DESIGN AND EVALUATION OF A LOW-VOLTAGE PROCESS VARIATION-TOLERANT SRAM
[View]
1KANDAMURI DIMPLE TRIVENI,2P.SURYA NARAYANA
present three iterations of SRAM bit cells with nMOS-only based read ports aimed to greatly reduce data dependent read port leakage to enable 1k cells/RBL, improve read performance, and reduce area and power over conventional and 10T cell-based works.
1KANDAMURI DIMPLE TRIVENI,2P.SURYA NARAYANA
present three iterations of SRAM bit cells with nMOS-only based read ports aimed to greatly reduce data dependent read port leakage to enable 1k cells/RBL, improve read performance, and reduce area and power over conventional and 10T cell-based works.
EFFICIENT AND IMPROVED SECURITY FOR NON-VOLATILE MAIN MEMORY USING DSSC
[View]
1YEDIDA SRIDURGA,2S SAMBASIVARAO DANNINA
:The use of hardware encryption and new memory technologies such as phase change memory (PCM) are gaining popularity in a variety of server applications such as cloud systems
1YEDIDA SRIDURGA,2S SAMBASIVARAO DANNINA
:The use of hardware encryption and new memory technologies such as phase change memory (PCM) are gaining popularity in a variety of server applications such as cloud systems
LOW DENSITY SCALABLE BINARY COUNTER USING EFFICIENT SORTING NETWORK
[View]
1KATHIMANDA ANJALI,2S SAMBASIVARAO DANNINA
Parallel counters are enter components in numerous number juggling circuits, particularly quick multipliers
1KATHIMANDA ANJALI,2S SAMBASIVARAO DANNINA
Parallel counters are enter components in numerous number juggling circuits, particularly quick multipliers
POWER AND DENSITY OPTIMIZED SYMMETRIC PASS GATE USING GDI
[View]
1BUSI SUDHAKARA RAO, 2A.NAGA SUMAN
Internet of Things (IoT) devices have strict energy constraints as they often operate on a battery supply. The cryptographic operations within IoT devices consume substantial energy and are vulnerable to a class of hardware attacks known as side-channel attacks
1BUSI SUDHAKARA RAO, 2A.NAGA SUMAN
Internet of Things (IoT) devices have strict energy constraints as they often operate on a battery supply. The cryptographic operations within IoT devices consume substantial energy and are vulnerable to a class of hardware attacks known as side-channel attacks
AREA EFFICIENT IMPROVED BINARY COUNTER USING SCALABLE SORTING NETWORK
[View]
D.Lavanya1 P.Pavithra Roy2
Many number juggling circuits use parallel counters as entry components,and rapid multipliers are a good example of this.
D.Lavanya1 P.Pavithra Roy2
Many number juggling circuits use parallel counters as entry components,and rapid multipliers are a good example of this.
Enhanced and Reliable Malware Detection Technique for Internet of (Battlefield) Things Devices Using Deep Eigen space Learning
[View]
Mirampalli Lakshmi Durga1, K. YASSASRI2, Kuchipudi. Kavya3, Marpu Rahul4, Latha sri Kalapala5
Internet of Things (IoT) in military settings generally consists of a diverse range of Idnternet-connected devices and nodes (e.g., medical devices and wearable combat uniforms).
Mirampalli Lakshmi Durga1, K. YASSASRI2, Kuchipudi. Kavya3, Marpu Rahul4, Latha sri Kalapala5
Internet of Things (IoT) in military settings generally consists of a diverse range of Idnternet-connected devices and nodes (e.g., medical devices and wearable combat uniforms).
IOT BASED SECURITY SYSTEM USING ULTRASONIC SENSOR
[View]
1.MR.B. Ramachandraiah 2. D.Navyasri 3. D.Nagarjunareddy 4. D.Sameer 5. B.sivanagasai
Internet of Things (IoT) consists of smart devices to solve real-world challenges and issues.
1.MR.B. Ramachandraiah 2. D.Navyasri 3. D.Nagarjunareddy 4. D.Sameer 5. B.sivanagasai
Internet of Things (IoT) consists of smart devices to solve real-world challenges and issues.
