Energy Efficient Architecture

Top PDF Energy Efficient Architecture:

VLSI Implementation of a Parallel Turbo-Decoder for Wireless Communication

VLSI Implementation of a Parallel Turbo-Decoder for Wireless Communication

ABSTRACT: Wireless sensor network can be considered to be energy constrained wireless scenarios, since the sensors are operated for extended periods of time, while relying on batteries that are small, lightweight and sine expensive. Energy constrained wireless communication application is done with the help of lookup table-log- BCJR (LUT-Log-BCJR) architecture.. In our existing system the conventional LUT-Log-BCJR architecture have wasteful designs requiring high chip areas and hence high energy consumptions Energy constrained applications. This motivated our proposed System the LUT log BCJR is designed with Clock gating technique achieves low-complexity energy-efficient architecture, which achieves a low area and hence a low energy consumption, and also achieving a low energy consumption has a higher priority than having a high throughput. we use most fundamental add compare select (ACS) operations and It having low processing steps, so that low transmission energy consumption is required and also reduces the overallenergy consumption. Our demonstrated implementation has a throughput of 1.03 Mb/s.
Show more

5 Read more

Dynamic Link Adaptation and Routing Protocols in Wireless Sensor Networks based on Energy Harvesting of MAC Protocols

Dynamic Link Adaptation and Routing Protocols in Wireless Sensor Networks based on Energy Harvesting of MAC Protocols

In WSNs for better energy management, the concept of energy harvesting technologies used for MAC protocols. The recent method introduced in [1], in which the focus was on system level design of WSN those are operating with using EH devices for the efficient design of MAC protocols in WSNs. In this architecture, fusion center (FC) is collecting the data from the sensor nodes in its proximity. The performance of this approach is investigated with different MAC protocols those are influenced by discontinuous availability of energy in EH devices [1]. However this method was not tested by using the routing protocols considerations which are playing the vital role for energy utilization in WSNs. Therefore in this paper we are presenting the extension to this work by using the recent energy efficient routing protocol i.e. LEACH and HEED protocols along with dynamic link adaptation method with above stated energy efficient architecture design using EH devices to delivers the best energy efficiency for WSNs. In next section 2 we are presenting the literature survey over the various methods for energy efficiency in WSNs. In section 3, the proposed approach and its system block diagram is depicted. In section 4 we are presenting the implementation details and results achieved. In section 5, the results are discussed. Finally conclusion and future work is predicted in section 6.
Show more

7 Read more

Design and Implementation of a Parallel Turbo Decoder for Wireless Communication

Design and Implementation of a Parallel Turbo Decoder for Wireless Communication

ABSTRACT: Wireless sensor network can be considered to be energy constrained wireless scenarios, since the sensors are operated for extended periods of time, while relying on batteries that are small, lightweight and inexpensive. Energy constrained wireless communication application is done with the help of lookup table-log- BCJR (LUT-Log-BCJR) architecture. In our existing system the conventional LUT-Log-BCJR architecture have wasteful designs requiring high chip areas and hence high energy consumptions Energy constrained applications. This motivated our proposed System the LUT log BCJR is designed with Clock gating technique achieves low-complexity energy-efficient architecture, which achieves a low area and hence a low energy consumption, and also achieving a low energy consumption has a higher priority than having a high throughput. we use most fundamental add compare select (ACS) operations and It having low processing steps, so that low transmission energy consumption is required and also reduces the overall energy consumption. Our demonstrated that our implementation has a throughput of 1.03 Mb/s.
Show more

7 Read more

Research of High Speed and Energy Efficient Visual Cryptography Techniques

Research of High Speed and Energy Efficient Visual Cryptography Techniques

Usman et al [20] introduced the lightweight, robust and efficient scheme (LWRES) for the encryption purpose to perform the data exchange between the cloud and mobile devices. This is done by performing the data hiding process which would encode the High efficiency video coding on the video streams. And also this method ensures the security level by introducing the advanced encryption standard by using which encryption of image shared will be done. The evaluation of this method ensures the better performance with reduced processing time and the increased data size. Hamza [21]performed image cryptography by introducing the novel algorithm which is based on pseudo random number sequence generator (PRSGA). This method would create the cryptographic keys for the different digital images by using cryptographic applications. This is done by introducing the non uniform probability distribution procedure based on which multiple cryptographic keys are generated. This method ensures the increased security level with guaranteed robustness, better speed and improved effectiveness. This method can protect against the multiple differential attacks by successfully introducing the security scheme.
Show more

