No. |
Title and Author |
Area |
Country |
Page |
51 |
Approximation of Gaussian derivatives for UWB communication
-Harsh R. Jani ; Khyati P. Vachhani
UWB is a new interesting technology for wireless communications. It can replace traditionally carrier-based radio transmission by pulse-based transmission using ultrawide band frequency but at a very low energy. An important aspect of research in this domain is to find a pulse with an optimal shape, whose power spectral density respects and best fits emission limitation mask imposed by FCC. In this paper we review common used Gaussian pulses and its derivatives and the influence of shape factor, finding an optimal specific value for each derivative. Next, we search to obtain possible better pulse shapes as linear combinations of Gaussian derivatives. Older studies refer in one case to the same shape factor for all derivatives and in other case to higher factor for first derivative and smaller shape factors for subsequent derivatives.
Our new idea is to use Gaussian derivatives, each with its specific optimal shape factor and to use a "trial and error" algorithm to obtain a linear combination pulse with better performance. Read More...
|
Electronics and communication Engineering |
India |
265-268 |
52 |
Implementation of Digital Beamforming Technique for Linear Antenna Arrays
-Mr. Ashvin Pambhar ; Prof. M. P. Patel
A digital Beamforming technique used for increased channel capacity and also increased signal to noise and interference ratio. In smart antenna, different type of radiation pattern of an antenna can be changed either by selecting appropriate weights or by changing the array geometry. This paper presented based on auxiliary phase algorithm by using this algorithm in linear antenna array determine the array pattern approximating the auxiliary function in both amplitude and phase. Cost function involving auxiliary function and array pattern is minimized by modifying the pattern. Read More...
|
Electronics and communication Engineering |
India |
269-271 |
53 |
Fault Injection Approach for Network on Chip
-Tapas Patel
Packet-based on-chip interconnection networks, or Network-on-Chips (NoCs) are progressively replacing global on-chip interconnections in Multi-processor System-on-Chips (MP-SoCs) thanks to better performances and lower power consumption. However, modern generations of MP-SoCs have an increasing sensitivity to faults due to the progressive shrinking technology. Consequently, in order to evaluate the fault sensitivity in NoC architectures, there is the need of accurate test solution which allows evaluating the fault tolerance capability of NoCs. Presents an innovative test architecture based on a dual-processor system which is able to extensively test mesh based NoCs. The proposed solution improves previously developed methods since it is based on a NoC physical implementation which allows investigating the effects induced by several kind of faults thanks to the execution of on-line fault injection within all the network interface and router resources during NoC run-time operations. The solution has been physically implemented on an FPGA platform using a NoC emulation model adopting standard communication protocols. The obtained results demonstrated the effectiveness of the developed solution in term of testability and diagnostic capabilities and make our solutions suitable for testing large scale. Read More...
|
Electronics and communication Engineering |
India |
272-275 |
54 |
Analyzing and Comparing opinions on the Web mining Consumer Reviews
-Saranya.N ; Prof. K. Anbarasu; Devi Ramalingam; Ramya. S
Product reviews posted at online shopping sites plays a major role in improving performance of various enterprises. To assess the performance, the posted reviews must be of good quality. The good quality is judged by using certain criteria (rules) to be satisfied. The criteria (rules) should be applied on the online reviews or the documents collected based upon reviews. Thus, it is considered to be very difficult for decision-maker with an efficient post processing step in order to reduce the number of rules. This project proposes a new classification based interactive approach to prune and filter discovered rules to eliminate low-quality reviews. The proposed approach to enhance opinion summarization is done in a two-stage framework which is (1) discriminates low quality reviews from high-quality ones and (2) enhances the task of opinion summarization by detecting and filtering low quality reviews. For the sentiment factor, we propose Sentiment PLSA (S-PLSA), in which a review is considered as a document generated by a number of hidden sentiment factors, in order to capture the complex nature of sentiments. Training an S-PLSA model enables us to obtain a succinct summary of the sentiment information embedded in the reviews. Read More...
