Sr/No/ |
Title |
Pdf |
1 |
Automated vulnerability detection and prevention reporting of php-based web applications using PVRS and comparison between PVRS & RIPS
Santosh Naidu, Subba Raju KV
Abstract —Most of the web servers support some sort of scripting environment today to deploy dynamic web applications. PHP is a general-purpose server-side scripting language for creating dynamic webpages. Most people learn PHP syntax quite quickly and within short period of time they were able to write a script that works using mainly through online tutorials, references and books. The major problem is that most of the people forget the security aspect of PHP that one must consider while writing PHP based applications. Also mentioned are the common programming mistakes done by developers when building PHP web applications and necessary means to protect against such vulnerabilities. Presented are the most common PHP web application vulnerabilities and the necessary mechanisms required to compose secure code by leveraging PHP’s unique features.
So the paper here finally discusses about the tool PVRS which was specially developed for vulnerability detection of php-based web applications and also discusses in brief about the vulnerabilities that are mentioned in the tool and finally compares PVRS tool analysis results with the existing tool RIPS.
|
Download
|
2 |
Deadline Perception with Enhanced Dynamic Multilevel Priority Scheduling Scheme for Wireless Sensor Networks
Amulya P, Subba Raju KV
Abstract—The swift towards wireless sensor networks has motivated extensive research endeavours that target to reduce energy consumptions and end-to-end transmission delays. One such thread that aims to achieve is the packet scheduling algorithm. The multilevel priority packet scheduling schemes that target to reduce transmission delays, schedule data packets in a multilevel queue based on type of packet and in turn packets are scheduled within each level of queue based on shortest job first (SJF) and First Come First Serve (FCFS) to break the tie. The real difficulty with SJF algorithm lies in determining the processing time of next task. And FCFS increases transmission delays.
To overcome the problems in the internal scheduling in multilevel queues in multilevel priority packet scheduling, we propose Deadline Perception with Enhanced Dynamic Multilevel Priority (DP-EDMP) packet scheduling. In the proposed scheme, data packets are first scheduled using type of packet among multiple levels of queue and then within each level of queue they are scheduled using Earliest Deadline First (EDF), thereby reducing average packet waiting time and end-to-end delay. Secondly, we remove the packets with expired deadlines from the medium which reduces data processing overhead and also saves energy consumptions of the sensor nodes. This facet is achieved by programming the sensor nodes to be intelligent enough to sense packets with expired deadlines.
|
Download
|
3 |
To Study the Anticancer and Apoptotic Activity of Mentha arvensis. Linn in ROS Induced Buccal cells
Syama. M. Suresh, Dr. S. N. Suresh, Bindu Jacob, Sagadevan. P and Rathish Kumar. S
Abstract—The anticancer activity tested has shown notable activity against the
cell lines. The present study confirms that the plant will be a potential source
of medicine in future and extensive study is required for the discovery of new
drugs on the active biological molecules. The methanolic leaf extract Mentha
arvensis has shown significant cytoprotective activity too. The cell treated
with H2O2 has a reduced viability than the methonolic leaf extract treated
cells. In H2O2 treated cells the cytotoxicity was more than 70% i.e. only 34.76
% is viable and the cells treated with the methanolic leaf extract of M.
arvensis has shown viability up to 54.23 %. It can be observed that addition of
hydrogen peroxide produced approximately 79.3 % increase in DNA fragmentation
which can be attributed to the DNA lesions formed by breaking phosphodiester
bond in intact chromosomes by OH radicals. The plant extracts produced 63.7%
decrease in DNA fragmentation indices suggesting potent cytoprotective effect
against deleterious effects of hydrogen peroxide.
|
Download
|
4 |
Analysis And Comparison Of CMOS Decoder Using 0.12μm Technology
Devesh Kishore, Dr Madhuri Asati, Aastha Hajari
Abstract— In present scenario of embedded system, size, speed and cost maters a lot. A decoder is an integral part of integrated circuit. In almost all the logic circuit we use decoders to decrease the number of input without affecting the number of output. In memories such as SRAM and DRAM, access of the memory cell is done using logic of decoders the ever increasing demand for larger data storage capacity and its access time is also an important issue for high speed and smaller size for design of decoder. We have design and compared the different design of decoder for better speed and cost effectiveness. The complete implementation and verification is done on the Tanner tool, Schematic of the decoder is designed on the S-Edit and net list simulation done by using T-spice and waveforms are analyzed through the W-edit. The circuit is characterized by using the 0.12μm technology which is having supply voltage 0f 1.2volt
|
Download
|
5 |
Wireless Boat for Rescue Operation
Mr.vikas.D.Patil, Mr.Vinay.S.Mandlik, Mr.Veeresh.P.M
Abstract-Day by day, we9 are facing the some unwanted changes in environment,
like irregularity in seasons, irregularity in rain. This is again resulting in
cyclones, tsunami, and etc. Sometimes due to some environmental conditions
irregular rainy season occurs & sometimes it rains cats and dogs but sometimes
it rains very less. When over raining occurs, it again results in heavy
flooding. Many people get trapped in flooding and government arrange some
protecting programs to save the trapped people. This boat has to go where people
have caught and save them. Using DTMF technology we derived the boat, give
direction to the boat, the boat is controlled by user mobile phone that makes a
call to a mobile placed in the boat.
|
Download
|
6 |
Experimental verification of flow through convergent nozzle using CFD simulation
R Jayakumar, Harish H.V, Nishant Desai, Srikanth H V4 ,Santhosh N
Abstract -Nozzle is a device where pressure energy is converted to kinetic
energy. In this paper, the aim is to analyse the behaviour of flow parameters
through a convergent nozzle. The variation of pressure and velocity distribution
profile inside the nozzle is experimentally obtained for exit velocities. The
result obtained from experimental setup is validated through CFD simulation. For
CFD simulation, ICEM-CFD was used for modelling & meshing, CFX-13 for solving
and CFD POST for plotting the results.
|
Download
|
7 |
Performance and Comparison of Native Bays Classification in WEKA Environment
Richa, Saurabh Mittal
Abstract-In our days, electronics attacks can cause a very destructive damage
for nations which make necessary the use of completed security policy to
minimize the potential threats. Intrusion Detection System (IDS) is becoming a
vital This research proposed IDS by integrated signature based (Snort) with
anomaly based (Naive Bayes) to enhance system security to identify attacks. This
research used Knowledge Discovery Data Mining (KDD) CUP 20 Percent dataset and
Waikato Environment for Knowledge Analysis (WEKA) program for testing the
proposed hybrid IDS. Accuracy, finding rate, time to build model and false alarm
rate were used as parameters to evaluate performance with Naïve Bayes, Snort by
way of J48graft and Snort with Bayes Net. The result shows good presentation of
using Naive Bayes algorithm.
|
Download
|
8 |
Development of synthetic seed and its evaluation under controlled conditions
Neetu Choursiya, Ravinder Singh, Pushpender Singh, Sujeet Kumar Singh
Abstract-The artificial seed technology provides an alternative method of
micro-propagation for a wide range of medicinal plants, especially desirable
elite genotypes. In the present study Rose (Rosa indica), Boganvalia
(Bougainvillea glabra) and Sweet neem (Murraya koenigii) nodal part (2-5mm) were
collected for the callus induction. The callus was encapsulated in 4% sodium
alginate using MS media. The culture condition of the MS media was optimized at
different pH to study the germination of artificial seed. The germination of
artificial seed was found to be best at pH 6.6. The in vitro encapsulated nodal
segments technology facilitates conservation of genetic diversity.
|
Download
|
9 |
A Survey on Recommendation system in Big Data environment
M.Nandakumari, K.Boobalsingh
Abstract-As the number of data sets increasing larger, the scalability and
efficiency problems increases in fields like commerce and business, society
administration, scientific researches. Recommendation system is one of the
application being affected in the problem as scalability and efficiency. From
the survey, Collaborative Filtering is one of the most frequently used filtering
technique for recommendation system which can be implemented on a cloud
computing tool named Hadoop, a widely-adopted distributed computing platform
using the MapReduce parallel processing.
