Sr/No/ |
Title |
Pdf |
1 |
Analysis and Improvement of Spectral Efficiency Using Modified
Channel Shortening Filter in MISO OFDM System
Soumya vs, Prof. R. Rajkumar
Abstract —Orthogonal frequency division multiplexing
is a flexible block modulation scheme used to reduce
the computational cost of the receiver by using a
cyclic prefix as a guard interval .The spectral
efficiency depends on the cyclic prefix length in
orthogonal frequency division multiplexing systems
.The cyclic prefix length must be greater than or
equal to the delay spread of the channel impulse
response in order to avoid inter block interference
and inter carrier interference. Spectral efficiency can
be improved by using channel shortening filter in
orthogonal frequency division multiplexing systems.
MISO OFDM is used for the enhancement of spectral
efficiency, since the MISO systems decreases
complexity and noise at transmitter and receiver cost
is also reduced. A channel shortening filter yields low
spectral efficiency In order to improve the spectral
efficiency, a modified channel shortening filter
structure that exploits the null space and provides
independent equivalent channels to the receiver has
been used. The spectral efficiency of the modified
channel shortening filter in MISO OFDM system has
been improved by 20 to 40% when compared to
channel shortening filter. The performance of
modified channel shortening filter is better for the
parameters such as spectral efficiency, Signal to noise
ratio, block error rate, and channel gain.
|
Download
|
2 |
Energy-efficient reliable routing using
Caser protocol design for WSN
K.Anitta, Prof.P.Arulprakash
Abstract—A wireless sensor network (WSN) of
spatially distributed autonomous sensors to
monitor physical or environmental conditions,
such as temperature, sound, pressure, etc. Routing
is another very challenging design issue for WSNs.
A properly designed routing protocol should not
only ensure high message delivery ratio and low
energy consumption for message delivery, but also
balance the entire sensor network energy
consumption, and thereby extend the sensor
network lifetime. It propose a novel secure and
efficient Cost-Aware Secure Routing (CASER)
protocol to address these two conflicting issues
through two adjustable parameters: energy
balance control (EBC) and probabilistic-based
random walking. It discover that the energy
consumption is severely disproportional to the
uniform energy deployment for the given network
topology, which greatly reduces the lifetime of the
sensor networks. To solve this problem, It propose
an efficient non-uniform energy deployment
strategy to optimize the lifetime and message
delivery ratio under the same energy resource and
security requirement. For the non-uniform energy
deployment, our analysis shows that It can
increase the lifetime and the total number of
messages that can be delivered by more than four
times under the same assumption.
|
Download
|
3 |
Prevention of Dos Attacks in Wireless Sensor Networks
M.Annapoorani, D.Kiruthika, V.Geethamani
Abstract—In wireless sensor networks attackers can
inject unwanted messages through the nodes which
are already being captured by attackers and they
inject DOS attacks against reports. The attackers try
to launch the false reports also. A number of filtering
schemes to avoid these attacks have been introduced
which cannot filter strongly. In our scheme each node
consists of its own authentication key. Before sending
the reports the key is forwarded to the the next node
through which it has to send the message. The key
generates a code .The message also generates a code.
Both the codes are checked for similarity. If both
codes are similar then the message is valid. The
message is then forwarded to its destination. make
use of Hill climbing approach to find the shortest
path in which the reports can reach its destination.
our scheme can provide strong filtering capacity and
memory requirement is low. Our scheme can also
remove the false reports ealier.In existing scheme
only one path is available for the reports .In our
scheme multipath is applicable.
|
Download
|
4 |
A Control System Used to Improve Energy Production from
Alternative Sources with DC/DC Integration using ANFIS
Bincy.B.Babu, N.R.Naharaj, Dr.S.S.Sivaraju
Abstract—Electricity is one the most essential needs for
humans. Conversion of solar energy into electricity not
only improves generation of electricity but also reduces
pollution due to fossil fuels. Various renewable sources
such as solar energy, wind energy etc are the sources of
power generation. Solar Energy is a good choice for
electric power generation. The Earth receives 174
petawatts (PW) of incoming solar radiation (insulation)
at the upper atmosphere. About 30% is reflected back
to space while the rest is absorbed by clouds, oceans and
land masses. The solar energy is directly converted into
electrical energy by solar PV module. The output power
of a PV panel array depends on the PV voltage and
weather conditions. The ratio between output power
and cost, DC/DC converters are used to obtain
maximum power from the PV panel array using MPPT.
|
Download
|
5 |
Zigbee based Wireless Body Area Sensor Network for
patient’s physiological parameter monitoring
Akash Chouksey, Soni Changlani, Prof. Saiyed Tazen Ali
Abstract-This paper describes the design of a
wireless body sensor network based on zigbee
technology(IEEE 802.15.4)) for monitoring of
patients physiological parameter monitoring like
ECG, Body Temperature, Heart Beat, Blood
Pressure It is mainly used for collecting and
transferring the various monitoring information
about the patients in hospitals to doctors or in
their homes. This application consists of Zigbee
based network,\ and four types of sensors ECG,
Body Temperature, Heart Beat, and Blood
Pressure sensors.
