Loading...

Proceedings of

1st International Conference on Advances in Computer, Electronics and Electrical Engineering CEEE 2012

Date
12-Mar-2012
Location
Mumbai , India
Authors
273
ISBN
978-981-07-1847-3

115 Articles Published

1. DESIGN OF MIMO-OFDM SYSTEMS PHYSICAL LAYER WITH MINIMAL HARDWARE COMPLEXITY AND LOW POWER CONSUMPTION

Authors: M.SARASWATHI

Abstract: In this paper the design of 128/64 point Fast Fourier transform processor (FFT Processor) is proposed to support future generation Multiple Input Multiple Output Orthogonal Frequency Division Multiplexing (MIMO OFDM) based IEEE 802.11n wireless local area network base band processor. The pipelined mixed radix delay feedback (MRMDF) FFT architecture is proposed to provide a higher throughput rate combining the characteristics of both Single path Delay Feedback (SDF) which is used to reduce memory size and Multipath Delay Commutator (MDF) by using the multidata-path scheme. That is higher throughput rate can be provided by using four parallel data path. The proposed processor not only supports the operation of FFT in 128 point and 64 point but can also provide different throughput rates for 1-4 simultaneous data sequence to meet IEEE 802.11n requirements. Further, less complexity is needed in this deign compared with traditional four parallel approach. The hardware cost of memory and com

Keywords: Complexity, Low, Power, Consumption

Pages: 1 - 5 | DOI: 10.15224/978-981-07-1847-3-125

2. REDUCTION OF HIGHER ORDER LINEAR DYNAMIC SISO AND MIMO SYSTEMS USING THE ADVANTAGES OF IMPROVED POLE CLUSTERING AND PSO

Authors: G.VASU , P.MURARI , R.PRASANNA KUMAR

Abstract: The authors present a combined method for order reduction of higher order linear dynamic systems using the advantages of the improved pole clustering and error minimization by PSO. The denominator of the reduced model is obtained by the improved pole clustering and PSO is employed for determining numerator coefficients by minimizing the integral square error between the transient responses of the original and reduced order models, pertaining to unit step input. The reduction procedure is simple, efficient and computer oriented. The proposed algorithm has been extended for the reduction of linear multivariable system. The algorithm is illustrated with the help of two numerical examples to highlight the advantages of the approach and the results are compared with the other existing techniques

Keywords: Order Reduction, Pole Clustering, PSO, Relative mapping Errors, Stability

Pages: 6 - 11 | DOI: 10.15224/978-981-07-1847-3-151

3. REDUCTION OF HIGHER ORDER LINEAR DYNAMIC SISO AND MIMO SYSTEMS USING THE ADVANTAGES OF IMPROVED POLE CLUSTERING AND PSO

Authors: G.VASU , P.MURARI , R.PRASANNA KUMAR

Abstract: The authors present a combined method for order reduction of higher order linear dynamic systems using the advantages of the improved pole clustering and error minimization by PSO. The denominator of the reduced model is obtained by the improved pole clustering and PSO is employed for determining numerator coefficients by minimizing the integral square error between the transient responses of the original and reduced order models, pertaining to unit step input. The reduction procedure is simple, efficient and computer oriented. The proposed algorithm has been extended for the reduction of linear multivariable system. The algorithm is illustrated with the help of two numerical examples to highlight the advantages of the approach and the results are compared with the other existing techniques

Keywords: Order Reduction, Pole Clustering, PSO, Relative mapping Errors, Stability

Pages: 6 - 11 | DOI: 10.15224/978-981-07-1847-3-151

4. A MOBILE APPLICATION FOR INCIDENT DETECTION AND TRACKING SYSTEM

Authors: ADEL KHELIFI , HUSSAIN AL BLOUSHI , MANAR ABU TALIB , MOHAMMED GHAZAL

Abstract: Detecting and tracking an incident is a complex task that requires high communication between involved parties and powerful broadcasting methods. The process of detecting and tracking an incident has been suffering from the lack of identifying the location of incident, type of incident, severity level, number of injuries if there are any. This Incident Detection and Tracking System (IDTS) eases the process of detecting and tracking incidents. It runs on two platforms: web server and mobile phone which eliminates lost or incorrect Incident reporting, increases accuracy of information, and improve user satisfaction. Governmental institutions can run IDTS on their servers to collect data on each incident occurrence. The incident data regarding fires, earthquake damages, accidents, floods, and water leaks come from users' mobile phone. These data can help government in detecting and tracking the location of the incident on the map and also get detailed information about incidents such as t

Keywords: Mobile Application, Incident Detection, Tracking System

Pages: 12 - 17 | DOI: 10.15224/978-981-07-1847-3-152

5. FXLMS ALGORITHM FOR FEED FORWARD ACTIVE NOISE CANCELLATION

Authors: BAGESHREE PATHAK , PADMA. P. HIRAVE

Abstract: Two types of acoustic noise exist in the environment. One is random noise caused by turbulence and having its energy evenly across the frequency bands so referred as broadband noise, and examples are the low-frequency sounds of jet planes and the impulse noise of an explosion. Another type of noise, called narrowband noise, concentrates most of its energy at specific frequencies this is produced due to rotating or repetitive machines, so it is periodic or nearly periodic. This paper explain the feed forward Fxlms algorithm for active noise control and the noise worked here are sinusoidal tones bellow 200 Hz ,computer fan noise and ceiling fan noise .Mat lab implementation of Feed forwad FXLMS algorithm is done and result is compared for different convergence factor and different filter length of control filter

Keywords: LMS, Secondary path, Feedback Control, ANC, FXLMS

Pages: 18 - 22 | DOI: 10.15224/978-981-07-1847-3-203

6. PROTEIN -PROTEIN INTERACTION CLASSIFICATION TECHNIQUES: A REVIEW

Authors: SHAILENDRA SINGH , DILPREET KAUR

Abstract: Protein is a very important part of a cell. It carries out its duties as specified by the information encoded in genes. Proteins interact with each other to carry out different biological functions. Information about these interactions will help a lot in understanding different diseases. Different classifiers have been used till now to classify the protein-protein interactions. Some of the classifiers are SVM, SVM-KNN, BP Neural Network. This paper presents the different classifiers that had been used and will also present the future scope in the classification of the protein-protein interactions.

Keywords: Protein-Protein Interaction, SVM, KNN, BP Neural Network

Pages: 23 - 27 | DOI: 10.15224/978-981-07-1847-3-235

7. NEXT GENERATION VP8 VIDEO CODECS FOR MOBILE MULTIMEDIA COMMUNICATIONS

Authors: B SIVA KUMAR , BASAVA RAJU S

Abstract: In this article, we give an overview of several core Technologies involved in the next generation mobile media communications system from both the media codecs and media transport perspectives. Here we introduce H264 and VP8 video codecs that are suitable for mobile communications, including a low complexity and low bit rate codec for video conferencing and generic scalable video coding. Video codec has been widely used on PC’s with relatively strong capability. However mobile devices, such as Pocket PCs and Handheld PCs still suffer from weak computational power, short battery lifetime and limited display capability and good quality of Video. Regarding this there is very much need of practically low complexity real time video codec for mobile devices. So that here implementing Google VP8 and H264 baseline profile and comparing to get better results for mobile applications. And here several methods that can significantly reduce the computational cost are adopted in these codecs. H264 a

Keywords: Mobile, Multimedia, Communications, Generation

Pages: 28 - 33 | DOI: 10.15224/978-981-07-1847-3-250

8. FUZZY LOGIC SYSTEMS DESIGN FOR ENGINEERING AND APPLICATIONS

Authors: ARJUN DEO , SUNITA

Abstract: Fuzzy logic system design has rapidly become one of the most successful of today's technologies for developing sophisticated logically designs system. Fuzzy logic addresses such applications perfectly as it resembles human decision making with an ability to generate precise solutions from certain or approximate information. Complex fuzzy logic is a generalization of traditional fuzzy logic, based on complex fuzzy sets. In complex fuzzy logic, inference rules are constructed and “fired” in a manner that closely parallels traditional fuzzy logic. The range of these membership functions is extended from the traditional fuzzy range of [0,1] to the unit circle in the complex plane, thus providing a method for describing membership in a set in terms of a complex number. Several mathematical properties of complex fuzzy sets, which serve as a basis for the derivation of complex fuzzy logic, are reviewed in this paper. These properties include basic set theoretic operations on complex fuzzy set

Keywords: Traditional fuzzy logic, Logic, hardware implementation, Digital technique, Analog technique

Pages: 34 - 40 | DOI: 10.15224/978-981-07-1847-3-258

9. FUEL CELL/BATTERY/SUPERCAPACITOR POWER SYSTEM CONTROL

Authors: AISWARYA P , ANNU ABRAHAM

Abstract: Fuel cell along with energy storage devices is a very promising source of clean energy power system. One main weak point of the fuel cell is its very slow dynamics. To overcome this limitation, energy storage devices are used.The energy storage devices used in this paper are battery and supercapacitor. Battery has a very good charge storage capacity and supercapacitor has high current density making them the ideal choice.DC/DC converters are designed for the power electronics interface. The integrated control of these three power sources is a very challenging task for the control system designer. In this paper we do a comparative study of two efficient control systems, one which usesfuzzy logic control and the other is amultilevel supervisory control. All the simulationsare carried out in the matlab/simulink environment.

Keywords: Battery, supercapacitor, hybrid fuel cell, fuzzy logic, supervisory control.

Pages: 41 - 45 | DOI: 10.15224/978-981-07-1847-3-317

10. REVIEW ON CLINICAL DECISION SUPPORT SYSTEM FOR ELECTRONIC HEALTH RECORD SYSTEM FOR MAJOR DISEASES

Authors: D. R. PATIL , PUNAM S. PAWAR

Abstract: Patient is the main source of information to physicians while treating them. Professionals diagnose patients depending on their experience, guidelines. But when they are treating a patient who is having major disease or if the patient is serious due to accident i.e. in emergency situation then proper decision making is essential one which will provide correct diagnosis, medications. And there are more chances to take wrong decision due to less time and less data related to patient. In that case clinical decision support system and electronic health record systems can perform major role for taking appropriate decisions as correct data is available in less time in place.

Keywords: electronic health record (EHR); decision support system (DSS); clinical decision support system (CDSS); neural network.

Pages: 46 - 50 | DOI: 10.15224/978-981-07-1847-3-342

11. VOICE BASED WIRELESS INDUSTRIAL AUTOMATION WITH ENHANCED FEEDBACK SYSTEM

Authors: A.K.GNANASEKAR , P.JAYAVELU

Abstract: The project is aimed at providing integrated voice based control of technologically smart systems of an industry using microcontroller with visual basic interface. Radio frequency identification based multilevel user access provide high security authentication. Staff attendance and data logger were added to the main features of the project. The common functionalities in the industry are autonomously controlled based on voice commands providing a luxury of e-lifestyle for the operator, maintenance engineer, production and workers of several other departments which can be achieved in disabled-friendly environment using low power consumption. Automation of 23 loads with 46 voice commands has been tested. Any number of people can automate the loads with same computer; Accuracy of 95% speech recognition is achieved when user used his own profile while an accuracy of 80% is achieved when other people use user profile. People who were physically challenged such as paralyzed, person who lost t

Keywords: ASR,MEMS,ZIGBEE,RFID

Pages: 51 - 55 | DOI: 10.15224/978-981-07-1847-3-355

12. GEOMETRIC PROGRAMMING: A TOOL FOR CMOS OP-AMP DESIGN

Authors: VIKAS UPADHYAYA

Abstract: In this paper a new method for determining the component values and transistor dimensions for CMOS operational amplifiers (Op-Amps) is presented. As a wide variety of design objectives and constraints are Posynomial function of the design variables, the Optimization is done by Geometric Programming. As a consequence we can efficiently determine globally optimal trade-offs among competing performance measures such as power, open-loop gain and bandwidth. In this paper I applied this method to a Two Stage Cascoded operational amplifier. The paper shows how the method can be used to synthesize robust design, i.e., design guaranteed to meet the specifications for a verity of process condition and parameters. The synthesis method is fast and determines the globally optimal design

Keywords: geometric programming, CMOS op-amp, style, styling, insert

Pages: 56 - 58 | DOI: 10.15224/978-981-07-1847-3-365

13. ENERGY EFFICIENT CEILING FANS USING BLDC MOTORS - A PRACTICAL IMPLEMENTATION

Authors: MAHESH RAO

Abstract: A brushless DC (BLDC) motor is a synchronous electric Motor powered by direct-current (DC) electricity and having an electronic commutation system, rather than a mechanical commutator and brushes. In BLDC motors, current to torque and voltage to rpm are linear relationships. This linearity provides an excellent opportunity to use the BLDC motor in the conventional ceiling fans. This paper presents practical implementation of such BLDC motor for ceiling fan application along with the actual power measurements in comparison with conventional ceiling fans. Complete electronics and the associated advantages and disadvantages of this BLDC ceiling fans are also presented

Keywords: Brushless DC Motor, Ceiling fans, energy conservation.

Pages: 59 - 63 | DOI: 10.15224/978-981-07-1847-3-369

14. COPLANAR WAVEGUIDE - PRINTED MONOPOLE ANTENNA IN 0.5-3 GHZ RANGE

Authors: GURPREET SINGH GOSAL

Abstract: This study presents a coplanar waveguide (CPW)-fed planar monopole antenna. The proposed antenna is designed to operate from 0.5 to 3 GHz. The goal was to reduce the dimensions of the antenna through various design variations in the geometry of the Square Planar Monopole Antenna . Final Design consists os a Central Hole, Step Notches at the edges and Curved Base where radiating element is fed by the CPW.The Impedence and Radiation characteristics(Calculated and Measured) of the proposed monopole are presented and effect of the design variations are analyzed.

