Refine your search
Collections
Co-Authors
- R. Sarvesan
- M. S. Vinod
- K. P. Sridhar
- R. Vijay Sai
- C. Ramya
- Sowmithra Vennelakanti
- P. Raja Gopal
- K. Naveen
- M. Lavanya
- V. Vaithayanathan
- Aarthi Ravi
- Ajay Aditya
- Rukmani Samyuktha
- V. Vaithiyanathan
- G. Aishwarya
- S. Keerthana
- T. N. Janani
- S. Sushmita
- M. Sunandha
- V. Anandkumar
- T. Prasannakumar
- K. Thangaprakash
- P. Ramalakshmi
- D. S. Nivetha Joice
- M. S. Vandhana
- S. Manju Bharathi
- N. Padma Priya
- Anjali Chava
- C. Venkatasubramanian
- D. Muthu
- K. Ramakrishnan
- R. Jeyaganeshan
- K. Sivakumar
- S. Sharmila
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Saravanan, S.
- Identification of DNA Elements Involved in Somaclonal Variants of Rauvolfia Serpentina (L.) Arising from Indirect Organogenesis as Evaluated by ISSR Analysis
Abstract Views :394 |
PDF Views:162
Authors
Affiliations
1 Post-graduate & Research Dept. of Plant biology and Biotechnology, Pachaiyappa’s College, Chennai-600030, IN
2 Post-graduate & Research Dept. of Plant biology and Biotechnology, Presidency College, Chennai-600005, IN
3 M.S.Swaminathan Research Foundation, Chennai-600 113, IN
1 Post-graduate & Research Dept. of Plant biology and Biotechnology, Pachaiyappa’s College, Chennai-600030, IN
2 Post-graduate & Research Dept. of Plant biology and Biotechnology, Presidency College, Chennai-600005, IN
3 M.S.Swaminathan Research Foundation, Chennai-600 113, IN
Source
Indian Journal of Science and Technology, Vol 4, No 10 (2011), Pagination: 1241-1245Abstract
Rauvolfia serpentina an endangered medicinal plant was chosen for in vitro propagation using modified MS medium. Genetic fidelity study of the regenerated plants were analysed with 18 ISSR markers. A total of 159 monomorphic bands were obtained; one ISSR marker HB-12 showed a polymorphic band among the callus regenerants. The specific polymorphic fragment was then gel eluted, cloned and sequenced.Keywords
Rauvolfia serpentina, ISSR, Somaclonal variation, Medicinal plant, IndiaReferences
- Ahuja MR (1987) In vitro propagation of poplar and aspen. In: Cell and tissue culture in forestry. Bonga JM & Durzan DJ (eds) Vol 3. Martinus Nijhof, Dordrecht, pp: 207– 223.
- Damasco OP, Graham GC, Henry RJ, Adkins SW and Godwin ID (1996) Random amplified polymorphic DNA (RAPD) detection of dwarf off-types in micropropagated Cavendish (Musa spp.AAA) bananas. Plant Cell Rep. 16,118-1123.
- Goel MK, Mehrotra S, Kukreja AK, Shanker K and Khanuja SPS (2009) In vitro propagation of Rauwolfia serpentina using liquid medium, assessment of genetic fidelity of micropropagated plants, and simultaneous quantitation of reserpine, ajmaline, and ajmalicine. Methods in Mol. Biol. Clifton Nj. 547, 17- 33.
- Goto S, Thakur RC and Ishii K (1998) Determination of genetic stability in long– term micro propagated shoots of Pinus thunbergii parl. using RAPD markers. Plant Cell Rep.18, 193– 197.
- Hashmi G, Huettel R, Meyer R, Krusberg L and Hammerschlag F (1997) RAPD analysis of somaclonal variants derived from embryo callus cultures of peach. Plant Cell Rep. 16, 624–627.
- Iriondo JM and Perez C (1996) Somaclonal variation in Lavatera. In: Somaclonal variation in crop improvement. Bajaj YPS (Ed.), Vol II, Springer- Verlag, Berlin. pp:280-295.
- Jain SM (1997) Somaclonal variation and mutagenesis for crop improvement. Maat- alouden tutkimuskuksen, Sirkka Immonen (Ed.). 18, 122–132.
