Sr/No/ |
Title |
Pdf |
1 |
Process of sustainable project development with Rubik’s Cube using Game Theory interpretations
Fogarassy, C., Bakosné Böröcz M., Molnár S
Abstract —It is very difficult to calculate in advance the positive and negative long-term impacts of an sustainable investment, or a development venture. A serious global problem arises from the fact that numerous environmental-protection oriented private and government ventures are implemented in an incorrect manner significantly impair the conditions of both the environment and the economy (market). There is a high number of innovative energy related investments, waste and water management projects, etc. in Europe, which cause more harmful effects then was earlier.
Various sustainability logics can be synchronised with the 3×3×3 Rubik’s Cube’s solution algorithms, and the relations of the cube’s sides define a planning strategy that provides a new scientific approach for investment planning. We theoretically evaluated the various solution processes, and paralell investment planning levels following the solution levels and stages of the cube. After these various level-evaluations, we made „low-carbon interpretation” summaries. According to the hypothesis on the solution algorithms of the Rubik’s Cube, the parts rotated next to each other, meaning the project attributes which have an impact on each other, have a relation system which can be defined in mathematical terms, therefore, their point of balance (e.g. Nash’s) can also be determined by Game Theory models (games of finite kind, zero sum games, oligopolistic games, etc.). In this paper, we would also like to prove that the hypothesis which states that the solution algorithm of Rubik’s Cube, namely the “Layer by layer” method, can be used to model the process of project development. Also, the correspondence system of project attributes can be represented by the proper Game Theory models. This way, the various enviro- and climate-friendly investments can be realized in a well-plannable, low-risk economic environment regarding both human resource planning and the preserving and advancement of environmental criteria.
|
Download
|
2 |
Dynamic Load Balancing For Cloud Computing Using Virtual Machine
Srinivas Jangapalli, sateesh Nagavarapu
Abstract—In this paper, we present a novel privacy-preserving security solution for cloud services. We deal with user anonymous access to cloud services and shared storage servers. Our solution provides registered users with anonymous access to cloud services. Our solution offers anonymous authentication. This means that users’ personal attributes (age, valid registration, successful payment) can be proven without revealing users’ identity. Thus, users can use services without any threat of profiling their behavior. On the other hand, if users break provider’s rules, their access rights are revoked. We analyze current privacy preserving solutions for cloud services and outline our solution based on advanced cryptographic components. Our solution offers anonymous access, unlinkability and the confidentiality of transmitted data. Moreover, we implement our solution and we output the experimental results and compare the performance with related solutions.
|
Download
|
3 |
An Active Security Solution for Privacy-Preserving
Cloud Services
Srikanth Pusala, T Srikanth
Abstract—In this paper, we present a novel privacy-preserving security solution
for cloud services. We deal with user anonymous access to cloud services and
shared storage servers. Our solution provides registered users with anonymous
access to cloud services. Our solution offers anonymous authentication. This
means that users’ personal attributes (age, valid registration, successful
payment) can be proven without revealing users’ identity. Thus, users can use
services without any threat of profiling their behavior. On the other hand, if
users break provider’s rules, their access rights are revoked. We analyze
current privacy preserving solutions for cloud services and outline our solution
based on advanced cryptographic components. Our solution offers anonymous
access, unlink ability and the confidentiality of transmitted data. Moreover, we
implement our solution and we output the experimental results and compare the
performance with related solutions.
|
Download
|
4 |
An Energy Creative Flooding System In Mobile Ad-Hoc Networks
Deepak Gupta , Shreya Jain
Abstract— Along with the most energy-intensive operations in mobile ad-hoc
networks is the network-wide packet broadcasting known as flooding, which
although highly inefficient is broadly employed by routing protocols to
distribute link/node state information or route-discovery requests. Among the
schemes introduced to limit this inefficiency and improve network scalability,
Multi-Point Relaying (MPR) stands out as one of the most flexible, applicable to
both proactive and reactive routing approaches. However, its original design
based on fixed-power broadcast-mode transmission, precludes it from benefiting
unicast (including directional-antenna) and variable-power transmission
environments. We propose a family of MPR-based protocols for such environments,
and present a matter-of-fact evaluation of their energy-conserving capabilities
based on simulation models that employ the same code base used in actual network
nodes and accurate radio models based on the specifications of existing
transceivers.
|
Download
|
5 |
Survey of routing algorithms for efficient design of
Router in NOC
M.Deivakani, Dr.D.Shanthi
Abstract-With the need to integrate an increasing variety of Semiconductor
Intellectual Property (IP) blocks in a single System on Chip (SoC),
communication management becomes critical when highly diversified functions with
varying latency and bandwidth requirements must be supported in an interconnect
fabric. NoC (Network on Chip) technology simplifies the hardware required for
switching and routing functions, allowing SoCs with NoC interconnect fabrics to
reach higher operating frequencies. Routers in NOC need to have some information
about network status in order to make decisions regarding how and where to send
packets.In this paper we discusses various efficient routing algorithms to
design router in NOC
|
Download
|
6 |
Design of Rectangular Slotted Spiral dual band antenna
Rajneesh kumar
Abstract -Small size antennas are fabricated on the printed circuit board is
generally utilized with communication application. In this paper a Rectangular
spiral shape dual band antenna is proposed for mobile-satellite communication
with a wide bandwidth. The first center frequency is 1.95 GHz with the bandwidth
of 161MHz and second center frequency is 1.7 GHz with the bandwidth of 102 MHz.
Radiation pattern of this Antenna shows a bidirectional pattern with the voltage
standing wave ratio of less than two , return loss of less than -10 dB . Antenna
parameters are taken out by the computer simulation tools microwave studio. The
antenna is fabricated on Fr- 4 substrate with 4.3 dielectric constant and 1.6mm
of thickness. It is observed that the simulated and measured values of the
parameters of the antenna are quite close to each other.
|
Download
|
7 |
Availability Of Skilled Manpower On Site In Chambal Region
Richa, Saurabh Mittal
Abstract-Construction industry is depend on three basic resource such as Man,
Money and Machines. These are known as 3-M resource. Manpower can further divide
in skilled manpower and unskilled manpower. Obviously skilled manpower is
precious resource of construction industry. To objective of this research paper
for understand available of skilled manpower in construction industry in Chambal
Region. To get this aim we conduct a survey of samples companies. Result of this
paper provides knowledge of availability of skilled manpower in construction
industry in Chambal Region.
|
Download
|
8 |
Status of Agricultural Infrastructure in Uttar Pradesh: An Analysis
Aloka kumar goyal
Abstract-Uttar Pradesh is the most populous state in India and agriculture is
backbone of the state economy. But economic condition is backward. Almost 50%of
the districts are in the backward categories. Agriculture is the main occupation
and source of livelihood for rural people. In this regard agricultural
infrastructure has vital role in agricultural productivity and betterment of
standard of living of rural population and sparking point for state economy and
country as whole. The present paper deals with status of agricultural
infrastructure...
|
Download
|
9 |
Efficient and Robust Spatial Domain Image LSB Steganography
Divya Singh,Bhanu Prakash Lohani,Vimal Bibhu
Abstract-Steganography is the art of hiding information in some medium. Here we
are using image as a means for securing information for data transmission.