|
Download
|
10 |
A New Approach Of Fault Current Mitigation By Using Dynamic Voltage Restorer
D.V.Srinivasarao, P.D.V.S.K Kishore
Abstract─This paper introduces and evaluates an auxiliary con-trol strategy for
downstream fault current interruption in a radial distribution line by means of
a dynamic voltage restorer (DVR). The proposed controller supplements the
voltage-sag compensation control of the DVR. It does not require phase- locked
loop and independently controls the magnitude and phase angle of the injected
voltage for each phase. Fast least error squares digital filters are used to
estimate the magnitude and phase of the measured voltages and effectively reduce
the impacts of noise, harmonics, and disturbances on the estimated phasor
parameters, and this enables effective fault current interrupting even under
arcing fault conditions. The results of the simulation studies performed in the
PSCAD/EMTDC software environment indicate that the proposed control scheme: 1)
can limit the fault current to less than the nominal load current and restore
the point of common coupling voltage within 10 ms; 2) can interrupt the fault
current in less than two cycles; 3) limits the dc-link voltage rise and, thus,
has no restrictions on the duration of fault current interruption; 4) performs
satisfactorily even under arcing fault conditions; and 5) can interrupt the
fault current under low dc-link voltage conditions.
|
Download
|
11 |
Regulation of rfg1 (Repressor of Filamentous Growth) Gene Expression Candida albicans Treated with Andrographis paniculata (Nees)
A.R. Revathy Rajan, S. N. Suresh, P. Sagadevan.P. and S. Rathishkumar
Abstract - The phytochemical screening of methanolic leaf extract of
Andrographis paniculata was tested for the presence of secondary metabolites
such as Alkaloids, Terpenoids, Tannins, Saponins, Flavanoids and Steroids. The
chemical constituents present in the methanolic leaf extract of A. paniculata
was analyzed by GC-MS and the compounds were identified based on comparison of
their retention indices (RI), retention time (RT) and mass spectra. Antifungal
effect of the methanolic leaf extract of A. paniculata showed inhibitory effects
against human pathogen, Candida albicans. This may be due to the presence of
effective biochemical compound present in A. paniculata. The gene expression
studies showed decreased level of Rfg1 gene expression in C. albicans upon
treatment with methanolic leaf extracts of Andrographis paniculata. The Rfg1
gene was monitored after 48 hours treatment. The Rfg1 gene was re- expressed
that shows the organism might have adapted to the environment and created the
ability to defend the mode of action of the methanolic extract.
|
Download
|
12 |
Transient Thermal Analysis Of A Diesel Engine Exhaust Valve
V Ramakrishna Reddy, R.Nava Sai Divya
Abstract-The valves used in the IC engines are of three types, Poppet or
mushroom valve, Sleeve valve and Rotary valve. Of these three types, Poppet
valve is most commonly used. Since both the inlet and exhaust valves are
subjected to high temperatures of 1930°C to 2200°C during the power stroke, it
is necessary that the materials of the valves should withstand these
temperatures. The temperature at the inlet valve is less compared to exhaust
valve. Thus the inlet valve is generally made of nickel chromium alloy steel and
exhaust valve is made of silchrome steel. The aim of the project is to design an
exhaust valve for a four wheeler diesel engine using theoretical calculations
and 3D modelling is done in PRO-ENGINEER. Thermal analysis is to be done on the
exhaust valve and analysis is done in ANSYS. Analysis will be conducted when the
steady state condition is attained. Steady state condition is attained at 5000
cycles at the time of when valve is closed is 127.651 sec and valve is opened
127.659 sec. The material used for exhaust valve is EN52 steel. We are doing
material optimization by doing analysis on material EN52. Static Modal analysis
is also done on the exhaust valve to determine mode shapes of the valve for
number of modes.
|
Download
|
13 |
Electrical Vehicle With Reduced Voltage Induction Motor Drive Using MLI
Yarlagadda.Santha Kumari. D. Pomya
Abstract— This paper presents the design, analysis and implementation of a
proposed combined three phase induction motor and its drive system to meet the
demand of low-voltage electrical system for hybrid and electric cars, avoiding
the high voltage human risks, expensive and complex requirements of the higher
voltage insulation and power electronic devices. Development of Electric
Vehicles (EVs) and Hybrid Electric Vehicles (HEVs) will offer many new
opportunities and challenges to the power electronics industry, especially in
the development of the main traction motor drive.Cascade H-bridge (CHB)
multilevel inverter with minimum output harmonics for electric/hybrid electric
vehicle applications is proposed in this paper. Switching angles of switch
devices are determined by selective harmonic elimination technique. So, the
effect of low order harmonics are reduced, as a result the efficiency of system
has improved. Moreover, the number of DC voltage sources that used in the
proposed inverter is less than conventional multilevel inverters that leads to
reduce the inverter costs A conventional 220V 3-ph induction motor has been
rewound in order to get the required 48V 3-ph motor. The simulation results are
obtained using MATLAB/SIMULINK software.
|
Download
|
14 |
Compare And Analysis Of Piston Ring In A Composition Of Al-Sic With Grey C.I Using Ansys
Sabareesan S, Prakash Kanna G
Abstract— In this work an attempt has been made to increase the reliability of
piston using Al-Sic composites as an alternative material for the piston
compression rings. The piston ring is one of the main components of an internal
combustion engine. Its main purposes are to seal the combustion chamber of the
engine. Elastic finite element models are used to calculate the stresses of
piston ring. Try to change the piston ring material to reduce the wear,
increasing the life time of the piston ring. Aluminium matrix composites are
finding increased application in Automotive, Aircraft and Aerospace industries
and hold the greatest promise for the future growth. The finite element analysis
of the Al- Sic composite piston compression ring was done using Ansys software.
The temperature, principal stress and principal strain distribution over the
entire surface of the piston compression ring were obtained. The stresses were
found to be well below the allowable stress for the Al-Sic composites.
|
Download
|
15 |
A new Fuel Cell converter topology For Bidirectional Power Flow between the Electric Vehicle and DC or AC Grid
Sandhya.P, D.Pomya
Abstract— Electric vehicles (EVs) are needed in densely populated urban areas to
reduce air pollution. Battery chargers are needed to supply dc voltage to charge
the high-energy battery packs used in EVs. This paper presents a fuel cell
powered integrated traction machine and converter topology that has
bidirectional power flow capability between an electric vehicle and the dc or ac
supply or grid. These operations are in addition to the vehicle traction mode of
operation Desired features for EV battery chargers such as minimum volume, low
cost, high efficiency, and high reliability are fully matched by means of the
proposed solution. The concept has been analyzed with finite-element- coupled
simulation with dynamic analysis software. The interleaving technique has been
used with the inductors to share the current and reduce the converter switching
stresses.
|
Download
|
16 |
A Survey of Lowering the Error Floor of LDPC Codes Using Multi-Step Quantization
A.Sakira Parveen
Abstract—A multi-step scheme is proposed for the input quantization of
message-passing decoders for low-density parity-check (LDPC) codes. The proposed
scheme, which is applicable to both regular and irregular codes, lowers the
error floor significantly at the cost of small increase in complexity, memory
and latency.
|
Download
|
17 |
A Survey of Low Voltage in a Circuit Using LDO Regulator
R.Rajakumari
Abstract-A low-voltage low-dropout (LDO) regulator that converts an input of 1
V to an output of 0.85–0.5 V, with 90-nm CMOS technology is proposed. A simple
symmetric operational transconductance amplifier is used as the error amplifier
(EA), with a current splitting technique adopted to boost the gain. This also
enhances the closed-loop bandwidth of the LDO regulator. In the rail-to-rail
output stage of the EA, a power noise cancellation mechanism is formed,
minimizing the size of the power MOS transistor. Furthermore, a fast responding
transient accelerator is designed through the reuse of parts of the EA. These
advantages allow the proposed LDO regulator to operate over a wide range of
operating conditions while achieving 99.94% current efficiency, a 28-mV output
variation for a 0–100 mA load transient, and a power supply rejection of roughly
50 dB over 0–100 kHz.
|
Download
|
18 |
Analysis of Cyber-Physical System using FPGA-Based Plant-on-Chip Platform
T.Murugajothi
Abstract— Digital control systems are traditionally designed independent of
their implementation platform, assuming constant sensor sampling rates and
processor response times. Applica-tions are deployed to processors that are
shared amongst control and noncontrol tasks, to maximize resource utilization.
