No. |
Title and Author |
Area |
Country |
Page |
51 |
Channel Estimation for LTE Downlink using Various Techniques under the Effect of Channel Length
-Darji Maulik Jayantilal ; Prof. Vanrajsinh B. Vaghela
The main purpose this paper is to study the performance of two linear channel estimators for LTE Downlink systems, the Least Square Error (LSE) and the Linear Minimum Mean Square Error (LMMSE) using QPSK and 16 QAM modulation technique and also studied the effect of channel length on the performance of channel estimation. As LTE Downlink system is a MIMO-OFDMA based system, a cyclic prefix (CP) is inserted at the beginning of each transmitted OFDM symbol in order to mitigate both inter- carrier interference (ICI) and inter-symbol interference (ISI). The inserted CP is usually equal to or longer than the channel length. However, the cyclic prefix can be shorter because of some unforeseen channel behavior. In the case where the cyclic prefix is equal to or longer than the channel length, LMMSE performs better than LSE but at the cost of computational complexity .In the other case, LMMSE performs also better than LS only for low SNR values. However, LS shows better performance for LTE Downlink systems for high SNR values. MATLAB simulations are used to evaluate the performance of the proposed estimator in terms of Bit Error Rate (BER) for 2x2 LTE Downlink systems. Read More...
|
Electronics & Communication Engineering |
India |
182-186 |
52 |
Energy Management in Mobile Devices
-Govinda.K ; ArvindRamkrishnan; HemanthBalajiDandi; Eeshita Kumar ; RashmiGopalkrishnaHegde
Mobile consumer-electronics devices, especially phones, are powered from batteries which are limited in size and therefore capacity. This implies that managing energy well is paramount in such devices. Wireless communication technologies enable communication among different devices that are within a certain radius. Although, this radius is deï¬nite, communication when using wireless communication technologies is more flexible than when using wireline approach. This paper presents results from a measurement study where we measured energy consumption of three wireless communication technologies, namely, Bluetooth, WiFi and 3G . We proposed an energy and time consumption model that is based on these measurements. Using proposed model one can not only calculate energy consumption for each communication technology, but can also save energy while simultaneously using WIFI, Bluetooth and 3G at the same time. This paper shows how our energy consumption model can be used on an example of the service called Collaborative Consumption of Energy (CCE). The primary goal of CCE service is to lower the overall energy consumption of mobile users while downloading data combining together 3G and Bluetooth or 3G and WiFi communication technologies; as well as, when all of the above components are in play, which one hibernates or kept inactive and which one remains active. Read More...
|
Electronics and Communication |
India |
187-190 |
53 |
proposed methodology of text summarization of novel text using outlier detection
-Divya Goyal ; hardeep singh
in this paper we will discuss the analysis and generation part of the algorithm and database, which are necessary conditions for any implementation. As per the name suggest, our main goal is the detection of outliers and generation of summary with the remaining text. In previous paper we had already discussed the basic techniques already used in Outlier Detection and text summarization. We successfully make an algorithm using hybrid approach of Conditional random field and Sliding window concept about which we think previous. Conditional Random field is used for Counterpart and Sliding window help to get the variable size of Sentence. Read More...
|
computer science engineering |
India |
191-198 |
54 |
MOBILE CONTROLLED ROBOT USING DTMF DECODER
-Govinda.K ; Sainath Reddy.M ; Harshavardhan Chowdary
This Paper describes about developing a robotic prototype of unmanned land vehicle. The Robot Uses an ATmega8 Microcontroller to control the motors of locomotion. The robot can be controlled from a remote area as it uses GSM based cellular phones to send and receive signals. In the course of a call, if any button is pressed, a tone corresponding to the button pressed is heard at the other end of the call which is recognized by the DTMF decoder connected to the cellular phone at robot end which decodes the signal and passes it on to the Microcontroller which in turn controls the motors of locomotion through L293D Motor Driver. While this idea is can be easily implemented in the Electric vehicles as they run on motors, it might be a challenge to incorporate this technology in the vehicles that run on petroleum based fuels. Read More...
|
Electronics and Communication |
India |
199-200 |
55 |
FACTORS AFFECTING ON MOBILITY OF HEAVY METALS IN SOIL ENVIRONMENT
-Shiva Kumar.D ; Srikantaswamy.S
This technical research mainly focused on heavy metal mobility in the soil environment. Once metals are introduced to environment and contaminate, the metals will remain for longer duration. Metals do not degrade like carbon based molecules. However, in general it is very difficult to eliminate metals from the environment. Heavy metal pollution problem arise when the heavy metals are mobilized into the soil and absorb by the plants or transported to the ground water. In this research the mobility of heavy metals has been identified by adopting speciation technique in surface and sub-surface soil of industrial area of Mysore, India. In the surface soil the concentration of the heavy metals are low when compare to the sub surface soil. This type of behaviour was due the influence of the pH, organic matter, electrical conductivity, retention time, leachability and microbes present in the soil. In the speciation analysis the mobility of the metals was estimated from surface to sub surface region. When compare to the total metal concentration in the surface soil it was observed that 90% of the metal concentration were moved to the sub surface soil. Finally the residual fraction has higher level of concentration of metal indicates no much movement and in the remaining fraction has lower level of concentration revealed that the mobility and the toxicity is very high. Read More...