Keywords: conventional, monopole, antenna

Pages: 64 - 68 | DOI: 10.15224/978-981-07-1847-3-429

15. REMOTELY CONTROLLED POWERPOINT PRESENTATION NAVIGATION USING HAND GESTURE

Authors: AARTHI R , NAGARJUNAN D , RAM RAJESH J , SUDHARSHAN R

Abstract: Presentation using slideshow is an effective and attractive way to convey information in the digital world. There are various means to control slides which require devices like mouse, keyboard, or laser pointer etc. The disadvantage is one must have prior knowledge about the devices in order to operate them. This paper proposes a new method to control the slides during a presentation using bare hand. This method employs hand gestures given by the user as input. The gestures are identified by counting the number of active fingers and then slides are controlled. Unlike the conventional method for hand gesture recognition which makes use of gloves or markers or any other devices, this method does not require any additional devices and makes the user comfortable. The proposed method for gesture recognition does not require any database to identify a particular gesture. It gives better accuracy even in environments illuminated with different light sources like incandescent bulb, fluorescent

Keywords: Aarthi

Pages: 69 - 71 | DOI: 10.15224/978-981-07-1847-3-434

16. MINIATURIZATION AND FEEDING TECHNIQUES OF H- SHAPED ANTENNA

Authors: MANISHA CHATTOPADHYAY , PRATIGYA MATHUR

Abstract: Rectangular Microstrip Antenna (RMSA) with a slot cut inside the rectangular patch at an appropriate position increases the surface current length and hence results in a compact RMSA like H-shaped MSA. This paper analyses the approximate equations to calculate the resonant length of the compact H-shaped MSA and discusses the technique for further miniaturization of the H shaped MSA by shorting one arm of the patch. Analysis of the antenna using FDTD method and different feeding techniques is also presented.

Keywords: Rectangular Microstrip Antenna, Electric Field and Current Distribution, Miniaturization.

Pages: 72 - 76 | DOI: 10.15224/978-981-07-1847-3-450

17. ANALYSIS OF 20NM SOI MOSFET SRAM DESIGN USING DIFFERENT GATE MATERIALS

Authors: I.FLAVIA PRINCESS NESAMANI , V.LAKSHMIPRABHA

Abstract: The SOI MOSFET technique is used to overcome the scaling effects. In this work, 20nm SOI MOSFET using Poly silicon as gate material of both N-type and P-type were designed. The same SOI MOSFET is designed using Molybdenum as gate material for both N-type and P-type and the device characteristics werecompared and analysed

Keywords: SOI-Silicon On Insulator, SNM-Static Noise Margin, S-Sub threshold Sl

Pages: 77 - 81 | DOI: 10.15224/978-981-07-1847-3-471

18. AN IMPROVED INTELLIGENT TEMPERATURE MEASUREMENT BY RTD USING OPTIMAL ANN

Authors: B K ROY , SANTHOSH K V

Abstract: This paper aims at designing an intelligent temperature measuring technique by Resistance Temperature Detector (RTD) using optimal Artificial Neural Network (ANN). The objectives of the present work is (i) to extend the linearity range of RTD and (ii) to provide intelligence in the measuring technique so as to measure the temperature under variation (within a pre-specified range) of temperature co-efficient parameters Ro, a, b and c, but without any change in calibration circuit. (iii) To achieve the objective (i) and (ii) by an optimal ANN. An optimal ANN is considered based on minimum mean square error (MSE) and Regression by comparing various scheme and algorithm. The proposed technique provides linear relationship of the overall system over a wider range and makes it independent of temperature co-efficient. Since, the proposed intelligent temperature measuring scheme produces output independent of physical properties of RTD, it avoids the requirement of repeated calibration every

Keywords: Artificial Neural Network, Resistance Temperature Detector, Linearization, Sensor Modelin

Pages: 82 - 86 | DOI: 10.15224/978-981-07-1847-3-477

19. NETWORK SECURITY ANALYSIS USING CLOUD BASED INTRUSION DETECTION SYSTEMS

Authors: ADITYA ANIL BALAPURE , ALOK AGGARWAL , ESHAN AGGARWAL

Abstract: With the advancement of Internet technologies there is need to track down and prevent suspicious traffic. The rise in the internetwork and intra-network activities by means of smart-phones and tablets is taking network communication to the next level. The advancements in smart-phones is opening a gateway for the next level vulnerabilities and attacks on the network which now contains a collection of smart-phones, tablets, laptops and personal computers. High percentage of newly generated attacks and intrusion techniques has indeed spurred up the need of a unified defense mechanism which can be deployed as a platform. The focus of this paper is to introduce before the type of these defense mechanisms known as intrusion detection techniques over a cloud platform, to prevent the vulnerabilities and provide resistance from the newly developed attacks and loop holes for smart-phones, tablets and personal computers. Since nowadays smart-phones and tablets have the same system architecture as

Keywords: Intrusion Detection System, Snort, iptables, mobile ,devices

Pages: 87 - 90 | DOI: 10.15224/978-981-07-1847-3-500

20. DESIGN OF LOGICAL EFFORT FOR WORST CASE POWER ESTIMATION IN A CMOS CIRCUIT IN 90 NM TECHNOLOGY

Authors: AMITOJ SINGH , ANU GUPTA , SACHIN MAHESHWARI

Abstract: The Logical Effort model is mainly to reduce delay in a circuit, but does not show how to minimize power and area. This paper deals with an empirical modeling and design of logical effort for estimating power in CMOS logic gates. The power is estimated in a circuit using the power of standard inverter and the relationship established between Power (P) and Logical Effort (g), Electrical Effort (h) and Parasitic (p) have been proposed in this paper. To verify the above model a full adder circuitry producing just the carry-out in UMC 90nm CMOS technology having supply voltage of 1V is selected. The results obtained from the model are accurate to 85.5% of the values obtained. The tool used is cadence and the simulation is performed using spectrum".

Keywords: logical effort, power estimation, modeling, CMOS logic gates, electrical effort, parasitic

Pages: 91 - 95 | DOI: 10.15224/978-981-07-1847-3-511

21. REMOTE WATER POLLUTION MONITORING SYSTEM USING GSM

Authors: R. BALAJI , R. GANESAN

Abstract: Water pollution is one of the key threats for the green globalization. To prevent the water pollution, first we have to detect the pollutant. In earlier days, the water pollution was detected by chemical test or laboratory test by using this system the testing equipment will be in stationary and samples will be given to testing equipment. In order to increase the pervasiveness, testing equipment can be placed in the river water and detection of pollution can be made remotely. This paper proposes a Sensor-Based Water Pollution Detection, which will detect the pollutant present in the water and give an alert massage to the agent. The sensor pH, turbidity and DO will be kept in the river water surface and the data captured by the sensor will be given to PIC Micro controller, and then the data are transmitted wirelessly using Zigbee module. After calculating the inference from the sensed data, In case of inference value above the threshold value automated warning SMS alert will be sent to

Keywords: WSN, PIC 18F4525 Microcontroller, GSM Modem, Sensors, Piezoelectric/Wind Energy: Real time

Pages: 96 - 100 | DOI: 10.15224/978-981-07-1847-3-517

22. FLUX ROUTER IN SOLENOID ACTUATOR FOR AEROSPACE APPLICATION

Authors: DEEPAK P. MAHAJAN , RENUKAPRASAD NARAYANSWAMY , SIVA BAVISETTI

Abstract: Solenoid is an electromagnetically operated actuator. A typical application of solenoid is to operate valves in aircraft engine under harsh environmental conditions and high endurance requirements. Under these circumstances usage of higher hardness materials for spindle becomes unavoidable. Unfortunately these materials exhibit magnetic susceptibility. This cause higher flux leakage and reduces the efficacy of the solenoid. Solenoid having very high force to weight ratio over a range of stroke with limited envelope is much appreciated for aerospace and space applications. A novel method of introducing flux router (a nonmagnetic component) at an appropriate location in the solenoid geometry in order to divert the unused magneto motive force (MMF) into working air gap is discussed in this paper. Numerical simulations based on finite element methods is used for performance comparison of conventional and proposed solenoid keeping same applied MMF and simulation parameters for various flux

Keywords: solenoid, actuator, aerospace, finite element methods I.

Pages: 101 - 105 | DOI: 10.15224/978-981-07-1847-3-523

23. APPLIED PHYSICS COMPUTING USING JAVA PARALLEL PROCESSING FRAMEWORK IN CLUSTERS ENVIRONMENT OF PARALLEL COMPUTING

Authors: DEEPAK AGNIHOTRI , HARENDRA BIKROL , MITHILESH ATULKAR

Abstract: This paper gives a brief introduction of research in the field of parallel and grid computing using java parallel processing framework (JPPF). It is observed that applied physics computations like Moment of Inertia, velocity, viscosity of liquid, elasticity etc. requires lot of calculations and also it should be precise to high degree of accuracy. This application calculates the Moment of Inertia of 11 types of bodies symmetrical in nature along with given axis of rotation. These 11 tasks are running parallel in JPPF grid in clusters environment of parallel computing. This application promotes the solution of such engineering problems with great accuracy and speed as platform independent parallel applications. The experimental results are obtained with the help of JPPF GUI monitoring and administration tool.

Keywords: JPPF, node, drivers, MOI, axis of rotation, load balancing algorithms

Pages: 106 - 111 | DOI: 10.15224/978-981-07-1847-3-550

24. RADIO FREQUENCY ANALYSIS OF UMTS SYSTEM

Authors: Mohd Ariff Sharifudin

Abstract: This paper deals with the RF characteristics of the WCDMA network, the main concern being how to optimize the radio network so as to enable the network operation more reliable and economical, improve the network service quality and resource utilization, which is of great importance to network carriers

Keywords: UMTS, RAN, RNC, RNS, RBS, NE, CPICH, FACH, RSCP

Pages: 112 - 117 | DOI: 10.15224/978-981-07-1847-3-569

25. NOISE REMOVAL FROM PATHOLOGICAL SPEECH SIGNAL ,ITS FRAMING AND WINDOWING

Authors: PRADEEP TULSHIRAM KARULE , SYED MOHAMMAD ALI

Abstract: Analysis of speech has become a popular non-invasive tool for assessing the speech abnormalities. Acoustic nature of the abnormal speech give relevant information about the type of disorder in the speech production system. In the recent year, the trend towards automated analysis of pathological noise signal has gain momentum. The awkwardness of analog equipment has simulated development of digital computer techniques for processing and analysis of pathological speech signal in patient care system. The given filter design techniques & prepossessing of speech signal can be used in any speech processing application. In this paper, speech signals of patients are taken and they are preprocessed .In prepossessing Speech signal is passed through Moving average, High pass filter for removal of noise. After removing the noise, the signals are framed & passed through window. The output of window has a preprocessed signal & can be used for any speech application like voice disorder identification

Keywords: Pathological speech signal, moving average filter, high pass filter, framing, windowi

Pages: 118 - 121 | DOI: 10.15224/978-981-07-1847-3-572

26. IMC BASED PID CONTROLLER DESIGN FOR A JACKETED CSTR

Authors: ROHITH.KOMMINENI

Abstract: This paper deals with the operation, mathematical modeling and controller design for the jacketed continuous stirred tank reactor. Ziegler Nichols tuned PID controller is poor in response for Non Linear processes. From the analysis of the process the IMC based controller is suits best for the CSTR.Controller is designed to control the reactant mixture temperature with in the reactor. The scheme is then design and tested using Matlab. The simulations are presented for PID and IMC controllers, and found IMC based Controller is best suits for the CSTR.

Keywords: Nichols tuning Method, PID Controller, IMC based Controller and CSTR.

Pages: 122 - 126 | DOI: 10.15224/978-981-07-1847-3-575

27. ANALYSIS OF DC SOLAR WATER PUMP AND GENERALIZED PHOTOVOLTAIC MODEL USING MATLAB/SIMULINK

Authors: B.NARESH , K.R.K.PRASAD , P.MADHU

Abstract: This paper presents the implementation of a simple but efficient photovoltaic water Pumping system by generalized photovoltaic model using Matlab/Simulink software package, which can be representative of PV cell,module, and array for easy use on simulation platform. It provides theoretical studies of photovoltaics and modeling techniques using equivalent electric circuits. The system employs the maximum power point tracker (MPPT).In this paper, a PV-powered water pump using Permanent Magnet DC Motor (PMDC) is taken into account. The modeling of PV cell, Boost converter and PMDC motor has been studied and developed. The overall PMDC pumping system fed by solar cell is simulated and its rK.R.K results are obtained.

Keywords: array, generalized, PMDC Motor.

Pages: 127 - 131 | DOI: 10.15224/978-981-07-1847-3-579

28. ADVANCED OPTIMIZED COOLING SYSTEM FOR AIR-COOLED AND COOLANT-COOLED IC ENGINES USING FUZZY LOGIC

Authors: B K ROY , SANTHOSH K V , NALIN KUMAR SHARMA

Abstract: Now a days it is very important to increase the efficiency of Internal Combustion (IC) engines due to many factors such as fuel economy, fuel crisis and ultimately to increase the output. This paper proposes an effective cooling system in IC engine. During the process of combustion a large portion of heat is transferred to various engine components and the engine may be damaged unless the excess heat is carried away and these parts are adequately cooled. Adequate cooling is then a fundamental problem associated with internal combustion engines. In the present paper, efforts have been made to highlight the concept of an intelligent cooling system. The intelligent cooling concept is proposed to overcome the shortcomings arising when applying conventional cooling methods. The basic principle behind this is to control the flow rate of coolant and speed of thermo fan by regulating the valve controlled using fuzzy PID logic. The design was modeled and simulated using the MATLAB/Simulink plat

Keywords: IC engine, Fuzzy-PID controller, Cooling system

Pages: 132 - 135 | DOI: 10.15224/978-981-07-1847-3-591

29. ADVANCED OPTIMIZED COOLING SYSTEM FOR AIR-COOLED AND COOLANT-COOLED IC ENGINES USING FUZZY LOGIC

Authors: B K ROY , SANTHOSH K V , NALIN KUMAR SHARMA

Abstract: Now a days it is very important to increase the efficiency of Internal Combustion (IC) engines due to many factors such as fuel economy, fuel crisis and ultimately to increase the output. This paper proposes an effective cooling system in IC engine. During the process of combustion a large portion of heat is transferred to various engine components and the engine may be damaged unless the excess heat is carried away and these parts are adequately cooled. Adequate cooling is then a fundamental problem associated with internal combustion engines. In the present paper, efforts have been made to highlight the concept of an intelligent cooling system. The intelligent cooling concept is proposed to overcome the shortcomings arising when applying conventional cooling methods. The basic principle behind this is to control the flow rate of coolant and speed of thermo fan by regulating the valve controlled using fuzzy PID logic. The design was modeled and simulated using the MATLAB/Simulink plat

Keywords: IC engine, Fuzzy-PID controller, Cooling system

Pages: 132 - 135 | DOI: 10.15224/978-981-07-1847-3-591

30. FUZZY - SECOND ORDER PSO BASED OPTIMAL CAPACITOR ALLOCATION AND SIZING IN RDF TO MAXIMIZE ANNUAL SAVINGS

Authors: M.Y.BALAJI PRASANNA , S.M.KANNAN

Abstract: A new method of Second order PSO for a more effective capacitor sizing in radial distribution feeders to reduce the real power loss and to improve the voltage profile is proposed. The location of the nodes where the capacitors should be placed is decided by a set of rules given by the fuzzy expert system and the sizing of the capacitors is modeled by the objective function to obtain maximum savings using Particle Swarm Optimization (PSO). The newer upgrade to PSO enables the problem to use the knowledge of past solutions into present sizing and hence a second level of optimization procedure to provide better results. A case study with IEEE 15-bus and 34-bus radial distribution feeders is presented to illustrate the applicability of the newer algorithm