Spatial domain image Steganography has been used for the work because of its
compatibility to images. Objective of the paper is to increase the capacity of
hidden data in a way that security could be maintained. This paper discusses the
concept of “Digital Image Steganography” and various techniques used in image
Steganography in spatial domain. In this paper we will also discuss the
difference between image Steganography and watermarking technique. Basically
Steganography pay attention to the degree of invisibility while watermarking pay
most of its attribute to the robustness of the message and its ability to
withstand attacks of removal such as image operation (rotation ,cropping,
filtering )audio operation in the case of images of audio files being
watermarked respectively. Communication of secret information between two
entities can be achieved through steganography. The term being derived from
Greek words Steganos and graphia meaning covered writing. Steganography is an
information hiding technique where the secret information to be communicated is
embedded into a cover media such as image, video, audio and text files such that
the hacker looking at the stego image cannot even think of the existence of the
secret information and only it can be retrieved at the destination by an
authorized person.
|
Download
|
10 |
New Bounds for the Zeros of a Polynomial
M. H. Gulzar, G. M. Wani
Abstract─In this paper we give new bounds for the zeros of a polynomial
satisfying certain conditions.
|
Download
|
11 |
Single-Phase 13-Level Grid-Connected Inverter
For Photovoltaic System
Salagala Mahesh
, K. Jaya Rao, D. Mohan Rao
Abstract -This paper proposes a single-phase 13-level inverterfor grid-connected
photovoltaic systems, with a novelpulsewidth-modulated (PWM) control scheme.
Three referencesignals that are identical to each other with an offset thatis
equivalent to the amplitude of the triangular carrier signalwere used to
generate the PWM signals. The inverter is capable of producing thirteen levels
of output-voltage levels (Vdc, 5Vdc/6, 2Vdc/3, Vdc/2,Vdc/3, Vdc/6, 0,
−Vdc/6,−Vdc/3, −Vdc/2, −2Vdc/3, −5Vdc/6, −Vdc) from the dc supply voltage. A
digital proportional–integral current-control algorithm was used to keep the
current injected into the grid sinusoidal. The proposed system wasverified
through simulation.
|
Download
|
12 |
Code-Multiplexing
K.Varalakshmi, P. Prathusha
Abstract-Code multiplexed transmitted reference (CM-TR) and code-shifted
reference (CSR) have newly drawn notice in the field of ultra-wideband
communication mainly because they enable noncoherent detection without requiring
either a delay component, as in transmitted reference, or an analog carrier, as
in frequency-shifted reference, to separate the reference and data-modulated
signal reference, to separate the reference and data-modulated signals at the
receiver. We propose a generalized code-multiplexing (GCM) system based on the
formulation of a constrained mixed-integer optimization problem. The GCM extends
the concept of CM-TR and CSR while retaining their simple receiver structure,
even offering better nit-error-rate performance and a higher data rate in the
sense that more data symbols can be embedded in each transmitted block. The GCM
framework is further extended to the cases when peak power constraint is
considered and when inter-frame interference exists, as typically occurs in high
data-rate transmissions. Numerical simulations performed over demanding wireless
environments corroborate the effectiveness of the proposed approach.
|
Download
|
13 |
Optimum Gate Location In Plastic Injection Moulding Using Computer Simulation
Madigundu Sreekanth Raghuveer,
P.Hari Sankar
Abstract— Due to heavy demand in plastic products, plastic industries are
growing in a fastest rate. Plastic injection moulding begins with mould making
and in manufacturing of complex shapes. Optimal setting up of injection molding
process variables plays a very important role in controlling the quality of the
injection molded products. It is all the most important to control attribute
defects like sink marks. Sink marks are basically a “designed in” problem and
hence it is to be attended during designs stages. Owing to certain conditions
and constraints, sometimes, it is rather ignored during design stages and it is
expected to be handled by molders with only instruction to „do the best‟.
Handling of numerous processing variables to control defects is a mammoth task
that costs time, effort and money. Mould Flow analysis is a powerful simulation
tool to minimize the sink marks and to predict the production time required at
the lowest possible cost. Verification using simulation requires much less time
to achieve a quality result, and with no material costs, as compared with the
conventional trial-and-error methods on the production floor.
|
Download
|
14 |
Packet Aggregation Scheme in VOIP over WLAN For Throughput and PDR Enhancement
A.R.Paymal, K.R.Desai
Abstract— In infrastructure 802.11 WLAN networks multimedia applications need
more QoS requirements which ia getting degraded due to queuing delays,
transmission delays, traffic load and jitters. In this paper we have proposed
new packet aggregation scheme due which throughput will get increased and will
increase the QoS for multimedia or VoIP applications
|
Download
|
15 |
High Performance Matrix Multiplication Architecture Based on PPI-MO Techniques
Bhishm Jawarkar, Puran Gour, Braj Bhihari Soni
Abstract— Matrix multiplication is the kernel operation used in many transform,
image and discrete signal processing application. We develop new algorithms and
new techniques for matrix multiplication on configurable devices. In this paper,
we have proposed three designs for matrix-matrix multiplication. These design
reduced hardware complexity, throughput rate and different input/output data
format to match different application needs. These techniques have been designed
implementation on Virtex-4 FPGA. Wehave synthesized the proposed designs and the
existing design using Synopsys tools. Interestingly, the proposed
parallel-fixed-input and multiple-output (PPI-MO) structure consumes 40% less
energy than other two proposed structures and 70% less energy than the existing
structure.
|
Download
|
16 |
Design and Development of Portable Insulin Syringe Based on MSP430 MCU
Mr.Rajesh R.Dodake, Dr.Prof.Mrs.S. Subbaraman , Mr.Vikas.D.Patil
Abstract—This Paper gives details of the design of an ultra-low power portable
insulin syringe system based on advanced microcontroller MSP430 which is capable
of calculating and delivering insulin depending on sugar level. The motivation
behind the project was the need for a small, portable and ultra-low power
insulin delivery system that is built from commercially available electronic
components, to help the research of diabetes patient caring. There are many
advantages of portable insulin pumps for diabetes patients, but most of them
were designed as wearable devices which must be wearing continuously. These were
either never commercialised or are far too complicated to be used in academic
researches. The design considers practical constraints as a portable device in a
multitude of environments, aiming to satisfy developers’, researchers’, and
users’ needs for reliability, power efficiency, ease-of-use, and a functional
development environment. The paper starts with the specifications that point out
the most important respects of the hardware and software design. It gives
advantage of the capabilities of the ultra-low power chip architecture along
with idea of how the whole system performs in the real environment.
|
Download
|
17 |
An Implantable Embedded Chip For Monitoring The Immunity Levels
Sangeeth Raj A E J, Salmaan N, Usha Rani J
Abstract- In this paper our aim is to provide an accurate count of the WBC cells
in our body by implanting micro-embedded chips at eight places of bone marrows
and two places of right arm forearm and left arm triceps in our body. This
system is used for counting the WBC’S it can perform in any places not only in
Health care. Even an ordinary citizen can able to operate this embedded system.