|
Environmental Science |
India |
201-203 |
56 |
Hand Gesture Based Human Computer Interfacing
-Aekta Patel ; Shyamal Pampattiwar
Computer is used by people either at their work or in their spare-time. Our idea is to make computers understand human language and develop a user friendly human computer interfaces (HCI). Since human gestures are perceived through vision, it is a subject of great interest for vision researchers. The research is to determine human gestures by creating an HCI. Coding of these gestures into machine language demands a complex programming algorithm. In this we detect and recognize the color mark and by using this we can control computer interface using human gestures. Read More...
|
Image Processing |
India |
204-206 |
57 |
Navigation by Using Interplex Modulation
-Durga Prasad Varman ; Sangeeta G Chudasama
In Global Navigation Satellite Systems (GNSS) the structure of the signal predominately determines the system performance and wideband signals, in general, offer good performance. Consequently signal design and the receiver processing for wideband signals have attracted significant research attention in recent years. Because of the limited availability of the spectrum allocated for navigation systems, the numerous navigation signals broadcast by Modernized Navigation system will have to be combined and employ bandwidth-efficient modulations. Read More...
|
Electronics Engineering |
India |
207-209 |
58 |
review on text clustering algorithms
-Manpreet Kaur ; Navpreet Kaur
A clustering algorithm finds a partition of a set of objects that fulfills some criterion based on these conditions. Clustering is an unsupervised method of learning. Most text clustering algorithms are based on the vector space model which has the advantages of simple concept ad convenient applications. While the Latent Semantic analysis method takes the relationship between words into account and supposed to be an improved model of VSM. K-Mean clustering algorithm has shortcoming, which depend on the initial clustering center and needs to fix the number of clusters in advance. Vector Space model has problems, such as high dimensional and sparse. This can be optimized using various optimization techniques such as Genetic algorithm, PSO, pollination Based optimization. Pollination based optimization is inspired by natural flower pollination. Read More...
|
computer science and eengineering |
India |
210-213 |
59 |
DESIGN OF A FIRE SAFETY ROBOT USING 8051 MICROCONTROLLER
-URVI K. SHAH ; HIRAL V. SHAH; JAYSHREE A. MALI
The safety measures due to fire accident of hazardous area where human entries are restricted. e.g. Laboratory, factory and research centers such places should be protected from fire. Fire accidents may occur due to explosive or flammable materials. They can be prevented by taking safety measures. Robots are best and efficient way for taking these safety measures. So here the development of an autonomous ROBOT to detect fire and rescue from fire is done .Here sensors (flame ,UV sensor, temperature sensor)are used for this purpose/detecting purpose .Sensor sense the signal and transmit to the receiver circuit which mounted on robot . Read More...
|
INSTRUMENTATION AND CONTROL ENGINEERING |
India |
214-215 |
60 |
128 Bit ECB-AES Crypto Core Design Using Rijndeal Algorithm for Secure Communication
-MAULIK RAJNIKANTBHAI BAMTA
In this paper, a mechanism of manipulating data means encrypting and decrypting data in Electronics Code Book (ECB) mode is introduced using AES cryptographic algorithm. AES is a symmetric key encryption algorithm which process data in block of 128 bits using key expansion module which uses key scheduling. Implementation of AES encryption engine needs to consume a large number of hardware resources. This paper enlightens on higher performance and security without key expansion module. This design uses same key for each operation of Rijndeal Algorithm by using look up table for Substituting bytes for encryption as well as for decryption by which logic resources have been largely reduced. Experimental results prove that this implementation with the ECB mode which uses same key provides the ability to secure data in a better efficient way. Read More...
|
VLSI & Embedded System Design ( Electronics & Communication Engineering ) |
India |
216-220 |
61 |
BEHAVIOUR OF DFIG UNDER FAULT GENERATED TRANSIENTS
-Mayankkumar M Tandel ; Tushar S. Jadav
Sudden increase in load at load bus or initiation of the fault can cause momentarily voltage sag at load bus which in turn can cause problems for locally served load. The collector bus at which wind turbine generators are connected may trip the wind turbine generator in response to the sudden voltage sag due to fault or sudden load change as DFIG has limited reactive power support capability and hence limited LVRT (Low Voltage Ride Through) capacity .Therefore the voltage instability is the crucial problem in maintaining the uninterrupted operation of the wind turbine equipped with DFIG. And most of the utilities, demands that the wind generator has to remain connected to the network and provide necessary support to the network during temporary disturbances in the network. This paper investigates the use of DFIG in the wind farm for purpose of stabilizing the grid voltage after grid side disturbances such as some types of faults and sudden load changes. Read More...
|
Electrical Engineering |
India |
221-224 |
62 |
Design and Development of capacitance liquid level gauge for liquid nitrogen
-Bhavin Prajapati ; Hardik Shukla
In cryogenic system, cryogens are stored in Dewar or storage vessels. Due to heat leak from the surrounding, The Vaporization of liquid takes place, and the level of liquid decrease. So, it is required to measured level continuous or periodically. There are different types of liquid level gauges are available to measure the level of liquid for cryogenic system. The quantity of liquid can be determined if the level of the vessel is known. Capacitance type liquid level gauge is best suited for measuring the liquid level of cryogens because of its high sensitivity low cost, low power consumption and accuracy. Here a try will be made to design and develop parallel plate type capacitance liquid level gauge for LN2 storage vessel. Read More...