Keywords: Fuzzy expert system; Second Order Particle swarm optimization; Radial distribution feeders

Pages: 136 - 140 | DOI: 10.15224/978-981-07-1847-3-594

31. PROTOTYPE SIMULATOR OF POLICE OPERATIONS IN CRISIS AS A TOOL USED IN THE PROCESS OF FUTURE COMMANDING PERSONNEL'S EDUCATION

Authors: ANDRZEJ URBAN , ANNA ROLKA , TOMASZ SIEMIANOWSKI

Abstract: The paper presents an issue of updating methods of commanding personnel’s training course on commanding police operations by means of simulator of police activities in crisis. With regard to fundamental forms of simulations used in armed forces’ combat operations, the article describes a prototype of a simulator of police operations in crisis. The prototype which is under construction will be oriented at improvement of the process of commanding the Police force at all levels (as far as its function is considered) and will be used to simulate physical (real) phenomena in artificially created environment. The proposed solution is a computer system which by means of modeling and simulation techniques will present interesting for executives’ training course fragment of reality. The article also presents principles of creating and applying simulation solutions by means of AI systems in trainings of security services. The presented prototype of a simulator will enable future commanding offic

Keywords: simulation systems, crisis situations, security services, simulation training

Pages: 141 - 144 | DOI: 10.15224/978-981-07-1847-3-608

32. HUMAN SUPPORT FOR VIRTUAL SIMULATION TRAINING

Authors: ANDRZEJ URBAN , GRZEGORZ GUDZBELER , MARIUSZ NEPELSKI

Abstract: Games are becoming more popular as a tool for training, due to their promise of increased motivation, context-sensitive presentation of information, immediate feedback and increased sense of immersion. This kind of training should provide proper balance between being fun and engaging, and being informative and effective as a training tool. Supplementing proven training methods by computer simulation tools supported by supervision of experts ensures that the training will suit the demands of the organization. Provides achieve a result which is educate appropriate behavior as a reaction to the proper behavior of the system simulation. This approach will provide the correct data, even in very difficult situations for modeling and simulation. This will allow the use of simplifications in the models which have a positive impact on performance. The system of this type can run on standard computers to simulate large-scale operation without the use of supercomputers and the effect will still b

Keywords: simulation systems, crisis situations, security services, simulation training, virtual games

Pages: 145 - 148 | DOI: 10.15224/978-981-07-1847-3-612

33. REDUCED ORDER OBSERVER BASED STATE FEEDBACK DESIGN OF A PRACTICAL EXCAVATOR ARM ATTACHED TO A CRANE(2 DOF)

Authors: GOURHARI DAS , PARIJAT BHOWMICK , SANJAY BHADRA

Abstract: A nonlinear robot plant that incorporates robot manipulator dynamics as well as implementation of observer to estimate unmeasured states is proposed in this paper. The robot manipulator operates in the robot task space in lifting the object at a defined place and at a specified angle. Computer simulations are performed to verify feasibility of robot manipulator along with the implemented observer. The experiments show that the proposed work produces good tracking performances in estimating the states yielding conspicuously improved performance. Computationally this method is very elegant.

Keywords: Robotic Arm, Manipulator, State Feedback Control, Multiple Integrator, Forward Kinematics, Lagrangian, Reduced-order Observer, Generalized Matrix Inverse, Luenberger Observer, Das & Ghosal Observer.

Pages: 149 - 153 | DOI: 10.15224/978-981-07-1847-3-623

34. A DETAILED COMPARATIVE STUDY BETWEEN REDUCED ORDER LUENBERGER AND REDUCED ORDER DAS & GHOSAL OBSERVER AND THEIR APPLICATIONS

Authors: GOURHARI DAS , PARIJAT BHOWMICK

Abstract: In this paper a detailed comparative study has been carried out between two well known methods of reduced order observer construction, namely - Reduced Order Luenberger method (1964, 1971) [1, 2] and Reduced Order Das and Ghosal method (1981) [5]. Through proper examples and illustrations, similarities and dissimilarities between the above mentioned methodsand their advantage & disadvantages are explained in this paper. Brief mathematical preliminaries, a few theorems, lemmas and governing equations are also included in this paper according to the context.

Keywords: Luenberger Observer, Generalized Matrix Inverse, State Feedback Control, Ackermann’s formula, Full & Reduced order observer, Inverted Pendulum.

Pages: 154 - 161 | DOI: 10.15224/978-981-07-1847-3-626

35. ENERGY EFFICIENT ALGORITHM: PEDAP FOR WSN

Authors: K. RAMESH KUMAR , SANJOY SANA

Abstract: Wireless sensor network (WSNs) are networks of distributed autonomous device that can sense or monitor physical or environmental condition cooperatively. The WNS application can be classified in different categories: monitoring, alerting, healthcare assistance, and actuating, among others. In this environment where in a round of communication each of the sensor nodes has data to send to a base station, it is important to minimize the total energy consumed by the system in a round so that the system lifetime is maximized. With the use of data fusion and aggregation techniques, while minimizing the total energy per round, if power consumption per node can be balanced as well, a near optimal data gathering and routing scheme can be achieved in terms of network lifetime. So far, besides the conventional protocol of direct transmission, two elegant protocols called LEACH and PEGASIS have been proposed to maximize the lifetime of a sensor network. In this paper, we propose two new algorithms

Keywords: Energy Efficiency, Data fusion and Aggregation, PEGASIS, LEACH, PEDAP.

Pages: 162 - 166 | DOI: 10.15224/978-981-07-1847-3-646

36. NAVIGATION PATTERN MINING ALGORITHM FOR CONTENT BASED IMAGE RETRIEVAL

Authors: K.RAMESH KUMAR , T. SELVAGANAPATHY

Abstract: Frequent pattern mining algorithm is an interesting problem and most essential field in data mining, a Navigation pattern defines the user’s behavior towards a particular area, in this paper we propose an algorithm for mining user navigation Patterns using frequent item sets, by using transaction Reduction method. By using Association rule mining we extract the interesting Correlation and relation between the large volumes of Transactions in the databases. In this paper we merge the navigation pattern mining algorithm with the Content based image retrieval application. Thus by merging it we obtain an effective knowledge discovery process by which it overcomes the draw backs of the existing system This work thus used to extract the navigation patterns discovered from the data bases used in the Content Based image retrieval. And also this work is used as the offline Knowledge discovery process in CBIR.

Keywords: Association rule mining, frequent item sets, Transaction Reduction, Content based image retrieval

Pages: 172 - 176 | DOI: 10.15224/978-981-07-1847-3-655

37. DETERMINING OF OPTIMAL CAPACITY RESERVE IN A DEREGULATED ELECTRICITY MARKET BY MODELING THE CONSUMERS

Authors: JAVAD NIKOUKAR , JAVAD NOROUZI

Abstract: Determining of required spinning reserve capacity of system is the most important tasks of system operator for safe and ensure operation of power systems. The spinning reserve is the unused capacity which can be activated on decision of the system operator and which is provided by devices which are synchronized to the network and able to affect the active power [1]. In this paper represented a method to determining the capacity of reserve in deregulated systems with the goal of maximizing public benefits by modeling the consumers. Objective function associated with this method, is minimizing total cost of production and expected cost of outage to consumers. Simplicity of this algorithm is the superiority of this method over other stochastic methods. Finally this algorithm was applied to 14 bus IEEE network and the result was compared with different criteria and has observed that this algorithm can easily prevent the payment of additional costs.

Keywords: spinning reserve, public benefit, value of loss load, willingness to pay

Pages: 177 - 181 | DOI: 10.15224/978-981-07-1847-3-658

38. M-FISH CHROMOSOME IMAGES CLASSIFICATION BY WATERSHED BASED SEGMENTATION APPROACH

Authors: LIJIYA A, SREEJINI K.S , V. K. GOVINDAN

Abstract: Karyotyping is a technique used to display and study the human chromosomes for detecting abnormalities, genetic disorders or defects. M-FISH (Multiplex Fluorescent In-Situ Hybridization) provides color karyotyping. In this paper, naive Bayes classification of M-FISH chromosome images based on watershed based chromosome segmentation is presented. It is observed that the classification of the watershed regions by using the naive Bayes classifier works better than pixel by pixel classification. By adding the feature, standard deviation along with mean of each region, improved classification accuracy was observed. The approach was tested on a database and found to provide an accuracy of 73%.

Keywords: M-FISH, chromosome, segmentation, karyotyping, watershed transform, Bayes classifier.

Pages: 182 - 186 | DOI: 10.15224/978-981-07-1847-3-663

39. USED OF VARIOUS EDGE DETECTION OPERATOR FOR FEATURE EXTRACTION IN VIDEO SCENE

Authors: BHARATRATNA P. GAIKWAD , GANESH R.MANZA , RAMESH R. MANZA

Abstract: This paper presents the implementation of an adaptive edge-detection using Simulink. Simulink is a simulation modeling and design tool and GUI based diagram environment. The Simulink based customizable framework is designed for rapid simulation, implementation, and verification of video and image processing algorithms and systems. An edge is the boundary between an object and the background, and indicates the boundary between overlapping objects.The Edge detection process detects outlines of an object, scene text and boundaries between objects and the background in the video image. Edge detection is in the forefront of video processing for object detection, it is crucial to have a good understanding of edge detection methods. Edges characterize boundaries and edge detection is one of the most difficult tasks in image processing hence it is a problem of fundamental importance in image processing.In this work the comparative analysis of various video image edge detection methods is like

Keywords: Edge Detection, Sobel, Prewitt, Canny, Simulink

Pages: 187 - 191 | DOI: 10.15224/978-981-07-1847-3-668

40. PHYSICAL ANALYSIS OF OFDM BASED IEEE 802.11A FOR MULTIPATH RAYLEIGH CHANNEL

Authors: SWAPNITA R. DHABRE

Abstract: Wireless local area networks(W-LANs) have become increasingly popular due to the recent availability of affordable devices that are capable of communicating at high data rates.The IEEE 802.11a standard is WLAN standard which uses orthogonal frequency division multiplexing technology.The standard provides data rates upto 54 Mbps making it a good candidate for high-speed wireless communication. It utilizes different modulation schemes for different data rates,since the choice of modulation scheme to be used depends upon the current state of the transmission channel,Recent wireless devices often support multiple modulation schemes, and hence multiple data rates are possible.The selection of the best rate is obtained through a rate adaptive MAC protocol called the Receiver-Based Auto Rate (RBAR) protocol[1].The performance of the standard is studied under the indoor wireless environment for Multipath Rayleigh channel.In this paper ,the simulation results for modulation schemes 16-QAM and 6

Keywords: OFDM, WLAN, BER,SNR, RBAR.

Pages: 192 - 196 | DOI: 10.15224/978-981-07-1847-3-671

41. AN APPROACH TO IMAGE SEGMENTATION USING K-MEANS CLUSTERING ALGORITHM

Authors: A.A KHURSHID , CHINKI CHANDHOK , SONI CHATURVEDI

Abstract: This paper presents a new approach for image segmentation by applying k-means algorithm. In image segmentation, clustering algorithms are very popular as they are intuitive and are also easy to implement. The K-means clustering algorithm is one of the most widely used algorithm in the literature, and many authors successfully compare their new proposal with the results achieved by the k-Means. This paper proposes a color-based segmentation method that uses K-means clustering technique . The k-means algorithm is an iterative technique used to partition an image into k clusters. The standard K-Means algorithm produces accurate segmentation results only when applied to images defined by homogenous regions with respect to texture and color since no local constraints are applied to impose spatial continuity. At first, the pixels are clustered based on their color and spatial features, where the clustering process is accomplished. Then the clustered blocks are merged to a specific number of

Keywords: K-means Algorithm, Clustering, local minimum, global minimum, Segmentation.

Pages: 197 - 201 | DOI: 10.15224/978-981-07-1847-3-675

42. COMPRESSION OF SCAN DIGITIZED HANDWRITTEN TEXT FOR INDIAN LANGUAGE DOCUMENT

Authors: L.G. MALIK , SMITA V. KHANGAR

Abstract: Document image compression is used for the speedy transmission of the data over the web. This paper deals with effective compression scheme for handwritten gray level documents in Devnagri script. The current OCR technology is not effective for handling the handwritten textual images. The proposed compression scheme is based on the separation of foreground and background of the image. Experiments have been done for the handwritten textual images. These document images are written in Devnagri (Hindi and Marathi). The results of the some modules progress towards achieving the good compression ratio are presented. Compression scheme are available for printed textual images in Indian language. But for handwritten text images very little work is reported. Thus the compression for handwritten text in the context of Indian language is important

Keywords: Document Image Compression,Foreground and Background Separation, Indian Language, Handwritten text,Devnagri Script,Gray Level Documen

Pages: 203 - 206 | DOI: 10.15224/978-981-07-1847-3-689

43. EXCITATION CONTROL DURING SHORT CIRCUIT TEST SEQUENCE OF 1500 MVA SHORT CIRCUIT GENERATOR

Authors: N. R. MONDAL , ARUN KUMAR DATTA , G.VENKATESWARLU , M. A. ANSARI

Abstract: Short circuit (S.C.) generator is very much different from the conventional generators used in power generating stations. Driving S.C. generator and extracting power from it is indeed a specialized job. Power drawn from S.C. generators during test is much high in magnitude hence it has to be taken care that the supply grid should not to be loaded during the period of short circuit. Normally generators are driven with different kinds of prime mover. With the advent of the solid state devices it became possible to run a generator even without a prime mover. This paper describes the control techniques used during different Test Sequences for a 1500 MVA, 12.5 kV, 3000 rpm, 50 Hz S.C. Generator. These techniques are verified practically on actual test equipments and supported with the resultant waveforms. This generator is functional at Bhopal unit of Central Power Research Institute.

