Sr/No/ |
Title |
Pdf |
1 |
An Efficient Low Power S-BOX
Implementation for AES Using Power - Gated PLA
Kalaiselvie.C.M, Kavitha.D
Abstract —This paper present a low power custom hardware
implementation of Rijndael S-BOX for AES using power-gating
and PLA design techniques to increase speed and to reduce
power. AES is one of the most common symmetric key
algorithms. In AES the hardware complexity is mainly due to the
substitution box(S-BOX) and it is very expensive part in AES.
The proposed system is implemented using standard CMOS of
110nm with 1.2v power supply. Thus the number of transistor
counts will be reduced to 25% and increases speed by ten times.
|
Download
|
2 |
Optimized Reconstruction of Depth Map Using Fuzzy
S.Masophin Salomi, C.Hariram, K.Divyalakshmi
Abstract—In this paper, we investigate how the recently emerged
photography technology—the light field—can benefit depth map
estimation, a challenging computer vision problem. A novel
framework is proposed to reconstruct continuous depth maps
from light field data. Unlike many traditional methods for the
stereo matching problem, the proposed method does not need to
quantize the depth range. By making use of the structure
information amongst the densely sampled views in light field
data, we can obtain dense and relatively reliable local estimations.
Starting from initial estimations, we go on to propose an
optimization method based on solving a sparse linear system
iteratively with a conjugate gradient method.
|
Download
|
3 |
Efficient Torque Control Of Doubly Fed Induction
Machine-Based Wind Turbines Under Voltage Dips
Doodigama Sathish, Bandaru Sathish
Abstract—This paper proposes a rotor flux
amplitude reference generation strategy for
doubly fed induction machine based wind
turbines. It is specially designed to address
perturbations, such as voltage dips, keeping
controlled the torque of the wind turbine, and
considerably reducing the stator and rotor over
currents during faults. In addition, a direct
torque control strategy that provides fast
dynamic response accompanies the overall
control of the wind turbine. Despite the fact that
the proposed control does not totally eliminate
the necessity of the typical crowbar protection
for this kind of turbines, it eliminates the
activation of this protection during low depth
voltage dips.
|
Download
|
4 |
Identification And Enhancement of Low vision pixel
channel of less quality video
Neha A. Wadaskar, S.A.Ladhake
Abstract—We gift Associate in Nursing example-based
approach to general improvement of degraded video
frames. The tactic depends on building a lexicon with
non-degraded elements of the video and to use such a
lexicon to boost the degraded elements. The image
degradation should originate from a “repeatable”
method, in order that the lexicon image patches (blocks)
ar equally degraded, so originating a lexicon with
degraded blocks and their residues (differences in
between degraded and original blocks). Once a match is
found between a degraded block within the video and a
degraded block within the lexicon, the associated residue
of the latter is soft-added to the block of the previous. the
tactic could be a generalization of the tactic for examplebased
super-resolution.
|
Download
|
5 |
Co movement of stock indices
Archna dixit
Abstract- This paper examined the empirical co- movement of
stock indices between the Indian stock return’s and USA stock
return’s, Japan stock returns. The sample size included stock
markets, of BSE, NSE, Nikkei’s, and NASDAQ. This study is
intended to be a useful contribution to the academician
researcher and students. The main objective of the study is to
find the co- movement between Indian stock return and USA
stock return and Japan stock return. We have applied unit root
test and OLS test, granger causality test and co-integration. Unit
root test found that data is stationary and OLS test, results is
found that all the sample countries stock return has significant
relationship except the NSE stock return. Granger causality test
it was found that there is no causal relationship. The cointegration
test found that BSE stock return and NSE stock
return are co- integrated with each other.
|
Download
|
6 |
Method of Extracting the Road from Satellite Images –
A Survey
Kaleeswaran, Madhan Kumar
Abstract - Today’s the road data is very crucial for planning of
urban area, development of infrastructure, military purposes,
navigation applications, and for obtain the GIS topographic
databases. The remote sensing images of spatial resolutions are
rapidly increased. That enables a source for extract road
information. This research has been developed for a novel
approaches for a sub-urban area and rural area of road
extraction from the high resolution images. Road extraction
allows the road network that can be presented in the object space
when the transformation of images from the ground systems are
carried out and that is described by a method of the detection
and the localization of roads in an image. The automatic road
extraction tried to simplify and speed up the road extraction
process by automating focusing of this process. In digital image
processing, the road extraction is regarded as a challenging issue.
This paper has a detailed survey of various road extraction
techniques of satellite images and their performances are
analyzed.
|
Download
|
7 |
A survey on automatic docking system based home
surveillance Robot
S.Saravanan, K.Ramamoorthy
Abstract- The automatic docking system based on
surveillance robot with fire detector, gas detector and
cleaning module are proposed in this paper. The
surveillance robot with automatic docking and
recharging system are used for home security. In this,
the surveillance robot communicates the docking
station through WI-FI and ZigBee. The fire detector
sensor, MQ6 gas detector sensor are used. The
docking station uses the IR sensors and the docking
system is based on self-localization of the robot.
|
Download
|
8 |
Particle Swarm Optimization for Feature Subset
Selection
G.Jaya Suma, I. Grace Asha Roy
Abstract-The classification problems have large number of
features, but not all of them are useful for decision making.
