Volume-6 ~ Issue-4
- Citation
- Abstract
- Reference
- Full PDF
Abstract: This paper numerically examines an array of four dielectric resonant antenna of equilateral triangle shape. The Structure provides wideband low profile monopole-like antenna. As much as 30.90 % matching bandwidth (S11<-10 dB) with monopole-like radiation pattern over the entire band has been achieved with 6.357 dBi peak gain. The geometry is a four equilateral triangular dielectric volume over a ground plane, and is centrally excited by a coaxial probe to provide a broadside radiation pattern. An approximate expression is used to compute the resonance frequency. Results are simulated using CST (Computer Simulation Technology) Microwave Studio Suite 10.
Keywords-Dielectric resonator (DR), triangular dielectric resonator antenna (TDRA), S11 (S-Parameter),
perfect conductor (PEC), Impedance Bandwidth (IBW).
[1] J. K. Plourde and C. Ren, MEMBER, IEEE ―Application of Dielectric Resonators in Microwave Components,‖IEEE Transactions on Microwave Theory and Techniques, vol. MTT-29, NO. 8, pp. 754–770, AUGUST 1981.
[2] R. K. Mongia and P. Bhartia, ―Dielectric resonator antennas—A review and general design relations for resonant frequency and bandwidth,‖International Journal of Microwave and Millimeter-Wave Computer Aided Engineering, vol. 4, pp. 230–247, July 1994.
[3] A. A. Kiosk, ―A Triangular dielectric resonator Antenna Excited by a coaxial probe,‖Microwave and Optical Technology Letters / Vol. 30, No. 5, pp. 340-341, September 5 2001.
[4] R. K. Chaudhary, K. V. Srivastava and A. Biswas, ―Four Element Multilayer Cylindrical Dielectric Resonator Antenna Excited by coaxial probe,‖IEEE 978-1-61284-091-8/11/2011.
[5] Lo, H.Y. and K. W. Leung, ―Excitation of low –Profile Equilateral- Triangle Dielectric Resonator Antenna Using a Conducting Conformal Strip,‖ Microwave and Optical Technology Letters, Vol. 29, NO. 5, pp. 317-319, June 2001.
[6] Yoshihiko Akaiwa, ―Operation Modes of a Waveguide Y Circulator," IEEE Transactions on Microwave Theory & Techniques, pp. 954-960, November 1974.
[7] H.Y. Lo, K. W. Leung, K.M. Luk, and E.K.N. Yung, ―Low profile triangular dielectric resonator antenna,‖2000 IEEE Antennas and Propagation Society International Symposium, Vol. 4, pp. 2088-2091, July 2000.
[8] S. A. Long, M. W. McAllister and L.C. Shen, ―The resonant cylindrical dielectric cavity antenna,‖IEEE Transactions on Antennas Propagation, pp. 406-412, April 1983.
[9] M. C. McAllister, G.L. Conway and S. A. Long, ―Rectangular dielectric-resonator antenna,‖Electron Letter, pp. 218-219, March 1983.
[10] A. A. Kishk, G. Zhou, and A. W. Glisson, ―Analysis of dielectric resonator antennas with emphasis on hemispherical structures,‖IEEE Antennas and Propagation Magazine, Vol. 36, No. 2, pp. 20-31,April 1994.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Design of Ota-C Filter for Biomedical Applications |
Country | : | India |
Authors | : | CH. D. Mounika, CH. Susmitha |
: | 10.9790/2834-0640711 | |
Abstract: This paper presents design of operational transconductance amplifier is to amplify the ECG signal having low frequency of 300Hz, with the supply voltage of 0.8v. To reduce the power dissipation of 779nW, by using fifth order low pass filter. The OTA-C filter is to eliminate noise voltage and increases the reliability of the system. A chip is fabricated in a 0.18μm CMOS process is simulated and measured to validate the system performance using HSPICE.
[1] Razavi, Behzad "Design of analog CMOS Integrated Circuits."
[2] R.Jacob Baker, Harry W.Li and David E.Boyce, "CMOS Circuit Design, Layout andSimulation."
