Search For:

Displaying 1-32 out of 32 total
A Fault Tolerance Aware Synthesis Methodology for Threshold Logic Gate Networks
Found in: Defect and Fault-Tolerance in VLSI Systems, IEEE International Symposium on
By Manoj Kumar Goparaju, Ashok Kumar Palaniswamy, Spyros Tragoudas
Issue Date:October 2008
pp. 176-183
Threshold Logic technology is conceived as the crucial alternate emerging technology to CMOS implementation in nanoelectronic era. The gate that is implemented with threshold logic is called a Threshold Logic Gate (TLG). Threshold gates are very fast and i...
 
Localization Schemes in Wireless Sensor Networks
Found in: Advanced Computing & Communication Technologies, International Conference on
By Anita Panwar,Sh. Ashok Kumar
Issue Date:January 2012
pp. 443-449
In wireless sensor networks, nodes are deployed in sensor field for various monitoring applications such as tracking, rescue operations, disaster relief, traffic monitoring, etc. So node localization is one of the fundamental challenges in the wireless sen...
 
Delay Testable Enhanced Scan Flip-Flop: DFT for High Fault Coverage
Found in: Electronic System Design, International Symposium on
By Ashok Kumar Suhag,Vivek Shrivastava
Issue Date:December 2011
pp. 129-133
The Scan based testing is used for delay testing in sequential circuits and in general it is implemented by using launch-on-capture (LoC) delay tests. Launch-on-shift (LoS) delay tests are usually more efficient to obtain high fault coverage with appreciab...
 
The HP PA-8000 RISC CPU
Found in: IEEE Micro
By Ashok Kumar
Issue Date:March 1997
pp. 27-32
The PA-8000 RISC CPU is the first implementation of a new generation of microprocessors from Hewlett-Packard Company. The processor was designed for high-end systems and to support the new 64-bit PA-RISC 2.0 architecture. The aggressive four-way superscala...
 
A Key Renewal Model for Wireless Sensor Network Under Node Capture Attack
Found in: Emerging Trends in Engineering & Technology, International Conference on
By Alekha Kumar Mishra,Ashok Kumar Turuk
Issue Date:November 2011
pp. 301-305
Node capture attack is one of the most dreadful security attack exist in wireless sensor networks. An adversary steals mostly all key informations from a captured node. Therefore, the impact of node capture attack can be lessened by renew the keys through ...
 
SPC: The Selective Prioritized Clustering Algorithm for MANETs
Found in: Electronic System Design, International Symposium on
By T. Vijeesh, Niranjan Kumar Ray, Ashok Kumar Turuk
Issue Date:December 2010
pp. 66-70
Energy conservation is the major issue of concern for MANETs [1], [2] as terminals are battery operated. We propose an algorithm called selective prioritized clustering (SPC), to reduce power consumption at network level. It uses topology control and hiera...
 
Modified MAC for Priority Traffic with Slow Decrease of Contention Window and Reservation Based Packet Forwarding in IEEE 802.11 for QoS Provisioning
Found in: Information Technology, International Conference on
By Dillip Kumar Puthal, Bibhudatta Sahoo, Ashok Kumar Turuk, Mrinal Nandi
Issue Date:December 2008
pp. 195-196
IEEE 802.11 lacks of the capability to support Quality of Services such as multimedia and real-time traffic properly. This paper presents a simple approach to enhance the multimedia real-time performance over the 802.11 WLAN by implementing a Quality of Se...
 
Parts of Speech Disambiguation in Telugu
Found in: Computational Intelligence and Multimedia Applications, International Conference on
By S. Suresh Kumar, S. Ashok Kumar
Issue Date:December 2007
pp. 125-128
Parts of speech tagging forms the important pre-processing step in many of the natural language processing applications like text summarization, question answering and information retrieval system. Parts of speech tagging has a significant role in parsing ...
 
A Biometric-Based User Authentication Scheme for Heterogeneous Wireless Sensor Networks
Found in: 2013 Workshops of International Conference on Advanced Information Networking and Applications (WAINA)
By Ashok Kumar Das,Bezawada Bruhadeshwar
Issue Date:March 2013
pp. 291-296
In this paper, we propose a new biometric-based user authentication mechanism in heterogeneous wireless sensor networks. The proposed protocol provides strong authentication compared to traditional related password-based schemes and achieves good propertie...
 
4-4, 1-4: Architecture for Data Center Network Based on IP Address Hierarchy for Efficient Routing
Found in: 2012 11th International Symposium on Parallel and Distributed Computing (ISPDC)
By A. R. Ashok Kumar,S. V. Rao,Diganta Goswami
Issue Date:June 2012
pp. 235-242
Architecture plays an important role in the design of Data Center Networks (DCN). Designs for DCN are to be scalable, robust and efficient. There are many designs proposed in recent years where routing is performed using location information of the server....
 
Simulation and Testing of Photovoltaic with Grid Connected System
Found in: Computational Intelligence and Communication Networks, International Conference on
By K.K. Prajapat,Abhishek Katariya,Ashok Kumar,Shuchi Shukla
Issue Date:October 2011
pp. 692-697
In the recent years the power demand is increasing regularly and it can be fulfilled by the use of conventional or non-conventional energy power plants. So, renewable energy sources like photovoltaic (PV) panels are used today in many applications. With th...
 