|
Mechanical Engineering(cryogenic Engineering) |
India |
225-227 |
63 |
DETECTION OF POISONOUS GASES USING MINI ROBOT IN COAL MINING AREA
-Govinda.K ; Praveen Kumar Reddy.E ; Venkata Sumanth.A
In this paper, we present the design and construction of a mini-robot for poisonous gas detection in mining areas. An application of DPDT is to control the mini robot if there is any obstacle which can’t be avoided by itself and it can be carried out successfully by using DPDT switch. Also, this application recipes a signal when the mini robot has detected poisonous gas with help of gas sensor (MQ-6)activates an alarm. The communication between the mini robot and the DPDT switch is carried out by using wireless micro wave. The results show the effective implementation of this kind of mini robot system has advantages such as low cost, small and simple. Read More...
|
Electronics and Communication |
India |
228-229 |
64 |
Efficient Navigation System using Arduino for Blind
-Govinda.K ; Waseem Arshad ; Santosh Ram
A navigation system will assist the blind people to avoid obstacle in real life scenarios. It is an aid for blind and visually impaired people. It is based on a microcontroller with synthetic output. This aid is portable and gives information to the user about urban walking routes to point out what decisions to make. On the other hand, and in order to reduce navigation difficulties of the blind, an obstacle detection system using ultrasounds is added to this device. The proposed system detects the nearest obstacle via sonar system and sends back via feedback to inform the blind about its localization. This paper describes a guidance system for blind and partially sighted people with the aim of coping in the known and unknown internal and external spaces without the assistance of human guides. This work represents a significant step forward in the application of innovative technological solutions to increase independence and improve the quality of life for people with disabilities. This paper describes a navigation system for blind using Arduino and modern technology. Read More...
|
Electronics and Communication |
India |
230-232 |
65 |
OPTIMAL LOCATION OF STATCOM FOR POWER FLOW CONTROL IN POWER SYSTEM
-MR. PRITESH PATEL ; PROF. S.N. SHIVANI; PROF. A.L VAGHAMSHI
The shunt connected compensation (STATCOM) based FACTS device for the control of voltage and the power flow in long distance transmission line. The proposed device is used in different locations such as sending end of the transmission line, middle and receiving end of the transmission line. The PWM control strategy is used to generate the firing pulses of the controller circuit. Simulations were carried out using MATLAB Simulink environment. The suitable location and the performance of the proposed model were examined. Based on a voltage-sourced converter, the STATCOM regulates system voltage by absorbing or generating reactive power. The simulation results reveals that the reactive power generated is better at the middle of the transmission line when compared with the other ends of the transmission line and also the voltage is controlled at the middle of the line. Henceforth the location of STATCOM is optimum when connected at the middle of the line. Read More...
|
Electrical Engineering |
India |
233-237 |
66 |
NANOTECHNOLOGY IN CIVIL ENGINEERING AND ITS REFLECTION IN CURRENT EDUCATION
-AKASH AGRAWAL
Nanotechnology is one of the most active research areas that encompass a number of disciplines including civil engineering and construction materials. Traditionally, nanotechnology has been concerned with developments in the fields of microelectronics, medicine and materials sciences. However, the potential for application of many of the developments in the nanotechnology field in the area of construction engineering is growing. The properties like self-sensing, self- rehabilitation, self-structural health monitoring, self-vibration damping, self-cleaning and self-healing are studied. Nanotechnology deals with understanding, controlling and manipulating matter at the level of individual atoms and molecules in the range of 0.1–100 nm (10-9 m). It creates materials, devices, and systems with new properties and functions. In civil engineering and construction, the nanotechnology is applied in (i) concrete for reducing segregation in self-compacted concrete; (ii) the use of nano sensors in construction phase to know the early age properties of concrete is very useful. The present paper reviews the state of the art on the use of nanotechnology in the field of civil engineering and construction and also discusses its future prospect. Following this the study were carried out in ductile structural composites along with its enhanced properties, low maintenance coatings, better properties of cementious materials, reduction of the thermal transfer rate of fire retardant and insulation, various nano sensors, smart materials, intelligent structure technology etc. Finally the future trend, potential and implications of nanotechnology development in civil engineering towards more economical infrastructure, low cost maintenance with longer durability are deliberated. Read More...
|
CIVIL ENGINEERING |
India |
238-240 |
67 |
Night Lamp Controller
-Govinda.K ; Udit Mishra; Apurv Ekansh
This paper proposes energy efficient of automatic street lighting system based on low cost LDR circuit. The main objective is to design energy efficient based controller for controlling the Light Emitting Diode (LED) based street lamp via appropriate lighting levels control. This system is consists of a simple light detecting resistor, sunlight detecting sensors and LEDs. While, the controlling and managing of the system is based on the number of traffic and five different level of street light brightness has been used for lighting up the street and proportional to the number of traffic. The system was programmed to automatically turn off during the hours of daylight and only operate during the night and heavy raining or bad weather. Several numbers of tests have been conducted to test and validate the proposed prototype in the different environments. LDR based project main idea is to develop a application which can control the electricity usage in street lights or saving the energy when nt in use. LDR is used in this application for sensing light intensity. LDR controls power by controlling output resistance which is dependent on light intensity. This application can also be used in industries, house hold applications and many other fields where power consumption is more. The solar panels will feed the system with solar power, which will be charging the battery during the day. At night the battery will be discharge through the project processes. The battery and the streetlights will be monitored to observe their level and performance in the operating board. Research have been done about transmission medium which will be wireless by using transmitters and receivers. This medium will allows the information to transfer from part to another in the system. Read More...