Particle swarm optimization, an evolutionary computation
technique can be used for Feature Subset Selection (FSS) to
extract useful and important features. The Particle Swarm
Optimization (PSO) in continuous space and Discrete Binary
PSO (BPSO) on discrete space converged upon regions of search
space but there is no mechanism for leaps between regions. The
Multi-objective function for FSS using Geometric Particle
Swarm Optimization (MOPSO) introduced a geometric
operator crossover and mutation that allows leaps. Three
machine learning algorithms Naive Bayes, Random forest and C
4.5 are used to calculate the performance of the subset of
features given by PSO. The PSO for feature selection are
proposed for filter and wrapper approach. The results show
that PSO with wrapper approach gives better classification
accuracy and important features than filter approach. Varying
velocity and threshold values for PSO version are applied. The
PSO versions for feature selection gave a minimum number of
subset and better classification accuracy.
|
Download
|
9 |
Green Concrete: Restrain Of Greenhouse Effect& Its
Fortitude Behavior
T.S.Kumanan, V.Naveen Raj
Abstract-The concrete is made with wastes which are ecofriendly
so called as Green concrete. Green concrete is a
revolutionary topic in the history of concrete industry. Concrete
is an environmental friendly material and the overall impact on
the environment per ton of concrete is limited. The paper covers
the aspect that how to reduce the cement content by some
replacement and its strength behavior and replacement of fine
aggregate to its suitability. It presents the feasibility of the usage
of by product materials like rock fractions as complete replaced
fine aggregates and ceramic wastes as partial replacement (10%,
20% and 30%) of cement in concrete.
|
Download
|
10 |
An Area Efficient Asynchronous Adder
Savitha.S, Thangaselvi.E
Abstract─ In principle, logic flow in asynchronous
circuits is controlled by a request acknowledgment
handshaking protocol to establish a pipeline in the
absence of clocks. While these constructs add
robustness to circuit designs, they also introduce
significant overhead to the average case performance
benefits of asynchronous adders. Therefore, a more
efficient alternative approach is worthy of consideration
that can address these problems. In this paper, the
performance parameters of various adders are
compared.
|
Download
|
11 |
Development of Intelligent Diversity Aware Retrieval
System for Medical Data Analysis
V.Sudha, E.V.R.M. Kalaimani, E.Kirubakaran
Abstract -The hike of Electronic Medical Records (EMRs)
causes an explosive growth of the medical and clinical data. It
makes the medical search technologies become tedious to find
useful patient information in the large medical dataset. However,
the high quality medical search is a challenging task; in
particular due to complex semantic relationships among medical
concepts and use of many Synonyms, Antonyms and Hyponym,
simple word based Information Retrieval (IR) does not provide
the satisfactory results. Clinical databases are scarce in
healthcare today and most analytical tools have trouble in
extracting meaningful information from free text clinical data.
The proposed system contributes a novel measure of calculating
the similarity between sentences or between EMR documents
using Meta map concept identifier and MeSH (Medical Subject
Headings) ontology. Novel web search result disambiguation
strategy considers not only the aspect importance but also the
aspect similarity, to perform the diversity-aware EMR ranking.
To exploit the uncertainty in ambiguous medical queries,
semantic-based approach is used to achieve the diversity-aware
retrieval of EMRs, i.e., both the relevance and novelty are
considered for EMR ranking. The scope of the NEURAL
NETWORK CLASSIFIER is to train and test the indexed
documents and categorize the data to find the classified output.
With the support of medical domain ontology, we first mine all
the potential semantics (concepts and relations between them)
from a user query and consume them to model the multiple
query aspects. We believe that our experience can serve as an
important reference for the development of similar applications
in medical data utilization and sharing environment.
|
Download
|
12 |
BER Enhancement of Orthogonal wavelet Division
Multiplexing (OWDM) System in comparison with OFDM
system
Jaspreet Kaur, Sandeep Kaushal
Abstract-Orthogonal wavelet division multiplexing (OWDM)
which use wavelet transform is proposed as an alternative
approach to FFT based OFDM system. It is an efficient
approach to replace FFT in the OFDM systems due to its better
bit error rate improvement, interference minimization, timefrequency
localization, improvement in bandwidth efficiency and
many more advantages. OWDM is employed in order to remove
the use of cyclic prefix which decreases the bandwidth wastage.
In this paper we have compared the BER performance of
conventional OFDM and OWDM system in MATLAB under
various modulation techniques. The simulation results show the
superiority of the OWDM system over conventional OFDM
system.
|
Download
|
13 |
Survey of Routing Algorithms used in Delay Tolerant
Networks
E.Haripriya, K.R.Valluvan
Abstract— Mobile Adhoc Networks are used in several various
extreme environments where they suffer from different kinds of
link disruptions. The existing Internet protocols fail to work
properly in the context of ICNs, thus leads to a variety of new
challenging problems. Delay/Disruption-Tolerant Networks are
emerging solutions to networks where the network suffers from
frequent network partitions and long end to end delay. Over
time, unicast routing, one of the key components common to all
DTNs, became an almost independent field of research in which
maximum efforts continue to be invested. But in case of network
architectural designs, scheduling and transferring issues dating
from the early days of Inter-Planetary Networks (IPNs) have
received relatively little attention and accumulate numerous
challenges. These papers compare the application of various
routing techniques in DTN and highlight the issues in each of
them.
