Sr/No/ |
Title |
Pdf |
1 |
Artificial Neural Network in ATM Forecasting: A
Survey
Renu Bhandari , Jasmmen Gill
Abstract —This paper summarizes the some of the most
important developments in neural network research.
Our purpose is to provide a synthesis of the published
research in this area and stimulate further research
interests and efforts in the identified topics.
|
Download
|
2 |
Design the Effect of Flow Mal-Distribution on the
Performance of a Catalytic Converter
M.Achudhan, Premjaikumar
Abstract—The first step in improving emission performance
was to move a fraction of the total required catalyst volume
into the engine compartment to take better advantage of the
hot exhaust gases for early catalyst light off. These so called
warm up systems were already efficient enough to avoid the
usage of more complex external supplemental heat systems.
In order to define the most efficient insulation method, the
heat transfer modes need to be analyzed. In the past,
catalytic converters have been insulated internally by the
mat surrounding the ceramic substrate but also by adding
an external heat shield. The insulation mat is a mixture of
ceramic fiber and vermiculite, which expands at high
temperature and mechanically holds the catalyst to
compensate for the difference in expansion between the
ceramic substrate and the metallic can. Later, the internal
insulation alone was found to be sufficient. This allowed
removal of the heat shield, which was often a source of
audible noise.
|
Download
|
3 |
Design and implementation for PV inverter based on
novel soft switching current –fed half-bridge front end
converter
S. Sentil Kumar, Sidappa naidu
Abstract—Front end converter (FEC) plays a major role
and its switching operation is per-formed by MPPT
based pulse generations. The overall converter
performance is verified through MATLAB (Simulink).
Recent days the growth in peak demand for the
increasing of distributed and deregulated energy
systems require an optimized grid control unit. The
advances in computing and communication technologies
forming the traditional power network into a smart
grid, capable of real-time remote monitoring and
control. Mart is particularly well- suited for renewable
energy sources; power is utilized, depending upon the
availability of natural resources.
|
Download
|
4 |
Efficient Data Storage in Cloud and Ensuring Data
Security Using Des Algorithm
Sabbavarapu Venkatesh, Shaik Shafiulilah
Abstract—Cloud computing is a term explains storage and
retrieval of data through computing techniques rather than
having them in local servers or personal devices to use the
applications. In cloud computing, the term cloud refers to
internet. So the term cloud computing means a internet based
solution to provide various services such storage retrieval,
modifications to organizations computers and devices through
the internet. Cloud computing in general terms delivering
services through the internet.
Cloud computing provides an virtual storage for users based on
their usage , other way by default specified virtual storage is
given to users. This helps the organizations to reduce the
maintenance and investment costs of servers. User data is sent to
cloud and stored in public environment. In public cloud other
user’s data also present and for security reasons it is vulnerable.
Another chance that the cloud providers can see the data if there
is no encryption.
Security of cloud storage is ensured through confidentiality
parameter. The data storage on un-trusted cloud makes data
security as a challenging problem. This work is towards using
cryptographic techniques to overcome this problem. The user’s
data encrypted before send to the cloud storage. This approach
makes the data secure and private even though it is stored in a
public domain. In this project used Drop-box as public cloud and
JAVA programming language to implement this project.
|
Download
|
5 |
Ethical Hacking phases and securities
S.Sathish
Abstract-Hacking is a process in which, a person or
team exploits the weakness in a system for selfproceeds.
Ethical hacking refers to the act of locating
weaknesses and vulnerabilities of computer and
information systems by duplicating the intent and
actions of malicious hackers. Ethical hacking is also
known as penetration testing, intrusion testing, or red
teaming. Ethical Hacking is an activity which focuses on
the vulnerability in a system and discovers the weakness
and try to rectify the security weakness of a system. In
the emergent field of internet, computer security is the
ultimate concern for the organizations and
governments. Ethical hacker plays a vital role in
protecting the valuable and sensitive data in a system.
Ethical hackers typically have very strong
programming and Networking skills and apply their
silks to protect sensitive data they work on client side.
|
Download
|
6 |
Levels of Polycyclic Aromatic Hydrocarbons in Water at
Betem Rivers State
T.J.K. Ideriah, J. Nwinaa-ie
Abstract - The levels of Polycyclic Aromatic Hydrocarbons
(PAHs) in ground and surface water in parts of Betem
community were assessed using Gas Chromatograph, HP 5890
Series II. The results showed that the highest concentrations of
carcinogenic PAH in the area were Benz(a)anthracene 0mg/l
(in both Ground and surface water), Benzo(a)pyrene 1.280x10-
4mg/l (groundwater) and 5.194x10-5mg/l (surface water),
Benzo(b)fluoranthene 6.025x10-4mg/l (groundwater) and
1.779x10-4mg/l (surface water), Benzo(k) fluoranthene
8.736x10-4mg/l (groundwater) and 2.930x10-4mg/l (surface
water),Chrysene 8.941x10-5mg/l (groundwater) and 2.203x10-
5mg/l (surface water), Dibenz(a,h)anthracene 1.254x10-4mg/l
(groundwater) and 6.113x10-5mg/l (surface water), Indeno
(1,2,3-cd)pyrene 6.480x10-4mg/l (groundwater) and 1.145x10-
3mg/l (surface water). The total PAHs in the water from the
area exceeded permissible limit. The t-test between the mean
concentrations of carcinogenic and non carcinogenic PAHs
showed no significant difference (P>0.05) in all the sampling
stations. The ground water samples were more contaminated
than the surface water samples. The concentrations of toxic
and carcinogenic PAHs such as Benzo(b)fluoranthene,
Benzo(k)fluoranthene and Indeno(1,2,3-c,d) pyrene exceeded
their permissible limits in Abude hand dug well, Maakakuru
stream and NDDC Borehole. The inhabitants of Betem
community are exposed to serious health and environmental
effects as they depend on the water from these sources for
drinking, agriculture and other domestic purposes. It was
recommended that Government should provide better sources
of drinking water for the community. Also there should be
awareness campaign and local crude oil refining (bunkering)
activities should be discouraged.
