Volume-3 (International Conference on RECENT TRENDS IN ENGINEERING AND MANAGEMENT)
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Gesture Controlled Fire Extinguisher Robot with Audio and Video Capture |
Country | : | India |
Authors | : | Dr. P. Siva Kumar, B.R.Ratheesh, B.Gobinath, K.Muthu Kumaran, S.Venkataraman |
Abstract: The design and implementation of this project is mainly based on human machine interface. This is a wireless gesture controlled system. In this project, we are designing a robot which moves according to the gestures. This gesture acts as the input signal for the robot with the help of flex sensors. Thus the movement of the robot is controlled by the flex sensors which are fixed in the fingers. The robot is equipped with wireless camera for capturing video and audio which is transmitted to the receiver connected to the personal computer. Those who operate this robot can view the robot surroundings in the personal computer. The fire sensor fixed along with the robot senses fire and switches ON the fire extinguisher immediately. This gesture controlled firefighting robot can replace the fire fighters to perform the firefighting task successfully.
Keywords:- Gesture, Flex Sensor, Fire Fighting, Camera, Laptop.
[1] Liu, T., Guo, H., and Wang, Y., "A new ap-proach for color-based object recognition with fusion of color models", Congress on Image and Signal Processing Conference, Sanya-China, vol. 3, pp. 456-460, May 2008.
[2] Monika Jain, Aditi, Ashwani Lohiya, Moham-mad Fahad Khan, Abhishek Maurya., "Wireless Gesture Control Robot: An Analysis", Interna-tional Journal of Research in Computer and Communication Engineering, Vol.1, Issue 10, December 2012. http://en.wikipedia.org/wiki/Fire Fighting robot.
[3] D. B. Lopez, F. H. Mendoza and J. M. Ramirez, "Noise in color digital images,"IEEE Circuits and Systems, Midwest Symposium on, Aug.1998, pp. 403-406.
[4] Chee Fai Tan, S.M. Liew, M.R. Alkahari, S.S.S. Ranjit, M.R. Said, W. Chen, G.W.M. Rauter-berg, D. Sivakumarand Sivarao, "Fire Fighting Mobile
[5] Robot: State of the Art and Recent De-velopment", Australian Journal of Basic and Applied sciences, 2013 ISSN 1991-8178.
[6] Amano, H., 2000. "Present Status and Problems of Fire Fighting Robots", SICE 2002, Proceed-ings of the 41st SICE Annual Conference.
[7] Dhiraj Singh Patel, Dheeraj Mishra, Devendra Pandey, Ankit Sumele, "Mobile Operated Spy Robot", National Conference on Machine Intel-ligence Research and Advancement (NCMIRA, 12), India.
[8] Cannan.J and Hu.H, "Human-Machine Interac-tion (HMI): A Survey".Available: http://www. dces.essex.ac.uk/staff/hhu/Papers/CES-508%20HMI-Survey.pdf Http://en.wikipedia.org/wiki/spy robot
[9] T. Feng, X. Lufeng and T. Daoling, \An ultra-sonic obstacle avoidance system for Fire Fighting robot," IEEE Proceedings of the 4th World Congress on Intelligent Control and Au-tomation, Vol. 2, June 2002, pp. 1219-1222.
[10] Jung-Hyun Park, Byung-Wook Kim, Dong-Jo Park and Moon-June Kim, "A System Architec-ture of Wireless Communication for Fire-Fighting Robots", Proceedings of the 17th World Congress The International Federation of Automatic Control, Seoul, Korea, July 6-11, 2008.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | DESIGN AND IMPLEMENTATION OF A SINGLE PHASE MULTILEVEL INVERTER WITH BATTERY BALANCING |
Country | : | India |
Authors | : | P. Prabaharan, K. Gobbi |
Abstract: The voltage source inverters produce a voltage or a current with levels either 0 or ±V dc they are known as two level inverters. To obtain a quality output voltage or a current waveform with a minimum amount of ripple content, they require high switching frequency along with various pulse width modulation (PWM) strategies. In high power and high voltage applications, these two level inverters, however, have some limitations in operating at high frequency mainly due to switching devices should be used in such a manner as to avoid problems associated with their series- parallel combinations that are necessary multilevel structure tpability of handling high voltages and currents. It may be easier to produce a high power, high voltage inverter with the because of the way in which device voltage stresses are controlled in the structure. Increasing the number of voltage levels in the inverters without requiring higher ratings on the individual devices can increase the power rating. The unique structure of Multi-level voltages sources inverters allow them to reach high voltages with low harmonics without the use of transformer or series connected synchronized switching devices. As the number of voltage levels increases, the harmonic content of output voltage waveform decreases significantly. In this paper, the general structure of multi-level converter is to synthesize a near sinusoidal voltage from several levels of dc voltages, typically from capacitor voltage sources. A number of levels increases, the synthesized output waveform has more steps, which provides a staircase wave that approaches a desired waveform. Also, as steps are added to waveform, the harmonic distortion of the output wave decreases, approaching zero as the number of voltage levels increases.