|
Download
|
14 |
Yield potential and land-use efficiency of hybrid rice (Oryza
sativa L) in Bangladesh through suitable spacing and
number of plants per hill
Afsana Ansari, Muhammad Shakil Hossain
Abstract— Bangladesh is a densely populated country and the
cultivated area is reduced in day by day while it is very
important to determine the efficient use of land. Until recently,
no case of land use efficiency of hybrid rice had been conducted
in Bangladesh. In this sense, Bangladesh Rice Research Institute
was conducted an experiment to determine the appropriate
spacing and number of plants per hill for obtaining high
economic yield of hybrid rice. The treatment consisted of three
spacing (15 x 15, 20 x 15 and 20 x 20 cm) and one, two and three
plants per hill. The single effect of spacing and the combined
effect of plant spacing and number of plants per hill were
significant in different growth and yield components of hybrid
rice. In addition, the highest yield (7.09 t/ha) recorded from the
single plant per hill which is not significant but the yield
parameters (number of tillers per m2, number of panicles per m2,
panicle length, number of total grain per panicle, filled grain
percent and days to maturity) were significantly affected by main
effect of seedling per hill. The highest yield (7.66 t/ha) was
recorded from the combination effect of 20 x l5 cm spacing and
single plant per hill. It is difficult to conclude thus the studies
were conducted at one location in a single season by using only
one hybrid rice variety with small number of treatments.
However, we demonstrate that 20cm x15 cm spacing with one
seedling per hill had higher grain yield, indicating that the
optimum spacing and seedling density is good for hybrid rice
varieties. This is the first findings which illustrate to use
appropriate spacing and number of plants per hill for obtaining
high yield of hybrid rice in Bangladesh. This work is an example
of public, private sectors and in farmers who cultivated hybrid
rice in Bangladesh and it has already accepted with popularity as
a milestone for cultivation of hybrid rice in all over Bangladesh.
|
Download
|
15 |
Bayesian Analysis of two parameters of Exponential
Distribution using S-Plus software
T.A.Rather, Kawsar Fatima
Abstract— In the literature we come across different types of
statistical models. Exponential distribution is one of the most
useful distributions for modeling and analyzing life time data in
the medical, paramedical and applied sciences. Nowadays great
attention has given to Bayesian method and is in contention with
other estimation methods. In this paper, we deals with the
Bayesian analysis of two parameters of exponential distribution.
Finally, we discuss the Bayesian analysis of exponential
distribution using different priors with the help of standard
statistical softwares.
|
Download
|
16 |
A Survey on Working Principle and Application of Hadoop
Surajit Mohanty, Girish Das, Himanshu Suman, Piyush Maharana, Raman Ratnakar
Abstract—Hadoop is a main buzz phrase and new curve for IT
today. Big data is driven data with high velocity, volume, variety,
veracity and value. It comes from different sources like mobile
devices, internet, social media, sensors etc. Traditional data
processing and analysis of structured data using RDBMS and
data warehousing no longer satisfy the challenges of Big Data.
Due to the high velocity and volume of big data, the effective
option is to store the big data through Hadoop, because it has
capability to store and process massive amount of big data.
Hadoop offers the big data implementation in small and medium
sized businesses. This paper presents the working with Hadoop
and its implementation in various sectors that include healthcare,
networking security, market and business, sports, education
system, gaming and telecommunications.
|
Download
|
17 |
Keyword Searching and Browsing in Relational
Databases Using Web Search Applications
Yellapu Vinay Kumar, C P V N J Mohan Rao.
Abstract-Spatial queries with keywords have not been
extensively explored. In the past years, the community
has sparked enthusiasm in studying keyword search in
relational databases. Conventional spatial queries, such
as range search and nearest neighbor retrieval, involve
only conditions on objects’ geometric properties. Today,
many modern applications call for novel forms of
queries that aim to find objects satisfying both a spatial
predicate, and a predicate on their associated texts. For
example, instead of considering all the restaurants, a
nearest neighbor query would instead ask for the
restaurant that is the closest among those whose menus
contain “steak, spaghetti, brandy” all at the same time.
Currently, the best solution to such queries is based on
the IR2 -tree, which, as shown in this paper, has a few
deficiencies that seriously impact its efficiency.
Motivated by this, we develop a new access method
called the spatial inverted index that extends the
conventional inverted index to cope with
multidimensional data, and comes with algorithms that
can answer nearest neighbor queries with keywords in
real time. As verified by experiments, the proposed
techniques outperform the IR2 -tree in query response
time significantly, often by a factor of orders of
magnitude.
|
Download
|
18 |
Lean Manufacturing Strategies: An Operational
Approach
Gantala Sarvesh Kumar
Abstract—This paper presents a review to evaluate the
contribution of lean strategies to reduce manufacturing
wastes within the manufacturers‟ resource constraints.
The evolution of manufacturing was characterized by
several innovations, concerning technologies, processes,
but also entire production systems, with radical
changes in strategies, product design, and management
of organizations. Lean strategies have been developed
to eliminate or reduce waste and thus improve
operational efficiency in a manufacturing environment.
