Design of low power SAR ADC in Biomedical Applications
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2013, Vol 2, Issue 7
Abstract
Power consumption is one of the main design constraints in today ICs. For systems that are powered by small non rechargeable batteries over the entire life time, such as medical implant devices ultra low power consumption is important. In these systems ADCs are key components to interface between analog world and digital domain. This project is going to address the design challenges and strategies of low power ADCs for biomedical implant devices.
Authors and Affiliations
Md. Kareemoddin , A. Ashok Kumar , Dr. Syed Musthak Ahmed
Authentication for Online Voting Using Steganography and Biometrics
In this paper an online voting authentication technique is proposed which provides biometric as well as password security to voter accounts. Voters are first identified by their facial image by using PCA. Second st...
Survey on Improving the Performance of Web by Evaluation of Web Prefetching and Caching Algorithms
Web caching and prefetching have been studied in the past separately. In this paper, we present an integrated architecture for Web object caching and prefetching. Our goal is to design a prefetching system that c...
Hippocratic Database- Persisting privacy in e- banking
Preserving the private information in the era of web is one of the most challenging issue. Web services (e-health, ecommerce, e-banking) collect data from users and use them for other purposes. Sometimes data is shar...
Low-power Full Adder array-based Multiplier with Domino Logic
A circuit design for a low-power full adder array-based multiplier in domino logic is proposed. It is based on Wallace tree technique. Clocked architecture results in lower power dissipation and improvements in...
Network Coding based Privacy Preservation Technique for Multi-Hop Wireless Networks
Privacy is one of the critical issues in multi-hop wireless networks, where attacks such as traffic analysis and flow tracing can be easily launched by a malicious adversary due to the open wireless medium. Network...