Sr/No/ |
Title |
Pdf |
1 |
Design and Implementation of 64-bit Multiplication using
CLAA & CLSA
Shaik Mohammed IrshadAhmed, K. Sanjeeva Rao
Abstract —In this paper deals with the comparison of the VLSI
style of the carry look-ahead adder (CLAA) based mostly} 32-bit
signed and unsigned whole number and also the VLSI style of the
carry choose adder (CSLA) based 32-bit signed and unsigned
whole number. Multiplication could be an elementary operation in
most signal process algorithms. Multipliers have giant space, long
latency and consume hefty power. So low-power number style has
been a vital half in low- power VLSI system style. A system’s
performance is mostly determined by the performance of the
number as a result of the number is mostly the slowest part within
the system. Moreover, it's usually the foremost space intense.
Hence, optimizing the speed and space of the number could be a
major style issue. Carry choose adder is one among the quickest
adders utilized in several applications to perform quick arithmetic
functions. The CLAA based mostly} number uses the delay time of
99ns for activity multiplication operation wherever as in CSLA
based number conjointly uses nearly identical delay time for
multiplication operation. However the realm required for CLAA
number is reduced to thirty one procurable the CSLA primarily
based number to complete the multiplication operation
|
Download
Download
|
2 |
Design An Area And Speed Optimized FPU For DSP
Ankita Dixit, Atuliika Shukla, Ravi Mohan Sairam
Abstract—FPU is a key element for real time
computation of signals and real time data to meet real
time scenario of signal processing it is highly required
to make computation faster as possible so proposed
work is a fast FPU and the chip area is another
requirement to design a compact module and less
power. To achieve our set goals literature survey done
including standard journals like IEEE, IJEAT &
Hewlett Packard etc. A Hybrid FPGA has defined
course grain modules which use wide data paths, such
as, for instance 32 bits wide resources. Selection
FPGA affects our design in respect of area and speed
so we have chosen a hybrid FPGA for faster and area
optimized computation. A FPU module has three submodules
FM, FA & WB, optimizing these we can
optimized overall design we have gone through
multiple approaches for Floating multiplication and
floating addition we plan to use Mitchell algorithm
for multiplication and we will use course grain of
Vertex -4 for all logical operations. We have proposal
to modify Mitchell for designing FM.
|
Download
|
3 |
Finger Print Recognition: Survey of Minutiae and Gabor
Filtering Approach
D Annapoorani , M Caroline Viola Stella Mary
Abstract—Fingerprint-based identification is one of the
most important biometric technologies which have
drawn a substantial amount of attention recently.
Fingerprints are believed to be unique across
individuals and across fingers of same individual.
Even identical twins having similar DNA, are believed
to have different fingerprints. To address the need for
robust, reliable, and foolproof personal identification,
authentication systems will necessarily require a
biometric component. The verification system is a
one-to-one matching and is based on the comparison
of two groups of minutiae, respectively corresponding
to two fingers to be compared.
|
Download
|
4 |
Synthesis and Structural properties of pure and doped Cr2O3 nanoparticles
synthesized by novel solvent free method
Chithambara Thanu .T, Meenambika .R
Abstract—Nanoparticles of chromium oxide (Cr2O3) are widely
used in many fields serving as catalysts, wear resistance
materials, and advanced colorants. We have reported the solvent
free synthesis of Cr2O3 nanoparticles via microwave irradiation
followed by calcinations at 200, 400, 600 and 800°c for 1h. A
transparent conducting oxide is a wide band-gap
semiconductor that has a relatively high concentration of
free electrons in its conduction band. These arise either
from defects in the material or from extrinsic dopants, the
impurity levels of which lie near the conduction band edge.
As implicit in the name, transparent conductors must be
simultaneously transparent and conducting, an unusual
combination.
|
Download
|
5 |
A design for DSP processor for Transform applications
Abhishek Thakur
Abstract-As known any microprocessor is a general
purpose IC (Integrated Circuit) which simply follow
the instructions given to it, and the instructions set for
the different microprocessors are different and
designed such a way that it and perform required type
for computations. Proposed paper work is a new RISC
processor architecture for DSP and it has FSM and new
instruction set and RISC feature like executing every
instruction in one cycle. Paper work has use Xilinx ISE
12.2 ISE software for designing all modules and each
module has been tested and verified with all possible
instruction which are been supported by proposed
design. The proposed architecture for processor
requires less area and higher speed as compare with the
other existing RISC architecture available.