|
Computer Science & Engineering |
India |
276-281 |
55 |
Design & optimization of LNG-CNG cylinder for optimum weight
-Pankit M. Patel ; Prof. Jaypalsinh Rana
In current automobile sector, the weight of the vehicle is too important to increase the efficiency of the vehicle. There are too many component or subassemblies are in the automobile vehicle. In this paper the weight of the HYDROGEN fuel tank is optimized by applying the composite material concept with the existing material of the fuel tank. Initially the dimensional calculation for the existing pressure vessel and compare with the existing cylinder and then the FEA ( Finite Element Analysis) applied on the cylinder and material optimize up to the stress reaching equivalent to the stress of the existing cylinder. After that the dimension of the cylinder are finalize. The analysis yields a weight reduction of fuel tank. Read More...
|
Mechanical Engineering |
India |
282-286 |
56 |
Design & optimization of LNG-CNG cylinder for optimum weight
-Pankit M. Patel ; Prof. Jaypalsinh Rana
In current automobile sector, the weight of the vehicle is too important to increase the efficiency of the vehicle. There are too many component or subassemblies are in the automobile vehicle. In this paper the weight of the HYDROGEN fuel tank is optimized by applying the composite material concept with the existing material of the fuel tank. Initially the dimensional calculation for the existing pressure vessel and compare with the existing cylinder and then the FEA ( Finite Element Analysis) applied on the cylinder and material optimize up to the stress reaching equivalent to the stress of the existing cylinder. After that the dimension of the cylinder are finalize. The analysis yields a weight reduction of fuel tank. Read More...
|
Mechanical Engineering |
India |
282-286 |
57 |
Flexible channel allocation using best Secondary user detection algorithm
-K.Mathivanan ; S. Dhayanithi; Prof. R. Anbarasu
Mobile computing is human-computer interaction by which a computer is expected to be transported during normal usage. The main problem in the existing system is the power allocation algorithm and the channel allocation problem for cooperative multiuser orthogonal frequency division multiplexing (MU-OFDM) cognitive radio (CR) systems. In the flexible channel cooperation, resource allocation is the serious problem. The primary user (PU) can transmit the data through the Secondary User (SU). Then through the number of SU s the data is transferred to the base station. The channel can be allotted based on the two algorithms, the optimal distributed bargaining algorithm and centralized heuristic algorithm. Then in the existing system, inflation attack is the severe problem. The inflation attack is overcome by implementing the Future Peak Detection algorithm. This determines that the PU can decide itself to transmit data through which SU. So the inflation attack problem can be overcome and the data is traversed to the base station with the full security. Read More...
|
Computer Science & Engineering |
India |
287-290 |
58 |
Digital standard cell library Design flow
-Tapan Varma
Commercial library cells are companies 'proprietary information and understandably companies usually impose certain restrictions on the access and use of their library cells. Those restrictions on commercial library cells severely hamper VLSI research and teaching activities of academia. To address the problem the goal of this paper is to discuss the development of standard cell library. This involves in creating new standard cells, layout design, simulation and verification of each standard cell and finally characterization of all cells for timing and functional properties. Read More...
|
Electronics Engineering |
India |
291-293 |
59 |
Improving the Cooling Performance of Automobile Radiator with TiO2/Water Nanofluid
-V. L. Bhimani ; Dr. P. P. Rathod; A. S. Sorathiya
In this paper, forced convective heat transfer in a water based nanofluid has experimentally beencompared to that of pure water in an automobile radiator. Five different concentrations of nanofluids inthe range of 0.1-1 vol.% have been prepared by the addition of TiO2 nanoparticles into the water. The test liquid flows through the radiator consisted of 34 vertical tubes with elliptical cross section and airmakes a cross flow inside the tube bank with constant speed. Liquid flow rate has been changed in therange of 90-120 l/min to have the fully turbulent regime. Results demonstrate that increasing the fluid circulating rate canimprove the heat transfer performance. Meanwhile, application of nanofluid with low concentrations can enhance heat transfer efficiency up to 45% in comparison with pure water. Read More...
|
Mechanical Engineering |
India |
294-300 |
60 |
Secure Routing using Detection Method in Wireless Ad Hoc network
-Ghada Vaseem J ; Prof. Sharada Valiveti
An Ad Hoc network is the collection of multiple nodes which can work together and they can send data over multiple hopes without any infrastructure like base station and antenna. Each node acts as a system and router. Many of the routing protocols of Ad Hoc network are designed based on the assumption that every node forwards every packet but practically many of them act as selfish nodes, they use network and its service but don't cooperate with other nodes so as to save resources for themselves. This paper discusses the types of availability attack, malicious activity of selfish node, a Survey of techniques used to detect selfishness attack and some approach to detect selfishness attack. Read More...