|
Electronics and Communication |
India |
238-241 |
68 |
System Verilog based Verification of Write Operation in SDRAM using Memory Controller
-Sandeep Raval
In this paper, a Write Operation is done into the SDR SDRAM using Memory Controller that is verified. Basically as the memory, the basic Write and Read operation is performed to it. To see this Functionality working correctly, it needs to be verified. For this the Verification Environment is to be created. The Interface, Program Block, Generator, Driver, Monitor and Scoreboard are the basic components of the Verification Environment. This Paper describes the basic Write operation to the SDRAM is Verified to check the functionality. This Operation is performed using System Verilog and Modelsim 6.3f. The Address and the Data size is 32bits and 8bit Memory Model is used to perform this operation. Read More...
|
Electronics and Communication Engineering |
India |
242-244 |
69 |
Analysis of Similarity Measure For Image Registration
-Patel Ankitkumar Baldevbhai ; Manish I. Patel
In this paper, Image registration is the fundamental task used to match two or more partially overlapping images taken into one panoramic image comprising the whole scene. It is a fundamental image processing technique and is very useful in integrating information from different sensors, finding changes in images taken at different times, inferring three-dimensional information from stereo images, and recognizing model-based objects. Choosing a suitable similarity measure for image registration is always challenging task. In image registration, the images may consist of noise, cloud, highly undulating terrains etc. Choice of similarity measure plays an important role in image registration task.classified according to their nature area-based and feature-based similarity measure and according to four basic steps of image registration procedure: feature detection, feature matching, mapping Function design, and image transformation and resampling.Main contributions, advantages, and drawbacks of the methods are mentioned in the paper. Problematic issues of image registration and outlook for the future research are discussed too. The major goal of the paper is to provide a comprehensive reference source for the researchers involved in image registration, regardless of particular application areas. Choosing a suitable similarity measure for image registration is always challenging task.In image registration,the images may consist of noise,cloud,highly undulating terrains etc.Choice of similarity measure plays an important role in image registration task.classified according to their nature area-based and feature-based similarity measure Similarity measure are mutual information,normalise mututual information,jaccard co-efficient,partial hauss-drauff distance,image quality index,cross commulative resuadal entropy,normalise cross correlation,encludian distance are study and between two image anlysis similarity measure w.r.t. time and various parameters. Read More...
|
Electronics and Communication Engineering |
India |
245-249 |
70 |
REVIEW PAPER ON TRANSMISSION LOSS ALLOCATION BY USING ARTIFICIAL NEURAL NETWORK
-VASIM MISTRY ; RUPA A. VYAS
Due to introduction to deregulation in the power system transmission loss allocation has become an important issue to be solved. Today’s power system networks are pool operated, bilateral contract and hybrid model therefore the allocation of losses to the market participant varies. Also due to the nonlinear nature of the power flow and power loss it’s very difficult to allocate loss among the participant properly. Various methods of allocating transmission loss have been presented in this review paper and also the use of artificial neural network for transmission loss allocation has been cited. Read More...
|
ELECTRICAL ENGINEERING |
India |
250-252 |
71 |
Verification of USB 2.0 Functional Core
-PARTH R. ZALAWADIA ; PARTH R. ZALAWADIA
A verification environment to verify USB 2.0 Functional core using System Verilog is implemented in this paper. The verification IP can be reused to verify any USB protocol. Verification Environment is built to check the behaviour of DUT and to check whether we meet desired functionality of the core so that we can cover all the aspects of the design during verification. Verification of UTMI, Protocol Layer, Wishbone Interface and Memory Arbiter block is implemented in this paper. The Simulation Results are generated using QuestaSim 10.0b. Read More...
|
VLSI & EMBEDDED SYSTEM DESIGN (ELECTRONICS & COMMUNICATION ENGINEERING) |
India |
253-256 |
72 |
Satellite Image Feature Extraction
-Dheeraj Kanojia ; Ankit Chaurasia
Natural or man-made objects extracted from Google earth has been used for many different purpose, e.g. Military, map publishing, transportation, car navigation, etc. Automatic natural objects (road, building, forest, water body etc.) extractions are a challenging problem, and no existing software is able to perform the task reliably. Since manual extraction of natural objects from imagery is very time consuming, automatic method have the potential to improve the speed and utility for military and civil application and are therefore highly desirable. Google Earth is a virtual globe, map and geographic information program that were originally called Earth Viewer. In this paper we are presenting the image classification using decision tree. The image objects are given color code and after processing the image is colored according the objects present. There are four classes developed, water, forest, mangroves and settlement. Water includes the water bodies present in the region. Vegetation includes the trees, plantations, greenery. Others include the remaining land areas. And last class includes the manmade structures which cover all the structures such as buildings, roads, bridges, etc. Read More...