|
Download
|
6 |
Minimizing MCU in SRAM Cell to Enhance
Memory Reliability Using DMC
T.Maheswari, P.Sukumar, R.K.Gnanamurthy
Abstract -Computer memories are sensitive to soft
errors which can affect system reliability [1]. Memory cells
can be disturbed by high-energy neutron particles from
terrestrial atmosphere or alpha particles resulted from IC
package material.
|
Download
|
7 |
Efficient ZVS Operation Of Boost Converter With Load Variation
B. BalaRaju, N. Anjaneyulu, K.Gopala Krishna
Abstract-A new kind of step-up converter is hereby presented. It
consists of a diode, an auxiliary switch, and a coupled winding to
the boost inductor as in the conventional boost converter. By
transferring the boost-inductor current to the coupled winding in
a time of very short period, the negatively built-up Ipo current of
the boost winding guarantees the zero-voltage switching (ZVS)
operation of the boost switch in all the load conditions. Further,
since the negatively built-up Ipo current is minimized after the
zero voltage of the boost switch is achieved, the unnecessary
current build-up and the conduction loss are minimized.
Therefore, efficient ZVS operation with load variation is achieved
and the operation principle, design and simulation results of the
boost converter are presented.
|
Download
|
8 |
Power System Control through STATCOM Devices
Ms. Shweta Chourasia, Dr.Baseem Khan, Ms Ritu K.R
Abstract-Facts devices have the capability to control
voltage, impedance and the phase angle in transmission
circuit and hence control the power flow. Among the
converter based facts devices static synchronous
compensator (statcom) is considered in this paper. This
paper discusses the comparative result before
application of statcom and after optimal placement of
statcom in the system network. In the first stage newton
raphson (nr) method is used to determine voltage
magnitude and phase angle at every node of the ieee 14
bus system with and without statcom. In the second
stage genetic algorithm (ga) finds the optimal location
for placing the statcom. After placing the statcom the
losses is reduce. The proposed method is tested on ieee
14 bus system using matlab. The result of network with
and without using statcom is compared in terms of
active and reactive power flows in the line and at the
bus to analyze the performance of the devices injected
voltage, injected phase, phase distortion are also shown
graphically.
|
Download
|
9 |
Implementation of Battery Management System
with State-of-Charge estimation (SOC) and
equalization based on Modified DC/DC converter
Topology
S. Manoj Kumar, P. M. Dhanasekaran
Abstract-In this Paper, to maintain the reliability of the Battery,
state monitoring and evaluated by a sensing device that have
implemented in this proposed technique. For equalization purpose
Bi-directional DC/DC converter is used while the switching losses
is reduced and boosts the performance during equalization
period. The paper includes the development of the power
electronic switching devices and State-of-Charge algorithm for
improving battery charging/discharging performance and
efficient utilization. To design the simulation modelling of a
Battery pack with a charge module and expectation outcome for
the charge equalization topology using MATLAB/ Simulink
software to demonstrate the capability, voltage and current
stability of the Battery stack.
|
Download
|
10 |
Cluster Tree Based Model For Secure Data Retrieval In
Military Network
R.Ganesh Prabakar, K.R.Sangeethkumar, P.ArulPrakash
Abstract─Mobile nodes in military environments such as a battle
field or a hostile region are likely to suffer from intermittent
network connectivity and frequent partitions. Disruption-tolerant
network (DTN) technologies are becoming successful solutions that
allow wireless devices carried by soldiers to communicate with each
other and access the confidential information or command reliably
by exploiting external storage nodes. Some of the most challenging
issues in this scenario are the enforcement of authorization policies
and the policies update for secure data retrieval. Cipher text-policy
attribute-based encryption (CP-ABE) is a promising cryptographic
solution to the access control issues. However, the problem of
applying CP-ABE in decentralized DTNs introduces several
security and privacy challenges with regard to the attribute
revocation, key escrow, and coordination of attributes issued from
different authorities. In this paper, we propose a se-cure data
retrieval scheme using CP-ABE for decentralized DTNs where
multiple key authorities manage their attributes independently. We
demonstrate how to apply the proposed mechanism to securely and
efficiently manage the confidential data distributed in the
disruption-tolerant military network.
