IJEARST Volume 03, Issue 02, April 2023 Edition


Pages [1]


DESIGN AND EVALUATION OF A LOW-VOLTAGE PROCESS VARIATION-TOLERANT SRAM []


present three iterations of SRAM bit cells with nMOS-only based read ports aimed to greatly reduce data dependent read port leakage to enable 1k cells/RBL, improve read performance, and reduce area and power over conventional and 10T cell-based works.


EFFICIENT AND IMPROVED SECURITY FOR NON-VOLATILE MAIN MEMORY USING DSSC []


:The use of hardware encryption and new memory technologies such as phase change memory (PCM) are gaining popularity in a variety of server applications such as cloud systems


LOW DENSITY SCALABLE BINARY COUNTER USING EFFICIENT SORTING NETWORK []


Parallel counters are enter components in numerous number juggling circuits, particularly quick multipliers


POWER AND DENSITY OPTIMIZED SYMMETRIC PASS GATE USING GDI []


Internet of Things (IoT) devices have strict energy constraints as they often operate on a battery supply. The cryptographic operations within IoT devices consume substantial energy and are vulnerable to a class of hardware attacks known as side-channel attacks


AREA EFFICIENT IMPROVED BINARY COUNTER USING SCALABLE SORTING NETWORK []


Many number juggling circuits use parallel counters as entry components,and rapid multipliers are a good example of this.


Enhanced and Reliable Malware Detection Technique for Internet of (Battlefield) Things Devices Using Deep Eigen space Learning []


Internet of Things (IoT) in military settings generally consists of a diverse range of Idnternet-connected devices and nodes (e.g., medical devices and wearable combat uniforms).


IOT BASED SECURITY SYSTEM USING ULTRASONIC SENSOR []


Internet of Things (IoT) consists of smart devices to solve real-world challenges and issues.


Digital Watermarking using Discrete Wavelet Transform []


Now days due to advancement of technology it is difficult to protect creative content and intellectual property


WOMEN’S SECURITY SYSTEM USING ARDUINO []


This paper presents a system for live location tracking of women in emergencies, even when their mobile devices are turned off or not available.


IMPLEMENTATION OF KEYLESS IGNITION SYSTEM []


- The implementation of keyless ignition systems has become increasingly popular in modern automobiles.


SIMULATION OF SIMPLE CNN MNIST DIGIT CLASSIFIER USING VIVADO []


A convolutional neural network (CNN or ConvNet) is a network architecture for deep learning that learns directly from data.


IMPLIMENTATION OF INTRUDER DETECTION SYSTEM BY USING RASPBERRY PI []


In surveillance, CCTV camera is costly because of the use of computer.


AUDIO COMPRESSIOM USING WAVELETS IN MATLAB []


Speech compression is the technique of converting human speech into an efficiently encoded format that can later be decoded to produce a close approximation of the original signal.


AN EFFICIENT RESOURCE ALLOCATIONSTRATEGY FOR FUTURE WIRELESS CELLULAR SYSTEM []


In mobile communications an efficient utilization of the channels is of great importance


Content Based Image Retrieval Using Discrete Wavelet Transform And Edge Histogram Descriptor []


This project describes an efficient algorithm for Content Based Image Retrieval (CBIR) based on Discrete Wavelet Transform (DWT).


BRAIN TUMOR DETECTION AND CLASSIFICATION []


The brain is the most important organ in the human body responsible for controlling and regulating all critical life functions for the body and a tumor is a mass of tissue formed


ACCIDENT PREVENTION SYSTEMBY USING BUMPER PULLING MECHANISM AND EYE BLINK SENSOR VIA EMBEDDED SYSTEM []


Road accidents continue to be a major concern in today's world, and it is essential to develop effective accident preventionsystems.


Hanging Prevention TechniquesUsing Microcontroller []


Hanging Prevention Techniques using microcontroller is a project aimed at preventing hanging deaths


LIVESTOCK & WILDLIFE ANIMAL DETECTIONWITH MACHINE LEARNING []


Nowadays, Wildlife monitoring in a particular area using raspberry pi is the application of science and technology


Child Rescue System Against Open Borewells []


In this project aim to prevent incidents of infants falling into open bore wells.


EFFICIENT WASTE MANAGEMENT USING AUTOMATED SORTING BASED ON COLOUR AND THICKNESS []


A crucial prerequisite for recycling forming an integral part of municipal solid waste (MSW) management is sorting of useful materials from source-separated MSW


IMPLEMENTATION OF SPEECH ENHANCEMENT USING WIENER FILTER []


Speech enhancement techniques aim to improve the quality of speech signals that have been degraded by noise or other forms of interference.


Kidney Stone Detection Using Image Processing []


Kidney stones are hard collection of salt and minerals often made up of calcium and uric acid.


IMPLEMENTATION OF TEXT AND IMAGE STEGANOGRAPHY USING AES []


One of the major problems faced by tworld today is Data Security


JCS AN EXPLAINABLE COVID-19 DIAGNOSIS SYSTEM BY JOINT CLASSIFICATION AND SEGMENTATION []


The novel corona virus disease 2019 (COVID-19) has been a severe health issue affecting the respiratory system and spreads very fast from one human to other overall countries.


UNDERWATER IMAGE ENHANCEMENT USING ADAPTIVE RETINAL MECHANISM []


Since the light is absorbed and scattered while traveling in water, color distortion, underexposure and fuzz are three major problems of underwater imaging.


APC AND OMS BASED LUT DESIGN FOR HIGH THROUGHPUT CONSTANT MULTIPLIER []


This concept presents a way to use the Look-up tables to design three bit (3×3) constant coefficient unsigned integral multiplier for Short Word Length DSP systems.



Pages [1]

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.

© 2011 - 2022 International Journal of Engineering In Advanced Research Science and Technology
Managed By Indian Association for Reliability and Statistics

International Journal of Engineering In Advanced Research Science and Technology ISSN : 23456-2378 (Online)
All rights reserved withinfo.ijearst.co.in.

To make sure that you can receive messages from us, please add the 'ijearst.co.in' domain to your e-mail 'safe list'. If you do not receive e-mail in your 'inbox', check your 'bulk mail' or 'junk mail' folders.

For any Technical Support contact @info.ijearst.co.in