However, in practice, manufacturers encounter
difficulties to select appropriate lean strategies within
their resource constraints and to quantitatively
evaluate the perceived value of manufacturing waste
reduction. A model is perceived to know the value of
lean strategies to manufacturing waste reduction and a
step-by-step methodology is provided for selecting
appropriate lean strategies to improve the
manufacturing performance within their resource
constraints. A „lean strategy-wastes‟ correlation matrix
has been proposed to establish the relationship between
the manufacturing wastes and lean strategies. By
identifying appropriate lean strategies for specific
manufacturing wastes, a manufacturer can better
prioritise implementation efforts and resources to
maximise the success of implementing lean strategies in
their organisation.
|
Download
|
19 |
Compression Study of FIR Digital Filter for Noise
Suppression in ECG Signal
Yogesh Babu Indoriya, Karuna Markam
Abstract-The paper present the compression study of FIR filter
for noise suppression in ECG signal. Intended to provide an
alternative approach for comparison of FIR digital filter by using
neural network. This proposed approach establishes relation
between order and width of main lobe of filter. In this paper
using FDA tool to design digital FIR filters of different order, and
neural network tool box to compare different filters using
different type algorithm of neural network. As the simulation
results shows, the proposed neural-based method is capable of
archiving a better performance for filter design.
|
Download
|
20 |
Performance Improvement of Image Denoising System
Aarti Namdeo, Anand Khare
Abstract- In the past few decades, many noise reduction
techniques have been developed for removing noise and retaining
edge details in images. The process of removing noise from the
original image is still a demanding problem for researchers.
There have been several algorithms and each has its assumptions,
merits, and demerits. The prime focus of this work is related to
the processing of an image before it can be used in applications.
The processing is done by de-noising of images. In order to
achieve this, combination of de-noising algorithms are being used.
Image denoising algorithms WT (Wavelet transform) and KLT
(Karhunen-Loeve transform) are applied on images to remove the
noise that are either present in the image during capturing or
injected into the image during transmission. The WT shows an
excellent performance in the denoise field while KLT shows a
good performance in the signal reconstructed ability. De-noising
plays a very important role in the field of the image processing. It
is often done before the image data is to be analyzed. Denoising is
mainly used to remove the noise that is present and retains the
significant information, regardless of the frequency contents of
the signal. De-noising has to be performed to recover the useful
information. The main purpose of an image-denoising algorithm
is to eliminate the unwanted noise level while preserving the
important features of an image. PSNR, MSE and MAXERR
parameters are being improved using combination of image
denoising algorithms WT (Wavelet transform) and KLT
(Karhunen-Loeve transform).
|
Download
|
21 |
Non Coherent Block Coded Modulation of TAPSK Using
Multilevel Coding
Shailendra kumar, Suresh Sahadeorao Gawande
Abstract-In this work, first of all we derive minimum non coherent
distances of block-coded TAPSK (twisted amplitude and phase shift
keying) and 16QAM (quadrature-amplitude modulation), both
using multilevel coding. As per calculated distances, non-coherent
block-coded TAPSK (NBC-TAPSK) and non-coherent block-coded
16QAM (NBC-16QAM) are observed. Now we check the block
length, if it is small then NBC-16TAPSK performs best among all
non-coherent techniques and NBC-16QAM performs worse due to
its small minimum non coherent distance. Now, if the block length
is not small, NBC-16QAM has the best error performs among all
non-coherent techniques.
|
Download
|
22 |
Digital Image Watermarking
Rekha Patil, Rupali Mahajan
Abstract-The recent progress in the digital multimedia
technologies has offered many facilities in the transmission,
reproduction and manipulation of data. However, this
advancement has also brought the challenge such as copyright
protection for content providers. Digital watermarking is one of
the proposed solutions for copyright protection of multimedia
data. This technique is better than Digital Signatures and other
methods because it does not increase overhead. Digital
watermarking is not a very old field. Most of research is going on
in this field. Researchers try to invent techniques that increase
the robustness, security, capacity, and imperceptibility of
watermarked images.
|
Download
|
23 |
Smart Vehicle System Design For Road Condition
And Detection Of Potholes And Humps On Road
To Aid Drivers
P.Jothimani, Dr.P.Nagarajan
Abstract-Identification of potholes and humps not only
helps driver to avoid road accident or vehicle damage
but also helps government authorities to maintain road.
This proposed system has been developed to identify the
potholes and humps on roads and provide timely alerts
to driver. Ultrasonic sensors are used to identify the
potholes and humps and also to measure the depth and
height. The GPS receivers capture the location
coordinates of the detected potholes or hump and sends
message to the mobile SIM using GSM modem.
Potholes and humps of information send to server. This
server as a valuable source of information to the
government authorities and vehicle drivers. The mobile
application is used to alert driver. Alerts are given in
the form of flash messages with an audio beep.
|
Download
|
24 |
High dimensional Data Using Neuro fuzzy classification for
Lymphoma Cancer data set
G.Sugendran, D.Dhanabagyam
Abstract-Clustering has been used extensively as a vital tool of
data mining. Data gathering has been deliberated widely, but
mostly all identified usual clustering algorithms lean towards to
break down in high dimensional spaces because of the essential
sparsely of the data points. Present subspace clustering methods
for handling high-dimensional data focus on numerical
dimensions. The minimum spanning tree based clustering
algorithms, because they do not adopt that data points are
clustered around centres or split by a regular geometric curve
and have been widely used in training. The present techniques
allow these algorithms to extend much more easily with both the
number of instances in the dataset and the number of attributes.
But the performance minimize soon with the size of the
subspaces in which the groups are found. The important
parameter needed by these algorithms is the density threshold
and it is not easy to set, particularly across all dimensions of the
dataset. The aim of this thesis is proposed method investigate
the performance of different Neuro-Fuzzy classification methods
for the distinction of benign and malign tissue in genes.
|
Download
|
25 |
Minimization of Torque Ripple of PMSM Drive with Model
Predictive Controller
P.Ramya, K.Sindhuja, V.Chandhrasekaran
Abstract-Model predictive direct torque control (MPTC) is the
emerging control technique in the field of electric drives.