|
Information Technology |
India |
257-259 |
73 |
A Web Service Framework for Multi-User Gaming Environment
-Ravi Theja Y ; Aanthoniraja
A multiple client gaming service environment consists of a hosting server that is capable of allowing users interacting with others players who are running that game. Server provides the communication between host servers gaming server. Game play options are decided with type of game they wanted to play. The player management manages the players between the game roles. In this paper proposed an administration arranged construction modelling for enormous multiplayer online diversion and web administrations. This expands the adaptability and security of the framework. Read More...
|
Computer Science |
India |
260-262 |
74 |
Brief review of video mining applications
-Ninderpal kaur ; Navpreet kaur Walia; Dr Navdeep kaur
In Data Mining process extraction of past unknown knowledge is done at first and then interesting patterns are detected from a tremendous set of video data. Video is immediately becoming one of the most popular media due to its high information and entertainment proficiency. Video consists of audio, video and text together. With the consistent growth in digital libraries and video databases, it is more important to automatically extract the knowledge from video databases and understand video databases.video data mining is the technique for mining video.Video mining is used in many real time applications such as, Movies, Video Image Retrieval, Predicting Relationships between Online Question Theme and Final Grad, Surveillance Video System and other source of entertainment. Read More...
|
data mining |
India |
263-265 |
75 |
Effective Management of resources through Grid Computing
-Ravi Ranjan ; Sushant Jhingran; Manoj Kumar Yadav
Grid computing is type of distributed system. Connections over network can be reutilized several times. In grid computing more than one computer is connected to each other. A node over grid network can be share system as well as other component such as printer, memory, disk, data application, storage and computing cycle. Grid computing connects computer system from more than one administrative domain to resume a common goal to short out a single process. The scope of grid computing provides a framework for exploiting underutilized resources and thus has the possibility of substantially increasing the efficiency of resource usages. Read More...
|
Computer Science |
India |
266-268 |
76 |
Performance Analysis of TCP variants in wired and wireless scenario
-Vivekkumar Majithiya ; Prof. Priyang Bhatt
TCP is a transport layer protocol which provides reliable and connection oriented transmission. The main problem of TCP is in wireless networks. In wired network, packet loss is mostly due to network congestion, while in wireless network the packet loss may be due to network congestion or may be due to mobility of nodes. TCP starts its back off procedure when it detects packet loss, if the packet loss is due to node movement then the back off procedure will be unnecessary and it will create delay in the network. There are many TCP variants available. In this paper we have analyzed five variants of TCP, TCP Tahoe, TCP Reno, TCP NewReno, TCP Vegas, and TCP Westwood by calculating its throughput and delay in wired as well as wireless scenario. Read More...
|
Computer Engineering |
India |
269-272 |
77 |
AUTOMATION OF STREET LIGHT SYSTEM
-Govinda.K ; A.Raviteja ; B.China raja
TCP is a transport layer protocol which provides reliable and connection oriented transmission. The main problem of TCP is in wireless networks. In wired network, packet loss is mostly due to network congestion, while in wireless network the packet loss may be due to network congestion or may be due to mobility of nodes. TCP starts its back off procedure when it detects packet loss, if the packet loss is due to node movement then the back off procedure will be unnecessary and it will create delay in the network. There are many TCP variants available. In this paper we have analyzed five variants of TCP, TCP Tahoe, TCP Reno, TCP NewReno, TCP Vegas, and TCP Westwood by calculating its throughput and delay in wired as well as wireless scenario. Read More...
|
Electronics and Communication |
India |
269-272 |
78 |
DSP based control of Brushless DC (BLDC) motor
-MR. PARAS PARMAR ; PROF. ASHISH JOSHI; MR. YOGESH PATEL; MR. RAJNIKANT PATEL
Now days, in recently developed technology, motor control becomes very easier as before. There are different control strategies available to speed control of motor. In this paper illustrate the Digital Signal Processor based control of Brushless DC motor. DSP TMS320LF2812 is used to control motor. Read More...
|
ELECTRICAL ENGINEERING |
India |
273-277 |
79 |
Design of Crypto Assist Controller with ASIC design Flow
-TEJAS HARJIBHAI VADHAVANIYA
In today’s time, everyone wants secure communication. Crypto core is used widely to make data secure. So handling of those data is very complex and important task for fast communication. Main objective of this paper is to design a controller which can handle the traffic of data for crypto core engine. Here, Design of AHB master which can take data from slave. One efficient DMA Controller used to transfer of data from AHB master to Crypto core engine. Here also design of two buffers to overcome the mismatch of size of data bus between AHB master and crypto core engine. So by combining all these modules, design of one controller comes up which takes data from AHB master and transfer them to crypto core engine through DMA controller. Also it’ll transfer data from crypto core engine to AHB master through DMA controller. Read More...
|
VLSI Design |
India |
278-281 |
80 |
Pavement Management System for Urban Road
-Shashi Bhushan Girimath ; Dr.Venkat Chilukuri; Prof.T.G.Sitharam; Dr.Krishnamurthy
Distress survey is carried out for Bangalore city outer ring road. Then determined the type and level of deterioration it has achieved. Various alternative maintenance treatments are suggested based on scientific analysis tool HDM-4 developed by the World Bank. Then optimum maintenance treatment is obtained for an identified urban road among the various alternatives maintenance treatments. Read More...