Keywords: Short Circuit Genertator, Short Circuit Test Sequence, Excitation Control

Pages: 207 - 211 | DOI: 10.15224/978-981-07-1847-3-692

44. MANET ENERGY EFFICIENCY ANALYSIS USING MST BASED TOPOLOGY CONTROL ALGORITHM AND COMPARISON WITH REACTIVE AND PROACTIVE PROTOCOLS

Authors: S. UMA , S.P.SHANTHARAJAH

Abstract: MANET are a dynamic and infra structure less networks. The major constraint of this type of networks is Energyoptimization because the nodes involved in these types ofnetworks are battery operated. MANET has limited resources like bandwidth and energy. Due to limited battery power nodes die out early and affect the network lifetime. Both minimization of power and other QoS requirements like delay, throughputs are have to be take care properly. Mobile Ad Hoc Networks are more perceptive to these issues where each mobile device is active like a router and consequently, routing delay adds considerably to overall end-to-end delay. In this paper, we propose an energy efficiency analysis topology control algorithm. Our algorithm dynamically adjusts transmission power of mobile nodes to construct new topology which can meet bandwidth and end-to-end delay constraints as well as minimize the total energy consumption in network. This model has been compared with AODV and DSDV protocols in CBR tr

Keywords: NET, Energy minimization, topology control algorithm

Pages: 212 - 216 | DOI: 10.15224/978-981-07-1847-3-711

45. PROTECTION OF SIX PHASE TRANSMISSION LINE AGAINST PHASE TO PHASE FAULTS

Authors: A.S. THOKE , ANAMIKA YADAV , EBHA KOLEY , TEJASH KHODIYAR

Abstract: Power transmission lines are the vital links providing the essential continuity of service from generating station to the end users. As the demand of electricity is increasing day by day, the multiphase power system is a viable alternative. Six phase transmission lines are quite promising for improvement in power carrying capacity of existing systems keeping the same right-of-way. The implementation of 6-phase transmission line goes critical as its protection against various faults is quite intricate task. In this paper we are proposing an ANN based protection scheme against phase to phase faults. MATLAB® software and its associated Simulink® and Simpowersystem® toolboxes have been used to simulate the six phase transmission line. Fundamental components of six phase voltages and currents have been used as inputs for training of the Artificial Neural Network for detection and classification of faulted phase using neural network toolbox of MATLAB®. A sample 138 kV system of 68 km length,

Keywords: Artificial Neural Network, high phase order transmission system, fault detection and classification.

Pages: 217 - 220 | DOI: 10.15224/978-981-07-1847-3-714

46. RFID ENABLED AUTOMATED LIBRARY

Authors: NILESH KUNHARE , DHANVIJAY CHAUBEY , VAIDEHI DEO

Abstract: The idea of this paper is to implement automated library based on RFID (Radio Frequency Identification) technology. We are developing this project for integrating the RFID system in the library so to reduce the work load in the library. The scope of work of the paper is to develop an automatic library management system to assist the librarians for more efficient management of library by helping to find any misplaced books on the library shelf, books verification, stock management and allowing the students to issue and return books by themselves along with efficient searching facility. The proposed system will also be able to provide security in the library premises by detecting book theft. Graphical User Interface (GUI) for the system will be developed using Microsoft C#.Net. The tasks handled by GUI are to store details on information of the book, members of the library to the database and will perform all the functions related to library management.

Keywords: Frequency, Identification,technology, developing

Pages: 221 - 223 | DOI: 10.15224/978-981-07-1847-3-716

47. MINIMUM-ORDER OBSERVERS FOR HYBRID WIND TURBINE AND FUEL CELL SYSTEM

Authors: B.JAGANATHAN , NEELAM SHIVHARE , R.SNEHA , S.ARCHANA , S.PAVITHRA

Abstract: Renewable Energy Sources are the upcoming energy sources, for they are readily available. The performance of these sources depends upon the available input. A continuous monitoring of the output which is also dependent upon the state variables of the source model (state model) is necessary. It thus, necessitates the incorporation of an observer in the existing system which estimates the state variables continuously. This paper proposes a novel method of designing a minimum order observer for a wind turbine, which further feeds a PMSG. This observer estimates the state variables of the wind turbine and compares this with the state variables of the actual plant model. This in turn generates a control vector which further provides the necessary control actions so that the output of the wind turbine is optimized to an acceptable extent. Two different configurations are made use for the simulation. The plant model alone in its closed loop form and the plant with the designed minimum order o

Keywords: Minimum, Observer, Renewable Energy Sources, Wind Turbine, State model, Fuel cells, Impulse Response, Stability, PMSG, Ackermann’s formula, Gain matrix

Pages: 224 - 228 | DOI: 10.15224/978-981-07-1847-3-720

48. ARTIFICIAL NEURAL NETWORK BASED HARMONIC OPTIMIZATION OF MULTILEVEL INVERTER TO REDUCE THD

Authors: MITALI SHRIVASTAVA , SWAPNAJIT PATTNAIK , VARSHA SINGH

Abstract: A novel concept of application of Artificial Neural Networks (ANN) for estimating the optimum switching angles for the voltage and harmonic control of cascaded multilevel inverters is presented. In this paper, the neural network is trained off line using the desired switching angles given by the classic harmonic elimination strategy to any value of the modulation index. After training the proposed ANN system, a large and memory-demanding look-up table is replaced with trained neural network to generate the optimum switching angles with lowest Total Harmonic Distortion (THD) for a given modulation index. This technique can be applied to multilevel inverters with any number of levels. As an example, a seven-level and eleven-level inverter is considered and the optimum switching angles are calculated, in order to eliminate the odd harmonics and to reduce THD. The ANN control algorithm is to be implemented using m-file program. Theoretical concepts have been validated in simulation results

Keywords: Networks (ANN) for estimating the optimum switching angles for the voltage

Pages: 229 - 233 | DOI: 10.15224/978-981-07-1847-3-725

49. SMART ANTENNA TECHNIQUE FOR PERFORMANCE IMPROVEMENT OF CDMA & MC -CDMA

Authors: AAMIR SHAIKH , S.P.WADKAR , SIRAJ PATHAN

Abstract: To improve coverage and performance in the CDMA as well as in MC-CDMA network, the simulation model and an evaluation method for the smart antenna system in the CDMA system is presented. Here the data service users as well as the voice services users are considered. The proposed method that can show the impact of smart antenna system on the Ec/Io coverage area and radius also presented as function of antenna type and beamwidth.The performance improvements are remarkable in the smart antenna systems. The performance of the system is evaluated in terms of Average Ec/Io, Area, Radius, Ec/Io Difference, Throughput with Number of users per sector. Both results are discussed based on various parameters like flat urban type morphology, Okumura Model for omni directional antennas air link, orthogonality factor and antenna beam width.

Keywords: Air conditioner, receiver-drier, crankshaft, heat- laden, sensible heat, latent heat, wall factor

Pages: 234 - 238 | DOI: 10.15224/978-981-07-1847-3-726

50. AUTOMATED MONITORING OF BOTTLE FILLING PROCESS USING LAB VIEW

Authors: PANKAJ KUMAR BHOWMIK , SANTHOSH K V

Abstract: This paper aims at designing an automated system to monitor the bottle filling process in a beverage industry. The objectives of the proposed work are to (i) check whether the reused bottle is free from impurities before it is filled with beverage, (ii) check whether the bottle is filled with proper quantity of beverage. The proposed work is achieved using image processing techniques utilizing the LabVIEW platform without disturbing the high speed production line. The images of bottle are captured using a high frame rate smart camera which is transferred to PC for processing through RS232 port. LabVIEW is programmed to acquire the data and apply image processing algorithms and initiate necessary action like displaying the status of the bottle in the production line, diversion of bottle from the production line if it doesn’t satisfy the standards. All these activities need to be performed without disturbing the speed of the production line.

Keywords: everage industry, Automation, Image processing, LabVIEW

Pages: 239 - 243 | DOI: 10.15224/978-981-07-1847-3-735

51. A STUDY ON A CABTYRE CABLE FOR A TRANSIENT CONDITION

Authors: ASHA SHENDGE , NAOTO NAGAOKA

Abstract: The cabtyre cables are widely used in power distribution systems. It is necessary to have an accurate cable models to predict switching or lightning surges. Transient characteristics on the cabtyre cable are measured. The cabtyre cable frequency characteristic of characteristic impedance and propagation constant are studied and discussed for aerial mode. It is found for the aerial mode-2 cable characteristic impedance can be represented by RL series circuit. The attenuation increases as the frequency increases. This study supports to develop a generalized frequency dependent cabtyre cable model.

Keywords: cabtyre cable, EMTP, frequency dependence

Pages: 244 - 247 | DOI: 10.15224/978-981-07-1847-3-743

52. APPLICATION OF ULTRA WIDEBAND (UWB) MODULATION

Authors: HEMA LANJE , SMITA K.SHRIPAD

Abstract: Ultra wide band (UWB) leads promising technology for next generation communication especially for high data rate & short range application. Existing secure RFID tags rely on digital cryptographic primitives in the form of hashes & blocks ciphers which leads to large system latencies. Existing RFID systems can easily be eavesdropped or jammed. To overcome the above problem we propose a new approach for secure passive RFIDs based on UWB communication. In architecture of UWB the time hopped pulse position modulation (TH-PPM), in which the hopping sequence is known only to the reader & the tag. Eavesdropping of the communication is extremely difficult by adopting the hopping sequence as a secret parameter, thus by using UWB modulation technique we can avoid digital cryptography

Keywords: Ultra wide band, (UWB) , technology

Pages: 248 - 252 | DOI: 10.15224/978-981-07-1847-3-749

53. DESIGN AND SIMULATION OF DATA SCRAMBLER AND CONVOLUTIONAL ENCODER FOR WLAN(802.11A)

Authors: PRADEEP B. MANE , SHOBHA PAWAR

Abstract: The growth of 802.11-based wireless LANs provides higher data rates and greater system capacities. Among the IEEE 802.11 standards, the 802.11a standard based on OFDM modulation scheme has been defined for high-speed and large-system-capacity challenges. The paper firstly introduces WLAN and compares different WLAN standards. It presents the design of data scrambler and convolutional encoder for WLAN 802.11a transmitter, it also presents the synthesis and simulation results for the same using Xilinx CPLD XA9536XL-15-VQ44.

Keywords: WLAN; OFDM; VHDL.

Pages: 253 - 256 | DOI: 10.15224/978-981-07-1847-3-761

54. DESIGN OF A CHEAP AND SIMPLE SOLAR CAR AIR CONDITONER

Authors: AMARTYA KUMAR GHOSH , ASIM GHOSH , SAYONENDU MAJUMDAR

Abstract: This paper deals with a novel way to design a compact and portable air conditioner powered by the Solar PV module, without need of any fuel consumption and harmful refrigerant gases. The air conditioner is mainly designed keeping in mind, of using it in the cars replacing the conventional version of running the compressor by coupling it with the fuel driven car engine, thus preventing fuel consumption and producing green energy. The main feature of this model is its portability and energy efficient way of charging, thus saving the fuel that requires for a conventional car A.C. The following paper also deals an innovative method to design the controller circuit and the ice box where the dry ice is kept and used as refrigerant of the system. It is also found that the overall complexity of the car air conditioner till date is largely reduced in this model. This paper gives a comparative study of the energy efficiency in the present day car A.C. system driven by fuel and the model we desig

Keywords: Air conditioner, receiver-drier, crankshaft, heat- laden, sensible heat, latent heat, wall factor

Pages: 257 - 259 | DOI: 10.15224/978-981-07-1847-3-762

55. THE INFLUENCE OF VARIOUS WORKLOAD DESCRIPTIONS ON A GRID SCHEDULING MECHANISM

Authors: ARKAPRAVA BHADURI MANDAL , MOTAHAR REZA

Abstract: Grid Computing is a form of distributed Computing that has emerged as a viable solution to meet the ever increasing needs for computational power and data management capability. Designing solutions in such grid computing framework entails addressing much more complicated issues compared to chore software development, namely concurrency, heterogeneity, scalability and so forth; just to name a few. In order to simplify the task of programming in grid environment a software layer is employed to mask off the massive underlying heterogeneity in network, hardware, operating system and programming languages, known as the middleware. Moreover, resources in a grid are dynamic and thus incorporating appropriate scheduling mechanism becomes a challenging proposition. This paper addresses some major issues in context of job scheduling in computational grids: namely, average active jobs, busy time of CPU, heap memory and average CPU load. They are treated as Work Load Description (WLD) in a grid sc

Keywords: GridComputing,Scheduling,Work Load Description, GridGain;

Pages: 260 - 264 | DOI: 10.15224/978-981-07-1847-3-765

56. PERFORMANCE IMPROVEMENT OF ASD FED INDUCTION MOTOR UNDER VOLTAGE SAG CONDITIONS

Authors: PARANJOTHI.S.R , SELVARAJ.A.

Abstract: Process control and energy conservation are the two primary reasons for using an adjustable speed drive (ASD). However, voltage sags are the most important power quality problem facing many commercial and industrial customers. Voltage sag problem arise because of transients in supply voltage by the usage of heavy inductive loads. Therefore to improve the performance and reliability of the motor and drive, new controlling drives has to be implemented with the help of power electronics. Adjustable Speed Drives (ASD) is the emerging trend in the induction motor research to improve the performance during voltage sag conditions. The ride-through capability of the induction motor during voltage sag is taken into account that duration of the ride-through operation depends on the initial motor flux, speed level, rotor time constant, load torque and inertia. Also Inverter design mainly affects the motor performance. A new combination technique has been proposed for the mitigation of voltage sag

Keywords: Speed drive, Voltage sag, Z- source inverter, Neutral linked Vienna rectifier.

Pages: 265 - 269 | DOI: 10.15224/978-981-07-1847-3-770

57. ADAPTIVE WEIGHTED PARTICLE SWARM OPTIMIZATION FOR SCHEDULING INDEPENDENT TASKS

Authors: SARATHAMBEKAI S , VIDYA G , YAMUNADEVI S P

Abstract: Scheduling is the main difficulty in heterogeneous computing (HC) systems in achieving the high performance. In this paper, a meta-heuristic approach based on Particle Swarm Optimization (PSO) is adopted for solving task scheduling problem. PSO is a population-based algorithm to find the optimal solutions, but its performance is decreased when considering multi-optimization problem. In this paper, an Adaptive Weighted Particle Swarm Optimization is proposed for multi-objective optimization. AWPSO is an efficient and simple tool for multi-objective and multi-dimensional problem. AWPSO enhance the global search ability and to overcome the local optimum by introducing an acceleration factor. The goal is to minimize the makespan and flowtime. The experimental results showed that the performance of the proposed method is effective compared with other heuristic optimization technique namely PSO in finding the optimal solutions.