[3] Mohamed O. Shaker , Sollman A. Mahmoud, Ahmed A. Sollman, "A CMOS Fifth-Order Low -Pass Current- Mode Filter Using a Linear Transconductor."
[4] KimmoLasanen, "Integrated analogue cmos circuits and structures for heart rate detectors and others low-voltage, low power applications."
[5] S. Koziel and S. Szczepanski, "Designof highly linear tunable CMOS-OTA for continuous-time filters."
[6] "Star-HSPICE User's Manual," Avanti! Corp..Fremont. CA. Jun.2002, Release 2002.2.
[7] K.R. Laker and W.M.C. Sansen, Design of Analog Integrated Circuits and Systems. New York: McGraw-Hill. 1994
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Multiple Input Multiple Output is a wireless technology that uses multiple transmitters and receivers to transfer more data at the same time. Orthogonal Frequency Division Multiplexing, an FDM modulation technique which splits the signal into multiple smaller sub-signals that are then transmitted simultaneously at different frequencies to the receiver. OFDM technique spreads the data over number of carriers which are at specific predefined frequencies. This reduces or eliminates the ISI. Forward error correction or channel coding is a technique used for controlling errors in data transmission over unreliable or noisy communication channels. The objective of our proposed paper is to implement the FEC into the MIMO OFDM systems and its performance is analysed by using MATLAB over different fading channels. For modulation it employs M-QAM which combines both ASK and PSK thereby enabling several bits to be transmitted per symbol. The performance of MIMO-OFDM system is evaluated by BER Vs SNR when the bits propagates through the different fading channels.
Keywords– OFDM, MIMO, QAM, FEC, BER.
[1]. R.Prasad, "Introduction" in OFDM for Wireless Communications Systems, London, United Kingdom: Artech House, 2004, pp. 11-14.
[2]. Implementation of MIMO-OFDM System, Muhammad Atif Gulzar, Rashid Nawaz , Devendra Thapa, Linnaeus university,2011
[3]. Implementation of a WiMAX simulation in Simulink by Amalia da Roca.
[4]. Coding for the Fading Channel: a Survey, Signal Processing for Multimedia, J.S. Byrnes (Ed.), IOS Press.
[5]. Simulation Study of Some Spatial Diversity Techniques for MIMO Wireless Communication Systems" International Journal of Emerging Technology and Advanced Engineering, Volume 2, Issue 12, December 2012.
[6]. "BER Comparison of Rayleigh Fading, Rician Fading and AWGN Channel using Chaotic Communication based MIMO-OFDM System" - Suchita Varade, Kishore Kulat, International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-1, Issue-6, January 2012.
[7]. "Concatenated Convolutional Codes for Deep Space Mission" Deepak Mishra, T.V.S Ram, K S Dasgupta & S.Jit International Journal of Information and Communication Technology Research , Volume 2 No. 6, June 2012 .
[8]. Bingham, J.A.C., Multicarrier Modulation for Data Transmission: IEEE Communications Magazine, Vol. 28, no.5, pp. 5-14, May 1990.
[9]. J.G. Proakis, Digital Communications, McGraw-Hill, 1987
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Monitoring Receivers form an important constituent of the Electronic support. In Monitoring Receiver we can monitor, demodulate or scan the multiple channels. In this project, the Implementation of algorithm for multi channel digital monitoring receiver. The implementation will carry out the channelization by the way of Digital down Converters (DDCs) and Digital Base band Demodulation. The Intermediate Frequency (IF) at 10.7 MHz will be digitalized using Analog to Digital Converter (ADC) with sampling frequency 52.5 MHz and further converted to Base band using DDCs. Virtually all the digital receivers perform channel access using a DDC. The Base band data will be streamed to the appropriate demodulators. Matlab Simulink will be used to simulate the logic modules before the implementation. This system will be prototyped on an FPGA based COTS (Commercial-off-the-shelf) development board. Xilinx System Generator will be used for the implementation of the algorithm
Keywords: DDC, ADC, Digital Base band demodulation, IF, Monitoring Receiver.