|
Civil Engineering |
India |
282-284 |
81 |
Verification of SHA Crypto Processor Core
-Ketankumar Jayantilal Dhimmar ; Ritesh Maheshbhai Pankhaniya
This paper verifies the Secure Hash Algorithm (SHA) Crypto Processor Core by applying different types of test cases as input. The test cases are given as randomized which will more efficient to catch the bug from design compare to direct test. As there are so many versions of SHA algorithm like SHA-1, SHA-2(160, 256, 384 and 512) and also now SHA-3, this paper verifies the 256 bit SHA algorithm. The verification of core is done using System Verilog language. The tool used for verification is questasim 6.6d by Mentor Graphics. Read More...
|
VLSI |
India |
285-288 |
82 |
Implementation of Speed Control of Induction Motor with Eddy Current Dynamometer type Load Using Direct Torque Control Method through Digital Signal Processor
-Mr. Rajnikant N. Patel ; Dr. Saurabh N. Pandya; Mr. Yogesh Patel; Mr. Paras Parmar
An induction motor and its dynamic model, torque – speed characteristics and high performance of Direct Torque Control (DTC) with Digital Signal Processor (DSP) for speed controlling of induction motor. The induction motor is most used in industrial application because of robustness and low maintenance. Using DSP speed control of induction motor obtain wide speed range of induction motor with smooth drive control, reduces torque ripples, noise and also reduces loss. So, that it will improve the efficiency of induction motor. Induction motor has wide speed range from 300 RPM to 1415 RPM or rated speed of particular induction motor. For the digital speed controlling, prepare simulation in MATLAB 2009 and with the help of F2812 target preference block and XDS510 emulator generating ‘C’ code in code composer studio. This ‘C’ code convert into .out file in code composer studio. Then after this .out file convert into .ASC file with the help of Vi DSP code composer. Then after this .ASC file down load in TMS320F2812 DSP. Test the induction motor for various speed drives with no load and also test induction motor for various speed under variation of eddy current dynamometer type load with the help of DTC method. Read More...
|
Electrical Engineering |
India |
289-294 |
83 |
Designing of Obstacle Avoidance Robot using Arduino programming
-Govinda.K ; CH. Srivatsav; Ayush Sabat
The obstacle avoidance robots are advanced robots which have the capability to detect obstacles through sensors and move forward without collision. The basic tool for achieving this is "control theory", which deals with the question of how dynamical systems, i.e., systems whose behaviors change over time, can be effectively influenced. This paper treats the navigation problem of mobile robots to avoid obstacles according to vision information. In present method, first detection of obstacles which exist in front of a mobile is done by robot by calculating the optical flow. Then, based on the area of detection the optimal trajectory for a robot is decided. The sensor data for supporting a vision system has been used. In order to find the optimal trajectory, the distance between a mobile robot and obstacle evaluating a function is calculated. In this paper we designed a microcontroller on the board programmed with Arduino can sense the environment by receiving input from a variety of sensors and can affect its surroundings by controlling lights, motors, and other actuators. This obstacle controlled Robots are a great boon to the society because of their versatility, and easy maneuvering capability Read More...
|
Electronics and Communication |
India |
295-298 |
84 |
SIMULATION OF SHUNT ACTIVE FILTER USING MULTILEVEL INVERTER
-Shah Sweety N ; Mr. Urvesh R Rana
Active Shunt filter is use to eliminate harmonics of the system produced by nonlinear load. Active shunt filter consist mainly two blocks: PWM Converter and Active Filter Controller. In this paper cascaded H bridge type multilevel inverter is use to implement PWM converter. There are three methods to implement Active filter controller. Constant power Control Strategy, Sinusoidal Current Control Strategy and Fryze Current Control Strategy. In this paper Generalized Fryze Current Control Strategy is used for active filter controller. Read More...
|
Electrical Engineering |
India |
299-301 |
85 |
REAL TIME VOICE ENCTYPTION SYSTEM
-Ritesh Maheshbhai Pankhaniya ; Ketankumar Jayantilal Dhimmar
In our daily developing life, security becomes an essential issue in all fields. So to secure our real time delivered voice there is no such kind of application, we have only non real time security application for voice. Here By using Audio Codec’97 and Advanced Encryption Algorithm on FPGA vertex kit we can make a secure real time voice encryption system. Here we take a real time voice by microphone and send it to FPGA kit by Audio codec’97 here we use audio codec interface to receive voice in FPGA kit and send it to AES Encryption by RAM and after Encryption we send it to Transmitter and this Encrypted voice is received by Receiver at another FPGA kit here we also use same block like FPGA kit expect AES Encryption we replace with it AES Decryption to Decrypt the voice and receive original voice. Here we use ML401 kit of FPGA. Read More...
|
VLSI |
India |
302-306 |
86 |
A Control Strategies for shunt active filter
-Pratik J Kunvarani ; Prof A M Upadhyay
Power quality (PQ) issues are relatively new.It is only recently that the electrical engineering community has had to deal with the analysis, diagnosis and solution of PQ problems even if it has not become a major in the industries. Generally there are various nonlinear loads like arc furnaces AC to DC converters and florescent lamps are generating harmonics which are affecting the system voltage and current waveforms they should be within the IEEE standards so that the shunt active filter is proposed with a control strategies for control of shunt active filter for compensation of harmonic within the range Read More...