Keywords: Scheduling, Adaptive Weighted Particle Swarm Optimization,accelaration factor, makespan, flowtime

Pages: 270 - 273 | DOI: 10.15224/978-981-07-1847-3-773

58. A NOVEL APPROACH FOR BEARING FAULT DETECTION AND CLASSIFICATION USING ACOUSTIC EMISSION TECHNIQUE

Authors: BRIJESHKUMAR SHAH , DUSHYANTH.N .D S. JANA , NAL, SARVAJITH M

Abstract: Ball bearings are one of the most important components in the machine involving the rotary motion. Ball bearing failure can cause a significant amount of maintenance cost and serious safety problems. Hence detection of the fault at its early stage is important. In this paper, a novel approach for fault detection of ball bearing by combining time, frequency and time-frequency domains are used. Two layer multiclasssvmis used for the classification of fault into an outer race fault, inner race fault, ball fault and healthy bearing. A comparison between Envelope Wavelet Packet Transform, Wavelet Packet Transform and proposed method is carried out. The experimental observation shows that the proposed method is able to detect the faulty condition withbrijes high accuracy.

Keywords: Novel, Approach, Detection

Pages: 275 - 277 | DOI: 10.15224/978-981-07-1847-3-779

59. STUDY AND ANALYSIS OF THE PERFORMANCE OF CAPACITY OF AD-HOC WIRELESS NETWORKS

Authors: RANJANA D. RAUT , SANJEEV KUMAR SRIVASTAVA

Abstract: The total capacity obtained from a network is an essential performance metric. In wireless ad-hoc networks, the dynamic topology and stochastic variations in channel characteristics makes it difficult to analytically determine this metric. However an analytical closed form expression for the network capacity is developed. The cumulative distribution function of the signal to Interference Power Ratio at each receiver is derived analytically. Then the capacity of network is studied and closed form expressions are determined. By examining the effect of the outage threshold, less simultaneous communications, each with a higher rate results in higher total capacity.

Keywords: expressions, determined, examining

Pages: 278 - 282 | DOI: 10.15224/978-981-07-1847-3-783

60. MOBIHEALTH: A SYSTEM FOR HEALTH CARE IN INDIA

Authors: DHARMESH M. SHAH , PARAG . N. DAVE

Abstract: In the healthcare domain, a major challenge is how to provide better healthcare services to an increasing number of people using limited financial and human resources. Now a days MobiHealth can be defined as the application of emerging mobile communications and network technologies for health care systems. It involves the use of mobile computing, medical sensors, and communications technologies for health care. The needs to provide medical services in remote areas have motivated researchers to develop the telemedicine system using mobile technology. Wireless technology enhances patient self-management and quality of life. Disease management facilitated through information and communication technology (ICT) implies more effective and efficient care of patients with chronic illnesses. Successful implementation of MobiHealth makes the right information available at the right place, at the right time, and in the correct form at low cost. As wireless technology increases in flexibility, pop

Keywords: medical sensors, Cost-effective,life saving, digital transmission, remotely monitoring, bottom-of-the pyrami, connectig the un-cconnected, reaching the un-reached, early siagnosis, anywhere & anytime,quality of life, suit-case based communication, e-education, e-governan

Pages: 283 - 287 | DOI: 10.15224/978-981-07-1847-3-789

61. COGNITIVE FACTOR OF 3G MOBILE VIDEO ESPOUSAL BY THE INDIAN MOBIE USERS

Authors: DHARMESH M. SHAH , PARAG . N. DAVE

Abstract: Mobile technology has germinated dramatically within the last 10 to 15 years. Real-time visual communication via mobile is feasibly the most signature feature of 3G technology. The anxiety is whether 3G will change any interest and explosive uptake by the mobile user community. In an Indian circumstance with the technology being comparatively new, it proved difficult to guess the Indian Mobile community’s response to 3G mobile video. This paper investigate what factors the Indian mobile users regard as most likely to affect the intention to adhere 3G mobile video.

Keywords: 3G, Mobile video, Hypodharmeshthesis, Findings, teledensity, 3GPP, Tele-Medicine

Pages: 282 - 292 | DOI: 10.15224/978-981-07-1847-3-790

62. SEGMENTATION OF TOUCHING CHARACTERS IN HANDWRITTEN DEVANAGARI SCRIPT

Authors: DIPAK V. KOSHTI , SHARVARI GOVILKAR

Abstract: In this paper, we propose the method of segmentation only for touching characters for Handwritten Marathi Text that is the Devanagari script. There may be some touching characters in the word. Sometimes, interline space and noise makes line segmentation a difficult task. The main purpose of this paper is to provide the new segmentation technique based on joint point algorithm. Foreground and background information are used here for accurate segmentation. Our method can take care of this situation accurately. Segmentation is one of the important step of character recognition systems. It is an important step because inaccurately segmented text lines will cause errors in the recognition stage.

Keywords: joint point algorithm, touching characters, handwritten, devanagari script.

Pages: 293 - 297 | DOI: 10.15224/978-981-07-1847-3-797

63. A SUB-PIPELINED IMPLEMENTATION OF AES FOR ALL KEY SIZES

Authors: M.S. SUTAONE , P.V.SRINIWAS SHASTRY

Abstract: In this paper we have proposed three sub-pipelined architectures for Encryption, Decryption and Joint Encryption and Decryption (E/D). These architectures were implemented on Vertex-4 device. The use of Block RAM available in the device for key expansion as well as for the S-Boxes resulted in utilizing less slices and getting higher throughput in all three cases compared to the literature available till date. The encryption architecture clocked a throughput of 35.65Gbps using only 4823 slices while the decryption architecture achieved 33.73Gbps using 6847 slices only. The device used is XC4VLX60. The joint E/D architecture achieved a throughput of 31.62Gbps. Retiming techniques used to balance the computational path delays of encryption and decryption data paths.

Keywords: Sub-pipeline, S-Box, AES, Block RAM, Joint Encryption and Decryption

Pages: 304 - 308 | DOI: 10.15224/978-981-07-1847-3-810

64. A SUB-PIPELINED IMPLEMENTATION OF AES FOR ALL KEY SIZES

Authors: M.S. SUTAONE , P.V.SRINIWAS SHASTRY

Abstract: In this paper we have proposed three sub-pipelined architectures for Encryption, Decryption and Joint Encryption and Decryption (E/D). These architectures were implemented on Vertex-4 device. The use of Block RAM available in the device for key expansion as well as for the S-Boxes resulted in utilizing less slices and getting higher throughput in all three cases compared to the literature available till date. The encryption architecture clocked a throughput of 35.65Gbps using only 4823 slices while the decryption architecture achieved 33.73Gbps using 6847 slices only. The device used is XC4VLX60. The joint E/D architecture achieved a throughput of 31.62Gbps. Retiming techniques used to balance the computational path delays of encryption and decryption data paths.

Keywords: Sub-pipeline, S-Box, AES, Block RAM, Joint Encryption and Decryption

Pages: 304 - 308 | DOI: 10.15224/978-981-07-1847-3-810

65. IMPLEMENTATION OF POSE INVARIANT FACE RECOGNITION USING EIGENFACE APPROACH

Authors: M. E. ASHALATHA , MALLIKARJUN S. HOLI

Abstract: Face recognition is one among the several techniques for identification and verification of an individual. The approach in the present work transforms face images into a small set of characteristic feature images called eigenfaces, which are the principal components of the initial training set of face images. Recognition is performed by projecting a new image into subspace spanned by eigenfaces, followed by computing the distance between the resultant position in the face space and those of known face classes

Keywords: Face recognition, face space, eigenface, PCA, image pre processing

Pages: 309 - 314 | DOI: 10.15224/978-981-07-1847-3-812

66. A PORE BASED PARTIAL FINGERPRINT VERIFICATION SYSTEM USING PROBABILISTIC LOCAL BINARY PATTERN

Authors: MALAY S BHATT , SHEETAL S SHAH

Abstract: Matching of partial fingerprint is an important challenge due to miniaturization of fingerprint sensors and small usable portion where partial fingerprint does not include details of minutiae points. Therefore sweat pores on fingerprint have proven to be useful feature. A common challenge to the pore based method is to extract pores from fingerprint images of the Automatic Fingerprint identification system rely on level 1 and level 2 features which can be extracted using 500ppi resolution. But the pores are extracted using 1000ppi. In the research paper, the local binary pattern and its variations applied to fingerprint verification system is discussed

Keywords: Face Verification, Local Ternary Pattern, Probabilistic Local Binary Pattern, Uniform LBP

Pages: 315 - 318 | DOI: 10.15224/978-981-07-1847-3-815

67. NOVEL TECHNIQUE FOR SIGNAL CLASSIFICATION BASED ON NEURAL NETWORK IN VLSI

Authors: DHANANJAY S DABHADE , MANGESH S DABHADE

Abstract: Wireless sensor network is highly data centric. Data communication in wireless sensor network must be efficient one and must consume minimum power. Every sensor node consists of multiple sensors embedded in the same node. Thus every sensor node is a source of data. These raw data streams cannot be straightway communicated further to the neighboring node. These sensor data streams are first classified. A group of sensor nodes forms a cluster. Each node transfer data to a cluster head and then cluster head aggregates the data and sends to base station. Hence clustering and classification techniques are important and can give new dimension to the WSN paradigm. Basically, classification system is either supervised or unsupervised, depending on whether they assign new inputs to one of a infinite number of discrete supervised classes or unsupervised categories respectively. ART1 and Fuzzy ART are unsupervised neural network models which are used for classification of sensor data. ART1 model

Keywords: Artificial Neural Networks (ANN), Neural Network Architecture (NNA), Multi-layer neural network (MNN).

Pages: 319 - 323 | DOI: 10.15224/978-981-07-1403-1-890

68. THRESHOLD ACCEPTING APPROACH FOR IMAGE REGISTRATION

Authors: SHAJ G. S

Abstract: Image registration is the process of determining the point-to-point correspondence between two images of a scene. It is a very computationally intensive process. Heuristics can be applied to reduce the time involved. In this paper, a modified simulated annealing approach called threshold accepting is applied to image registration. This method provides fast and accurate results compared to the former.

Keywords: mage registration, normalized correlation, heuristic methods, simulated annealing, threshold accepting

Pages: 324 - 327 | DOI: 10.15224/978-981-07-1847-3-824

69. ROBUST PRE-PROCESSING AND POST-PROCESSING METHODS FOR 2D GEL ELECTROPHORESIS IMAGES USING NON-SEPARABLE QUINCUNX WAVELET

Authors: ASHUTOSH KUMAR UPADHYAY , RATNESH SINGH SENGAR , VIKRAM M. GADRE

Abstract: One of the most important tasks performed in proteomics is correct analysis and interpretation of 2D electrophoresis gel images. The nonlinearities in the gel formation and image acquisition process leads to distortions, overlapped protein spots, saturated spots, faint spots, nonlinear intensity and uneven background in the gel images. As a result, pre-processing and post processing steps are very challenging tasks for precise protein identification. The pre-processing step includes the task of removing additive or multiplicative noises and edge enhancement. The solutions available in the literature have failed to give satisfactory results. Non-separable wavelet processing methods, due to their inherent ability to be able to better represent directional information, seem to be promising for the processing of 2D gel images. In this paper, we explore approaches based on quincunx non-separable filter-banks for image pre-processing and post-processing. A novel method for edge preserved de-

Keywords: image registration, normalized correlation, heuristic methods, simulated annealing, threshold accepting

Pages: 328 - 332 | DOI: 10.15224/978-981-07-1847-3-829

70. NOVEL TOPOLOGY FOR WIND SPEED FORECASTING BASED ON ARTIFICIAL NEURAL NETWORK AT JAIPUR

Authors: AJAY KUMAR BANSAL , R. A. GUPTA , RAJEEV KUMAR

Abstract: Wind power generation is increasing very rapidly all around the world. The available wind energy depends on the wind speed, which is a random variable and depends on the location and weather conditions. For the wind-farm operator, this uncertainty creates a difficulty in the system scheduling and energy dispatching, due to not knowing the wind-power generation in advance. This paper presents an artificial neural network approach for wind speed forecasting at Jaipur, India. The Back propagation (BP) learning of neural network is used for training. The accuracy of the wind speed forecasting attained with the proposed approach is evaluated by reporting the numerical results from a real-world case study. The proposed approach for wind speed forecast has the accuracy of 95% and above.

Keywords: Artificial neural network, Back propagation, Wind speed, Forecasting.

Pages: 333 - 338 | DOI: 10.15224/978-981-07-1847-3-838

71. INTELLLIGENT SHE CONTROLLER FOR SINGLE PHASE POWER ELECTRONIC INVERTER

Authors: MADHURIMA CHATTOPADHYAY

Abstract: Harmonic Elimination in the output voltage of inverters is an important consideration as the presence of harmonics result in several undesirable secondary effects along with distorted waveforms. Most of the off-line PWM techniques use Newton-Raphson method for determination of trigger pulse-positions. This paper uses a combination of Evolutionary strategies and Artificial Neural Networks for design of Intelligent Selective Harmonic Elimination (SHE) controller. The controller calculates the trigger pulse positions intelligently by searching in the given solution space bounded by the practical constraints. The result analysis shows a significant decrement in harmonic components, while improvement in the fundamental voltage component, effectively reducing the Total Harmonic Distortion.

Keywords: Intelligent Controller, Harmonic Elimination, Inverter control, Neural Network

Pages: 339 - 343 | DOI: 10.15224/978-981-07-1847-3-841

72. TWO-STAGE ALGORITHM FOR DATA COMPRESSION EGMP

Authors: MALAY S BHATT

Abstract: This paper proposes two stage algorithm that carries advantages of PDLZW and Arithmetic coding and compares its performance with deflate which is a well-known two-stage algorithm that combines the features of LZ77 and Huffman Coding. The PDLZW is designed by partitioning the dictionary into several dictionaries of different address spaces and sizes. With the hierarchical parallel dictionary set, the search time can be reduced significantly since these dictionaries can operate independently and thus can carry out their search operations in parallel. Arithmetic coding replaces a stream of input symbols with a single floating-point output number

Keywords: Arithmetic Coding, Lossless Data Compression, Lossy Data Compression, Parallel Dictionary LZW (PDLZW).