- Jain SM, Brar DS and Ahloowalia BS (Eds.) (1998) Somaclonal variation and induced mutation in crop improvement. Kluwer Academic Publ., UK.
- Kaushal Bindiya and Kamlesh Kanwar (2003) RAPD markers for genetic analysis in micropropagated plants of Robinia pseudoacacia L. Euphytica 132, 41- 47.
- Larkin PJ and Scowcroft SC (1981) Somaclonal variation- a novel source of variability from cell culture for plant improvement. Theor. Appl. Genet. 60,197– 214.
- Maria Antonietta Palombi, Beatrice Lombardo and Emilia Caboni (2006) In vitro regeneration of wild pear (Pyrus pyraster Burgsd) clones tolerant to Fechlorosis and somaclonal variation analysis by RAPD markers. Plant cell reports, genetics and genomics. online date: Wednesday, 15th Nov.
- Murashige T and Skoog F (1962) A revised medium for rapid growth and bioassays with tobacco tissue cultures. Physiologia Plantarum. 15, 473-497.
- Nitish Kumar, Modi AR, Singh AS, Gajera BB, Patel AR and Patel MP (2010) Assessment of genetic fidelity of micropropagated date palm (Phoenix dactylifera L.) plants by RAPD and ISSR markers assay. Physiol. Mol. Biol. Plants.16 (2), 207-213.
- Rani V, Parida A and Raina SN (1995) Random amplified polymorphic DNA (RAPD) markers for genetic analysis in micropropagated plants of Populus deltoides Marsh. Plant Cell Rep. 14, 459– 462.
- Richa Bhatt, Mohd Arif, Gaur AK and Rao PB (2008) Rauwolfia serpentina: Protocol optimization for in vitro propagation. Afr. J. Biotechnol. 7 (23), 4265- 4268.
- Rival A, Betrand L, Beale T, Combes MC, Trouslout P and Leshermes P (1998) Suitability of RAPD analysis for detection of somaclonal variation in oil palm (Elaeis guineenis Jacq.) Plant Breed. 117, 73- 76.
- Rogers SO and Bendich AJ (1988) Extraction of DNA from plant tissues. In: Plant molecular biology. Manual A6. Kluwer Academic publishers, Dordrecht. pp:1-10.
- Rout GR, Das P, Goel S and Raina SN (1998) Determination of genetic stability of micropropagated plants of ginger using Random Amplified Polymorphic DNA (RAPD) markers. Botanical Bull. Acad. Sinica. 39, 23-27.
- Schneider S, Reustle G and Zyprian E (1996) Detection of somaclonal variation in grapevine regenerants from protoplast by RAPD– PCR. Vitis. 35, 99–100.
- Shu QY, Liu GS, Qi DM, Chu CC, Liu J and Li HJ (2003) An effective method for axillary bud culture and RAPD analysis of cloned plants in tetraploid black locust. Plant Cell Rep. 22, 175-180.
- Sihag RC and Nidhi Wadhwa (2011) Floral and reproductive biology of Sarpagandha Rauvolfia serpentina (Gentianales: Apocynaceae) in semi-arid environment of India. J. Threatened Taxa (JoTT) Short Commun. 3(1), 1432-1436.
- Skirvin RM and Janick J (1976) Tissue culture – induced variation in scented Pleargonium spp. J. Am. Soc. Hort. Sci. 101, 281–290.
- Skirvin RM, Nortonand M and McPheeters KD (1993) Somaclonal variation: has it proved useful for plant improvement. Acta Hort. 336, 333-340.
- Tiwari S and Jatav DS (2008) Detection of somoclonal variations aamong micropropagated population of some important medicinal plants. Afr. J. Traditional, Complementary & Alternative Med. (AJTCAM), Abstracts of tongress on Medicinal and aromatic Plants, Cape Town, Nov.
- Varshney A, Lakshmikumaran M, Srivastava PS and Dhawan V (2001) Establishment of genetic fidelity of in vitro raised Lilium bulblets through RAPD markers. Special Issue of In Vitro Cellu. Dev. Biol-Plant. 37(2), 227-231.
- Veilleux RE and Johnson AAT (1998) Somaclonal variation: Molecular analysis, transformation, interaction, and utilization. Plant Breed Rev. 16, 229– 268.