|
Download
|
7 |
Analysis of Doubly Fed Induction Generator Wind
Turbine Systems under Recurring Grid Faults
G.Suganya , K.Mekala
Abstract- In this work, analyses the performance of
DFIG WTS under recurring symmetrical grid fault,
and establish the mathematical model of the DFIG
under recurring symmetrical grid. The analysis is based
on the DFIG wind turbine system with the furthermost
conventional Low Voltage Ride Through strategy –
using rotor side crowbar. The effect of the voltage dips
level and the grid fault angle of the first grid fault, as
well as the duration between two faults on the transient
rotor current, stator current and torque fluctuation
under the second grid faults are estimated, and
compared with the situation under single grid fault. The
mathematical model of the DFIG under recurring grid
faults are tested by the simulations on a 1.5MW DFIG
WTS simulation model, and it is also experimentally
tested using a 30 kW DFIG test platform.
|
Download
|
8 |
A study on preparation and characterization of pineapple
jams prepared with carrot for enriching vitamin A content
Jalees Siddiqui, Dheerendra Kumar, Madhulika Singh
Abstract-The present investigation was made with an attempt
to develop nutritional jam blend with β- carotene rich carotene.
Since jam as widely used in households and mainly consumed by
children, therefore, such kind of product could prove beneficial.
The experimental product constituted of increasing
concentration of carrot juice with decreasing amount of
pineapple while absence of carrot in control product. The four
treatments (T2,T1,T0 andT3) were compared on their different
properties viz., physico-chemical analysis moisture percentage,
acidity, protein, ascorbic acid, ash, and pH for estimating its
nutritional content and safety and Organoleptic characteristics
like flavor and taste, body and texture, color and appearance by
trained panelist using 9 point hedonic scale. The treatments T3
showed best results obtaining the highest score value.
Microbiological analysis was carried out to assess the shelf life of
the treatments. The results revealed less than 10/g (standard
value) yeast and mould count and negative coliform test when
compared with the FPO standards.
|
Download
|
9 |
Multi Stage Power Conversion with Power Electronic
Transformer
J.Thirumalesh, G.Srinivas, R.Ramanjan Prasad
Abstract-This paper proposes the simulation of Multi- Stage
power conversion with bi-directional power flow capability with
power electronic transformer fed to Induction Motor. The
conversion topology not only performs voltage transformation
and electric isolation as the traditional power transformer does,
but also provides additional features like facility to control the
input current and power factor. Also, it makes the whole system
smaller and compact and there is no need of installing any other
protective relays for protection during faults .It simply works as
a power quality conditioner. Conversion of single phase ac to
constant frequency adjustable magnitude ac with a high
frequency transformer fed Induction Motor is introduced.
|
Download
|
10 |
A Review on Distribution System Feeder
Reconfiguration
Ankita Sharma, Nisheed Soni
Abstract─ Power distribution systems typically have tie
and sectionalizing switches whose states determine the
topological configuration of the network. The system
configuration affects the efficiency with which the
power supplied by the substation is transferred to the
load. This paper presents a review over the
reconfiguration of the distribution system to minimize
the losses. The various techniques used by the previous
researchers are reviewed.
|
Download
|
11 |
Novel Approach for Glaucoma Detection
Harshada Sonkamble, Dipti Pawade, Shubhangi Rathod
Abstract -Glaucoma is one of the most common causes of
blindness. The manual examination of the optic disk (OD) is a
standard procedure used for detecting glaucoma. It is based on
analysis of the optic disk (OD). An automatic OD detection
technique is based on division of OD and cup regions from single
eye retina images. A cup segmentation method is based on
anatomical evidence such as vessel bends at the cup boundary.
The proposed system will use circular Hough transform for OD
segmentation which gives the circular shape of an optical disk.
Cup segmentation is applied to the optic disk. SURF (Speed up
Robust Feature) is used for feature extraction. SVM classifier is
used for classification.
|
Download
|
12 |
DComparative study I.C. Engine air cooling circular fin
using different aluminum alloy materials
Rohit Sahu, K. K. Jain, R. K. Dave
Abstract-The fins are generally extended surfaces of projections
of materials on the system. The fins are generally used to
increase the heat transfer rate from the system to the
surroundings by increasing the heat transfer area. The heat
transfer rate depends upon the velocity of the vehicle and fin
geometry and temperature of cylinder many experimental
methods are available in literature to analyze the effect of these
factors on the heat transfer rate. The main objective of the
research is to accomplish the comparative study of fins of
different profile made by different aluminum material alloys.
The study is carried out based on the finite element analysis.
The aim of the work is to determine the optimum material fin
based on the various parameters based on the thermal analysis.
The parametric model is created in 3D modeling software
CATIA V5-R20. Heat transfer simulation will be conducted
using ANSYS Workbench 14.0 software.
|
Download
|
13 |
Improving the Power System in CMOS Start-Up
Circuit in Radio Frequency Identification
Application
Pavendan.K, Padmapriya.G
Abstract— CMOS is used to construct the integrated
circuits with low level of static leakage. With this low
level leakage we are designing all the transistor circuits
in CMOS logic. To control this static leakage in the
circuits the supply voltage is a major concern. Here the
step-up converters with charge pump and the level for
maintaining its threshold voltage (VT) is to be analyzed
and proposed. Here we are going to propose the novel
approach as body bias effect and sub-threshold logic.
This will be applied for the step-up converters for
energy harvesting applications. In this paper we design
a step up converter using Variable body bias technique
using cadence Tools.
|
Download
|
14 |
Asynchronous Domino Logic Pipeline Design
Critical Data Path and low power consumption
T.Pravagna, P.Prakash
Abstract— Asynchronous domino logic pipeline design
method, targeting to latch-free and extremely finegrain
or gate-level design. The data paths are
composed of a mixture of dual-rail and single-rail
domino gates. Dual-rail domino gates are limited to
construct a stable critical data path. Based on this
critical data path, the handshake circuits are greatly
simplified, which offers the pipeline high throughput
as well as low power consumption. Moreover, the
stable critical data path enables the adoption of
single-rail domino gates in the noncritical data paths.