[1] http://www.sdrforum.org/faq.html
[2] http://www.xilinx.com/products/virtex4/overview/performance.htm.
[3] http://www.xilinx.com/xlnx/xil prodcatproduct.jsp?title=v2p_powerpc
[4] Virtex-4 Configuration Guide, Xilinx Inc, p. 81, 2004,http://direct.xilinx.com/bvdocs/userguides/ug071.pdf
[5] http://www.ep.liu.se/exjobb/isy/2003/3448/exjobb.pdf
[6] Murty, Ravi. (n.d.). Software-Defined Reconfigurable Radios: Smart, Agile, Cognitive, and Interoperable. Technology@Intel
[7] Magazine. Retrieved on November 3, 2004, from http://www.intel.com/update/contents/wi07031.htm
[8] Herbrig, H., Lundheim, L., Rossing, N. K., "SORT SW-Radio - From Concept towards Demonstration", Proceedings of the ACTS
Mobile Communications Summit 1999.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: VLSI technology reduces the size of the digital components, reduce the power consumption and increase the speed of operation. In these criteria digital devices are more sensitively manufacturing. These type of devices mostly effected by soft errors, then it reduces the life of the devices(microprocessor, microcontrollers), it is nothing but vulnerability of microprocessors or microcontroller applications. The register file is one of the essential architectural components where soft errors can be very mischievous because errors may rapidly spread from there throughout the whole system. Thus, register files are recognized as one of the major concerns when it comes to reliability. This paper introduces Self-Immunity, a technique that improves the integrity of the register file with respect to soft errors. We show that our technique can reduce the vulnerability of the register file considerably while exhibiting smaller overhead in terms of area and power consumption compared to state-of-the-art in register file protection.
[1] Greg Bronevetsky and Bronis R. de Supinski, "Soft Error Vulnerability of Iterative Linear Algebra Methods," in the 22nd annual international conference on Supercomputing, pp. 155-164, 2008.4 We assume that generating/checking ECC operations are not performed inparallel to the write/read operations.
[2] J.L. Autran, P. Roche, S. Sauze, G. Gasiot, D. Munteanu, P. Loaiza, M. Zampaolo and J. Borel, "Real-time neutron and alpha soft-error rate testing of CMOS 130nm SRAM: Altitude versus underground measurements," in ICICDT"08, pp. 233–236, 2008.
[3] S.S. Mukherjee, C. Weaver, J. Emer, S.K. Reinhardt and T. Austin, "A Systematic Methodology to Compute the Architectural Vulnerability Factors for a High-Performance Microprocessor," in International Symposium on Microarchitecture (MICRO-36), pp. 29-40, 2003.
[4] T.J. Dell, "A whitepaper on the benefits of Chippkill-Correct ECC for PC server main memory," in IBM Microelectonics division Nov 1997.
[5] S. Kim and A.K. Somani, "An adaptive write error detection technique in on-chip caches of multi-level cache systems," in Journal of microprocessors and microsystems, pp. 561-570, March 1999.
[6] Jongeun Lee and AviralShrivastava, "A Compiler Optimization to Reduce Soft Errors in Register Files," in LCTES 2009.
[7] Jason A. Blome, Shantanu Gupta, ShuguangFeng, and Scott Mahlke, "Cost-efficient soft error protection for embedded microprocessors," in CASES ‟06, pp. 421–463, 2006.
[8] P. Montesinos, W. Liu, and J. Torrellas, "Using register lifetime predictions to protect register files against soft errors," in Dependable Systems and Networks, pp. 286–296, 2007.
[9] M. Rebaudengo, M. S. Reorda, and M.Violante, "An Accurate Analysis of the Effects of Soft Errors in the Instruction and Data Caches of a Pipelined Microprocessor," in DATE‟03, pp. 602-607, 2003.