- Vendrame WA, Kochert G and Wetzstein HY (1999) AFLP analysis of variation in pecan somatic embryos. Plant Cell Rep. 18, 853–857.
- Wang P-J and Charles A (1991) Micropropagation through meristem culture. In: High tech and micropropagation. Biotechnology in agriculture and forestry. Bajaj YPS (ed), Vol.17, Springer, BerlinHeidelberg, NY. pp: 32–52.
- Countermeasure against Side Channel Power Attacks in Cryptography Devices
Abstract Views :227 |
PDF Views:0
Authors
Affiliations
1 VLSI Design, School of Computing, SASTRA University, Thanjavur, Tamil Nadu- 613401, IN
2 School of Computing, SASTRA University, Thanjavur, Tamil Nadu- 613401, IN
1 VLSI Design, School of Computing, SASTRA University, Thanjavur, Tamil Nadu- 613401, IN
2 School of Computing, SASTRA University, Thanjavur, Tamil Nadu- 613401, IN
Source
Indian Journal of Science and Technology, Vol 7, No S4 (2014), Pagination: 15-20Abstract
Power attack is the most powerful side channel attacks in cryptography chip during VLSI (Very Large Scale Integration) testing. Hackers attack the target devices by means of power through finding the correlations between the power spikes for different input generated on Cathode Ray Oscilloscope (CRO). To overcome such a great issues we proposed the novel techniques for cryptography devices which perform their crypto functions without an external power source. Energy required to do the cryptographic operation is provided by Embedded Capacitance Power Supply (ECPS) method, which is integrated with the VLSI device. Group of capacitors are connected to form the power supply, which act as the temporary battery of the cryptographic chip. The power spikes for this crypto operation not visible by the CRO. Hence it is complicate for attackers to hack the crypto system. The proposed method is modelled through Hardware Description Language (HDL) Verilog-AMS using Switch Level Modelling and result is verified by simulation wave form generated.Keywords
Cryptography Chip, Embedded Capacitance Power Supply, Side Channel Attack, Vlsi Testing- Rectifying Various Scan-based Attacks on Secure IC'S
Abstract Views :198 |
PDF Views:0
Authors
C. Ramya
1,
S. Saravanan
2
Affiliations
1 VLSI Design, SASTRA University, Thanjavur-613401, Tamil Nadu, IN
2 School of Computing, SASTRA University, Thanjavur-613401, Tamil Nadu, IN
1 VLSI Design, SASTRA University, Thanjavur-613401, Tamil Nadu, IN
2 School of Computing, SASTRA University, Thanjavur-613401, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 8, No 13 (2015), Pagination:Abstract
Designing of confidential ICs must satisfy many design rules in order to rectify the various attacks and to protect the secret data. Based on the concept of withholding information, on-chip comparisons for actual and expected response have already been proposed. From the security point of view, few limitations of existing method limit the security level. Some countermeasures have been proposed in order to secure the scan technique and on-chip comparison. In this paper, an additional inverter is introduced within the scan chain architecture. The introduction of flipped scan chain increases the switching of scan output and increases the complexity to retrieve the secret data. On comparing with Traditional scan chain, proposed method results in only negligible area overhead with high security level. This result shows that possible trials will be more than to hack the data. The proposed method can be applied for all scan testing.Keywords
Flipped Scan Chain, On-Chip Comparison, Scan Chain- Design and Analysis of Low Power Memory Built in Self Test Architecture for SoC based Design
Abstract Views :258 |
PDF Views:0
Authors
Affiliations
1 VLSI Design, SASTRA University, Thanjavur, IN
2 School of Computing, SASTRA University, Thanjavur, IN
1 VLSI Design, SASTRA University, Thanjavur, IN
2 School of Computing, SASTRA University, Thanjavur, IN
Source
Indian Journal of Science and Technology, Vol 8, No 14 (2015), Pagination:Abstract
This paper targets on the low power design of Memory Built In Self Test (MBIST) architecture for System on Chip (SoC) based design. Proposed address generator is developed with the blend of gray code counter and modulo counter. Bit reversing technique is adopted in this paper to generate the last pattern of gray code counter. In this work a refined architecture of MBIST is also constructed by embedding a low power address generator in it. Efficient employment of the proposed address generator in MBIST has cut-down the power consumption of BIST architecture compared to the traditional BIST. Reduction of about 6% of switching activity has been observed with novel MBIST architecture.Keywords
Gray Code, Low-Power, MBIST, Modulo Counter, MUT- Low Power Estimation on Test Compression Technique for SoC based Design
Abstract Views :182 |
PDF Views:0
Authors
Affiliations
1 VLSI Design, SASTRA University, Thanjavur, 613401, IN
2 School of Computing, SASTRA University, Thanjavur, 613401, IN
