Loading...

Proceedings of

Second International Conference on Advances In Electronics, Electrical And Computer Engineering EEC 2013

Date
13-Jun-2013
Location
dehradun , India
Authors
219
ISBN
978-981-07-6935-2

82 Articles Published

1. DC CHARACTERISTICS AND RF PERFORMANCE COMPARISON BETWEEN FIELD-PLATED AND NON FIELD-PLATED DEVICES UNDER DIFFERENT BIAS CONDITIONS

Authors: A.K. PANDA , MERYLEEN MOHAPATRA , TANMAYA KUMAR DAS

Abstract: This paper is mainly showing the comparison between Field Plated and Non Field Plated AlGaN/GaN High Electron Mobility Transistor (HEMT) under different biasing conditions. It also shows the effect of the field plate structure on the RF performance of the HEMT device. The field plate structure increases the breakdown voltage of the device at high frequencies by the local modulation of the electric field. Because of the field plate there is introduction of additional feedback capacitance from drain to gate. This type of capacitor also has effect on the RF performance of the device, mainly at high frequency values. So here the investigation on the above along with the comparison with field plated and non field plated HEMT device is presented systematically.

Keywords: Field Plate, HEMT, AlGaN/GaN, RF performance, local modulation, feedback capacitance

Pages: 1 - 5 | DOI: 10.15224/978-981-07-6935-2-01

2. RESISTIVITY IMAGING OF A PHANTOM WITH IRREGULAR INHOMOGENEITIES WITH 16 COPPER ELECTRODES BASED SENSORY SYSTEM IN 2 DIMENSIONAL ELECTRICAL IMPEDANCE TOMOGRAPHY

Authors: DEBORSHI CHAKRABORTY , MADHURIMA CHATTOPADHYAY , RADHABALLABH BHAR

Abstract: In this paper, the fabrication of 16-copper electrode based electrical impedance tomography (EIT) system is fabricated. EIT is a tool for imaging the interior permittivity distribution of an object (stone/tumor) by measuring voltage at the surface. This method is useful for detecting the shape, size and position of unwanted lumps within a specified area. In order to understand the proposed work, a simulation study using Finite Element Method (FEM) based Multiphysics software has been performed, in which we have imaged perfectly the shape, position and sizes of both the regular and irregular shaped objects situated within a specified phantom area in a 2D plane. Simultaneously, we have developed a real-time system consists of 16 copper electrodes (placed equidistantly) detect non-conducting like plastic container in normal saline solution. We have injected a constant current to the phantom boundary and the surface potentials are being measured using neighbouring method. We have collected

Keywords: Electrical Impedance Tomography (EIT), Finite Element Method (FEM), lumps, surface charge density

Pages: 6 - 10 | DOI: 10.15224/978-981-07-6935-2-02

3. COMPARISON OF MOBILE NUMBER PORTABILITY SCHEMES

Authors: POOJA CHATURVEDI , RAJNI BILLA

Abstract: Mobile Number Portability is an important issue for a telephone user especially when there are a number of routing techniques with different advantages and disadvantages. Changing one’s telephone numbers can be a major inconvenience and a potential barrier preventing the general public from taking advantage of the options available in a developed competitive telecommunications market. While changing from one mobile network to another, users retain their mobile telephone numbers. This paper represents the various routing schemes and compares their pros and cons.

Keywords: MNP, NPDB, Query on Release

Pages: 11 - 13 | DOI: 10.15224/978-981-07-6935-2-03

4. INCONSPICUOUS WATERMARKING WITH OPTICAL/SOUND SECURITY KEY

Authors: DIVYANSHU VARMA , SUNIL KR. SHARMA

Abstract: The digital age is here. One creation of the digital era is that digital media copies are the same as the original. This fact has led to great concern for media theft via illegal duplication. Thus, the need for tracing ownership of such artistic works has spawned the digital data hiding technique known as watermarking. The field of digital watermarking has recently seen vast interests covering theoretical studies, novel techniques, attacks and analysis. Watermarking is defined as the process of electronically attaching the identity of the owner of the copyright of an artistic work in such a way that it is difficult to erase. In this paper we utilize a watermark generation technique based on OPTICAL CODE/SOUND CODE as a security key and same key to extract the data. Here we first crop the image then watermarked the cropped image with inserting the OPTICAL CODE/SOUND CODE as a security key.

Keywords: Cosine, Fourier & Wavelet Transform; Optical Code; Sound Code; Image Cropping

Pages: 14 - 16 | DOI: 10.15224/978-981-07-6935-2-04

5. SECURING VIRTUAL MACHINE IN CLOUD ENVIROMENT USING OVF AND HASHING FUNCTION

Authors: RAJINDER SANDHU , INDERVEER CHANA

Abstract: Over the past decade, with Cloud Computing we are advancing to an industry where IT resources are delivered as a service rather than a product. Cloud promises return on investment, scalability and dynamic provisioning. Virtual machines are backbone for achieving all these promises of Cloud Computing. Despite of best effort from industry Cloud faces many challenges with respect to maintaining integrity and security of virtual machines during their lifecycle. Relationship between virtual machine and security is debatable, which divides research in two groups: Virtual machine for security and Security of virtual machine. Open Virtualization Format developed by Distributed Management Task Force is future for security of virtual machines. In this paper, we propose an algorithm which helps to maintain and check integrity of virtual machineduring its migration using Open Virtualization format and Hashing functions. Experiment results demonstrate the algorithm. Algorithm increases trust of use

Keywords: Cloud Computing, Virtualization, Hashing Function

Pages: 17 - 21 | DOI: 10.15224/978-981-07-6935-2-05

6. AN INTRODUCTION TO AUGMENTED REALITY WITH MOBILE SYSTEM

Authors: RESHMA JADHAV , VANITA MANE

Abstract: Augmented reality (AR) is a live, direct or indirect, view of a physical, real-world environment whose elements are augmented by computer-generated sensory input such as sound, video, graphics or GPS data. It isrelated to a more general concept called mediated reality, in which a view of reality is modified (possibly even diminished rather than augmented), by a computer. As a result, the technology functions by enhancing one’s current perception of reality. By contrast, virtual reality replaces the real world with a simulated one. Augmentation is conventionally in real-time and in semantic context with environmental elements, such as sports scores on TV during a match. With the help of advanced AR technology (e.g. adding computer vision and object recognition) the information about the surrounding real world of the user becomes interactive and digitally manipulable. Artificial information about the environment and its objects can be overlaid on the real world.