Pages: 350 - 354 | DOI: 10.15224/978-981-07-1847-3-850

73. GRAPH BASED ALGORITHMS FOR WORD SENSE INDUCTION AND DISAMBIGUATION

Authors: AVINASH AGRAWAL , NEHA R. KASTURE

Abstract: This paper presents a survey of graph based methods for word sense induction and disambiguation. Many areas of Natural Language Processing like Word Sense Disambiguation (WSD), text summarization, keyword extraction make use of Graph based methods. The very idea behind graph based approach is to formulate the problems in graph setting and apply clustering to obtain a set of clusters (senses). The basic aim of this paper is to study various aspects of such graph based approaches in disambiguation of words. The paper also provides an insight into the results obtained by these techniques on standardized evaluation systems

Keywords: word sense disambiguation; graph-based;word sense induction; unsupervised method

Pages: 362 - 365 | DOI: 10.15224/978-981-07-1847-3-860

74. A ROM - LESS DIRECT DIGITAL FREQUENCY SYNTHESIZEE BASED ON BEZIER CURVE APPROXIMATION

Authors: C BHATTACHARYA , KATHIKA ROY , RAVINDER SINGH

Abstract: This paper describes the design and implementation of a ROM-Less Direct Digital Frequency Synthesizer (DDS) using Bezier curve approximation. With Bezier curve approximation, phase values between 0 to π are mapped to sine amplitudes. Then, half wave symmetry of sine wave is exploited to construct full sine wave. The proposed approximation introduces maximum error of 7.9x10-6, which is equivalent to quantized sinusoid with 16-bit amplitude resolution. This yields very high spectrally pure sine wave output. Based on the approximation, DDS circuit is designed and validated in Matlab-Simulink

Keywords: Direct Digital Frequency Synthesizer, ROM- Less DDS, Bezier curve approximation

Pages: 366 - 369 | DOI: 10.15224/978-981-07-1847-3-868

75. INTERNET BASED BOILER DRUM LEVEL CONTROL SYSTEM USING LABVIEW

Authors: ROOPAL AGRAWAL , UMESH C.PATI

Abstract: An Internet based boiler drum level control system is developed, which enables the students for deeper understanding of the boiler theory, the real experiences on design and implementation of control system. In this work, remote accessed virtual laboratory for 3 types of control of boiler is established using the internal model control (IMC) method. The student can access the remote laboratory and perform experiments without any limitation of time and location by using internet. They can also observe the system performance by changing the set point of the experiment and evaluate the results. Internet based laboratory is cost-effective.

Keywords: Boiler Drum Level Control; Remote Access; Internet; LabVIEW

Pages: 370 - 373 | DOI: 10.15224/978-981-07-1847-3-871

76. IMPLEMENTATION OF HIGH PERFORMANCE QDR || SRAM INTERFACE WITH XILINX FPGA

Authors: PRAHLAD KUMAR KHANDEKAR , RAM KRISHNA DEWANGAN

Abstract: Memory devices are critical components of electronic systems. And with increasing complexity brought about by greater end market demands, next-generation systems require newer memory architectures. For networking infrastructure applications, the memory devices required are typically high-density, high performance, high bandwidth memory devices with a high degree of reliability. For very high speed data communication system Designer need faster processors, faster memory and high speed interfacing peripheral components. While the processors in these systems have improved in performance, static memories have been unable to keep up the pace. Newer SRAM architectures have evolved to support the higher throughput requirements of current systems and processors. This application note introduces QDR, which is an SRAM architecture designed to improve the SRAM interface bandwidth by more than four times that of the current solutions. This paper summarizes that for high performance as well as high

Keywords: QDR II SRAM, QDR II Controller, User Interface, Physical interface, UART, Burst length, Bus Width.

Pages: 378 - 381 | DOI: 10.15224/978-981-07-1847-3-887

77. IS CLOUD COMPUTING THE UNDISPUTED NEW ERA COMPUTING? - A COMPREHENSIVE ANALYSIS

Authors: AISHWARYA IYER

Abstract: Cloud computing is the latest technology used for implementing business applications. Instead of running your apps yourself, they run on a shared data center. Cloud computing is Internet based computing where virtual shared servers provide software, infrastructure, platform, devices and other resources and hosting to customers on a pay-as-you-use basis. Cloud-based apps can be up and running in days or weeks, and they cost less. It's not just a fad—the shift from traditional software models to the Internet has steadily gained momentum over the last 10 years. However, corporate executives might hesitate to take advantage of a cloud computing system because they can't keep their company's information under lock and key. Cloud computing customers do not own the physical infrastructure, rather they rent the usage from a third-party provider. Many enterprises look at cloud computing warily due to projected security risks. The risks of compromised security and privacy may be lower overall wi

Keywords: Cloud computing, services, characteristics, security, risk management, applications, trends, future scope

Pages: 382 - 386 | DOI: 10.15224/978-981-07-1847-3-889

78. DIRECT TORQUE CONTROL OF MATRIX CONVERTER FED INDUCTION MOTOR DRIVE: A REVIEW

Authors: AJAY KUMAR BANSAL

Abstract: The direct torque control (DTC) scheme for a matrix-converter-fed induction motor drive system is a high performance motor control scheme with fast torque and flux responses. The main disadvantage of conventional DTC is electromagnetic torque ripple. Matrix converter is a single-stage ac-ac power conversion device without dc-link energy storage elements. Switching pattern of the different switches of matrix converter are generated by direct torque control scheme and by suitably selecting switching pattern, the electromagnetic torque ripple of the motor is effectively reduced. By this switching strategy, the advantages of the DTC schemes and the benefits of the matrix converters can be combined and as a result, a satisfactory servo drive can be achieved. This paper presents a literature survey on the direct torque control of matrix converter fed induction motor drive. Different techniques for DTCIMD are described and attempt is made to provide a guideline and quick reference for the res

Keywords: Matrix converter, Direct torque controlled induction motor drive (DTCIMD), Switching Pattern

Pages: 387 - 393 | DOI: 10.15224/978-981-07-1847-3-896

79. PERFORMANCE COMPARISION OF AODV, AOMDV, OLSR, DSR AND GSR ROUTING PROTOCOLS IN VANET

Authors: POONAM P. DHAMAL , UMA NAGARAJ

Abstract: VANET (Vehicular Adhoc Network) research field is growing very fast. It has to serves a wide range of applications under different scenario (City, Highway). It has various challenges to adopt the protocols that can serve in different topology and scenario. This paper presents a comparative study of the adhoc routing protocols. The main objective of Vehicular Ad-Hoc Networks is to build a robust network between mobile vehicles so that vehicles can talk to each other for the safety of human beings. VANET hits the protocol's strength due to its highly dynamic features, thus in testing a protocol suitable for VANET implementation we have selected different routing protocols In this paper, an attempt has been made to compare five well know protocols AODV, AOMDV, OLSR, DSR and GSR by using two performance metrics packet delivery ratio and average end to end delay. The comparison has been done by using simulation tool NS2 which is the main simulator, NAM (Network Animator) and excel graph whi

Keywords: VANET, DSR, OLSR, AODV, LAR.

Pages: 394 - 398 | DOI: 10.15224/978-981-07-1847-3-898

80. ADVANCED RESERVATION BASED SLA FOR RESOURCE NEGOTIATIONS IN GRID SCHEDULING

Authors: ANIMESH KUITY , SATEESH KUMAR PEDDOJU

Abstract: In grid environment, multiple resource providers work together in order to accomplish a complex job. The service level agreement is negotiated between client and a provider for executing the job on high performance computing resources. The performance of the negotiation process highly depends on number of resources selected for the negotiation and process of the negotiation. This paper proposes an advance reservation based resource negotiation using the deviation based resource scheduling algorithm to get commitment of the resources towards the job. The proposed model provides the commitment not only when resources are available but also when resource are not available for that time. The simulations of the proposed model are done on Gridsim simulator. The results are produced. The results indicate the improved performance in terms of number of successful SLA creations and throughput

Keywords: Grid Computing, SLA, DRS, Advance reservation based resource negotiation, QoS.

Pages: 399 - 402 | DOI: 10.15224/978-981-07-1847-3-905

81. COMPARISION OF EXPONENTIAL COMPANDING TRANSFORM AND CB - ACE ALGORITHM FOR PAPR REDUCTION IN OFDM SIGNAL

Authors: MANGAL SINGH , NEELAM DEWANGAN , SUCHITA CHATTERJEE

Abstract: One of the main disadvantages of Orthogonal Frequency Division Multiplexing (OFDM) is its high peak-to- average power ratio (PAPR). As the simplest approach to reducing the PAPR, Clipping based Active Contellation Extention (CB-ACE) exhibits good practicability, and the repeated clipping-and-filtering (RCF) algorithm proposed by Jean Armstrong provides a good performance in PAPR reduction and out-of-band power’s filtering. However, its way of filtering in frequency-domain requires RCF operations to control the peak regrowth, which degrades the bit error rate (BER) performance and greatly increases the computational complexity. Therefore, this paper put forward comparision of two existing techniques namely Exponential Companding Transform and CB-ACE Algorithm. The simulation results show that, exponential Companding Transform gives better result for PAPR Reduction and provides low complexity in Algorithm

Keywords: CB-ACE, Exponential Companding Transform, OFDM, PAPR, RCF

Pages: 403 - 406 | DOI: 10.15224/978-981-07-1847-3-914

82. PAPR REDUCTION OF OFDM SIGNAL USING TURBO CODING AND SELECTIVE MAPPING

Authors: MANGAL SINGH , NEELAM DEWANGAN , SUCHITA CHATTERJEE

Abstract: Orthogonal frequency division multiplexing (OFDM) technique is a promising technique to offer high data rate and reliable communications over fading channels. The main implementation disadvantage of OFDM is the possibility of high peak to average power ratio (PAPR). This paper presents a novel technique to reduce the PAPR using turbo coding and selective mapping (SLM). We show that the prob-ability of the PAPR of OFDM signal with 128 subcarriers exceeding 7 dB can be reduced from 70% to 0.25% with bit error rate (BER) of 6 × 10−5 at signal to noise ratio (SNR) 4 dB

Keywords: SIGNAL, TURBO, CODING, MAPPING

Pages: 407 - 409 | DOI: 10.15224/978-981-07-1847-3-916

83. PERFORMANCE EVALUATION OF MULTIPATH RING ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORK

Authors: ANAND PANDYA , MRUDANG MEHTA

Abstract: In the past many years different types of routing protocols, single-path and Multipath, have been designed for wireless sensor network. We have also found various multipath routing protocols available that send similar data to base station via multiple paths to increase reliability. We have found that a new simulation environment Castalia is developed based on OMNET++. They have provided implementation of Multipath rings routing protocol. We found that it is based on technique called Synopsis Diffusion. We observed that although implementation of protocol is there, detail understanding of the technique is not available in a literature. Hence, in this paper we have discussed Multipath rings routing protocol for wireless sensor network implemented by Castalia Simulator. Here, we have also, evaluated performance (and hence verified its working) of Multipath rings routing protocol through simulation. We have taken a view that, Multipath rings routing protocol can route the packet from sour

Keywords: Castalia, Multipath Routing, Ring Routing.

Pages: 410 - 414 | DOI: 10.15224/978-981-07-1847-3-924

84. MINING E-MAIL CONTENT FOR CYBER FORENSIC INVESTIGATION

Authors: R. V. DHARASKAR , SMITA M. NIRKHI , SOBIYA R. KHAN

Abstract: E-mail is a widely used mechanism for communication, due to its cost and expediency. However, the concern lies when along with its legitimate usage; it is being abused for committing various cyber crimes. E-mail system security lacks adequate proactive mechanism, to defend against such vulnerabilities and misuses. A cyber forensic investigation is employed for gathering significant evidences against adversaries by examining suspected e-mail accounts, in order to prosecute criminals in court of law. In this context, data mining techniques and tools based on them have been used extensively for extracting evidences from huge e-mail ensembles. This can provide assistance to the forensic investigator, to perform a multi-staged analysis of e-mail ensembles. In this paper, we briefly discuss various applications of data mining techniques with respect to cyber forensic investigation. Specifically, we describe our proposed framework and give implementation of first module,e-mail statistical ana

Keywords: Cyber Crime, E-mail forensic analysis, Statistical Analysis, Classification and Clustering techniques, Authorship identification, Community identification.

Pages: 415 - 419 | DOI: 10.15224/978-981-07-1847-3-930

85. TOKEN BASED LOAD BALANCING STRATEGY IN DISTRIBUTED SYSTEMS

Authors: ANKITA SINGHAL , ANUJ TIWARI , ARCHANA NIGAM

Abstract: Load balancing in a distributed system is the process of redistributing the workload among various nodes so as to improve resource utilization and the mean response time and also to balance the workload among the nodes of the system to avoid the situation in which one node is overloaded while other is sitting idle. A dynamic load balancing approach needs no prior knowledge about the global status of the distributed system and does balancing based on the current status of the system. Most of the techniques involve communication between the nodes to exchange their load information to make load balancing decisions i.e. where the arrived task can be best executed from. But this considerably increases mean response time. This paper presents a token based technique for load balancing in which there is no communication among the nodes and so no exchange of load information messages. Each individual node is configured to make its own decision whether to accept the arriving request or not and

Keywords: Loadbalancing, mean response time, task allocation, task transfer, distributed systems

Pages: 420 - 424 | DOI: 10.15224/978-981-07-1847-3-939

86. FEASIBILITY OF USER LEVEL TRUST IN CLOUD COMPUTING

Authors: SEEMA SHAH , YASHASHREE BENDALE

Abstract: Cloud computing has recently emerged as a buzz word in the distributed computing. Today the issue of trust is one of the biggest obstacles for wide usage of cloud computing. When the element trust is absent in a cloud computing environment then this computing model will face a lot of challenges. One of the most important factors for the successful deployment and usage of cloud computing is to build trust and security in a cloud. Here the user directly operates the software and the operating system, so the effect and damage of the cloud resources are worse than that of the internet. Therefore, it is necessary to evaluate whether the user is trustworthy or not. In this paper, we have discussed feasibility of trust in cloud computing, which can be possible through building a trust model for evaluating user-level trust in cloud computing environment. We have further explained the approach and principles for the evaluation of user trust in cloud computing. Finally we laid down the foundatio

Keywords: Cloud Computing, Trust, User level Trust.

Pages: 425 - 427 | DOI: 10.15224/978-981-07-1847-3-943

87. HANDS - FREE CURSOR CONTROL

Authors: BHAGYASHREE S , NEHA MALUSARE , PRACHI GOEL , R. MATHANGI , YASHASWITA BHOIR

Abstract: With recent increase of computer power and decrease of camera cost, embedded camera has become very common. With this it seems logical for the field of human computer interaction with camera usage, to increase. But it is not so. The reason for this lies in the inability to track human faces both precisely and robustly. This paper describes a face tracking technique based on tracking iris of the eye which resolves this problem. The goal is to simplify use of mouse for disabled persons, provide an alternative mouse cursor positioning system for laptops, make games more immersive and improve the existing HCI convenience for common users.

