Version-2 (March-April 2015)
Version-1 Version-2 Version-3 Version-4
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Smart Charging of PHEVs Based on Efficient Battery Back-up Architecture |
Country | : | India |
Authors | : | H. Dharani Devi || R. Ashwini || N. Arun Priya |
Abstract: The Upcoming researches in the field of plug-in hybrid electric vehicles (PHEVs) and the growing global awareness for a pollution free environment will lead to an increasing demand in PHEVs in the near future. A smart charging system is proposed such that the overall power of PHEVs does not drain under any condition until the lifetime of the vehicle battery. The power needed to charge the plug-in hybrid comes from two sub-batteries. The three way interaction between the PHEV and the two sub-batteries ensures optimal usage of available power. The system designed to achieve the desired objective consists of DC/DC boost converter, DC/DC buck converter, and the two sub-batteries.
Keywords: Plug-in hybrid electric vehicle, boost converter, buck converter, sub-battery back-up.
[1]. Preetham Goli and Wajiha Shireen," PV integrated smart charging of PHEVs based DC link voltage sensing" IEEE Trans on Smart grid, VOL. 5, No. 3,( May 2014).
[2]. Article in ," US Department of Energy-Energy Efficient and Renewable Energy" [Online]. Available: http://www.fueleconomy.gov.
[3]. S.Bai, Y. Du, S.Member, and S.Lukic,"Optimum design of an EV/PHEV charging station with DC bus and storage system," in Proc. 2010 IEEE Energy Convers. Congr. Expo. (ECCE), pp. 1178-1184.
[4]. C.Hamilton, G.Gamboa, J.Elmes, R.Kerley, A.Arias, M. Pepper, J.Shen, and I.Batarseh,"System architecture of a modular direct-Dc PV charging station for plug-in electric vehicles," in Proc. IECON 2010 36th Annu. Conf. Ind. Electron. Soc.,( Nov. 7-10, 2010), pp. 2516-2520.
[5]. P. Bauer, Z. Yi, J. Doppler, and N. Stembridge,"Charging of electric vehicles and impact on the grid," in Proc. 2010 13th Int. Symp. MECHARTONIKA, (Jun. 2-4,2010), pp. 121-127.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Remote Readout of Radiation Using Wireless Communication |
Country | : | India |
Authors | : | Rashmi Adatkar || Nisha Makwana || Nandini Mane || Rahul Kumar |
Abstract: In this paper, a solution of remote background radiation monitoring, based on the concept of Wireless Sensor Network (WSN), is presented. Radiation dose rate measured by the sensor node is sent to the monitoring station through ZigBee wireless network operated on 2.4 GHz unlicensed Industrial Scientific Medical (ISM) band. Power consumption of the sensor node is kept low by operating the node ZigBee radio with low duty cycle: i.e by keeping the radio awake only during data transmission/reception. Two ATmega8 microcontrollers are programmed to perform interfacing, data processing, and control functions. Range of coverage of the system is extendable via the use of ZigBee router(s).
Keywords: Zigbee, Wireless sensor network, Radiation monitoring using GM counter, Application of Zigbee.
[1]. Jaworowski Zbigniew, "Radiation Risks and Ethics". Physics Today, Volume 52, Issue 9, pp. 24 – 29, 1999
[2]. Tsoulafanidis N. (1983), "Measurement and Detection of Radiation". Hemisphere Publishing Corporation New York, pp. 486-487, 1983.
[3].http://www.americas.fujielectric.com/sites/default/files/Fuji%20Electric%20Radiation%20Dept%20%20Remote%20Monitoring% 20Technology_1 .pdf
[4]. Ding Fei, Guangming Song, Kaijian Yin, Jianqing Li and Aiguo Song (2009), "A GPS Enabled Wireless Sensor Network for Monitoring Radioactive Materials". Sensor and Actuators A 155, Elsevier Publications, pp. 210-215, 2009
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | GPRS Based ARM Embedded Web Server Design |
Country | : | India |
Authors | : | Miss. Gayatri Kulkarni || Prof. Sagar Wabale |
Abstract: For monitoring & controlling either home appliances or industry devices networked embedded systems are important. This proposed work is an attempt to design a data acquisition system allows information to be collected with no labor requirements, cost efficient and easy to maintain technology. General web server requires more resources & large amount of memories. So ARM based servers are becoming popular instead of PC based servers. This paper proposes world's most powerful technology using advanced RISC machine (ARM 7) & in-build web server application with General Packet Radio Service (GPRS) technology. Users can monitor different remote machines/systems by using embedded web server. GPRS technology along with GSM makes it accessible from anywhere in the world. Need of server software & its maintenance are eliminated by this proposed system. This system is an optimized solution for industry automation, instrumentation & household devices. Various sensors installed at working place help in real time monitoring like temperature, humidity, carbon monoxide, Speed, LPG gas leakage etc. The results show that design of system is safe and convenient from local management data. Security of system enhances because of authentication process. Source code is written in well known embedded C language.
Keywords: ARM Processor, Data Acquisition System, Embedded Web Server, GSM, GPRS
[1]. E. Lin, C.-W. Hsu, Y.-S. Lee, and C. C. Li, ―Verification of unmanned air vehicle flight control and surveillance using mobile communication,‖J. Aerosp. Comput. Inf. Commun., vol. 1, no. 4, pp.189–197, Apr. 2004.W.-K. Chen, Linear Networks and Systems (Book style). Belmont, CA: Wadsworth, 1993, pp. 123–135.J.
