2015 IEEE International Symposium on Nanoelectronic and Information Systems

21-23 Dec. 2015

Filter Results

Displaying Results 1 - 25 of 76
  • [Front cover]

    Publication Year: 2015, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (1624 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2015, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (142 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2015, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (135 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2015, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (114 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2015, Page(s):v - xi
    Request permission for commercial reuse | PDF file iconPDF (175 KB)
    Freely Available from IEEE
  • Message from the General Chairs

    Publication Year: 2015, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (135 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Technical Program Chairs

    Publication Year: 2015, Page(s):xiii - xiv
    Request permission for commercial reuse | PDF file iconPDF (209 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2015, Page(s):xv - xvi
    Request permission for commercial reuse | PDF file iconPDF (106 KB)
    Freely Available from IEEE
  • Technical Program Committee

    Publication Year: 2015, Page(s):xvii - xxi
    Request permission for commercial reuse | PDF file iconPDF (120 KB)
    Freely Available from IEEE
  • Steering Committee

    Publication Year: 2015, Page(s): xxii
    Request permission for commercial reuse | PDF file iconPDF (100 KB)
    Freely Available from IEEE
  • Additional Reviewers

    Publication Year: 2015, Page(s): xxiii
    Request permission for commercial reuse | PDF file iconPDF (65 KB)
    Freely Available from IEEE
  • Keynote abstracts

    Publication Year: 2015, Page(s):xxiv - xxxi
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (341 KB)

    Provides an abstract for each of the keynote presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure Information Processing during System-Level: Exploration of an Optimized Trojan Secured Datapath for CDFGs during HLS Based on User Constraints

    Publication Year: 2015, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (248 KB) | HTML iconHTML

    Globalization of the System-on-Chip (SoC) design process poses a serious security alarm for SoC integrators, due to involvement of untrustworthy third party (3P) vendors supplying intellectual property (IP) cores. In this paper, a novel methodology for design space exploration in high level synthesis (HLS) is presented for loop based control data flow graphs (CDFG), which provides secure informati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Energy Aware Synthesis of Application Kernels Expressed in Functional Languages on a Coarse Grained Composable Reconfigurable Array

    Publication Year: 2015, Page(s):7 - 12
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (273 KB) | HTML iconHTML

    With transistor energy efficiency not scaling at the same rate as transistor density and frequency, CMOS technology has hit a utilization wall, whereby large portions of the chip remain under clocked. To improve performance, while keeping power dissipation at a realistic level, future computing devices will consist of heterogeneous application specific accelerators. The accelerators have to be syn... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Clocked Adiabatic XOR and XNOR CMOS Gates Design Based on Graphene Nanoribbon Complementary Field Effect Transistors

    Publication Year: 2015, Page(s):13 - 18
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (614 KB) | HTML iconHTML

    In this paper, graphene nanoribbon field effect transistors (GNR FET) have been used in design of new energy-efficient XNOR/XOR gates based on clocked adiabatic logic (CAL), which results in the reduction of power density by nearly 65% comparing with the earlier CAL design in 45 nm technology node. In addition, the GNR FET allows scaling of supply voltage, which results in nearly three times reduc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance Enhancement of Dopingless Tunnel-FET Based on Ge-Source with High-k

    Publication Year: 2015, Page(s):19 - 22
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (472 KB) | HTML iconHTML

    In this paper, we have proposed and investigated the performance of a Germanium (Ge) source (GeS) dopingless (DL) tunnel field-effect transistor (DLTFET) with high-k dielectric material. The proposed GeS-DLTFET employes a low bandgap Ge for the source region to improve the ON state current, whereas, Si is used in the drain region to keep the OFF state current low. However, dopingless structure in ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Designing Nanoelectronic-Compatible 8-bit Square Root Circuit by Quantum-Dot Cellular Automata

    Publication Year: 2015, Page(s):23 - 28
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1728 KB) | HTML iconHTML