1 VLSI Design, SASTRA University, Thanjavur, 613401, IN
2 School of Computing, SASTRA University, Thanjavur, 613401, IN
Source
Indian Journal of Science and Technology, Vol 8, No 14 (2015), Pagination:Abstract
Test power dissipation is one of the major challenging task in System on Chip (SoC). The objective of the paper is to reduce the power consumption during testing in VLSI testing field. This paper analyzes the test power consumption for the test data to get the low power consumption by using switching activity. The Low Power Transition – X filling (LPT-X) method is proposed to reduce the transition switching where unknown bits were filled. Weighted Transition Metric (WTM) method used to estimate low test power. This paper approach achieves reduction of average power consumption by LPT-X filling method. Using ISCAS89 benchmark circuits the experimental results were conducted and achieves 83 percent of reduced average test power.Keywords
Low Power Transition (LPT), Switching Activity, System on Chip (SoC), Test Power, Weighted Transition Metric (WTM), X-Filling- Improved CAPTCHA based Authentication for E-mail ID
Abstract Views :182 |
PDF Views:0
Authors
Affiliations
1 School of Computing, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
2 SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
1 School of Computing, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
2 SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 8, No 35 (2015), Pagination:Abstract
This article aims to present the importance of authentication for E-mail ID through improved CAPTCHA based method.The structure of the CAPTCHA has to be reorganized to suit the user requirements to facilitate the authentication for E-mail ID. CAPTCHA is achieved by rearrangement of alphabets randomly on the buttons and it is very easy to frustrate by simple keyloggers. The motive of improving E-mail authentication is done by incorporating two factor visual authentication mechanisms. It is targeted to CAPTCHA based human interaction with sophisticated user friendly protocol. All the intermediate interaction is visualized by the user with better CAPTCHA code. It provides only one time (or) one session valid authentication through color grid rating method. This two layer authentication promises more secure in accessing any secure information based portal.Keywords
Authentication, CAPTCHA, E-mail, Hacker Attack, Keyloggers- An Enhanced Load Balancing Scheduling Approach on Private Clouds
Abstract Views :181 |
PDF Views:0
Authors
M. Lavanya
1,
Aarthi Ravi
2,
Ajay Aditya
2,
Rukmani Samyuktha
2,
V. Vaithiyanathan
1,
S. Saravanan
1
Affiliations
1 School of Computing, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
2 SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
1 School of Computing, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
2 SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 8, No 35 (2015), Pagination:Abstract
This paper aims to bring enhanced load balancing scheduling on private cloud computing. As cloud computing has become a developing and emerging area, the need for a cloud becomes mandatory in working areas. The advantage of technology in their own data centers to evolve a private cloud. Due to the presence of private cloud and to fulfill its unique characteristics and special requirements, it becomes a challenging task to optimally schedule virtual machine instances requests onto nodes to compute when there are multiple tasks to satisfy. In this paper, we discuss about load balancing, which is to schedule task among various end users. The scheduling algorithm used is Round Robin algorithm. This algorithm reduces the response time and improves the processing speed. According to this algorithm the nodes are allocated to the virtual machines along with their corresponding task to a particular node in a cyclic fashion. Each node in the cloud is scheduled equally with the task until all the tasks in the global queue all allocated.Keywords
Cloud Computing, Load Balancing, Private Cloud, Round Robin Algorithm, Scheduling- Secure Aware Communication using Novel End To End (ETE) Cipher Algorithm
Abstract Views :167 |
PDF Views:0
Authors
Affiliations
1 School of Computing, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
2 Information and Communication Technology, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
1 School of Computing, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
2 Information and Communication Technology, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 8, No 35 (2015), Pagination:Abstract