This further saves a lot of power by reducing the
overhead of logic circuits. Compared with a bundleddata
asynchronous domino logic pipeline, the
proposed pipeline, respectively, saves up to 60.2%
and 24.5% of energy in the best case and the worst
case when processing different data patterns.
|
Download
|
15 |
Performance and Analysis of CLA with Sal Logic &
Reversible Logic to Reduce the Overall Power
Consumption
Jenath.M, Suria.S.T
Abstract— Low power design has become one of the
primary focuses in both analogue and digital VLSI
circuits. Digital sub threshold logic circuits can be used for
applications in the ultra-low power end of the design
spectrum, where performance is of secondary importance.
A sub threshold digital circuit manages to satisfy the
ultra-low power requirement because it uses the leakage
current as its operating switching current. This minute
leakage current, however, limits the maximum
performance at which the sub threshold circuit can be
operated. Sub-threshold CMOS theory is a technique
which can reduce the power consumption to lower than
threshold voltage specified and adiabatic logic circuit is a
technique to reduce energy consumption by suppressing
the voltage applied to the resistance of the circuit. This
paper proposes that sub threshold adiabatic logic design
implementation of carry look ahead adder. Many power
consumption techniques have come in existence and with
that the low power design is also achieved by scaling
supply voltage, considering sub-threshold region in this
region thereby obtaining a minimum energy consumption
which also suits for low operating frequency. By using
SAL logic to design 4-bit carry look ahead adder (CLA)
and reduces the overall power dissipation. Results are
evaluated through extensive simulations in 180nm CMOS
technology using CADENCE VIRTUOSO TOOL at
180nm technology.
|
Download
|
16 |
A High Performance Low-cost VLSI Architecture for
Image Scaling Processor
Sk.Ayesha, A. Rama Krishna Prasad
Abstract—Image scaling is the process of resizing a digital
image. It is one of the most important methods used in various
applications such as sharpening of an image, image zooming,
preserving edge structures in an image and the image processing
techniques described here can be implemented by both the
hardware and software contained within image processing
system. One method is to determine various functions which
possess the similar shape in both the space domain and frequency
domain. This strategy yields the result of various image
interpolation algorithms. The higher resolution images yielded
by this algorithm consisted of blocking artifacts. For the purpose
of alleviating the blocking effects, the algorithm known as
bilinear interpolation is introduced. The performance of an edge
enhancement process is shown in above Figure (2). Here an
efficient Image Scaling algorithm is proposed for the VLSI
Image scaling processor using VERILOG code to the existing
method. Simulation results shows, the code developed algorithm
for proposed image scaling algorithm can reduce the memory
requirement, and hardware cost and needs only one-line buffer
memory compared to conventional schemes.
|
Download
|
17 |
A Literature review on Computation of floating point
logarithmic unit
Veeresh.P.M, Vikas.D.Patil, M.S.Sonawane
Abstract-In this paper we like to survey different procedures
used to compute floating point logarithm unit. Here we are
surveying on different algorithms like An Algorithm for the
Computation of Binary Logarithms [1], a parameterizable
floating-point logarithm operator for FPGAs [2] and efficient
floating-point logarithm unit for FPGAs [3].from this we are
able to know various techniques developed in calculation of
the logarithm.
|
Download
|
18 |
Enhancing network connectivity and Data security in
Institutions with Remote Campuses, Using Virtual Private
Network
Ilo S.F, Igbajar Abraham
Abstract—There is an increasing demand nowadays to connect
to internal networks from distant locations. VPN (Virtual
Private Network) technology provides a way of protecting
information being transmitted over the Internet, by allowing
users to establish a virtual private “tunnel” to securely enter
an internal network, accessing resources, data and
communications via an insecure network such as the Internet.
Virtual private network (VPN) extends a private network
across a public network, such as the Internet. It enables a
computer to send and receive data across shared or public
networks as if it were directly connected to the private
network, while benefitting from the functionality, security and
management policies of the private network. This is done by
establishing a virtual point-to-point connection through the
use of dedicated connections, encryption, or a combination of
the two. This paper focuses on enhancing the security of
transferring data by using vpn technology. The software used
in modelling and simulating this work is OPNET Modeler.
This help to design and examine communication of large scale
networks, devices, protocols, and applications with great
flexibility, it allows to study the system performance under
varying conditions, it also contributes to the development of
new protocols and architectures and their optimization and
the analysis of the impact of emerging technologies.
|
Download
|
19 |
Fetus ECG filtering by ANFIS with Adaptive FIR filter
Sachin S. Kulkarni, Vinay Y. Jadhav
Abstract-In this paper, fetus ECG is filtered from abdominal
composite electrocardiogram (CECG) using artificial
intelligence technique called Adaptive Neuro Fuzzy Inference
Systems (ANFIS) and Adaptive Finite Impulse Response Filter
is proposed. Here, we investigate the use of ANFIS for fetal
electrocardiogram (FECG) extraction from two ECG signals
recorded at the thoracic and abdominal areas of the mother’s
skin. The abdominal ECG is considered to be composite as it
contains both the mother’s and the fetus’ ECG signals.
Performances of the above methods are compared. For
numerical evaluation, the mean square error (MSE) between
de-noised and FECG signal and original FECG signal and
Peak signal to Noise Ratio (PSNR) is used.
|
Download
|
20 |
Performance Analysis of Controlling Switch
Implemented using Thermal Actuation
Vinay Y. Jadhav, Sachin S. Kulkarni, Vipin V. Kashti
Abstract- Mechanical movement of the device can be
achieved by using thermal expansion of material. The
electrical signal can be used to perform this mechanical
displacement. The mechanical movement in the device is
used as a switch for controlling the device mechanism. The
Thermal actuators can be incorporated to achieve this
displacement by the application of electrical voltage signal
to the material. The Si material is selected for the beam
structure formation due its very high thermal conductivity
and high elastic property. Thermal actuators are having
vast applications in designing various MEMS devices.