Keywords: AR; MARS; WAN; LAN; PAN; software; hardwae

Pages: 22 - 26 | DOI: 10.15224/978-981-07-6935-2-06

7. QUOTIENT SPACE AND CANONICAL MAPPING WITH APPLICATION IN COMPUTER SCIENCE

Authors: FAHIM UDDIN , M.ASLAM

Abstract: In this paper we have to studied about a closed linear space of dual nuclear beally conver space, we have to considered that quotient spaces of dual nuclear locally convex space, by itself closed linear space, we have to proved that this quotient space is also dual nuclear. We have also studied about a given canonical mapping from one canonical bounded space to another bounded space. We have prove that the locally convexspace in this connection is dual nuclear. Finally we have discussed about the given canonical mapping from one pre-compact canonical sub space into another pre-compact canonical sub space. We have shown that the concerning locally convex space is dual nuclear. Canonical Mapping may also be applied in visualizing Dynamic data with maps for this purpose we have:-Creating maps from Graph Data. Maps of Dynamic Data Maps of Readability.

Keywords: convex space, bounded set, linear space, dual nuclear, close linear space

Pages: 27 - 30 | DOI: 10.15224/978-981-07-6935-2-07

8. A REVIEW ON COMPARATIVE STUDY OF BLUETOOTH AND ZIGBEE

Authors: MEENAKSHI YADAV , NISHANT GARG

Abstract: Wireless communication have some short range communication protocols, two are Bluetooth (over IEEE 802.15.1) and ZigBee (over IEEE 802.15.4) with low power consumption. Bluetooth is based on a wireless radio system designed for short range and cheap device to replace cables for computer peripherals. ZigBee provides self-organized multi-hop and reliable mesh networking with long Battery lifetime. This paper is a review paper of comparative study of Bluetooth and ZigBee.

Keywords: Wireless communication, Bluetooth, ZigBee FHSS, piconet, cluster tree.

Pages: 31 - 35 | DOI: 10.15224/978-981-07-6935-2-08

9. OPTIMAL SWITCH PLACEMENT IN RADIAL DISTRIBUTION SYSTEM USING PSO

Authors: AMIT KUMAR , JYOTI KATARIA , MANISH KUMAR MADHAV , MUKESH CHAND

Abstract: This paper proposes an optimization method for planning adequate number and location of automatic switches in a radial distribution system. The purpose is to maximize the profit of that service reliability indices achieve the required level. First, a network equivalent technique is introduced to calculate the reliability indices. Second, by using the equivalent method, system reliability indices and profit on variousswitches configuration cases can be deduced. Then a mixed-integer particle swarm optimization (MIPSO) is proposed to determine the optimal switch number and location.

Keywords: Distribution system, Particle swarm optimization, Reliability

Pages: 36 - 40 | DOI: 10.15224/978-981-07-6935-2-09

10. COMPARATIVE STUDY OF SEGMENTATION TECHNIQUES FOR EXTRACTING BRAIN TUMOUR FROM MRI IMAGE

Authors: ANNAPURNA SINGH , H.S. BHADAURIA, , RACHANA RANA

Abstract: Brain tumour segmentation is a crucial step in surgical planning and treatment planning. A significant medical informatics task is indexing patient databases according to size, location, and other characteristics of brain tumours and edemas, possibly based on magnetic resonance (MR) imagery. This requires segmenting tumours and edemas within images from different MR modalities. Automated brain tumour or edema segmentation from MR modalities remains a challenging, computationally intensive task. This paper presents a comparative study of different approaches for to segmenting brain tumour from MRI images

Keywords: Brain tumour segmentation, MRI images, Fuzzy C-Mean, K-Mean Clustering, Bounded-box, Morphological operations.

Pages: 41 - 45 | DOI: 10.15224/978-981-07-6935-2-10

11. RELIABILITY ANALYSIS OF DISTRIBUTION SYSTEM WITH DISTRIBUTED GENERATOR IMPACT OF PROTECTION MISCO-ORDINATION

Authors: A. ANIL KUMAR , G.N.SREENIVAS

Abstract: Distributed Generation (DG) is used to improve the system reliability. However, DG Contribution in fault current may cause the loss of the existing protection coordination. This problem can drastically deteriorate the system reliability and it is more serious and complicated when there are several DG Sources in the System. Hence, the above conflict in reliability aspect unavoidably needs a detailed investigation before the installation or enhancement of DG is done. In this Research work it is proposed to model of composite DG fault current to find the threshold that existing protection coordination is lost. Cases of protection misco-ordination are to be described, together with their consequences. And attempt will be made to prevent reliability degradation from recloser fuse misco-ordination due to Distributed Generation.