|
Download
|
11 |
A New Implementation for Measuring Delay and Radio
Frequency/Ability in Wireless Networks
Sanyasi Naidu K, Santosh Naidu P
Abstract -Normally delay in the previous work on only on
mesh topology, but on wireless sensor networks but always
experimentally calculation and rectification of delay in the
Wireless Sensor Network is a big challenge. Once the
Wireless Sensor Network created statically or
energetically/changing quickly as needed router or central
server have to face big very hard to maintain the peers
information. We use grouped flows (machine/method/way)
with (making two or more things look the same or happen
at the same time) to get the perfect delay in the session
wise. Once the path(s) established for transmission the
source and destinations will be under one session for
logging (further checking (for truth)). The moment the
data transmission is started our approach will check the
session for any existing session which is matching with the
current transmission. If it matches, the communication
will not get copied and ignored and also log will not be
updated. If any session is not matching with current
transmission session then this session finds the shortest
path for transmission and also calculates the average delay
for that session's all communications.
|
Download
|
12 |
Environmental Philosophy
In Literature
Laxmikant Tripathi, Dr. Karunesh Jha, Dr. Druv Kumar Dwivedi
Abstract-One of the most notable concerns of the
modern world is the issue of environmental protection.
Most of the developing as well as the developed
countries put this issue at the top agenda and allocate
specific funds to achieve optimum success in this
direction. It is globally felt that the biggest menace to
humanity in recent years has not come so much from
military invasions as from the environmental disasters.
The chief factor responsible for environmental
deterioration is believed to be the modern way of living
impacted by the capitalist thought of industrial
imperialism. This leads impious encroachment into the
world of Nature which tends to strike back after a
certain interval of time. Remarkably, the world
literatures have contributed a great deal for
maintaining ecological balance. Various philosophical
trends are traceable in these literatures attempting to
create harmony between Man and Nature for peaceful
coexistence
|
Download
|
13 |
A Novel Energy Efficient Gaussian Smoothing
Filter for Image Processing
Dileep Singh Kushwah , Mrigendra singh and Vijay Kumar Magraiya
Abstract—The VLSI design for today’s application has
become very complex and requires huge computational power
to satisfy users demand. In order to utilize the design into the
battery operated devices it must be energy efficient. So the
energy efficiency is the prime concern for today’s VLSI
design. In this paper, we propose a novel energy efficient
approximate Gaussian Smoothing Filter that provides better
results over the conventional approach. The proposed design
is implemented in Tanner EDA tool to obtain design metrics
and modeled in MATLAB to get error metrics. Simulation
results shows that proposed filter improves the area, delay
and power by 33%, 14%, and 25% respectively. Moreover the
design improves energy by 35% over the existing design at the
cost of 6.68dB loss in PSNR.
|
Download
|
14 |
A thumping approach for controlling congestion in
Smartphone based mobile networks
A.Aishwarya, Prof. M.Govindaraj
Abstract— Smartphone networks (SNs) is one of
the type of delay tolerant networks (DTN). In
DTNs the Smartphone mobile users transmit
with each other through short distance and
provide a device to device communication. The
major provocation problem of Smartphone
networks is to control the congestion. The main
focus is to research the context information
between mobile nodes to control congestion. To
avoid a discontinuous connectivity and
everlasting disconnection in smart phone
networks for providing a complete path from
source to destination. To determine the
forwarding set by using the CRITIC method
which includes those messages that cause the
least congestion in network.
|
Download
|
15 |
A Review on Voltage Stability Improvement Using
SVC in Transmission Line
RoshniKesherwani, AshishChoubey
Abstract— Power system stability is defined as the
ability of power system to preserve it’s steady
stability or recover the initial steady state after
any deviation of the system’s operation. In this
paper previous various studies for shunt FACTS
device-SVC is used in a two area power system for
improving the power system stability is presented.
SVC plays an important role in improving the
transient stability, increasing transmission
capacity and damping low frequency oscillations.
|
Download
|
16 |
Determination of heat flow rate of turbine blades
exposed to products of combustion
Sampath S S, Sawan Shetty, Chithirai Pon Selvan M
Abstract—The present work investigates the thermal properties
of the turbine blade which is exposed to the products of
combustion. Profile of the blade is modelled and analyzed using
the computational analysis software ANSYS CFX and the
comparative tool DOT NET software. Temperature distributions
at various points of the blade are deduced and the overall heat
transfer is determined. A detailed study is conducted by
considering different materials to obtain optimum material
selection.