This potentially overlooks that computing mechanisms meant for improving average
CPU usage, such as cache, interrupts, and task management through schedulers,
contribute to nondeterministic interference between tasks. This response time
jitter can result in reduced system stability, motivating further study by both
the controls and computing communities to maximize CPU utilization, while
maintaining physical system stability needs. In this letter, we describe an
field-programmable gate array (FPGA)- based embedded software platform coupled
with a hardware plant emulator (as opposed to purely software-based simulations
or hardware-in-the-loop setups) that forms a basis for safe and accu-rate
analysis of cyber- physical systems. We model and analyze an inverted pendulum
to demonstrate that our setup can provide a significantly more accurate
representation of a real system.
|
Download
|
19 |
Design And Implementation Of Intelligent Household Led Lighting
Systemfor Energy Efficiency
P.G Akila
Abstract-Reducing energy consumption and saving energy in wireless
communications has attracted increasing attention recently. Electric appliances
consume electricity when they are in standby mode and sometimes even in
off-mode. Particularly, a light accounts for a great part of the total energy
consumption. Due to architectural limitations, the existing light control system
cannot be successfully applied to home and office buildings. Therefore, this
paper proposes an intelligent household LED lighting system considering energy
efficiency by utilizing multi sensors to control LED light using wireless
communication technology.
|
Download
|
20 |
On Eccentric Connectivity Index Of Subdivision-Related Graphs
A. Jayenthi, A. Kulandai therese
Abstract- The eccentric connectivity index based on degree and eccentricity of
the vertices of a graph is a widely used graph invariant in mathematics. In this
paper we present the explicit generalized expression for the eccentric
connectivity index of the subdivision-related graph of some special graphs.
|
Download
|
21 |
Design And Analysis Of An Easily Controlled Walking Robot Leg Mechanism
Koduru Sudhakar, R. Nava Sai Divya, P. Sudheer Rao
Abstract-In this paper, numerous walking and controlling machines and robots
have been convened, designed and built in the last fifteen years to open new
fields of application. Compared to wheeled vehicles walking machines show the
advantage that they can act in highly unstructured terrain without having
prepared this terrain in advance by streets or rails. In legged robots cross
obstacles more easily; depend less on the surface conditions and quality and, in
general, exhibit better adaptability. In this paper a numerical and experimental
analyses of a pantograph-leg are presented. In particular, a suitable model of
the sample leg has been analyzed and Kinematics and Dynamics have been solved. A
parametric study has been also carried out in order to investigate the influence
of some basic design parameters on its motion capabilities.
|
Download
|
22 |
The Different Black Hole Detection Mechanism In MANET
Sahil Sharma, Rupinder Kaur Gurm
Abstract-A mobile Ad-Hoc network provide a survey of various security mechanism
that has been proposed in Dynamic Source Routing(DSR) protocol against black
hole attack which contain malicious nodes which replies the route request in the
form of fresh route to the destination and then it drops all the receiving
packets. In this paper, the proposed solution provide a secure route between the
source and destination by identifying both single and cooperative black hole.
The paper focus on network layer packet dropping attack like black hole/grey
hole attack in DSR based manet.
|
Download
|
23 |
A Review of ZigBee-UMTS Hybrid Networks
B.KamalaSoundari
Abstract-A ZigBee Network is a low-cost and low-power wireless network based on
the IEEE 802.15.4 standard, which allows wireless connectivity with limited
power and relaxed throughput requirements. On the other hand, the Universal
Mo-bile Telecommunications System (UMTS) is a third-generation cellular network
that provides high-speed wireless traffic transfer to the Internet. This paper
presents the design and implemen-tation of a novel integrated ZigBee and UMTS
hybrid network in the Network Simulator (ns-2). In this hybrid network, we
design a new Mobile Gateway to interconnect these two different sub-networks.
With the hierarchical addressing and some special UMTS network discovering
mechanisms, routing in the hybrid network, from the ZigBee network via the UMTS
network to the wired network, is achieved. We also design a simulation platform
to make it easier for protocol designers to design and evaluate new protocols in
such a hybrid network.
|
Download
|
24 |
Novel Color and Texture Features Based on Image Retrieval by Using Color-Histogram and Discrete Curvelet Transform
Sapthagiri.K, Veera Swamy.D
Abstract— CBIR is the best applicable Digital image processing techniques, it
has been extensively used. In image retrieval the feature extraction is one of
the best procedures used for interpretation and images indexes. An effective
storage managing number of image collections are a difficult task in computer
systems. There are many existing methods to overcome these problems. In this
paper we are proposed combination of color histogram and Curvelet transform
(DCT) in different color space based content based image retrieval by using both
color and texture. In past the curvelet transform were used for image
de-noising. Now we research on curvelet transform it can be used for the better
retrieval results. The average normalized rank and probability to evaluate and
compare the proposed method against different methods. The obtained result shows
the better performance in different types of similarity measurements.
|
Download
|
25 |
Fir Filter Design Based On Low Latency Systolic Montgomery Multiplier
R. Ambika
Abstract -In this paper the Finite Impulse Response (FIR) is designed using the
montgomery multiplier. This multiplier is widely used in many cryptographic
applications like RSA and elliptic curve cryptography. Here the multiplication
is decomposed into number of independent units using an efficient algorithm to
introduce the parallel processing. To reduce the latency a novel pre computed
addition technique is followed. Since the Montgomery is a systolic multiplier it
contains the features of regularity, modularity and unidirectional data flow and
more suitable for VLSI design implementations. The important characteristic of
this multiplier is it has an inbuilt truncation which compresses the LSB part
and also consumes less area and power than existing designs. The proposed
multiplier have clock cycle latency of (2N-1) where N=(m/L), m is the word size
and L is the digit size.
|
Download
|
26 |
Design And Implementation Of MOSFET using ITRS Road map
G. Sasi
Abstract—MOSFETs are used both as discrete devices and as active elements in
digital and analog monolithic integrated circuits (ICs). In recent years, the
device feature size of such circuits has been scaled down into the deep sub
micrometer range. In this paper, a 90 nm NMOS in 3-D structure was designed and
simulated to study its electrical characteristics using Visual TCAD with GENIUS
simulator with ITRS guideline of 90nm device.
|
Download
|
27 |
A New Methodology in Weapon Detection Using Advanced Sensor Technology and DIP
T.Sairam vamsi, M.Jagan Mohan Rao, S.Yallamandaiah
Abstract-We have recently witnessed the series of bomb blasts in Mumbai. Bombs
went of in buses and underground stations. And killed many and left many
injured. People think bomb blasts can’t be predicted before handled. Here we
show you the technology which predicts the suicide bombers and explosion of
weapons through IMAGE PROCESSING FOR CONCLEAD WEAPON DETECTION. The detection of
weapons concealed underneath a person’s clothing is very much important to the
improvement of the security of the general public as well as the safety of
public assets like airports, buildings, and railway stations etc. Manual
screening procedures for detecting concealed weapons such as handguns, knives,
and explosives are common in controlled access settings like airports, entrances
to sensitive buildings and public events. It is desirable sometimes to be able
to detect concealed weapons from a standoff distance, especially when it is
impossible to arrange the flow of people through a controlled procedure. In the
present paper we describe the concepts of the technology ‘CONCEALEAD WEAPON
DETECTION’ the sensor improvements, how the imaging takes place and the
challenges. And we also describe techniques for simultaneous noise suppression,
object enhancement of video data.
|
Downloadk>
|
28 |
A Survey on Security and Performance of SOA
via Event Exposure
G.Sasikala,A.Nirmal Kumar
Abstract- The Service-oriented applications are services usually collected from
various organizations. The details of implementation on services are usually not
visible to the service clients, so as to protect the business interests of
service providers. This calls for a challenge when compared to white-box test
service-oriented applications because it is difficult to determine accurately
the test coverage of a service composition as a whole as well as the difficulty
to design test cases effectively. This paper focuses on improving the
performance of testing and to reduce the delay incurred during testing. To
assure the reliability of an SOA application service, security is imposed only
on the most critical services of SOA application.
|
Download
|
29 |
A Survey On CAPTCHA As Graphical Passwords Overcomed By Virtual Passwords Schemes
S.Karthika,P.Tharcis
Abstract—Passwords which are graphical are believed to be more secure than the
textual passwords.Here the authentications are boring and complex for users.