Keywords: Distributed generator, distribution network, protection equipment coordination, DG capacity

Pages: 46 - 50 | DOI: 10.15224/978-981-07-6935-2-11

12. NONLINEAR ANALYSIS OF MINORITY CARRIER STORAGE TIME OF A UNIFORMLY DOPED SCHOTTKY BARRIER DIODE

Authors: MD. AHSANUL ABEED , TANVIR AHMED

Abstract: Minority carrier charge storage time of a uniformly doped Schottky Barrier Diode (SBD) is studied here. When barrier height is low, SBD acts as a majority carrier device. But for a high barrier SBD both majority and minority carrier currents contribute to total current. In the past, a number of research works on uniformly doped SBD have been done but in this work an analytical expression for minority carrier charge profile for a high barrier SBD is derived in a new approach. Both drift and diffusion components of majority and minority carrier currents are considered. Neglecting recombination in the epitaxial layer, a second order nonlinear differential equation is solved to obtain for all level of injections. Once minority carrier charge profile is known, stored excess minority carrier charge, storage time and injection ratio are obtained. Present work represents that minority carrier charge profile, minority carrier charge storage time and injection ratio depend on bias voltage, dopin

Keywords: Schottky barrier diode, minority carrier hole profile, effective surface recombination velocity, minority carrier storage time, injection ratio

Pages: 51 - 56 | DOI: 10.15224/978-981-07-6935-2-12

13. DESIGN AND INVESTIGATION OF DC AND MICROWAVE CHARACTERISTICS OF INGAP/INGAAS/GAAS DUAL CHANNEL PSEUDOMORPHIC HEMT (DC-PHEMT)

Authors: A.K. PANDA , LIMALI SAHOO , MERYLEEN MOHAPATRA

Abstract: A InGaP/InGaAs/GaAs dual channel pseudomorphic HEMT (DC- PHEMT) with interesting triple doped sheets having gate length 800nm is modeled and simulated by using 2-dimensional simulation package ATLAS fromSilvaco. Different DC and microwave performances of the above device are analyzed and investigated to judge the potential of the device for high- performance digital device applications. Due to the schottky behavior of InGaP, good pinch-off and saturation characteristics, high drain saturation current, large and linear transconductance and excellent microwave characteristics are obtained. The studied dual channel HEMT with delta-doped sheet densities and proper layers; prove promise for electronic applications.

Keywords: Dual channel, Pseudomorphic HEMT, δ-doped sheet, schottky behaviour, InGaP

Pages: 57 - 60 | DOI: 10.15224/978-981-07-6935-2-13

14. REDUCTION OF ELECTROMAGNETIC INTERFERENCE IN THREE PHASE SQUIRREL CAGE INDUCTION MOTOR BY COATING OF NANO COMPOSITE FILLED ENAMEL TO THE WINDINGS OF THE MOTOR

Authors: B. SELVA KUMAR , D. EDISON SELVARAJ , LIEUTENANT.J. GANESAN , O.R. SRINIVAS KRISHNA , P. AGNEL ROZARIO

Abstract: It has been shown that the addition of nano composites to the enamel can greatly improve the thermal, mechanical and electrical properties of enamel. A nano composite (TiO2+SiO2) has been tested as nano filler. The micro particles of TiO2 and SiO2 are converted into nano particles with the help of ball mill. Scanning electron microscope (SEM) has been used to augment the particle size of nano composite. The nano sio2 and tio2 materials taken in the ratio of 1:3 were mixed with enamel by using ultrasonic vibrator. The enamel filled with nano composite was coated on the windings of a motor. The values of electromagnetic inference produced by normal induction motor and nano coated induction motor was measured and analyzed. There was a reduction of 15 to 60% in the values of the electromagnetic interference produced by the normal induction motor when compared to that of nano composite filled enamel coated induction motor at various distances. Hence, the nano composite filled enamel coated

Keywords: reducing, electromagnetic, interference, produced

Pages: 61 - 65 | DOI: 10.15224/978-981-07-6935-2-14

15. A COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS FOR DISASTER AREA MOBILITY MODEL IN MANETS

Authors: ANISHI GUPTA , ASHISH JOSHI

Abstract: A Wireless ad hoc network is a collection of autonomous mobile nodes that communicate with each other over wireless links without any fixed infrastructure. The nodes use the service of other nodes in the networkto transmit packets to destinations that are out of their range. A number of ad-hoc routing protocols have been proposed and implemented which include ad-hoc on demand Vector Protocol (AODV) , dynamic source routing (DSR) and Destination sequenced Distance Vector (DSDV) routing protocols. In this paper for experimental evaluation purposes, we have considered 600m x 600m, terrain area which illustrates the performance in terms of the packet delivery fraction, average end-to-end delay ,normalized routing load and throughput for routing protocols. Our simulation results using NS-2 shows that DSDV performs best in all the cases of packet delivery fraction, average end-to-end delay , normalized routing load and throughput over other routing protocols on varying mobility speed using G

Keywords: AODV, DSDV, DSR, Packet Delivery Fraction, Throughput, End-to-End Delay, Normalized Overhead.

Pages: 66 - 70 | DOI: 10.15224/978-981-07-6935-2-15

16. WEATHER STATION AUTOMATION IN AGRICULTURE ZONE USING ZIGBEE

Authors: KALYANI G. GAJBHIYE , SNEHLATA S. DONGRE

Abstract: This paper presents the checking and monitoring of weather parameters in agriculture zone by the system of automation of weather station in agriculture zone using Zigbee. In the system architecture the wireless sensors network devices are used to check and monitor different weather parameters in agriculture zone to avoid or to solve the difficulty of checking and monitoring different weather parameters in agriculture zone using wires and different analog devices during some weather or environmental hazards. The monitoring different weather parameters are always plays very important role in the process of the farming production. To send the weather related information or guidelines using GSM SMS technique to the farmers to plan their farm in a better way, the Zigbee/IEEE802.15.4 based wireless sensor network is utilized in the system architecture. The weather parameters like humidity in the soil, temperature, and wind speed and wind direction in the agriculture zone are measured by the

Keywords: Zigbee, IEEE 802.15.4, Wireless Sensor Network (WSN), Wireless Personal Area Networking (WPAN), GSM SMS technique

Pages: 71 - 75 | DOI: 10.15224/978-981-07-6935-2-16

17. MODEL MATCHING CONTROL OF TWO-AREA LFC

Authors: GANESH VULASALA , VASU KONETI

Abstract: Deregulation is the collection of restructured rules and economic incentives that governments set up to control and drive the electric power industry. There are crucial differences between the AGC operation in a vertically integrated industry and horizontally integrated industry. A reduced-order controller has been proposed to solve the automatic generation control problem in a deregulated power system that operates under deregulation based on the bilateral policy scheme. In the real world environment, access to all of the state variables of system is limited and measuring all of them is also impossible. So when we have fewer sensors available than the number of states or it may be undesirable, expensive, or impossible to directly measure all of the states, using a reduced-order controller was used. In this paper a new controller has been proposed to overcome the above difficulty. The proposed strategy has been tested on a two-area reheat thermal-hydro power system under De-Regulated e

Keywords: De-regulated power systems, GENCOs, DISCOs, LFC and model matching controller.