Thermal actuators are used in micro legs, micro grippers,
micro positioning and switching activities etc. This MEMS
thermo-actuator can also be used in various applications
such as data storage, electro-optical communication,
measurements of various properties of materials and
micro-tools. In the present approach 3D design of thermal
actuator with cascaded beams structure has been carried
out using Solid Works tool and its comprehensive
performance analysis is done using COMSOL4.3. The
thermo-electromechanical analysis of the device is
performed with the application of electrical voltage signal.
The analysis in terms of displacement, temperature
variation, stress and current density has been done. It has
been found that the present device can be used in the
applications requiring large displacement forces.
|
Download
|
21 |
Ultra-low Power VLSI Design using Novel Leakage
Reduction Technique
Krishna Kant, Vijay Kumar Magraiya
Abstract-The modern portable devices require huge number of
transistors to support several functionalities. Therefore, these
devices demands ultra-low power designs as these devices also have
limited battery size. The power consumption due to leakage i.e.
static power consumption has become a critical issue which
requires effective leakage reduction technique to reduce static
power consumption. This paper explores different leakage
reduction techniques and compares them. A new leakage reduction
technique is proposed that provides significant reduction in leakage
over existing techniques. The simulation results on Synopsys
HSPIC shows that the proposed leakage reduction technique
provides 10% reduction in leakage over the existing leakage
reduction technique existing in the literature.
|
Download
|
22 |
Energy Efficient Digital Circuits Design Through
Voltage over Scaling
Pramod Kumar Upadhyay, Vijay Kumar Magraiya
Abstract-The high energy consumption is the serious concern for
today design as it demands large battery size with high cooling cost.
With significant improvement in the VLSI technology, several
applications are implemented on the same chip to satisfy users
demand. This is making VLSI design more challenging. The
conventional approach of scaling fails due to increased effect of
process and other variations. In this paper, we explored different
approaches of voltage scaling to reduce power consumption and
presented a new approach that reduces power consumption and
delay significantly. The simulation results show that proposed
energy efficient design technique provides 47 % power and delay
reduction over the existing design techniques.
|
Download
|
23 |
A New Low Power High Speed Multiplier for Image
Processing Applications
Ashish Tomar, Vijay Kumar Magraiya
Abstract-The huge functionality on the modern portable
devices demands high speed signal processing. The most
commonly used arithmetic units within these devices such as
adder and multipliers limit their performance. To improve the
performance of these devices, a high speed multiplier is required
as it is more delay and power consuming unit. Several existing
multiplier designs do not provide high performance and power
metrics and consume large energy. In this paper, we propose a
new high speed error tolerant multiplier that provides significant
reduction in delay and power consumption over the existing
multiplier architectures. The simulation results at 45nm
technology node show that the proposed multiplier reduces
power consumption by 14.1% over the best known multiplier.
|
Download
|
24 |
Implementation of Pipelined Architecture in Humming
Bird for Reducing Area and High Throughput
R.Tharani, G.Kavitha
Abstract-Hummingbird is a new ultra light weight
cryptography algorithm target for resources constrained devices
like RFID tag, smart card and wireless sensor. In this project
Pipelined Architecture is designed and implemented in humming
bird cryptography algorithm to get reduced area and improved
throughput by adding hash function. Humming bird is to meet
stringent response time and power requirements which can
provide the design security with a small block size. This
algorithm resists to the most common attacks like birthday
attack, algebraic attack, linear and differential cryptanalysis.
The humming bird algorithm is integrating into a privacy
preserving and authentication protocol. In this algorithm to
reduce the clock cycle for encrypt and decrypt the message. The
result shows that this algorithm has higher security and
throughput with improved area.
|
Download
|
25 |
Low Power Programmable PRPG with NLFSR Based Test
Pattern
N.Gayathri, V.Sanjivee
Abstract-The pseudorandom test pattern generator is used to
generate the random test patterns and the patterns are needed to
detect the faults in the circuit. This project describes a low power
(LP) programmable pseudorandom test pattern generator
(PRPG) and it has the capacity to produce the pseudorandom
test patterns with desired toggling activities. The NLFSR (Nonlinear
feedback shift register) is used to implement the generator.
The NLFSR is used to drive the phase shifter and allowing it to
produce binary sequences with Pre-selected toggling (PRESTO)
levels. The generator is controlled automatically and test
sequences are produced with improved fault coverage. The test
pattern generator is suited for Low power BIST applications.
The obtained simulation results are used for industrial designs.
|
Download
|
26 |
Data Mining Techniques for Improving the
Efficiency of Customer Relationship Management
C.Venugopal, P.N Santosh Kumar, Meghna Kathuri, Savarnik Reddy
Abstract-In current times the customer relationship
management (CRM) has been achieved an increasing
prominence in business management. CRM includes all
the steps which an organization utilizes to create and
establish valuable relationships with the clients. Using
these technologies such as data warehousing and data
mining (DWDM) CRM can be initiated as a new area;
where organizations can increase the competitive gain.
Through CRM system a company can improve its
processes to deliver better services at a reasonable cost.
With the use of DM techniques, organizations can mine
unknown information of the customers from large
relational databases. So, organizations can conclude the
value of customers and forecast their future actions and
requirements. DM tools can reply business queries which
were time-consuming to track in the earlier period. It is
possible to improve CRM effectiveness, to have an
efficient and rapid response to customer requirements, by
combining CRM and DM methods. In this investigation,
the main concepts of CRM and DM techniques are
investigated and employed in CRM. This work indicates
the use of DM techniques in CRM that provides better
forecasting capability to industries and organizations to
attain more productivity.
|
Download
|
27 |
High Throughput Architecture of FM0/Manchester
Encoding and Systematic Codes on FPGA
Nithiyalakshmi.S, Dhilipmohan.P
Abstract-Software Defined Radio (SDR) becomes popular to
realize the many applications without using different components.