|
Computer Engineering |
India |
301-305 |
61 |
A Survey: Comparative Analysis of Classifier Algorithms for DOS Attack Detection
-Jatin Patel ; Vijay Katkar; Aditya Kumar Sinha
In today's interconnected world, one of pervasive issue is how to protect system from intrusion based security attacks. It is an important issue to detect the intrusion attacks for the security of network communication.Denial of Service (DoS) attacks is evolving continuously. These attacks make network resources unavailable for legitimate users which results in massive loss of data, resources and money.Significance of Intrusion detection system (IDS) in computer network security well proven. Intrusion Detection Systems (IDSs) have become an efficient defense tool against network attacks since they allow network administrator to detect policy violations. Mining approach can play very important role in developing intrusion detection system. Classification is identified as an important technique of data mining. This paper evaluates performance of well known classification algorithms for attack classification. The key ideas are to use data mining techniques efficiently for intrusion attack classification. To implement and measure the performance of our system we used the KDD99 benchmark dataset and obtained reasonable detection rate. Read More...
|
Computer Engineering |
India |
306-310 |
62 |
Analysis of Residue Number System based PN sequence in AWGN channel
-Kalpesh G. jadav ; Khyati P. Vachhani
The successful use of CDMA technology is based on the construction of large families of encoding sequences with good correlation properties. This paper discusses PN sequence generation based on Residue Arithmetic with an effort to improve the performance of existing interference-limited CDMA technology for mobile cellular systems. All spreading codes with residual number system proposed earlier did not consider external interferences, multipath propagation, Doppler effect etc. In literature the use of residual arithmetic in DS-CDMA was restricted to encoding of already spread sequence; where spreading of sequence is done by some existing techniques. The novelty of this paper is the use of residual number system in generation of the PN sequences which is used to spread the message signal. The significance of cross-correlation factor in alleviating multi-access interference is also discussed. The RNS based PN sequence has superior performance than most of the existing codes that are widely used in DS-CDMA applications. Simulation results suggest that the performance of the proposed system is superior to many existing systems. Read More...
|
Electronics and communication Engineering |
India |
311-314 |
63 |
An Impact of Land use and Transportation - A case study of Sanand Area
-Mr. Kiran Patel ; Dr. A. M. Jain; Prof. H. K. Dave
Land use and Transportation Systems play definitive roles in shaping the city or town. This paper explores the impact of land use and transportation system on the city population and the land price. Theory discussed is located within the Indian context, and utilizes the example of the Sanand area in Gujarat State to elucidate how landuse and transportation system impact on the characteristics of the area. Read More...
|
Civil Engineering |
India |
315-317 |
64 |
A comprehensive study on Implementing of 10bit Two step Flash ADC
-Nehal Parmar ; Rakesh G. Trivedi
This paper proposes a 10bit two step flash ADC.As the CMOS technology continues to scale down, signal processing is favourably done in digital domain, which requires Analog to digital converters (ADCs) to be integrated on-chip. Among various ADC architectures, the two step flash ADC architecture is the best suited for low power and 10 bit resolution. To decrease the area, power consumption, and cost while maintaining 10bit accuracy, the architecture is divided into coarse flash ADC and fine flash ADC connected through current steering Digital to analog converter (DAC) and residue amplifier. To get the best performance the coarse convertor of 5bit and the fine convertor of 5bit are chosen. The comparator design is done with optimum power and area. Intermediate state accuracy increased by thermometer coded current steering DAC. Read More...
|
Electronics and communication Engineering |
India |
318-322 |
65 |
Digital Video Watermarking Techniques: A Review Study
-Archana Srivastava ; Prof. Darshana Mistry
Digital watermarking is a data hiding technique where an information or message is hidden inside a signal transparent to the user. Video Watermarking is one of the interesting fields to develop a system with authentication and copyright protection methodology embedded within an efficient video codec. Thus, this technique can be used for copyright protection, piracy tracing, content authentication, advertisement surveillance, error resilience, and so forth. In this paper, we give an overview on video watermarking technology, including its properties, applications, performance requirements, typical algorithms, and comparison among them. Read More...