The time required for processing this system will be less within microseconds
and also we can able to get a perfect output. It can be used for real time
applications.
|
Download
|
18 |
Proposal For New Aggreagation Scheme in WLAN For Multimedia Applications
A.R.Paymal, K.R.Desai, S.P.Patil
Abstract— In infrastructure 802.11 WLAN networks multimedia applications need
more QoS requirements which ia getting degraded due to queuing delays,
transmission delays, traffic load and jitters. In this paper we have proposed
new packet aggregation scheme due which throughput will get increased and will
increase the QoS for multimedia or VoIP applications
|
Download
|
19 |
Effect of Yoga Training Program on the Mental Health of Female Basketball Players
Kavita Sharma
Abstract-The purpose of the present study was to know the effect of yoga
training program on the mental health of the female basketball players of Delhi
University. 100 female players were selected from Delhi University with minimum
intercollegiate level participation from the year 2010-2014. The subjects were
selected through purposively sampling method. 50 subjects were assigned to an
experimental group and 50 subjects were assigned to control group. The
experimental group was administered yoga training program (4 days in a week) for
a period of 12 weeks. There was no practical training given to control group.
Before and after training of yoga, mental health was measured by mental health
questionnaire. The collected data was analyzed by Descriptive statistics, paired
sample‘t’ test and independent sample‘t’ test. Results show that there was
significant difference between experimental group and control group.
|
Download
|
20 |
Selective Jamming Attack Prevention Algorithm In Pocket Delay Networks
G Kumara swamy, S Anjaneyulu,Santhosh Kumar seelam
Abstract- This paper
discusses exclusively the role of jamming at the Trans port/Network layer. The
Link/Physical layer provides a sensing and jamming service. The jamming service
is defined as jamming for abased attacks. In this paper we consider encrypted
victim networks in which the entire packet including headers and payload are
encrypted and thus the attacker can not directly manipulate any of the victim
communication. We analyze the security of our methods and evaluate their
computational and communication overhead.
|
Download
|
21 |
Experimental Evaluation Of Impact Strength Of Chemically Extracted Elephant Grass -Fibre Polyester Composites
Ch.Ramprasad, Ch.Vasantha Lakshmi, D.J.johnson, A.V.Ramana Rao
Abstract-Natural fibres have played a significant role in human civilization
since pre historic times with human having depended on them for garments and
simple domestic uses as well as complex uses such as land dwelling, military,
marine engineering etc. The conventional applications of natural fibres in
relation to the technology of synthetic fibre composites for industrial
applications. The natural fibre reinforced composites have the advance of being
light weight, renewable, bio-degradable, cheap and eco-friendly compared to the
synthetic fibres like grass, graphite etc. So there is every need to investigate
potentially of natural fibres and its composites, which can be used in highly
demanding situations. However, very small contribution of research work exists
in the design and fabrication of composite materials using natural fibres. An
attempt has been made to explore the possible use of variety of cultivated and
wild grown fibres in nature in the development of new composites for load
carrying structures. The objective of the present work is Elephant grass fibre
is identified as potential reinforcement for making composites. It is one of the
important raw materials obtained from the Elephant grass. Unsaturated polyester
resin is selected as a matrix material due to its availability, low cost and
easy to mould at room temperature. The fibre is extracted by using NAOH
treatment. The standard test method ASTM D 256M for impact testing has been used
for preparation and testing the impact properties of unidirectional composite
specimens. The impact strength of the composites increases with increase in
fibre loading and is 296.9 at 0.32 volume fraction of fibre. Impact strength of
the composite is 238.5 J/mt for the mass of fibre of 1.75 grams at V.F=0.27995,
200.4 J/mt for mass of fibre of 1.5 grams at V.F=0.21476, 164.0 J/mt for mass of
fibre of 1.0 grams at V.F=0.17312, 110.48 J/mt for mass of fibre of 0.5 grams at
V.F=0.11214.The value of impact strength of composite with out fibre is 31.62
J/mt.
|
Download
|
22 |
Harmonic distortion analysis of induction motor drive with advanced multilevel control strategy using photo voltaic system
Srinivas Naalla
,
Syed Karimulla
Abstract-This paper shows that versatile stand-alone photovoltaic (PV) systems
still demand on at least one battery inverter with improved characteristics of
robustness and efficiency, which can be achieved using multilevel topologies. A
compilation of the most common topologies of multilevel converters is presented,
and it shows which ones are best suitable to implement inverters for stand alone
applications in the range of a few kilowatts. The harmonics content of the
output signals are analyzed. Two types of harmonics are investigated for
induction motors: space harmonics and time harmonics. Space harmonics are
generated due to the different phase windings interaction when the power supply
is sinusoidal and they can be reduced by applying a proper machine design. A
simplified Pulse Width Modulation (SPWM) method for a multilevel inverter that
supplied an induction motor is developed. The controller equations are such that
the SPWM pulses are generated automatically for any number of levels.
|
Download
|
23 |
A Survey on Text Mining, its Techniques and Applications
Shweta Gupta, Kirti Joshi
Abstract-The process of Text mining is used to extract knowledge from large text
documents. Text mining is becoming an important research field because it is
necessity to extract knowledge from the huge volume of text documents available
especially on the Web. Text documents can be in any form like e-mails, books,
journal papers, E-libraries, news articles and so on. Although data mining and
text mining seems to be similar terms but they are different at many issues,
mainly, on the type of data both can handle. This review paper explains what
text mining is and how data mining and text mining can be distinguished from
each other. It also explains how text mining works and what are the different
techniques used to implement text mining and areas where it can be applied.
|
Download
|
24 |
Review on the classification of emotions in Speech
Gurpreet Kaur, Abhilash Sharma
Abstract— Automatic speech emotion recognition is a process of recognizing
emotions in speech. This has wide applications in the area of phsycatrics help
and in robotics.the human computer interaction the challenging area of research.
Any effective HCI system has two sections Training and testing. The techniques
used in the system are feature extraction and classification.This paper focuses
on the survey of the various classification techniques and feature extraction
techniques implemented in the speaker emotion recognition.
|
Download
|
25 |
Performance Based Plastic Design Of RC Moment Resisting Frame
Gaurav D. Patel, Prof. Jasmin Gadhiya, Prof.hitesh Dhameliya
Abstract -In today’s era the objective of limiting excessive damage and to
maintain functionality of the building after an earthquake is becoming more
desirable. In order to forecast damage to a structure in an earthquake,
performance based design method has been recently developed to achieve enhanced
performance of earthquake resistant structures. It is based on the “STRONG
COLUMN-WEAK BEAM” principle. The design concept uses pre-selected target drift
and yield mechanism as performance criteria. The design base shear for selected
hazard level is determined by equating the work needed to puss the structure
monotonically up to target drift to the corresponding energy demand of an
equivalent SDOF oscillator. Plastic design is performed to detail the frame
members and connection in order to achieve intended yield mechanism and
behavior.