[10] I. Koren and C. M. Krishna, Fault-Tolerant Systems. San Mateo, CA: Morgan Kaufmann, 2007.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: In this paper, we present design of a PCI (Peripheral Component Interconnect) target controller which is interfacing with asynchronous SRAM 64kX8 memory. The target controller provides the control signals to the SRAM for read and writes cycles. The master sends the address, data and other control signals. Based on these signals the controller initiates the read and write cycles we have designed PCI block diagram which represents how the master controls target and target interfaces with memory. We also designed state machine to generate control signals for target controller by which the controller initiates the read and write cycles. PCI implements a 32-bit multiplexed Address and Data bus (AD [31:0]).The simulation results presented in this paper represents read and write transactions between slave and memory according to commands generated by controller. We have been used Xilinx ISE project navigator 0.40d to simulate project code which is written in Verilog Hardware Description Language. We have been tested our functionality by writing test bench and then compared that results with actual functionality.
Keywords – Asynchronous SRAM, PCI, PCI connector
[1] PCI Special Interest Group, Portland, OR 97214, PCI Local Bus Specification, 2.1 ed., June 1995.
[2] "PCI SIG, PCI Local Bus Specification Revision 2.0, April, 1993".
[3] Fully Compliant PCI Interface in an XC3164A-2, 1994: Xilinx Inc.
[4] Designing Flexible PCI Interfaces with Xilinx EPLDs, 1994
[5] M. A. Song, "System level assertion-based verification environment for PCI/PCI-X and PCI-express," inProc. Conf. CIS, 2007, pp. 1035–1038.
[6] PC Card Standard, Personal Computer Memory CardInt‟l Assoc. (PCMCIA), San Jose, Calif., 1997;
[7] CompactPCI Specification, Revision 1.0, PCI Industrialand Computer Manufacturers Group (PICMG), Wake-field, Mass., 1995;
[8] Ravi Budruk, Don Anderson, Tom Shanley, PCI Express System Architecture. Addison Wesley, 2004.
[9] Microsoft, PCI Express and Windows. WinHEC, http://www.microsoft.com, 2004.
[10] PCI Express - An Overview of the PCI Express Standard. National Instruments White Paper
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Link Stability and Energy Aware routing Protocol for Mobile Adhoc Network |
Country | : | India |
Authors | : | Pradeep Gowda B. S., Dr. H. Saroja Devi |
: | 10.9790/2834-0643747 | |
Abstract: MOBILE ad hoc networks (MANETs) have more popularity among mobile network devices and wireless communication technologies. A MANET is multihop mobile wireless network that have neither a fixed infrastructure nor a central server. Every node in a MANET will act as a router, and also communicates with each other. The mobility constraints in mobile nodes will lead to problems in link stability. Energy saving, path duration and stability will be two major efforts and to satisfy them can be difficult task. A self node which is present in the network may also consume little energy during the transmission. This proposed approach tries to account for link stability and for minimum drain rate energy consumption. In order to verify the correctness of the proposed solution a objective optimization formulation has been designed and a novel routing protocol called Link-Stability and Energy aware Routing protocols is proposed. This novel routing scheme has been compared with other two protocols: PERRA and GPSR. The protocol performance has been evaluated in terms of Data Packet Delivery Ratio, Normalized Control Overhead, Link duration, Nodes lifetime, and Average energy consumption.
Keywords-component; Energy Consumption, Link Stability, Routing, Self node
[1] Floriano De Rango, Francesca Guerriero, Peppino Fazio, "Link Stability and Energy Aware Routing Protocol in Distributed Wireless Networks", IEEE Transactions on Parallel and Distributed systems, Vol 23, No 4 , April 2012.
[2] E. Damiani, S.D.C. di Vimercati, S. Paraboschi, and P. Samarati, "Managing and Sharing Servents' Reputations in P2P Systems," IEEE Trans. Knowledge and Data Eng., vol. 15, no. 4, pp. 840-854, July/Aug. 2003.
[3] F. De Rango et al., "OLSR versus DSR: A Comparative Analysis of Proactive and Reactive Mechanisms from an Energetic Point of View in Wireless Ad Hoc Networks," Computer Comm. J., vol. 31, pp.3843-3854, Oct. 2008.