|
Download
|
6 |
Lifelong personal health data and application software
Via virtual machines in the cloud
R Vinoth, Dr. B. Geetha
Abstract -Day by day Technology has been developed the
cloud computing provides platform for storage of data. It
maintains Patients Personal Health Record (PHR) for an
emerging patient centric model of health information. The
patients Health report can be exchanged or shared third party
using Cloud Computing Technology. The Unauthorized can
access the data using Cryptographic Technique. The
Commercial cloud servers are used store their medical records
because it can be view by everyone, to assure the patients’
control over access to their own medical records. To achieve
fine grained and scalable data access control for medical
records stored in semi trusted servers using attribute based
encryption (ABE) techniques. The personal health data of a
patient can be provide high degree of security by exploiting
multi-authority ABE for Multiple PHR owners and users
|
Download
|
7 |
An Efficient Architecture in Clock Gating Using Wide
Spread Adapting Technique
R.Kiruthika, Dr. T. Kavitha
Abstract-The Clock gating reduces dynamic power dissipation
in synchronous circuits. A clock gating cell (CGC) is inserted,
which covers an internal latch that filters out potential glitches
from a block called as the gating function. Clock gating logic
uses strong and weak matching process,they are two kinds of
factor form matching.The strong matching seeks for the
matches which are externally present in the factored forms
and the weak matching identifies matches that are implicit in
the logic and they are hard to discover. The problem in
existing system involves a flip-flop architecture with higher
power consumption, gate count and circuit size . Hence a
modified Boolean function technique known as Wide Spread
Adapting (WSA) clock gating technique is implemented. The
weak and strong matching are done by WSA technique since
they do not require separate algorithms as in existing system’s
technique helps to reduce the clocking signal and the gate
pattern. Thus the proposed method achieves reduced clock
gating which also reduces delay, power, gate count and area.
|
Download
|
8 |
Comparative Analysis of Mobility Aware Energy Efficient MAC
Protocol for Wireless Sensor Networks
Mr. Ritesh A.Jadhav, Prof. N.B.Sambre
Abstract-Energy efficiency is an important
requirement in designing MAC Layer in WSN.
Besides that, the design must include fairness, low
latency and scalability due to the dynamic topology
changes in WSN environment. There is a lot more
issues that must be considered when designing
MAC layer such as signal loss in wireless channel,
collision at the receiver’s end, resource constrain
(energy, bandwidth, network topology), hidden
node and exposed terminal problem. The existing
technique in MAC layer are contention based and
schedule based. Keywords: Mobile Sensor
Network, MAC protocol, Performance Analysis,
Energy Efficiency, Mobility Handling, TDMA,
CSMA, RWP.
|
Download
|
9 |
Analyze the Performance Optimization of FIR Filter
Using Neural Network Algorithms
Alok Pandey, Santosh Sharma
Abstract-This paper presents the different design methods and
techniques to optimize the FIR digital filters with the help of
neural network. In this paper equiripple and Least squares
design techniques are used to design the FIR digital filter. This
paper describes the two different neural network algorithms for
finding out the best validation performance on the basis of order
and cutoff frequency. In this paper using FDA tool to design
digital FIR filters of different order, and neural network tool
box to compare different filters. The feed-forward algorithm
provides the best validation performance as compared to
cascade forward in case of Equiripple filter design. While in
Least squares method cascade forward provides best validation
performance as compared to feed-forward.
|
Download
|
10 |
ZigBee Network Based System For Power
Monitoring and Data Logging
Aruna Prabha V.S, D.Sam Devid Jero
Abstract─The power systems in this present day
combine different modes of generation, transmission
and conversion of the energy. There is no unique
system of monitoring the power distribution and for
the power failure detecting mechanism. The major
issue facing is the continuous isolation required for
the measuring equipments. A controlled power
supply can be obtained by continuously monitoring
the power supply by which to reduce the unwanted
power consumption and detection of failure of
electronic equipments. An optimal solution for this
problem is proposed by designing a wireless system,
which continuously monitors the power supply and
the power usage. A low data rate ZigBee based
wireless transceiver is used for the wireless
communication. The suitability of ZigBee for the
required communication link is that, ZigBee has
major role in monitoring and direct load controlling
for efficient power utilization. It covers enough area
needed for communication and it works on low data
rate with minimum power consumption.
Transmission distances range from 10 to 100 meters
line-of-sight, depending on power output and
environmental characteristics. The proposed
technique uses ZigBee network for monitoring the
power supply and the data is stored on the server.
Based on the data captured through the ZigBee
network, a technique will be proposed as a protocol
for the effective and efficient usage of power as per
the requirement.
|
Download
|
11 |
Digital watermarking scheme using
Video watermark techniques
Ankita Amburle
Abstract -The effective purpose a watermark should adhere to a
few requirements. In specific, it should be robust, and
transparent. Due to the replicable nature of video many illegal
copies of original videos can be produce. So its demand to deliver
methods for preventing illegal copying. In this paper identifies a
new digital watermarking approach for copyright protection of
video based on wavelet transformation. Very first, the motion
part of color video is detected by scene change analysis, and then
applying 3D wavelet transformation over a detected motion part
10 sub hands of wavelet coefficients are obtained. Watermark is
embedded into selected wavelet coefficients. In extraction step,
the original video is not needed, namely, blind detection. The
resultant watermarking scheme is used for public watermarking
applications where the original video is not available for
watermark extraction. The robustness of proposed method
against various kinds of attacks such as median filtering, frame
drop, frame averaging, frame swapping and there are lots of
lossy compression including MPEG-4, MPEG-2, and H.264
shows the fidelity of our claim.
|
Download
|
12 |
Image Encryption Method Using Permutation and
Rubik’s Cube Principle for Images
Nilesh Tiwari, Urooz jabeen
Abstract-The primary goal of this paper is security
management. This will provide authentication of users,
and integrity, accuracy and safety of images which is
traveling over internet. Moreover, an image-based data
requires more effort during encryption and decryption.