Compared to conventional DTC it’s very accurate in voltage
vector selection as well yields lower torque ripples by using the
system model. The concept of duty cycle is merged along with it
to improve the efficiency. The null vector is employed along with
the selected voltage vector. The duty cycle is determined based on
various principles. This paper focuses on the torque ripple
minimization by optimizing the duty cycle of the selected vector.
Results are compared in both Simulink and hardware. The
Simulink is carried out with MATLAB.
|
Download
|
26 |
Public Auditing For Shared Data with Efficient User
Revocation in the Cloud
C.Varun Vasan
Abstract-With data services in the cloud, users can easily
modify and share data as a group. To ensure data integrity can
be audited publicly, users need to compute signatures on all the
blocks in shared data. Different blocks are signed by different
users due to data modifications performed by different users. For
security reasons, once a user is revoked from the group, the
blocks, which were previously signed by this revoked user, must
be re-signed by an existing user. The straightforward method,
which allows an existing user to download the corresponding
part of shared data and re-sign it during user revocation, is
inefficient due to the large size of shared data in the cloud. In this
paper, we propose a novel public auditing mechanism for the
integrity of shared data with efficient user revocation in mind.
By utilizing proxy re-signatures, we allow the cloud to re-sign
blocks on behalf of existing users during user revocation, so that
existing users do not need to download and re-sign blocks by
themselves. In addition, a public verifier is always able to audit
the integrity of shared data without retrieving the entire data
from the cloud, even if some part of shared data has been resigned
by the cloud. Experimental results show that our
mechanism can significantly improve the efficiency of user
revocation.
|
Download
|
27 |
Design and Simulation of Transmitter part of UART for
Serial Communication using VHDL
Manju Wadhvani, Zoonubiya Ali
Abstract-Asynchronous serial communication is usually
implemented by Universal Asynchronous Receiver Transmitter
(UART), mostly used for short distance, low speed, low cost data
exchange between processor and peripherals. UART allows full
duplex serial communication link, and is used in data
communication and control system. This paper focuses on the
introduction of Transmitter; in this paper we presented the
transmitter part of UART which indicates how to transmit the
data serially during transmission. The result indicates that the
transmission of data is done serially.
|
Download
|
28 |
A New Static Leakage Reduction Technique for Low Power
VLSI Circuits
Krishna Kant, Shweta Agrawal
Abstract-The ultra-low power is the prime concern the modern
portable device which can be achieved by reducing leakage
current. In this paper, we first explore different type of leakage
reduction technique and then propose a new leakage reduction
technique. The effectiveness of the proposed technique is
evaluated and compared over the existing techniques. The
different techniques are implemented on NAND3 and SPICE
netlist is created and simulated with 32nm technology file. The
results of simulation on Synopsys HSPICE shows that provides
leakage reduction technique improves 21.6% reduction in
leakage over the explored leakage reduction technique in the
literature.
|
Download
|
29 |
A Survey on Content Based Image Retrieval using Different
Techniques
V.Parameshwari
Abstract-Now a day, digital world increase with handheld
devices, storage technologies and social networking sites and
huge volume of images are stored on web. With significantly
huge image database it is difficult to extract that data and
retrieve relevant images. The term content-based image
retrieval is widely used to describe the process of retrieving
desired images from a large collection on the basis of features
that can be automatically extracted from the images themselves.
Feature Based Image Retrieval is a very important research area
in the field of image processing. It is comprises of low level
feature extraction such as texture, shape and color and similarity
measures for the comparison of images. Recently, the research
focus in FBIR has been in reducing the semantic gap, between
the low level visual features and the high level image semantics.
In this paper, various techniques for image retrieval have been
studied. Further, brief discussion has been done on content based
image retrieval which is included with feature extraction
methods based on texture, shape and color. At the end of this
paper, comparative study between various content based image
retrieval techniques has been done.
|
Download
|
30 |
Fully Automatic Measurement of Intima Media Thickness
In Common Carotid Artery using B-Mode Ultrasound
Video Sequence
Sushma R. Hattarki, Sanjay S. Pawar
Abstract-In the cardiovascular events measurement of Intima
media thickness (IMT) has high clinical relevance. To analyze the
wall thickening there are many methods are used. In this paper
using B-mode ultrasound image, Segmentation and tracking
process of IMC is done and IMT can measure. This process is
fully automatic. Segmentation deals with robust identification of
the LI and MA interfaces in first frame of video sequence. In
tracking stage, tracking of LI and MA interfaces in subsequent
frames of CCA ultrasound sequence and inconsistencies of IMC
detected and also reduced. In this paper, some algorithms are
proposes to measure the Intima Media Thickness (IMT) using Bmode
ultrasound image.
|
Download
|
31 |
MPPT Algorithm Based Solar and Wind Power
Generation Using Boost Converter with Total
Harmonic Distortion
S. Venkatesh Kumar, B.Sridhar, M.Karthik
Abstract-The hybrid system consists of photovoltaic
panels, wind turbines and storage batteries. In this
project deals with the modeling and analysis of
DC/DC converter with permanent magnet
synchronous generator based wind energy
conversion system. A simple and cost effective control
with DC-DC converter is used for maximum power
point tracking (MPPT) and hence maximum power is
extracted from the turbine and the photo voltaic
array. The perturbation and observation algorithm
fused with the proposed converters is used for
drawing maximum power from the input sources.