Moreover,the existing graphical passwords scheme are vulnerable to
shoulders-shurfing and spyware.Even most of these alternate schemes have their
own merits and demerits. Forinstance,cued-recall graphical passwords schemes are
vulnerable to shoulder-surfing and intersection analysis attack is not
prevented.So that, CAPTCHA as graphical passwords has been overcome by a virtual
password scheme (deal with secret little function method and a code book
technique) that acts as a proposal in this paper. And here by using virtual
password scheme the passwords are in a differentiated manner including
usability, security and Implementation considerations. Furthermore, a Hard AI
problem supports the security primitives.
|
Download
|
30 |
Design Of Heterogeneous Spectrometers
In Radio Astronomy Using FPGA Based
Scale Down Implementation
B.Rajeshwari, N.Ashok Kumar
Abstract—Radio Astronomy is non commercial, passive user of radio frequency
Spectrum. It is also a branch of Fundamentals scientific research that provides
us with the most useful dataon the origins of our universe. The recent and
planned growth in radio communication systems presents a real threat to the
future of radio astronomy as a viable sceintific discipline.
|
Download
|
31 |
Independent Operation Of Two Three Phase Loads With Nine Switch Inverter
B.Shivashankar, P.Joel, D.Srikanth
Abstract—This paper proposes space vector modulation for nine switch inverter as
dual output inverter .proposed technique compared with carrier based PWM
technique and space vector modulation technique (SVM).SVM technique increases
the sum modulation indices up to 15% in contrast with conventional scheme, in
which the sum of modulation indices is equal or less than one. The extra high
voltage available for a given input dc-voltage translates to higher torque. This
paper introduces novel SVM technique with minimum semiconductor switching and
reduced THD .Min semiconductor switching method reduces the cost of power
devices and thermal heat effect ,this scheme will be advantages for high power
applications .Where as reduce THD method minimize the total harmonic distortion
.The performance of proposed SVM for nine switch inverter is verified by
simulation .
|
Download
|
32 |
A New PFC Rectifier for Air conditioner Applications
Tanneru Durga Prasad,
N.Saida Rao
Abstract—With the widespread use of non-linear loads, such as variable speed
drives (VSDs), power factor improvement has become more difficult. The presence
of harmonic currents cause power capacitors to absorb them, as capacitor
impedance is inversely proportional to frequency. The effects are overheating
and increased dielectric stress of power capacitors, which result in their
premature failure. These traditional approaches can also interact with
harmonics, leading to harmonic amplifications at resonant frequency, which can
damage the capacitors or components of the system. A new integrated three-level
ac–dc converter is presented. The proposed converter integrates the operation of
the boost power factor correction and the three-level dc–dc converter. The
converter is made to operate with two independent controllers—an input
controller that performs power factor correction and regulates the dc bus and an
output controller that regulates the output voltage. The input controller
prevents the dc-bus voltage from becoming excessive while still allowing a
single-stage converter topology to be used. The paper explains the operation of
the new converter in detail and discusses its features and a procedure for its
proper design.
|
Download
|
33 |
Performance Evaluation of DSR Protocol in MANET Using OPNET
Sahil Sharma, Rupinder Kaur Gurm
Abstract—MANET is the ad-hoc network that is a collection of mobile nodes in
which it is needed that each node performs together. A node is called
cooperative when it sends the data correctly to another node in a wireless
network. In the mobille adhoc networks,the main role is played by the routting
protocols in sequence to route the data from one mobile node to the other mobile
node.But due to openness character of ad-hoc network, it is risk to face various
kinds of attacks like black hole node attack etc .The ordinary used routing
protocols in MANET are proactive, reactive and hybrid types but the reactive
routing method is very trending method for the wireless network that supplies a
scalable solution for network topologies used at a large scale. The routing
protocols of MANET are not safe and hence resulted into the network in producing
the malcious mobile nodes.There are different types of routing protocol avilable
which have been recently focused to perform the secure routing in the networks.
In this paper, For the identification of malicious nodes,DYNAMIC SOURCE ROUTING
PROTOCOL(DSR) has been proposed to create a safe route between source and
destination with the searching single and the cooprative black hole attack by
enhencing the dsr routing protocol and we will also modifying the default value
of the parimeters in an arrangement to improve the quality ofprotocol and
prepare a enhenced DSR.
|
Download
|
34 |
Visual Authentication And Security For Mobile Devices
M.Irish, B.Dharani Manogran
Abstract—This paper focuses on developing an efficient key agreement protocols
for two and three handheld devices over a temporal confidential and
authenticated channels. It simplifies previous unnecessary complications and
reduces the bottleneck associated with running time human’s involvements. The
Man-In-The-Middle (MITM) attack is the major threat for handheld devices to
agree a session key in which they do not share any prior secret in advance, even
if these devices are physically located in the same place. The Man-In-The-Middle
(MITM) attack is the major threat for handheld devices to agree a session key in
which they do not share any prior secret in advance, even if these devices are
physically located in the same place. This work aims to improve the Bluetooth
device transfer in pair devices using high security. Generates password in
invisible patterns. To be used in the Visual Authentication protocol to
implement and generate the selection random keys.
|
Download
|
35 |
A Survey on Low Complexity Active Learning for Semi-Supervised Clustering of Large Data Sets
P.Gandhini, S.Venkatesh Babu
Abstract—The main objective of Semi-supervised clustering is improving cluster
performance by user’s guidance in the form of pairwise constraints named as
must-link and cannot-link. The classifier uses users feedback during learning
phase of classification is referred as Active learning. The active learning has
the problem of satisfying the must required and not required constraints for
semi supervised clustering. Active learning is achieved in an iterative manner.
The concept of neighborhood of different clusters is formed according to the
pair wise constraints. Under this, classic uncertainty-based principle is used
and proposes a novel approach for estimating the uncertainty to each data point.
This paper evaluates on eight bench mark data sets and its result achieves
consistent and substantial improvements over its competitors. An active learning
in iterative manner requires repeated reclustering of the data with an
incrementally growing constraint set. This provides computational complexity for
large data sets. To address this problem, we introduce an incremental
semi-supervised clustering method that updates the existing clustering solution
based on the neighborhood assignment for the new point. A naive batch active
learning approach also proposed to select the top k points for active learning
instead of selecting all data for training.
|
Download
|
36 |
Facilitating Automatic Web Document Annotation Using Sessions
Prabhu G, Dr. Thiagarasu V
Abstract—Web database have become web-accessible through form-based search
interfaces (i.e., search forms) that allow users to specify complex and precise
queries to access the underlying database. Data are unstructured means which
makes searching hard and traditional database querying impossible. Many Web
pages (e.g. advertisements, weather reports, travel information and many others)
contain an abundance of recognizable constants that together describe the
essence of document content. In existing system document annotation is taken by
CADS (Collaborative Adaptive Data Sharing platform) technique, that is client
have annotated the document on creation time. In this paper, the problem of
automatically extracting the keywords/metadata from web pages has been studied
without any learning examples. An automatic annotation approach has been
presented that extracts and aligns the data units on a result webpage. Then, for
each webpage annotate from different aspects and summation the different
annotations to predict a final annotation label for it. An annotation wrapper
for the search site is without human intervention constructed and can be used to
annotate new result pages from the same web database.