[4] G. Ding and B. Bhargava, "Peer-to-Peer File-Sharing over Mobile AdHoc Networks," Proc. IEEE Ann. Conf. Pervasive Computing and Comm. Workshops, pp. 104-108, 2004.
[5] L. Feeney and M. Nilsson, "Investigating the Energy Consumption of a Wireless Network Interface in an Ad Hoc Networking Environment," Proc. IEEE INFOCOM, pp. 1548-1557, 2001
[6] L.M. Feeney, "Energy Efficient Communication in Ad Hoc Wireless Networks," technical report, Swedish Inst. of Computer Science (SICS), Draft Chapter, 2004.
[7] L. Feeney and M. Nilsson, "Investigating the Energy Consumption of a Wireless Network Interface in an Ad Hoc Networking Environment," Proc. IEEE INFOCOM, pp. 1548-1557, 2001.
[8] D. Hales, "From Selfish Nodes to Cooperative Networks – Emergent Link-Based Incentives in Peer-to-Peer Networks," Proc. IEEE Int'l Conf. Peer-to-Peer Computing, pp. 151-158, 2004.
[9] Kashyap Balakrishnan, Jing Deng, Pramod K. Varshneym, "TWOACK: Preventing Selfishness in Mobile Ad Hoc Networks", Proc. IEEE Ann. Conf. Pervasive Computing and Comm. Workshops, pp. 104-108, 2005.
[10] S. Lindsey, K. Sivalingam, and C.S. Raghavendra, "Power Optimization in Routing Protocols for Wireless and Mobile Networks," Handbook of Wireless Networks and Mobile Computing, I. Stojmenovic, ed., Wiley, 2001.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: In Mobile Ad hoc Networks (MANETs), energy conservation is a critical issue as the nodes are powered by the batteries which have limited energy reservoir. Hence the power level of the nodes is a problematical factor that extensively affects the performance and efficiency of ad hoc routing protocols. The rapidly changing traffic pattern the mobility of the nodes and the lack of fixed infrastructure makes routing in a MANET a challenging issue. So one of the main issues in MANET routing protocols is the development of energy efficient and QoS aware routing protocols which requires the energy analysis of routing protocols so that some modifications can be suggested. This paper presents performance comparison of three categories of mobile ad hoc routing protocols i.e. proactive, reactive and hybrid. The performance analysis is based on different metrics of Physical Layer such as Power Consumed in Transmit Mode, Power Consumed in Receive and Idle Modes, and metrics of application layer like Average End to End Delay, Average Jitter, Throughput and Packet Delivery Ratio based on the simulation analysis. Simulation analysis is performed over well known network simulator QualNet 6.1.
Keywords - MANET, AODV, DYMO, OLSR, PDR.
[1] S. Mittal, P. Kaur, Performance Comparison of AODV, DSR and ZRP Routing Protocols in MANETs,, Intl. Conf. on Adv. in Comp., Control, and Telecom. Technologies, 2009, 28-29.
[2] L. M. Feeney, An Energy Consumption Model for Performance Analysis of Routing Protocols for Mobile Ad Hoc Networks, Mobile Networks and Applications, 6(3), 2001, pages 239 - 249.
[3] S. Giannoulis, C. Antonopoulos, E. Topalis, S. Koubias, ZRP versus DSR and TORA: A comprehensive survey on ZRP performance, 10th IEEE Conference Emerging Technologies and Factory Automation, Greece, 2005.
[4] Pei. G, Gerla Mand, Chen T. W, Fisheye State Routing in Mobile Ad Hoc Networks, Proceedings of the Workshops ICDCS 2000, Taipei, Taiwan, 2000, D71- D78.
[5] C. Yang, L. Tseng , Fisheye Zone Routing Protocol for Mobile Ad-Hoc Networks, Multimedia Communications Laboratory, Second IEEE Consumer Communications and Networking Conference, Taiwan, 2005.
[6] T. Clausen and P. Jacquet, Optimized Link State Routing Protocol (OLSR), IETF RFC 3626, 2003.