|
Computer Engineering |
India |
323-326 |
66 |
Characteristics and Comparison of Diesel Fuel and Biodiesel produced from a Neem
-Jaivik Prajapati ; Prof. R. J. Jani; Vijay K. Patel
An experimental investigation will be carrying out to analyze "Characteristics and comparison of diesel and biodiesel produced from a Neem." The Neem oil methyl ester is derived with the using of transesterification process and its properties are validated against ASTM standards and found within limits. The literature review is focused on experimentally investigating the influence of Ash content , Moisture , Specific Gravity at 400c , Kinematic viscosity at 400c, Acid value , Calorific Value , Flash point, Distillation curve , Cetane number, pour point, cloud point, low temperature flow test(lift), cold filter plugging point with diesel fuel . Read More...
|
Mechanical Engineering |
India |
327-330 |
67 |
A Novel Technique to Solve Mathematical Model of Pressure Swing Adsorption System for Oxygen Separation from Air
-S. N. Prajapati ; Prof. N. M. Patel
The mathematical modeling of a Pressure Swing Adsorption (PSA) system is discussed in detail for the Skarstrom cycle of two-bed process. The system is used to get pure oxygen product from the air with the use of zeolite 13X as an adsorbent. There are complex partial differential equations (pdes) which may not solve by analytical methods. There is no provision for solving it in any other software other than Matlab. All the equations are rearranged and written into dimensionless quantities, to make it easier. It is a novel technique of solving these complex PDEs. After that we have converted these PDEs into ODEs (Ordinary Differential Equations) by using OCFE (Orthogonal Collocation on Finite Elements) method. Now, these ODEs can be solved using different solvers like ode23, ode45, ode113, ode15s, ode23s, ode23t, ode23tb. The results obtained by this model will be compared to real industrial data. Read More...
|
Chemical Engineering |
India |
331-335 |
68 |
Review on OpenID Authentication Framework
-Axaykumar A. Patel ; Hitesh Patel; Mihir Chauhan; Rachit Jain
In Today's world, Social networking websites are more popular. There are many web applications or web sites available on the internet so users have multiple accounts to log on the websites to access web service. Most of websites are rely on username and password pair because this method is easy and small for users and administrators of those sites. But Using OpenID, we can easily access service through different provider's username and password like Gmail/Yahoo and many more. There is no procedure for registration. OpenID is Most Popular as an Open Source Identity Provider. Read More...
|
Computer Engineering |
India |
336-337 |
69 |
Auditing and Monitoring of Virtual Machine Instances of Cloud
-Hardik Patel ; Yask Patel; Harshal Trivedi
The cloud computing is next generation architecture of an IT industry which provides services on demand through Internet. In contrast to the traditional approach where services are under proper physical, logical and personal controls cloud computing moves application, software and database to the large data centre where the management of the data and services may not be fully trust worthy as customer are not allowed to monitor the under-laying physical infrastructure. As cloud infrastructure span across the world, it is necessary for the data owners to track the location of server where the data actually resides as well as raise a notification when someone try to access the data. Hear we find possibilities of research work to develop an effective auditing and monitoring system for cloud users. It will help users to track the location of server in case of server crash down and process migration and also help to secure the user data by keeping data in secure premises. Read More...
|
Information Technology |
India |
338-341 |
70 |
Experimental Investigations of Chemical and Geotechnical Properties of Fly Ash Mixed Black Cotton Soil
-Mr. Bharat Nathani ; Prof. Kumarpal Trivedi; Dr. A. K. Verma
Fly Ash generation and utilization both are expected to increase but the gap between them will also increase. Researchers are finding out new area for utilization of Fly Ash to minimize its environmental impact. One such area is Geotechnical Engineering. Black Cotton Soil is a problematic soil with respect to Soil-Structure interaction. In this paper, various properties of Black Cotton Soil like pH, plasticity index, volume change behavior and dry density are studied after mixing Fly Ash in different proportion and are presented. It can be concluded that 30% Fly Ash by weight mixed with Black Cotton soil gives optimum result for most of the properties. Read More...