|
Download
|
26 |
Missing People Identification Using Online Social Networks
Mr. N Ramojirao, Mr. R Anilkumar, Mr. B Srinivas, Dr. P. Satheesh
Abstract—Disaster management is the initiative for any mishap that generally
occurs. People aim in attempting different methodologies for finding their
beloved ones, who are missing during mishap. Missing in general, may occur for
many reasons. Disaster may not be the only reason for all the cases that has
been recorded under missing. The advent effort of the social networks has been
taken as a promising aspect for this management. The present paper proposes the
advent usage of different levels of searching algorithms at different stages on
par of information that one persist regarding the person who is claimed to have
been missing. The first stage correlates to the usage of certain string
algorithm like Tuned Boyer-Moore (TBM), which has been used to match person
information either on basis of first or last names. The next stage hails with
the aspect of dealing with certain effigy based algorithm like Linear
Discriminant Analysis (LDA), which works on the image of the person that is
present in the information that has been quoted on the social network.
|
Download
|
27 |
ARM Based Research of Roots Flow Meter using Zigbee Technology
B.Chitanya, A.Suvir Vikram
Abstract-This paper introduces an intelligent roots flow meter based on ARM
Cortex-M3 processor and C/OS-II embedded real-time operating system. ARM
Cortex-M3 processor is an industry-leading 32-bit processor with lower power
consumption and higher performance than other 8-bit or 16-bit processors. In
roots flow meter gas flow, pressure of the flowing gas and temperature is sensed
using corresponding sensors. Sensor continuously monitor at the effect of the
different pressure of gas flow. Then the gas flow is expelled from the little
space continuously Then the data is processed by the ARM processor at the
instantaneous flow rate, temperature and integrated pressure is display on the
LCD screen Using the C/OS-II embedded real-time operating system, it will
compensate the temperature and pressure of the roots flow meter more instantly.
What's more, it makes communication and networking easier by using ZigBee
technology.
|
Download
|
28 |
An Advanced Secret Sharing Method for Authentication of Gray Scale Document Images with the Use of PNG Image and Self Repair Capability
S.Yallamandaiah, B.Baloji Naik, B.Vagya Naik
Abstract- Digital images are mostly used to protect confidential & important
information. But the problem is providing authentication and integrity to these
digital images is a very challenging task. Therefore using this paper a new
efficient authentication method is proposed to provide for grayscale document
images using the Portable Network Graphics (PNG) image with verification and
data self repair capability. In this concept an authentication signal generated
by each block of a grayscale document image and then using Shamir secret sharing
scheme grayscale document image authentication signal and binarized block
content is combined and transformed into several shares. These several binarized
block content shares are then combined into an alpha channel plane then the PNG
image is built from combining the grayscale image with alpha channel plan. The
authentication signal measured from the current block content does not match
that extracted from the shares embedded in the alpha channel plane then that
image block is tampered. If the authentication process fails then repairing is
done in each tampered block, after collecting two shares from unmarked block
using reverse Shamir scheme. Security of data provided by sharing of data in the
alpha channel and encrypting the stego image. Then using reverse Shamir scheme,
two shares from unmarked blocks are collected and then data repairing is
applied. Finally simulation results are provided to prove the concept of
proposed method.
|
Download
|
29 |
An optimised implementation of steganography with two level of security
Lokesh Vishwakarma, Shivam Khare
Abstract—Steganography is a kind of security technique present days; the way and
art of hiding the existence of a message between sender and dedicated recipient.
Steganography has widely used to hide secret data in various types of files, may
be audio, digital images or video. The three most defined parameters for audio
or image steganography are imperceptibility, robustness and its payload[3].
Various applications have their specific requirements for the steganography
approach used. This paper aims to give an new method of image cum audio
steganography, its applications and techniques. Paper work is an presentation of
Audio and Image Steganography for the some plaintext, paper work also uses three
isolated key and three layer of data protection, the overall avalanche in
plaintext is very high in present paper work.
|
Download
|
30 |
Design and Implementation of Speed Efficient MAC Unit Based on Ancient Vedic Multiplication Technique
Mr. Yogesh Kumar, Mr. Kanak Kumar, Mr. Santosh Yadav
Abstract—This research work is devoted to design high speed thirty two bit
Multiply Accumulate Unit. MAC Unit is the key element of digital signal
processors to perform various sophisticated tasks like as FFT, DFT, resolving
various complex equations and Convolution etc. along with this it is also used
in various configurations like as IIR, FIR etc. Every digital domain based
technology depends upon the operations performed by MAC Unit either partially or
whole. Speed is the most prominent factor of processor and controllers being
used recently. That’s why it is highly required to design high speed MAC, which
can enhance the efficiency of those modules which lies upon the operations
performed by MAC. The speed of MAC greatly depends upon the speed of multiplier.
At algorithmic and structural level there are so many multiplication algorithms
exist now-a-days. After a thorough study and proper analysis we have seen that
Vedic multiplication technique is the best algorithm that gives much better
result in comparison to others in terms of speed. Further we have analyzed
different existing Vedic multiplication hardware, and compared those with
respect to speed. And found that the Vedic multiplier with Carry Save Adder
gives better outcome. Then we have proposed that multiplier for the MAC unit
design. This proposed MAC Unit is able to perform different arithmetic
operations at high speed. All sub-modules in the MAC unit has been designed in
combinatorial form. And integrated in the final module, in which we have
provided the reset and clock functionality to have better control on the
circuitry. To design proposed multiply accumulate unit verilog hardware
description language (HDL) has been used. To design operational sub-modules data
flow modeling and to integrate these modules behavioral modeling style has been
used. For this design the target FPGA belongs to Spartan-3E (family), XC3S500E
(device), FG320 (package) with speed grade of -5. For synthesis purpose Xilinx
synthesis tool (XST) of Xilinx ISE-9.2i has been used. For the behavioral
simulation purpose ISE simulator has been used.
|
Download
|
31 |
Intelligent Smart Grid Based
Fully Automated AI System
Anil Chaudhary, Karan Kumar, Mahaveer Singh
Abstract—The conventional smart grid is based on large, centralized power
stations that supply end-users via long- established, transmission and
distribution systems. Over the years it has performed very well in delivering
secure and reliable power. But in this time consumers have different demand
profiles and generators have different volatilities. So these traditional power
grids have no. of challenges. These challenges will require research within the
artificial intelligence (AI) communities to make smart grid intelligent. We need
an intelligent smart grid that can receive power of all qualities from all
sources – both centralized and distributed – and deliver reliable supplies, on
demand, to consumers of all kinds. Intelligent Smart grids will grow through
evolution rather than revolution. We expect to see a gradual transformation of
the systems that have served us for many years into a more intelligent, more
effective and environmentally sensitive network to provide for future needs.