Keywords: Human computer interface, perceptual user interfaces, computer vision, face tracking, feature detection, image processing

Pages: 428 - 431 | DOI: 10.15224/978-981-07-1847-3-945

88. REVIEW OF REACTIVE POWER COMPENSATION IN WIND TURBINE

Authors: E SHEEBA PERCIS , ROHIT GOSWAMI , SANJOG KUMAR , SUDIPTA GARAIN

Abstract: Different aspects of reactive power regulation problem in wind farms are presented in this paper. In the first part some background of the reactive power control in Wind Park is presented, including motivations for its use and methods that can be used. In general, there are active (wind generator, compensator) and passive methods (L, C) of reactive power compensation. The wind park model ( the model of doubly fed induction generator (DFIG) based wind turbines, crowbar circuit, battery storage system, transformers, cable lines between wind farm and PCC, control system) has been shown in the proposed methods. In wind farm the crowbar protection, changes from reactive power source to reactive power load with the rise of low voltage and then burden of fault power system is aggravated. In order to solve the problem a new strategy is formed where a new real time coordinate control system (RTCCS) is built. Based on reactive power compensator the STATCOM synchronizes with wind power system and

Keywords: DFIG; Crowbar; Fault operation; Reactive power Coordinated control; RTCCS.

Pages: 432 - 436 | DOI: 10.15224/978-981-07-1847-3-948

89. A STUDY ON NEURAL NETWORK TRANSFER AND TRAINING FUNCTIONS FOR RECOGNITION OF POWER QUALITY DISTURBANCES

Authors: MANOJ GUPTA , R. A. GUPTA

Abstract: Neural networks have been proved as an important and useful tool for solving a wide variety of practical and real-world problems. Huge research in this field alleviated in understanding and finding new and effective methods to address different problems. However, selection of apposite combination of training and transfer function for a particular problem is a cumbersome task. But, this can be ascertained through research experiences and outcomes. The objective of this work is to compare the performances of three transfer functions in tandem with fourteen training functions used for backpropagation training of neural network for recognition of power quality (PQ) disturbance signatures. The comparison is shown on the basis of Lowest MSE, number of epochs, convergence time, and accuracy. It is shown that among three transfer functions namely “logsig”, “purelin”, and “tansig”; the overall performance of “tansig” was superior and the accuracy of BR training function was 100 % with all the t

Keywords: Artificial neural network, feedforward neural network, power quality, recognition, signature

Pages: 437 - 442 | DOI: 10.15224/978-981-07-1847-3-954

90. EYE GAZING WITH LOW RESOLUTION WEB - CAM IMAGES USING ARTIFICIAL NEURAL NETWORK

Authors: JAI DHARIWAL , NEETA NAIN , RITIKA DHYAWALA

Abstract: In this article, we have proposed a low cost technique for eye gazing using commercially available low-cost device such as web-cam. It can be used for human computer interface and is beneficiary for the handicaps and people who are unable to use mouse in order to interact with computers. We have trained Artificial neural network to estimate the position of eye gaze. The user does not need to wear any head mount device. The binary image of the eyes showing iris, moment of the eye image and the ratio of the nose and eye Euclidean distance serve as the features that are fed into the neural network

Keywords: eye gazing, artificial neural network, image processing, web-cam

Pages: 443 - 447 | DOI: 10.15224/978-981-07-1847-3-964

91. DESIGN OF RF CMOS GILBERT CELL MIXER AT 30 MHZ USING 0.12MICROCONTROLLER TECHNOLOGY

Authors: RAM KRISHNA DEWANGAN , SHRAWAN KUMAR PATEL

Abstract: Frequency translation in a system, is performed by a non-linear device known as a mixer. There are various topographies from simple single ended, single balanced mixers to more complicated double & triple balanced mixers that provide better isolation from the Local Oscillator (LO) and spurious. The most popular double-balanced mixer used in RFIC designs is the Gilbert Cell mixer. The design of this mixer at 30 MHz frequency is the subject of this paper.

Keywords: Double balanced Gilbert Mixer, Conversion gain, Noise Figure, Isolation, Linearity, Low Power design

Pages: 445 - 452 | DOI: 10.15224/978-981-07-1847-3-967

92. IDENTIFICATION SYSTEM USING FINGER KNUCKLE FEATURES

Authors: R.D.RAUT , S.S. KULKARNI

Abstract: In this paper, efforts are focused to develop a compact system that consists of a finger knuckle print sensor (Sony Digital Camera) which acts as a biometric sensor unit with a direct interface to an external PC for storing finger knuckle print. Added to the finger knuckle print sensor discuss the techniques for finger knuckle recognition. Finger knuckle print sensor consists of a set of digital camera that captures the raw image of finger knuckle print. A camera (Sony DSC-W380) is fitted in the small, rectangular notch of acrylic bracket. The image of the finger knuckle print is captured through reflected light by digital camera. The Image is processed through an algorithm to extract the features set and form the finger knuckle print template for biometric authentication. Different algorithms for finger knuckle print recognition are pointed out and future researches about fusion level with correlated modality (Finger Vein) are suggested.

Keywords: sensor, finger knuckle print, algorithm, template finger vein,

Pages: 453 - 455 | DOI: 10.15224/978-981-07-1847-3-971

93. VISUAL SPEECH RECOGNITION USING FEATURES OF LIP AND EFFECT OF DATABASE ON DIGIT RECOGNITION

Authors: SUNIL S.MORADE , SUPARVA PATNAIK

Abstract: In this paper we present results of visual speech recognition using geometric and appearance model. For each of these methods Principal Component Analysis (PCA) is used to compute feature vectors. In this paper visual speech recognition is used for isolated digit utterance. For determination of visual features lip tracking is important. We used localized active contour method for lip tracking which was earlier used for biomedical application. PCA distance methods are used for feature vector comparison. Appearance method is compared with geometrical method for feature extraction. Appearance method is computationally efficient and giving better result as compare to geometrical method. Using appearance method of feature extraction, effect of isolation between two digit utterances is tested.

Keywords: localised active contour model ,Appearance method , geometrical method, lip tracking, principal component analysis.

Pages: 456 - 459 | DOI: 10.15224/978-981-07-1847-3-976

94. HARDWARE ASPECTS OF ARTIFICIAL NEURAL NETWORK AND ITS APPLICATIONS

Authors: MARIA JAMAL , SAYED A IMAM

Abstract: Artificial Neural Networks became a common solution for a wide variety of problems in many fields, such as control and pattern recognition to name but a few. Many solutions found in these and other Artificial Neural Network fields have reached a hardware implementation phase, either commercial or with prototypes. The most frequent solution for the implementation of Artificial Neural Networks consists of training and implementing the Artificial Neural Networks within a computer. In this paper we discussed the hardware aspects of ANN and its applications in various field.

Keywords: Artificial Neural Network, Hardware of ANN, applications of ANN

Pages: 460 - 465 | DOI: 10.15224/978-981-07-1847-3-979

95. OPTIMAL PLACEMENT METHODS OF DISTRIBUTED GENERATION: A REVIEW

Authors: JITENDRA SINGH KUNTAL , O.P.RAHI , VAIBHAV KUMAR GUPTA , VIVEK KUMAR SHRIVASTAVA , POONAM GUPTA

Abstract: Distributed Generation (DG) has been growing rapidly in power systems due to their potential solution for issues, like the deregulation in power system, to meet the power demand and the shortage of transmission capacities. Improper allocation of DG sources in power system would not only lead to increase power or energy losses, but can also jeopardize the system operation. The optimal placement of DG is necessary for the maximization of reliability and stability in power system. There are several research studies to solve DG placement problem by various objectives and their imposed constraints. However, the methodical principle for this subject is still an obscure problem. This paper presents an overview and general backgrounds of research and development in the field of different solution methods for optimal placement of DG found in the literature .This paper has reviewed some of the most popular methods including analytical technique, optimal power flow methods (OPF) and evolutionary

Keywords: Distributed generation (DG); optimal location; analytical methods; optimal power flow (OPF); evolutionary computational methods

Pages: 466 - 475 | DOI: 10.15224/978-981-07-1847-3-985

96. THREE DIMENSIONAL FLOW OVER A POROUS VERTICAL PLATE WITH PERIODIC PERMEABILITY IN SLIP FLOW REGIME

Authors: POONAM GUPTA

Abstract: In this paper we discuss the effects of combined convection flow of a viscous incompressible fluid past an infinite vertical porous plate embedded with highly porous medium with periodic permeability under constant heat flux in presence of slip boundary conditions for velocity. The velocity and temperature are obtained analytically and their behaviour for different variations in the governing parameters are shown graphically and discuss numerically. The skin friction and Nusselt number are also evolved analytically and tabulated numerically for variations in the said parameters

Keywords: Heat flux, Moving plate, Periodic permeability, Slip regime, Three dimensional flow.

Pages: 476 - 480 | DOI: 10.15224/978-981-07-1847-3-989

97. RAMIFICATION OF LOW ENERGY SECURITY ENHANCEMENT ASPECTS IN BLUETOOTH

Authors: SANDHYA S , SUMITHRA DEVI K A

Abstract: The advent of Bluetooth technology has made wireless communication easier. Bluetooth as a technology has evolved a lot over the years. Security in any area is given more importance as it leads to better product and satisfied customers. Bluetooth security has evolved a lot with different versions of blue tooth. Keeping in mind the growing list of Bluetooth products in the market, there has been lot of improvements done in the version 4.0 of Bluetooth. The LE (Low Energy) operational mode which is new in version 4.0 has slightly different security features. In this paper, an overview of the Low Energy security aspects is presented. The different security modes, authentication, authorization procedures and data signing procedure are discussed in detail. The paper concludes by listing the ramifications of low energy enhancements in Bluetooth

Keywords: Bluetooth Low Energy, Data Signing, Static Address and Private Address

Pages: 481 - 483 | DOI: 10.15224/978-981-07-1847-3-993

98. DOMAIN SPECIFIC NAMED ENTITY RECOGNITION

Authors: AVINASH AGRAWAL

Abstract: Named entities are phrases denoting the names of persons, locations, organizations etc. in text documents. These phrases are important for the access to document content, since they form the building blocks for the analysis of documents. Named Entity Recognition has applications in Natural Language Processing, document indexing, document annotation, translation, etc. NER plays an important role in various research areas of Natural Language Processing (NLP) like Question Answering and Summarization Systems, Information Retrieval, Machine Translation, Video Annotation, Semantic Web Search, Bioinformatics etc. The computational research of automatically identifying named entities in texts forms a vast and heterogeneous pool of strategies, methods and representations. In this paper, we will present an overview of the various methods used for implementing NER systems by giving the merits and demerits of each. We will also discuss some of the approaches suggested and implemented by NER syste

Keywords: Named Entity; Training; Learning; Word Disambiguation; Context

Pages: 484 - 487 | DOI: 10.15224/978-981-07-1847-3-999

99. POWER QUALITY IMPROVEMENT USING DSTATCOM FOR SMALL ISOLATED ALTERNATOR FEEDING DISTRIBUTION SYSTEM

Authors: DEEPIKA MASAND , SUNIL KR. SINGH

Abstract: This paper demonstrates a perfect controlled DSTATCOM model with a small isolated distribution system to improve power quality of the system in which a linear/nonlinear three-phase load is fed by a small alternator. A hysteresis rule based carrier-less PWM current controller is used to control the DSTATCOM. Three leg IGBT based PWM-VSI is used as VSC with a capacitor in its parallel working as DSTATCOM. Two PI controllers are used. Any dip in voltages due to sudden load change/dynamic conditions of the system is improved by this DSTATCOM model presented in this paper. Voltage regulation, power factor correction and load balancing is obtained in this system. The work has been carried out in MATLAB environment using Simulink and Simpowersystem toolboxes. The proposed DSTATCOM model is very effective to enhance the power quality of an isolated distribution system feeding power to crucial equipments in remote areas.

Keywords: DSTATCOM, hysteresis controller, VSC, isolated system, power quality

Pages: 488 - 492 | DOI: 10.15224/978-981-07-1847-3-1003

100. AN ENERGY EFFICIENT SINK REPOSITIONING TECHNIQUE FOR DATA GATHERING IN WIRELESS SENSOR NETWORKS

Authors: PRERANA SHRIVASTAVA , S.B POKLE

Abstract: We have considered the problem of using static sink for data gathering purpose in an energy constrained multi hop wireless sensor networks. Sensing and relaying the collected data to the sink node using multi hop communication in an energy efficient manner is of prime importance. Optimizing sensor networks involves addressing a wide range of issues steaming from limited energy reserves, computation power, communication capabilities and self managing sensor nodes. In this paper we have investigated the problem of using static sink in case of the sensor networks which results in uneven energy expenditure and also the uneven sensing coverage over different parts of the network. We have used the concept of repositioning of the sink for enhancing the performance of the network in terms of energy which will also help in extending the lifetime of the network. For this we have used the repositioning algorithm which has been simulated in the NS-2.32 environment. Our simulation results show that

Keywords: Wireless Sensor Networks, ECR, Energy Efficiency, Sink Repositioning

Pages: 493 - 497 | DOI: 10.15224/978-981-07-1847-3-1008

101. ROTOR SPEED ESTIMATION FOR VECTOR CONTROLLED INDUCTION MOTOR DRIVE USING MRAS

Authors: D. S. MORE , SHINDE S. N.

Abstract: The term sensorless vector control means vector control without any speed sensor. Sensorless vector control drives have main benefits over vector control drives as reliability and low cost. Speed of the motor can be estimated using Motor terminal voltages and currents. If we know the certain parameters of the induction motor, using these parameters and reference frame theory we can construct the mathematical model of motor. This model is used for speed estimation. In this paper speed of induction motor is estimated using model reference adaptive system and system is simulated using MATLAB. Simulation results of estimated speed is correct.

Keywords: sensorless speed estimation, MRAS

Pages: 503 - 505 | DOI: 10.15224/978-981-07-1847-3-1017

102. SUPER CONDUCTING MAGNETIC ENERGY STORAGE UNIT FOR POWER CONDITIONING

Authors: K.VADIRAJACHARYA , PRASHANT SAMBHAJI KADAM

Abstract: Superconducting magnetic energy storage (SMES) technology has been progressed actively in recent years. SMES technology has the potential to bring real power storage characteristic to protect consumers from the grid voltage fluctuations. This paper analyses the operation principle of the SMES based DVR for power conditioning in the event of voltage sag, and its design is based on simple PI control method to compensate voltage sags. Using MATLAB SIMULINK, the models of the SMES based DVR is established, and the simulation tests are performed to evaluate the system performance.