[1] T. Hirose and H. Matsuo, "Standalone hybrid wind–solar power generation system applying dump power control without dump load," IEEE Trans. Ind. Electron., vol. 59, no. 2, pp. 988–997, Feb. 2012.
[2] H. Kanchev, D. Lu, F. Colas, V. Lazarov, and B. Francois, "Energy management and operational planning of a microgrid with a PV-based activegenerator for smart grid applications," IEEE Trans. Ind. Electron., vol. 58, no. 10, pp. 4583–4592, Oct. 2012.
[3] Z. Haihua, T. Bhattacharya, T. Duong, T. S. T. Siew, and A. M. Khambadkone, "Composite energy storage system involving battery and ultracapacitor with dynamic energy management in microgrid applications," IEEE Trans. Power Electron., vol. 26, no. 3, pp. 923–930, Mar. 2011.
[4] H. Qian, J. Zhang, J. S. Lai, andW. Yu, "A high-efficiency grid-tie battery energy storage system," IEEE Trans. Power Electron., vol. 26, no. 3, pp. 886–896, Mar. 2011.
[5] S. Kouro, M. Malinowski, K. Gopakumar, J. Pou, L. G. Franquelo, B.Wu, J. Rodriguez, M. A. Pérez, and J. I. Leon, "Recent advances and industrial applications of multilevel converters," IEEE Trans. Ind. Electron., vol. 57, no. 8, pp. 2553–2580, Aug. 2010.
[6] C. Abbey and G. Joos, "Supercapacitor energy storage for wind energy applications," IEEE Trans. Ind. Appl., vol. 43, no. 3, pp. 769–776, May/Jun. 2007.
[7] B. Y. Chen and Y. S. Lai, "New digital-controlled technique for battery charger with constant current and voltage control without current feedback," IEEE Trans. Ind. Electron., vol. 59, no. 3, pp. 1545–1553, Mar. 2012.
[8] L. R. Chen, C. M. Young, N. Y. Chu, and C. S. Liu, "Phase-locked bidirectional converter with pulse charge function for 42-V/14-V dualvoltage PowerNet," IEEE Trans. Ind. Electron., vol. 58, no. 5, pp. 2045– 2048, May 2011.
[9] Y. H. Liu and Y. F. Luo, "Search for an optimal rapid-charging pattern for Li-ion batteries using the Taguchi approach," IEEE Trans. Ind. Electron., vol. 57, no. 12, pp. 3963–3971, Dec. 2010.
[10] L. R. Chen, "Design of duty-varied voltage pulse charger for improving Li-ion battery-charging response," IEEE Trans. Ind. Electron., vol. 56, no. 2, pp. 480–487, Feb. 2009.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | METHODOLOGY FOR COMPARING REACTIVE ROUTING PROTOCOLS TO DETECT AND PREVENT THE WORMHOLE ATTCAK USING PATH TRACING APPROACH |
Country | : | India |
Authors | : | R. VEMBU, R. SYED HAYATH |
Abstract: Wireless ad-hoc network is a self-configuring network of mobile routers (and associated hosts) connected by wireless links.There is no infrastructure,because of that adhoc network is responsible to many attacks.A wormhole attack causes severe damage to the adhoc network and it ruin the whole communication in the adhoc network.High probability of packet dropping is occur,when the source node chooses the route which contain malicious node.To detect and prevent the wormhole attack in manet,here we are using path tracing algorithm as an extension of AODV and DSR protocol.This algorithm runs on each and every node in the path during route discovery process of DSR and AODV.Based on RTT value,we are going to calculate per hop distance and by using the frequency appearance count we are calculates the wormhole link.To identify the wormhole attack,we are computing per hop distances of its neighbour in a path of each every node with previous per hop distance.After calculating the per hop distance ,we compare it with the maximum threshold range,if the value exceeds the threshold value ,then the wormhole is detected.wormhole link is to detect by using frequency appearance count. A network simulator (NS-2) results prove that the proposal detects the wormhole attack in a network more effectively.