This paper presents a vision of the smart grid in transmission and distribution
system, which will be fully automated based on artificial intelligence (AI).
|
Download
|
32 |
QoS improvement in Mesh networks using Adaptive Channel Assignment, Scheduling and Routing protocols
G. Sunil Dayakar, G. Srinivasrao
Abstract—In wireless mesh networks (WMNs) the most widely used random channel
access mechanisms are IEEE 802.11 DCF and EDCA. These two mechanisms are based
on CSMA/CA and inefficient to eliminate effectively hidden terminal and exposed
terminal problems. In this paper, we propose a set of efficient multi-radio
multi-channel (MRMC) assignment, scheduling and routing protocols based on Latin
squares for WMNs with MRMC communication capabilities, called ‘‘M4’’, i.e., the
Multiple access scheduling in Multi-radio Multi-channel Mesh networking. M4 uses
nodal interference information to form cliques for inter-cluster and
intra-cluster in WMNs, and then applies Latin squares to map the clique-based
clustering structure to radios and channels for communication purposes. The M4
again uses Latin squares to schedule the channel access among nodes within each
cluster in a collision-free manner. We also design the corresponding MRMC
routing to support M4 communication. Simulation results show that M4 achieves
much better performance than other channel access control protocols.
|
Download
|
33 |
Throughput and end to end delay analysis of UMA using WiFi
Mr. R. D. Bhosale, Mr. A. R. Nigavekar
Abstract—Making voice calls for faster information exchange is showing its
increasing demands day by day. IP telephony is sensible in the view to provide
such platform. IP telephony in heterogeneous network environments can prove its
dominating characteristics while working on IP platform as compared with circuit
switched network. Interface using SGGN gateway for IP telephony, to provide
channel to all WiFi users to make voice calls to GPRS mobile user, can provide
ultimate solution for the need. In the existing EPBX system this can be used as
add-on feature. Data traffic on existing GPRS networks have proved reliability
in terms of less delays and cheaper way of information exchange. At the same
time VoIP on WiFi network is showing increasing demand for corporate VPNs today.
Interconnecting these two will provide more reliable and single device-multi
interface platform and add more flexibility to its users. Unlicensed mobile
access using WiFi can provide such integration of different networks together.
The analysis has been done by simulating unlicensed mobile access (UMA) on NS2.
Analysis indicates that the system can perform better for maximum number of
users with less end to end delays and optimum throughput.
|
Download
|
34 |
Performance comparison of Wind Energy Conversion System fed to Back-to-Back Converter and Matrix Converter
B.Sunil, J.Nagarjuna Reddy, and B.M Manjunatha
Abstract—Normally the output of the wind energy conversion system is directly
connected to load or grid. For this purpose, we use power electronic converter
circuits. In this paper, we use a matrix converter connected to the wind energy
conversion system which helps in improving the terminal voltage and frequency
control in induction generator, for all wind velocities. For enhancing the power
captured from the wind, the shaft need to be controlled. Power electronic
converters are used to interface the induction generator with the grid and
maximize the power captured from the wind. The wind energy conversion system is
compared using the topologies; back-to-back converter and matrix converter. The
simulation results of wind energy conversion system are compared when connected
with the back-to-back converter and matrix converter.
|
Download
|
35 |
Closed Loop Control Of Ac-Dc Converter Using Single Switch
P. Divya, L. Bhanu Ganesh
Abstract—This paper presents a transformer less ac/dc converter which can be
used in voltages between 90- 230 Vrms. Instead of a transformer, this topology
consists of a buck dc/dc converter and a buck boost dc/dc converter. By the
absence of transformer, reduce the complexity of converter and it is cost
effective. Buck dc/dc converter keeps o/p voltage below the line voltage; limit
the leakage current. By controlling the circuit with feedback, we can increasing
the efficiency and reduce total harmonic distortion. Output voltage is 40 V with
THD 12.36%. And output current is near 4 A. For further modification a feedback
PI controller is used. After using PI controller THD is reduced to 6.231%.Thus
using controlled circuit harmonic content is reduced and efficiency is improved.
Working of the proposed circuit and verification by simulation results are
discussed in this paper. Simulation is done in MATLAB.
|
Download
|
36 |
Fpga Design Of Low Power High Performance Architecture For Motion Estimation
T. Suganya Thevi, C. Chitra
Abstract—The existing methodology provides low power consumption and will not
tolerate errors in the computation of SAD (sum of absolute difference) process.
The EDDR (Error detection and data recovery ) architecture is proposed based on
residue –and- quotient (RQ) code and integrated with motion estimation engine in
order to reduce error rate and power consumption. The error in PEs which is the
key component in motion estimation can be detected and recovered effectively by
the proposed EDDR design. Motion estimation explores the temporal redundancy,
which is inherent in video sequences, and it represents a basis for lossy video
compression. Other than video compression, motion estimation can also be used as
the basis for powerful video analysis and video processing.
|
Download
|
37 |
A Survey on Routing Protocols in Wireless
Sensor Network
Vishal Chhabra, Gunjan Gandhi
Abstract—In wireless sensor networks (WSNs), the deployment of massive numbers
of small, inexpensive, low energy sensor nodes are random in nature. Therefore
energy consumption reduction is very important. Wireless Sensor Networks with
hundred to thousand of sensor nodes can gather information from unattendant
environment transmit the gathered information to the specific user depending on
the user end application. Information transmitted from one node to another node
using different routing protocols. So routing protocol has now become one of the
hot research in wireless sensor networks. In this paper we present a survey of
state-of-the-art routing protocols in WSNs along with architecture of the
wireless sensor network. Further we categorize routing protocols according to
some factors and summarize on their mode of operation. At the end, we go through
a comparative study on these protocols.
|
Download
|
38 |
Automatic News Extraction Using Hierarchical Clustering
Anish Gupta,Bhanu Prakash Lohani,Pradeep Kumar Kushwaha
Abstract—In today’s era, web newspapers are a rich source of information. User’s
need is to find the specific information content. But users sometimes may not
exactly know what they are looking for. In order to find the interesting news
article from the large database, various studies have been devoted to data
mining, text mining, web news mining and various other knowledge discovery
techniques in the past years. To benefit more from the available information,
term mining techniques are also applied. With the increasing amount of number of
news sources, utilizing extracted information in deciding about the relevant
news becomes increasingly urgent and difficult. Frequent term clustering [2] can
be used to cluster large sets of news articles. The well-known methods of
clustering do not really address the special problems of clustering: very high
dimensionality of the data, very large size of the databases and
understandability of the cluster description. This paper will discuss the novel
approach of hierarchical clustering algorithm for frequent term based
clustering. Hierarchical clustering organizes news (clusters) into a tree or a
hierarchy. The parent-child relationship among the nodes in the tree can be
viewed as a topic-subtopic relationship.
|
Download
|
39 |
Visual Tracking With Sapatio-Temporal Context Model
Shipra Vats, Sandeep Gupta
Abstract—Visual tracking is a challenging problem, because the target frequently
changes its appearance, randomly move its location and get occluded by other
objects in unconstrained environments. Moving object or target in the video
changes it state continuously in space with time. Also, other factor i.e.
brightness, color intensity and multiple objects heavily effects the moving
target tracking task. There are many existing methods and algorithm which tracks
the object but not robust to above mentioned factors. So, there is a need to
design an algorithm that must be robust to these problems. . In this paper we
discuss about various tracking techniques and a robust technique is presented
which is based on space time context model. Tracker based on this model
completes the tracking task in unconstrained environments.
|
Download
|
40 |
Speed Control Of Induction Motor Drive Using Seven Level Diode Clamped Inverter
K.Hari, K.Kishore Reddy
Abstract—The main aim of this paper is to control the speed of an induction
motor by using seven level diode clamped inverter. To obtain quality of
sinusoidal output voltage with reduced THD. The proposed Scheme for seven level
inverter is multicarrier SPWM control. Speed control can be achieved by using
constant V/ƒ method. This constant V/ƒ method can be implemented by changing the
supply voltage and frequency applied to the induction motor at constant ratio.