So power from the two sources can be delivered
either independently or simultaneously depending
on their availability. The main advantage of the hybrid
system is to give continuous power supply to the load.
The LC filter at the output of the inverter kept THD
of grid current within the standard limit, and easily
found that power fluctuation has been completely
reduced using battery bank.
|
Download
|
32 |
Fuzzy Logic Control Based High Efficiency Multilevel DCDC
Converters for High Voltage Direct Current System
Vijayalakshmi. R
Abstract-In this paper presents new topologies Multilevel DCDC
buck-boost converter which consists of an inductor based
boost circuit and a switched capacitor circuit has high voltage
gain and flexible output voltage. Operation of these switching
devices causes inherently nonlinear characteristic to the DC-DC
Converters include buck-boost converter. It is suitable for a low
voltage power source such as fuel cells. To achieve a stable and
fast response, nonlinear controller were applied to control buckboost
converters. The efficiency of the proposed converter is
improved compared with the conventional soft switching
converter in high boost ratio. The operation of the proposed
converter has been confirmed by circuit experiments and
simulations by using MATLAB Simulink.
|
Download
|
33 |
Naive Bayes Based Document Classification Using Term
Frequency and Word Net Corpus
Megha Mishra, Bharti Sahu, Vishnu Kumar Mishra
Abstract-Text mining is variance of a field called Data mining.
Data mining (sometimes referred to as knowledge or data discovery)
is that the process of analyzing knowledge from totally different
views and summarizing it into helpful info. Text mining is the
larger field of data mining. This paper proposes an effective
document classification technique which uses term frequency, word
net corpus, Charles miller dataset and Naive Bayes Classifier. This
method has achieved satisfactory result. Hence the proposed
method improves the performance of Naive Bayes classifier.
|
Download
|
34 |
The Future Trend: An Efficient and Optimal Cost
Monitoring Systems for Medical & SM
Enterprises with Concepts of Internet of Things
(IOT)
Thota Mahesh Babu, A.V.Subba Rao
Abstract-Its quit interesting to starts with some
philosophical manner rather than the aim of paper, that
is, human kind likes more and more simplified life in
their daily activities. The people like, simplification in
cooking, travel, education, fashion design, dressing,
information availability about certain things,
communication from one place to another and so on.
That means, the people like intelligent automated life.
In contrast artificial things can interact with the human
kind and solves their desires. For example, someone
may have lost something, somewhere, but they forget
where they lost. The difficulty here is, how find the
thing, someone may give the solutions RFID technology
but it works in certain range. So from the discussions,
we need, the autonomous mechanism that can trace out
the locality or information regarding to what we lost?
In simple manner, we need a common platform to
integrate entire world of thing. For a little while, the
common platform is internet and hence we labeled
Internet of Things (IoT). That’s what; the paper is
going to deal. So the principal objective is to monitoring
the thing of parameters from anywhere in the world.
The paper is not aimed to integrate entire world of
things right now but dedicated to two fields, medical &
small, medium enterprises. In medical field, monitor the
patient through camera interface and patient’s
moments using WSN interface. And in case of SM
Enterprises monitors, temperature, water level,
machine motion detection using WSN and visual
through Camera Interface. The paper is built with high
speed and low cost Raspberry-Pi Controller.
|
Download
|
35 |
Performance Analysis of FIR Digital Filters Using Artificial
Neural Network for EMG Signals
Hemant Kumar, Anjana Goen
Abstract-In performance of EMG signal, signal acquisition
must be noise free. This paper deals with the application of the
digital FIR filter on the raw EMG signal. In this paper different
window techniques are used to design FIR filter and their filtered
values are used to compute MSEs with the help of Artificial
Neural Network. The dataset is configured for multilayer
perceptron (MLP) training with feed forward algorithm. Finally
the MLP is trained and the results of Mean squared error & Best
validation point are shown in table-I.
|
Download
|
36 |
Effect of Filling Ratio on Thermal Characteristics of Heat
Pipe using Titanium Oxide Nanofluid
V.Arivazhagan, D.Mala, K.Dinesh Kumar
Abstract-An experimental study was carried out to investigate
the thermal characteristics of heat pipe using nanofluid and
Deionized water (DI water) is presented in this work. The
TiO2/water nanofluid is used as one of the working fluid in
experimental heat pipe with concentration of 1.0% wt .The test
section of the heat pipe is made of copper tube with outer
diameter 16 mm, inner diameter 14 mm and length 1000 mm.
The heat pipe is tested with (DI water) and nanofluid
respectively. This study focused on the effects of heat input, fill
ratio and angle of inclination on the thermal efficiency and
thermal resistance of heat pipe. The experimental results
indicate that the thermal efficiency increases when
nanoparticles are added with the DI water (nanofluid) and also
the heat pipe which uses nanofluid as working fluid shows lower
thermal resistance value when compared to the heat pipe which
uses DI water alone.
|
Download
|
37 |
Design a Low Noise Amplifier Using Cascading of
Resistive Shunt Feedback with Current Reuse
K.E.Purushothaman, V.Nagarajan
Abstract-Resistive shunt feedback is a feasible option
for wide band low noise amplifier design. It provides
wideband input matching with the assistance of a
feedback network. However, low voltage and low-power
design enact severe limits on the design options. The
linearity of the LNA is mainly limited by the low supply
voltage of the LNA, which is a direct consequence of the
low-power design and the migration to lower supply
voltages. Low Noise Amplifier (LNA) is the first
energetic component in the front-end of the receiver.