Pages: 76 - 83 | DOI: 10.15224/978-981-07-6935-2-17

18. AUTOMATED COMPARISON FRAMEWORK FOR REGRESSION TESTING

Authors: AASTHA KAUR , NAVDEEP SINGH

Abstract: To reduce the effort, testing cycle time and % of human errors that can easily creep in while comparing the results of Regression Test Suite, a thought process was put into designing and implementing an Automation Framework for the purpose. A lot of work and research has already being done for the Execution phase of Regression Testing wherein two parallel sides – Test and Prod are setup and Test Cases executed by firing the same one after the another and results stored. A large number of Regression Automation Tools are available in market like, QTP, Selenium, WATIR etc, to cover this up. Contrary to this very less work is available and very less has been thought about the Comparison phase wherein Test Results thus generated have to be compared to produce a summary report for QA Testers to analyze which they can further categorize into Expected and Unexpected Breaks and then reach out to Development for investigation and thus complete the end-to-end life cycle of Regression Testing. Wit

Keywords: Regression, Automation, Tools, market

Pages: 84 - 90 | DOI: 10.15224/978-981-07-6935-2-18

19. FORMATION CONTROL OF MULTI-VEHICLE SYSTEM USING PID-LIKE CONSENSUS ALGORITHM

Authors: BHARAT BHUSHAN SHARMA , SUJEET KUMAR

Abstract: Formation control of multi-vehicle system has been studied as a combination of estimation problem and tracking problem. Virtual structure based formation control strategy is applied which solves the problem of formation maintenance and movement using a control architecture in hierarchical manner. The control architecture is distributed in nature and requires only local neighbor to neighbor communication which consists of three layers: formation state estimator, formation control module and the physical agent. In particular, a PID-like discrete-time consensus algorithm is applied on group level to estimate the time varying group trajectory information. Based on the estimated group trajectory information, a PID-like discrete-time consensus algorithm based tracking controller is applied on vehicle level. Numerical solution presented in the end, verifies the effectiveness of proposed approach.

Keywords: formation control, consensus, virtual structure, multi-vehicle system

Pages: 91 - 95 | DOI: 10.15224/978-981-07-6935-2-19

20. IMPACT OF DISTRIBUTED GENERATORS ON VOLTAGE STABILITY MARGIN OF DISTRIBUTION NETWORKS

Authors: C K CHANDA , DEBLINA MAITY , SUMIT BANERJEE

Abstract: The paper presents voltage stability margin (VSM) of radial distribution network by considering a unique reactive loading index without and with distributed generator (DG). It is shown that the branch, at which the value of reactive loading index is minimum, is considered to be the weakest branch of the system. Then, the voltage stability margin (VSM) of the feeder is selected heuristically. It is the product of reactive loading indices of all branches of the feeder. The VSM of all feeders can be evaluated. The feeder which has the smallest value of VSM can be considered as the weakest feeder of the system and is at the proximity of voltage collapse. So, for multiple feeders, the voltage stability margin of a system may be considered as the VSM of the feeder which has the smallest value. The effectiveness of the proposed VSM without and with considering DG has been successfully tested on a 12.66 kV radial distribution network consisting of 33 nodes and the results are found to be in ve

Keywords: Distributed generators; Reactive loading index; radial distribution network; voltage collapse; voltage stability margin; weakest branch

Pages: 96 - 101 | DOI: 10.15224/978-981-07-6935-2-20

21. ANALYTICAL STUDY OF AODV, DSR AND DSDV ROUTING PROTOCOLS IN VANET SIMULATING CITY SCENARIO USING ESTINET SIMULATOR

Authors: AMARDEEP DHIMAN , HARMANDEEP SINGH , SANJAY BATISH , SANJEEV SOFAT

Abstract: VANET is an emerging technology that will help in increasing road safety of commuters and comfort of passengers. In this paper, we compare various topology based routing protocols DSDV, AODV and DSR that are MANET protocols for their behavior in VANET networks, that is a sub-class of MANET based on few parameters. The real city scenario with vehicle traffic has been created using Estinet simulator and analyzed for behavior using different protocols. Finally, we conclude which protocol performs better in city scenario taken in our simulation.

Keywords: AODV, DSR, DSDV, ITS, EstiNet, Throughput, Packet drop, Collision packets

Pages: 102 - 106 | DOI: 10.15224/978-981-07-6935-2-21

22. ENERGY EFFICIENT ENHANCEMENT OF QOS-AODV ROUTING PROTOCOL FOR MANETS

Authors: EMMANUEL S. PILLI , NEHA GARG , RACHNA BAGWARI

Abstract: Collection of mobile nodes that communicate each other without any infrastructure is called Mobile Ad-hoc Network (MANET). The nodes are free to move and can leave and join the network at any instance of time. Hence the topology of MANET changes dynamically. Due to the increasing advances in technology the applications of Mobile Ad-hoc Networks are also increasing. In both the civilian and military areas the uses of MANETs are appreciated because of their various potential applications. There are various protocols to route the packets from source to destination. This paper proposed an approach for Energy Efficiency Enhancement of QoS-AODV routing protocol by setting a threshold limit.

