filter is depend on filter tap, it means that the high tap in system complexity is high and low tap in system complexity is low.
1CHINTAPALLI HIMABINDU¸2MANDAVILLI SRI HARI
: Digital Intermediate Frequency (DIF) is the vital innovation in digit filters. DIF filter is depend on filter tap, it means that the high tap in system complexity is high and low tap in system complexity is low.
AREA EFFICIENT IMPROVED BINARY COUNTER USING BITONIC SORTING NETWORK
[View]
1 RUPANAGUNTLA H SIRISHA,2K.V.HAREESH
Parallel counters are enter components in numerous number juggling circuits, particularly quick multipliers.
1 RUPANAGUNTLA H SIRISHA,2K.V.HAREESH
Parallel counters are enter components in numerous number juggling circuits, particularly quick multipliers.
A CNN BASED APPROACH TO DETECT THE INHERITED RETINAL DISEASES USING PUPILLOMETRY
[View]
Mr.Parisudda Babu K1, Durga Vyshnavi R2*, Susmitha R3, Arun Pall V4, Shaheed Sk5
Generally there are many genetic disorders; Retinal disease is one of the conditions that cause substantial visual deficits.
Mr.Parisudda Babu K1, Durga Vyshnavi R2*, Susmitha R3, Arun Pall V4, Shaheed Sk5
Generally there are many genetic disorders; Retinal disease is one of the conditions that cause substantial visual deficits.
AN ENHANCED AND RELIABLE TECHNIQUES TO DETECT PRODUCT-COUNTERFEITING PROBLEM USING BLOCK CHAIN
[View]
1 Dr. Santhi Baskaran, 2 Katikala sri pavan, 3 Naveen Bharath, 4 Oshin Margratte
As a disruptive tool, block chain technology can eradicate the product-counterfeiting problem in supply chains.
1 Dr. Santhi Baskaran, 2 Katikala sri pavan, 3 Naveen Bharath, 4 Oshin Margratte
As a disruptive tool, block chain technology can eradicate the product-counterfeiting problem in supply chains.
Pages [1]

This work is licensed under a Creative Commons Attribution 3.0 License.
© 2011 - 2022 International Journal of Engineering In Advanced Research Science and Technology
Managed By Indian Association for Reliability and Statistics
International Journal of Engineering In Advanced Research Science and Technology ISSN : 2350-0174 (Online)
All rights reserved withinfo.ijearst.co.in.
To make sure that you can receive messages from us, please add the 'ijearst.co.in' domain to your e-mail 'safe list'. If you do not receive e-mail in your 'inbox', check your 'bulk mail' or 'junk mail' folders.
For any Technical Support contact @info.ijearst.co.in