|
Download
|
37 |
Evaluation Of Security In Android Anti-Malware Applications
R. Tamilarasi, B. Dharani Manoharan
Abstract—Mobile devices such as smart phones have gained great popularity in
response to vast repositories of applications. Most of these applications are
created by unknown developers who may not operate in the user’s best interests,
leading to malware. Earlier work used DroidChameleon, the DroidChameleon is a
systematic framework with various transformation techniques which is used to
evaluate the anti-malware products. Those transformations are classified as
trivial transformations, DSA-Detected by Static Analysis and NSA-Non-Detected by
Static Analysis. However comprehensive evaluation using a much larger number of
malware samples and anti-malware tools are not performed. To deal with this, the
proposed system extends DroidChameleon with various detection techniques such as
Taint tracing, sensitive API monitoring and Kernel-level monitoring for
detecting malware in android. The proposed system is experimentally evaluated
the anti-malware applications.
|
Download
|
38 |
Power Quality Improvement by using UPQC Topology with Reduced DC-link Voltage Rating
K.rajkumar T., Ashok Kumar, Lokesh N
Abstract—The main aim of this paper is to improve, the power quality in the
Facility side i.e. in Distribution side by the help of the Unified Power Quality
Conditioner. The UPQC is a customer power device, which is used to mitigate the
power quality problems. By the help of the UPQC, the various power quality
concerns such as voltage sag, swell, harmonics can be eliminated. In our paper
the modified, three phase four wire distribution is used to control the reactive
power in the line. And also it uses, the both voltage source inverter which are
connected in back to back manner with the help of reduced d. c. link capacitor.
|
Download
|
39 |
FPGA Implementation Of Distributed Canny Edge Detector
B Madhu, Mr. Vijaykumar R. Urkude
Abstract—Edges represent the significant local changes in the intensity of an
image. Image Edge detection significantly reduces the amount of data and filters
out useless information, while preserving the important structural properties of
an image. A distributed canny edge detection algorithm is used which results in
the reduced memory requirements, decreased latency and increased throughput with
no loss in the performance of the edge detection, when compared to that of the
original Canny algorithm. An FPGA-based hardware architecture of the proposed
algorithm is synthesized on Xilinx SPARTEN-3 EDK.
|
Download
|
40 |
Simulation Of Bidirectional Buck Boost Dc-Dc Converter For Induction Motor Based Electric Vehicle Application
Mandadi Sagar Reddy, D. Pomya
Abstract—In this paper a universal Power Interface for all the above discussed
type of vehicles. Basically, the proposed converter interfaces the energy
storage device of the Electric Vehicle with the motor drive and the external
charger. The proposed converter is capable of operating in all directions in
buck or boost modes with a non inverted output voltage (positive output voltage
with respect to the input) and bidirectional power flow. In extension to the
work the proposed Power Interface is Fed to a Induction Motor Drive and the
performance is analyzed.
|
Download
|
41 |
Power Quality Improvement in Distribution System by Using DSTATCOM with Predictive ANN
K. Seetharamanjaneyulu, G.Nagaraju
Abstract— This paper presents a control algorithm based on enhanced phase-locked
loop (EPLL) for distribution static compensator (DSTATCOM) to compensate
reactive power, to provide load balancing, to eliminate harmonics, to correct
power factor, and to regulate point of common coupling (PCC) voltages under
linear and nonlinear loads. In this approach, an extraction of fundamental
active and reactive power components of load current for the estimation of
source currents includes a signal-processing algorithm based on the EPLL scheme.
The proposed control algorithm is implemented using a digital signal processor.
Test results on a developed DSTATCOM are presented to validate the proposed
control algorithm for compensation of reactive power, load balancing, harmonics
elimination, power factor correction, and zero voltage regulation at PCC. A
DSTATCOM injects a current into the system to provide for the reactive component
of the load current. The validity of proposed method and achievement of desired
compensation are confirmed by the results of the simulation in MATLAB/ Simulink.
|
Download
|
42 |
Adaptive Voltage Control Using Multiple Distributed Energy Resources with Fuzzy Controller
P.Nagarjuna, P.Ravi Kumar
Abstract-Distributed energy resources (DE) with power electronics interfaces and
logic control using local measurements are capable of providing reactive power
related to ancillary system services. In particular, local voltage regulation
has drawn much attention in regards to power system reliability and voltage
stability, especially from past major cascading outages. This dissertation
addresses the challenges of controlling the DEs to regulate the local voltage in
distribution systems. First, an adaptive voltage control method has been
proposed to dynamically modify the control parameters of a single DE to respond
to system changes such that the ideal response can be achieved. Then, control
methods have been discussed in the case of multiple DEs regulating voltages
considering the availability of communications among all the DEs. When
communications are readily available, a method is proposed to directly calculate
the needed adaptive change of the DE control parameters in order to achieve the
ideal response. When there is no communication available, an approach to
adaptively and incrementally adjust the control parameters based on the local
voltage changes is proposed. Since the proposed adaptive voltage regulation
method in the case of multiple Des without communication, has a high tolerance
to real-time data shortage and can still provide good enough performance, it is
more suitable for broad utility applications. The approach of multiple DEs with
communication can be considered as a high-end solution, which gives faster and
more precise results at a higher cost.
|
Download
|
43 |
A New Method For Image Steganography Using Rsa Algorithm
Rajkumar Yadav
Abstract-The aim of proposed scheme is to make a more secure and robust method
of information exchange so that confidential and private data must be protected
against attacks and illegal access. To order to achieve the required robustness
and security cryptography and steganography is combined. Image is taken as a
cover medium for steganography and RSA algorithm is used for encryption. In this
proposed method advanced LSB bit manipulation method is used for embedding the
message in the image file and the message is itself encrypted using the RSA
encryption method. For embedding the text in image file firstly both the text
and image file are converted into binary equivalent and then text is encrypted
using RSA. The encrypted text is then embedded into the image file using the
advanced LSB algorithm. At the receiver side, embedded image file must be
selected to extract the message .After selecting the file and advanced LSB
method is applied to extract the encrypted message and this message is decrypted
using the RSA algorithm. A comparison is made between the original image file
and the embedded one to indicate that less distortion even after changing the
LSB bit of original file and for this PSNR, RMSE is calculated. PSNR and RMSE
value indicates imperceptibility and transparency is evaluated by comparing the
graph of image file before and after steganography.
|
Download
|
44 |
A Novel Hierarchical Algorithm for Document Clustering
Nanimela Kamakshi, A Srinivasan, Dr.M.Giri
Abstract-All clustering methods have to assume some cluster relationship among
the data objects that they are applied on. Similarity between a pair of objects
can be defined either explicitly or implicitly. In this paper, we introduce a
novel multi-viewpoint based similarity measure and two related clustering
methods. The major difference between a traditional dissimilarity/similarity
measure and ours is that the former uses only a single viewpoint, which is the
origin, while the latter utilizes many different viewpoints, which are objects
assumed to not be in the same cluster with the two objects being measured. Using
multiple viewpoints, more informative assessment of similarity could be
achieved. Theoretical analysis and empirical study are conducted to support this
claim. Two criterion functions for document clustering are proposed based on
this new measure. We compare them with several well -known clustering algorithms
that use other popular similarity measures on various document collections to
verify the advantages of our proposal.
|
Download
|
45 |
Speed Optimized 2D DCT Implementation for High Compression Rate Applications
K.Santhosh Kumar, B.N. Srinivasa Rao
Abstract-Multimedia applications, and in particular the encoding and decoding of
standard image and video formats, are usually a typical target for Systems on
Chip (SoC). The bi-dimensional Discrete Cosine Transformation (2D-DCT) is a
commonly used frequency transformation in graphic compression algorithms. Many
hardware implementations, adopting disparate algorithms, have been proposed for
Field Programmable Gate Arrays (FPGA). These designs focus either on performance
or area, and often do not succeed in balancing the two aspects. This paper
presents two high performance FPGA architectures for the 2D DCT computation for
Ultra High Definition video coding systems. Both architectures use Distributed
Arithmetic to perform the necessary multiplications instead of traditional
multipliers. The first architecture uses 105 clock cycles to transform an 8x8
block and reaches a rate of up to 206 samples per second at a 338.5 MHz
frequency, while the second one requires 65 cycles for each 8x8 block and
achieves a rate equal to 252 samples per second at 256 MHz’s Both architectures
have been implemented using VHDL. Virtex7 FPGA of Xilinx has been used for the
realization of both implementations.