8 Read more

I An Integrated Survey in Efficient Energy Management for WSN using Architecture approach

I An Integrated Survey in Efficient Energy Management for WSN using Architecture approach

W ireless sensor networks provide an unexampled opportunity to gather huge volumes of data about the physical world around us. WSN, however, have severe resource constraints, in terms of power, memory, and bandwidth, which make gathering and processing the data an extremely challenging problem. WSN are used in several areas including: military, medical, environmental and household. But in all these fields, energy, data lost, delays have determining role in the performance of wireless sensor networks [3].Since energy consumption during communication is major energy depletion parameters, the number of transmissions must be reduced as much as possible to achieve extended battery life [1, 2].In this paper we will try to offer a optimum architecture with considering all these assumptions. For having a network with a high performance we have to do deep Glimpse in WSN architecture.
Show more

10 Read more

HIGH SPEED AND LOWER HARDWARE COMPLEXITY VLSI ARCHITECTURE FOR LIFTING BASED DISCRETE WAVELET TRANSFORM

HIGH SPEED AND LOWER HARDWARE COMPLEXITY VLSI ARCHITECTURE FOR LIFTING BASED DISCRETE WAVELET TRANSFORM

IV. MINIMIZING HARDWARE ARCHITECTURES-PARALLEL AND DIRECT MAPPED ARCHITECTURES A direct mapping of the data dependency diagram into a pipelined architecture was proposed by Liu et al. in [23, 9] .For lifting schemes that require only 2 lifting steps, such as the (5,3) filter consists of two pipeline stages whereas for (9,7) it requires four pipeline stages reducing the hardware utilization to be only 50% or less. The architecture can be sequentially pipelined by combining the previous output of predict stage to current output.

7 Read more

Development of an MQTT-based IoT Architecture for Energy-Efficient and Low-Cost Applications

Development of an MQTT-based IoT Architecture for Energy-Efficient and Low-Cost Applications

Abstract High power consumption of Internet of Things (IoT) nodes and the cost of implementing existing IoT architectures usually hamper the successful deployment of IoT solutions. Also, at locations with problematic or weak Internet presence where it takes longer time to transmit node data to the Internet, the resulting increase in power consumption hinders the development and deployment of IoT solutions. This paper therefore presents an IoT architecture that enables the development of low cost and energy efficient IoT solutions across various application domains even at the face of weak Internet signal. Existing IoT hardware platforms were first compared on the basis of on-board connectivity and microcontroller types and cost in order to select an appropriate hardware platform for the architecture. In addition, a suitable application layer protocol for end-to-end wireless communications was selected. These led to the respective selection and adaptation of ESP8266 module which integrates both WiFi and Tensilica L106 32-bit RISC processor on a single chip at US$3 per module and of Message Queue Telemetry Transport (MQTT) application layer protocol which is lightweight and data agnostic. A time based room temperature and humidity monitoring IoT application was set up using both the proposed IoT architecture and the existing MQTT architecture in order to compare power consumption. Results show that the power consumption of a monitoring node was reduced by a factor of 3.3 which ultimately resulted in a reduction in the cost of operating the nodes when the proposed architecture was used.
Show more

9 Read more

An Economical multi - keyword seek for
conserving energy over Mobile Cloud: TEES
 

      P. Sreevenkatramana,   Dr.AR.Arunachalam  Abstract PDF  IJIRMET1602040041

An Economical multi - keyword seek for conserving energy over Mobile Cloud: TEES P. Sreevenkatramana, Dr.AR.Arunachalam Abstract PDF IJIRMET1602040041