|
Download
|
17 |
Efficacy of GcMAF in Treating Feline
Immunodeficiency Virus in a Cat: a Case Report
Giovanna Gallone, Dario Siniscalco
Abstract- A male cat was diagnosed of FIV infection. After
inefficacious antibiotics therapy, the owner treated the cat with
Gc Macrophage Activating Factor (GcMAF), a protein
responsible to induce macropaghe activation. After five weeks of
treatment, the cat showed strong signs of improvement. As novel
information, we indicate the possible use of GcMAF in FIV
management.
|
Download
|
18 |
Risk Management Practices in a Construction Project
Upendra Saharkar, Navnath D.Shendage
Abstract— The purpose of this master thesis is to
evaluate how the risk management process is used
in the construction industry and how the
practitioners are managing risks in everyday
situations. The theory of the risk management
process will be compared to the actual practice in
order to investigate similarities and differences. In
other words, the main idea is to see if the
construction industry is working with risk
management as it is described in the literature
regarding the methods and techniques presented.
|
Download
|
19 |
Improved Global Image Denoising Using
PDE and canny edge detection algorithm
Ajith G, C. Balaji
Abstract-Image denoising is one of the
fundamental problems in image processing.
Here proposes a technique for filtering, where
each pixel is estimated from all pixels in the
image. The system uses Nystrom extension for
statistical analysis. In the field of image
processing, the noise of an image means the
appropriated random error introduced to the
image during the process of digitization. These
noise is usually unwanted and unpredictable. In
the use of partial differential equations (PDEs)
have advantages like such as easy description of
local features of an image, provide
mathematical theory for many algorithms,
preserving most structures and information of
an image, simulate the dynamic process of
image restoration etc. Canny edge detector, an
edge detector that uses a multi stage algorithm
to detect a wide range of edges in image with
matlab tool. This method achieves better
structural similarity performance and provides
better visual quality.
|
Download
|
20 |
A Review Paper on Web Mining
Neha Soni
Abstract- As growing need of World Wide Web in Corporate
business, Web mining plays an important role to understand
Visitors usage habits. In order to design web site one should first
analysis web visitor pattern. In this paper I am presenting three
Web mining. Web Usage mining, web Content mining, Web
Structure mining.
|
Download
|
21 |
Analysis of Interleaved Flyback Converter with Voltage
Multiplier Circuit
S.C.Logesh, N.veerakumar
Abstract-The recent growth of battery powered applications
and low voltage storage elements are increasing the demand of
efficient step-up dc–dc converters. Typical applications are
embedded systems, renewable energy systems, fuel cells,
mobility applications and uninterrupted power supply (UPS).
These applications demand high step-up static gain, high
efficiency and reduced weight, volume and cost. Usually, the
conventional boost converter cannot realize high voltage gain
even with high duty cycle due to the parasitic parameters
limitation.
|
Download
|
22 |
Computer Aided Screening of Tuberculosis Using Chest Radiographs
Anandkumar A, Kannan R.
Abstract-Tuberculosis, is an infectious bacterial disease caused by Mycobacterium tuberculosis, which most commonly affects the lungs. Approximately One third of the world’s population is infected with TB. The mortality rate of patients with Tuberculosis is increased if it is undiagnosed. The standard diagnosing methods of tuberculosis are slow and unreliable. In an effort to overcome the difficulty, this project presents an approach for detecting tuberculosis in conventional poster anterior chest radiograph. The lung region is extracted using a graph cut segmentation method. A set of texture and shape features are computed for the segmented lung region, which is given as input to the pre-trained SVM (Support Vector Machine) classifier. The classifier outputs its confidence in classifying the input CXR as TB positive case. The performance of the system is analyzed using MATLAB R2013a simulator.
|
Download
|
23 |
Estimation and optimization of Direction of Arrival-Survey
Kumari A K, Suganthi B, Chitra Lekha
Abstract-In signal process literature, direction of arrival denotes the direction from that typically a propagating wave arrives at some extent, wherever typically a collection of sensors square measure set. These set of detectors forms what is known as sensor array. This paper describes the survey that has the study of estimation of Direction of Arrival (DOA) and therefore the improvement of direction of arrival by numerous Evolutionary Algorithms (EA). It includes the study of antenna placements in numerous environments and their calculable parameters. Estimation algorithms embrace correlation, maximum likelihood, and MUSIC, liveliness and matrix pencil. Evolutionary Algorithms (EAs), square measure random search strategies that mimic the natural biological evolution and/or the social behaviour of species. These algorithms are developed to reach near-optimum solutions to large-scale improvement issues. The algorithms square measure random search, genetic algorithmic program, particle swarm, ant-colony systems, and shuffled frog jump.
|
Download
|
24 |
Image Morphing Using Pixel Transformation
and Information Hiding by Morphing
Vimal Singh, Poonam Sharma
Abstract— In this paper colour transition method is
based on colour difference in the pixel of the source
and target images. In pixel transformation the pixel
value of source image smoothly converted into pixel
value of corresponding destination image.