Keywords:- Ad hoc networks, AODV,DSR, Wormhole Attack, Path Tracings
[1] Bharat Bhargava, Ruy de Oliveira, Yu Zhang, Nwokedi C. Idika, 2009 "Addressing Collaborative Attacks and Defense in Ad Hoc Wireless Networks" 29th IEEE International Conference on Distributed Computing Systems Workshops, pp. 447-450.
[2] Bounpadith Kannhavong, Hidehisa Nakayama, Yoshiaki Nemoto, and Nei Kato, 2007 "A Survey of Routing Attacks in Mobile Ad Hoc Networks" IEEE Transaction on Wireless Communication, Volume 14, Issue 5, pp. 85-90.
[3] Charles Perkins and Elizabeth Royer, 1999 "Ad Hoc On-Demand Distance Vector Routing" In Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications, pp.90–100.
[4] Chiu, HS; Wong Lui, KS, 2006 "DelPHI: Wormhole Detection Mechanism for Ad Hoc Wireless Networks" 1st International Symposium on Wireless Pervasive Computing.
[5] David B. Johnson and David A. Maltz, 1996 "Dynamic Source Routing in Ad Hoc Wireless Networks" Mobile Computing, The Kluwer international, Volume 353, pp. 153- 181.
[6] Dezun Dong, MoLi, Yunhao Liu, Xiang-Yang Li, and Xiangke Liao, 2011 "Topological Detection on Wormholes in Wireless Ad Hoc and Sensor Networks" IEEE/ACM Transactions on Networking, Volume 19, Issue 6, pp. 1787-1795.
[7] Josh Broch, David A Maltz, David B Johnson, Yih-Chun Hu, Jorjeta Jetcheva, 1998 "A Performance Comparison of Multihop Wireless Ad Hoc Network Routing Protocols", Proceedings of the 4th Annual ACM/IEEE International Conference on Mobile Computing and Networking, pp. 85- 97.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Multibiometric Recognition and Verification Using Fingerprint and Lip Images |
Country | : | India |
Authors | : | E. Jebamalar Leavline, G.Ravana Periyar, D.Asir Antony Gnana Singh |
Abstract:Biometric authentication is an excellent way to security now days. Now it has been proven that each and every individual has its own biometric feature such as Fingerprint, Iris, Lips, Palm, Face and Voice which is different from other. Biometric recognition is used to identify their individuals and verify their identity. In this work two biometric modalities namely lip and fingerprint are used to improve the accuracy of recognition. In lip recognition features of lip region are detected to overcome the shadow, beard and rotation problems. In the finger print recognition minutiae score matching is used and fingerprint verification is done by extracting and matching minutiae. Support vector machine is employed for classification in this multi-biometric recognition. Improvement in recognition results is obtained when lip biometric is fused with Fingerprint biometric. We show that our proposed methods are effective for a variety of different recognition applications across security and forensics-oriented computer vision; including biometrics, object recognition, and content-based image retrieval
KEY TERMS: Biometric, Lip recognition, Fingerprint recognition, Multi-biometric, Fusion, SVM, Minutiae.
[1] A.Ross, K.Nandakumar and A.K. Jain, Handbook of Multibiometrics‖, New York: Springer,2006.
[2] Jain A.K, Dass SC and Nandakumar K, ―Soft Biometric Traits for Personal Recognition Syst Proc of International Conference on Biometric Authentication, Hong Kong: 731-738, 2004.
[3] Brunelli, R., and Falavigna, D. ―Person Identification Using Multiple Cues‖, IEEE Trans. on Pattern Analysis and Machine Intelligence (Oct. 1995). IEEE, NY, 955–966.
[4] Nazmeen Bibi Boodoo,―R K Subramanian Robust Multi-biometric Recognition Using ace and Ear Images‖ (IJCSIS) International Journal of Computer Science and Information Security,Vol. 6, No. 2, 2009.
[5] Ravi. J, K. B. Raja, Venugopal. K. R ―Fingerprint Recognition using Minutia score Matching‖ IJEST vol.1(2), 2009.
[6] Walter J. Scheirer, Member, IEEE, Anderson deRezende Rocha, Member, IEEE, Jonathan Parris,Student Member, IEEE, and Terrance E. Boult, Member, IEEE ―Learning for Meta-Recognition‖ [
7] L. Ravi Kumar, S. Sai Kumar, J. Rajendra Prasad, B. V. Subba Rao, P. Ravi Prakash ―Fingerprint Minutia Match Using Bifurcation Technique‖ S Sai Kumar et al , International Journal of Computer Science & Communication Networks,Vol2(4)
[8] Yun-Fu Liu, Student Member, IEEE, Chao - Yu Lin, and Jing-Ming Guo, Senior Member, IEEE ―Impact of the Lips for Biometrics‖
[9] Michael Kass, Andrew Witkin, and Demtrri Terzopoulos . ―Snake : Active contour models ,‖ Int. of Computer Vision, 321-331, 1988.