This system is replacement for the conventional method which has high THD and
high switching losses, it results a poor drive performance. This simulation
result shows the effectively control the motor speed. The performance of the
drive can be validated using SPWM technique in terms of Total Harmonic
Distortion (THD). The effectiveness of this system is verified through using
MATLAB Simulink.
|
Download
|
41 |
Feedback Collision Detection By Multiuser
Diversity In Wireless Network Using
Recurrent Cluster Rifting (RCR) Algorithm
C.Chitra, Mr.S.Venkateswaran, K.M.Fathima Jahanas
Abstract— An ultimate goal in wireless network is to
detect the feedback collision occurred in the multiuser
environment. Though it is difficult to detect the
feedback collision,we proposed an algorithm called
Recurrent Cluster Rifting (RCR).In this we fix a
threshold value (constant value) based on the number of
users in the multiuser environment.This value is
otherwise known as feedback threshold.If nouser in the
multiuser environment send the feedback,there will be
some adjustment in the threshold value(i.e.)this
algorithm will lower the value.Therefore if there is any
feedback collision occurs in the multiuser environment
there will be no change in this value but this algorithm
will rift the users recurrently to detect the collision and
find the certified user involved in this collision.After
detecting the collision we use two schemes namely
Bandwidth Efficient Scheme(BES) and Switching
Efficient Scheme (SES) to avoid the collision occurred
during retransmission of data with lower bandwidth in
this environment.
|
Download
|
42 |
Topology Manage With Cellular Ad Hoc Sites Along With Cooperative Communications
Bammidi Divyajyothi, P.K.Sahu
Abstract-Cooperative connection has acquired incredible attention regarding wi-fi systems. Nearly all active performs with cooperative communications usually are dedicated to link-level actual physical layer concerns. Consequently, the influences involving cooperative communications with network-level top layer concerns, including topology handle, direction-finding along with circle volume, usually are mainly overlooked. In this posting, we all offer any Capacity-Optimized Cooperative (COCO) topology handle plan to enhance the circle volume with MANETs through collectively thinking of equally top layer circle volume along with actual physical layer cooperative communications. By way of simulations, we all display that will actual physical layer cooperative communications get substantial influences around the circle volume, along with the pro-posed topology handle plan can substantially improve the circle volume with MANETs having cooperative communications.
|
Download
|
43 |
A Review on Security Challenges of Big Data
A V S M Adiseshu, S Lavanya Reddy, P Hasitha Reddy, Roshini K
Abstract-Innovations in technology and greater affordability of digital devices have presided over today’s Age of Big Data, an umbrella term for the explosion in the quantity and diversity of high frequency digital data. These data hold the potential as yet largely untapped to allow decision makers to track development progress, improve social protection, and understand where existing policies and programmes require adjustment. Big data implies performing computation and database operations for massive amounts of data, remotely from the data owner’s enterprise. Since a key value proposition of big data is access to data from multiple and diverse domains, security and privacy will play a very important role in big data research and technology. Hence Big Data faces security issues and challenges for controlled and assured sharing for efficient direct access. The objective of this paper is to make effective use of big data requires access from any domain to data in that domain, or any other domain it is authorized to access with security is a challenge.
|
Download
|
44 |
Queueing Concepts On Health Care Analysis
P.Swamynathan, G.Eswara Prasad, V.S.Mathu Suresh
Abstract-A multi-server queuing situation in health care center is considered.
The arrival and service patterns of patients in two different units are
discussed. The expected number of patients waiting for service and the
probabilities of waiting time are computed numerically and the curves are
exhibited.
|
Download
|
45 |
Design of Speed and Area Efficient 16-bit pipelined
RISC with Harvard Architecture
Mrs. Varsha Pandey,Mr. Utsav Malviya, Prof. Vinod Kapse, Mr. Abhishek Gupta
Abstract-This thesis work is devoted to design speed and area optimized fully
functional 16-Bit 5 phased pipelined harvard RISC processor. All of us know that
there are two types of processors mainly available in the market; those are RISC
(Reduced Instruction Set Computer) and CISC (Complex Instruction Set Computer).
RISC and CISC processors were always the hot topics of debate, but still no
conclusion has been drawn till now, that which one better is than another. RISC
is advantageous in many aspects than the CISC processor as it uses reduced or
small number of instructions to perform any action than CISC processors does.
RISC processor is a digital processor which is called as the heart of the many
digital devices. By optimizing speed and area of this processor, overall
efficiency of those digital devices can be enhanced which are mainly based upon
this processor. RISC processor works upon harvard architecture. In harvard
architecture program and data are separated so that different data width can be
chosen. Along with this digital signal processors can execute most instructions
in one clock cycle. This is due to the strong, additional parallelism in the
hardware structure maintained using pipelining. But there is always a problem of
stalling in pipeling with RISC that is resolved using Harvard register
Architecture (also having minimal structural and data flow hazards). To remove
this issue a LIFO stack (8bit width) is inserted, which in the routine receives
the data prior to the entry (subroutine interrupt). Another method that has been
used is to save the register and the jump address when a subroutine call or an
interrupt request occurs. We also have used register shadowing to save register.
To design proposed RISC Processor VHDL hardware description language (HDL) has
been used. To design operational sub-modules data flow modeling and to integrate
these modules behavioral modeling style has been used. For this design the
target FPGA belongs to Spartan-3E (family), XC3S500E (device), PQ208 (package)
with speed grade of -5. For synthesis purpose Xilinx synthesis tool (XST) of
Xilinx ISE-9.2i has been used. For the behavioral simulation purpose ISE
simulator has been used.
|
Download
|
46 |
Quick Review on Channel State Estimation in
Cognitive Radio System
Mr. Om Prakash Mishra,Mr. Sanjay Sharma
Abstract-After a thorough study we have seen that Now-a-days problem of spectrum
scarcity increased due to tremendous growth of new players in wireless base
system by the evolution of the radio communication. This problem occurs because
there are many areas of the radio spectrum that are occupied by authorized
user/primary user (PU), which are not fully utilized. Cognitive Radio is an
emerging concept to resolve this problem, which proves as the next generation
wireless communication system that proposed as a way to reuse this
under-utilized spectrum in a non-interfering and opportunistic basis. A CR is an
entity in a wireless communications environment that senses its tracks changes,
environment, and reacts upon its findings and frequently exchanges information
with the networks for secondary user (SU). However, CR facing collision problem
with tracks changes i.e. reallocating of other empty channels for SU while PU
arrives. In this paper we have discussed different approaches followed to
perform Channel Estimation. Our main research objective is to utilize spectrum
hole efficiently for data transmission and reception, which is an opportunity
for unlicensed user (as a Secondary User) under licensed user as a Primary
User). In this work channel state estimation is observed by energy detection (as
opposed to feature detection—requires prior knowledge of the PU’s Signal and
transmission or reception is carried out in a multiple spectrum hole for lower
probability of communication loss.