The FM0/Manchester codes can be used to reach the dc balance
and enhancing signal reliability. The proposed technique is the
systematic code architecture to detect and correct the errors
easily. Systematic codes are used for easily detect and correct the
errors because the code input is embedded into the output. BWA
architecture is implemented using parallel processing unit to
achieve high speed. It results single clock execution for BWA tags
and parities. These encoding techniques are implemented in
VHDL. This proposed architecture can be verified using the
experimental results. An experimental result shows less area and
high throughput.
|
Download
|
28 |
Energy Optimal Cog-Mac for Controlling WLAN Coexistence
Interference in Sensor Networks
Nirmal Kumar K, KalyanaSundaram P, T.Gnanasekaran
Abstract-Energy efficiency has been the driving force
behind the design of communication protocols for
battery-constrained wireless sensor networks (WSNs).
The energy efficiency and the performance of the
proposed protocol stacks, however, degrade
dramatically in case the low-powered WSNs are subject
to interference from high-power wireless systems such
as WLANs.In this paper we propose COG-MAC, a
novel cognitive medium access control scheme (MAC)
for IEEE 802.15.4-compliant WSNs that minimizes the
energy cost for multihop communications, by deriving
energy-optimal packet lengths and single-hop
transmission distances based on the experienced
interference from IEEE 802.11 WLANs. We evaluate
COG-MAC by deriving a detailed analytic model for its
performance and by comparing it with previous access
control schemes. Numerical and simulation results show
that a significant decrease in packet transmission
energy cost, up to 66%, can be achieved in a wide range
of scenarios, particularly under severe WLAN
interference. COGMAC is, also, lightweight and shows
high robustness against WLAN model estimation errors
and is, therefore, an effective, implementable solution to
reduce the WSN performance impairment when
coexisting with WLANs.
|
Download
|
29 |
Multiscale morphology and classification of micro
calcification clusters in mammograms
Karthika A, S.Kavitha
Abstract-The presence of micro calcification
clusters is a primary sign of breast cancer; however, it
is difficult and time consuming for radiologists to
classify micro calcifications as malignant or benign. In
this paper, a novel method for the classification of micro
calcification clusters in mammograms is proposed.
Methods: The topology/connectivity of individual micro
calcifications is analyzed within a cluster using
multiscale morphology. This is distinct from existing
approaches that tend to concentrate on the morphology
of individual micro calcifications and/or global
(statistical) cluster features. A set of micro calcification
graphs are generated to represent the topological
structure of micro calcification clusters at different
scales. Subsequently, graph theoretical features are
extracted, which constitute the topological feature space
for modeling and classifying micro calcification clusters.
k-nearest neighbors-based classifiers are employed for
classifying micro calcification clusters.
|
Download
|
30 |
Dual Mode Logic Gates in Coarse Grain Model for Power
Switches
K.M.Asha, A.Prathibha
Abstract-Power gating technology is used in power switches for
reducing leakage power. Power switches are divided in to
segments. Segments use DML gates. Dual mode logic gate use
both dynamic and static operation. Faulty power switch is
detected from segments hence achieve better diagnosis accuracy.
The proposed diagnosis has been validated through number of
ISCAS benchmarks. In the presence of temperature voltage and
process variation, this DFT solution provides efficient testing of
power switches; to achieve faster operation DML gates are used.
|
Download
|
31 |
Different Level Fusion of Face and Palm print images for
Authentication of Multimodal Biometric System
Shweta C. Dinde, K. R. Desai
Abstract-In recent years there is a tremendous attention
is paid on multimodal biometric system because they are
efficient and gives reliable performance over unimodal
system. By using multimodal biometric we can prevent
system from spoof attacks. In this paper, we are going to
fuse face and palm print images at different levels. These
levels are sensor level fusion, feature level fusion, score
level fusion, and decision level fusion. Here, we are going to
use LDA (Linear Discriminant Analysis) and LPQ (Local
Phase Quantization) feature extraction algorithms and
these algorithms are used for feature level fusion. Here, we
will perform different experiments on face and palm print
images to perform fusion at different levels.
|
Download
|
32 |
Analysis of Multiband FIR Filter bank For Speech Processing Using
Interpolation and Decimation
Nilambari S.Kurade, M.S.Sonawane, Patil J.K.
Abstract-All the available hearing aid devices use fix filterbanks
and so cannot be used for different hearing impaired people. So,
a new method consisting of multiband FIR filterbanks is
proposed .The use of interpolation and decimation which is the
added benefit of using FIR filter helps us to reduce the
computational complexity .This technique helps to customize the
hearing aid devices used by hearing impaired people. An extract
of multiband FIR filterbank techniques is presented.
|
Download
|
33 |
Speaker Identification Techniques – A Survey
S.Subha, P.Kannan
Abstract-Speaker identification is the process of determining
which speaker provides a given utterance of speech from a set of
registered speakers. Speaker identification is a sub-process of
speaker recognition in which an individual speaker is
recognized based on the information included in the speech
signal. Speaker identification requires two phases [3]. First
phase is called the enrolment phase and the second phase is
called the testing phase. In the enrolment phase, the speech
signals from all registered speakers who are going to be
identified are acquired. Then the speaker model is constructed
for each and every speaker. In the testing phase, the speech
signal of an unknown utterance is compared to each of the
enrolled speaker model. This technique makes it possible to use
the speaker’s voice to check and verify their identity and control
access to services such as forensic applications, authentication,
law enforcement, voice based attendance entry systems etc. In
this paper, some of the speaker identification techniques are
discussed and the performance provided by those techniques
are analysed. Then, some suggestions are provided to improve
the performance of those techniques.
|
Download
|
34 |
A Survey On –Identify Blackhole Attacks on MANET
P.Anusuya, R.Chithra Devi, S.Dhivya
Abstract-A mobile ad hoc network (MANET) is a
infrastructure-less network of mobile devices
connected without wires. MANETs are a kind
of Wireless ad hoc network that usually has a
routable networking environment on top of a Link
Layer ad hoc network. In this paper detecting
malicious nodes launching collaborative black hole
attacks is a challenge. Implementation of CBDS
method implements a reverse tracing technique to
achieving the stated goal. This is referred to as the
cooperative bait detection scheme (CBDS) that
integrates the advantages of both proactive and
reactive defence architectures. Also the objective of
this paper is to provide a simulation study that
illustrates the effects of Black hole attack on network
performance.
|
Download
|
35 |
Novel Approach for Grouping Social Data Based On
Interest
S.Jackline, J.Ganesh, R.Krishnaveni Jeenath
Abstract-Social web sites with large-scale websites like
Facebook, Twitter, and LinkedIn have become a very
important part of our daily life. A content-based
categorization of the type of messages posted by Twitter
users, based on which we examine users’ activity. Our
analysis shows two common types of user behavior in terms
of the content of the posted messages, and exposes
differences between users in respect to these activities. Sites.