|
Download
|
46 |
Overview Of Proactive Routing Protocols In Mobile Ad-Hoc Networks
Vaibhav Kumar, AbhishekKumar
Abstract-The Mobile ad hoc network [MANET] is a distributed network where mobile
nodes are connected together by wireless link without any infrastructure like
base station, fixed link, routers, and centralized servers. A routing protocol
is used to find best path between mobile nodes to established communication
within the networks. Route between the mobile nodes should be distinguished and
maintain with a minimum of overhead & bandwidth consumption. This paper presents
performance evaluation of proactive routing protocols i.e. DSDV, OLSR & WRP
based on some parameters.
|
Download
|
47 |
Modeling And Finite Element Analysis Of Pressure Vessel Shell With Radial Openings
Ch.Vasantha Lakshmi, A.V.Ramana Rao, G.Satish, M.Suryanarayana
Abstract-It is to conduct stress analysis of a pressure vessel shell at the
radial openings on the surface. The radial openings are not avoided from the
surface of shell due to various piping attachments. Hence the stress analysis of
shell and its ultimate failure under internal pressure beyond elastic limit is
an appropriate scenario. The plastic zone appearing in vicinity of internal
surface of cylinder propagates more fastly along radial openings side. When
cylinder is unloaded it will cause reverse plasticity. Therefore it is proposed
to obtain numerical solution using Finite Element analysis of cylindrical shell
to obtain the displacement & radial stress distribution. In the work the stress
analysis of pressure vessel shells with different pressure conditions is
conducted Elastic analysis of uniform cylindrical shell with radial openings is
found by Finite element method. It is observed that there are several factors
which influence stress intensity factors. The Finite element analysis is
conducted using Solid Edge. The results are presented in form of graphs and
tables.
|
Download
|
48 |
Impact of soccer specific conditioning
On selected fitness elements of men
Soccer players
K.Nandhakumar, M.Rajashekaran, K.Sivakumar, S.Rathinakamalan
Abstract- The study was designed to investigate the impact of Soccer specific
conditioning on selected fitness elements on men soccer players. Thirty men
football players who participated in the university of Madras zone inter
collegiate tournaments were selected as subjects and segregated into two groups
of fifteen subjects each as experimental group and control group following
random procedure. The experimental group underwent soccer conditioning over a
period of twelve weeks where as control group did not participate in any of the
training except their regular play. Speed, Agility and flexibility were assessed
before and after the experimental period by using 40yard sprint, T- test and sit
and reach tests respectively. ANCOVA was used to analyze the collected data. The
results of this study showed that there was a significant difference between
experimental group and control group on speed, agility and flexibility.
|
Download
|
49 |
A New Approach For Digital Watermarking In Rgb Images
Rajkumar Yadav
Abstract-The goal of proposed work is to improve the robustness of watermarked
image. The watermark is embedded into original image. The original image and
watermarked image is required for extraction of digital watermark. The method of
digital watermarking in frequency domain is analyzed and verified on RGB images.
Also a comparison is performed between PSNR values of watermarked image in
frequency domain.
|
Download
|
50 |
Use Rank Of Matrix In Steganography For Securing Gps And Gis Data
Rajkumar Yadav
Abstract-Today’s world is the world of fast communication. Everyone wants
concrete, valuable and precious information in very less time. GIS and GPS are
such kind of systems which provides valuable information in very less time for
various types of applications like whether forecasting , agriculture etc. GIS
and GPS take data from various sources and after processing that data they
provide valuable information which can be used in various applications. If the
data that these systems will process is altered by some intruder then the user
will get wrong information and no information about anything is always better
than wrong information. So, there is demanding need to secure the data on which
GIS and GPS systems will work. In this paper, we showed that how we can secure
the data for these systems using steganography.
|
Download
|
51 |
Study of Image Edge Detection: A Review
Shashi Mishra, Prof. Bharti Chourasia
Abstract-For object detection Edge detection is important part of image
processing. So it becomes extremely important to have a good Knowledge of edge
detection algorithms. An edge is the real or imagined line that marks the limit
and divides of plane, object or appearance from other places or things. This
means that if the edges in an image can be identified accurately, all of the
objects can be located and basic properties can be measured. In this paper we
discuses a classification of most important and mostly used edge detection
algorithms, namely Sobel, Robert, Prewitt, Laplacian of Gaussian, Canny. The
advantages and disadvantages dealt in individual study. Its application area is
very wide i.e. from astronomy to photography, medicine to war.
|
Download
|
52 |
Optimization Studies On Friction Drilling
Syed Kwaja Moinuddin,
Dr. E. Venugopal Goud
Abstract-Friction drilling is Chipless drilling method which uses the frictional
heat developed between a rotating conical tool and the workpiece to soften and
penetrate the work-material and obtained a hole in a Aluminium hollow channel
material and at the result a bush formation takes place. In this, Experimental
trials effect the friction drilling input parameters viz. Spindle speed, feed
and conical angle on the responses on w/p viz. dimensional error and surface
roughness of the bush. Tool material as HSS and workpiece material as AA6063
Aluminium hallow channel which have 2mm thickness. The effects of Conical angles
(CA), feed rate (FR), and spindle speed (SS) on the two quality characteristics,
surface roughness (SR) and dimensional error (DE) were also measured and
recorded. Conducting the experimental trials, the analysis procedure followed by
DESIGN EXPERT V8 software. It was investigated that generated surface roughness,
Dimensional error according to spindle speeds, feed rates and conical angles.
Response Surface Method (RSM) has been used to develop an empirical model for
the responses in terms of drilling parameters.
|
<Download
|
53 |
A Survey on an Efficient Bayesian Similarity Based Face Image Annotation Model for Weakly Labeled Web Facial Images
Tini Vasanth, A.Nirmal Kumar
Abstract-This paper proposes a novel effective approach of Unsupervised label
refinement (URL) for exploiting the top list of most similar web facial images
and their weak labels retrieved from World Wide Web (WWW).Duplicate names can be
a practical issue in real-life scenarios.To tackle this problem I propose
Bayesian framework which measures the similarity of different names by defined
it as maximum a posteriori (MAP) estimation for single person annotation.To
further improve the performance of further annotation contextual features are
extracted with GIST feature to improve the identification of normal persons
other than celebrities.
|
Download
|
54 |
A New Converter for Dc Motor Applications with Power Factor Correction
R.Ramanjan Prasad, N.Srikanth
Abstract-Generally non-linear loads are the main source of harmonics. This paper
presents one new control scheme to compensate the harmonic current generated by
the diode rectifier so as to achieve a power factor nearer to unity and regulate
the DC-bus voltage. This scheme uses one PFC Boost Converter which is connected
in shunt with the diode rectifier to compensate the harmonic current drawn by
the single phase diode rectifier. The line current command is derived from a dc
link voltage regulator and an output power estimator. The hysteresis current
controller is used to track the line current command. In absence of diode
rectifier (Non-linear Load), the PFC boost converter draws purely sinusoidal
current from source. In presence of diode rectifier the PFC boost converter
draws current in such a way that the total current drawn from source becomes
purely sinusoidal. Merits of the proposed converters include higher power
density, simpler control strategy, less harmonic control contents, nearly unity
power factor and unidirectional power flow. Optional principle, design analysis
and conditions achieving for the proposed converters are described.
|
Download
|
55 |
Analysis of Multilevel Inverter topology with a reversing-voltage Concept
N. Devipriya, G Madhusagarbabu
Abstract-Multi level inverter is used in applications that need high voltage and
high current. The topologies of multilevel inverter have several advantages such
as lower THD, lower EMI generation, better output waveform and higher efficiency
for a given quality of output waveform. The main feature of multilevel inverter
is the ability to reduce the voltage stress on each power device due to the
utilization of multilevel on the DC bus. However, it has some disadvantages such
as increased number of components, complex pulse width modulation control
method, and voltage-balancing problem. In this paper, a topology with a
reversing-voltage component is proposed to improve the multilevel performance by
compensating the disadvantages mentioned. This topology compared to existing
inverters requires fewer components (particularly in higher levels) and requires
fewer carrier signals and gate drives. Therefore, the overall cost and
complexity are greatly reduced particularly for higher output voltage levels.