Reduction in Cells of Quantum-Dot Cellular Automata in Perspective of NOT Gate
Found in: Computational Intelligence and Communication Networks, International Conference on
By Abhineet Singh Tomar, Ashok Kumar Garg, Geetam S. Tomar
Issue Date:November 2010
pp. 568-571
Quantum-dot cellular automata is the new hope in reducing size and power consumption of switching devices used for high density circuits of present era. This paper presents reduction of cells used for NOT gate of this technology existing presently. The cir...
 
A Secure Proxy Blind Signature Scheme Based on DLP
Found in: Multimedia Information Networking and Security, International Conference on
By Binayak Kar, Pritam Prava Sahoo, Ashok Kumar Das
Issue Date:November 2010
pp. 477-480
In this paper, we aim to improve the recently proposed Yang et al.'s proxy blind signature scheme in order to withstand the security flaw in their scheme. The security of the improved scheme is enhanced in the signing phase and based on difficulty of solvi...
 
Wireless Transmission of EMG Signal and Analysis of Its Correlation with Simultaneously Acquired Carotid Pulse Wave Using Dual Channel System
Found in: eHealth, Telemedicine, and Social Medicine, International Conference on
By Dipali Bansal, Munna Khan, Ashok Kumar Salhan
Issue Date:February 2010
pp. 125-129
The paper represents work on the challenge of real time, non-invasive simultaneous acquisition and wireless transmission of human physiological parameters using easy and cost effective approach. Electromyograph (EMG) signal detection and analysis is utiliz...
 
Maximizing the Availability and Reliability of Videos in VoD System Using Markov Chain
Found in: International Conference on Communication Theory, Reliability, and Quality of Service
By R. Ashok Kumar, K. Hareesh, K. Ganesan, D.H. Manjaiah
Issue Date:July 2009
pp. 15-19
In a Video on Demand system, by forwarding the server video stream client by client, a chain based scheme is formed, which reduces the server load. The existing chaining schemes are not reliable because there are frequent breaks in the chain among the clie...
 
A Comparison of Bayesian Filter Based Approaches for Patient Localization during Emergency Response to Crisis
Found in: Sensor Technologies and Applications, International Conference on
By Ashok-Kumar Chandra-Sekaran, Pascal Weisser, Klaus D. Müller-Glaser, Christophe Kunze
Issue Date:June 2009
pp. 636-642
In order to overcome the logistical impediments caused during mass casualty disasters, we had proposed a new emergency response system based on a location aware wireless sensor network in our previous work. In this paper, we have implemented two new Bayesi...
 
A Range-Based Monte Carlo Patient Localization during Emergency Response to Crisis
Found in: Advanced International Conference on Telecommunications
By Ashok-Kumar Chandra-Sekaran, Gunnar Stefansson, Christophe Kunze, Klaus D. Müller-Glaser, Pascal Weisser
Issue Date:May 2009
pp. 21-26
During emergency response to mass casualty disasters, one of the main logistic impediments faced by the On-site Organizational Chief (OOC) is to track the patients at the disaster site. We had proposed our previous work a new system based on a location awa...
 
Empirical Analysis and Ranging Using Environment and Mobility Adaptive RSSI Filter for Patient Localization during Disaster Management
Found in: Networking and Services, International conference on
By Ashok-Kumar Chandra-Sekaran, Prabu Dheenathayalan, Pascal Weisser, Christophe Kunze, Wilhelm Stork
Issue Date:April 2009
pp. 276-281
During emergency response to mass casualty disasters, one of the main logistic impediments faced by the On-site Organization Chief is to track the patients at the disaster site. We had proposed a new system based on a location aware wireless sensor network...
 
Design of a Controller for a Drag Race Detection System
Found in: Computer Science and Information Engineering, World Congress on
By Blake Lemoine, Ashok Kumar, Kevin Suir, Dania Alvarez
Issue Date:April 2009
pp. 76-80
Illegal drag racing or street racing is a prominent safety concern in many major cities. This is especially the case in areas which have sections of road which are straight, level, and have low traffic at various times of day or night. This paper proposes ...
 
A data fusion scheme for tenet architecture
Found in: Application-Specific Systems, Architectures and Processors, IEEE International Conference on
By Ruth Aguilar-Ponce, J. Luis Tecpanecatl-Xihuitl, Ashok Kumar, Magdy Bayoumi
Issue Date:July 2007
pp. 179-183
Tenet architecture is a two-tier sensor network architecture that provides a model to implement more complex algorithms due to incorporation of less resource-restricted nodes. Stargate-class nodes called masters form the upper tier while resource-restricte...
 
Algorithms for energy-efficient query-reduction in wireless sensor networks
Found in: Application-Specific Systems, Architectures and Processors, IEEE International Conference on
By Mitun Bhattacharyya, Ashok Kumar, Magdy Bayoumi
Issue Date:July 2007
pp. 87-92
A wide area sensor system is a complex, dynamic, resource constrained collection of sensing devices. Typically, queries are sent out by master node(s) and query-satisfying data are aggregated at optimized points in a sensor network and sent back to master ...
 