Keywords: Energy, Efficient, Enhancement QoS-AODV Routing Protocol for MANETs

Pages: 107 - 111 | DOI: 10.15224/978-981-07-6935-2-22

23. COMPARATIVE RELIABILITY ANALYSIS OF AODV AND DSR PROTOCOLS IN VANET USING ESTINET SIMULATOR

Authors: AMARDEEP DHIMAN , SANJAY BATISH , SANJEEV SOFAT , DEVAN THAKUR

Abstract: Vehicular Adhoc Network (VANET) is an emerging field of networks which enables inter-vehicle communication. Reliability is one of the most important factors in VANET. Many times, the messages exchanged between the vehicles are emergency messages. It is very important that such emergency messages reach concerned vehicles in time otherwise the consequences might be disastrous. In this paper we study and compare reliability of two important protocols – AODV and DSR using ESTINET simulator in different traffic density scenarios. Finally we conclude which protocol performs better in different scenarios.

Keywords: MANETs, AODV, QoS-AODV, EEEQoS-AODV

Pages: 112 - 115 | DOI: 10.15224/978-981-07-6935-2-23

24. MAMMOGRAM IMAGE ENHANCEMENT TECHNIQUES FOR DETECTING BREAST CANCER: A CRITICAL REVIEW

Authors: M. C HANUMANTHARAJU , M. RAVISHANKAR , M. T GOPALAKRISHNA , VISHWANATHA

Abstract: Breast cancer is the leading cause of deaths among female cancer patients. Breast cancer can be diagnosed in several ways such as imaging or mammography, clinical breast exam, breast self examination and surgery. In breast cancer diagnosis, the radiologist mainly uses their eyes to discern cancer when they screen the mammograms. Mammography is the most effective technique for breast cancer screening and detection of abnormalities. Calcification and masses are most common abnormality found in breast cancer. The aim of this paper is to conduct a comprehensive review of mammogram image enhancement methods to early detection of breast cancer.

Keywords: Mammogram enhancement, Image calcification, detection,Breast mass detecion, Dyadic wavelet transform, image enhancement and denoising, Microcalcification detection.

Pages: 120 - 125 | DOI: 10.15224/978-981-07-6935-2-25

25. REVIEW OF IMAGE ENHANCEMENT TECHNIQUES FOR REMOTE SENSING APPLICATIONS

Authors: M. C HANUMANTHARAJU , M. RAVISHANKAR , M. T GOPALAKRISHNA , VISHWANATHA

Abstract: The field of remote sensing and image processing are constantly evolving in the last decade. At present there are many enhancement techniques which are used for remote sensing image processing. The contrast of remote sensing images is low, which may include various types of noises. In order to make full use of remote sensing image information, the original image has to be enhanced. This paper presents different technologies which are recently proposed for remote sensing image processing. These techniques overcome the limitations of conventional methods. This represent enhancement methods based on Discrete Wavelet Transform (DWT), Stationary Wavelet Transform (SWT), Multi-Scale Retinex, Singular Value, Adaptive Intensity Transformations, and Dual-Tree Complex Wavelet Transform (DT-CWT). These methods overcome the limitations of the existing methods. Different application area has different requirement for image enhancement. These techniques perform image enhancement in different areas a

Keywords: remote sensing images, discrete wavelet transform (DWT), multi-scale retinex, dual-tree complex wavelet transform (DT-CWT), adaptive intensity transformation.

Pages: 126 - 131 | DOI: 10.15224/978-981-07-6935-2-26

26. MATHEMATICAL MORPHOLOGY BASED GRAY SCALE IMAGE SEGMENTATION USING IMPROVED WATERSHED TRANSFORM

Authors: ABDUL WAHID ANSARI , MANISHA GUPTA , MANNIKA GARG

Abstract: Mathematical Morphology provides systematic approach to analyze geometric Characteristic of signal or images, has been applied to many application such as Edge Detection, Object segmentation, noise suppression. Image segmentation is one of the most important categories of image processing. The watersheds transformation for image segmentation using mathematical morphology is widely used. When we use watershed transform is image, there is a serious cause of over segmentation. In this paper the proposed system has been applied to overcome the over segmentation problem by using improved segmentation and efficient technique for image segmentation using mathematical morphology

Keywords: Mathematical Morphology, Segmentation, Morphology gradient, watershed transform, marker controller, over segmentation

Pages: 132 - 137 | DOI: 10.15224/978-981-07-6935-2-27

27. COMPARATIVE STUDY OF BIO-INSPIRED ALGORITHMS FOR UNCONSTRAINED OPTIMIZATION PROBLEMS

Authors: ADIL HASHMI , DIVYA GUPTA , NISHANT GOEL , SHRUTI GOEL

Abstract: Nature inspired meta-heuristic algorithms are iterative search processes which find near optimal solutions by efficiently performing exploration and exploitation of the solution space. Considering the solution space in a specified region, this work compares performances of Bat, Cuckoo search and Firefly algorithms for unconstrained optimization problems. Global optima are found using various test functions of different characteristics.

Keywords: Firefly Algorithm, Bat Algorithm, Cuckoo Search Algorithm, Unconstrained Optimization, Benchmark Functions, Nature-Inspired Algorithms.

Pages: 138 - 142 | DOI: 10.15224/978-981-07-6935-2-28

28. DETECTION OF BLACK HOLE ATTACK IN MOBILE ADHOC NETWORKS

Authors: ADITYA KUMAR , KRISHAN KUMAR SALUJA , SHASHI GURUNG

Abstract: Mobile ad hoc networks (MANET) are widely used in that places where there is no available infrastructure. It is also called infrastructure less network. MANET is particularly vulnerable to various types of security attacks due to its fundamental characteristics, e.g. the lack of centralized monitoring, dynamic network topology, open medium, autonomous terminal and management. The black hole attack is one of such security issue in MANET. In this attack, a malicious node gives false information of having shortest route to the destination node so as to get all data packets and drops it. In this paper, we propose an algorithm to detect and prevent black hole attack in AODV routing. The proposed method uses conformation acknowledgment request to check whether the destination has received dummy packet or not.