Digital Watermarking using Discrete Wavelet Transform
[View]
K. Srinivas rao1, E. Mani kantha2, A. Naga Venkata Subhash3, CH. Venkata Rosi Reddy4, G. Siva KrishnaReddy5 , B. Prasanth6
Now days due to advancement of technology it is difficult to protect creative content and intellectual property
K. Srinivas rao1, E. Mani kantha2, A. Naga Venkata Subhash3, CH. Venkata Rosi Reddy4, G. Siva KrishnaReddy5 , B. Prasanth6
Now days due to advancement of technology it is difficult to protect creative content and intellectual property
WOMEN’S SECURITY SYSTEM USING ARDUINO
[View]
Ms. M. Gayathri1, B. Chandra Sekhar2, B. Gowtham Reddy3, A. Gopi4, D. V. Subba Reddy5, A Santhosh Kumar6
This paper presents a system for live location tracking of women in emergencies, even when their mobile devices are turned off or not available.
Ms. M. Gayathri1, B. Chandra Sekhar2, B. Gowtham Reddy3, A. Gopi4, D. V. Subba Reddy5, A Santhosh Kumar6
This paper presents a system for live location tracking of women in emergencies, even when their mobile devices are turned off or not available.
IMPLEMENTATION OF KEYLESS IGNITION SYSTEM
[View]
Dr.S. Suryanarayana1, M. Yamini2, M. Kishore Babu3, R. Sevithram4, J. Rekha5, K. Sunil Kumar6
- The implementation of keyless ignition systems has become increasingly popular in modern automobiles.
Dr.S. Suryanarayana1, M. Yamini2, M. Kishore Babu3, R. Sevithram4, J. Rekha5, K. Sunil Kumar6
- The implementation of keyless ignition systems has become increasingly popular in modern automobiles.
SIMULATION OF SIMPLE CNN MNIST DIGIT CLASSIFIER USING VIVADO
[View]
1. P. KEERTHI, 2.M. CHARMILA, 3. K. V.S.S. AJAY, 4.P.TAYABKHAN, 5.K. SUJATHA
A convolutional neural network (CNN or ConvNet) is a network architecture for deep learning that learns directly from data.
1. P. KEERTHI, 2.M. CHARMILA, 3. K. V.S.S. AJAY, 4.P.TAYABKHAN, 5.K. SUJATHA
A convolutional neural network (CNN or ConvNet) is a network architecture for deep learning that learns directly from data.
IMPLIMENTATION OF INTRUDER DETECTION SYSTEM BY USING RASPBERRY PI
[View]
1. R. SHALINI, 2. K. ANUSHA, 3. M. DEEPAK, 4. K. CHANDRA NAGA SAI, 5. K .DHANESHWA
In surveillance, CCTV camera is costly because of the use of computer.
1. R. SHALINI, 2. K. ANUSHA, 3. M. DEEPAK, 4. K. CHANDRA NAGA SAI, 5. K .DHANESHWA
In surveillance, CCTV camera is costly because of the use of computer.
AUDIO COMPRESSIOM USING WAVELETS IN MATLAB
[View]
1. K.Sasi, 2.K.Manna, 3.K.Yognath Reddy, 4.N.Kedharnadh
Speech compression is the technique of converting human speech into an efficiently encoded format that can later be decoded to produce a close approximation of the original signal.
1. K.Sasi, 2.K.Manna, 3.K.Yognath Reddy, 4.N.Kedharnadh
Speech compression is the technique of converting human speech into an efficiently encoded format that can later be decoded to produce a close approximation of the original signal.
AN EFFICIENT RESOURCE ALLOCATIONSTRATEGY FOR FUTURE WIRELESS CELLULAR SYSTEM
[View]
1K. RAMYA, 2. M. SAI KRISHNA, 3. K. NEELIMA, 4. K. VIJAY KRISHNA
In mobile communications an efficient utilization of the channels is of great importance
1K. RAMYA, 2. M. SAI KRISHNA, 3. K. NEELIMA, 4. K. VIJAY KRISHNA
In mobile communications an efficient utilization of the channels is of great importance
Content Based Image Retrieval Using Discrete Wavelet Transform And Edge Histogram Descriptor
[View]
Dr.Brahmaiah naik1, K.Kavya2, M.Kavitha3, K.Rajasekhar reddy4. N.Karthikteja5 ,M.Hitheesh6
This project describes an efficient algorithm for Content Based Image Retrieval (CBIR) based on Discrete Wavelet Transform (DWT).
