Author
Bijoy Kumar Upadhyaya
Bio: Bijoy Kumar Upadhyaya is an academic researcher from Tripura Institute of Technology. The author has contributed to research in topic(s): VHDL & Field-programmable gate array. The author has an hindex of 7, co-authored 12 publication(s) receiving 157 citation(s).
Topics: VHDL, Field-programmable gate array, ModelSim, WiMAX, Wireless
Papers
More filters
[...]
TL;DR: This paper provides a generalized, but detailed analysis of the power consumption causes (internal and external) of a smartphone and also offers suggestive measures to minimize the consumption for each factor.
Abstract: The advancement and popularity of smartphones have made it an essential and all-purpose device. But lack of advancement in battery technology has held back its optimum potential. Therefore, considering its scarcity, optimal use and efficient management of energy are crucial in a smartphone. For that, a fair understanding of a smartphone’s energy consumption factors is necessary for both users and device manufacturers, along with other stakeholders in the smartphone ecosystem. It is important to assess how much of the device’s energy is consumed by which components and under what circumstances. This paper provides a generalized, but detailed analysis of the power consumption causes (internal and external) of a smartphone and also offers suggestive measures to minimize the consumption for each factor. The main contribution of this paper is four comprehensive literature reviews on: 1) smartphone’s power consumption assessment and estimation (including power consumption analysis and modelling); 2) power consumption management for smartphones (including energy-saving methods and techniques); 3) state-of-the-art of the research and commercial developments of smartphone batteries (including alternative power sources); and 4) mitigating the hazardous issues of smartphones’ batteries (with a details explanation of the issues). The research works are further subcategorized based on different research and solution approaches. A good number of recent empirical research works are considered for this comprehensive review, and each of them is succinctly analysed and discussed.
41 citations
[...]
01 Jan 2019
TL;DR: This chapter highlights the challenges faced by today's healthcare systems and analyzes how to overcome these with the help of pervasive healthcare, and presents an assessment of the current and future IoT healthcare market along with a listing of the key players.
Abstract: Advances in smart medical devices and pervasive systems are turning connected healthcare into a prospering platform for pervasive healthcare. The Internet of Things (IoT), smart sensors, and wearables have augmented the healthcare system, enabling remote monitoring and supporting the medical condition of the patient in and out of clinics. This chapter aims to serve as a brief primer on the development of smart and pervasive healthcare systems. The chapter starts with an overview of IoT, smart sensors, and pervasive systems and also their interrelationships. The differences between IoT and pervasive systems are meticulously laid out to clear any confusion between these two computing paradigms. The chapter highlights the challenges faced by today's healthcare systems and analyzes how to overcome these with the help of pervasive healthcare. It discusses the basics of mobile and pervasive healthcare, including context-aware and connected healthcare, while distinguishing them from telemedicine. It elaborates on the role of IoT in healthcare while discussing a number of sensors and smart devices used in healthcare, fitness, and medical care units. The benefits of and challenges involved in pervasive healthcare are reviewed comprehensively. Several real-life applications and use cases of IoT and smart sensors are presented, showing the effectiveness of pervasive healthcare. The chapter also presents an assessment of the current and future IoT healthcare market along with a listing of the key players.
34 citations
[...]
TL;DR: This paper presents a finite state machine based novel technique to model the Address Generation circuitry of WiMAX multimode interleaver using VHDL on FPGA platform with all code rates and modulation schemes of IEEE 802.16e standard.
Abstract: Wireless technology is the fastest growing segment of the modern communication industry. The IEEE 802.16e standard, commonly known as mobile WiMAX, is the latest wireless technology that has promised to offer Broadband Wireless Access over long distance. The concept of OFDM is used in WiMAX to obtain high data rate in addition to reducing the effects like inter symbol interference and inter channel interference. It has proved to be the air interface for next generation Broadband Wireless System. In this paper, we present a finite state machine based novel technique to model the Address Generation circuitry of WiMAX multimode interleaver using VHDL on FPGA platform with all code rates and modulation schemes of IEEE 802.16e standard. Our approach provides better performance in terms of maximum operating frequency, use of flip-flops with negligible loss in terms of logic cells utilized compared to existing FPGA based implementations. Measured circuit parameters and software simulation of this model are also provided.