Keywords: AODV, Black hole attack, MANET routing protocols, Security)

Pages: 143 - 147 | DOI: 10.15224/978-981-07-6935-2-29

29. CLOUD COMPUTING: FUTURE PROSPECT FOR E-VOTING

Authors: ABDUL MATEEN ANSARI , AFTAB ALAM , MD. AFTAB ALAM

Abstract: In the present era, internet brought drastic change on the peoples’ lives. It made life easy by providing information on click. Today one can just logon to internet for entertainment, jobs hunting, education, news, shopping, health suggestions, learn cosmetic techniques, food recipes and more on the interest of the individuals. Inline to the people affinity towards internet the government started shifting their elections activities over the internet; called as e-voting .the main purpose of e-voting is to enhance transparency in electoral process and rejuvenating democracy to the reach of one and all. Cloud computing has been evolved as an effective computing paradigm offer digital resource to access and maintain IT resources for optimum utilization at affordable cost. To inherit alluring features of cloud many governments are determine to shift their Election activities on the cloud. This paper aims to present an electronic voting system (E-Voting).In this research we shall investigate

Keywords: Internet, e-Voting, rejuvenating, electoral

Pages: 148 - 152 | DOI: 10.15224/978-981-07-6935-2-30

30. MULTI-DEVICES HINDI SPEECH DATABASE FOR SPEAKER IDENTIFICATION USING GMM

Authors: MAHESH CHANDRA , SONU KUMAR

Abstract: In this paper, we study the effect on speaker identification (SI) system when speech data is recorded on two different sensors, a HP Pavilion third generation laptop and a Samsung mobile ( S3770K) both with built-in microphone in parallel in a closed room in noise free environment. The database contains 10 Hindi sentences (50-60 seconds speech) and one english sentence (7-8 seconds speech) of each 39 speakers (26 Male and 13 Female) in a reading style manner. Identification process adopts the methods of feature extraction based on Mel-frequency cepstrum coefficients (MFCC), linear predictive coding (LPC) coefficients. Gaussian mixture model (GMM) is used as a classifier. Our study shows that higher degradation in performance in case of mismatch of sensors during training and testing of data and MFCC performs better during matched conditions, LPC performs better than MFCC in mismatched conditions.

Keywords: MFCC, LPC, GMM, SI, features, PIR

Pages: 153 - 157 | DOI: 10.15224/978-981-07-6935-2-31

31. PORTABLE WASHING MACHINE USING VHDL

Authors: MADHAV MEHTA , ROWNAZ HAQUE

Abstract: Portable washing machine is a handy washing machine that can be used for traveling whether the laundry facilities are available or not. The coding has been done for an integrated circuit(IC) by ASIC approach using VHDL. It is a single tub wash cum dry Portable Automatic Washing Machine. The total weight is 12Kg, the height is 0.75 meters and radius is 0.31 meters. This is 1/3rd the weight of Washing Machine that are available in the market. Power consumption in a portable washing machine is minimized using the ASIC approach. As, the transistor size is decreasing day by day. So, the power consumption will also be really less. We have shown the simulations on the basis of the type of fabric being washed. If washing is enabled then user selects the cloth. Cotton, Woolen, Denim and Mixed (different fabrics washed together) are type of clothes that can be put in the washing machine.

Keywords: Portable, ASIC, VHDL, Wash, Spin

Pages: 158 - 161 | DOI: 10.15224/978-981-07-6935-2-32

32. ZERO CURRENT SWITCHED CYCLO-INVERTER

Authors: MAYANK KUMAR , NIRMAL KUMAR KUSHWAHA , VINEETA AGARWAL

Abstract: This paper proposes a new zero current switched, IGBT based cyclo-Inverter, capable of converting power at the main frequency to a higher frequency. An auxiliary switch along with an inductor is used to commutate the IGBT at zero current in order to decrease total internal losses and total harmonic distortion factor in the converter. The proposed converter is compared with the conventional cyclo-inverter and it has been demonstrated that the losses has been reduced approximately 50% by this new switching technique. A prototype of the converter is developed in the lab for verification of the results.

Keywords: Cyclo-Inverter, IGBT, Triggering Pulses, Zero Crossing Detector (ZCD)

Pages: 168 - 172 | DOI: 10.15224/978-981-07-6935-2-34

33. A SERVEY AND ANALYSIS OF AUTHENTICATION PROTOCOLS IN CLOUD COMPUTING

Authors: DHAIRYA KUMAR GOPAL , GAURAV PATHAK , KRISHAN KUMAR SALUJA

Abstract: Cloud computing is one of the most emerging technologies in the world providing computing resources as a service on demand via internet maintained by third party service provider. In cloud environment trust is one of the most sensitive and important issue. In order to maintain the privacy of certain user we need strong authentication mechanism. This paper will discuss about the available authentication scheme that have been proposed for cloud environment. This paper will analyze existing authentication scheme in cloud computing from various point of view.

Keywords: cloud computing,authentication.

Pages: 173 - 179 | DOI: 10.15224/978-981-07-6935-2-35

34. ALL OPTICAL PHASE ENCODED NOR LOGIC GATE IMPLEMENTATION BY FOUR WAVE MIXING IN SEMICONDUCTOR OPTICAL AMPLIFIER

Authors: SUTANU KUMAR CHANDRA

Abstract: Increasing demand of high speed in data and image processing; optical computing has been proved its inevitability through its inherent properties. Different logic gates are the essential part of the processing unit. Semiconductor optical amplifier properties have created a new interest in the field of construction of the all optical logic gates with various encoding techniques. Phase encoding drew more attention to the researchers as it shows extended tolerance limit in long-haul fiber transmission system with higher receiver sensitivity. Thus phase encoding gives high spectral efficiency in optical computing and communication both. Four wave mixing (FWM) in semiconductor optical amplifier (SOA) is an intra band non linear process so it requires very short switching time. Thus phase encoding with FWM in SOA for the construction of the all optical logic processor gives very high-speed operation. Some optical logic gates already proposed and demonstrated experimentally by some research g

Keywords: SOA, FWM, CMZI, NAND, Phase modulator, Phase shifter and Optical logic gate.