In the paper [3] Wang defined and solved the problem of secure ranked keyword search over encrypted cloud data. Ranked search greatly enhances system usability by enabling search result relevance ranking instead of sending undifferentiated results, and further ensures the file retrieval accuracy. Specifically, we explore the statistical measure approach. In the paper [4] proposed by Cong Wang, proposed a definition for ranked searchable symmetric encryption, and give an efficient design by properly utilizing the existing cryptographic primitive, order-preserving symmetric encryption (OPSE). Thorough analysis shows that the proposed solution enjoys “as-strong-as possible” security guarantee compared to previous SSE schemes, while correctly realizing the goal of ranked keyword search.In the paper [5], Shucheng Yu proposed a novel multi keyword fuzzy search scheme by exploiting the locality-sensitive hashing technique. Proposed scheme achieves fuzzy matching through algorithmic design rather than expanding the index file. It also eliminates the need of a predefined dictionary and effectively supports multiple keyword fuzzy searches without increasing the index or search complexity. Extensive analysis and experiments on real-world data show that the proposed scheme is secure, efficient and accurate. In the paper [6], Juan Ramos examined the results of applying Term Frequency Inverse Document Frequency (TF-IDF) to determine what words in a corpus of documents might be more favorable to use in a query. As the term implies, TF-IDF calculates the values for each word in a document through an inverse proportion of the frequency of the word in a particular document to the percentage of documents the word appears in. Words with high TF-IDF numbers imply a strong relationship with the document they appear in,suggesting that if that word were to appear in a query, the document could be of interest to the user.
Show more

6 Read more

Velocity Energy Efficient And Link Aware Cluster Tree (Velct) Based Data Collection For Wireless Sensor Networks

Velocity Energy Efficient And Link Aware Cluster Tree (Velct) Based Data Collection For Wireless Sensor Networks

In this paper, VELCT Velocity Energy-efficient and Link-aware Cluster-Tree is a proficient method is proposed to construct a mobility-based auspicious network management architecture for[r]

6 Read more

Self Buffer Management for Effective Utilization of Memory Power Consumption for Wireless Sensor Networks

Self Buffer Management for Effective Utilization of Memory Power Consumption for Wireless Sensor Networks

The proposed work modifies the memory architecture at the sensor node. In this architecture the memory module is divided into a number of blocks known as memory banks which are activated by the memory controller unit and power switching module. Depending on the amount of traffic flow the memory banks are activated. Simulations have been carried out for varying interarrival and service times using M/M/1 queuing model. As observed from the graphs and during simulations, there is a small difference in the energy utilization at the initial stages when the number of packets in the queue is less and the service time is low. But as the number of packets getting queued up increases and even as the service time increases the modified memory energy architecture performs significantly better than the normal memory architecture. This results in the increase in node life time and in turn increases network lifetime
Show more

7 Read more

An Energy-Efficient Scan Chain Architecture to Reliable Test of VLSI Chips

An Energy-Efficient Scan Chain Architecture to Reliable Test of VLSI Chips

effectively tolerate particle strikes which are among the main faults in advanced VLSI chips. The proposed architecture is based on the use of redundant transistors in memory elements of the chip. Redundant transistors are added in a way which enables the memory elements to recover the stored value in the case of bit flip error occurrence. Fault tolerance capability and energy consumption of the proposed scan architecture is compared with the previously proposed scan chains by the means of Spice simulations. Results of the simulation reveal that the proposed architecture has at least 40% improvement in reliability of test process while its power consumption overhead is at most 10% in both normal and test modes of operation.
Show more

6 Read more

Towards an interoperable energy efficient Cloud computing architecture-practice & experience

Towards an interoperable energy efficient Cloud computing architecture-practice & experience

section is used to specify the constraints on an applications virtual resource allocation. When a developer is ready to deploy their application the images and associated OVF de- scription is uploaded to the PaaS layer and processed by the Application Manager component where contextulization adds configuration to the OVF in the form of a virtual CDROM device and a unique deployment ID. Additionally, energy and price modelling alongside SLA negotiation is performed using the OVF virtual resource and workload definitions, to evaluate the suitability of cloud providers to run the application. Finally the altered OVF is passed to the IaaS layer where the (Virtual Machine Manager) VMM component breaks up the OVF into a number of VM instances and instantiates them via an API call to the virtual infrastructure manager. The freely available open source ASCETiC implementation of the OVF specification [13] is implemented in Java using XMLBeans [22] and to the best of our knowledge at the time of writing, there are currently no complete Java implementations available.
Show more