26 citations
[...]
TL;DR: A low-complexity and novel technique is proposed to efficiently implement the address generation circuitry of the 2-D deinterleaver used in the WiMAX transreceiver using the Xilinx field-programmable gate array (FPGA).
Abstract: In this brief, a low-complexity and novel technique is proposed to efficiently implement the address generation circuitry of the 2-D deinterleaver used in the WiMAX transreceiver using the Xilinx field-programmable gate array (FPGA). The floor function associated with the implementation of the steps, required for the permutation of the incoming bit stream in channel interleaver/deinterleaver for IEEE 802.16e standard is very difficult to implement in FPGA. A simple algorithm along with its mathematical background developed in this brief, eliminates the requirement of floor function and thereby allows low-complexity FPGA implementation. The use of an internal multiplier of FPGA and the sharing of resources for quadrature phase-shift keying, 16-quadrature-amplitude modulation (QAM), and 64-QAM modulations along with all possible code rates makes our approach to be novel and highly efficient when compared with conventional look-up table-based approach. The proposed approach exhibits significant improvement in the use of FPGA resources. Exhaustive simulation has been carried out to claim supremacy of our proposed work.
14 citations
[...]
01 Jan 2009
TL;DR: An efficient technique to model convolutional interleaver using a hardware description language is proposed and implemented on field programmable gate array (FPGA) chip, which implies lower power consumption and reduced delay in the interconnection network of the FPGA.
Abstract: Interleaving along with error correction coding is an effective way to deal with different types of error in digital data communication. Error burst due to multipath fading and from other sources in a digital channel may be effectively combated by interleaving technique. In this paper an efficient technique to model convolutional interleaver using a hardware description language is proposed and implemented on field programmable gate array (FPGA) chip. Our technique utilizes embedded shift register of FPGA chip to implement incremental shift register in the interleaver. Software simulation of the model is presented. The proposed technique reduces consumption of FPGA resources to a large extent compared to conventional implementation technique using flip-flop. This implies lower power consumption and reduced delay in the interconnection network of the FPGA. This technique is also efficient in reducing wastage of memory compared to memory based implementation technique for digital audio broadcasting (DAB) application.
13 citations
Cited by
More filters
[...]
TL;DR: A systematic literature review protocol is proposed to study how mobile computing assists IoT applications in healthcare, contributes to the current and future research work of IoT in the healthcare system, brings privacy and security in health IoT devices, and affects the IoT inthe healthcare system.
Abstract: The impact of Internet of Things has been revolutionized in all fields of life, but its impact on the healthcare system has been significant due to its cutting edge transition. The role of Internet of Things becomes more dominant when it is supported by the features of mobile computing. The mobile computing extends the functionality of IoT in healthcare environment by bringing a massive support in the form of mobile health (m-health). In this research, a systematic literature review protocol is proposed to study how mobile computing assists IoT applications in healthcare, contributes to the current and future research work of IoT in the healthcare system, brings privacy and security in health IoT devices, and affects the IoT in the healthcare system. Furthermore, the intentions of the paper are to study the impacts of mobile computing on IoT in healthcare environment or smart hospitals in light of our systematic literature review protocol. The proposed study reports the papers that were included based on filtering process by title, abstract, and contents, and a total of 116 primary studies were included to support the proposed research. These papers were then analysed for research questions defined for the proposed study.
48 citations
Patent•
[...]
18 Dec 2013
TL;DR: In this paper, a processor core and a number of calculation modules that each is configurable to perform any one of operations for a convolutional neuron network system are configured to perform convolution operations, averaging operations and dot product operations.