The Proposed Architecture for encryption and decryption
of an image using suitable user defined key is developed
with the same objective. In this paper, we introduce a
new permutation technique based on the combination of
image permutation and a new developed encryption
algorithm called “Hyper Image Encryption Algorithm
(HIEA)”. From the selected image we will binary value
blocks, which will be rearrange into a permuted image
using a permutation process, and then the generated
image will be encrypted using the “Hyper Image
Encryption Algorithm (HIEA)” algorithm.
|
Download
|
13 |
Optimum safety message broadcasting
Protocol for vehicular networks
S.Nishanthini, S.Alagumuthukrishnan, Dr. K. Geetha
Abstract—VANET Vehicular safety applications depend
on the rapid and reliable dissemination of safety
messages to vehicles at risk. In order to allow sufficient
reaction time for emergency events in adverse driving
and road conditions, disseminating safety messages over
multi-hop vehicles is often needed. In addition, there are
a number of technical challenges to consider in
designing protocols for emergency applications,
adaptation to VANET specific network environments,
such as high mobility, severe channel fading, and a wide
range of vehicle density, including extremely high nodedensity
owing to rush-hour traffic in metropolitan
areas, are another important aspect to consider. An
Intelligent Optimized Link State Routing (OLSR)
algorithm is proposed to deliver mission-critical life
safety messages over target geocast regions. The
coordination problem and Opportunistic packets relay
selection is solved by the novel concept of Circle of
Trust (COT), combining with MAC as Standard
Wireless Access in Vehicular Environments (WAVE)
which defines the range of reliable local neighbour
knowledge collection over a broader target area
efficiently and reliably. This OLSR technique results in
better performance and Quality of Service than the
existing protocols.
|
Download
|
14 |
Design and Simulation of PV based Switched Boost
Inverter for Grid connected System
K.Shivashanker, K.Alekhya ,K.VenkataNagaVikranth
Abstract— Introduction of reference frames in the analysis of
electrical machines has turned out not only to be useful in their
analysis but also has provided a powerful tool for the
implementation of sophisticated control techniques. This
application note gives an introduction to the theory of the most
commonly used reference frames and provides routines that
allow for easy conversion amongst them. Control of three-phase
power converters in the synchronous reference frame is now a
mature and well developed research topic. However, for singlephase
converters, it is not as well-established as three-phase
applications. So in this paper a single phase SRF theory is
proposed for SBI.
|
Download
|
15 |
Advancement In Wireless Communication
Vijaya bhandari, Updesh verma
Abstract—In this paper the information about the advancement
in wireless communication is given and it is also given that when
requirement of high speed of data rate is increases then how the
technology changed because of number of users also increases
with time. So it is a challenging work for the researchers to give a
total satisfaction to their users with reliability. This paper gives
you a knowledge about how different combination of different
multiple access techniques and modulation with different
receivers gives the satisfactory performance among the users.
|
Download
|
16 |
Solving some theoretical distribution
Problems by using c++ program
J.Sathyamalar, M.Vadivukkarasi
Abstract—In this paper we study the notions of Binomial,
Poisson and Normal Distribution in statistical methods and
also we introduce the C++ program in Binomial, Poisson
and Normal Distribution problems.
|
Download
|
17 |
Design and Evaluation of Hybrid Vector Routing Protocol in
Wireless Sensor Networks
Manisha M. Magdum, P.P.Belagali
Abstract- These days’ ad hoc networks have found many
applications. Multiple ad hoc routing protocols have
been proposed, of which on-demand routing protocols
are very popular because they are easy to realize and
have no power and priority concept for data
communication in routing.
|
Download
|
18 |
Channel Estimation for Wimax System Based On Comb Type
Pilot Arrangement in AWGN Channel
Pritam Shital Langde, Prof. N. B. Sambre
Abstract— WiMAX (Worldwide Interoperability for
Microwave Access) is a wireless networking system
which provides wireless broadband to fixed and
mobile terminals. Channel estimation is an essential
problem in WiMAX system. But still Performance
evaluation with channel estimation is required
because amplitude and phase shift causes error in
wireless channel.[2] While considering the Channel
estimation for Wimax system it is important that, A
good choice of the pilot pattern should match the
channel behavior both in time and frequency
domains[1]so Pilot-aided channel estimation has been
used. These Pilot Assisted estimation techniques are
mainly classified with block type and comb type pilot
arrangements.
In this paper, the channel estimation of
WiMAX system for comb type arrangement under
AWGN channel conditions is discussed. Here, mainly
two algorithms Least Square and Least Mean Square
are tested with Linear and Spline interpolation.
Simulation will be carried out using MATLAB as a
testing environment. BER versus SNR curves are
used for comparing the results.
|
Download
|
19 |
Solving Multi Objective Fully Fuzzy Linear Programming
Problem Using Ranking Function
A.Sahayasudha, P.Kanniammal
Abstract-In this paper we solve a multi objective fully fuzzy
linear programming problems using trapezoidal fuzzy numbers
are proposed. Then the fully fuzzy linear programming problem
is solved by using Maleki and yager ranking function.
|
Download
|
20 |
A keyword-Recognized Service Recommendation
Method on Hadoop using Map Reduce for Big Data
Applications
M Nandakumari1, R Suresh2
Abstract- This paper says about providing flexible
recommendations to user Service recommendations system has
become a powerful tool. Since the rapid growth of information in
every sectors such as the amount of services, customers, online
information etc., big data analysis problem has been raised in
service recommendation system. So, Scalability and inefficiency
problem arises in traditional recommender system while
processing large amount of data. Moreover, some of the existing
service recommendation systems give same ratings and rankings
to services to users, but that doesn’t satisfy users’ preferences,
there is a failure in providing personalized requirements to users.
So, I propose a keyword-Recognized Service Recommendation
Method to address the above challenges. By giving the
recommendation list, the users are effectively recommended with
appropriate services. Keywords are being used to indicate the
users’ preference to generate recommendation with the
adaptation of collaborative filtering algorithm. Finally, Hadoop
using MapReduce is implemented to improve scalability and
efficiency in big data environment.
|
Download
|
21 |
Design of a ME Dipole Antenna in Planar
Configuration using CRLH-TL implementation
U.Vinitha, Dr.M.Umaparvathi
Abstract-In recent years, dual polarized antenna
plays a crucial role in antenna designs. Its attractive
features such as high gain, wider bandwidth is
responsible for creating a ME dipole antenna. Thus,
the objective is to design a planar Magneto-Electric
(ME) dipole antenna which is the combination of
magnetic and electric dipoles, based on the composite
right/left handed transmission lines (CRLH). The
magneto-electric dipole antenna is excited by single
differential feed and therefore it acts as a travelling
wave antenna that enables the formation of Omni
directional radiation pattern. This merged structure
of dipole antenna has attracted considerable attention
due to increased demand for multi functionality and
switchable characteristics including wide bandwidth,
low cross polarization and reduced side lobes and
back lobes radiation, nearly the same E-plane and Hplane
patterns, constant radiation pattern and steady
antenna gain over the operating frequency range.