[7] C. E. Perkins, E. M. Belding-Royer, and S. Das, Ad Hoc On Demand Distance Vector (AODV) Routing, IETF Internet draft, 2002.
[8] Garcia J.E., Cano J.C., P. Manzon, A Novel DSR based Energy Efficient Routing Algorithm for mobile Ad hoc Networks, In: the Proc of IEEE 58th Vehicular TechnologyConference, 5(3), 2003 849-854.
[9] I. Chakeres and C. Perkins, Dynamic MANET On-demand (DYMO) Routing, Internet Draft (draft-ietf-manet-dymo-14), 2008.
[10] QualNet documentation, QualNet 6.1 Model Library:Wireless, http://www.scalablenetworks.com.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Operation of standard 6T static random access memory (SRAM) cells at sub or near threshold voltages is unfeasible, predominantly due to degraded static noise margins (SNM) and poor robustness. We analyze Schmitt-Trigger (ST)-based differential-sensing static random access memory (SRAM) bitcells for ultralow-voltage operation. The ST-based SRAM bitcells address the fundamental conflicting design requirement of the read versus write operation of a conventional 6T bitcell. The ST operation gives better readstability as well as better write-ability compared to the standard 6T bitcell. In this paper we are going to propose a new SRAM bitcell for the purpose of read stability and write ability by using 90nm technology , and less power consumption, less area than the existing Schmitt trigger1 based SRAM. Design and simulations were done using DSCH and Microwind.
Index Terms: read stability, write ability, Schmitt trigger.
[1] K. Roy and S. Prasad, Low Power CMOS VLSI Circuit Design, 1sted. New York: Wiley, 2000.
[2] N.Yoshinobu, H. Masahi, K. Takayuki, and K. Itoh, "Reviewand futureprospects of low-voltage RAM circuits," IBM J. Res. Devel., vol. 47,no. 5/6, pp. 525–552, 2003.
[3] A. Bhavnagarwala, X. Tang, and J. Meindl, "The impact of intrinsicdevice fluctuations on CMOSSRAMcell stability," IEEE J. Solid-StateCircuits, vol. 36, no. 4, pp. 658–665, Apr. 2001.
[4] Jawar Singh, D.K.P., Simon Hollis, and Saraju P. Mohanty,A single ended 6T SRAM cell design for ultra-low-voltage applications.IEICE Electronics Express, 2008.5(18): p. 750-755.
[5] Mizuno, H. and T. Nagano, Driving source-line cell architecture for sub-1-V high-speed low-power applications. Solid-State Circuits, IEEE Journal of, 1996.31(4): p. 552-557.
[6] A. Bhavnagarwala, X. Tang, and J. Meindl, "The impact of intrinsic device fluctuations onCMOS SRAMcell stability," IEEE J. Solid-State Circuits, vol. 36, no. 4, pp. 658–665, Apr. 2001.
[7] S. Mukhopadhyay, H. Mahmoodi, and K. Roy, "Modeling of failure probability and statistical design of SRAMarray for yield enhancement in nanoscaled CMOS," IEEE Trans. Comput. Aided Des., vol. 24, no.12, pp. 1859–1880, Dec. 2005.
[8] H. Kawaguchi, Y. Itaka, and T. Sakurai, "Dynamic leakage cutoff scheme for low-voltage SRAMs," in VLSI Circuits Symp. Dig., Jun.1998, pp. 140–141.
[9] J. P. Kulkarni, K. Kim, and K. Roy, BA 160mV robust schmitt trigger based subthreshold SRAM, IEEE J. Solid-State Circuits, vol. 42,no. 10, pp. 2303–2313, Oct. 2007.