[2]. K. Jacker and J. Mckinney, ―TkDAS—A data acquisition system using RTLinux, COMEDI, and Tcl/Tk,‖ in Proc. Third Real-Time Linux workshop 2001. [Online]. Available: The Real Time Linux Foundations: 2001/papers.html.
[3]. E. Siever, A. Weber, S. Figgins, and R. Love, Linux in a Nutshell.
[4]. Q. Zhou, W. Wu, and Y. Ma, ―The embedded data acquisition system for Mössbauer spectrum,‖ in Proc. Third Real-Time Linux Workshop Embedded Linux Expo Conf. Real-Time Embedded Comput. Conf.,Milan, Italy, Nov. 2001, pp. 26–29.
[5]. C.E. Lin, C.-C. Li, A.-S. Hou, and C.-C.Wu, ―A real-time Remote control architecture using mobile communication,‖ IEEE Trans. Instrum. Meas., vol. 52, no. 4, pp. 997–1003, Aug 2003.
[6]. M Poongothai, ‖ARM Embedded web server based on DAC system‖ IEEE 978-1-61284-764-1/11-2011
[7]. Klimchynski, ―Extensible embedded Web server for internet-based data acquisition and control,‖ in Proc. 3rd IEEE Int. Conf. Sensors, Vienna, Austria, Oct. 24–27, 2004, vol. 1, pp. 52–55.
[8]. RTOS Evaluation Project, ―What makes a good RTOS, Dedicated Systems Experts, 2001. [Online]. Available: http://www.dedicatedsystems.com
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Current and Future Trends In Wireless Mobile Communication Systems |
Country | : | India |
Authors | : | Nenavath Ravikumar || J.Ravi Sankar |
Abstract: Since from the last few years research technology will open a new era in mobile communication systems, the technology goes soft and simple for the people to use multiple functions with a single smart device. One of the best examples is the wireless mobile communications. The evolutions of mobile communications are rapidly changing from 1G to 5G. Is the communication systems has been a shift from landline to cellular mobile telephony, resulting in Network architecture Planning and Optimization related services coming in to sharp focus. The paper is particularly designed to introduce the fundamental wireless mobile communications for future or next Generation Technology. It gives an overview of current and future trends in the areas of wireless mobile communications with different applications.
Keywords: LTE (Long Time Evolution), IMT-Advance, IP (Internet protocol), RAT (Radio Access Technology), WWWW (World-Wide Wireless Web)
[1]. Siddiqui, Mohd Maroof. "Vision of 5G Communication." High Performance Architecture and Grid Computing. Springer Berlin Heidelberg, 2011. 252-256.
[2]. Mohd. Maroof siddiqui "Vision of 5G Communications" , A. Mantri et al. (Eds.): HPAGC 2011, CCIS 169, Springer-Verlag Berlin Heidelberg, pp:252-256, 2011.
[3]. Akilesh kumar Pachuri, Ompal Singh, "5G Technology- Redefineing Wireless Communications in upcoming years", IJCSMR vol 1 Issue 1 Aug 2012.
[4]. Kamarularifin Abd Jalil, Mohd Hanafi Abd. Latif, Mohamad Noorman Masrek, "Looking into the 4G features", MASAUM Journal of Basic and Applied Sciences vol.1, no.2 Sep 2009.
[5]. B.F. Gessler, O. Queseth, R. Stridth, M.Unbehaun, J.Zendler, "4th Generation wireless infrastructures: Scenarios and Research Challenges", IEEE Personal Communications, 8(2), 2010
[6]. International Telecommunications Union (ITU), http://www.itu.org.
[7]. Institute of Electrical and Electronics Engineers (IEEE), http://www.ieee.org.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Recognition of Human Iris Patterns for Biometric Identification |
Country | : | India |
Authors | : | Mrs.M.Sujatha || K.V.S.Sravanthi || B.Jahanavi Raja || L.Dhanunjay || J.Naveen Kumar M.Sujatha |
Abstract: Iris recognition is an efficient method for identification of persons. This paper provides a technique for the iris recognition. A biometric system provides automatic identification of individuals. Iris is an unique feature which is applicable for identification. Unlike face recognition or finger prints, iris recognition comes from randomly distributed features. It is most reliable and accurate method of identification. This paper proposes a personal identification using iris recognition system with the help of six major steps i.e. image acquisition,localization, Isolation, normalization, feature extraction and matching and also these six steps consists a numbers of minor steps to complete each step. The boundaries of the iris, as papillary and limbic boundary, are detected by using Canny Edge Detector. We can use masking technique to isolate the iris image form the given eye image, this isolated iris image is transformed from Cartesian to polar co-ordinate. Now finally extract the unique features (feature vector) of the iris after enhancing the iris image and then perform matching process on iris code using Hamming Distance for acceptance and rejectance process.
Keywords: Canny edge detection , Hamming distance , Hough transform, Masking, Histogram equalization, Haar wavelet.
[1]. http://www.amazingincredible.com/show/82-the-incredible-human-eye (last referred on 26 April 2013)
[2]. P.W. Hallinan, "Recognizing Human Eyes," Geomtric Methods Comput .Vision ,vol. 1570, pp.214-226, 1991.