The proposed ME dipole antenna based on CRLHTL
gain is analyzed at different frequencies using
FEKO simulator.
|
Download
|
22 |
An efficient concurrent access on cloud
Database using secured BAAS
G.Elakkia
Abstract-In distributed database system, cloud services
provide high availability and scalability, but they raise
many concerns about data confidentiality. SecureDBaas
guarantees data Confidentiality by allowing a cloud
database server to execute concurrent SQL operations
over encrypted data and the possibility of executing
concurrent operations on encrypted data. It’s
supporting geographically distributed clients to connect
directly to an encrypted cloud database, and to execute
concurrent and independent operations including those
modifying the database structure. The proposed
architecture has the further advantage of eliminating
intermediate proxies that limit the elasticity,
availability, and scalability properties that are intrinsic
in cloud-based solutions. SecureDBaas that support the
execution of concurrent and independent operations to
the remote encrypted database from many
geographically distributed clients. It is compatible with
the most popular relational database servers, and it is
applicable to different DBMS implementation. It
provides guarantees to data confidentially by allowing a
cloud database server to execute concurrent SQL
operations over encrypted data.
|
Download
|
23 |
Biogas technology – present status;
Problems & future projections
Dr. S.S. Sooch, Er. Jasdeep Singh Saini, Er. Harpreet Singh
Abstract-The acute shortage of energy available from
traditional sources has prompted intense and research
activities in the field of alternate sources of energy
especially from the renewable source like one such
biomass, biogas etc. Potential source is the biogas
generated through anaerobic digestion wastes like cattle
sung, crop residues, etc. Anaerobic digestion, not only
leaks to valuable energy in the form of methane but also
enhances the fertilizer value of the waste. Additionally, it
provides a safe, convenient, non-offensive and economical
waste disposal method.
|
Download
|
24 |
An energy efficient rp node selection to improve the
Life time for wireless sensor networks
Medha Devan
Abstract— Data gathering mechanism for large scale wireless
sensor networks by introducing mobility into the network. The
sink mobility along a constrained path can improve the energy
efficient in WSN. To address this challenge a proposed method is
to form a hybrid moving pattern in which a mobile sink node
only visits rendezvous points (RPs), as opposed to all nodes.
Sensor nodes that are not RPs forward their sensed data via
multi-hopping to the nearest RP node. Fundamental problem
becomes computing a tour that visits all the RPs within a given
delay bound. Identifying the optimal tour, however is an NP hard
problem .To address this problem Weighted Rendezvous
Planning (WRP) method is proposed whereby each sensor node is
assigned a weight corresponding to its hop distance from the tour
and the number of data packets that it forwards to the closest
RP.WRP enables a mobile sink to retrieve all sensed data within
a given deadline while conserving the energy expenditure of
sensor nodes. More specifically, WRP reduces energy
consumption and also increases the network lifetime as compared
with existing methods.
|
Download
|
25 |
A study of risk assessment and
Management in construction
Sreedevi Das, M.Sivagami
Abstract -No construction project is risk free. Risk can
be managed, minimized, shared, transferred or
accepted. It cannot be ignored. Moreover,
construction, it is held, is exposed to more risk and
uncertainty than perhaps any other industry sector.
An effective and efficient risk management approach
requires a proper and systematic methodology and,
more importantly, knowledge and experience. The
record of the construction industry is not acceptable in
terms of coping up with risks in projects. Risk
management is a process which consists of
identification of risks, assessment with qualitatively
and quantitatively, response with a suitable method
for handling risks, and then controls the risks by
monitoring. This study proposes to apply the risk
management technique which includes well. This
paper aims to identify and analyse the risks associated
with the development of construction projects.
|
Download
|
26 |
Design of Area Optimised BCD
Multiplier using VHDL
Parag shrivastava, Prof. Atulika shukla
Abstract—Decimal multiplication is one of the most
frequent operations used by many financial, business
and user-oriented applications but current
implementations in FPGAs are very inefficient in
terms of both area and latency when compared to
binary multipliers. In this paper we present a new
method for implementing BCD multiplication more
efficiently than previous proposals in current FPGA
devices with 6-input LUTs. In particular, a
combinational implementation maps quite well into
the slice structure of the Xilinx Virtex-5/Virtex-6
families and it is highly pipeline-able. The synthesis
results for a Virtex-6 device indicate that our
proposal outperforms the area and latency figures of
previous implementations in FPGAs.
|
Download
|
27 |
Using dynamic workloads for efficient
Server provisioning approach with
Decision making
S.Anna Suganthi, K.Karnavel
Abstract—Dynamic virtual server provisioning is
critical to quality-of-service assurance for multitier
Internet applications. In this paper, we address the
important challenging problems. First, we propose
an efficient server provisioning approach on
multitier clusters based on an end-to-end resource
allocation optimization model. It is to minimize the
number of virtual servers allocated to the system
while the average end-to-end response time
guarantee is satisfied. Second, we design a modelindependent
fuzzy controller for bounding an
important performance metric, the 90th-percentile
response time of requests flowing through the
multitier architecture.
|
Download
|
28 |
Efficient and Adaptive Video Sharing in the Clouds
Bashettywar Swetha, M Madhavi Latha,
K Amarendranath, M Rakesh Chowdary, Sampath Siddam
Abstract—Wireless communication changes the world an
extent. Communication over the social networks has
been increased as the mobile usage getting more. Hence
respective technologies and software’s also can be
modulated. But incapability in integrating all these
issues, finally poor service in the name of less
performance. The better solutions for the mentioned
issues are cloud technology. In this paper we attempted
to develop a new mobile streaming framework called
adaptive mobile video streaming increases the efficiency
of social video sharing and also monitoring activities of
users.