Dr.Brahmaiah naik1, K.Kavya2, M.Kavitha3, K.Rajasekhar reddy4. N.Karthikteja5 ,M.Hitheesh6
This project describes an efficient algorithm for Content Based Image Retrieval (CBIR) based on Discrete Wavelet Transform (DWT).
BRAIN TUMOR DETECTION AND CLASSIFICATION
[View]
P.Vikram1, K.V.D.sivani2, K,Sai kiran Reddy3, M.Brahma Reddy4, K.Om sai5
The brain is the most important organ in the human body responsible for controlling and regulating all critical life functions for the body and a tumor is a mass of tissue formed
P.Vikram1, K.V.D.sivani2, K,Sai kiran Reddy3, M.Brahma Reddy4, K.Om sai5
The brain is the most important organ in the human body responsible for controlling and regulating all critical life functions for the body and a tumor is a mass of tissue formed
ACCIDENT PREVENTION SYSTEMBY USING BUMPER PULLING MECHANISM AND EYE BLINK SENSOR VIA EMBEDDED SYSTEM
[View]
Dr.K.Rajkamal1, SD.Karishma2,P.Revanth3,S.V.Gopireddy4, SK.Afrid5,N.Harikrishna6
Road accidents continue to be a major concern in today's world, and it is essential to develop effective accident preventionsystems.
Dr.K.Rajkamal1, SD.Karishma2,P.Revanth3,S.V.Gopireddy4, SK.Afrid5,N.Harikrishna6
Road accidents continue to be a major concern in today's world, and it is essential to develop effective accident preventionsystems.
Hanging Prevention TechniquesUsing Microcontroller
[View]
Mrs.D.Meena1, T.Koteswararao2, T.Ramakoteswararao3, SK.Johnsaida4, S.Lakshmidhar5,SD.Mahaboob Basha6
Hanging Prevention Techniques using microcontroller is a project aimed at preventing hanging deaths
Mrs.D.Meena1, T.Koteswararao2, T.Ramakoteswararao3, SK.Johnsaida4, S.Lakshmidhar5,SD.Mahaboob Basha6
Hanging Prevention Techniques using microcontroller is a project aimed at preventing hanging deaths
LIVESTOCK & WILDLIFE ANIMAL DETECTIONWITH MACHINE LEARNING
[View]
Mr. B.Ramachandraiah1, Ch.O.V.Vysali2, T.Poshya Nagasri3, S.Vignesh4, Sk.Abdullah5 , Y.Srinivas6
Nowadays, Wildlife monitoring in a particular area using raspberry pi is the application of science and technology
Mr. B.Ramachandraiah1, Ch.O.V.Vysali2, T.Poshya Nagasri3, S.Vignesh4, Sk.Abdullah5 , Y.Srinivas6
Nowadays, Wildlife monitoring in a particular area using raspberry pi is the application of science and technology
Child Rescue System Against Open Borewells
[View]
Mrs.V.Santhi Sri Ph.D(M.Tech), M.Sravanthi a, T.Sivanarayanachari b, V.SaiAparna c, S.AshokRaju d, R.Sandeep e
In this project aim to prevent incidents of infants falling into open bore wells.
Mrs.V.Santhi Sri Ph.D(M.Tech), M.Sravanthi a, T.Sivanarayanachari b, V.SaiAparna c, S.AshokRaju d, R.Sandeep e
In this project aim to prevent incidents of infants falling into open bore wells.
EFFICIENT WASTE MANAGEMENT USING AUTOMATED SORTING BASED ON COLOUR AND THICKNESS
[View]
1 G. Rama Krishna, 2 M. Sai Sasi Priya, 3 M. Venkata Manoj, 4 P. Lakshmi Sivani, 5 N. Janardhana Rao
A crucial prerequisite for recycling forming an integral part of municipal solid waste (MSW) management is sorting of useful materials from source-separated MSW
1 G. Rama Krishna, 2 M. Sai Sasi Priya, 3 M. Venkata Manoj, 4 P. Lakshmi Sivani, 5 N. Janardhana Rao
A crucial prerequisite for recycling forming an integral part of municipal solid waste (MSW) management is sorting of useful materials from source-separated MSW
IMPLEMENTATION OF SPEECH ENHANCEMENT USING WIENER FILTER
[View]
Dr. J Brahmaiah naik1, B. Sirisha2, G. Devi Vinay3, Ch. Avinash4, G. Sailaja5, D. Venu6
Speech enhancement techniques aim to improve the quality of speech signals that have been degraded by noise or other forms of interference.