[10] Arun Ross‖An Introduction to Multibiometrics ‖appeared in proc.of 15th European signal processing conference [EUSIPCO], (poznan, poland) september 2007
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Overhead in Manets with Secure Communication |
Country | : | India |
Authors | : | Munusamy.e, thirumal.l |
Abstract: Traditional routing protocols in Mobile Ad hoc Network (MANET) send periodic messages to realize the changes in topology. Sending periodic messages cause overhead. Due to high mobility of nodes in mobile ad hoc networks (MANETs), there exist frequent link breakages which lead to frequent path failures and route discoveries. In a route discovery, broadcasting is a fundamental and effective data dissemination mechanism, in this paper; we propose a neighbor coverage-based probabilistic rebroadcast protocol for reducing routing overhead in MANETs. In order to effectively exploit the neighbor coverage knowledge. We can obtain the more accurate additional coverage ratio by sensing neighbor coverage knowledge. We also define a connectivity factor to provide the node density adaptation. By combining the additional coverage ratio and connectivity factor, we set a reasonable rebroadcast probability. Our approach combines the advantages of the neighbor coverage knowledge the probabilistic mechanism and security protocols which can significantly decrease the number of retransmissions so as to reduce the routing overhead, As well as security is also a challenging factor in ad hoc networks. Resisting flooding attacks in ad hoc networks these technique exploit secure data communication.
Keywords:- Wireless Networks, Mobile Ad hoc Networks.
[1]. R. Bar-Yehuda, 0. Goldreich, and A. Itai. Efficient emulation of single-hop radio network with collision detection on multi-hop radio network with no collision detection. Distributed Computing, 5(2):67-72, 1991.03-2013.
[2]. S. Alagar, S. Venkatesan, and J. Cleveland. Reliable broadcast in mobile wireless networks. In Mil- itary Communications Conference, MILCOM Conference Record, volume 1, pages 236-240, 1995.
[3]. B. Williams and T. Camp, "Comparison of broadcasting techniques for mobile ad hoc networks," in MobiHoc, 2002.
[4]. W. Lou and J. Wu, Localized Broadcasting in Mobile Ad Hoc Networks Using Neighbor Designation. in Mobile Computing Handbook, CRC Press, 2005,
[5]. D.P. Agrawal and Q-A Zeng. "Introduction to Wireless and Mobile Systems," Brooks/Cole Publishing, ISBN No. 0534-40851-6, 436 pages, 2003.
[6]. S. Giordano and W. W. Lu, "Challenges in mobile ad hoc networking,"IEEE Communications Magazine, vol. 39, no. 6, pp. 129–181, June 2001.
[7]. W. Lou and J. Wu, "On reducing broadcast redundancy in ad hoc wireless networks," IEEE Transactions on Mobile Computing, vol. 1, no. 2, pp. 111–123, Apr.-June 2002.
[8]. Y. C. Tseng, S. Y. Ni, Y. S. Chen, and J. P. Sheu, "The broadcast storm problem in a mobile ad hoc network," Wireless Networks, vol. 8, no. 2/3, pp. 153–167, Mar.-May 2002.
[9]. B. Williams and T. Camp, "Comparison of broadcasting techniques for mobile ad hoc networks," Proceedings of the Third ACM International Symposium on Mobile Ad Hoc Networking & Computing (MobiHoc), 2002, pp. 194–205
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Multibiometric Cryptosystem Based On Fuzzy Vault with Biohashing |
Country | : | India |
Authors | : | Kannan.D, Thilaka.K |
Abstract: Multibiometrics is the combination of the more than one Unibiometric trait (Ex- Face, Fingerprint, and iris). The Multibiometrics systems are being used in the large scale bio metric applications (FBI, IAFIS, and UIDAI). It is having the several advantages such as lower error rates and large population coverage compared to the Unibiometric systems. The Fuzzy vault construct is a biometric cryptosystem that secures both the secret key and the biometric template by binding them with in a cryptographic frame work. The correlation attack is that allows linking two vaults of the same biometric. It Posses the serious privacy risks that have not been sufficiently addressed. The family of has functions protecting the fuzzy vault against correlation attack and improving the matching performance of the biometric crypto system. The proposed work improves the matching performance and protecting the fuzzy vault against correlation attack.