Finally, the paper includes simulation results of RVMLI fed Single phase
Induction Motor using In-phase Disposition (IPD) PWM technique.
|
Download
|
56 |
A Survey On Creative Data Packet Forwarding System in Wireless Network
Deepak Gupta , Shreya Jain
Abstract-in the previous years , we have seen the fast development of wireless
communication technologies and a wireless network play a major role of the
wireless communication Wireless network is a collection of wireless nodes
without any accessible network infrastructure or centralized organization.
Mobile Ad Hoc Network (MANET) is a collection of two or more devices or nodes or
terminals with wireless communications and networking capability that
communicate with each other without the aid of any centralized administrator
also the wireless nodes that can dynamically form a network to exchange
information without using any existing fixed network infrastructure. And it’s an
autonomous system in which mobile hosts connected by wireless links are free to
be dynamically and some time act as routers at the same time.. To avoid being
identified, attackers generally recruit multiple accomplices to dilute attack
traffic thickness of each attack source, and use the address spoofing procedure
to challenge the hit tracing. In this paper, we present a complete exploration
of the safe and sound data broadcasting technique for Wireless network.
|
Download
|
57 |
A Review On Security & Energy Efficiency In Routing Protocols In MANETs
Abhishek Kumar, Sachin Kumar
Abstract-In this paper, the objective is to present a review of security &
energy efficiency in routing protocols in adhoc networks. In MANETs, the mobile
nodes are connected through a wireless medium forming rapidly changing
topologies. Due to dynamic behaviour of the MANETs as well as limited range of
transmissions, the attackers can attack easily to the networks. So, when
designer implement a routing protocols, the security and energy efficiency is
the first priority for the designer. In this paper, we discuss routing protocol
and challenges and also discuss security & energy efficient routing algorithms
for MANETs.
|
Download
|
58 |
A High-Speed Clockless Serial Link Transceiver
B Venkata Sai Ravi Teja Yadav
Abstract-We present a high-speed, clockless, serial link transceiver for
inter-chip communication in asynchronous VLSI systems. Serial link transceivers
achieve high off-chip data rates by using multiplexing transmitters and
de-multiplexing receivers that interface parallel on-chip data paths with
high-speed, serial off-chip buses. While syn-chronous transceivers commonly use
multi-phase clocks to control the data multiplexing and demultiplexing, our
clock-less transceiver uses a token-ring architecture that elim-inates complex
clock generation and synchronization cir-cuitry. Furthermore, our clockless
receiver dynamically self-adjusts its sampling rate to match the bit rate of the
transmitter. Our SPICE simulations report that in a 0.18-m CMOS technology this
transceiver design operates at up to 3-Gb/s and dissipates 77 mW of power with a
1.8-V supply voltage.
|
Download
|
59 |
Dynamic Cross Correlation Matching Algorithm for Digital Video Leakage Detection on Web
Pari Ramalingam
Abstract-Due to the increased reach of internet, streaming delivery of videos
over web is gaining more popularity. One of the major challenges in distribution
of video over web is the leakage of video to the external network in the form of
redistribution. Peer to Peer (P2P) streaming software is commonly used for the
re-distribution of videos over web. Hence the protection of video stream from
unauthorized use and duplication is critical for video streaming services.
Dynamic Cross Correlation Matching Algorithm compares the traffic pattern from
the video streaming server with the traffic pattern from the authorized user who
is suspected for re-distribution. It uses a dynamic decision threshold to
compare two different video streams.
|
Download
|
60 |
A CFD Based Study Of Film Cooling Relevant To Gas Turbine Combustor
Y. Manjunath Reddy, P.Lakshmi Reddy, G. Sivaramakrishna, Vimala Narayanan
Abstract-New age gas turbine engines are targeted to operate at increased
turbine inlet temperatures to attain higher thrusts and this is making the
combustor liners to operate at temperatures beyond the permissible metal
temperatures from metallurgical point of view. This is necessitating the
combustor designers to develop several advanced cooling techniques. Film cooling
has been the traditional and most widely used cooling technique for gas turbine
combustor liners. Most of the research on film cooling of combustor liners is
experimental in nature and several correlations were developed towards
understanding this. Of late, Computational Fluid Dynamic (CFD) studies of film
cooling have met with varying degrees of success. In this present work, CFD
analysis of film cooling process has been studied using Fluent. Initially, code
validation studies have been conducted by analyzing the flow on a flat plate and
in a film cooling setup using the data published in literature. Subsequently,
CFD analysis of a cooling ring test setup designed and developed by GTRE has
been carried out. Several parametric CFD studies were also carried out to study
the effect of hole diameter, hot gas temperature and coolant flow rate on the
film cooling performance.
|
Download
|
61 |
Design of ZVS Half-Bridge Series Resonant Inverter with Improved Efficiency for Induction Heating Applications
P. Saikrishna , T. Kavitha
Abstract-Nowadays, the induction heating market is continuously growing due to
its benefits including precise output power control, high efficiency, reduced
heating times, and cleanness. The maximum output power and efficiency are
achieved at the resonant frequency, and if the switching frequency is increased
the output power will get reduced. As a consequence, in these converters, the
efficiency is also reduced in the low-medium output power range appliances. Most
of the circuit structures in large capacity devices were adapted with
Full-bridge structures in Inverter. Because of the high power density and the
reduced cooling capabilities, efficiency becomes critical in this application.
In this study, a half-bridge series resonant inverter driven by a variable
-frequency was implemented in an inductive heating-facility in which the circuit
was adapted Resonant- Transition in Zero-Voltage-Switching (ZVS). The proposed
variable frequency duty cycle (VFDC) control is intended to improve the
efficiency in the medium and low output power levels because of the decreased
switching frequencies. This paper presents a new Design circuit topology and its
digital control scheme for a ZVS Half-Bridge Series Resonant Inverter circuit
with improved efficiency for Domestic induction heating appliances. The proposed
circuit is implemented and simulated by using MATLAB software.
|
Download
|
62 |
A Comparative Study of competitive state anxiety among team sport and individual sport players at Delhi University
Dr. Kavita Sharma
Abstract-Dealing with competitive state anxiety is a main task for coaches
because players and sport teams could not perform when they are under stress.