Dr. J Brahmaiah naik1, B. Sirisha2, G. Devi Vinay3, Ch. Avinash4, G. Sailaja5, D. Venu6
Speech enhancement techniques aim to improve the quality of speech signals that have been degraded by noise or other forms of interference.
Kidney Stone Detection Using Image Processing
[View]
MR.K.Mohan krishna1, Ch.Prathyusha2, A.Greeshma3, A.Shahid baba4. Ch.Samba siva rao5
Kidney stones are hard collection of salt and minerals often made up of calcium and uric acid.
MR.K.Mohan krishna1, Ch.Prathyusha2, A.Greeshma3, A.Shahid baba4. Ch.Samba siva rao5
Kidney stones are hard collection of salt and minerals often made up of calcium and uric acid.
IMPLEMENTATION OF TEXT AND IMAGE STEGANOGRAPHY USING AES
[View]
Y.Murali krishna1, G.Mounika2, CH.Sirisha3, G.Ravindhra4, G.Yogendhra5
One of the major problems faced by tworld today is Data Security
Y.Murali krishna1, G.Mounika2, CH.Sirisha3, G.Ravindhra4, G.Yogendhra5
One of the major problems faced by tworld today is Data Security
JCS AN EXPLAINABLE COVID-19 DIAGNOSIS SYSTEM BY JOINT CLASSIFICATION AND SEGMENTATION
[View]
*BH.V.V S.R.K.K.PAVAN, 1AKULA ESWAR SURYA VENKATESH, 2N. G.S V MAHESWARI, 3M.SARASWATHI DEVI, 4S. PUSHPA LATHA
The novel corona virus disease 2019 (COVID-19) has been a severe health issue affecting the respiratory system and spreads very fast from one human to other overall countries.
*BH.V.V S.R.K.K.PAVAN, 1AKULA ESWAR SURYA VENKATESH, 2N. G.S V MAHESWARI, 3M.SARASWATHI DEVI, 4S. PUSHPA LATHA
The novel corona virus disease 2019 (COVID-19) has been a severe health issue affecting the respiratory system and spreads very fast from one human to other overall countries.
UNDERWATER IMAGE ENHANCEMENT USING ADAPTIVE RETINAL MECHANISM
[View]
*BH.V.V S.R.K.K.PAVAN, 1G. PAVAN VISWA SAI, 2K. CHANDHINI SRI POORNIMA, 3B. MANJU RAMANIKA, 4A. VEERA DURGA
Since the light is absorbed and scattered while traveling in water, color distortion, underexposure and fuzz are three major problems of underwater imaging.
*BH.V.V S.R.K.K.PAVAN, 1G. PAVAN VISWA SAI, 2K. CHANDHINI SRI POORNIMA, 3B. MANJU RAMANIKA, 4A. VEERA DURGA
Since the light is absorbed and scattered while traveling in water, color distortion, underexposure and fuzz are three major problems of underwater imaging.
APC AND OMS BASED LUT DESIGN FOR HIGH THROUGHPUT CONSTANT MULTIPLIER
[View]
1 GORIPARTHI VIJAYA VANI DHANALAKSHMI KUMARI, 2 N .BALA KRISHNA CHAITANYA
This concept presents a way to use the Look-up tables to design three bit (3×3) constant coefficient unsigned integral multiplier for Short Word Length DSP systems.
1 GORIPARTHI VIJAYA VANI DHANALAKSHMI KUMARI, 2 N .BALA KRISHNA CHAITANYA
This concept presents a way to use the Look-up tables to design three bit (3×3) constant coefficient unsigned integral multiplier for Short Word Length DSP systems.
Pages [1]

This work is licensed under a Creative Commons Attribution 3.0 License.
© 2011 - 2022 International Journal of Engineering In Advanced Research Science and Technology
Managed By Indian Association for Reliability and Statistics
International Journal of Engineering In Advanced Research Science and Technology ISSN : 23456-2378 (Online)
All rights reserved withinfo.ijearst.co.in.
To make sure that you can receive messages from us, please add the 'ijearst.co.in' domain to your e-mail 'safe list'. If you do not receive e-mail in your 'inbox', check your 'bulk mail' or 'junk mail' folders.
For any Technical Support contact @info.ijearst.co.in