Keywords:-Multibiometrics, Fuzzy vault, Key Binding, Correlation Attack.
[1]. A.Jain, K. Nandakumar, and A. Nagar, ―Biometric template security,‖ EURASIP Journal on Advances in
[2]. signal processing,vol.2008,pp.1-17,2008
[3]. A. Nagar, K. Nandakumar, and A. K. Jain, ―Multibiometric cryptosystems,‖Department of Computer Science and Engineering, Michigan State University, Tech. Rep. MSU-CSE-11-4, 2011.
[4]. A.Ross ,K.Nandakumar, and A.K.Jain Handbokk of biometrics New York :Springer 2006.
[5]. Anil K .Jain,Abhishek Nagar, Karthik Nandakumar ―Multibiometric Cryptosystems Based on Feature – Level Fusion ,2012.
[6]. Arun Ross , James Reisman and Anil K .Jain ―Fingerprint Matching Using Feature Space Correlation‖ 2002.
[7]. Bhaskar Gupta ,Arun Kumar Tiwari ―Face Detection Using Gabor feature Extraction Ad Artificial Neural Network‖2002
[8]. Christian Rathageb and Christoph Bush ‗Multibiometric Template Protection and Challenges‖2008
[9]. Cengiz Orencik, Thomas E.petersen,Erkay Savas Mehmet Savas ―Securing fuzzy vault schemes Through Biometric hashing‖,Faculty of Egineering and Natural sciences Sabancr University, 2010.
[10]. Y.Sutcu, Q. Li, and N. Memon, ―Secure Biometric Templates from Fingerprint-Face Features,‖ in Proc.CVPR workshop on Biometrics,Minneapolis, June 2007.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | FPGA Implementation of Digital Fir Filter Based On Truncated Multiplier |
Country | : | India |
Authors | : | Senthilkumar.M , Ramani S. |
Abstract: Low-cost finite impulse response (FIR) filter designs are presented using the concept of truncated multipliers. The FIR filter coefficient are used to minimize the area cost .the optimization is used rounding the filter coefficient .In a direct FIR filter structure is implemented using Multiple constant multiplication accumulation and truncation (MCMAT).We present low-cost implementations of FIR filters based on the truncated multipliers. The MCMAT module is realized by accumulating all the partial products (PPs) where unnecessary PP bits (PPBs) are removed without affecting the final precision of the outputs. Comparisons with previous FIR design approaches that the proposed design achieve the best area and power results.
Index Terms : DSP, faithful rounding, FIR, VLSI, PP PG
[1] Hsiao S.F,Zhang Jian J.H, and Chen C.H, MAY 2013, Low-Cost FIR Filter Designs Based on Faithfully Rounded Truncated Multiple Constant Multiplication/Accumulation, VOL. 60, NO. 5 , pp no 287-292
[2] F. Xu, C. H. Chang, and C. C. Jong, ―Contention resolution—A new approach to versatile subexpressions sharing in multiple constant multiplications,‖ IEEE Trans. Circuits Syst. I, Reg. Papers, vol. 55, no. 2, pp. 559–571, Mar. 2008.
[3] M. M. Peiro, E. I. Boemo, and L. Wanhammar, ―Design of high-speed multiplierless filters using a nonrecursive signed common subexpression algorithm,‖ IEEE Trans. Circuits Syst. II, Analog Digit. Signal Process., vol. 49, no. 3, pp. 196–203, Mar. 2002.
[4] C.-H. Chang, J. Chen, and A. P. Vinod, ―Information theoretic approach to complexity reduction of FIR filter design,‖ IEEE Trans. Circuits Syst. I, Reg. Papers, vol. 55, no. 8, pp. 2310 2321, Sep. 2008.
[5] P. K. Meher, ―New approach to look-up-table design and memory-based realization of FIR digital filter,‖ IEEE Trans. Circuits Syst. I, Reg. Papers, vol. 57, no. 3, pp. 592– 603, Mar. 2010.
[6] Y. Voronenko and M. Puschel, ―Multiplierless multiple constant multiplication,‖ ACM Trans. Algorithms, vol. 3, no. 2, pp. 1–38, May 2007.
[7] C.-Y. Yao, H.-H. Chen, T.-F. Lin, C.-J. J. Chien, and X.-T. Hsu, ―A novel common-subexpression-elimination method for synthesizing fixed-point FIR filters,‖ IEEE Trans. Circuits Syst. I, Reg. Papers, vol. 51, no. 11, pp. 2215 2221, Sep. 2004.