We have therefore proposed a user-centered approach for
integrating social data into groups of interests. This
sapproach makes it possible to aggregate social data of the
group's members and extract from these data the
information relevant to the group's topic of interests. We
find that people use microblogging to talk about their daily
activities and to seek or share information.
|
Download
|
36 |
Personal Authorization Recognition Verification Using Iris
and Ear Biometrics
Jasmeen, S.S. Grewal
Abstract-Biometric classification and recognition are considered
as today’s most crucial topic for authentication purpose. So this
paper proposes the iris and ear feature extraction on the basis of
independent component features. Then feature reduction on the
basis of genetic algorithm fitness function. Then these two
biometrics are fused using sum rule. Then FAR, FRR and
Accuracy are obtained for UCI dataset. It is noticed that this
algorithm has low FAR, FRR and high accuracy rat.
|
Download
|
37 |
Built In Self Repair A 3d Die Stack Using Pipeline
Architecture For A Multiplier
R.N.Nivethitha, Dr.A.Kaleel Rahuman
Abstract-3-D integration using through-silicon-via (TSV) has
been widely acknowledged as one future integrated-circuit
(IC) technology. Test and yield are two big issues for volume
production of 3-D ICs In many cases, a single defective die
will kill the entire stack. To help mitigate this issue, we
explore the possibility of repairing a stack that contains a
defective die by utilizing an field programmable gate array
(FPGA) that has already been included in the stack for other
purposes, such as performance enhancement. Specifically, we
propose bypassing the defective portion of a
nonprogrammable die by replacing the defective functionality
with functionality on the FPGA. However, a 3D stack also
provides new opportunities for repair. If a die containing
programmable logic is included in the stack, it may be
harnessed to bypass defective components of other dies. In
this paper, we propose the use of an FPGA die to provide
repair resources to other layers of the stack. Our simulation
results show clear performance benefits when using an FPGA
to replace a defective ALU of a processor even when ALUs
implemented on the FPGA have longer latency
|
Download
|
38 |
Synthesis of Low-Power Area Efficient Constant Multiplier
Architecture for Reconfigurable Fir Filter
Nanthini B, Ganesamoorthy B
Abstract-In today’s world need for the design of low power and
area efficient high performance DSP system. FIR digital filters
are widely used in DSP by the virtue of its stability, linear phase,
fewer finite precision error and efficient implementation of the
different applications. Aim of getting the reliable operation, these
filters are protected using the eliminate common sub expression.
The complexity of a FIR filter is largely dominated by the
multiplication of input samples with filter coefficients using
different algorithms. But the reconfigurable FIR filter design
increases the delay thereby replicating the hardware, so that the
multiple numbers of inputs gets processed parallel and at the
same time generating multiple numbers of outputs with the
disadvantage of increased area in the design. To overcome this
disadvantage in the sense of retaining these advantage of the
hardware efficient reconfigurable filter structure is to be
proposed by using VHBCSE algorithm. Further power, area and
delay can be reduced by replacing adder by square root select
adder. Results are evaluated through extensive simulations in
180nm CMOS technology using CADENCE VIRTUOSO TOOL
at 180nm technology.
|
Download
|
39 |
A Real-Time Visual Inspection System for Railway
Fasteners Maintenance
B.Rajesh, A.Thomas Mary Sheeba, T.Dhivya Bharathi
Abstract-This paper proposes an automatic visual
inspection system for detecting partially worn and completely
missing fasteners using probabilistic topic model. To assess the
damages, the test fasteners are compared with the trained models
and automatically ranked into three levels based on the
likelihood probability. The experimental results demonstrate the
effectiveness of this method.
|
Download
|
40 |
Web Browser for Smartphone with New Optimized
Power Consumption Technique
Sivanantham.R, Rajavignesh.R
Abstract-A smart phone is a mobile phone with an
advanced mobile operating system which combines
features of a personal computer operating system with
other features useful for mobile or handheld use.
Smartphone wastes its battery power for display and
wireless interface. Smartphone web browser takes
much more power for downloading the web pages, so it
will drain the battery power completely for web
browser. Here propose three techniques to solve the
power consumption problem during web browsing that
are, 1.changing of browser computation sequence,
2.Advanced Regression tree algorithm, 3.Less Energy
Consumption Approach. Here proposed first algorithm
is “changing of browser computation sequence”, it will
rearrange the computation sequence of web browser,
and first download the all object from server in DCH
state, and DCH state consumes more battery power of
the Smartphone. Now the radio interface is put into
FACH state, the FACH state uses the half of the power
of DCH state, here downlink or uplink takes place to
perform remaining computation. Because remaining
computation requires some upload and download
process. Here propose second algorithm is “Advanced
Regression Tree”, after downloading of all objects,
average computation time was calculated by the ART,
based on that time value only the smart phone still run
in FACH state, if the computation takes more time,
than Smartphone will be switched to idle state. Using
these three algorithms we can reduce the power
consumption of Smartphone by more than 30 percent
during the web browsing.
|
Download
|
41 |
A Novel Key Management Scheme for Multicast in
MANET
S.Silviya, N.Subbulakshmi, J.Lavanya
Abstract-Mobile multicast communication is currently a
strong topic due to the quality of wireless and mobile
technologies for key management. The existing group key
management protocols intend to secure group
communication for just a single group service. In this paper,
we propose a novel GKM protocol for multiple multicast
groups, called slot based multiple group key management
scheme. SMGKM supports the movement of single and
multiple members across a homogeneous or heterogeneous
for minimized rekeying transmission overheads.