The high power consumption stalks from the fact that
an LNA must provide concurrent wideband matching,
high gain, low noise, and high linearity, all of which
typically require high power and high supply voltages.
The existence of a feedback network and boosting
inductors might cause the LNA to be possibly unstable.
Power can be reduced by using cascading of resistive
shunt feedback in the Low Noise Amplifier design. In
this paper cascading of resistive shunt feedback LNA
amplifier has been designed. It is used to achieving low
power, high noise-factor and high bandwidth. Current
reuse technique is also implemented.
|
Download
|
38 |
ARM Based ATM Terminal Design Using Biometric Access
A. Gouthami, K.Venu Gopal
Abstract-This paper reports the design of ATM with
enhanced security using biometric access. Finger print
recognition is done using an ARM CORTEX (M4) Processor.
When a user tries to navigate the account authentication is
needed, it is going to be done in two stages where the RFID
tags are allotted to every individual user in the first stage. In
second stage the finger prints are collected in according to the
details filled in the data base. As per the provided
authentication stages its easy to trace the unauthorized user.
Because, at the time of transaction the user involved with the
mismatched fingerprints or with wrong RFID card are
captured through the camera, where it will be invoked with
their pins connected to the processor ports internally. The
captured snap of the user is stored into memory as well as in
the site. Then we can know the person who is unauthorized
and if the finger print matches transaction gets completed
successfully..
|
Download
|
39 |
Content based Image Retrieval using Texture features in
the DWT domain
Lata Kuldeep, Shreya Jain
Abstract-The digital image data has tremendous growth in
amount, quantity and heterogeneity. The conventional
information retrieval techniques does not gratify the user’s
demand, so an efficient system is require to develop for content
based image retrieval. The content based image retrieval are
comely very useful for the purpose of exact and fast retrieval of
different images. The problem of content based image retrieval
is based on generation of distinctive query. The low level visual
content features of query image that is color, texture, shape and
spatial location is used for retrieving image. These distinct
features of images are extracted and executed for a equivalence
check among images. First we analysis the visual content
description of image and then the elementary schemes use for
content based image retrieval are considered. We also
inscription the comparison between query image and target
image of large data base accompanied by the indexing scheme to
retrieve the image. These CBIR techniques are implemented on
a database having 280 images spread across 7 classes and each
class having 40 images for each CBIR technique query image
applied on the database and precision & Recall values are
computed. The result has shown performance improvement as
compared to other techniques used for CBIR at reduced
computations.
|
Download
|
40 |
Advanced Image Processing Tool for Face Identification using
Gabor Filter Based Neural Network
S. Srikanth, K. Sumalatha
Abstract-The main objective of this paper is to develop a software
tool for the identification of faces on the applied input image. The
existing techniques may also gives this result but the main intention
is to develop a software tool in the MATLAB using neural
networks under simple and fastest executable algorithms. For that
we are introducing Gabor filter based neural network. This
technique will give the better result in the short span of time with
efficient techniques. It needs only simple MATLAB software and
simple predefined inbuilt functions. This technique is mainly
helpful in facial and image processing environments. It is the initial
analysis of any face processing technique for image contents. So
this may also helpful in criminal cases like robbery to identify the
face of thief’s. For that here we are using neural networks which
can acts and analyze like human brain.
|
Download
|
41 |
Finite Element Analysis of Sintered Metal Powder
Preform during Extrusion Process
Poonam Chourasia, Rohit Raj Vedya
Abstract-Metal powder technology is currently
arousing global interest as an economic method of
producing components from metal powders. Parts
manufactured by conventional Powder Metallurgy
(P/M) process of compacting metal powders and
sintering, have relatively poor mechanical properties
due to porosity. There are several applications
demanding high tensile, impact and fatigue strength
and for such applications the material should have
minimum or even zero porosity. Bulk processing of
metal powder preform is a convenient method of
reducing or eliminating the porosity from the
conventional powder metallurgy products. In this new
technology, sintered porous metal powder preforms are
used as starting materials in metal forming processes.
The bulk processing of metal powder preforms has
therefore wide industrial applications because of good
dimensional accuracy and surface finish of metal
powder components with enhancement load bearing
capacity. A finite element analysis (FEA) of the cold
extrusion process was undertaken. The FEA simulation
was carried out using ANSYS,FEA software,
specifically produced for metal forming simulation. An
axisymmetrical 2D geometric model of the tooling and
billet was constructed for the analysis. The high-grade
aluminium billet was modeled as a perfect plastic
material for the non-linear analysis during the finite
element simulation. Output from the finite element
program included Total deformation, shear stress,
Directional deformation and equivalent stress.
|
Download
|
42 |
Designing Of Scalable Fire, Smoke, Gas Leakage Monitor
And Alarm System Based On Zigbee Technology
Kuchipudi Durga Prasad, Sandeep Chintoju
Abstract-Security is primary concern for everyone. Security is
the degree of protection against danger, damage, loss, and crime.
Design of effective security alarm by using different sensors that
can monitor an industry, offices, home or any public place.
ZigBee is the name of a specification for a suite of high level
communication protocols using small, low-power digital radios
based on the IEEE 802.15.4 standard for wireless personal area
networks (WPANs), such as wireless headphones connecting with
cell phones via short range radio. The technology is intended to
be simpler and cheaper than other WPANs, such as Bluetooth.