This article aims to bring a novel method in cipher algorithm for secure aware communication. This paper proposes a unique scheme and ensures higher security during encryption and decryption process. The Key (ki) is generated for every Plain text pi. Plain text and key are converted to their equivalent ASCII values, by which the scrambled Cipher text (ci) is generated by implementing some of the concepts of the substitution techniques. During Decryption, the corresponding (ki) are used to recover the Plain text pi. It makes sure the need to send the full length key along with the cipher text for decryption process. The suggested method assures the greater security during transmission. There is a practical hindrance in guessing the Number of rounds (N) and the number of bits n shifted, by Cryptanalyst. This method will be more suitable for analyzing the discover key (ki) values from attempting Brute Force technique.Keywords
Ciper Algorithms, Cryptanalyst, Decryption, Encryption, Secure Communication- A Constraint-based Decentralized Task Routing Approach to Large-Scale Scheduling in Cloud Environment
Abstract Views :179 |
PDF Views:0
Authors
Affiliations
1 School of Computing, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
2 Information and Communication Technology, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
1 School of Computing, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
2 Information and Communication Technology, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 8, No 35 (2015), Pagination:Abstract
This article mainly focused on cloud scheduling with constraint based decentralized task routing. The job of scheduling tasks across various nodes in a hierarchical network scenario is an exigent problem. The concept of decentralized distribution scheme proposed in base paper is time-consuming since it has to compute the availability function for each and every node. In this paper we proposed a CBDA (Constraint Based Decentralized Algorithm) which offers the expediency of being quick and “Make-span minimization policy” is implemented to reduce the completion time of the currently executing nodes. In our presumption, the submission nodes are semi centralized and it can store the availability information of the nodes or routers within its area. This paper considers the allotment of the tasks to the execution nodes which are unoccupied by other tasks. The dynamic allotment of the tasks to the nodes in the tree based approach is the major criteria for selecting the desired node. This paper proposes a trade-off between fully centralized model and the decentralized model by implementing a new constraint based decentralization scheme which saves time consumption and enhances efficiency of task scheduling.Keywords
Cloud Computing, Constraint based Method Scheduling, Decentralized Router, Dynamic Task- Implementation of a Novel Data Scrambling based Security Measure in Memories for VLSI Circuits
Abstract Views :163 |
PDF Views:0
Authors
Affiliations
1 School of Computing, SASTRA University, Thanjavur – 613401, Tamil Nadu, IN
1 School of Computing, SASTRA University, Thanjavur – 613401, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 8, No 35 (2015), Pagination:Abstract
This article shows the importance of security in memory for VLSI circuits based on data scrambling and overcome attacks. Security information stored in memory is very valuable. The model should not be prone to intruder attacks. The proposed method provides scrambling of information by data scrambling vectors. Instead of using some extra table for scrambling the data in cache memories, the data is divided into two halves and scrambled within to overcome extra hardware and memory requirement. This method is implemented in Verilog HDL using Model Sim which has improvement in area and memory requirement. This method is more suitable for value added applications such as smart cards and bio metric applications.Keywords
Cache Read and Write Operations, Scrambling Vectors, Security in Memory- Modified Privacy Protection in Personalized Web Search
Abstract Views :172 |
PDF Views:0
Authors
Affiliations
1 B. Tech Information Technology, School of Computing, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
2 School of Computing, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
3 Research, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
1 B. Tech Information Technology, School of Computing, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
2 School of Computing, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
3 Research, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 8, No 36 (2015), Pagination:Abstract
This proposed work aims to show the importance of personalized web search with improved privacy protection. To protect user profile based on Personalized Web Search (PWS), we need to consider few major issues during web site search processing. It is possible to improve efficient search based method with the personalized usage method of the accessing new user profile and prevent the privacy contents, which exists in the user profile method to adopt the risk privacy under control. User privacy can be safe without compromising the web search if personalized search quality. User Profile Search Engine (UPSE) is typically offline with all queries received from a same user. This article provides an inexpensive method for the user clientto conform whether to personalize a web search query in UPSE. This can avoid the unnecessary experience of the profile. Expected results can be evident that UPSE can achieve better quality based search results. So this proposed method is more applicable for personalized web portal.Keywords