|
Download
|
29 |
A Study on the Construction and Arithmetic of
Lemniscates Curves
Dr. S. Joseph Robin
Abstract—This paper studies the mathematics of
lemniscates curve, whose most common form is the
locus of points the product of whose distances from
two fixed points (the foci) a distance 2a away is the
constant a2, and explore the pairing based
cryptography on this curve from theoretical and
implementation point of view. In this regards, we first
study the construction and arithmetic on lemniscates
curve and then design a new cryptographic scheme.
|
Download
|
30 |
A Novel Energy Efficient Adder Architecture for
Image Processing Applications
Karshankant Sharma, Vijay Kumar Magraiya, Abhay Khedkar
Abstract—In the present era, ultra-high energy efficiency is
required for all the battery operated devices due to increased
functionality on the single chip. This high energy efficiency can
be achieved by designing efficient arithmetic circuit that
performs most of the processing within these cores. In this paper,
we propose a novel adder architecture that improves the power
and speed parameters simultaneously at the cost of minor loss in
accuracy. The proposed adder can be efficiently utilized in the
image video processing applications. In order to evaluate the
efficacy of the proposed adder, proposed and existing adder
architecture is implemented on MATLAB to evaluate error
metrics and Tanner to evaluate design metrics. Simulation
results shows that proposed adder significantly reduces power,
area and delay at small loss in accuracy.
|
Download
|
31 |
Ultra-low Power Approximate Adder Design
Techniques for Mobile Applications
Karshankant Sharma,Vijay Kumar Magraiya, Meenakshi Mishra
Abstract—The rapidly increasing functionality on the portable
gadgets requires ultra-low power designs. As user cannot tolerate
with the rapid discharge of the mobile device rather can manage
with small degraded quality. The ultra-low power designs can be
achieved by designing efficient arithmetic circuit that performs
most of the processing within these cores. We propose different
approximate adder designs techniques that improve the power and
speed parameters simultaneously at the cost of minor loss in
accuracy. The proposed adder can be efficiently utilized in the
image video processing applications. To evaluate the effectiveness
of the proposed adders, all the designs are implemented on
MATLAB to evaluate error metrics and Tanner to evaluate design
metrics. Simulation results shows that proposed adder significantly
reduces power, area and delay at small loss in accuracy.
|
Download
|
32 |
FINAL REPORT:-Investigations on VoIP for a
WiMAX Communication Network
Manjotinder Singh Grewal, Rupinder kaur Gurm
Abstract—Voice over internet protocol refers to the
transmission of telephone traffic over IP-based networks.
Voice transmission over internet is also called internet
protocol (IP) telephony. IP telephony has gained wide
popularity and has become an important services on the
internet. The use of IP telephony became real due to the high
bandwidth available on the internet and its low
implementation cost. Digital form of communication has
further led to its vital use. Due to above reasons, voice
communications using the IP, is also called Voice over IP or
VoIP, has become attractive. The simultaneous transport of
voice and data over the internet has already been
demonstrated using 3G networks. This paper presents the
performance evaluation of a WiMAX network. In this paper
only dynamic conditions for the application voice over IP has
been considered.
|
Download
|
33 |
To Extract the Maximum Power Using
Utility-Interfaced Wind Turbine Model
N.Kavithamanir, D.Anuja, M.Madhu Sudha
Abstract—Maximum power extraction from wind energy
system became an important research topic due to the
increase in output energy by using this technique. Wind
speed sensorless MPPT control has been a very active area
of research. The WT is connected to the grid via back–toback
PWM-VSC. The generator side controller and the
grid side controller have been done in Simulink. The main
function of the generator side controller is to track the
maximum power from wind through controlling the
rotational speed of the turbine using fuzzy logic controller.
The fuzzy logic algorithm for the maximum output power
of the grid-connected wind power generation system using
a PMSG has been proposed and implemented above. The
PMSG was controlled in indirect-vector field oriented
control method and its speed reference was determined
using fuzzy logic controller. A co-simulation
(PSIM/Simulink) program has been proposed for WECS
where PSIM contains the power circuit of the WECS and
Matlab/Simulink has the control circuit of the system.
|
Download
|
34 |
A novel approach for autonomous
Vehicle with intelligent black box
System
P.Prabakaran, S.Prabhakaran
Abstract—The main purpose of this project is to develop a
prototype of the vehicle black box system (VBBS) that can
be installed into any vehicle all over the world. The VBBS
can contribute to constructing safer vehicles, improving the
treatment of crash victims, helping insurance companies
with their vehicle crash investigations, and enhancing road
status in order to decrease the death rate. Advanced step to
the concept of vehicle black-box in developing a
comprehensive vehicle safety system which would not only
record the video and audio, but also try to prevent a
possible collision by limiting the speed of the vehicle in
accident-prone areas. In case of an accident, the time and
location is sent through GSM to a present number for
immediate rescue and treatment. Wireless black box system
using GSM and GPS tracking system is developed for
monitor the accident. Keeping this idea in our mind, the
proposing a system where vehicle itself intimates the
concern emergency service for immediate reaction in case of
accident or any emergency situation. After the accident, this
wireless device will send mobile phone short massage
indicating the position of vehicle by GSM and GPS system
to family members, nearest police station and hospitals.