[3]. J. Daugman and C. Downing, "Epigenetic Randomness, Complexity, and Singularity of Human Iris Patterns," Proc. Royal Soc. (London) B: Biological Sciences, vol. 268, pp. 1737-1740, 2001
[4]. Daugman, J. "How Iris Recognition Works", available at http://www.ncits.org/tc_home/m1htm/docs/m1020044.pdf.
[5]. L.P. Han and W.B. Yin. An Effective Adaptive Filter Scale Adjustment Edge Detection Method (China, Tsinghua university, 1997).
[6]. D. Marr and E. Hildreth , Theory of Edge Detection (London, 1980).
[7]. Canny John, A Computational Approach to Edge Detection, IEEE Transactions on Pattern Analysis and Machine Intelligence,PAMI-8.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Fall Detection System Using Tri-Accelerometer for Wireless Body Area Network |
Country | : | India |
Authors | : | Miss.Harshalata Madhukar Mahajan || Prof. Bharati. S. Patil |
Abstract: In this paper, we observe the physical condition of elderly people or patients in personal environments such as home, office, and restroom. The elderly peoples mostly have limited physical abilities and are affected with serious physical damages even with small injuries like fall. The falls are not predictable also not avoidable. In case of a fall, its early detection with notification to emergency services is essential for quick recovery. The existing fall detection devices are more bulky and uncomfortable to wear. In this paper, a new fall detection system is used which includes tri-axial accelerometer sensors to classify the behavior and posture of the detection subject. Body motion can be classified into different patterns, i.e. vertical position, lying position, sitting position, horizontal position and fall. If a fall is suspected, an automatic message can be sent (GSM) with fall location (GPS). The major advantage of the proposed system is the use of mobile phone which is readily available to most people[1][2].
Keywords: MEMS, GPS, GSM, ARM
[1]. Behzadmirmahboub, Shadrokhsamavi, Nader Karimi, And Shahramshirani, "Automatic Monocular System For Human Fall Detection Based On Variations In Silhouette Area", IEEE TRANSACTIONS ON BIOMEDICAL ENGINEERING, VOL. 60, NO. 2, FEBRUARY 2013.
[2]. Woon-Sung Baek, Dong-Min Kim, Faisal Bashir, And Jae-Young Pyun "Real Life Applicable Fall Detection System Based Onwireless Body Area Network"IEEE 2013.
[3]. Wuttichaiputchana, Sorawatchivapreecha, And Tulayalimpiti. "Wireless Intelligent Fall Detection And Movement Classification Using Fuzzy Logic" IEEE 2012.
[4]. Ying-Wen Bai, Siao-Cian Wu And Cheng-Lung Tsai, "Design And Implementation Of A Fall Monitor System By Using A 3-Axis Accelerometer In A Smart Phone" IEEE 2012.
[5]. Chien-Cheng Lan, Ya-Hsinhsueh, Rong-Yuan Hu, "Real-Time Fall Detecting System Using A Tri-Axial Accelerometer For Home Care",IEEE 2012.
[6]. Y. G. Lee, D. 1. Cheon And G. W. Yoon, "Telemonitoring System Of Fall Detection For The Elderly," Journal Of Sensor Science And Technology., Vol. 20, No. 6, Pp. 420-427, 2011.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Performance Improvement Technique for Multiuser Detection in DS-CDMA Systems Using Successive Interference Cancellation |
Country | : | India |
Authors | : | Ch.Mythili || G.Pavan Kumar || G.Swathi || I.R.N.Dora || R.V.Ch.Sekhar Rao |
Abstract: Multiple access interference (MAI) limits the capacity of Direct sequence Code Division Multiple Access (DS-CDMA) systems. In CDMA systems MAI is considered as additive noise and matched filter bank is employed. Traditionally, multiuser detectors__ a code matched and a multiuser linear filter are used which increases the complexity of the system due to its nature of operation. Multiuser detection is an approach which uses both these filters for the optimization. However, the main drawback of the multiuser detection is one of the complexity so that suboptimal approaches are being sought. Much of the present research is aimed at finding an appropriate tradeoff between complexity and performance. These suboptimal techniques have linear and non-linear algorithms. In this work, we introduce Successive Interference Cancellation (SIC) which is a nonlinear suboptimal method of MUD and is based upon successively subtracting off the strongest remaining signal. Further analysis is to be carried out and simulations to be done for better understanding of SIC.
Keywords: Multiple Access Interference (MAI), Successive Interference Cancellation.
[1]. Peng li, Rodrigo C. de. Lamare and Rui Fa, "Multiple Feedback successive Interference Cancellation Detection for Multiuser
MIMO Systems", IEEE transactions on wireless communications, vol.10, no.8, 2011.
[2]. R.Fa, R.C. de Lamare, "Multi- Branch successive interference cancellation for MIMO spatial multiplexing systems: design, analysis
and adaptive implementation"
[3]. Marco Chiani, "Introducing Erasures in Decision-Feedback Equalization to Reduce Error Propagation", IEEE transactions on
communications, vol.45, no.7, 1997
[4]. Ying Hung Gan, Cong Ling, Wai Ho Mow, "Complex Lattice Reduction Algorithm for Low-Complexity MIMO Detection", 2006.
[5]. Performance Improvement Technique for Multiple User Detection in DS-CDMA System using GroupWise Successive Interference
Cancellation (GSIC) International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 1, January 2014
Page No. 3617-3623.