[10] R. Aly, M. Faisal, and A. Bayoumi, "Novel 7T SRAM cell for low power cache design," in Proc. IEEE SOC Conf., 2005, pp. 171–174.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Recognition of Numerals Using Neural Network |
Country | : | India |
Authors | : | Ms. Shraddha S. Talele, Mr. P. M. Mahajan |
: | 10.9790/2834-0646267 | |
Abstract: Recognition of handwritten numerals is a challenging problem researchers had been research into this area for so long especially in the recent years. The goal of optical digit recognition is to classify optical patterns contained in a digital image corresponding to numerals. In our study there are many fields concern with numbers, for example, checks in banks or recognizing numbers in car plates, the subject of digit recognition appears. A system for recognizing isolated digits may be as an approach for dealing with such application. In other words, to let the computer understand the English numbers that is written manually by users and views them according to the computer process. Image processing is simply the processing of the given image. The input is just an image that may be from any source, and the output may be an image or a set of parameters that are related to that particular image. The main objective for our system was to recognize isolated digits exist in different applications. For example, different users had their own handwriting styles where here the main challenge falls to let computer system understand these different handwriting styles and recognize them as standard writing. The process involves three phases namely pre-processing, training and recognition. Pre-processing stage performs noise removal, binarization, labelling, rescaling and segmentation operations. Training stage adopts back propagation with feed forward technique. Recognition stage recognizes input images of numerals.
Keywords: - Artificial Neural network, segmentation, geometrical feature extraction, OTSU's method, feed forward back propagation algorithm.
[1] Y. Le Cu, B. Boser, J. S. Denker, D. Henderson, R.E. Howard, W. Hubbard and L. D. Jackel," Handwritten Digit Recognition with a Back-Propagation Network", AT&T Bell Laboratories, Holmdel, N.J.07733 1990.
[2] Jurgen F, 1997 "Isolated Handprinted Digit Recognition. In: Handbook of Character Recognition and Document Image Analysis," Bunke, H. and P.S.P. Wang (Eds.). World Scientific Publishing Company. ISBN: 10: 981022270X, pp.: 103-121.
[3] Calin Enachescu, Cristian-Dumitru Miron,"Handwritten Digits Recognition Using Neural Computing", Scientific Bulletin of the Petru Maior University of Tirgu Mures, Vol.6(XXIII), 2009, ISSN 1841-9267.
[4] Huang Hanmin, Huang Xiyue, Zhang Ping, Chai Yi, Shi Weiren, "ANN-Based Handwritten Character Recognition", in Proc. of the 38th SICE Annual Conference at Morioka, Aug 1999, pp. 1177-1180.
[5] Aurene Fausett, "Fundamentals of Neural Networks: Architectures, Algorithms and applications", Prentice Hall, Englewood Cliffs, NJ 07632, pp.5-7, 1994.
[6] Christopher L. Scofield, Lannie Kento, Jung-Chou Chang, "Multiple Neural Net Architectures for Character Recognition", IEEE Trans on Compcon Spring 91, Digest of Papers at San Francisco, CA, 25 Feb-1 Mar 1991, pp. 487-491.
[7] N. Otsu "A Threshold Selection Method from Gray-Level Histograms". IEEE Transactions on Systems, Man, and Cybernetics. 1979, 9(1): 62-66
[8] T.M. Lehmann, C. Gonner, and K. Spitzer, "Survey: Interpolations Methods In Medical Image Processing, "IEEE Transactions on Medical Imaging, vol. 18, no. 11, pp. 1049–1075, 1999.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Pest Control in Agricultural Plantations Using Image Processing |
Country | : | India |
Authors | : | Murali Krishnan, Jabert G. |
: | 10.9790/2834-0646874 | |
Abstract: Monocropped plantations are unique to India and a handful of countries throughout the globe. Essentially, the FOREST approach of growing coffee along with in India has enabled the plantation to fight many outbreaks of pests and diseases. Mono cropped Plantations are under constant threat of pest and disease incidence because it favours the build up of pest population. To cope with these problems, an automatic pest detection algorithm using image processing techniques in MATLAB has been proposed in this paper. Image acquisition devices are used to acquire images of plantations at regular intervals. These images are then subjected to pre-processing, transformation and clustering.