Information security is a very important issue in a
ubiquitous computing environment. Cryptography
may not be secure because it tells the attacker clearly
that some secret messages are contained in the data.
Usually, the encrypted messages look very unnatural.
Some malicious person or group may just concentrate
on the unnatural parts, and use all computing
recourses to decrypt the messages. Thus, to make the
information more secure, some other technology is
required.
|
Download
|
25 |
SAGE Based Channel Estimation In An Af Relaying Network
Sayana P S, Suga priya S
Abstract -The basic goal of any communication system is to
develop a better and reliable information transfer between a
source and a destination, using minimum power and bandwidth
.In a communication system the network will be affected by the
fading. To overcome the fading, various diversity techniques are
available now spatial diversity is one among them; in which
diversity is created by using other terminals to relay the
information from the source to the destination terminal. In order
to achieve the channel between the different antenna pairs to be
uncorrelated, the spacing between the antennas must be in the
order of wavelength. So, multiple antennas will give rise to an
increased hardware cost. For overcoming this limitation a
cooperative communication model can be introduced. The basic
aim of the project is to estimate the unknown channel parameters
from the broadcasted signals which can be done using Space
Alternating Generalized Expectation-Maximization (SAGE)
algorithm, to iteratively estimate the channel parameter from the
pilot part of the information. The affine transformation on the
received signal is done by the relays. The error is minimized using
Maximum Likelihood (ML) criteria. In order to obtain the lower
bound of the error Modified Cramer Rao Bound (MCRB) is used.
Finally the Mean Square Error (MSE) and the Frame Error
Rates (FER) are estimated after matlab simulation.
|
Download
|
26 |
Text Mining: Limitations and Future Scope
Shweta Gupta, Kirti Joshi
Abstract—This paper explains the concept of text mining. In the
first section it explains how text mining is advantageous in
different fields in terms of efficiency, development of new
knowledge, exploring new horizons, improved research process
and many other broader benefits. Further it puts light on
barriers, risks and issues involved in text mining. A survey on
various issues has been done like legal uncertainties, entry cost,
noise, document format, lack of transparency and technical
knowledge. The last section discusses the related work that has
been done in this path and also provides suggestion to improve
the results.
|
Download
|
27 |
Analysis of fuzzy working vacations queueing
models using DSW algorithm
K.Julia Rose Mary, Sheela Jancy.S
Abstract-We consider the queuing systems FM/FM/1/SWV
and FM/FM/1/MWV with finite capacity. An approximate
method namely DSW (Dong, Shah and Wong) algorithm is
applied for our models, which is based on α-cut
representation for fuzzy sets in a standard interval
analysis. For FM/FM/1/SWV and FM/FM/1/MWV
queuing models DSW algorithm is used to define the
membership functions of its performance measures.
Further the performance measures are analyzed for fuzzy
working vacation queuing models, which provides more
information. Moreover numerical example is also
illustrated to check the validity of the proposed models.
|
Download
|
28 |
Enrichment of Semantic Relation Networks in a
Knowledge Base
Avvaru Padmaja, Kotha Mahesh, Kumara Swamy, Mastan Vali
Abstract- Enrichment of semantic relations at
human level is an important. In this regard
WordNet has been built to be the most systematic
and as close to the human level and is being
applied actively in various works by using
semantic information processing in various works.
It is observed that semantic gaps I real world of
WordNet. Hence we tried to build an enrichment
of knowledge base for automatic semantic relation
network. We adapted are rule based, inference
methods to enrich WordNet. After comparative
study a word sense disambiguation method is
constructed with the state of art algorithm.
|
Download
|
29 |
Reliability of Dynamic Data Storage in Cloud Computing
Kotha Mahesh, Avvaru Padmaja, Kumara Swamy, Mastan Vali
Abstract—Cloud Computing reducing the cost
issues of organizations in terms of service
providing. Reliable data storages is a big issue in
cloud computing systems as organizations
producing large volumes of data. Cloud Service
Providers (CSP) is performing well in this regard
by remote environment. Still reliability and
security is an open problem by CSP in terms of
false accusation. In this paper we attempted deal
with the mentioned issues by using a good cloudbased
storage scheme that allows the data owner
to benefit from the facilities offered by the CSP
and enables indirect mutual trust between them.