[6]. G. Woodward, R. Ratasuk, M. L. Honig, and P.Rapajic, "Mini-mum mean-squared error multiuser decision-feedback detectors for
DS-CDMA," IEEE Transaction Communication., vol. 50, no. 12, Dec. 2002.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Curtailment of Clustering Using Soq |
Country | : | India |
Authors | : | K. Dinusha || G. Anjali || Ch. S. Surya Raj || M. Raviteja || CH. Gayatri |
Abstract: This paper is about self organizing queue based clustering and its algorithms. Self organizing clustering is more useful compared to spectral clustering. The draw-backs of graph clustering has been overcome by spectral clustering i.e., similarity matrix of a set of data points or nodes, this problem is commonly referred as k/a graph clustering. Experimental results have been clearly shown their dominance over other existing techniques such as Spectral clustering, Graph clustering and k-means algorithm. The experiment will be done by using matlab software.
Key Words: clustering, graph clustering, spectral clustering , k means.
[1]. U. Von Luxburg, "A tutorial on spectral clustering," Statist. Comput., vol. 17, no. 4, pp. 395–416, 2007.
[2]. S. Fortunato, "Community detection in graphs," Phys. Rep., vol. 486, no. 3, pp. 75–174, 2010.
[3]. A. Ng, M. Jordan, and Y. Weiss, "On spectral clustering: Analysis and an algorithm," Adv. Neural Inf. Process. Syst., vol. 2, pp. 849856, 2002.
[4]. J. Shi and J. Malik, "Normalized cuts and image segmentation," IEEE Trans. Patt. Anal. Mach. Intell., vol. 22, no. 8, pp. 888–905, 2000.
[5]. D. Verma and M. Meila, A Comparison of Spectral Clustering Al- gorithms Univ. Washington, Seattle, Tech. Rep. UW-CSE-03-05-01, 2003.
[6]. D.VermaandM.Meila,digit1000.mat2003[Online].Available:http://www.stat.washington.edu/spectral/datasets.html
[7]. Self–Organised queue based clustering by Baohua Sun and Dapeng Wu IEEE SIGNAL PROCESSING LETTERS,VOL.19,NO.12,DECEMBER 2012
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Wireless Sensor Networks 'Future trends and Latest Research Challenges' |
Country | : | India |
Authors | : | Dr. Deepti Gupta |
Abstract: Wireless Sensor networks (WSNs) have become one of the most interesting areas of research in the past few years. A WSN is composed of a number of wireless sensor nodes which form a sensor field and a sink. These large numbers of nodes, having the abilities to sense their surroundings, perform limited computation and communicate wirelessly form the WSNs. Recent advances in wireless and electronic technologies have enabled a wide range of applications of WSNs in military, traffic surveillance, target tracking, environment monitoring, healthcare monitoring, and so on. There are many new challenges that have surfaced for the designers of WSNs, in order to meet the requirements of various applications like sensed quantities, size of nodes, and nodes' au-tonomy. Therefore, improvements in the current technologies and better solutions to these challenges are re-quired. The future developments in sensor nodes must produce very powerful and cost effective devices, so that they may be used in applications like underwater acoustic sensor systems, sensing based cyber physical systems, time critical applications, cognitive sensing and spectrum management, and security and privacy management. This paper also describes the research challenges for WSNs.
Key words: Future trends, recent advances, research challenges, wireless sensor networks
[1]. R. Kay and F. Mattern, "The Design Space of Wireless Sensor Networks" IEEE Wireless Communications Vol.11.No.6 (2004) pp 54–61.
[2]. A. Tiwari, P. Ballal and F.L. Lewis, "Energy efficient wireless sensor network design and implementation for condition based main-tenance" ACM Transactions on Sensor Networks (TOSN) Vol.3.No.1 (2007) pp 17.
[3]. S. Hadim, N. Mohamed, "Middleware: middleware challenges and approaches for wireless sensor networks" Distributed Systems Online, IEEE Vol.7.No.3 (2006) pp 11.
[4]. S. Hussain, S. Schaffner and D. Moseychuck, "Applications of Wireless Sensor Networks and RFID in a Smart Home Environ-ment" Proceedings of the 2009 Seventh Annual Communication Networks and Services Research Conference (2009) pp 153157.
[5]. ChienChung Shen, C. Srisathapornphat and C. Jaikaeo, "Sensor Information Networking Architecture and Applications" IEEE Personal Communications (2001) pp 5259.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Design of Single Edge Triggered D Flip Flop Using GDI Technique |
Country | : | India |
Authors | : | Hardeep Kaur || Sukhdeep Kaur || Er.Poonam Rani |
Abstract: In cmos design goals ,cmos technology provides better results than TTL(Transistor Transistor Logic ).but today due to increasing prominence of portable systems ,speed and low power designs are major issues in high performance digital systems .flip-flops are basic storage elements used in all kind of digital systems. Flip flops are widely used in memory elements, counters and registers also. And these circuits are used to implementation of vlsi chips. So power consumption is the major concern in this which should be improved. This paper proposes a a Design of single edge triggered low power d Flip Flop using GDI(Gate Diffusion Input Technique).As a result using GDI power consumption is Reduced and features the best power delay product. The operation of the D flip flop is analyzed and simulated using Tanner EDA .
Keywords- GDI Technique, negative edge triggered D flip flop, power, High speed.