7 Read more

Sustainability Potential in Heritage of Gwalior City

Sustainability Potential in Heritage of Gwalior City

6.1. An eye view to its marvellous beauty and architecture: The building is square in plan and topped by a squat dome. It has hexagonal domed kiosks at its corners together with sloping eaves that project from exterior, features both taken from the Hindu architectural tradition. The tomb walls are made of pierced stone screens carved in geometric designs which allow light and air to filter into the interior chamber and create a cool, meditative atmosphere. The large central dome of the saint’s tomb tops the actual enclosed and walled large single room that houses the tomb, and the surrounding structure is more like a verandah with jaalis (perforated stone screens), which gives the structure a larger “enclosed” appearance than it actually has. The central dome with four small chattris (domed pavilions) resting on a prominent rectangular base has a shape much like many domes found in central India. 6.2. Location: the tomb of mohammad ghaus is loacated at ghauspura Gwalior to the east of the town. 6.3.Past scenario: on the historical point of view it was built by akbar under the guidance of mohammad ghaus son on the loving memory of sufi saint mohammad ghaus(16 th century) he is the teacher of mughal emperor and tansen(the famous musician in the akbar court) and this large tomb built during the second half of the 16 th century it is surrounded by graves and smaller pavilion tombs, including that of Tansen.
Show more

5 Read more

ZBLE: “Energy Efficient Zone based Leader Election Multipath Routing Protocol for MANETs”

ZBLE: “Energy Efficient Zone based Leader Election Multipath Routing Protocol for MANETs”

This paper uses zone-based architecture for communication in wireless networks. Using that technology, we are analyzing to boost the current outcome of the multi-path AOMDV protocol procedure. In our effects, we are involved in growing the benchmark inside relation to several existing parameters keeping within mind the throughput, delay (end to end), energy consumption, and network life. With this changed methodology, our network is effective to produce reliable performance parametric evaluation toward wireless networks. In this paper, we have demonstrated better ZBLE protocol, which improves network performance by zone based energy technology. This paper has been arranged in the following manner: Inside the 2nd section, we have described ZBLE protocol. Within 3 rd section, we explain several steps of ZBLE Protocol with an algorithm and methodology. Section 4 includes an Energy Consumption Model. Section 5 contains a representation regarding the simulation environment and experimental settings and Section 6 represents the Results including discussion. Conclusively, within Part 6 concludes the paper.
Show more

7 Read more

An efficient interpolation filter VLSI architecture for HEVC standard

An efficient interpolation filter VLSI architecture for HEVC standard

In an inter-prediction mode decision, a full-search al- gorithm searches for every possible block size and re- fines the results from the integer-pel to quarter-pel resolution. Thus, a full-search algorithm guarantees the highest level of compression performance. However, the considerable computational complexity for a mode deci- sion is critical for the encoding speed. Moreover, the main target resolution of HEVC is full HD (1920 × 1080) and beyond. For hardware implementation of an HEVC encoder, the area cost will be very high if the hardware structure executes interpolation filter for all possible prediction modes. In the VLSI architecture design, therefore, it is required to achieve the interpolation fil- tering operation of larger blocks by reusing the smallest unit.
Show more

12 Read more

Secure And Efficient Cluster Based Routing Model For Wireless Sensor Network

Secure And Efficient Cluster Based Routing Model For Wireless Sensor Network

Abstract—recently wireless sensor network has be adopted across wide range of application such as Internet of Things (IoT) based healthcare, military domain etc. due to its low cost availability and ease of deployment. For such application efficient secure and energy efficient design is needed. For improving energy efficiency exiting model adopted cluster based routing model. However, it incurs energy overhead among cluster head. Therefore, efficient cluster selection algorithm is needed. This work present an energy efficient cluster selection algorithm using multi-objective function using enhanced Imperialist Competitive Algorithm. Further, for providing secure communication the existing model are designed using asymmetric cryptography such as RSA, and Diffe-Hellman etc. As a result, incurs communication overhead and increase packet processing delay. For overcoming research challenges this work present symmetric Elliptical curve cryptography (ECC model. The proposed secure and efficient symmetric based ECC (SESECC) attained significant performance in terms of communication overhead, packet processing time and lifetime.
Show more