[8] F. Xu, C. H. Chang, and C. C. Jong, ―Contention resolution algorithms for common subexpression elimination in digital filter design,‖ IEEE Trans.Circuits Syst. II, Exp. Briefs, vol. 52, no. 10, pp. 695–700, Oct. 2005.
[9] A. Blad and O. Gustafsson, ―Integer linear programming-based bit-level optimization for high-speed FIR filter architecture,‖ Circuits Syst. Signal Process., vol. 29, no. 1, pp. 81–101, Feb. 2010..
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Multibody Dynamic Simulation Study of Automotive Car Seat Slider Mechanism |
Country | : | India |
Authors | : | Praise Tom, M.Ramalingam, Kannan.S |
Abstract: A Multibody system consists of mechanical linkages and these linkages are interconnected with Rigid Bodies or Flexible Bodies approach and due to linkages dynamic behaviour they may experience translational and rotational displacements. Multibody Dynamic analysis is used to evaluate a Multibody system. It is extensively used in Automotive, Aerospace, and Robotics domain for investigating the dynamic behaviour of the system. This study deals with design and development of new seat slider mechanism and simulation by using the Multibody Dynamics. In this study, the behaviour of seat mechanism is predicted and corrected to increase the performance of the seat mechanism. The study includes theoretical calculation, tolerance stack-up, Multibody Dynamic simulation study using ADAMS (extraction of forces) and validated with the experimental data.
Keywords— Seat Slider, Multibody Dynamics, friction, stiction
[2] M. Grujicic, B. Pandurangan, G. Arakere, W.C. Bell, T. He and X. Xie, 2009, Seat-cushion and soft-tissue material modeling and a finite element investigation of the seating comfort for passenger-vehicle occupants, Materials and Design 30, 2009 pp 4273–4285.
[3] Taichi Shiiba, Kotaro Obana and Naoya Machida, 2012, Comparison of linearized vs non-linearized multibody vehicle model for real-time simulation, International Journal of Non-LinearMechanics53, 2013, pp 32–40.
[4] Leon Lo, Mohammad Fard,Aleksandar Subic and Reza Jazar, 2012, Structural dynamic characterization of a vehicle seat coupled with human occupant, Journal of Sound and Vibration 332, 2013, pp 1141
[5] Lei Wang and Bert Sweetman, 2012, Multibody dynamics of floating wind turbines with large-amplitude motion, Applied Ocean Research 43,2013, pp 1–10.
[6] C. Martin Saravia, Sebastian P. Machado, and Victor H. Cortinez, 2013,A composite beam finite element for multibody dynamics: Application to large wind turbine modeling, Engineering Structures 56, 2013, pp 1164–1176.
[7] Li-Xin Guo, Hui Chen, and Jin-Li Li , 2011, Endergonic property analysis of vehicle seat pillow under heads crash loads, Procedia Engineering 15, 2011, pp 3046 – 3050.
[8] 1152Kuang-Hua Chang and Sung-Hwan Joo, 2004, Design parameterization and tool integration for CAD-based mechanism optimization, Advances in Engineering Software 37, 2006, pp 779–796.
[9] P. Betsch and N. Sanger, 2012, On the consistent formulation of torques in a rotationless framework for multibody dynamics, Computers and Structures 127, 2013, pp 29–38.
[10] Qiang Tian, Yanlei Sun, Cheng Liu, Haiyan Hu and Paulo Flores,2012, ElastoHydroDynamic lubricated cylindrical joints for rigid-flexible multibody dynamics, Computers and Structures 114–115,2013, pp 106–120.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Decision Based Architecture for Removal of Impulse Noise in Images |
Country | : | India |
Authors | : | Nithya. R, Nandhini. M, J. Manokaran |
Abstract: Images are often corrupted by impulse noise in the procedures of image acquisition and transmission. In this paper, we propose an efficient denoising scheme and its VLSI architecture for the removal of random valued impulse noise. To achieve the goal of low cost, low complexity VLSI architecture is proposed. We employ a decision-tree-based impulse noise detector to detect the noisy pixels, and an edge preserving filter to reconstruct the intensity values of noisy pixels. Furthermore, an adaptive technology is used to enhance the effects of removal of impulse noise. Our extensive experimental results demonstrate that the proposed technique can obtain better performances in terms of both quantitative evaluation and visual quality than the previous lower complexity methods. We analyzed Peak signal to Noise ratio (PSNR), Mean square error (MSE) of this proposed method with median filter.