[1]. Vladimir Stojanovic and vojin G.oklobdizia,Fellow IEEE, Comparative Analysis of Master Slave latches and flip flops for high performance and low system ,IEEE journal of solid state circuits ,vol.34,No.4 April 1999
[2]. Arkadiy Morgenshtein, Alexander Fish and Israel A,Wagner, Gate Diffusion Input- A power efficient method for digital combinational circuits, IEEE Transactions very large scale integration(VLSI) systems,vol.10,No. 5 October 2002
[3]. Kuo-Hsing Cheng and Yung- Hsinang Lin, A dual pulse clock double edge triggered flip flop for low voltage and high speed applications,IEEE,2003
[4]. Arkadiy Morgenshtein, Alexander Fish and Israel A,Wagner, An efficient implementation of D flip flop using GDI Technique, IEEE 2004
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Extraction of Myopotentials in ECG Signal Using Median Filter via Adaptive Wavelet Weiner Filter |
Country | : | India |
Authors | : | Z. Sumaiya Saliha || A.K. Ramanathan |
Abstract: One of the main problems in biomedical signal processing like electrocardiography is the parting of the wanted signal from dins caused by power line interference, body movements, inhalation and exhalation. Many types of digital filters are used to eradicate signal components from unwanted frequencies. It is difficult to apply for filters with fixed coefficients to reduce Biomedical Signal noises, because human behavior is not known depending on time. Adaptive filter technique is required to overcome this problem. In this paper type of adaptive and median filters are considered to decrease the ECG signal noises. Results of simulations in MATLAB are presented. Testing was performed on artificially noised signals. When creating an artificial interference, white Gaussian noise is used, whose power spectrum was modified according to a model of the power spectrum of an EMG signal.
Keywords - Broadband myopotentials (EMG) noise, ECG signal, Median Filter, Wavelet transform, Weiner filter.
[1]. H. A. Kestler, M.Haschka, W.Kratz, F. Schwenker, G. Palm,V.Hombach, and M. Hoher, ―De-noising of high-resolution ECG signals by combining the discrete wavelet transform with the Wiener filter,‖ Comput. Cardiol., vol. 25, pp. 233–236, Sep. 1998.
[2]. P. M. Agante and J. P.Marques de Sa, ―ECG noise filtering using wavelets with soft-thresholding methods,‖ Comput. Cardiol., vol. 26, pp. 535–538, Sep. 999. DOI: 10.1109/CIC.1999.826026.
[3]. D. L. Donoho and J. M. Johnstone, ―Ideal spatial adaptation by wavelet shrinkage,‖ Biometrika, vol. 81, no. 3, pp. 425–455, Sep. 1994.
[4]. C. M. Stein,―Estimation of the mean of a multivariate normal distribution,‖ Ann. Statits., vol. 9, no. 6, pp. 1135–1151, 1981.
[5]. D. L. Donoho and I. M. Johnstone, ―Adapting to unknown smoothness via wavelet shrinkage,‖ J. Amer. Statist. Assoc., vol. 90, no. 432, pp. 1200–1224, Dec.1995.
[6]. S. Mallat, A Wavelet Tour of Signal Processing, 2nd ed. New York: Academic, 1999.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Synthesis of Thinned Planar Concentric Circular Antenna Arrays using Evolutionary Algorithms |
Country | : | India |
Authors | : | Ratna Kumari.U || Prof P. Mallikarjuna Rao || Prof G.S.N.Raju |
Abstract: Optimizing the planar concentric circular antenna array is a very complex problem as it contains more number of variables. Metaheuristic algorithms find the best solution for this as these algorithms perform iterative process which explores efficiently the search space that contains both the global search space and local search space. Here different metaheuristic algorithms were applied for optimizing planar concentric circular antenna array and the results were compared with the results of uniform excitation and spacing. Keywords: Planar Concentric Circular Antenna Array, Metaheuristic algorithms, Side lobe level, Narrow beams.
[1]. "Balanis, C. A., Antenna Theory Analysis and Design, 2nd edition, John Wiley & Sons, 1997"
[2]. "Elliott, R. S., Antenna Theory and Design, Revised Edition, John Wiley, New Jersey, 2003."
[3]. "G.S.N.Raju, Antennas and Propagation, Pearson Education, 2005"
[4]. "Akira Ishimaru, Member IRE, "Theory of Unequally-Spaced Arrays" IRE Transactions on Antennas and Wave Propagation, page no 691-702, November 1962."
[5]. Das, R. (1966). Concentric ring array. IEEE Transactions on Antennas and Propagation, 14(3), 398–400.
[6]. "Xin–SheYang,"A New Metaheuristic Bat–Inspired Algorithm" Apr 23, 2010– arXiv:1004.4170v1[ math.OC] "
[7]. "X.-S. Yang, "Firefly algorithm, stochastic test functions and design optimisation," International Journal of Bio-Inspired Computation, vol. 2, no. 2,pp. 78–84, 2010."
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Finding an Optimum Transmission Range in a multi-sink Wireless sensor network to make a tradeoff between delay and energy consumption |
Country | : | India |
Authors | : | Bharti sharma || Kaushik Ghosh |
Abstract: Increasing the lifetime in wireless sensor networks is a major challenge because the nodes are equipped with low power batteries. The effective way to increase the energy efficiency is to reduce the transmission overheads and to choose accurate routing technique for data transmission. When two communicating nodes are not in range of each other in wireless Sensor networks, they need to rely on multi-hop transmissions. In such a case, packet forwarding or packet routing, becomes imperative. The selected value of radio transmission range considerably affects network topology and node energy consumption. On the one hand, a large transmission range increases the distance progress of data packets toward their final destinations. This is unfortunately achieved at the expense of high energy consumption per transmission. On the other hand, a short transmission range uses less energy to forward packets to the next hop, but a large number of hops are required for packets to reach their destinations. Thus, there exists an optimum value of the radio transmission range. In this paper we have studied the effect of certain factor such as source selection, node deployment, transmission range, number of intermediate hops and forwarding techniques to make a tradeoff between Delay and Energy Consumption
Keywords: Lifetime, Energy Efficiency, Transmission range, energy consumption, intermediate hops.