8 Read more

A New Dimension to Spectrum Management in IoT Empowered 5G Networks

A New Dimension to Spectrum Management in IoT Empowered 5G Networks

As a future direction of this work, the DBS switching mechanism could be employed to analyze the network perfor- mance based on the traffic patterns. The evaluation of energy savings and the impact of switching DBS on the end-to- end transmission delay could provide significant insight into the network robustness. Although, the centralized approach followed by CDSA allows CBS/DBS coordination, the CBS needs to extract the context information such as the position of nodes for smooth coordination. The collection and storage of context information is also one of the research challenges that needs to be addressed. Moreover, the exchange of signaling information between CBS and DBS requires an ultra-reliable and low latency back-haul mechanism, which triggers the need to explore techniques that incur minimum signaling overhead for CDSA. In a nutshell, there are several aspects associated with CDSA that require further research, making them a strong contender for 5G networks.
Show more

7 Read more

Analyzing the Performance of Diverse LEACH Algorithms for Wireless Sensor Networks

Analyzing the Performance of Diverse LEACH Algorithms for Wireless Sensor Networks

-----------------------------------------------------------------------ABSTRACT-------------------------------------------------------------- Sensor nodes can be used for continuous sensing, location sensing and event detection with the help of different types of sensors such as seismic, thermal, visual, infrared, magnetic, and many gaseous sensors. Sensor networks have wide range of applications including medical, military, home, etc. All these applications involve vigorous wireless communication protocol that is good in reduced energy utilization. A Low Energy Adaptive Clustering Hierarchy (LEACH) algorithm is a protocol designed to obtain energy efficient application specific data aggregation with good performance for the wireless sensor networks. LEACH is a cluster-based routing protocol in which each node has given equal probability to act as cluster head. In this paper, analysis has been done with LEACH protocol and modified LEACH protocols like LEACH-C, and DEEAC. Analyses show that with proper enhancement in the LEACH design, the transmission can enhance the energy efficiency and increase the life time of the sensor node.
Show more

6 Read more

Energy Efficient Resource Allocation in Vehicular Cloud based Architecture

Energy Efficient Resource Allocation in Vehicular Cloud based Architecture

Vehicular clouds (VC) are one of the distributed computing paradigms that has been proposed recently. They exploit the powerful and underutilized on-board computation and storage resources in vehicles in a cloud computing fashion. Integrating VC with centralized cloud services can enhance the service provisioning by serving users locally. This integration can also offload the computational burden and reduce the power consumption in conventional data centers. Recent research efforts have been successful in adopting the vehicles in cloud computing paradigm as static vehicles in a parking lot [22], [23], moving vehicles [24], [25], or vehicles stopping at traffic lights [26]. However, the hybrid architecture and dynamic behavior of the VC make it a very interesting direction with many challenging areas, including heterogeneous resource management [27], service provisioning [28], quality of experience [29], and resource scheduling and allocation [30], [31]. The problem of resource allocation can be a major factor affecting the total network power consumption, especially in the presence of edge computing. Optimization approaches have been studied in vehicular cloud environments to achieve the optimal scheduling strategy in term of execution delay [32], continuous service [33], resource utilization [34], [35], and cost minimization [36] – [38].
Show more

7 Read more

Energy-efficient service-oriented architecture for mobile cloud handover

Energy-efficient service-oriented architecture for mobile cloud handover

is particularly designed to support a wide-range of mobile devices. Most of the conventional approaches are not introduced to support the smaller number of mobile cloud users because many resources are required, mak- ing these approaches unsuccessful in real situations. Our SEEQoSA consumes 34.67 out of 50 Joules of energy after completing 4500 rounds for a maximum of 18 handover processes. On the other hand, other competing approaches consume 35.22–42.46 Joules with same number of handovers and rounds. The location update server is deployed with our approach to determine the location of the mobile device and to initiate the re- registration after the handover. As a result, the IPMS acquires the updated request from the top layer (applica- tion layer), which could save additional time and lead to a lower energy consumption.
Show more

13 Read more

Show all 10000 documents...