This may gives reliable dynamic data storage in
cloud computing.
|
Download
|
30 |
An approach for detecting
Sentiments in e-commerce reviews
M.S.Abhinaya, R.Vidhya
Abstract—Trust scores are computed for the sellers in ECommerce
using ratings given by the users but it leads to “all
good reputation problem”, since all the sellers are given with
high trust scores, it is difficult for the buyers to find the best
sellers .And moreover though if the user give a good rating they
expresses their negative feeling only as feedback comments. So it
is necessary to consider those comments for computing the trust
score of a seller. The comments are analyzed and its dimension
weights are calculated and aggregated as feedback ratings and
provided as overall trust score of a seller. The techniques used to
implement this model are Natural Language Processing, Opinion
Mining and Topic Modelling .The technique like LDA and
Maxent tagging are used for computing trust score and to find
the overall opinion of the seller. With this model proposed the
sellers can be ranked effectively. This paper also focuses on
utilizing the neutral comments expressed by the user rather than
taking only positive and negative comments.
|
Download
|
31 |
Collusion free routing using RWA and WDM
Algorithm in optical networks
P.Sathishkumar A., V.Mahalingam
Abstract—In this paper, we address traffic control enhancement
in order to utilize bandwidth effectively in WDM based optical
networks as well as the wavelength assignment problems and
then develop an algorithm for both the problems. Traffics in
WDM networks can be reduced based on the available free load,
the number of wavelength used in the link as construction of predefined
alternate paths, route and wavelength assignment can be
done by considering each pair of source and destination the path
with the minimum cost function is selected as the primary path
for data transmission, allocating the adequate wavelength. This
algorithm provides a reliable and dynamic path for the data
transmission. This proposed system will use Dynamic RMSA
with HSMR algorithm to be used and the performances will be
evaluated by using ns-2 simulation models.
|
Download
|
32 |
Applications of Artificial Intelligence in Real World
Ms. Sonali R. Raut, Ms. Vanita P. Lonkar, Ms. Suchita S. Mesakar, Ms. Mamta R. Nagpure
Abstract—Artificial intelligence (AI) is one of the
revolutions in the world of information technology which
proposes lots of applications that shapes our way of living.
This paper aims to report the latest advances in every
aspect of artificial intelligence technology, including data
mining, machine learning, evolutionary computation,
neural network, computer vision and fuzzy logic and
hence we are going to study different applications of AI
because of this there are so many complicated works
become easy and convenient.
|
Download
|
33 |
Survey on Routing Protocol in Vehicular Adhoc
network
R.Ramachandiran, V.Amudharani, P.Inbavalli, R.Suganya V.Vijayakumar, K.Premkumar
Abstract—VANET is an emerging technology to
achieve inter-vehicle communications, for improving
the road safety, alerts messages, accessing and sharing
the information and entertainments. Vehicular Ad hoc
Network (VANET), a subclass of mobile ad hoc
networks (MANETs), is a promising approach for the
intelligent transportation system (ITS). The design of
routing protocols in VANETs is important and
necessary issue for support the smart ITS. Although
rich literature in ad hoc networks exists, the scale,
availability of realistic traffic data and vehicle
equipments motivate researchers to study the unique
characteristics of VANET. The aim to survey the paper
and compare literature on the characterization and
existing routing protocol of VANET.
|
Download
|
34 |
An effective approach to compute distance of
Uncertain data by using k-nearest neighbor
Suman Bhakar, Priya.S
Abstract—Clustering uncertain data has been well recognized as
an important issue. Generally, an uncertain data object can be
represented by a probability distribution. In Existing system,
Kullback-Leibler (KL) divergence approach from information
theory is used to measure the similarity of uncertain data. This
approach work is based on probability mass function calculation,
where continuous and discrete values of uncertain data are
calculated. By using the probability mass function, distance value
of continuous and discrete cases are calculated individually. The
probabilistic ratio of both the cases is used to calculate the
similarity. Then, the Density based clustering approach is used to
cluster the uncertain data. However, choosing the nearest
neighbor is a drawback in the existing system. To overcome this
issue proposed system introduces K-nearest-neighbor algorithm
to calculate the nearest neighbor. The K-nearest-neighbor (KNN)
algorithm measures the distance between a query scenario and a
set of scenarios in the data set. Here, distance is calculated for
both continuous and discrete cases by using Probability mass
function. Then, nearest neighbor is calculated by applying KNN
approach. Thus, proposed system overcomes the existing
drawback and produce effective result.
|
Download
|
35 |
Design and Simulation of Fractal Antenna for UWB Application
Abhishek Kulshrestha, Bhagwat Khakde
Abstract—This paper presents the design and simulation of
fractal antenna that contributes ultra-wide band characteristics.