Recently, black-box equipped vehicles are rapidly
increasing despite its low cost, because the black-box images
are used as evidence for making correct decisions on
vehicles accidents. The Fuel level sensor is used for find out
fuel theft and fuel fulfil in parking and petrol bunk areas.
|
Download
|
35 |
Improving Network Lifetime Based On
Gateway Relocation in Wireless Sensor
Networks
A.Prasanth, P.Ganesh Kumar
Abstract—In Wireless Sensor Networks (WSN), sensor
nodes deliver sensed data back to the gateway node
through multi hopping. The sensor nodes that are close
to the gateway node become heavily involved in packet
forwarding and it spends more battery power than
others. Therefore, these nodes will quickly drain out
their battery energy and decrease the network lifetime
of the WSN. To increase network lifetime of the WSN,
the concept of gateway patrolling is launched. In this
paper, we propose Zone Based Gateway Patrolling
(ZBGP) for mobile gateway in WSNs. In ZBGP,
gateway node is moved towards the area of the sensors
that generates more number of data packets (heavily
loaded zone). The simulation results show that
patrolling the gateway node towards the most number
of packets attains significant energy savings as
compared to the static approach which helps to improve
the life of the entire network.
|
Download
|
36 |
Message Filtering System
Sandip Bankar, D.K.Chitre
Abstract—One fundamental issue in today On-line Social
Networks (OSNs) is to give users the ability to control the
messages posted on their own private space to avoid that
unwanted content is displayed. Up to now OSNs provide little
support to this requirement. To fill the gap, in this paper, we are
going to propose a system allowing OSN users to have a direct
control on the messages posted on their walls. This is achieved
through a flexible rule-based system, that will allow users to
customize the filtering criteria to be applied to their walls, and a
Machine Learning based soft classifier automatically labelling
messages in support of content-based filtering.
|
Download
|
37 |
Implementation of personal data assistant
System for defence persons using
Microcontroller
P.Santhosh Kumar, V.Arun Kumar
Abstract—In Military and Industry persons working in
harsh conditions. In embedded system there having some
possible source to monitoring the person in harsh
conditions. They use PDA (personal data assistant) for
collecting the information. It takes the information about
their working condition in harsh environments. It not likes
that easy one. So they choose the embedded. In that CPU,
LCD touch screen and wireless communication module,
GPS, barcode laser scanner and interfaces etc….In that also
some disadvantages having major thing that monitoring the
military person's Parameters. Using Advances military
jacket .Peltier is used to control temperature level and
Corresponding Measurements are displayed. Peltier is
nothing but thermoelectric cooling. It creates a heat flux
between the junctions of two different types of materials. A
Peltier cooler, heater, or thermoelectric heat pump is a
solid-state active heat pump which transfers heat from one
side of the device to the other, with consumption of
electrical energy, depending on the direction of the current.
Thermoelectric coolers operate by the Peltier effect (which
also goes by the more general name thermoelectric effect).
The device has two sides, and when DC current flows
through the device, it brings heat from one side to the other,
so that one side gets cooler while the other gets hotter. The
"hot" side is attached to a heat sink so that it remains at
ambient temperature, while the cool side goes below room
temperature. In some applications, multiple coolers can be
cascaded together for lower temperature. Using this
Repeated or continuous observations of the personnel’s life
supporting functions and save the person in High robust
condition.
|
Download
|
38 |
Channel Utilization and performance comparison
between TCP and TCP Reno Protocol in 802.11 MAC
Standard
Shevaani Goyal
Abstract—This paper explores the comparison between the TCP
protocol and the TCP Reno protocol, particularly focusing on their
performance pertaining to the data transmission in the wireless
networks.
Further apart from the basic comparison between these two
protocols, this paper also aims at highlighting the performance of
TCP and TCP Reno when deployed in the common conditions and
specifications on the same network scenario by using
channelization approach. In this network scenario, the node
automatically searches an appropriate channel for data
transmission that minimizes the interference and congestion.
|
Download
|
39 |
Role Based Access Control Using Description Logic
Nagajothi.P, Suganyasree.K
Abstract—Among the sources of data semantic interoperability
is achieved using Semantic models. Semantic models combine the
data and information that it relates two or more domains. The
confidential information that need to be secured from the user
while providing the knowledge based on the request is made even
more difficult as the user may be able to apply logic and
reasoning to infer confidential information from the knowledge
being provided. Through an inference policy engine the
individuals in the OWL database are propagated in which an
authorization security model enforced on a semantic model’s
entities is proposed. A TBox family provide TBox access control
and ABox label-based access control for facts in the domain
knowledge the effects of access control are reported experiments
to evaluate reasoning and modularization. The access control is
proposed by using the information which helps the inheritance of
relation of individual for the data and information.
|
Download
|
40 |
An Experimental Investigation on Effect of Recycled Aggregate
and Stone Dust on Concrete
Sumit Sachan, Vikas Srivastava, V.C.Agarwal
Abstract—In present experiment on PPC concrete is to find the
appropriate proportion at which stone dust & recycled
aggregate partially replace the fine and course aggregate
respectively in PPC concrete gives the hardened concrete
properties. The percentage of stone dust partial replacement of
fine aggregate in PPC concrete are 0%,10% and recycled
aggregate partial replacement of course aggregate in PPC
concrete are 0%,50%,60%,70%. M25 grade of concrete is used
for conducting different strength test on PCC concrete. The
different concrete tests are compressive strength test on
100x100x100mm cube and split tensile test on cylinder of dia.
150mm and height 150mm. From the experimental studies, it is
found that 60% of quarry dust and 10% of recycled aggregate
are the valuable proportion for the hardened concrete
properties. All specimens were tested after curing age 7 days &
28 days. Strength properties of the treated and untreated
coarse aggregate were compared. The results indicated that the
compressive and split tensile strength of recycle aggregate is
found to be less than the natural aggregate.
|
Download
|
41 |
Life satisfaction among working women
In relation to their self empowerment
And level of education
Tina
Abstract—This study was conducted to evaluate Life
satisfaction among working women in relation to their
self-empowerment and level of education. The objectives
of the study was to study life satisfaction among working
women, to study self-empowerment among working
women, to find out significant difference in life
satisfaction of graduate and post graduate working
women, to find out significant difference in selfempowerment
of graduate and post graduate working
women and other objectives of the study were to find out
difference in life satisfaction of graduate and post
graduate working women having high selfempowerment,
to find out difference in life satisfaction
of graduate and post graduate working women having
low self-empowerment. Another objective of the study
was to find out relationship between life satisfaction and
self-empowerment of graduate working women, to find
out relationship between life satisfaction and selfempowerment
of post graduate working women.