Multisensor data fusion schemes for wireless sensor networks
Found in: Application-Specific Systems, Architectures and Processors, IEEE International Conference on
By Ruth Aguilar-Ponce, Jason McNeely, Abu Baker, Ashok Kumar, Magdy Bayoumi
Issue Date:July 2007
pp. 136-141
Data fusion systems is an active research field with applications in several fields such as manufacturing, surveillance, air traffic control, robotics and remote sensing. The wide interest in wireless sensor networks has fueled the interest in data fusion ...
 
Algorithms and Design for an Autonomous Biological System
Found in: Autonomic and Autonomous Systems, International Conference on
By Swapnoneel Roy, Ashok Kumar Thakur, Anupama Pande, Minhazur Rahman
Issue Date:June 2007
pp. 35
Various global rearrangements of permutations, such as reversals and transpositions, have recently become of interest because of their applications in computational molecular biology, to be more specific, genome rearrangement. Many primitives have been for...
 
Distributed IDS using Reconfigurable Hardware
Found in: Parallel and Distributed Processing Symposium, International
By Ashok Kumar Tummala, Parimal Patel
Issue Date:March 2007
pp. 426
With the rapid growth of computer networks and network infrastructures and increased dependency on the internet to carry out day-to-day activities, it is imperative that the components of the system are secured. In the last few years a number of Intrusion ...
 
New Results for Learning Noisy Parities and Halfspaces
Found in: Foundations of Computer Science, Annual IEEE Symposium on
By Vitaly Feldman, Parikshit Gopalan, Subhash Khot, Ashok Kumar Ponnuswami
Issue Date:October 2006
pp. 563-574
We address well-studied problems concerning the learnability of parities and halfspaces in the presence of classification noise. <p>Learning of parities under the uniform distribution with random classification noise, also called the noisy parity pro...
 
An Architecture for Automated Scene Understanding
Found in: Computer Architectures for Machine Perception, International Workshop on
By Ruth Aguilar-Ponce, Ashok Kumar, J. Luis Tecpanecatl-Xihuitl, Magdy Bayoumi
Issue Date:July 2005
pp. 19-24
This paper presents distributed, automated, scene surveillance architecture. Object detection and tracking is performed by a set of Region and Object Agent. The Area under surveillance is divided in several sub-areas. One camera is assigned to each sub-are...
 
Novel Formulations for Low-Power Binding of Function Units in High-Level Synthesis
Found in: Computer Design, International Conference on
By Ashok Kumar, Magdy Bayoumi
Issue Date:October 1999
pp. 321
This paper considers minimizing the switching of the function units through new binding formulations. Switching activities on the function units are gathered through profiling the data-flow graph of the design at hand. Several thousands of random input str...
 
Optimal Designing Approach to Recursive Coding in VLSI Design
Found in: 2012 International Conference on Advances in Mobile Network, Communication and its Applications (MNCAPPS)
By C. Ashok Kumar,B.K. Madhavi,K. Lal Kishore
Issue Date:August 2012
pp. 29-33
The focus of this paper is towards developing an application specific design methodology for low power solutions in recursive coding system. The methodology starts from high level models which can be used for software solution and proceeds towards high per...
 
Design of Low Power High Speed ALU Using Feedback Switch Logic
Found in: Advances in Recent Technologies in Communication and Computing, International Conference on
By Patanjali Prakash, Ashok Kumar Saxena
Issue Date:October 2009
pp. 899-902
Low power and high speed requirement is a challenging task in design of ALUs. Supply voltage scaling is promising approach because it reduces switching activities and active power but it degrades the performance and robustness. Recently a new like static c...
 
An efficient heuristic to identify threshold logic functions
Found in: ACM Journal on Emerging Technologies in Computing Systems (JETC)
By Ashok Kumar Palaniswamy, Spyros Tragoudas
Issue Date:August 2012
pp. 1-17
A fast method to identify the given Boolean function as a threshold function with weight assignment is introduced. It characterizes the function based on the parameters that have been defined in the literature. The proposed method is capable to quickly cha...
     
Model characterization curves for federated search using click-logs: predicting user engagement metrics for the span of feasible operating points
Found in: Proceedings of the 20th international conference on World wide web (WWW '11)
By Ashok Kumar Ponnuswami, Desmond Brand, Kumaresh Pattabiraman, Tapas Kanungo
Issue Date:March 2011
pp. 67-76
Modern day federated search engines aggregate heterogeneous types of results from multiple vertical search engines and compose a single search engine result page (SERP). The search engine aggregates the results and produces one ranked list, constraining th...
     
Using generics modules to enhance the CS2 course
Found in: Proceedings of the twentieth SIGCSE technical symposium on Computer science education (SIGCSE '89)
By Ashok Kumar, John Beidler
Issue Date:February 1989
pp. 313-317
We normally expect features in a programming language to support the concepts and methodologies in the course. This article describes another role for features within a programming language, support of sound educational methodology. Specifically, this pape...
     
 1