Fractal technique is adopted to improve the radiation efficiency
and other related antenna parameters. The impedance
bandwidth of the proposed fractal antenna is 9 GHz ranging
from 3.5GHz to 12.5GHz with maximum gain of 6.2dB and
efficiency of %. Analysis of antenna is done using CST
Microwave Studio.
|
Download
|
36 |
Multi-IDF Scheme for large scale image retrieval
G.Kavitha, E.Hari Prasath, P.Arul Prakash
Abstract—Visual matching could be a crucial step in image
retrieval supported the bag-of-words (Bow) model. Within the
baseline technique, 2 key points are thought of as an identical
try if their SIFT descriptors are amount to identical visual
word. However, the SIFT visual word has 2 limitations. First, it
loses most of its discriminative power throughout division.
Second, SIFT solely describes the native texture feature. Each
drawbacks impair the discriminative power of the Bow model
and result in false positive matches. To tackle this downside,
multiple binary options are embedded at assortment level. To
model correlation between options, a multi-IDF scheme [8] is
introduced, through that completely different binary options
are coupled into the inverted file. Matching verification
methods [5] are supported binary options. The joint
integration of the SIFT visual word and binary options greatly
enhances the preciseness of visual matching, reducing the
impact of false positive matches. The planned technique
considerably improves the baseline approach. Additionally,
massive scale experiments indicate that the planned technique
needs acceptable memory usage and question time compared
with alternative approaches.
|
Download
|
37 |
Mining Big Data: scope and challenges
Arti S. Bhoir, Archana Gulati
Abstract—Nowadays, Big Data is considered as a driving force
for business & technology innovations as well as economic
growth. Big data is the term for collection of data sets, which are
large & complex. With Big Data databases, enterprises can save
money, generate more revenue, and achieve many other business
goals. Data Mining is the process of analysing data from different
perspectives & summarizing it into useful information. This
paper focuses on various features of Data mining and challenges
in Big Data. It further provides solution to the challenges faced
by mining in Big Data.
|
Download
|
38 |
Implementation of Speed Efficient Image Compression Unit for
640x480 pixel using VHDL
Mr. Shubhdeep Bhatt, Prof. Vinod Kapse
Abstract—This research work is devoted to design high speed
Image Compression Unit, which ultimately performs jpg to
jpg/bmp to jpg to jpg compression operation. In which JPEG
Encoder is the key element of digitized image compression unit,
which is used in many places such as for multi-image disk
storage, sending of many images through email etc. Speed is the
most prominent factor of this JPEG Encoder being used recently.
That’s why it’s imperative to design high speed Encoder, which
can enhance the efficiency of those modules which lies upon the
image compression operations performed by JPEG Encoder. To
enhance speed of this unit we have used Ping-Pong buffer that
gives much better result in comparison to other conventional
buffer in terms of speed. Further we have analyzed hat 2-D DCT
provides much better results in comparison to other
transformations like Fourier Transform, Discrete Wavelet
Transform with respect to speed. And found that the 2-D DCT
with Ping-Pong buffer gives better outcome. Then we have
proposed that design for the JPEG Encoder unit design. This
proposed image compression Unit is able to perform image
compression operation at high speed. And after designing each
module individually, it has been integrated to design final
module, in which reset and clock functionality has been provided
to have better control on the circuitry. To design proposed JPEG
Encoder unit Verilog hardware description language (HDL) has
been used to design test bench, VHDL has been used to design
modules and Matlab has been used to fetch the images from
folder. For this design the target FPGA belongs to Virtex-5
(family), XC5vsx92t (device), ff1136 (package) with speed grade
of -2. For synthesis purpose Xilinx synthesis tool (XST) of Xilinx
ISE-13.2i has been used. For the behavioral simulation purpose
ISE simulator has been used.
|
Download
|
39 |
Quick Review on multiplication Algorithm for
enhancing efficiency of MAC Unit
Mr. Irshad Khan, Mr. Sunil Shah, Prof. Vinod Kapse
Abstract—This review work is devoted for seeking speed efficient
Multiply Accumulate Unit. As we know that MAC Unit is a
digital co-processor which can performs multiply then
accumulate operation. MAC Unit is the heart of digital signal
processors to perform various sophisticated tasks that includes
FFT, DFT, resolving various complex equations and Convolution
etc. apart from this it is also used in various other configurations
such as IIR, FIR etc. Every digital domain based technology
depends upon the operations performed by MAC Unit either
partially or whole. Speed is the most prominent factor of
processor and controllers being used recently. To meet this
major concern of “speed” we need particular high speed MAC.