Keywords: Image denoising, Impulse noise, Impulse detector
[2] Y. Dong and S. Xu, "A new directional weighted median filter for removal random-valued impulse noise," IEEE Signal Process. Lett., vol. 14, no. 3, pp.193–196, 2007.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Noise Reduction in ECG signal based on Ensemble Empirical Mode Decomposition (EEMD) and Discrete Wavelet Transfo |
Country | : | India |
Authors | : | Vaijayanthi. N, Maaleni. R. A |
Abstract: An Electrocardiogram (ECG) is a transthoracic interpretation of the heart over a time period and the signal may vary according to the heart-beats. Study of ECG becomes complicated if noise is embedded with signal. This proposed method presents a new ECG de-noising approach based on noise reduction algorithm in ensemble empirical mode decomposition (EEMD) and discrete wavelet transform (DWT) domains. The proposed method works well in the de-noising compared with other existing methods. The conventional EMD based ECG de-noising methods neglect an amount of early intrinsic mode functions (IMFs) having the QRS complex as well as noise. This paper is proposed to do windowing in the EEMD domain to decrease the noise from the initial IMFs instead of neglecting them totally, thus preserving the QRS complex and affording a relatively cleaner ECG signal.
Keywords: DWT, EEMD, EMD, IDWT, Thresholding
[2] Z. Wu and N. E. Huang, "Ensemble empirical mode decomposition: A noise-assisted data analysis method," Advances in Adaptive Data Analysis, vol. 1, no. 1, pp. 1–41, 2009.
[3] Md. AshfanoorKabir, Celia Shahnaz "Denoising of ECG signals based on noise reduction algorithms in EMD and wavelet domains",Biomedical Signal Processing and Control 7 (2012) 481– 489
[4] M. Alfaouri, K. Daqrouq, ECG signal denoising by wavelet transform thresholding, American Journal of Applied Sciences 5 (3) (2008) 276–281.
[5] Y. Kopsinis, S. McLaughlin, Development of EMD-based denoising methods inspired by wavelet thresholding, IEEE Transactions on Signal Processing 57 (2009) 1351–1362.
[6] N. Li, P. Li, An improved algorithm based on EMD-wavelet for ECG signal de-noising, in: International Joint Conference on Computational Sciences and Optimization, 2009, pp. 825–827.
[7] The Wavelet Tutorial Part IV, Multiresolution Analysis: The Discrete Wavelet Transform, 2008.
[8] D. Donoho, De-noising by soft-thresholding, IEEE Transaction on Information Theory 41 (3) (1995) 613–627.
[9] A.K. Barros, A. Mansour, N. Ohnishi, Removing artifacts from electrocardiographic signals using independent components analysis, Neurocomputing 22 (1998) 173–186.
[10] T. He, G. Clifford, L. Tarassenko, Application of ICA in removing artefacts from the ECG, Neural Processing Letters (2006) 105–116.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Design and Analysis of Overhead Crane Structural Columns |
Country | : | India |
Authors | : | Rajpandian R |
Abstract: Gantry girder is usually laterally unsupported beams used in industrial buildings. These are supposed to carry gravity loads, lateral loads and longitudinal loads from the moving cranes. Because of large lateral loads the top flange is bigger in size and the results in a beam with unequal flanges. The most common built-up section used is an I-section beam with an inverted channel on the top. The top flange of the beam and channel web act together, so flange thickness is taken as sum of the thickness of the beam flange and the channel web. The width of flange of girder may be taken as the average of widths of the beam flange and the depth of channel section. The effective length of gantry girder is taken equal to span of a simply supported beam with the ends torsionally restrained and the compression flange laterally restrained but free to rotate in plan. No reduction is made for the equivalent uniform moment factor. The buckling resistance moment must exceed the factored moments for the gravity loads including impact. The horizontal bending moment is assumed to be taken by the top compression flange only. The overall buckling check is applied. The web of the girder is checked for its shear capacity and buckling and bearing. Check for local compression under wheels is also applied. As serviceability requirements, the crane girder is checked for vertical deflection due to static wheel loads, for horizontal surge due to crane surge and for fatigue
Keywords: Loads, Vertical loads, Lateral Loads, Longitudinal loads, Impact Loads, Moment of inertia, Lateral force, Bending moment, Compressive Loads, Longitudinal Forces, Section Modulus, Bending Stress, Live Loads, Shear Force
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Multiphase Level Set Algorithm in Image Segmentation for Remote Sensing Image |
Country | : | India |
Authors | : | Anbarasu.S, kumar.A |
Abstract: Diagnostic imaging is an invaluable tool in medicine today. Magnetic resonance imaging (MRI), computed tomography (CT), digital mammography, and other imaging modalities provide an effective means for noninvasively mapping the anatomy of a subject. These technologies have greatly increased knowledge of normal and diseased anatomy for medical research and are a critical component in diagnosis and treatment planning. With the increasing size and number of medical images, the use of computers in facilitating their processing and analysis has become necessary. In particular, computer algorithms for the delineation of anatomical structures and other regions of interest are a key component in assisting and automating specific radiological tasks. These algorithms, called image segmentation algorithms, play a vital role in numerous biomedical imaging applications such as the quantification of tissue volumes, diagnosis, localization of pathology, study of anatomical structure, treatment planning ,partial volume correction of functional imaging data and computer integrated surgery
Keywords:remote sensing images-digital image processing-mat lab.