The researcher in the present study aimed towards comparing the Cognitive
anxiety, somatic anxiety and self confidence between the female team game and
individual game players. The statistical population used in this study contained
team sports (Kho-Kho, basketball and Kabaddi) and individual sports (taekwondo,
athletics and Judo) in Daulat ram college at University of Delhi. Samples were
female players who had competed in the intercollegiate competition. The total
number of subjects was 120 female players (60 Team Sports & 60 Individual
Sports). The age of the subjects ranged between 17-21 years, state Competitive
Anxiety Inventory (CSAI-2) for individual and team game players were
administered to the subjects within 30 minutes prior to the start of the
competition, each questionnaire took approximately 5 minutes to complete. The
collected data was analyzed by computing descriptive statistics followed by one
way analysis of variance, a significant difference for the cognitive and somatic
anxiety as the values are found to be 5.872 and 4.982 respectively, which are
significant at 0.05 level, whereas no significant difference is found for the
self confidence.
|
Download
|
63 |
Power Quality Improvement Of Fuzzy Based Predictive Control Apf
Naveen Kumar.M, R.Ramanjan Prasad
Abstract-Even many techniques proposed the Modeling and designing of the PV Cell
and its interface to the grid, it suffers from many controlling problems due the
nonlinear characteristics of the Load. This paper presents a fuzzy logic control
for controlling the dc voltage in predictive control scheme. The Four-Leg
voltage source inverter is used to inject power. The inverter can thus be
utilized as: 1) power converter to inject power generated from RES to the grid,
and 2) shunt APF to compensate current unbalance, load current harmonics, load
reactive power demand and load neutral current. All of these functions may be
accomplished either individually or simultaneously. With such a control, the
combination of grid-interfacing inverter and the 3-phase 4-wire
linear/non-linear unbalanced load at point of common coupling appears as
balanced linear load to the grid. This new control concept is demonstrated with
extensive MATLAB/Simulink simulation studies.
|
Download
|
64 |
Analysis And Fatigue Life Estimation Of Allluminium 2024 Plate With Different Stress Levels
Prasanna Medar, Imarn Ali M.R
Abstract-A number of analytical and numerical techniques are available for the
two dimensional study of stress concentration around the hole(s) and notches in
isotropic and orthotropic plates subjected to in-plane or transverse loading
conditions. The influence of the structural dimension D/A (where D is hole
diameter and A is plate width) ratio upon stress concentration factor for
different cases is studied in the present work but plate with center hole is
created and adjacent small holes created but diameter is varied and distance
between one hole to another is also varied so finally study the stress
concentration around the holes using ANSYS software. work is to investigates how
part geometry can influence the maximum stress found at critical points for a
rectangular plate with a large hole in the center and changing the adjacent
small hole diameters to see the effects on the magnitude of the maximum stress
and understand how this influences the stress concentration factor. The symmetry
of this condition will be used to make the analysis simpler by dividing the part
into quarters and finally estimating the fatigue life of the plate with varied
parameters.
|
Download
|
65 |
PV Fed Inverter/Converter Circuit With Dual-Mode Control For Ev/Hev Applications
K. Sheshu kumar, S.V.Sindhusha, Ravali
Abstract-In recent years, renewable energy sources such as photovoltaic (PV),
wind, fuel cell, etc gain importance due to the limitations of conventional
energy sources. Renewable energy sources play an important role in rural areas
where the power transmission from conventional energy sources is difficult.
Other advantages of renewable energy sources are clean, light and does not
pollute atmosphere. Hybrid electric vehicles (HEVs) powered by electric machines
and an internal combustion engine (ICE) are a promising mean of reducing
emissions and fuel consumption without compromising vehicle functionality and
driving performances. The proposed integrated circuit allows the permanent
magnet synchronous motor to operate in motor mode or acts as boost inductors of
the boost converter, and thereby boosting the output torque coupled to the same
transmission system or dc-link voltage of the inverter connected to the output
of the integrated circuit. Electric Motors, those are used for EV propulsion
must have high efficiency for maximum utilization of the energy from batteries
and/or fuel cells. A new control technique for the proposed integrated circuit
under boost converter mode is proposed to increase the efficiency. Since the
light load performance is in recent focus of interest, appropriate algorithms to
improve light load efficiency were implemented. The proposed control technique
is to use interleaved control to significantly reduce the current ripple and
thereby reducing the losses and thermal stress under heavy-load condition. When
pv fed inverter/converter circuit is operated for single input under closed
loop, multiple outputs are obtained.
|
Download
|
66 |
Interleaved Single- Stage Pfc Ac-Dc Converter For Asynchronous Motor
Srikanth.D, Ravali, S.V. Sindhusha
Abstract-A new interleaved single-stage ac–dc converter is proposed in this
paper to reduce line current harmonics while achieving power factor correction
(PFC). The proposed rectifier can produce input currents that do not have dead
band regions with high PFC, operate with a continuous output current, and
minimize the input electromagnetic interference filter size. In this paper, the
operation of the new converter is explained, its features and design are
discussed in results, and its operation is confirmed with experimental results
obtained from a prototype and the performance of asynchronous motor is tested.
|
Download
|
67 |
A Comparative Study Of Different Cloud Servers On The Basis Job Scheduling Approach
Karan Sood , Jasmeet Singh Gurm
Abstract-Cloud computing is the technology in which sharing of resources or
communication takes place over the internet through clouds. Cloud computing
allows to communicate between clients and providers without the need of
installation. It has been found that today large number of companies is adopting
the cloud technology to gain the profit in less cost. But sometimes due to high
usage of systems problem of load balancing occurs. Load balancing is what it
means balancing the work between all the systems, in which some systems has less
work, so that throughput can be enhanced. In the proposed work, we will achieve
good load balancing via use of FCFS and Priority algorithm. The whole simulation
has been taken place in .NET environment. Also in the end it will be evaluated
which one performs better in load balancing.
|
Download
|
68 |
Energy Consumption by various Job Scheduling Approaches
Manveer Singh , Jasmeet Singh Gurm
Abstract-Data centers are the core part of any cloud computing services. These
are used to store huge amount of data, like Google, Amazon, Yahoo and eBay are
operating such huge datacenters around the world. Today, a typical datacenter
with 1000 racks need 10 Megawatt of power to operate, which results in higher
operational cost. The main issue that exists in today’s era is energy
consumption. There is a strong need to manage energy consumption across IT
sector. In the proposed work, energy consumption is reduced by the use of FCFS
and Priority based algorithm on the basis of jobs executed. The results and
experiments are evaluated in .NET environment.
|
Download
|
69 |
Power Quality Enhancement By Using D-Statcom
In Distribution Networks
Pratibha Bamankar,
Anil Chaudhary,
C.Veeresh
Abstract-A Power quality problem is an occurrence manifested as a nonstandard voltage, current or frequency that results in a failure or a mis-operation of end user equipments. Utility distribution networks, sensitive industrial loads and critical commercial operations suffer from various types of steps in this direction. The present work is to identify the prominent concerns in this area and hence the measures that can enhance the quality of the power are recommended.
This paper presents the enhancement of voltage sags/swell; harmonic distortion and low injects a current into the system to mitigate the voltage sags/swell. to improve harmonic distortion and low power factor. The simulations were performed using MATLAB SIMULINK version R2009b.
|
Download
|
70 |
Path Loss Models for Suburban Areas of Dehradun using
Anfisedit Tool
Ujjawal Bahuguna, Bhagirathi Pradhan, Govind Sati
Abstract-Path loss is the reduction in power density of electromagnetic wave as it propagates through the space. The purpose of this paper is to propose the path loss with the field measurement model and represent them in a convenient form of fuzzy logic modeling. This paper proposes method to predict path loss of base station in cellular mobile communication system using fuzzy logic. The propagation medium is classified in to several well-established propagation environments defined as a fuzzy set such as free space, flat area terrain, light structures terrain, heavy structures terrain, and village terrain. A unique mean path loss exponent (n) is assigned to each propagation environment, which is established by means of the experimental. Fuzzy logic is used to determine “n” number for an unknown environment, which will be obtained using linguistic rules that provide a fine-tuning of the known propagation environments. HATA model is been used for the present analysis.
|
Download
|
71 |
A Study of MAC Layer Protocols for Congestion Control in VANETs
Nancy Sharma, Tanu Preet Singh
Abstract-VANETs that aims to provide safety, comfort have emerged as a powerful technology and a standard of communication among vehicles. Congestion control is a challenging issue in VANETs which can degrade the network performance. In this paper survey and analysis of recently developed VER-MAC, a MAC layer protocol for congestion detection and control in VANETs is presented. A MAC protocol for efficient broadcast service is of great importance to support high priority safety applications. This protocol allows nodes to broadcast safety packets twice during both the control channel and service channel interval that increases the broadcast reliability. This protocol uses 2-D Markov chain model to analyze the performance of both IEEE 1609.4 and VER-MAC. This survey exposes the advantages and weaknesses of existing congestion control algorithm. Finally, numbers of parameters are selected for comparison and analysis with existing protocol VER-MAC.
|
Download
|