Abstract: A processing device includes a processor core and a number of calculation modules that each is configurable to perform any one of operations for a convolutional neuron network system. A first set of the calculation modules are configured to perform convolution operations, a second set of the calculation modules are reconfigured to perform averaging operations, and a third set of the calculation modules are reconfigured to perform dot product operations.
48 citations
[...]
TL;DR: This paper provides a generalized, but detailed analysis of the power consumption causes (internal and external) of a smartphone and also offers suggestive measures to minimize the consumption for each factor.
Abstract: The advancement and popularity of smartphones have made it an essential and all-purpose device. But lack of advancement in battery technology has held back its optimum potential. Therefore, considering its scarcity, optimal use and efficient management of energy are crucial in a smartphone. For that, a fair understanding of a smartphone’s energy consumption factors is necessary for both users and device manufacturers, along with other stakeholders in the smartphone ecosystem. It is important to assess how much of the device’s energy is consumed by which components and under what circumstances. This paper provides a generalized, but detailed analysis of the power consumption causes (internal and external) of a smartphone and also offers suggestive measures to minimize the consumption for each factor. The main contribution of this paper is four comprehensive literature reviews on: 1) smartphone’s power consumption assessment and estimation (including power consumption analysis and modelling); 2) power consumption management for smartphones (including energy-saving methods and techniques); 3) state-of-the-art of the research and commercial developments of smartphone batteries (including alternative power sources); and 4) mitigating the hazardous issues of smartphones’ batteries (with a details explanation of the issues). The research works are further subcategorized based on different research and solution approaches. A good number of recent empirical research works are considered for this comprehensive review, and each of them is succinctly analysed and discussed.
41 citations
Patent•
[...]
TL;DR: In this paper, a convolutional filter is applied to a plurality of input data elements represented by a two-dimensional array, with the convolver unit comprising a multipliers coupled to two or more sets of latches.
Abstract: Systems and methods for performing convolution operations. An example processing system comprises: a processing core; and a convolver unit to apply a convolution filter to a plurality of input data elements represented by a two-dimensional array, the convolver unit comprising a plurality of multipliers coupled to two or more sets of latches, wherein each set of latches is to store a plurality of data elements of a respective one-dimensional section of the two-dimensional array.
33 citations
[...]
01 Jun 2020
TL;DR: An improved scheme to mitigate the weaknesses of Challah et al. and Liu-Chang schemes is proposed in this paper, using the elliptic curve cryptography and bilinear paring and demonstrating that the proposed scheme is secure against well-known attacks.
Abstract: Wireless Healthcare Sensor Network (WHSN) has become one of the major research fields over the past decades that play a very prominent role in the medical field. Due to the rapid growth of technology in wireless communication, different security challenges have been raised in WHSN. Authentication protocols are used to secure the information transferred over the public channels by WHSN. For this prospect recently, Liu & Chung proposed an authentication and data transmission mechanism for WHSN. However, Challa et al. identified that Liu-Chung’s scheme is vulnerable to stolen smart-card, offline password guessing, privileged insider, and user impersonation attacks. Challa et al. then proposed an enhanced scheme to overcome beforehand stated flaws. This paper denotes out that in accession to before mentioned attacks, Liu-Chung’s scheme is also prone to users’ private key leakage and user impersonation attacks towards sensors. Moreover, Challa et al.’s scheme suffers from incorrectness, broadcasting problem, lack of authentication between Trusted Authority (TA) and sensor nodes, replay attack, Denial of Service (DoS) attack, forgery attack and delay in communication due to the involvement of the TA. Using the elliptic curve cryptography and bilinear paring, an improved scheme is proposed in this paper, to mitigate the weaknesses of Challah et al. and Liu-Chang schemes. The formal security analysis using simulation tool AVISPA and BAN logic demonstrate that the proposed scheme is secure. The rigorous informal security analysis also attests that our scheme is safe against well-known attacks.
31 citations