Pages: 180 - 183 | DOI: 10.15224/978-981-07-6935-2-36

35. VOLTAGE STABILITY ANALYSIS OF RADIAL DISTRIBUTION NETWORKS FOR LOADS OF COMPOSITE TYPE USING SHUNT CAPACITOR AT OPTIMAL POSITION

Authors: C K CHANDA , K DASGUPTA , S BANERJEE

Abstract: The paper presents voltage stability analysis of radial distribution networks for composite type of loads without and with considering shunt capacitor. A new voltage stability index is proposed for identifying the node, which is most sensitive to voltage collapse. The effectiveness of the proposed method without and with considering shunt capacitor is demonstrated through an 12.66 kV radial distribution networks consisting of 33 nodes.

Keywords: Voltage stability index; radial distribution system; shunt capacitor; voltage collapse; weakest node

Pages: 184 - 188 | DOI: 10.15224/978-981-07-6935-2-37

36. SECURITY ISSUES IN MOBILE WIRELESS BODY AREA NETWORKS

Authors: D.K. CHAUHAN, , MANISHA MITTAL

Abstract: When a Body Sensor Network (BSN) that is linked to the backbone via a wireless network interface roams from one coverage zone to another then in between wireless-body-area-networks (WBAN) interference created, which can cause serious throughput degradation and energy waste. When a wireless body area network become mobile then problem arises of inter process interference A necessity appears for efficient WBAN monitoring information extraction, high spatial reuse, dynamically fine tuning the monitoring process to suit the data quality, provision for allowing the translation of high-level requirements of medical officers to low-level sensor reconfiguration. Issues related to security and possible solutions must be taken in the research. Study brings out that the current proposed solutions in security are still having limitations needing further research. This paper proposes an optimized BSN handover strategy, RASS (Real-time Accurate and Scalable System) and VMISO(Virtual Multiple Input S

Keywords: Body Sensor Network (BSN), wireless-bodyarea-networks (WBAN), RASS (Real-Time, Accurate, and Scalable System), VMISO (Virtual Multiple Input Single Output), Inter-WBAN scheduling (IWS)

Pages: 189 - 193 | DOI: 10.15224/978-981-07-6935-2-38

37. MEDICAL EMBEDDED SYSTEMS BRIDGING THE GAP BETWEEN MEDICAL AND ELECTRONICS

Authors: HEENA S. PURKAIT , SAMARTH M. SHAH

Abstract: Embedded systems are popularly used terms in the automobile and telecommunication world. Medical field is often neglected in the study of embedded systems but we would like to bridge the gap of knowledge between the medical and electronic field. In this thesis, we would like to demonstrate some of our work that has been focused on the medical equipments and embedded systems. In regard of the same, we will discuss the following medical equipments to explain the use of embedded systems in the medical field.

Keywords: demonstrate, work, focused, Medical, embedded, systems

Pages: 194 - 198 | DOI: 10.15224/978-981-07-6935-2-39

38. SECURITY: MAJOR CHALLENGE FOR ACCEPTANCE OF CLOUD TECHNOLOGY

Authors: GOURAV SINGH , ROHIT KANAUZIA , SHUBHI JAIN

Abstract: In this paper, author discussed the driving forces that are posing hindrance in acceptance of cloud computing as the technology. The author laid stress on Security as a major factor of concern for the growth of cloud as a technology. They tried to provide a way to manage the issues of security and data management in a cloud efficiently and effectively so as to build a secure cloud system.

Keywords: Authentication, Access Control, Security, Costing Model, Charging Model, SLA

Pages: 199 - 200 | DOI: 10.15224/978-981-07-6935-2-40

39. CAPACITY OF MIMO SYSTEM WITH OPTIMALLY ORDERED SUCCESSIVE INTERFERENCE CANCELLATION

Authors: BHUPESH BHATIA , VIJAYRAJ SHOKEEN

Abstract: In wireless communications, spectrum is a scarce resource and hence imposes a high cost on the high data rate transmission. It has been demonstrated that multiple antenna system provides very promising gain in capacity without increasing the use of spectrum, reliability, throughput, power consumption and less sensitivity to fading, hence leading to a breakthrough in the data rate of wireless communication systems The vertical Bell labs layered space-time (V-BLAST) system is a multi-input multi-output (MIMO) system designed to achieve good multiplexing gain.. In this paper, we study the V-BLAST MIMO system architecture, with optimally ordered successive interference cancellation (SIC) receiver in ZERO FORCING EQUALIZATION (ZF) and simulate this structure in Rayleigh fading channel. Based on bit error rate, we show the performance of this receiver, indicates that the ordered SIC detector most effectively balances the accuracy of symbol detection. SIC receiver based on ZF combined with sy

Keywords: MIMO, V-BLAST, ZF, OPTIMALLY ORDERED SIC.

Pages: 203 - 207 | DOI: 10.15224978-981-07-6935-2-41

40. TRADE OFFS IN MIGRATING FROM LEGACY SYSTEM TO SERVICE ORIENTED ARCHITECTURE

Authors: AMANDEEP KAUR , BALRAJ SINGH , HUNNEY SALHOTRA

Abstract: Service Oriented Software Engineering is the most promising engineering paradigm in industry now-a-days. It focuses on development of software systems based on reusable services that can distributed in nature. Migrating legacy system developed in any language to Service Oriented Paradigm is in trend now. Enterprises have more powerful software with lesser cost. There has always been a difference between the methods of migration proposed by academia and as used in industry. Academia suggests that while migration, legacy system should be reverse engineered. But in practice, legacy systems are forward engineered. The paper tries to fill the agreement gap between Industry and Academia upon the migration of legacy system to SOA system. In this research, Memory and CPU utilization of various events of legacy system, Forward Engineered SOA system, and Backward Engineered SOA system were recorded. Recommendation is given that migration technique should be chosen by keeping these trade-offs in