|
Civil Engineering |
India |
342-344 |
71 |
Comparative Study of Hydraulic Design of Orifice Spillway between IS 6934:1973 & IS 6934 (Draft Code 2010)
-Nirav Acharya ; H. M. Gandhi
Spillways, generally the ogee-crested type, are sometimes provided with a breast wall from various considerations. This spillway is widely used in Hydro power generation scheme. The hydraulic design of such spillway includes Profile of the spillway crest including the upstream and downstream quadrants, and Profile of the bottom surface of the breast wall. For the purpose of preliminary design, Bureau of Indian Standard had introduced IS 6934 in year 1973. The standard was then revised to incorporate the latest practices being followed in the field, the major changes being in dealing with ogee profile for spillway with breast wall. This research is an attempt to strike out the difference in the design between the IS 6934:1973 and Draft Indian standard (2010).For this purpose two Dams namely Nimoo Bazgo (Jammu & Kashmir) & Sewa II (Jammu & Kashmir), situated in India were examined and conclusions were then made. Read More...
|
Civil Engineering |
India |
345-348 |
72 |
A proposed algorithm for securing OSPF with using Symmetric key and Encryption techniques based on Image
-Jignesh Shaparia ; Prof. Shahida Chauhan
Network reliability is becoming increasingly important issue today. So to remain resistant to attacks is the fundamental thing for it. Securing routing protocol involves protecting the authenticity and integrity of routing protocol messages. The protocols which used as network routing deployed in internal networks is Open Shortest Path First Protocol (OSPF). OSPF is based on the relative costs of transferring information between routers and networks. In OSPF, a group of routers collaborate, exchange routing information, and forward packets for each other. Attacks on routing protocol OSPF can be launched either as insider attacks or as outsider attacks. Earlier works have addressed these two problems independently with many interesting solutions. Like Digital Signatures, MD5, MAC, RSA etc. Due to the nature of these solutions, network architects cannot deploy without increasing the overhead on the network. Also they all are having their own advantages as well as disadvantages. So in this research the proposed algorithm is working for this solution. Use of Symmetric Key techniques, Diffie Hellman and Image based encryption makes the mechanism more secure against attacks. Read More...
|
Computer Engineering |
India |
349-352 |
73 |
Enchancing the Data Collection in Tree based Wireless Sensor Networks
-R.Yazhini ; K.Jayarajan
Number of techniques used in Wireless Sensor Network to improve data collection from sensor nodes. It achieve by minimize the schedule length and dynamic channel assignment. Schedule length minimized by BFS algorithm without interfering links. Interfering links can be eliminated by transmission power control and multi frequency. The power can be save by using beacon signal. Collection of data can also be limited by topology of network. So the nodes are arranged in form. The capacitated minimal spanning trees and degree- constrained spanning trees give significant improvement in scheduling. Finally the data collection is enhancing in terms of security by using T-Hash Chain algorithm. Read More...
|
Computer Engineering |
India |
353-356 |
74 |
Segment Combination based Approach for Energy- Aware Multipath Communication in Underwater Sensor Networks
-S. Ramya ; R. Devi; R. Palanivel
Underwater acoustic communication is a technique of sending and receiving message below water. There are several ways of employing such communication but the most common is using hydrophones. Under water communication is difficult due to factors like multi-path propagation, time variations of the channel, small available bandwidth and strong signal attenuation, especially over long ranges. In underwater communication there are low data rates compared to terrestrial communication, since underwater communication uses acoustic waves instead of electromagnetic waves. The data can be collected from the sensor node and transfer the data to the destination. The same source information can be send through multiple paths through the same destination. So the packet bit error rate is high and power and energy consumption for transferring data is high. The bandwidth and the energy can be consumed. And then the packet bit rate is the serious problem in the existing system. It can be overcome by using the segment combination in the hamming code technique. The packet bit rate can be overcome by increasing the number of paths. The number of paths can be increased based on calculating the cost. For calculating the cost, least cost algorithm is used. And based on the minimum cost path, the path is chosen and data is transferred to the same destination. Read More...
|
Computer Engineering |
India |
357-360 |
75 |
Implementation and design Low power VCO
-Meena Adwani
The paper introduces a multi-pass loop voltage controlled ring oscillator. The proposed structure uses cross-coupled PMOS transistors and replica bias with coarse/fine control signal. The design implemented in TSMC 90 nm CMOS technology, 0.9V power supply with frequency tuning range 481MHz to 4.08GHz and -94.17dBc/Hz at 1MHz offset from 4.08GHz with 26.15mW power consumption. Read More...