    After basic mathematical operations i.e. Addition, subtraction, multiplication, and division, square root is regarded as the most useful and applicable operations in scientific calculations. There are various methods for hardware implementation of square root. One of the most common methods in this field is non-restoring algorithm. In this paper, the improved classical non-restoring array structur... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Nanoscale Memory Design for Efficient Computation: Trends, Challenges and Opportunity

    Publication Year: 2015, Page(s):29 - 34
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (462 KB) | HTML iconHTML

    The importance of embedded memory in contemporary multi-core processors and system-on-chip (SoC) for wearable electronics and IoT applications is growing. Intensive data processing in such processors and SoCs necessitates larger on-chip, energy-efficient static random access memory (SRAM). However, there are several challenges associated with low-voltage SRAMs. In this paper we have discussed the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Robust Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks

    Publication Year: 2015, Page(s):35 - 40
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1101 KB) | HTML iconHTML

    Energy efficient routing protocol design in the presence of noise and interference is a challenging task in wireless sensor networks (WSNs). In this paper, we present a robust, energy efficient multi-path routing protocol that uses the residual energy and Signal-to-Noise Ratio (SNR) to predict the best next hop node during the route establishment. The new protocol uses multi-path to transmit the d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Energy-Saving Image Transmission over WMSN Using Block Size Reduction Technique

    Publication Year: 2015, Page(s):41 - 46
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (560 KB) | HTML iconHTML

    The advent of efficient short range radio communication coupled with advancement in miniaturization of computing devices has enabled the development of wireless multimedia sensor network (WMSN). Energy is one of the scarcest resources in such networks, especially it is scarce in transmitting multimedia data. This work presents an energy-saving pixel sub sampling of image blocks where pixels of eac... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • At a Glance of Sybil Detection in OSN

    Publication Year: 2015, Page(s):47 - 52
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2908 KB) | HTML iconHTML

    With increasing popularity of online social network (OSN), major threats are also emerging to challenge the security of OSN. One of the majors is Sybil attack, where malicious user unfairly creates multiple fake identities to penetrate the OSN security and integrity. Since last decades number of schemes have been developed for detecting ad defending Sybil attack. In this survey article, we aim to ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multicore ICs: Recent Trends in Developing Methodologies and Frameworks for Simulation

    Publication Year: 2015, Page(s):53 - 56
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (195 KB) | HTML iconHTML

    High Performance Computing Chips are expected to deliver several GFLOPs of computing power in the near future. Parallelism inherent in modern algorithms boosts the motivation for building multicore architectures. Design-space exploration and performance estimation has to be done before finding an optimal design point for a multicore IC. Role of a good multicore simulator is to provide the develope... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Robustness Analysis of a Digital Image Watermarking Technique for Various Frequency Bands in DCT Domain

    Publication Year: 2015, Page(s):57 - 62
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (622 KB) | HTML iconHTML

    Internet has made multimedia communication easier than ever. In present scenario huge amount of information is being shared as digital content. Copying of such digital content without apparent loss in quality is not a difficult task. Due to this, there are more chances of copying of such digital information. Thus, there is a great need of prohibiting such illegal copying of digital media. Digital ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Gradient Descent with Momentum based Neural Network Pattern Classification for the Prediction of Soil Moisture Content in Precision Agriculture

    Publication Year: 2015, Page(s):63 - 66
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (268 KB) | HTML iconHTML

    Irrigation in agricultural lands plays a vivacious role in water and soil conservation. Future prediction of soil moisture content using real-time soil and environmental parameters may provide an efficient platform for agriculture land irrigation requirements. In this paper we have proposed one optimization technique like Gradient Descent with Momentum is used to train neural network pattern class... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Twitter Sentiment Analysis -- A More Enhanced Way of Classification and Scoring

    Publication Year: 2015, Page(s):67 - 72
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (350 KB) | HTML iconHTML

    In this paper we present a novel approach to Twitter Sentiment Analysis. The approach adopted is to analyse the lexicon features of the tweets for classifying its sentiment (positive, negative and neutral). The training data is made more exhaustive by including various manually labelled tweets, in addition to the existing word stock to keep up with the changing micro logging trends. For Data Prepr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.