scispace - formally typeset
Search or ask a question

Showing papers in "Computer Science and Information Technology in 2010"


Journal ArticleDOI
TL;DR: Three new configurations of level shifters for low power application in 0.35{\mu}m technology have been presented and shows better performance in terms of power consumption with a little conciliation in delay.
Abstract: With scaling of Vt sub-threshold leakage power is increasing and expected to become significant part of total power consumption.In present work three new configurations of level shifters for low power application in 0.35µm technology have been presented. The proposed circuits utilize the merits of stacking technique with smaller leakage current and reduction in leakage power. Conventional level shifter has been improved by addition of three NMOS transistors, which shows total power consumption of 402.2264pW as compared to 0.49833nW with existing circuit. Single supply level shifter has been modified with addition of two NMOS transistors that gives total power consumption of 108.641pW as compared to 31.06nW. Another circuit, contention mitigated level shifter (CMLS) with three additional transistors shows total power consumption of 396.75pW as compared to 0.4937354nW. Three proposed circuit’s shows better performance in terms of power consumption with a little conciliation in delay. Output level of 3.3V has been obtained with input pulse of 1.6V for all proposed circuits.

32 citations


Journal Article
TL;DR: Each of the pre-processing stages and the chain coding process will be described in detail giving improvised algorithms, and examples of the processes on existing samples from the database shown.
Abstract: In this paper detailed descriptions of the algorithms used in the pre-processing and feature extraction phases of an offline handwritten character are discussed. In classifying handwritten characters, the stages prior to the classification phase play a role as major as the classification itself. There are many pre-processing functions and methods that can be used and different research works will use different methods. This paper discusses in detail some of the algorithms used in the pre-processing stages of an offline handwritten character image file. This paper serves as part of the whole research work that aims at recognizing handwritten characters. The whole research presents a hybrid approach of HMM and Fuzzy Logic in the field of handwritten character recognition. Fuzzy Logic is used in the classification phase while HMM is used in the process of extracting features for the preparation of linguistic variables of the fuzzy rules. However, only the preprocessing stages as employed by the research are described here. The pre-processing phase starts from reading in the input file, the process of binarization, reference line estimation and thinning of the character image for further use in the next stage of the feature extraction and recognition process. Each of the pre-processing stages and the chain coding process will be described in detail giving improvised algorithms, and examples of the processes on existing samples from the database shown. Where comparing experiments with other methods is done, the experimental results are given.

11 citations


Journal ArticleDOI
TL;DR: Wang et al. as discussed by the authors proposed a new email retrieval ranking approach based on a scoring function that depends on crucial email fields, namely subject, content, and sender, to rank the retrieved emails.
Abstract: Email Retrieval task has recently taken much attention to help the user retrieve the email(s) related to the submitted query. Up to our knowledge, existing email retrieval ranking approaches sort the retrieved emails based on some heuristic rules, which are either search clues or some predefined user criteria rooted in email fields. Unfortunately, the user usually does not know the effective rule that acquires best ranking related to his query. This paper presents a new email retrieval ranking approach to tackle this problem. It ranks the retrieved emails based on a scoring function that depends on crucial email fields, namely subject, content, and sender. The paper also proposes an architecture to allow every user in a network/group of users to be able, if permissible, to know the most important network senders who are interested in his submitted query words. The experimental evaluation on Enron corpus prove that our approach outperforms known email retrieval ranking approaches.

8 citations