Greedy Algorithms, Personalized Web Search, Privacy Preserving Personalized, User Profile Search Engine- Multiple Scan Base Partitioning Technique to Increase the Throughput in VLSI Testing
Abstract Views :199 |
PDF Views:0
Authors
Affiliations
1 School of Computing, SASTRA University, Thirumalaisamudram, Thanjavur – 613401, Tamil Nadu, IN
2 School of Computing, Information Technology, SASTRA University, Thanjavur – 613401, Tamil Nadu, IN
1 School of Computing, SASTRA University, Thirumalaisamudram, Thanjavur – 613401, Tamil Nadu, IN
2 School of Computing, Information Technology, SASTRA University, Thanjavur – 613401, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 29 (2016), Pagination:Abstract
Among any testing methods, scan testing is very significant for both in built and external schemes. The performance of the system should get maintained so the throughput plays major role. This paper tells about the retaining data which is hold technique and the jump process is attached to improve the throughput in VLSI testing. In order to achieve better performance the throughput is achieved by transferring the data per time and this gets increased constantly. The data in the partitions shifted sequentially when scan condition is on and when it is off the data may get corrupted so the system invalidate the testing process, the loss may get increase. In-order to solve the problem the data should get retained when the scan condition is not activated and to this process the jump technique is connected. The jump process connects to the output port when the condition is off. When compared to the first stage hold process this multiple partitions is beneficial. The implemented technique helps for the priority data, data rate and also to increase the throughput value approximately 85% to 87% as the clock frequency get reduced in the testing side. The area is reduced by 23.01% with the help of ISCAS benchmark circuit S5378when compared to the first stage hold technique where the benchmark helps to test the system.Keywords
Hold Technique, Jump Technique, Multiple Scan Base Partition, Throughput, VLSI Testing.- Efficient Test Sequence Generator for Area Optimization in LFSR Reseeding
Abstract Views :163 |
PDF Views:0
Authors
Affiliations
1 School of Computing, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
1 School of Computing, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 29 (2016), Pagination:Abstract
In this paper, a new concept of test pattern generator is used with Seed Initialization Method (SIM) for area optimization in LFSR reseeding. LFSR Reseeding is the method which is mainly used in logic BIST. Some of the reseeding mechanism needs some sort of memory to store all seeds. But this issue is overcome by present method. By this method, the proposed test pattern generator employs the output response of the CUT to the LFSR as the controlling signal to transform the LFSR state. It contains a net providing cell and LFSR with reversal logic to conform that there is no storage of seeds. When compared to previous methods, by using this approach (SIM), the test sequence that will have been given to LFSR is much reducing. The empirical outcome on ISCAS circuits shows that the conferred seed initialization method has brought reduced area overhead.Keywords
BIST, LFSR Reseeding, Seed Initialization Method, Test Sequence Generator (TSG).- Cell Stability and Power Reduction using Dynamic Isolated Read Static Random Access Memory
Abstract Views :210 |
PDF Views:0
Authors
Affiliations
1 School of Computing, SASTRA University, Thanjavur -613401, Tamil Nadu, IN
1 School of Computing, SASTRA University, Thanjavur -613401, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 29 (2016), Pagination:Abstract
The channel scaling attains the overflow current at the transistor, which impacts on power indulgence. In order to attain reduced power and delay, the devices are assumed to decrease its size. Then transistors size can also be changed. In this paper the unique dynamic isolated read SRAM has been projected for dropping the total power. By linking, the cell with 6T and NC SRAM in numerous features, high constancy and decreased power is achieved by the curvature N (noise) method, which is done when the system is in active mode. The values are calculated with the voltage of 1.8 which reduces 90% of power than the 6T, and 18% of power is reduced than the 8T SRAM cell, and 30% of leakage current is reduced as compared to 6T cell. Thus when related to the existing SRAM, the cell consumes less power and without any distortion the cell stores the data. Also the constancy of the cell is improved when compared with the other cell. The waveform result shows that the cell attains enhanced stability and reduction in overflow using the cadence virtuoso technology of 180 nm.Keywords