[1]. V. Raghunathan, C. Schurghers& M. Srivastava, (2002) "Energy-aware Wireless Micro sensor Networks", IEEE Communication Magazine, pp. 40-50.
[2]. G. Pottie, W. Kaiser, (2000) "Wireless Integrated Network Sensors, Communication of ACM", Vol. 43, no. 5, pp. 51-58.
[3]. Singh, Woo &Raghavendra, (1998) Power-aware routing in mobile ad hoc networks, 4th Annual IEEE/ACM Int. Conf. Mobile Computing and Networking, pp. 181–190, Dallas, TX .
[4]. Jyoti Kaurav and Kaushik Ghosh "Effect of Transmitting Radius, Coverage Area and Node Density on the Lifetime of a Wireless Sensor Network" Department of Computer Science & Engineering, Mody University 2012.
[5]. I. Dietrich and F. Dressler, "On the Lifetime of Wireless Sensor Networks," ACM Transactions on Sensor Networks (TOSN), vol. 5, no. 1, pp. 1–39, February 2009.
[6]. R. Ramanathan and R. Rosales-Hain, "Topology control of multihop wireless networks using transmit power adjustment," in Proc. IEEE INFOCOM, Mar. 2000, pp. 404–413.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Face Recogition by Using Gabor Feature Extraction and Neural Networks |
Country | : | India |
Authors | : | B.Gopika || K.Srilaxmi || D.Alekhya || B.Bhaskar Rao || B.Rama Mohan |
Abstract: Face recognition is successful by using Gabor filter and neural networks. In this paper we present a biometric system of face detection and recognition in color images. In this 40 different Gabor filters are applied on an image will result 40 different images with different orientations. This paper addresses a novel algorithm in order to detect face features and extract their corresponding geometric points. In those 40 filtered images maximum intensity points are calculated and mark them as fiducially points. To reduce those Fiducially points distance between those points is considered. By using distance formula distances between those reduced points are calculated. Then distances between them are compared with the pre-defined database. If that distance exists that corresponding image will be recognized. The image will be convolved with Gabor filters by multiplying the image by Gabor filters in frequency domain. Face detection and recognition has many applications in a variety of fields such as security systems, video conferencing and identification. The neural Network employed for face recognition is based on the Multi Layer Perception (MLP) architecture.
Keywords: Face recognition, Distance formula, Gabor filter, neural networks, Images
[1]. S. Khan fir, Y. B. Jemaa, "Automatic facial features extraction for face recognition by neural networks", 3rd International Symposium on Image/Video Communications over fixed and mobile networks (ISIVC), Tunisia 2006.
[2]. R. L. Hsu, M. A. Mottaleb and A. K. Jain, "Face detection in color images", IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 24,No. 5, pp. 696-706, May 2002.
[3]. W. Zhao, R. Chellappa, P. J. Phillips, and A. Rosenfeld."Face recognition: A literature survey. ACM Computing Surveys", 35(4): pages 399–458, 2003.
[4]. A.J.Goldstein, L.D. Harmon, and A.B Lesk, "Identification of Human Faces," Proc. IEEE, May 1971, Vol. 59, No. 5, 748-760.
[5]. H. A. Rowley, S. Baluja, T. Kanade, "NeuralNetwork-Based Face Detection", IEEE Trans. On Pattern Analysis and Machine Intelligence, vol.20, No. 1, Page(s). 39-51, 1998.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Band Pass Filtering Technique using Sallenkey Filter |
Country | : | India |
Authors | : | Nidhi |
Abstract: This paper contributes an understanding of pulse processing of nuclear detectors which is
accomplished by analog pulse shaping analysis filter and common overview of the Sallenkey architecture
succeeded by low pass and high pass filters.The interrogation encompasses holding quality factor, gain and mid
frequency of filter self-sustaining each other and maintaining other critical condition of filter, keeping the filter
stable.
Keywords: Band Pass Filter, Gain, Mid frequency, Quality factor, Stability.
[1]. TreyimaD.Kurvev, JhonsonA.Mise,Benard A. Atsuwe."Implementation of an active filter AC Band-Pass filter at varying Quality
factors using MATLAB", International Journal Of Scientific and Technology research volume -3, ISSUE-5, May 2014.
[2]. James Karki."Analysis of the Sallen-Key Architecture",Application Report for Texas Instrument, July 1990,sloa024.
[3]. Thomas Kugelstadt. "Active Filter Design Techniques", Fundamentals of Low Pass Filters, Texas Instrument.
[4]. Mark Sauerwald, "Designing Active High Speed Filters",National Semiconductor Corporation, February 2005.
[5]. Raman K. Attri. "Practical Design Evaluation of Extremely Narrow Band-Pass Filter Topologies",R. Attri Instrumentation Design
Series (Electronics), Paper No.7, September, 2005.