Keywords: SMES; Dynamic Voltage Restorer (DVR); Voltage Sag; Power conditioning system (PCS); Pulse-width modulated (PWM)

Pages: 506 - 510 | DOI: 10.15224/978-981-07-1847-3-1018

103. A NOVEL APPROCH TO DEFEAT SPLIT PERSONALITY MALWARE

Authors: M.B. CHANDAK , NISHA LALWANI

Abstract: Malware, also known as malicious code and malicious software, refers to a program that is inserted into a system, with the intent of compromising the confidentiality, integrity, or availability of the victim’s data, applications, or operating system or otherwise annoying or disrupting the victim. Security analysts extensively use virtual machines to analyze sample programs and study them to determine if they contain any malware. Malware detection is again a crucial aspect of software security. This paper is intended to help organizations understand the threats posed by malware and mitigate the risks associated with malware incidents. In addition to providing background information on the major categories of malware, this paper majorly focuses on Analysis Aware Malware also called as Split Personality Malware which checks for the presence of Malware Analysis tools and behaves in a benign manner thus escaping detection

Keywords: Analysis, tools, behaves, manner

Pages: 511 - 515 | DOI: 10.15224/978-981-07-1847-3-1027

104. DOCUMENT SUMMARIZATION USING MULTI-FEATURES COMBINATION METHOD

Authors: AMIT NEEMA , PRIYANKA KATLANA , SHWETA PANDEY

Abstract: Document summarization is a data mining process of extracting the summary or zest from one or more documents. A summary is nothing but the actual theme of the document or set of documents. Most commonly document summery is considered to be the sentences or words from set of documents or a single document that appear more number of times in the document with corresponding to the other words. But a report on solar power may emphasis on several aspects of solar energy and may not actually have the term solar power repeated many a times. Therefore sophisticated algorithms are needed to extract the summary from the documents. There have been several algorithms on Text and Document summarizations, utilization various aspects of similarity measures, clustering, lexical rules and distance measures. It is understood from the literature that no single technique can give best interpretation or desired result in the summarization process. Therefore in this work we propose a multi parameter summari

Keywords: Sentence clustering, Similarity Measures, summarization, content-based searching, Entropy etc.

Pages: 516 - 521 | DOI: 10.15224/978-981-07-1847-3-1033

105. DESIGN OF DIFFERENT FEEDING TECHNIQUES OF RECTANGULAR MICROSTRIP ANTENNA FOR 2.4GHZ RFID APPLICATIONS USING IE3D

Authors: DUNDESH S. KAMSHETTY , MAHESH M. GADAG , SURESH L. YOGI

Abstract: This paper describes variety of feeding techniques applicable for rectangular microstrip antenna for 2.4GHz RFID applications. A proper impedance matching condition between the line and patch without any additional matching elements are used. After describing various feeding techniques, the paper gives a better understanding of the design parameters of an antenna and their effects on bandwidth, return loss and gain. Finally simulation of antenna is done using design software IE3D and fabricated using in-house facilities.

Keywords: Rectangular Microstrip Antenna (RMSA); Return Loss; Bandwidth; Impedance; IE3D; Feeding Techniques

Pages: 522 - 525 | DOI: 10.15224/978-981-07-1847-3-1036

106. PERFORMANCE ANALYSIS OF V-BLAST DETECTION TECHNIQUES FOR MIMO TECHNOLOGY

Authors: ANUSHA J , BHAGYALAXMI R H , SEEMA BHAT , SHREEDHAR A.JOSHI

Abstract: The employment of multiple antennas at both transmitter and receiver is referred to as MIMO (Multiple Input Multiple Output) system. The V-BLAST (Vertically - layered Bell Laboratories Layered Space-Time) algorithm is a multilayer symbol detection scheme in rich scattering wireless communication channel. The V-BLAST technique is applied to MIMO (Multiple Input Multiple output) technology. Using various techniques like Zero forcing (ZF), Minimum Mean Square Error (MMSE), Maximum Likelihood (ML), with back substitution methods SIC (Symbol Interference Cancellation) and PIC (Parallel Interference Cancellation) the detection is performed and analysed in this proposed work. The modulation methods adopted are BPSK, QPSK and QAM. The numerical analysis is conducted using MATLAB.

Keywords: Minimum Mean Square Error (MMSE), Maximum Likely hood (ML), Zero Forcing (ZF), Bit Error Rates (BER).

Pages: 526 - 529 | DOI: 10.15224/978-981-07-1847-3-1040

107. CONSERVING ENERGY BY MIGRATING TO CLOUD DATA CENTER

Authors: M.MALATHI , T.MURUGESAN

Abstract: Energy consumption from data centers doubled between 2000 and 2005 from 0.5 percent to 1 percent of world total electricity consumption. That figure, which currently stands at around 1.5 percent, is expected to rise further. The issue of surging worldwide IT-related energy consumption is both a bottom-line concern to the companies involved and, increasingly, an environmental worry. Cloud-computing companies hope to offer a solution by focusing on energy efficiency within massive data centers.In this paper, an attempt is made to study the costs associated with traditional data centers and how cloud data centers provide ways for decreasing the costs while providing areas of opportunity for increasing the energy efficiency.

Keywords: amortization, energy, cost, virtualization, consolidation.

Pages: 530 - 534 | DOI: 10.15224/978-981-07-1847-3-1043

108. THE TRADITIONAL AND NEW GENERATION IN-VEHICLE NETWORKS IN AUTOMOTIVE FIELD

Authors: AMIT WELEKAR , PRANAY SARAF , PRASHANT BORKAR , R. C. DHARMIK

Abstract: This paper provides an overview of the most commonly used traditional networks and new generation in-vehicle networks. Comparison and Usage and trends of in-vehicle networking protocols will be presented and categorized. The past few years have seen a large growth in the number and type of communication buses used in automobiles, trucks, construction equipment, and military, among others. Development continues even into boating and recreation vehicles. Areas for discussion will include SAE Class A, B, C, D. It is believed that the comparison presented in this paper would benefit application engineers in selecting an appropriate protocol.

Keywords: In-vehicle networking, Communication protocol, Zigbee, UWB, Wi-Fi, Bluetooth, CAN, LIN, MOST, D2B, TTP/A/C, J1850, Byteflight, Flexray, PLC.

Pages: 535 - 540 | DOI: 10.15224/978-981-07-1847-3-1045

109. THE TRADITIONAL AND NEW GENERATION IN-VEHICLE NETWORKS IN AUTOMOTIVE FIELD

Authors: AMIT WELEKAR , PRANAY SARAF , PRASHANT BORKAR , R. C. DHARMIK

Abstract: This paper provides an overview of the most commonly used traditional networks and new generation in-vehicle networks. Comparison and Usage and trends of in-vehicle networking protocols will be presented and categorized. The past few years have seen a large growth in the number and type of communication buses used in automobiles, trucks, construction equipment, and military, among others. Development continues even into boating and recreation vehicles. Areas for discussion will include SAE Class A, B, C, D. It is believed that the comparison presented in this paper would benefit application engineers in selecting an appropriate protocol.

Keywords: In-vehicle networking, Communication protocol, Zigbee, UWB, Wi-Fi, Bluetooth, CAN, LIN, MOST, D2B, TTP/A/C, J1850, Byteflight, Flexray, PLC.

Pages: 535 - 540 | DOI: 10.15224/978-981-07-1847-3-1045

110. FRACTAL DESIGN OF SIERPINSKI TRIANGLE WITH PROBE FED AND CAPACITIVE FED

Authors: AMIT V. NARAD , MOHAN S. IKKAR , SANJAY KHOBRAGADE

Abstract: The Sierpinski gasket monopole antenna has been shown to be an excellent candidate for multiband applications. The multiband behavior of the fractal Sierpinski antenna is described in this paper. An analysis is performed to examine the parameters of antenna with a frequency range in between 1 GHz to 6 GHz, at various operating frequency with a VSWR <2 and return loss<-10 dB of similar antenna structures. The single band behaviors of antenna are studied in this paper with an iterative method and try it to convert in multiband antenna. In this paper, proposed antenna is designed to satisfy all the system requirements for DCS1800 (1.71–1.88 GHz), DCS1900 (1.85–1.99 GHz), IMT-2000 (1.885–2.2 GHz), UMTS (1.92–2.17 GHz), WiBro (2.3–2.39 GHz), WLAN (2.4–2.483 GHz), and DMB (2.605–2.655 GHz), simultaneously. All the simulated results are mandatory and satisfactory using HFSS software.

Keywords: Fractal antenna, multiband ,Sierpinski triangle Gasket, iterative method, probe feeding, capacitive feeding.

Pages: 545 - 548 | DOI: 10.15224/978-981-07-1847-3-1075

111. DISTANCE BASED ROUTE MAINTENANCE STRATEGY FOR DYNAMIC SOURCE ROUTING PROTOCOL

Authors: POORNIMA SHARMA , VARUN GARG

Abstract: Dynamic Source Routing (DSR) [1, 2], which is an on-demand routing protocol, becomes the most popular source routing protocol for MANET. Each mobile node is required to maintain route caches that contain the source routes of which the mobile is aware. Although DSR can respond a route quickly, it yields a long delay when a route is rebuilt. This is because when source node receives RERR packet, it will try to find alternative routes from route cache. If alternative routes are not available, source node, then, will enter route discovery phase to find new routes. Finding a route in wireless network require considerable resources, such as time, bandwidth, and power because it relies on broadcasting. In this paper we introduce a route maintenance strategy as DISTANCE (DIstance baSed rouTe maintenANCE). DISTANCE works by adding another node (called bridge node) into the source list to prevent the link from failure. From the simulation result, DISTANCE improves the performance of DSR in terms

Keywords: Distance, adding, node

Pages: 549 - 553 | DOI: 10.15224/978-981-07-1847-3-1079

112. DISTANCE BASED ROUTE MAINTENANCE STRATEGY FOR DYNAMIC SOURCE ROUTING PROTOCOL

Authors: POORNIMA SHARMA , VARUN GARG

Abstract: Dynamic Source Routing (DSR) [1, 2], which is an on-demand routing protocol, becomes the most popular source routing protocol for MANET. Each mobile node is required to maintain route caches that contain the source routes of which the mobile is aware. Although DSR can respond a route quickly, it yields a long delay when a route is rebuilt. This is because when source node receives RERR packet, it will try to find alternative routes from route cache. If alternative routes are not available, source node, then, will enter route discovery phase to find new routes. Finding a route in wireless network require considerable resources, such as time, bandwidth, and power because it relies on broadcasting. In this paper we introduce a route maintenance strategy as DISTANCE (DIstance baSed rouTe maintenANCE). DISTANCE works by adding another node (called bridge node) into the source list to prevent the link from failure. From the simulation result, DISTANCE improves the performance of DSR in terms

Keywords: Distance, adding, node

Pages: 549 - 553 | DOI: 10.15224/978-981-07-1847-3-1079

113. TO REDUCE COLOUR FLASHING IN GREY SCALE SIGNAL GENERATOR BY ANALYSING AND CORRECTING SIGNAL WAVEFORMS

Authors: R.K.SINGH , SARIKA MALHOTRA

Abstract: The technology of manufacturing display devices such as CRT, LCD & LED displays are advancing at a very fast pace. Due to change in technology, the manufacturing process requirement are also changing. In this paper, we will analyse the multi format signal generators, which are utilised and has the capability to generate signals, compatible for display inspection of SDTV, HDTV, Monitors display inspections. The major job in display inspection is white balance of the device. White balancing is performed on Monochrome signals which are corrupted by intermittent colour transients. The aim of this study is to reduce the colour transients in Grey Scale signals, by observing the waveforms of Grey Scale patterns, generated by a multi format pattern generator. The analysis of waveforms includes the study of waveforms related to Y/colour difference, greyscale , chrominance, and sync level components.

Keywords: Complex waveforms, Pattern Generator, GPIB Grey Scale signal , Sync, chrominance .

Pages: 554 - 559 | DOI: 10.15224/978-981-07-1847-3-1102

114. NAVIGATION PATTERN MINING ALGORITHM FOR CONTENT BASED IMAGE RETRIEVAL

Authors: K. RAMESH KUMAR , T. SELVAGANAPATHY

Abstract: In this paper, we developed a new State-Drop Fast Sequence Estimation (SDFSE) strategy for Trellis Coded Modulation (TCM) schemes for transmission in the Inter symbol Interference (ISI) environment. For the decoding of TCM signals in the presence of Additive White Gaussian Noise (AWGN), Maximum Likelihood Sequence Estimation (MLSE) has been considered as the optimum solution [13, 16, 17, 19]. However, for band-limited ISI channels in the presence of AWGN, the complexity of optimum MLSE increases as a function of the ISI channel memory length. This prohibits practical implementation of MLSE. Over the past decades, a spurious research took place in the development of reduced complexity suboptimum decoding strategies for TCM schemes. Reduced State Sequence Estimation (RSSE) is one such implementation which emphasizes on reduced computational complexity Likelihood sequence estimation by minimizing the ISI-code trellis states [23]. We provide a new suboptimum decoding strategy, a reduced co

Keywords: Association rule mining, frequent item sets, Transaction Reduction, Content based image retrieval.

Pages: 172 - 176 | DOI: 10.15224/978-981-07-1847-3-655

115. SMART ANTENNA TECHNIQUE FOR PERFORMANCE IMPROVEMENT OF CDMA & MC -CDMA

Authors: AAMIR SHAIKH , S.P.WADKAR , SIRAJ PATHAN

Abstract: To improve coverage and performance in the CDMA as well as in MC-CDMA network, the simulation model and an evaluation method for the smart antenna system in the CDMA system is presented. Here the data service users as well as the voice services users are considered. The proposed method that can show the impact of smart antenna system on the Ec/Io coverage area and radius also presented as function of antenna type and beamwidth.The performance improvements are remarkable in the smart antenna systems. The performance of the system is evaluated in terms of Average Ec/Io, Area, Radius, Ec/Io Difference, Throughput with Number of users per sector. Both results are discussed based on various parameters like flat urban type morphology, Okumura Model for omni directional antennas air link, orthogonality factor and antenna beam width.

Keywords: Air conditioner, receiver-drier, crankshaft, heatladen, sensible heat, latent heat, wall factor

Pages: 234 - 238 | DOI: 10.15224/978-981-07-1847-3-726

Popular Proceedings

ICETM 2023

9th International E-Conference on Engineering, Technology and Management

ASET 2017

7th International Conference on Advances in Applied Science and Environmental Technology

ESSHBS 2017

7th International Conference On Advances In Economics, Social Science and Human Behaviour Study

ACSM 2017

7th International Conference on Advances in Civil, Structural and Mechanical Engineering

CSM 2017

5th International Conference on Advances in Civil, Structural and Mechanical Engineering

SEM 2017

5th International Conference on Advances in Social, Economics and Management

ICETM 2022

8th International E- conference on Engineering, Technology and Management

ACSEE 2019

8th International Conference on Advances in Civil, Structural and Environmental Engineering