Curvature-noise, Stability, Static Current Noise Margin, Static Voltage Noise Margin, Write Trip Point.- Improving the Reliability of Cache Memories using Identical Tag Bits
Abstract Views :155 |
PDF Views:0
Authors
Affiliations
1 School of Computing, SASTRA University, Thanjavur – 613401, Tamil Nadu, IN
1 School of Computing, SASTRA University, Thanjavur – 613401, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 29 (2016), Pagination:Abstract
Cache memories are revealed to transitory error in tag bits and some of the efforts have been taken to decrease their susceptibility. In the advanced mechanisms of cache memories are most applicable components, because the soft errors are protected. The identical tag bit data is used to regain from the error in the tag bits. In this paper, to improve error protection capacity of the tag bits in caches, power efficient cache design is proposed by using Superlative Standard Techniques (SST) architecture to achieve power. To utilize the identical tag bits for transitory error protection, the proposed scheme is discussed by selecting the energy superlative standard techniques that decrease unwanted interior activities by reducing the dynamic switching power. In experimental method, results show that our proposed multilevel cache architecture sustains a performance of achieving dynamic power and reduces the power consumption up to 85% when applied to energy optimal technique.Keywords
Cache Memories, Identical Tag Information, Superlative Standard Techniques (SST), Tag Bits, Transitory Error.- Compression of Data using Shifted Frequency Directed Reference Coding and MISR
Abstract Views :129 |
PDF Views:0
Authors
Affiliations
1 School of Computing, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
1 School of Computing, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 29 (2016), Pagination:Abstract
In modern technology BIST become pervasive where scan chain plays a major role. An efficient low power BIST method is proposed which occurs in testing. The test set acquires sequence of preprocessed approach inclusive of X-bit 2-D reordering and cube matrix is sequentially distributed. In this paper compression ratio is achieved using MISR. The introduction of MISR and X-masking technique will reduce the compression Ratio. To minimise the repitation of bits MISR plays a vital role. Compression is done by the run length coding and the high compression is achived by the first and second matrix response. MT flling is a method for the replacement technique.CR is calculated using the output values used. The ratio of input bits used to the existing input values which shows the compression ratio. This proposed technique is compared with bench mark circuits s5378, s9234 and s13207 to analyze the area and compression ratio.Keywords
Hamming Distance, Multiple Input Scan Register (MISR), X-Masking, Scan Chain.- Low Power Testing based on MOS Design Modified Flip-Flop
Abstract Views :137 |
PDF Views:0
Authors
Anjali Chava
1,
S. Saravanan
1
Affiliations
1 School of Computing, SASTRA University, Thanjavur – 613401, Tamilnadu, IN
1 School of Computing, SASTRA University, Thanjavur – 613401, Tamilnadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 29 (2016), Pagination:Abstract
Flip-flops are basically data storage elements which can be used for storage of state. However, most non-volatile memory forms have limitations which make them unsuitable for primary storage. One of the disadvantages of existing flip-flop normal flip-flop based circuits and its computing is relatively high write energy to build up normal flip-flop based circuits. There is a need to reduce the consumption of power and to write energy of flip-flop. Hence, we propose a design of low power normal flip-flop using modified CMOS technology. CMOS technology provides less noise ration during design. The proposed flip-flop design is based on MOS technology. Data store and restore operations can be performed. And in the proposed design performs in retaining data when electrical power fails or is turned off with low power consumption.Keywords
CMOS Design, D Flip-Flop, Low Power.- Construction of Rural Roads using C&D Waste Materials
Abstract Views :198 |
PDF Views:0
Authors
Affiliations
1 School of Civil Engineering, Sastra University, Thanjavur - 613401, Tamil Nadu, IN
2 Faculty, School of Civil Engineering, Sastra University, Thanjavur – 613401, Tamil Nadu, IN
1 School of Civil Engineering, Sastra University, Thanjavur - 613401, Tamil Nadu, IN
2 Faculty, School of Civil Engineering, Sastra University, Thanjavur – 613401, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 27 (2016), Pagination:Abstract