|
Download
|
42 |
Survey on Delay Tolerant Network
Akansha Shrivastava, Ekta Chauhan
Abstract-Delay tolerant network is a new version of mobile adhoc
network with high capabilities and overcomes the
shortcomings of wireless and sensor networks, the main
shortcoming of these networks is that they drop packet when the
path to destination is not available at a time. Whereas delay
tolerant network (DTN) uses a store-carry and forward
paradigm in which the node stores the packet and due to mobility
carries the packet and when the path is available forward the
packet. Here instead of using the word packet or message
“Bundle” is used. In this survey paper we introduce DTN, its
routing protocols, the paradigm store-carry and forward. The
routing protocols are classified as flooding and forwarding. Here
we discuss the flooding routing protocol and also include the
various issue, applications of the Delay tolerant network.
|
Download
|
43 |
Tourist Location and Travel Sequences from Geo-Tagged
Photos- A Survey
R.Krishnaveni Jeenath, J.Ganesh, S.Jackline
Abstract-Social tagging becomes increasingly important to
organize and search large-scale community-contributed
photos on social websites. There is an increasing tendency to
adopt the information from these geo-tagged photos for
learning to recommend tourist locations. In this paper we
focus to recommend interesting tourist locations and
interesting tourist travel sequences from geo-tagged photo
collection. As users’ preferences to visit a location or
multiple locations in a certain sequence could be affected by
their current temporal and weather context.
|
Download
|
44 |
Low Power Adder Design for Error Tolerant
Application
Pramod Kumar Upadhyay, Vijay Kumar Magraiya
Abstract-The high energy consumption is the severe task for
today’s design and it needs a large battery size with high cooling
cost. There is an expressive improvement in the VLSI technology.
These improvements cause different applications to be
implemented on the same chip to fulfill users demand. These
improvements also make VLSI design more demanding. The
regular approach of scaling fails due to increasing effect of process
and other variations. In this paper, we analyzed different ways of
voltage scaling to minimize power consumption and conferred a
new technique that reduces power consumption and delay notably.
The simulation results show that suggested energy efficient design
technique provides 45% power and delay minimization over the
existing design techniques.
|
Download
|
45 |
Power Efficient Design for Multiplier
Ashish Tomar, Vijay Kumar Magraiya
Abstract-The exponential increasing usability of portable devices
is demanding ultra-low power efficient designs. With the
advancement in the VLSI technology, more and more functionality
are being implemented on the same chip. This is imposing several
challenges to the VLSI designer. High power consumption due to
several operations on these devices worsens the performance of the
device and lifetime of the battery. In order to perform different
user’s function, several mathematical operations are performed.
Many DSP algorithms are computationally intensive and severely
degrade the lifetime of the battery in portable device such as cell
phones, hearing aids, MP3 players, digital video recorders. In this
paper, we proposed a new high speed error tolerant multiplier that
provides reduction in delay and power consumption over existing
multiplier. The simulation results at 45nm technology node show
that the proposed multiplier reduces power consumption by 14%
over the best known multiplier.
|
Download
|
46 |
Establishing by Traffic information system using smart
phone in VANET
K.Divyalakshmi, N.Subbulakshmi, S.Masophin salomi
Abstract-This is the motivation of this paper: We leverage
state-of-the-art cryptographic schemes and readily available
telecommunication infrastructure. We present a comprehensive
solution for smart phone-based traffic estimation that is proven
to be secure and privacy preserving. We provide a full-blown
implementation on actual smart phones, along with an extensive
assessment of its accuracy and efficiency. Our results confirm
that smart phone-based TISs can offer accurate traffic state
estimation while being secure and privacy preserving.
|
Download
|
47 |
QOS Ranking Prediction for Cloud Brokerage
Services
M.Kannan, V.Ajantha
Abstract-Cloud computing is a sharing of resources without any
physical devices and reduce the cost of upfront investment. In
recent years, enterprise migrate their applications to the cloud.
One of the major challenges faced by cloud applications is QoS
(Quality of Service) management. In Cloud Computing, cloud
brokerage service is used which reserves a large number of
instance from CSP (Cloud Service Provider) and serves the user
with price discount. Even though the CSP increase the
application cost during the service usage. But this cloud broker
cannot suggest an optimal selection of cloud service from
different CSP’s. This paper proposes a QoS ranking prediction
for cloud brokerage services, where the cloud broker intimates
the user about changes in price as well as services capacity if any
and also enables a user for optimal selection of cloud services
from diverse CSP’s with low cost. QoS ranking prediction
framework for cloud brokerage is to grouping the indexed
services based on similar cost. Based on QoS values, user chooses
the low cost service and cloud brokerage offers optimal service to
the cloud user.
|
Download
|
48 |
Bistable Display Technology
J.Ambika, R.Sugantha Lakshmi
Abstract-Electronic ink mimics the appearance of ordinary ink
on paper. It is currently used in cell phones, signs, and e-readers
like the Amazon Kindle. There are many ways to imitate natural
ink displays, but the most commonly used method is
electrophoretic ink. This ink takes advantage of interactions
between computer processors and charged black and white
particles. The benefits of electronic ink displays over traditional
LCD displays include improved readability, low power use, and
flexibility. However, the devices are usually quite specialized,
have little touch screen capability, and are less responsive than
comparable LCD screen devices. These limitations are areas of
current development for electronic ink manufacturers. As the
field of electronic ink displays evolves, it is important to consider
their current uses, the engineering behind the technology, their
advantages and limitations, sustainability of the technology, and
future development.