[6]. Thomas Kugelstadt. "Active Filter Design Technique: Op-amps for everyone",Texas Instrument Design reference SLOD006B, Aug
2002.
[7]. Kerry Lacanette."A Basic Introduction to filter- Active, Passive and Switched Capacto", National Semiconductor, Application note
779,1991.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Dual Band E-Shape Microstrip Antenna for GPS Application |
Country | : | India |
Authors | : | Shivkant Thakur || Nawal Kishore |
Abstract: A dual band E-shape microstrip antenna has simulated and analysed at frequencies 1.625GHz and 1.725 GHz. The antenna was analysed to operate at 1.625 GHz and with reconfigurability of frequency it will operate at 1.725 GHz. The physical parameter of the structure has been analysed using Zealand IE3D simulator. Return loss (S11), VSWR (voltage standing wave ratio has been carried out. The return loss of E-shape microstrip antenna has been less then -10dB at frequencies 1.625 GHz and 1.725 Hz. The E-shape microstrip antenna is very promising for various modern communication applications such as wireless and satellite application. Keywords: E-shaped; microstrip patch antenna; return loss; Zealand IE3D simulator; VSWR; dual band
[1] W.L. Stutzmanand G.A Thiele, "Antenna Theory and Design", 2nd ed. New York:Wiley 1998.
[2] C.A Balanis, "Antenna Theory" , 2nd ed. New York: John Wiley & Sons, Inc., 1997.
[3] Kin-Lu Wong, "Compact and Broadband Microstrip Antennas" , Jon Wiley & Sons, inc., 2002.
[4] J.R. James, P.S. Hall, and C.Wood, "Microstrip Antenna Theory and Design" , Peter Perigrinus, London,1981.
[5] K.C.Gupta and A.b.norwood, "Microstrip Antenna Design" , Norwood, MA: Artech House, 1988.
[6] Shobhit K. Patel and Y.P Kosta "E-shaped Microstrip Antenna Design for GPS Application" International Conference on Current Trends in Technology, "NUiCONE-2011‟.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | QCA Binary Adder Implementation on FPGA |
Country | : | India |
Authors | : | S.Kishor Krishna Kumar |
Abstract: The area and complexity are the major issues in circuit design. Here, adder design is proposed based on Quantum dot Cellular Automata (QCA) that reduces number of QCA cells and area compare to previous designs. The quantum dot cellular automata can implement digital circuits with faster speed, smaller size and low power consumption. The QCA cell is a basic building block of nanotechnology that can be used to make gates, wires and memories. The basic logic circuits used in this technology are the inverter and the Majority Gate (MG), using this other logical circuits can be designed. In this project, stop Watch timer is designed and analyzed based upon adder and is implemented on FPGA. The proposed method can be used to minimize area and complexity. These circuits were designed by majority gate and implemented by QCA cells.
Keywords: quantum dot cellular automata,Carry Look Ahead Adder,one-bit QCA adder
[1]. K. Kong, Y. Shang, and R. Lu, "An optimized majority logic synthesis methology for quantum-dot cellular automata," IEEE Trans. Nanotechnol., vol. 9, no. 2, pp. 170–183, Mar. 2010.
[2]. K. Walus, G. A. Jullien, and V. S. Dimitrov, "Computer arithmetic structures for quantum cellular automata," in Proc. Asilomar Conf.Sygnals, Syst. Comput., Nov. 2003, pp. 1435–1439.
[3]. J. D. Wood and D. Tougaw, "Matrix multiplication using quantumdot cellular automata to implement conventional microelectronics," IEEE Trans. Nanotechnol., vol. 10, no. 5, pp. 1036–1042, Sep. 2011.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Waveguide Feed Microstrip Patch Antenna |
Country | : | India |
Authors | : | Amit R Tanchak || Rushit D. Trivedi |
Abstract: This paper shows a novel approach of feeding the microstrip patch antenna by using a waveguide.Compared with conventional antenna feeding techniques, this technique have more advantages and better prospects because as we know that the method we use for feeding the microstrip patch antenna are having a coaxial or a microstrip line, have the limitation for high frequency applications. Here we can use waveguide to overcome the disadvantages of microstrip feed or coaxial feedbecause the waveguide are used at high frequency operations. So in this way we can take advantage of microstrip patch antenna and waveguide both. In this paper the frequency for optimization we used is 2.4 GHz frequency
Keywords: Microstrip patch, Waveguide fed, High Frequency Structure Simulation(HFSS).
[1]. J. Q. Howell, ―Microstrip antennas,‖ presented at the IEEE AntennasPropag. Soc. Int. Symp., 1972.
[2]. M. D. van Wyk and K. D. Palmer, ―Bandwidth enhancement of microstrippatch antennas using coupled lines,‖ Electron. Lett., vol. 37,no. 13, pp. 806–807, Jun. 2001.
[3]. R. Zaker, C. Ghobadi, and J. Nourinia, ―Bandwidth enhancement ofnovel compact single and dual band-notched printed monopole antennawith a pair of L-shaped slots,‖ IEEE Trans. Antennas Propag., vol. 57,no. 12, pp. 3978–3983, Dec. 2009.
[4]. K. G. Thomas and M. Sreenivasan, ―A simple ultrawideband rectangularprinted antenna with band dispensation,‖ IEEE Trans. AntennasPropag., vol. 58, no. 1, pp. 27–34, Jan. 2010.