[1]. Gonzalez, R., R. Woods and S. Eddins, 2004. Digital Image Processing using MATLAB. 1st Edn., Printice Hall, ISBN: 0130085197, pp: 624.
[2]. W. Petry and W. Kuhbauch, "Automated discrimination of weed species with quantitative image analysis," Journal of Agronomy & Crop Science, vol. 163, pp. 345-351, 1989.
[3]. R.D. Tillet, "Image analysis for agricultural processes: a review of potential opportunities," Journal of Agricultural Engineering Research, vol. 12, pp. 247-258, 1991.
[4]. J. Hemming and T. Rath, "Computer-vision based weed identification under field conditions using controlled lighting," Journal of Agricultural Engineering Research, vol. 78- 3, pp. 233-243, March 2001
[5]. ALFANO, J. R. (2009). Roadmap for future research on plant pathogen effectors. Molecular Plant Pathology 10,805–813.
[6]. ALFANO, J. R. & COLLMER, A. (2004). Type III secretion system effector proteins: double agents in bacterial diseaseand plant defence. Annual Review of Phytopathology 42,385–414.
[7]. Alexander, M. 1977. Introduction to soil Microbiology. 2nd edition. New York. John Wiley and sons.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | An Energy Efficient Protocol To Increase Network Life In WSN |
Country | : | India |
Authors | : | Rishu Gupta, Mrs. Tripti Malhotra |
: | 10.9790/2834-0647581 | |
Abstract: Wireless Sensor Network consists of several sensor nodes, these nodes loss some of their energy after the process of communication. So an energy efficient approach is required to improve the life of the network. In case of broadcast network, LEACH protocol uses an aggregative approach by creating cluster of nodes. Now the major concern is to built such clusters over WSN in an optimized way. This work presents the improvement over LEACH protocol. Hence we have different work environments where the network is having different capacities. The proposed work shows how the life time of the network will improve when the number of nodes varies within the network.
Keywords - LEACH, energy, lifetime, cluster based, WSN\
[1] Yingchi Mao, Zhen Liu, Lili Zhang, Xiaofang Li, "An Effective Data Gathering Scheme in Heterogeneous Energy WSNs", International Conference on Computational Science and Engineering,2009.
[2] Kun Zhang and Cong Wang , "A Secure Routing Protocol for Cluster-Based Wireless Sensor Networks Using Group Key Management ", IEEE Xplore,vol.37, pp. 178-185, jan.-2008.
[3] Bolian Yin, Hongchi Shi, and Yi Shang ,"Analysis of Energy Consumption in Clustered Wireless Sensor Networks" IEEE Transactions on Mobile Computing, vol. 3, pp. 272–285, July 2007
[4] Zhao Yulan and Jiang Chunfeng,"Research about Improvement of LEACH Protocol", An Energy Efficient Protocol for Wireless Sensor Network". Application Research of Computers, No.2 pp: 209-211, Jan. 2005.
[5] Stephan Olariu and Qingwen Xu, "Information Assurance In Wireless Sensor Networks", IEEE Transactions on Mobile Computing, 3(4), pp. 317-331 , Dec.2004.
[6] Zenon Chaczko, Ryszard Klempous and Jan Nikodem," Methods of Sensors Localization in Wireless Sensor Network", IEEE Transactions On Mobile Computing, VOL. 3, pp. 3, Jul-Sep 2004.
[7] Adrian Perrig , John Stankovic and David Wagner," Security in wireless sensor network",. Vol. 47, pp.6-9 ,June 2004.
[8] Jan Steffan ,Ludger Fiege, Mariano Cilia and Alejandro Buchmann, "Scoping in Wireless Sensor Networks", IEEE Network, 18(1), pp.15–21, May 2004.
[9] Shao-Long and Xing Tao, "Cluster-based power efficient time synchronization in wireless sensor networks", IEEE INFOCOM Conf, Mar. 2004.
[10] Peng-Jun Wan, Member and Chih-Wei Yi, "Coverage by Randomly Deployed Wireless Sensor Networks", IEEE Wireless Communications and Networking Conference, pp.16–20,Mar. 2003.