Descriptive survey method was used in this study to
obtain pertinent and precise information. The sample of
the study included 150 working women selected by using
simple random sampling from the district of Jalandhar.
The sample was comprised of seventy five graduate and
seventy five post graduate working women. The tools
used in this study were Life satisfaction scale by Rotter’s
and Self-empowerment scale by Tashi Choden. For the
purpose of drawing out the result the investigator used
statistical techniques like t-test, mean, standard
deviation, and correlation. It is concluded that there
exists significant difference in life satisfaction of
graduate and post graduate working women, there
exists significant difference in self-empowerment of
graduate and post graduate working women, there
exists significant difference in life satisfaction of
graduate and post graduate working women having high
self-empowerment and no working women were found
under low self-empowerment within selected sample.
There exists no significant relationship between life
satisfaction and self-empowerment of post graduate
working women, and there exists significant relationship
between life satisfaction and self-empowerment of
graduate working women.
|
Download
|
42 |
Simulation of PV based Switched Boost Inverter for
Grid connected System
D.Venkatesh, M.Kondalu
Abstract—Introduction of reference frames in the analysis of
electrical machines has turned out not only to be useful in their
analysis but also has provided a powerful tool for the
implementation of sophisticated control techniques. This
application note gives an introduction to the theory of the most
commonly used reference frames and provides routines that
allow for easy conversion amongst them. Control of three-phase
power converters in the synchronous reference frame is now a
mature and well developed research topic. However, for singlephase
converters, it is not as well-established as three-phase
applications. So in this paper a single phase SRF theory is
proposed for SBI. The SBI can produce an ac output voltage that
is either greater or less than the available dc input voltage. Also,
the SBI exhibits better electromagnetic interference noise
immunity when compared to the VSI, which enables compact
design of the power converter. These features make the SBI
suitable for dc nanogrid applications. This paper also presents a
dq synchronous reference- frame-based controller for SBI, which
regulates both dc and ac bus voltages of the nanogrid to their
respective reference values under steady state as well as under
dynamic load variation in the nanogrid. The simulation results
are obtained using MATLAB/SIMULINK software.
|
Download
|
43 |
Implementation of an automatic
Defribillator for cardiac
Patients
P.Vignesh, T.jayakumar
Abstract—The telemedicine system is an emerging area in
the world. The major concepts of the telemedicine systems
are providing the diagnosis system for all patients without
moving them from their place to clinical areas. This paper
presents an automatic defibrillator system specialized for
cardiac patients and monitoring their heart beat in an
android device by the help of Bluetooth technology. This
paper is most suitable for the cardiac patients who are in
the remote areas. The proposed system consists of five
subsystems namely, (i) Electrocardiogram (ECG)
acquisition system, (ii) Heart Rate (HR) acquisition system,
(iii) Processing of ECG and HR signals, (iv) Defibrillator
control unit, (v) Monitoring unit. It emphasizes the
hardware realization of embedded diagnostic system,
analyses the collection process of ECG and HR, comparison
of ECG and HR, controlling of defibrillator under the coordination
of Peripheral Interface Controller (PIC)
microcontroller. The defibrillator will be controlled directly
by the PIC microcontroller. Here a Bluetooth module is
added with the hardware which can be connected with
Android devices for monitoring the process continuously
even by the patients too.
|
Download
|
44 |
Review on Clustering Techniques
Kodhai, Ashtalakshmi
Abstract—Data mining is extracting information or facts from
large quantities of information. Nowadays it is a growing tool by
current business which is used to convert the given data into
statistical form. This method is widely used in fraud detection,
marketing and pattern recognition. Clustering is one of the
practices in data mining task which involves creating groups of
objects that are similar, and those that are dissimilar. This paper
gives an overview of clustering techniques such as hierarchical
clustering, density based and K-means clustering. It describes
different methodology, approaches and parameters which are
used in clustering techniques. The main objective of this paper is
to gather more concepts and techniques used in clustering
methods.
|
Download
|
45 |
Efficient method for solar energy harvesting & storage
Using thin film carbon- nano tubes
S.Karthikeyan, M.Mano
Abstract—This paper will gives a thorough insight of this relatively
revolutionizing and satisfying solution of energy harvesting and
storage through carbon nanotube by using thin film technology. In
today‟s world one of the major problems faced by almost all the
countries around the world is energy crisis. Although there are
several ways of producing electrical energy from the available
sources of energy, still it is not sufficient to satisfy the energy need
of the world completely. From the most commonly available
source of energy (solar energy), electrical energy has been
produced using some traditional techniques, which is of the range
of very few units of energy. Let us replace this conventional
technique with most emerging method of solar energy conversion
method using infrared solar nano cells integrated with carbon nano
tubes for efficient storage of those converted energy. One of the
most possible methods of using this nano cells is in the form of
nano paints. Nano cells which has the capability to convert even
small amount of incident light into electrical energy rather than
requiring certain range of intensity. This technique replaces the
bulky structure of conventional solar panels because of the size of
nano cells. This paper also includes the efficient storage using
carbon nano tubes in the form of super capacitors and paper
batteries. This paper is aimed at understanding and analysing the
implementation of infrared solar nano cells, its properties,
characteristics and its potential in practical application .This paper
is also aims at highlighting the construction and practical
implementation paper batteries and super capacitors.
|
Download
|
46 |
Result for Energy Efficient Scheduling in Green
Cloud Computing
Manveer Singh, Jasmeet Singh Gurm
Abstract—The growth of Cloud at the time, when change in the
climatic conditions and reductions in emissions for the energy
use is a huge concern. As the demand of the cloud increases,
energy requirements for the same have also been increasing. For
all of the content like videos, pictures and other data to be
delivered to us in real time must be stored somewhere so that it
must be available at instantaneous access. Now, this huge data is
stored at data center, which provides huge storage facilities
consuming incredible amount of energy leading to increased
operational cost, which not only declines the profit of Cloud
providers, but also leads to high carbon emissions which is
unfriendly to environment. So, solutions are required which are
energy efficient to minimize the impact of Cloud computing on
the environment. Green cloud computing is one of the solution
to this problem which aims at increasing the energy efficiency
during the products lifetime, promoting the recyclability of
defunct products and reducing the use of hazardous products.