|
Electronics and communication Engineering |
India |
361-366 |
76 |
Design and Simulation Low power SRAM Circuits
-Garima Jain
SRAMs), focusing on optimizing delay and power. As the scaling trends in the speed and power of SRAMs with size and technology and find that the SRAM delay scales as the logarithm of its size as long as the interconnect delay is negligible. Non-scaling of threshold mismatches with process scaling, causes the signal swings in the bitlines and data lines also not to scale, leading to an increase in the relative delay of an SRAM, across technology generations. Appropriate methods for reduction of power consumption were studied such as capacitance reduction, very low operating voltages, DC and AC current reduction and suppression of leakage currents to name a few.. Many of reviewed techniques are applicable to other applications such as ASICs, DSPs, etc. Battery and solar-cell operation requires an operating voltage environment in low voltage area. These conditions demand new design approaches and more sophisticated concepts to retain high device reliability. The proposed techniques (USRS and LPRS) are topology based and hence easier to implement. Read More...
|
Electronics and communication Engineering |
India |
367-372 |
77 |
Job Resource Ratio Based Priority Driven Scheduling in Cloud Computing
-Pinal Salot ; Purnima Gandhi
Cloud Computing is an emerging technology in the area of parallel and distributed computing. Clouds consist of a collection of virtualized resources, which include both computational and storage facilities that can be provisioned on demand, depending on the users' needs. Job scheduling is one of the major activities performed in all the computing environments. Cloud computing is one the upcoming latest technology which is developing drastically. To efficiently increase the working of cloud computing environments, job scheduling is one the tasks performed in order to gain maximum profit. In this paper we proposed a new scheduling algorithm based on priority and that priority is based on ratio of job and resource. To calculate priority of job we use analytical hierarchy process. In this paper we also compare result with other algorithm like First come first serve and round robin algorithms. Read More...
|
Computer Engineering |
India |
373-377 |
78 |
An Efficient Approach for Data Outsourcing using Attribute based Encryption
-R. Aruna ; R. Bhuvaneswari; R. Anbarasu
A distributed system is a collection of autonomous computers linked by a computer network that appear to the users of the system as a single computer. In a large distributed system, security is provided by the use of cryptographic techniques such as key generation. It has a major role in solving Computational problems. Data outsourcing in a distributed system represents that a data owner outsource the data to the service provider. Data outsourcing require flexible access control policies to enforce authorizing key policies and maintaining key generating policy updates are the important issues in distributed system. A new approach Cipher text policy attribute based encryption (CP-ABE) system is implemented for key generation, Cipher text is associated with an access structure, while the secret keys are labeled with a set of attributes. Therefore access control mechanism enforces security policies with efficient attribute and user revocation capabilities. CP-ABE provides a scalable way of encrypting data such that the encryptor defines the attribute set that the decryptor needs to possess in order to decrypt the cipher text. Further multiple service providers are used in a system and data is distributed among them. In CP-ABE fine grained access control can be achieved by dual encryption mechanism that is used to maintain the data. So computation overhead is reduced, it is used to securely manage the outsourced data. Read More...
|
Computer Engineering |
India |
378-381 |
79 |
Isolated Word Speech Recognition Techniques and Algorithms
-Vaibhavi Trivedi ; Chetan Singadiya
Speech technology and systems in human computer interaction have witnessed a stable and remarkable advancement over the last two decades. Speech recognition system recognizes the speech samples. There are many speech recognition systems implemented based on well known algorithms. Generally speech recognition systems have two parts the first part is feature extraction and second part is classification. There are so many algorithms for feature extraction and classification. The Mel-Frequency Cepstral Coefficients (MFCC) algorithm as the main algorithm used for the features extraction of all the set of distinct words. implemented the Vector Quantization (VQ) algorithm for the features classification/matching and pattern recognition. Read More...