|
Electrical Engineering |
India |
307-311 |
87 |
Image Resolution Enhancement Using NSCT Based Learning With LBP as Feature Model
-Karishma Vrujlal Koladia ; Prakash P. Gajjar; Parul V. Pithadia
In this paper, we propose a new technique for feature preserving spatial resolution enhancement of an image captured at low spatial resolution. We use a training database containing low resolution (LR) images and their high resolution (HR) versions. In an image, different features like edges, corners, curves and junctions are important to convey its local geometry. We use Local Binary Pattern (LBP) operator to represent texture of an image. The missing high resolution details of the low resolution observation are learnt in form of Non-subsampled Contourlet Transform (NSCT) coefficients of the high resolution images in the training database. We demonstrate the effectiveness of the proposed technique by conducting experiments on real world gray scale images. The results are compared with existing learning-based approaches. The proposed technique can be used in applications such as medical imaging, remote surveillance, wildlife sensor networks where the transmission bandwidth, the camera cost and the memory are main constraints. Read More...
|
Electronics and Communication Engineering |
India |
312-317 |
88 |
Verification of MIPI Camera Serial Interface CSI-2 Transmitter Protocol
-Parmar Milankumar Ashwinbhai ; Parmar Milankumar Ashwinbhai; Pankaj P. Prajapati
The verification process helps the user to check the correctness of the design before its fabrication. This is very helpful in this mobile electronics and computing era. In this era the prototyping of chip is very fast. To have the fast prototyping we need faster designing process. The time consumed in verification is the 70% of the total time required in the verification. To have the faster verification reusable blocks should be used, so in this work System verilog language and Universal Resource Methodology (UVM) is used. The CSI-2 protocol is used for the standard data transmission and control interface between camera and processor mainly mobile processor. This protocol is very useful because nowadays the demand of mobile computing device with the camera module is increased. The main goal of this work is to functionally cover the almost every feature of the protocol and to have the coverage on driver 100% with the major feature of the protocol is covered. Read More...
|
Elctronics and Communication engineering |
India |
318-321 |
89 |
Facial Expression Recognition A Review
-Jatin B Patel ; Gopi T Bhatt
This electronic document presents a brief review on Facial Expression Recognition. There are basic six facial expressions: Happy, Sad, Ander, Disgust, Surprise, Sad. This is a two step process, In first the facial feature is extracted from image and then it is classified into six category. Facial Expression is the only way to convey feelings more efficiently. Read More...
|
Information Technology |
India |
322-324 |
90 |
Morphological Transformation based Signature Verification System
-Hetal V Davda ; Sima Gonsai
In this paper a feature vector which has been used for signature verification is created using morphological processing of horizontal projections of pre-processed images. Here morphological opening is used for the pixel allocation along the directions of projection. Structuring element having various lengths is employed to increase feature discrimination capabilities. This system conducts a comparison to verify the claimed identity of the user. This comparison is made between calculated feature vector and stored user templates. Here comparison is made using 6 different distance metrics to find out the best verification results. Read More...
|
Electronics and Communication Engineering |
India |
325-328 |
91 |
Interfacing of AT Command based HC-05 Serial Bluetooth Module with Minicom in Linux
-Sutariya Hardik Jayantilal
In this paper I have present HC-05 serial Bluetooth module which is working on the modern wireless technology, the Bluetooth, for realization of distributed measurement and automation systems. HC-05 Bluetooth module is a serial communication module. Serial communication is the process of sending data one bit at a time, sequentially, over a communication channel. , as improved signal integrity and transmission speeds. HC-05 module operates on 3.3V. So there is USB to serial TTL module is required for voltage level conversions. Minicom is a text-based modem control and terminal emulation program for Unix-like operating systems. Minicom is a menu-driven communications program. HC-05 module can control by using minicom in a Linux operating system Read More...
|
Electronics & Communication Engineering |
India |
329-332 |
92 |
Solving Unit Commitment Problem Using Ant Colony Optimization (ACO) Technique
-RAVI B. BALDANIYA ; H. D. MEHTA
In this paper, Unit Commitment (UC) problem for generation scheduling using Ant Colony Optimization (ACO) technique has been carried out. UC is the process of determining which generators should be operated each day to meet the daily demand of the system at minimum cost.ACO technique is inspired by nature of search for food by real ants from its source to the destination by building the unique trail formation. This approach has been applied to a system comprised of 3 generating units. A MATLAB code has been generated for solving ant colony based unit commitment problem. Comparative analysis of results using dynamic programming and Ant Colony Optimization technique are presented which clearly indicate that execution time required by ACO technique is much less as compared to dynamic programming Read More...
|
Electrical Engineering |
India |
333-336 |
93 |
ASIC Implementation of Crypto Assist Controller
-TEJAS HARJIBHAI VADHAVANIYA
In this Paper, I will design AHB master which can take data from slave. One efficient DMA Controller used to transfer of data from AHB master to Crypto core engine. Also I’ve to design two buffers to overcome the mismatch of size of data bus between AHB master and crypto core engine. So by combining all these modules, I’ll design one controller which takes data from AHB master and transfer them to crypto core engine through DMA controller. Also it’ll transfer data from crypto core engine to AHB master through DMA controller. The result of this project is a controller which can transfer data between memory and Crypto core engine. This controller can help us to make our communication fast and easy to handle large size of data which needs encryption or decryption Read More...