[5]. K. R. Carver and J. W. Mink, ―Microstrip antenna technology,‖ IEEETrans Antennas Propag., vol. 29, no. 1, pp. 2–23, Jan. 1981.
[6]. E. Lier, ―Improved formulas for input impedance of coax-fed microstrippatch antennas,‖ Proc. Inst. Elect. Eng. H, vol. 129, no. 4, pp.161–164, Aug. 1982.
[7]. S. K. Palit and A. Hamadi, ―Design and development of wideband anddual-band microstrip antennas,‖ Proc. Inst. Elect. Eng., Microw. Antennas Propag., vol. 146, no. 1, pp. 35–39, Feb. 1999.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | An Automated Anti-Theft and Misusealerting System for ATMs |
Country | : | India |
Authors | : | S.Karthikeyan || S.Sainath || K.P.Tharun Aswin || K.Abimanyu |
Abstract: In this paper we intend to implement a real time face detection system in ATMs to avoid robbery and attacks occurring inside the ATM.The whole operation is programmed in a Raspberry pi board which is a combination of SoC with GPU based architecture.The User has to pass through a security camera check placed at the ATM entry. The camera detects the face features and matches the captured image with the trained Haar features using an image processing module. After confirming that the user is not wearing any masks or helmet it opens the Entry door for the user to access the ATM.Vibration sensors are placed, one on the entry door and other on the ATM machine to trigger an alarm just in case a break-in occurs.ATM doors will be closed using a DC Motor and then a message will be sent to the nearby police station and to the corresponding bank through the GSM.The image processing tasks is completed using the SimpleCV and OpenCV libraries developed by Intel, which is compatible with the Raspberry Pi board. The whole operation is programmed in a raspberry pi board which can be used for Independent Functions.
Keywords: ATM, Face Detection, Haar Classifier, GSM, Raspberry pi, SimpleCV, Viola-Jones Algorithm.
[1]. P. Viola and M. J. Lee, "Robust real-time face detection," Int. J.Comput. Vis., vol. 57, no. 2, May 2004, pp. 137-154.
[2]. P. Viola and M. Jones, "Rapid object detection using a boosted cascade of simple features," in Proc. IEEE Computer Vision Pattern Recognition, 2001, vol. 1, pp. 511–518.
[3]. Phillip I.W., Dr. John F. "Facial feature detection using haar classifiers", JCSC 21, 4 (April 2006)
[4]. K. T. Talele, S. Kadam, A. Tikare, "Efficient Face Detection using Adaboost", IJCA Proc on International Conference in Computational Intelligence", 2012
[5]. G. Bradski and A. Kaehler, "Learning OpenCV: Computer Vision with the OpenCV Library", O'Reilly Media, Inc., 2008.
[6]. http://opencv.org/
[7]. Kim, Bo-Ra, "Domestic ATM status and meanings", Payment and Settlement, and IT, Vol. 44, pp. 76, 2011.
[8]. Daniel Hefenbrock, "Accelerating Viola-Jones face detection to FPGA-level using GPUs", Proceedings of the 2010 18th IEEE Annual International Symposium on Field-Programmable Custom Computing Machines, 2010, pp.11-18.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | An Image Encryption and Decryption using Chaos Algorithm |
Country | : | India |
Authors | : | G.Chaitanaya || B.Keerthi || A.Saleem || A.Trinadh Rao || K.T.P.S.Kumar |
Abstract: In a well-developed digital world, security plays a key role in transmission of images. To overcome these challenges Encryption and Decryption techniques need to be applied. In this paper we have applied the chaotic encryption and chaotic decryption on an image by doing pixel shuffling and using chaotic maps. Chaotic nature i.e., randomness property is present in both Henon map and Arnold cat map. Pseudorandom values generation plays an important key role in Henon maps and iteratively pixel shuffling is done in Arnold cat map. A sorting Technique is followed on key values produced by Henon map. By using those sorted positions, shuffle the pixel values generated by Arnold cat map iteratively. In this way the images are provided with high security for confidential transmission.
Keywords: Encryption and Decryption, Chaotic map, Pseudo-Random values, Pixel shuffling, sorting.
[1]. Mintu "An Image Encryption & Decryption Approach Based on Pixel Shuffling Using Arnold Cat Map & Henon Map" by Agyan Kumar Prusty, AsutoshPattanaik, Swastik Mishra published in 2013 International Conference on Advanced Computing and Communication Systems(ICACCS-2013), Dec.19-21, 2013, Coimbatore, India,IEEE2013.
[2]. "Chaos Image Encryption using Pixel shuffling" by Manjunath Prasad and K.L.Sudha in CCSEA 2011,CS &IT 02 DOI: 10.5121/csit.2011.1217
[3]. "An Efficient Image Cryptographic Technique by Applying Chaotic Logistic Map and Arnold Cat Map" byS.VaniKumari and G.Neelima in IJARCSSE , september 2013 , ISSN: 2277 128X.
[4]. M. Sharma and M.K. Kowar, "Image Encryption Techniques Using Chaotic Schemes: a Review." International Journal of Engineering Science and Technology, vol. 2, pp. 2359–2363, 2010.
[5]. Chengqing Li, Shujun Li, Muhammad Asim, Juana Nunez, Gonzalo Alvarez, Guanrong Chen. On the "Security defects of an image encryption scheme."
[6]. Image and Vision Computing, vol. 27, pp. 13711381, 2009.