|
Computer Engineering |
India |
382-387 |
80 |
Designing PCI/AHB Bridge
-Dadhania Prashant ; Nayan Pithadiya; Chauhan Vaibhav; Patel Hardik; Natda Sunilkumar
The PCI Local Bus is a bus having features like high performance, 32-bit or 64- bit bus with multiplexed address and data lines. The AHB of AMBA (Advanced Microcontroller Bus Architecture) is also for high-performance, high clock frequency system modules. In SoC design the AMBA AHB acts like the high-performance system backbone bus. The function of AHB-PCI Bridge is to map various control signals and address spaces from one bus into those of another bus. This paper presented the AHBPCI bridge designing. Read More...
|
Electronics Engineering |
India |
388-390 |
81 |
Design of Fuzzy Logic Controller for Speed Regulation of BLDC motor using MATLAB
-Mr. Rakesh Makavana ; Prof. B. A. Shah; Mrs. Dharmistha Makwana
Brushless DC (BLDC) motors drives are one of
the electrical drives that are rapidly gaining popularity, due
to their high efficiency, good dynamic response and low
maintenance. The design and development of a BLDC
motor drive for commercial applications is presented. The
aim of paper is to design a simulation model of inverter fed
PMBLDC motor with Fuzzy logic controller. Fuzzy logic
controller is developed using fuzzy logic tool box which is
available in Matlab. FIS editor used to create .FIS file which
contains the Fuzzy Logic Membership function and Rule
base. And membership functions of desired output. After
creating .FIS file it is implemented in the Matlab Simulink.
And the BLDC motor is run satisfactorily using the Fuzzy
logic controller. Read More...
|
Electrical Engineering |
India |
391-395 |
82 |
An authentication framework for wireless sensor networks using Signature Based Algorithm
-Sneh Vyas ; Prof. Sharnil Pandya
Authentication in Wireless Sensor Networks (WSNs) is a challenging process. Providing authentication for the Nodes in WSN is a vital issue in Secure Group communication among WSNs. Massive group of tiny sensor Nodes forms WSNs and these are placed in open, unattended milieu. Due to this reason, Nodes in WSN can endure exclusive encounters. WSNs are more vulnerable to active and passive attacks than wired ones due to their broadcasting nature, limitations in resources and unrestrained environments. However, security will be a significant factor for their complete implementation. In this proposal, a new approach has been introduced to achieve secure authentication among Nodes in WSNs. Read More...
|
Computer Engineering |
India |
396-400 |
83 |
Improvement in Marshall value using different percentage of Rediset
-Mr. Bhargav N. Gautam ; Prof. N. H. Upadhyay
The purpose of this study is mainly to find out the optimum temperature by which the bituminous concrete mix temperature is reduced through the warm mix asphalt technology. Warm mixing with additive is becoming popular because of mixing at lower temperature which reduces the fuel usage and emission of hazardous gases consequently decreases the mixing as well as compaction temperature of mix. Reduction of 20 ° C to 40 ° C have documented, such reduction have the obvious benefits of cutting fuel consumption and decreasing the production of greenhouse gases. Also, there will improvement on performance of pavement.
In present study, warm mix design of Bituminous Concrete, Rediset-organic additive is used as adhesion with used as a binder viscosity grade-30(VG-30). The Optimum Bitumen Content (OBC) using a binder will obtained by the Marshall Test. Then after Optimum dosage of Rediset and Temperature are found i.e., the temperature at which Rediset perform effectively. Also, comparative study makes to know the stability of Rediset with Binder. The Warm mix with VG-30 satisfied all the Marshall Stability test of bituminous mixes and well suited for construction of road with heavily traffic. Also, Laboratory testing is carried out to find the physical properties of bitumen test for VG-30 with and without Rediset. Read More...
|
Civil Engineering |
India |
401-402 |
84 |
Design and Simulation of 4-bit DAC Decoder Using Custom Designer
-Bhaumik Vaidya ; Prashant Dadhania; Devani Anupam; Nehal Parmar
Digital to Analog Converter (DAC), are the most complex structures and having digital input and analog output, it is found in almost all Analog and Mixed Signal Design today. There are different types of DACs currently on the market. The goal of this paper is to implement 4-bit Resistor String D/A converter using 4-bit AND gate and 4-to-16 Decoder with the help of 4 numbers Inverter. Binary (digital) coded 4-bit data was input to the converter. The data converter will convert all 4-bit binary coded data into correspondent different level of "staircase" voltage. Read More...
|
Electronics Engineering |
India |
403-406 |