|
Download
|
47 |
Channel State Estimation in Cognitive Radio System
Using Energy Detection Scheme
Mr. Om Prakash Mishra,Mr. Sanjay Sharma, Mr. Abhishek Gupta
Abstract-Recently, spectrum sensing and channel estimation has been intensively
studied as a key technology in realizing the cognitive radio. Many researchers
and scientists has worked upon it and presented multiple techniques, to improve
the performance of spectrum sensing and channel estimation. After a deep study
we have seen that for implementation of CR System, any transceiver’s Energy
Detection unit can be used and that would be much efficient and reliable. We
have worked upon energy detection schemes, to measure these attributes use of
Region Of Curvature has been proposed by us. In this paper, we have discussed
various aspects of Cognitive radio systems, after which we have proposed the
channel estimation based on Energy detection, in which the un-utilized channels
and utilized channels are compared and discriminated based on their energy
levels on real time basis. Then we have given the code summary and simulation
results for our proposed work.
|
Download
|
48 |
Smart Card System with High Authentication Technology
Jamuna.P, Sivasangari.G, Tamilselvan.K
Abstract- The Paper develops the Automatic Teller Machines process. Now a day’s
usage of banking sector is essential to the people with a help of ATM Cards. In
the Proposed systems multiple ATM cards are merge into a one card is smart Card.
ARM7 plays a vital source and execute a certain task in a Efficient Process. The
Ethernet standards comprise several wiring and signaling variants of the OSI
physical layer in use with Ethernet. Host computer is user side. Packets are
transfer server to domain with a help connection establishment.LED display
improve the clarity of color contrast. Efficiency of These display improve the
quality. And reduce the power consumption. Vein authentication system is a type
of security system.
|
Download
|
49 |
SOFT #gα-CLOSED Sets And
SOFT #gα-CONTINUOUS Functions
Dr.V.Kokilavani, D.Sindu , M.Vivek prabu
Abstract-We introduce a new class of soft sets namely soft #gα-closed sets and
study some of their properties in soft topological spaces. We introduce a new
space namely soft T#a space using soft #gα-closed sets. We also investigate the
concept of soft #gα-continuous functions and soft #gα-irresolute functions.
|
Download
|
50 |
Analysis of Fuzzy Queues with Bulk Service
Dr. G. Easwara Prasad, D. Jayalakshmi
Abstract-This paper proposes a general procedure to construct the membership
functions of the performance measures in fuzzy queuing systems with bulk service
when the interarrival time and service time are fuzzy numbers. The basic idea is
to reduce a fuzzy queue into a family of crisp queues[11] by applying the -cut
approach. A Mathematical investigation has been made of a simple queueing
process in which customers arrive at random, form a single queue in order of
arrival, and are served in batches, the size of each batch having a fixed
maximum. Triangular fuzzy numbers are used to demonstrate the validity of the
proposal. Numerical examples are illustrated successfully.
|
Download
|
51 |
Investigations on VoIP for a mobile WiMAX
Communication Network
Manjotinder Singh Grewal, Rupinder kaur Gurm
Abstract-Voice over internet protocol refers to the transmission of telephone
traffic over IPbased networks. Voice transmission over internet is also called
internet protocol (IP) telephony. IP telephony has gained wide popularity and
has become an important services on the internet. The use of IP telephony became
real due to the high bandwidth available on the internet and its low
implementation cost. Digital form of communication has further led to its vital
use. Due to above reasons, voice communications using the IP, is also called
Voice over IP or VoIP, has become attractive. The simultaneous transport of
voice and data over the internet has already been demonstrated using 3G
networks. This paper presents the performance evaluation of a WiMAX network. In
this paper only dynamic conditions for the application voice over IP has been
considered.
|
Download
|
52 |
A Distant Diagnostic and Therapeutic Technique
for Patients’ Away from Doctors
Ganesh Babu. P, Abdul Salam Rasmi. A, Arun Pakash. K, Christo Baby, Dinesh Kumar. V
Abstract- Recently, telecommunication has become
one of major useful system for transmitting data’s. This research mainly deals
with the transmission of data’s from the patients’ towards the Doctor Therefore
this study includes collections of signals and all Health care information’s to
help the doctor analyze the patient .This proposed technique also uses GPRS,
sensors and embedded systems, Through which this technique adopts continuous
collections ofvarious information mainly ECG signal, BP, SPO2 and also relayed
on abnormal pulse generation for chronic diseases. A prototype is also implanted
which can offer high healthcare standard with major source of cost
reduction.Also through which the conditions of the patients can be transmitted
instantly towards the patients’ family.
|
Download
|
53 |
A Novel Efficient Technique for Contention Reduction In Wide Fan-In Dynamic OR Gate
Jai Krishna Goswami, Anshul Jain
Abstract- Register
file structures in modern microprocessors usually employ wide fan-in dynamic
CMOS OR gates. Weak keepers have been traditionally used to resolve the low
noise margin problem of dynamic CMOS design. Aggressive scaling trends in CMOS
design have reduced the effectiveness of this weak PMOS keeper. On the other
hand large sized PMOS keeper used in wide fan-in dynamic OR gate results in
contention between the pull down network (PDN) and the keeper. As a consequence
of contention there is an unnecessary increase in power dissipation and loss in
performance. In this paper a new keeper design is proposed which is capable of
reducing the contention between the keeper and PDN and hence capable of reducing
the power dissipation and delay. Simulation results at 50nm shows that the power
dissipation and delay have been reduced by 40% and 35% respectively as compared
to the wide fan-in dynamic OR gate with conventional keeper.
|
Download
|
54 |
ON SOFT g#α-SEPARATION AXIOMS
Mrs.V.R.Karuppayal, M.Malarvizhi
Abstract-
In this paper, we introduce soft g#α-closed sets in soft topological spaces and
discuss some of its properties. We also introduce four new type of spaces namely
soft Ta , soft Tb, soft Tc, soft Td spaces and soft g#α-continuous functions and
soft g#α-irresolute functions and study some of their properties.
|
Download
|
55 |
Characteristic Evaluation of Wear Properties of NiTiAl Based Shape Memory Alloys for different Composition
Babu K N, Mallikarjuna Biradar, Dr. N G S Udupa, Rudra Naik M, Santhosh N
Abstract- Alloying constituents have a remarkable effect on the shape memory
effect of Ni-Ti (Nitinol) based Shape memory alloys that have a rear distinction
of having extremely effective characteristics as compared to other shape memory
alloys. The transformational behavior of these shape memory alloys are unique
and found to have an impact on biomedical applications. In our Present work the
wear characteristics of Ni-Ti-Al based shape memory alloys were effectively
studied for different compositions and the specific wear rate, hardness values
were noted for as cast and heat treated samples. The results of the work has
shown remarkable increase in hardness and wear characteristics of the shape
memory alloys subjected to heat treatment and subsequent aging.
|
Download
|
56 |
Characterization of High performance Al 5083/SiCP/Fly ash hybrid metal matrix composite for advanced Aerospace Applications
Dr U N Kempaiah, Santhosh N, D Harshith Kumar, Amogh H Chelgeri,Vishnu P,
Amogh H Chelgeri
Abstract- The
present work involves the development of hybrid Metal Matrix Composite materials
by combining the desirable attributes of Metals, Ceramics and Industrial waste.