ZigBee is targeted at radio-frequency (RF) applications that
require a low data rate, long battery life, and secure networking
ZigBee is a low-cost, low-power, wireless mesh networking
standard. The low cost allows the technology to be widely
deployed in wireless control and monitoring applications, the low
power-usage allows longer life with smaller batteries, and the
mesh networking provides high reliability and larger range.
|
Download
|
43 |
Experimental Study of Glass Fiber Reinforced Gypsum Wall
Panel
M.S.Kuttimarks
Abstract-There is a huge growing requirement of building
materials in India due to the existing housing shortage mainly for
the low income groups in urban India. To meet this challenge,
India requires innovative, energy efficient building materials for
strong and durable housing in fast track method of construction
at affordable cost. It is also important that housing and buildings
are disaster resistant to protect the lives and properties of people.
All these concerns are involved in sustainable and inclusive
development. In this project, we are going to carry out test on
gypsum reinforced with glass fiber to check the influence of fibers
on compression and tensile strength of Glass Fiber Reinforced
Gypsum.
|
Download
|
44 |
Experimental study of prefabricated
Brick panel roofing
M.S.Kuttimarks
Abstract-This paper aims to point out the various aspects of
prefabricated roofing methodology for low cost housing by
highlighting the experimental study of prefabricated brick panel and
RC Joist roofing technique, and the economic advantages achieved by
its adoption. India is currently facing shortage of about 17.6 million
houses. This method merely satisfies the most bottom and
fundamental human needs. The material tests are conducted
successfully in this research paper. The specifications of Indian
Standards and other research studies are co related with in this
experimental study. The test results are tabulated in this study those
satisfies the basic needs of engineering properties of roof panel. Also
explain the economical comparison of the load bearing structure in
prefabricated roof panels.
|
Download
|
45 |
Design of Cache Controllers with Additional Features
G.Narsimlu, Kayala. Manohar
Abstract-To meet the growing needs of computing power,
communication speed and performancerequirements
demanded by today’s applications, processor clock speed
has to be increased. However, increasing clock speed is not
viable due to heat dissipation and power consumption
constraints. Hence Instead of trying to increase the clock
speed, multi-core processor architectures with the lower
frequency can be used. A multi-core processor is a single
integrated circuit in which two or more processors have
been attached for enhanced performance, reduced power
consumption and more efficient simultaneous processing of
multiple tasks. Multi-core processors, which have multiple
processing units on a single chip, are widely viewed as a
way to achieve higher processor performance. Well
scheduling of running threads on these processors will
result in achieving higher performance. Modern multi-core
systems are designed to allow clusters of cores to share
various hardware structures, such as last-level caches,
memory controllers, and interconnections without
considering these shared resources, scheduling the threads
will cause serious degradation in overall performance of
the system. In this paper we are showing one basic problem
in multicore processor. The simulation results showed that
the requirement of scheduler or cache-controller to avoid
lot of problems that come in to the existence during shared
caches memory shared by many cores located on single
chip as well as the simple solution on it with simulation
result.
|
Download
|
46 |
High-Throughput Multistandard Transform Core
Supporting H.264/Mpeg/Vc-1 Using Common Sharing
Distributed Arithmetic
Kayala. Manohar, G.Narsimlu
Abstract-This paper proposes a low-cost high-throughput
multi standard transform (MST) core, which can support
MPEG- 1/2/4 (8 × 8), H.264 (8 × 8, 4 × 4)[2][3], and VC-1 (8
× 8, 8 × 4, 4×8, 4×4) transforms[4]. Common sharing
distributed arithmetic (CSDA) combines factor sharing
and distributed arithmetic sharing techniques, efficiently
reducing the number of adders for high hardware-sharing
capability[5][7]. This achieves a reduction in adders in the
proposed MST, compared with the direct implementation
method. With eight parallel computation paths, the
proposed MST core has an eightfold operation frequency
throughput rate.The CSDA-MST[8][9] core thus achieves a
high-throughput rate supporting multi standard
transformations at low cost. The CSDA-MST core achieves
a high-throughput rate supporting multi standard
transformations at low cost and it measures to achieve a
high-throughput rate of 1.28 G-pels/s, supporting the
(4928×2048@24H) digital cinema or ultrahigh resolution
formate.
|
Download
|
47 |
Designing an intelligent Microcontroller based traffic
control system with countdown timer
(Case Study: Agbor Metropolitan)
Igbajar Abraham, Eze Chinenye
Abstract-The traffic Control System in Agbor is basically
done by human effort and intelligence. This is not efficient
enough to serve the rising need of traffic control system
owing to the rapid rate of increase in vehicular movement.
The optimization of traffic light controller in Agbor which
is using human effort traffic control system was studied.
In this paper, multiple traffic light control and monitoring
systems using microcontroller is presented. The system to
reduce possibilities of traffic jams, caused by human error
and sentiments. The micro-controller used in the system is
8051 microcontroller. The microcontroller is embedded
with an intelligent conditional program code written in
assembly language, this program was embedded into the
microcontroller using programmer. The new
microcontroller based traffic light was simulated and
tested with Proteus simulation software, and the code was
written in MiDE, this was done by developing a prototype.
The functionality of the prototype shows that the
developed system can successfully serve the desired
purpose when deployed to a real life scene. Apart from
serving its full purpose in controlling traffic congestion,
the developed system can be employed as a training kit in
learning traffic light control system design and operation.
Also, it can be used as a teaching aid in schools,
institutions and colleges for various road users and the
simulation can be useful in driving schools.
|
Download
|