Objective: Soil is often weak in sustaining heavier loads. In this study, investigations are made to determine the use of C&D (Construction & Demolition) waste materials in geotechnical applications such as formation and strength improvement of rural roads, and to evaluate the effects of powdered waste bricks & prolonged stored cement in the formation of rural roads. Analysis: The results obtained are made towards the effectiveness and usability of reinforcement as a replacement for pavement works used in rural road execution works as a cost effective approach. Findings: By addition of C&D waste materials in the sub-base layer of the road structure, the conventional laterite layer of rural road formation is further strengthened, quantity of utilization of laterite is reduced and thus leads to cost reduction in road laying. Applications/ Improvements: Due to the improvement of the strength in the sub-base layer subsequently the water bound macadam layer which is laid on the top of laterite layer will be stabilized further, thus increasing the life of the rural roads to a certain extent.Keywords
CBR Test, Construction & Demolition Waste, Rural Roads, Soil Stabilization, Soil Tests, Soil Replacement, Soil Tests.- Business Configuration of Windchill PDMLink 10.0 For MR Manufacturing Company
Abstract Views :160 |
PDF Views:0
Authors
Affiliations
1 Department of Production Engineering, PSG College of Technology, Coimbatore – 641004, Tamil Nadu, IN
2 Department of Mechanical Engineering, Bharath University, Chennai – 600073, Tamil Nadu, IN
1 Department of Production Engineering, PSG College of Technology, Coimbatore – 641004, Tamil Nadu, IN
2 Department of Mechanical Engineering, Bharath University, Chennai – 600073, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 8, No 31 (2015), Pagination:Abstract
One of the leading manufacturers of educational products such as interactive whiteboards is currently using PTC suite of PLM products (PDMLink 10.0). This project deals with business configuration of the system to enable capabilities that address functional business requirements and desired features. Out of-the-box business configurations like the default numbering scheme, lifecycle templates, versioning series, object initialization rules, attributes and other related configurations of the existing Windchill environment are already packaged in the Windchill PDMLink 10.0 environment. There are certain features such as custom roles, custom lifecycle states, custom versioning series, soft types, workflow, lifecycle, organization creation, object initialization rules, access control rules for libraries and products which are specific to an organization and are recommended to be defined at the organization level. This can be achieved by deploying configured files into this Windchill PDMLink 10.0 system using Load files, import function and other manual settings.Keywords
PDMLink 10.0, PLM, PTC, Lifecycle, Workflow- A Review on Security in Cache Memories
Abstract Views :160 |
PDF Views:0
Authors
R. Vijay Sai
1,
S. Saravanan
1
Affiliations
1 School of Computing, SASTRA University, Thanjavur – 613401, Tamil Nadu, IN
1 School of Computing, SASTRA University, Thanjavur – 613401, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 48 (2016), Pagination:Abstract
Objectives: Security in cache memory is a major issue in memory related applications such as smart cards and bio-metric implementations. The objective of this review is to analyze various attacks targeting cache memory and suggest remedial measures to thwart such attacks and assure cache memory security. Methods/Statistical Analysis: Information stored in cache memory can be recovered whenever required. This data is in danger of being hacked by the intruder. Statistical analysis show that attacks such as side channel attacks, timing attacks and power based attacks are adopted to challenge information security in caches. Findings: Discussed solutions involve in the design of secured cryptographic based algorithms, secure aware cache mapping and low power cache design by employing techniques such as code convertors, nested XOR operations, extended Hamming codes and multi-bit clustered ECC. Application/Improvements: Improving and authenticating cache memory security will result in numerous applications involving smart cards and bio-metric applications where secrecy of data is of extreme importance.Keywords
Cache Memory, Power Based Attacks, Side Channel Attack, Timing Attacks.- Modified Block Based Technique for Efficient Test Data Compression
Abstract Views :151 |
PDF Views:0
Authors
S. Saravanan
1,
S. Sharmila
2
Affiliations
1 School of Computing, SASTRA UNIVERSITY, Tirumalaisamudram, Thanjavur - 613401, Tamilnadu, IN
2 Deaprtment of Master in Technology, VLSI Design, SASTRA University, Tirumalaisamudram,Thanjavur - 613402, Tamilnadu, IN
1 School of Computing, SASTRA UNIVERSITY, Tirumalaisamudram, Thanjavur - 613401, Tamilnadu, IN
2 Deaprtment of Master in Technology, VLSI Design, SASTRA University, Tirumalaisamudram,Thanjavur - 613402, Tamilnadu, IN