|
Download
|
49 |
Secure Data using k-Nearest Neighbor (kNN)
Classification-Survey
S.Dhivya, M.Kamala Malar, P.Anusuya
Abstract-The k-Nearest Neighbor(k-NN) Classification is
used to find the k closest training points based upon some
metric. It performs the operation using metrics such as
Euclidean, Manhattan etc. It proposes a method to compute
k –nn Classification from the distributed sources without
distribute any data about the user. The k-NN operation is
also applied in the cloud. The k-NN supports both
classification and Regression because it is a non parametric
Technique and it is simple and efficient among all the
Machine Learning algorithms. It classifies the new case
based upon the similarity measure. The k-NN algorithm is
also a lazy learning algorithm because it doesn’t make any
assumptions on the underlying data distribution. Most of the
lazy algorithms like k-NN make decision based on the
training data set. The k-NN approach is suitable for very
high dimensional dataset. The main idea behind this paper is
to promote the Classification in the encrypted data using k-
NN Classification. Therefore the privacy preserving k-NN
classification is maintained over encrypted data in the cloud.
|
Download
|
50 |
Phase and Heterogeneous Resource aware Scheduler for Map
Reduce framework
S.Madhavi, k.suganthi
Abstract-Big data is the data sets with the sizes beyond the ability
of commonly used software tools to capture, manage, and process
data within a tolerable elapsed time. Therefore the big data
analytics tools are emerged and one of the popular analytics tool is
Map Reduce. Map Reduce is the process of splitting of each job
into small map and reduce task and executes them in a parallel
manner across multiple number of machines, results in reduction
of the running time of data-intensive jobs. For that, the task level
scheduling is the most commonly used technique but it gives the
sub-optimal job performance. This is because the task level
scheduler cannot know to utilize the available resources in an
effective way, to reduce the job execution time. Therefore to
improve resource utilization, the resource efficient Map Reduce
schedulers can be used in recent days. A fine grained resource
aware Map Reduce scheduler, that divides the task into various
phases, where each phase can have a constant resource usage
profile (i.e. homogeneous resource requirement) and performs
scheduling at the phase level. But in reality, the phases have highly
varying resource requirements during their lifetime. Therefore due
to the homogeneous resource allocation to each phase, it is not so
efficient to utilize the resources. To address this problem, the
proposed scheduler allocates heterogeneous resources to each
phase based on their needs and scheduling at the phase level.
Therefore it improves resource utilization and thereby reduces the
job execution time.
|
Download
|
51 |
Impact of Hill Resistance Training on Anaerobic
Performance of Handball Players
K. Mohan, S.Rameshkumar, R. Sankar
Abstract-The purpose of the study was to find out the
impact of hill resistance training on anaerobic
performance namely maximum power, minimum power,
and average power and fatigue index among male
Handball players. To achieve the purpose of the study
twenty four male handball players have been randomly
selected from various colleges in the state of Tamil Nadu,
India. The age of subjects were ranged from 18 to 25 years.
The subjects had past experience of at least three years in
handball and only who those represented their respective
college teams were taken as subjects. A series of anaerobic
performance tests was carried out on each participant.
Maximum power, minimum power, average power and
fatigue index assessed by running based anaerobic sprint
test. The subjects were randomly assigned into two groups
of twelve each, such as experimental and control groups.
The experimental group participated in the hill resistance
training for 3 days a week, one session per day and for 8
weeks each session lasted 45 minutes. The control group
maintained their daily routine activities and no special
training was given. The subjects of the two groups were
tested on selected variables prior and immediately after
the training period.
|
Download
|
52 |
Optimized Mapreduce Using Cache for Big Data Analytics
J. Janani, K. Kalaivani
Abstract-Big data is the ocean of information we swim
everyday-zeta bytes of unstructured data and updates are
constantly arriving, that cannot be mined efficiently by the
traditional tools and methods. To our knowledge MapReduce
is the first MapReduce-based solution that efficiently supports
incremental iterative computation, which is widely used in data
mining applications. It utilizes key-value pair incremental
processing rather than task level re-computation. In this paper,
we propose an extension to MapReduce using in-memory for
mining big data. Compared with the work of MapReduce,
MapReduce using in-memory (i) performs key-value pair level
processing in map phase based on the mining results of iterative
algorithms, (ii)cache the mapped data in the buffer that reduces
the i/o workload of the reducer phase. We evaluate the
MapReduce task for the mobile datasets of GSMArena websites
using the iterative algorithms and cache memory for fast
retrieval of data in time.
|
Download
|
53 |
Enhanced Cloud Performance and Security via Data
Segmentation and Replication
V.Nila, S. Manikandan
Abstract-Cloud computing security refers to the set of
procedures, processes and standards designed to provide
information security assurance in a cloud computing
environment. The effective security measures are required to
secure data within the cloud. The security strategies must also
used for improve performance for data access time. In this paper
we propose data fragmentation and replication (DFR) in the
cloud for enhanced cloud performance and it provide security. In
the DFR technique the common data is divided into multiple
segments or data units and replicate the fragmented data over
the cloud nodes. Each node stores a single data unit over the
cloud and these nodes are arranged based on Distance node
measure technique. We ensure controlled replication of the file
fragment where each of the fragmented is replicated for
enhanced performance and improve security. In the DFR
methodology overcome the existing cryptographic methodology.
|
Download
|
54 |
Detection of Face Spoofing Attacks using Printed Photo and
Mimic Mask
D. Gowthami, T. Venipriya
Abstract-Face Recognition and Verification system is the
alternative and recently emerging method in biometric technique
in order to provide high level security to the system or the
organization. Spoofing is the act of masquerading as a valid user
by falsifying data to gain an illegitimate access. Printed photo,
mimic mask, video replay are some of the commonly used
methods for spoofing. In this paper, we propose a real time ant
spoofing measure in order to detect the liveness of the face.
Diffusion Speed of a single image is calculated to identify the
difference between live face and fake face by using Total
Variation Flow. The Inter Session Variability (ISV) modelling is
used to detect 2D mask and Iterative Closest Point (ICP)
algorithm is used to detect 3D mask attacks. The local speed
patterns of diffusion speed are extracted and these features are
given as input to the linear SVM classifier. The Experimental
results on various datasets like NUAA, Replay attack and
Morpho show that the proposed method is effective for face
spoofing detection when compared with previous approaches.
|
Download
|