Usually, when at least two reinforcement phases are present, it is called a
hybrid composite and our work predominantly concentrates on characterization of
these hybrid composite materials. Aluminium Metal Matrix Composites with Silicon
carbide particle reinforcements are finding increased applications in aerospace,
automobile and underwater vehicles. In the present work, Aluminum 5083 is used
as the matrix material into which SiCP and fly ash are added as the reinforced
material. The results of an experimental investigation of the mechanical
properties of reinforced aluminum alloy (Al 5083) composites samples, processed
by stir casting route are reported in this paper. Each set chosen for our work
had three types of composite samples with 3, 5 and 7% of Silicon carbide and 2%
of Fly ash that was kept constant throughout. A graphite crucible and a cast
iron permanent mould were used to prepare the samples. The mechanical properties
studied were the tensile strength, compressive strength, ductility and hardness.
It was found that the tensile strength, compressive strength and hardness of the
aluminum alloy (Al 5083) composites increased with the increase in weight
fraction of reinforced silicon carbide up to 5% SiCp and gradually decreased
with further increase in weight fraction of reinforcement. Morphology of the
composite and particle distribution were investigated by optical microscopy and
scanning electron micrographs.
|
Download
|
57 |
Empirical mode decomposition (EMD) for
Non linear signal processing
Mr. Pritam D. Desai, Dr. Mrs. S. R. Chougule
Abstract- Empirical
Mode Decomposition (EMD) is a decomposition technique for the complex signals
like EEG, ECG etc, with the help of Hung transformation. EMD consists of
breaking down a signal without leaving the time domain. EMD filters out
functions which form a complete and nearly orthogonal basis for the original
signal. Completeness is based on the method of the EMD; the way it is decomposed
implies completeness. It can be compared to other analysis methods like Fourier
Transforms and wavelet decomposition. The process is useful for analyzing
natural signals, which are most often non-linear and non-stationary. EMD obtain
the functions, known as Intrinsic Mode Functions (IMFs), are therefore
sufficient to describe the signal, even though they are not necessarily
orthogonal. The technique of Empirical Mode Decomposition (EMD) is presented,
and issues related to its effective implementation are discussed in this paper.
Also how EMD is better than popular Wavelet decomposition is discussed.
|
Download
|
58 |
Matrix Manipulation Using High Computing
Pipeline Architecture
Kirti Sharma , Anushree Gupta
Abstract- Matrix
multiplication is the kernel operation used in many transform, image and
discrete signal processing application. We develop new algorithms and new
techniques for matrix multiplication on configurable devices. In this paper, we
have proposed three designs for matrix-matrix multiplication. These design
reduced hardware complexity, throughput rate and different input/output data
format to match different application needs. These techniques have been designed
implementation on Virtex-4 FPGA. We have synthesized the proposed designs and
the existing design using Synopsys tools. Interestingly, the proposed
parallel-fixed-input and multiple-output (PPI-MO) structure consumes 40% less
energy than other two proposed structures and 70% less energy than the existing
structure.
|
Download
|
59 |
Characterization of High performance Al 5083/SiCP/Fly ash hybrid metal matrix composite for advanced Aerospace Applications
Dr U N Kempaiah , Santhosh N , D Harshith Kumar , Amogh H Chelgeri , Vishnu P,
Amogh H Chelgeri
Abstract- The present work involves the
development of hybrid Metal Matrix Composite materials by combining the
desirable attributes of Metals, Ceramics and Industrial waste. Usually, when at
least two reinforcement phases are present, it is called a hybrid composite and
our work predominantly concentrates on characterization of these hybrid
composite materials. Aluminium Metal Matrix Composites with Silicon carbide
particle reinforcements are finding increased applications in aerospace,
automobile and underwater vehicles. In the present work, Aluminum 5083 is used
as the matrix material into which SiCP and fly ash are added as the reinforced
material. The results of an experimental investigation of the mechanical
properties of reinforced aluminum alloy (Al 5083) composites samples, processed
by stir casting route are reported in this paper. Each set chosen for our work
had three types of composite samples with 3, 5 and 7% of Silicon carbide and 2%
of Fly ash that was kept constant throughout. A graphite crucible and a cast
iron permanent mould were used to prepare the samples. The mechanical properties
studied were the tensile strength, compressive strength, ductility and hardness.
It was found that the tensile strength, compressive strength and hardness of the
aluminum alloy (Al 5083) composites increased with the increase in weight
fraction of reinforced silicon carbide up to 5% SiCp and gradually decreased
with further increase in weight fraction of reinforcement. Morphology of the
composite and particle distribution were investigated by optical microscopy and
scanning electron micrographs.
|
Download
|
60 |
Characteristic Evaluation of Wear Properties of NiTiAl Based Shape Memory Alloys for different Composition
Babu K N, Mallikarjuna Biradar, Dr. N G S Udupa, Rudra Naik M, Santhosh N
Abstract- Alloying constituents have a remarkable
effect on the shape memory effect of Ni-Ti (Nitinol) based Shape memory alloys
that have a rear distinction of having extremely effective characteristics as
compared to other shape memory alloys. The transformational behavior of these
shape memory alloys are unique and found to have an impact on biomedical
applications. In our Present work the wear characteristics of Ni-Ti-Al based
shape memory alloys were effectively studied for different compositions and the
specific wear rate, hardness values were noted for as cast and heat treated
samples. The results of the work has shown remarkable increase in hardness and
wear characteristics of the shape memory alloys subjected to heat treatment and
subsequent aging.
|
Download
|
61 |
Survey On Removal Of Undesirable Images In Online Social Network User Walls
M.Swapna, Dr.D.Malathi
Abstract- Most of the people use online social
network for communication between different users. While regular communication
they exchange contents in the form of text, image, audio and video data. To
access the data, it is uncomfortable for the user. The problem is the vast
number of databases and the undesirable images that cannot be controlled by the
user. Till now OSNs provide few support for this issue. To solve this problem,
we proposed a system to control the images automatically by the user that are
posted on their wall. This solution can be obtained through the image
classification that allows users to modify the filtering principle. In addition
to the classification provision, the system provides a substantial rule layer
utilizing an adaptable language to define Filtering Rules (FRs), by which the
user can state the contents that should not be displayed on their walls. Besides
that, list of users that are temporarily blocked to post any kind of images on a
user wall referred to as user – defined Black Lists (BLs) is also provided by
the system for the support of user.
|
Download
|