[2]. Bazi G, Melgani F,Bruzzone L, and Vernazza G,Dec 2009"A genetic expectationmaximization method for unsupervised change detection in multitemporalSAR imagery," pp. 6591–6610.
[3]. Bazi Y, Melgani F, and Alsharari H,Aug 2010, "Unsupervised change detectionin multispectral remotely sensed imagery with level set methods," pp. 3178–3187.
[4]. Celik B and Ma K.K, Feb. 2011 "Multitemporal image change detectionusing undecimated discrete wavelet transform and active contours," pp. 706–716.
[5]. Melgani F and Bazi Y, Oct 2006,"Markovian fusion approach to robust unsupervisedchange detection in remote sensing images," pp. 457–461, Oct. 2006.
[6]. Ning H,Zhang L,Zhang D, and Wu C,Feb 2010, "Interactive image segmentationby maximal similarity based region merging," pp. 445–456.
[7]. Portiere A and Sapiro G,Aprl 2007, "Interactive image segmentation via adaptiveweight distances," pp. 1046–1057.
[8]. Xiang S,Nie F,Zhang C, and Zhang C,Jul 2009, "Interactive natural imagesegmentation via spline regression," pp. 1623–1632.
[9]. Zhang L and Ji Q,Sep 2011, "A Bayesian network model for automatic and interactiveimage segmentation," pp. 2582–2593.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Strong Domination in Intuitionist Fuzzy graph to classify the Accidental Zone of a Traffic Control |
Country | : | India |
Authors | : | P. J. Jayalakshmi, S. Revathi, Dr. C. V. R. Harinarayanan |
Abstract: Let G = (V,E,σ,μ) be a simple connected undirected intuitionistic fuzzy graph. In this paper, we use a intutionistic fuzy graph model to represent to traffic network of a city and discuss a method to find the different type of accidental zones in a traffic flows.
Keywords: Fuzzy Graphs, Intuitionistic fuzzy graph, strong domination Intuitionistic fuzzy graph, traffic lighting.
[2]. A.Rosenfield, Fuzzy graphs, In Fuzzy Sets and their Applications to Cognitive and Decision Processes, Zadeh. L.A., Fu, K.S., Shimura, M., Eds; Academic Press, New
York (1975) 77-95.
[3]. E.J.Cockayne and S.T.Hedetnieme, Towards a Theory of Domination in Graphs, Networks 7 (1977)m 247-261.
[4]. P.Bhattacharya and F.Suraweera, An algorithm to compute the max-min powers and property of fuzzy graphs, Pattern Recognition Lett., 12 (1991) 413-20
[5]. M.G.Karunambigai and R.Parvathi, Intuitionistic Fuzzy Graphs, Proceedings of 9th Fuzzy Days International Conference on Computational Intelligence, Springer-Verlag, 20(2006), 139-150.
[6]. Mordeson N.John and Nair S. Premchand, Fuzzy Graphs and Fuzzy Hypergraphs, Physica- Verlag, New York (2000).
[7]. R.Parvathi, M.G.Karunambigai and K.Atanassov, Operations on Intuitionistic Fuzzy Graphs, Proceedings if IEEE International Conference on Fuzzy Systems(FUZZ-IEEE), August 2009, 1396-1401.
[8]. M.S. Sunitha, Studies on Fuzzy Graphs, Thesis of Doctor Of Philosophy, Cochin University of Sciences and Technology, Department of Mathematics.
[9]. A.Somasundaram and S.Somasundaram, Domination in fuzzy graphs-I, Pattern recognitions Letters 19(1998), 787-791.
[10]. M.S. Sunitha, Studies on Fuzzy Graphs, Thesis of Doctor Of Philosophy, Cochin University of Sciences and Technology, Department of Mathematics.