|
VLSI Design and Implementation |
India |
337-341 |
94 |
Enhanced PHD Manager For Mobile Agent
-Prajapati Shruti DineshKumar
Enhanced PHD manager is being carried out to propose a solution which involves developing a manger which is capable of handling and communicating with multiple agents of different configuration. The Manager provides a common data analyzer which will parse the aggregated medical data coming from a particular Agent and will help in diagnosis of the health status of the patient in the Ambulance. It fetches the data from the XML file using efficient XML file parser. Moreover, it will decode the extracted data and display it into the GUI for easy readability to the medical representative at the hospital. The Manager also involves design and implementation of a diagnostic framework which includes generating alarm on detection of the critical medical data. This entire Manager system works on the basis of event generation and response of the event. Thus, it will help in providing proper medical treatment to the patient at the ambulance through proper and timely diagnosis. This paper describes working of Manager. Read More...
|
Computer Engineering |
India |
342-346 |
95 |
Secured Transaction For Distributed IT Service System
-Abhinivesh M ; Mayank G; Govinda K
The Web Services Policy has configuration that represents the constraints and capabilities of the security policies on both internal node and endpoint. It can define whether security index are acquired, which secure encryption algorithms are used, and privacy rules that has to be employed . In present realizations of AES(Advanced Encryption Standard) on RISC(Reduced instruction set computing) that do not support encryption and decryption at the same time or only allow a specific cipher block size, In this paper we are implementing the secured IT system web service dynamic key generation and support both encryption and decryption simultaneously for web services. Read More...
|
Computer Science and Engineering |
India |
347-350 |
96 |
Implementation of Ternary Logic Gates using CNTFET
-Rahul Kashyap
An alternative to Binary Logic is Ternary Logic Design Technique by which energy efficiency and Simplicity can be easily accomplished. The design based on Ternary Logic reduces the circuit overheads such as interconnects and chip area. Also, CNTFET based designs increases the Performance and reduces the Power Consumption of the circuit. In this work, Sequential Element using Ternary Logic Design and based on CNTFET’s are proposed which provides a glimpse over the present CMOS technology. Read More...
|
Electronics and Communication Engineering |
India |
351-355 |
97 |
Performance Analysis of Logic Gates Based on CNTFET
-Radha Tapiawala
This paper addresses at first carbon nanotubes (CNTs) and importance of CNT over silicon based devices has been discussed and then exploring the recent survey on CNTFET structure and its types, then simulation of logic gate by changing various parameter of CNTFET is explained. Read More...
|
Electronics and Communication Engineering |
India |
356-359 |
98 |
Gesture Based Hybrid Authentication for Smart Device
-Makwana Mahesh R ; Dev M. Rathod
Smartphone security is a great concern for security of its information. More than 70% of Smartphone users keep their valuable information like Files, Pictures, Calendars and many more in their smartphone and it has raised the question of security. Smartphone manufactures companies give different kind of authentication methods for security purpose of smartphone. But, as far as security is concerned, still it’s not secure as it is supposed to be. Most of the manufactures like Nokia, Samsung, and Apple etc. manufacture smartphone products with gesture based authentication along with other simple techniques. This project presents a new hybrid method for smartphone security. This hybrid method may consist of Tapping, Gesture and Sensor based technologies for authenticating mobile device users. My primary study showed me that it this new technique may be slower and more error prone than existing techniques. However, I believe with practice it could get faster and more accurate. Also, most users will be comfortable and all of them will feel more secured while using this new technique. Read More...
|
Computer Engineering |
India |
360-363 |
99 |
METAL DETECTOR FOR SECURITY CHECKING
-Govinda.K ; Venkata sai akhil jonnadula ; Karthikeyan.M
This paper proposes a method for designing and implementation of metal detector using latest technology. The metal detector which is used for security checking. This metal detector can be used to detect slightly big size metallic objects. It is used as a sensing coil. This coil should be kept near the metallic objects for detection. Input of circuit is a weak culprit’s R.F range oscillator. Sensing coil forms parts of turned oscillator. This work focuses on the adaptation, simulation and construction of a commonly available schematic for metal detector. Metal detectors are finding applications all over the place as the ability to detect certain types of materials at a distance become ever more crucial. Read More...
|
Electronics and Communication |
India |
364-366 |
100 |
Detection of WBC and Counting
-Patel Denim V. ; Jignesh R. Patel
Blood cell counting by laboratory task utilizes haemocytometer and microscope. It is laborious. This shows the effectiveness of an automatic image processing method to detect blood cells by peripheral blood smear microscope image. The traditional method of manual count under the microscope yields inaccurate results and put an intolerable amount of stress on the Medical Laboratory Technicians. Although hardware solutions such as the Automated Haematology Counter, are not capable of deploying such prohibitively expensive machines in every hospital laboratory in the country. As a solution to this problem, this Paper aims to provide a software-based cost effective and an efficient alternative in recognizing and analysing blood cells. Read More...
|
Electronics and Communication Engineering |
India |
367-369 |