So, aim of this research is to introduce a crossbreed scheduling
algorithm which is energy efficient and to compare the results
with the three scheduling algorithms which are (FCFS, Round
Robin, and Priority). The simulation will take place in .Net
environment which would be deployed over cloud network
namely Window’s Azure.
|
Download
|
47 |
Result on the Analysis of Different Cloud
Servers on the Basis of Sophisticated Job
Scheduling Approach
Karan Sood, Jasmeet Singh Gurm
Abstract—As the cloud computing environment is getting a huge
platform to work on and in the upcoming years, cloud would be
a name which would be used by common people for their data
storage and other works which they do right now on their local
servers. In such a case as the energy conservation is a major
concern these days, we need to look up that which cloud
platform would be better for the future use which is energy
efficient and faster than the other cloud platforms. In this
paper, proposed work is based on the use of three clouds like
Windows Azure, Go daddy and Marttalk cloud for checking of
the energy efficiency. The simulation is taken place in the .NET
environment.
|
Download
|
48 |
An ergonomic method of credentiality of
Various requests from emergency vehicle
Using batch request authentication
Algorithm
S.Silambarasan, M.Maheswari, K.Rejini, D.Rajini Girinath
Abstract—VANET is a form of Mobile Ad-Hoc Network which
provides communication between vehicles and road-side base
stations. The aim is to provide safety, traffic management, and
infotainment services. The security of VANET is in concern
state from early time. VANETs face several security threats and
there are a number of attacks that can lead to human life loss.
Existing VANET systems used detection algorithm to detect the
attacks at the verification time in which delay overhead
occurred. Batch authenticated and key agreement scheme is
used to authenticate multiple requests sent from different
vehicles. Yet it does not provide any priority to the requests
from emergency vehicles and a malicious vehicle can send a
false message by spoofing the identity of valid vehicles to other
vehicles leading to Sybil attack. Batch Request Authentication
Algorithm (BRAA) is used to classify the requests obtained
from multiple vehicles in order to provide immediate response
to emergency vehicles with less time delay. This system also to
prevent Sybil attack by restricting timestamps provided by
RSU at an early stage itself.
|
Download
|
49 |
Optimization of carboxymethylcellulase
Production via submerged fermentation from a
Newely isolated strain of bacillus subtilis subsp.
Inaquosorum
Amita Sharma, Rupinder Tewari, Sanjeev Kumar Soni
Abstract—Fossil fuels reserves are depleting at an alarming rate
which has developed a grim situation globally drawing the
attention of scientific world. The rising costs of fuels have shifted
the concerns to exploit renewable sources for production of value
added chemicals. Worldwide research is going on to utilize the
natural cellulosic biomass efficiently as it is considered as a
virtually inexhaustible source of raw material to develop novel
processes and products. But main obstacle in the path of success
is high cost of enzymes necessitating the need to develop
economically profitable processes. Cellulases are drawing the
attention of the scientific world by virtue of their immense
potential in lignocellulosic biomass utilization. The need for
isolation of novel microorganisms from diverse habitats is
imperative as they provide a platform for genetic modifications.
In the present study, a novel strain of cellulose degrading
bacteria was isolated from soil and identified as B. subtilis subsp.
inaquosorum. Optimization studies were performed to enhance
carboxymethylcellulase production. Maximum CMCase (1.4
IU/ml) activity was observed at 30ºC, 150 rpm after 72 hrs using
wheat bran as carbon source.
|
Download
|
50 |
New VLSI Architecture for Audio Compression
Using Parallel Computation
Suganthi S, Thiruveni M
Abstract—In this paper, we propose a new very large scale
integration (VLSI) algorithm for a 2N-length discrete
Hartley transform (DHT) that can be efficiently
implemented on a highly modular and parallel VLSI
architecture. In the existing system the conventional
discrete Hartley transformation is used. In that system has
more number of multipliers which leads to more cost and
high complexity in VLSI Architectures. To overcome this
demerit, New Discrete Hartley transformation is going to
be proposed. The proposed DHT components can be
separated as even and odd components and the
computation can be done parallely.The DHT algorithm can
be efficiently split on several parallel parts that can be
executed concomitantly. The proposed DHT architecture is
well-matched for the sub expression sharing technique.
Sub expression technique is used when one data is
multiplied with many constants or sum of product. So it
reduces the number of multiplications which in turn
reduce the hardware complexity, delay and cost.
|
Download
|
51 |
Assessment of Service Quality: A survey study in Bank ofAbyssinia Alula Abanega Branch, Mekelle, Ethiopia
Yassin Ibrahim, Adem Mohammed
Abstract—This study is conducted to assess the service quality of
Bank of Abyssinia Alula Abanega branch using SERVQUAL
model dimensions. The data are obtained from both primary and
secondary data sources. The primary data was collected with
questionnaire distributed to a sample of 99 customers based on
non-probability sampling method, convenience sampling. The
secondary data sources are statistical reports and consolidated
customers' opinion about the SERVQUAL dimensions. The
survey data collected from respondents was analyzed using gap
score and descriptive statistics for all dimensions of SERVQUAL
model and finally the overall service quality level of the bank is
determined. The findings from the overall service quality shows
that the majority of respondents were dissatisfied with the
service quality of the bank since the gap scores for all dimensions
were negative (i.e. customers expectation is higher than their
perception about the actual service of the bank). Finally, the
result of this study implies that management of the bank should
focus on understanding the needs, wants, perceptions, and
preferences of customers and provide quality service to enhance
the level of customer satisfaction. In addition the bank should
develop technical as well as human skill of its frontline employees
and tellers through continuous training schemes.
|
Download
|