That’s why it is highly required to design high speed MAC,
which can enhance the efficiency of those modules which lies
upon the operations performed by MAC. The speed of MAC
greatly depends upon the speed of multiplier. At algorithmic and
structural level there are so many multiplication algorithms exist
now-a-days. After a thorough study and proper analysis we have
seen that Vedic multiplication technique is the best algorithm
that gives much better result in comparison to others in terms of
speed. Further we have analyzed different existing Vedic
multiplication hardware, and compared those with respect to
speed. And found that the Vedic multiplier with Carry Save
Adder gives better outcome. Then we have proposed that
multiplier for the MAC unit design. This proposed MAC Unit is
able to perform different arithmetic operations at high speed. All
sub-modules in the MAC unit has been designed in
combinatorial form. And integrated in the final module, in which
we have provided the reset and clock functionality to have better
control on the circuitry.
|
Download
|
40 |
Improving Energy Efficiency of Finger Printing System Through Geo Localized Radio Database Compression
Nagajothi.P, Iswarya.M, Bhuvaneswari.P, MohanaPriyanka.S, Naveena.P
Abstract—Although location based finger printing positioning method on cellular networks is effectively implemented, still there is a need in optimizing the energy efficiency of the finger printing system with respects to green networking. In this paper we develop a new analytical model to shrink the fingerprint database through geo localized radio database compression. We apply identifying the fingerprints based on geo location leaving the unnecessary fingerprints. This location based geo compression reduces the computational load and improves the energy efficiency and time. The geo localized compression targets by reducing the errors in identifying the distance.
|
Download
|
41 |
Identification and Segmentation of Helmets in
Motorcycles
G.S.Gopik, R.M.Bhavadharini, Dr.S.Karthik
Abstract—The traffic video surveillance system is present in
many countries to monitor the road traffic. The events are
monitored as a whole to identify any violations. Our work is to
detect whether the motorcycle riders are having the helmets.
Even though motorcycles are convenient means of
transportation, it is not so safer. Road traffic injuries are a major
public health problem and a leading cause of death and injury
around the world. Motorcycle and bicycle riders are at an
increased risk of being involved in a crash. This is because they
often share the traffic space with fast-moving cars, buses and
trucks, and also because they are less visible. Motorcycles are
difficult to detect using the surveillance cameras, since they
overlap with other vehicles in the traffic. Here, we have give a
traffic video as input. In this video, we apply background
extraction algorithm. This is used to extract the foreground
objects in the video which is then extracted as frames. In the next
stage, the SIFT (Scale Invariant Feature Transform) algorithm is
used to detect a motion object motorcycle. Using the Region of
Interest (ROI), it chooses the location where the helmet can be
found. This area is extracted and the helmet is detected.
|
Download
|
42 |
A Comparative Study Of Forecasting Different Data-Sets By Feed Forward Artificial Neural Network Using Data Mining
Meenu Madan, Dr. Sarsij Tripathi
Abstract—Forecasting time series data of different fields like finance, production, industries, etc. is an important problem that is receiving great attention of the researchers. Prediction of stock market opening, closing, high, low, etc. are an issue of interest to financial markets. Rice production in country is of great concern. Milk production is also one of the fields which are of concern as it is the basic necessity for a common man. Many prediction techniques have been used in stock forecasting, Rice prediction, milk prediction. Neural networks are one of the most suitable techniques for forecasting the future value considering the past data.
This paper aims at collecting the past voluminous data belonging to different fields to forecast the future values of the same using Feed Forward Artificial Neural Network along with data mining concepts. We have calculated the Root Mean Square Error between the actual data and the predicted data. We have used Resilient algorithm in this research work. In this research work we have implemented different ANN architecture using Encog Framework supported by Visual Studio to forecast voluminous data of different fields such as stock market, crop production, etc .
|
Download
|