Keywords: service; service oriented software engineering; migration; legacy to SOA

Pages: 208 - 218 | DOI: 10.15224/978-981-07-6935-2-42

41. GOAL ORIENTED ACCEPTANCE TESTING FOR MULTI AGENT SYSTEM: V-MODEL EXTENSION

Authors: AMANDEEP KAUR , BALRAJ SINGH , MANDEEP KAUR

Abstract: Agent based Software Engineering, initially derived from Artificial Intelligent (AI), is now becoming increasingly popular among software engineers to develop modern and complex intelligent systems. Agent oriented systems contains intelligent agents that can perform a task autonomously. They are goal oriented extension of objects. In the recent years, with the emergence of AOSE, trails of various traditional Object oriented approach are being applied on it, to make it more and more acceptable in Software Industry. Acceptance testing is an integral part of traditional testing and it has drawn the interest of various researchers who are working on AOSE concept. No formal acceptance testing technique has been proposed yet for AO systems. The paper proposes a formal way of conducting Acceptance testing for agent oriented system by extending the popular V-Model for software testing. A two steps testing approach is proposed and a new phase “Goal Oriented Acceptance Testing” is added in V-Mod

Keywords: agent; software agent; testing; acceptance testing; goal oriented acceptance testing

Pages: 214 - 220 | DOI: 10.15224/978-981-07-6935-2-43

42. PERFORMANCE EVALUATION OF DSR, AODV, DSDV, MULTIPATH AOMDV ROUTING PROTOCOLS IN MANETS

Authors: KISHOR P PATIL

Abstract: A Mobile ad hoc network is a collection of various number of mobile nodes connected through wireless links forming a temporary network without any type of fixed topology, centralized access point and infrastructure. In such a network, each node acts as a router and host simultaneously, it can move out or join in the network freely as and when required. Various routing protocols have been discussed so far but in this paper a brief comparison of two reactive protocols DSR, AOMDV and AODV along with proactive protocol DSDV is done. AOMDV was designed primarily for highly dynamic ad hoc networks where link failures and route breaks occur frequently. It maintains routes for destinations in active communication and uses sequence numbers to determine the freshness of routing information to prevent routing loops. It is a timer-based protocol and provides a way for mobile nodes to respond to link breaks and topology changes. As the node performance gets affected due to mobility and position err

Keywords: MANET, AOMDV, AODV, DSR, DSDV

Pages: 221 - 224 | DOI: 10.15224/978-981-07-6935-2-44

43. HYSTERESIS CONTROL FOR CURRENT HARMONICS SUPPRESSION USING SHUNT ACTIVE FILTER

Authors: R.S.UDGAVE , Y. R. ATRE

Abstract: Recently wide spread of power electronic equipment has caused an increase of the harmonic disturbances in the power systems. The nonlinear loads draw harmonic and reactive power components of current from ac mains. Current harmonics generated by nonlinear loads such as adjustable speed drives, static power supplies and UPS. Thus a perfect compensator is required to avoid the consequences due to harmonics. To overcome problems due to harmonics, Shunt Active Power Filter (SAPF) has been considered extensively. SAPF has better harmonic compensation than the other approaches used for solving the harmonic related problems. The performance of the SAPF depends upon different control strategies. This paper present three-phase active filter to improve power quality. The active power filter (APF) is implemented with PWM based current controlled voltage source inverter (VSI). This VSI switching signals are generated throughl hysteresis current controller (HCC). The hysteresis band current control

Keywords: Voltage source inverter, Shunt active filter, hysteresis current controller

Pages: 225 - 229 | DOI: 10.15224/978-981-07-6935-2-45

44. DEVELOPMENT AND PERFORMANCE EVALUATION OF FLANN BASED MODEL FOR PROTEIN STRUCTURAL CLASS PREDICTION

Authors: AMBIKA PRASAD MISHRA , BISHNUPRIYA PANDA , MINAKHI ROUT

Abstract: During last few decades’ accurate prediction of protein structural class has been a challenging problem. Efficient and meaningful representation of protein molecule plays a significant role. In this paper Chou’s pseudo amino acid composition along with amphiphillic correlation factor has been used to represent protein data. A simple functionally linked artificial neural network has been used for structural class prediction.

Keywords: AAC, AmPseAAC, Functional link artificial neural network (FLANN), Protein Domain, Structural Class

Pages: 230 - 234 | DOI: 10.15224/978-981-07-6935-2-46

45. DIGITAL ANFIS ARCHITECTURE AND PERFORMANCE ANALYSIS FOR NONLLINEAR SYSTEMS

Authors: DEVENDRA S. CHAUDHARI , PRASAD R. PANDE , PRASHANT L. PAIKRAO

Abstract: Neuro Fuzzy systems, nowadays drawing attention of many researchers since being able to carry both neural networks and fuzzy logic’s benefits. Adaptive Neuro Fuzzy Inference System (ANFIS) is such a neuro fuzzy architecture which has been widely accepted since invented. It is used in different applications like universal approximator, non-linear system realization, pattern recognition etc. However, because of variety of applications, implementation of ANFIS has been turn out to be specific and same implementation barely utilized with another one. FPGAs are potential enough to bring flexibility in hardware implementation of ANFIS so as to make it generic and application-independent. In this paper, an ANFIS model designing and implementation on FPGA is described. A unique dynamic ANFIS structure is realized with VHDL which is independent of system to be realized, membership function type used. It can be easily configurable with order of ANFIS, number of inputs/outputs, and number of memb

Keywords: ANFIS, Digital System, FPGA, VHDL, Neuro Fuzzy System

Pages: 235 - 239 | DOI: 10.15224/978-981-07-6935-2-47

46. GEOMETRIC DISTORTIONS IN SCANNED LASER DISPLAYS

Authors: B. K. KAUSHIK , NEERAJ SINGH , SURENDER SINGH SAINI , VINOD KARAR

Abstract: Practically unrestricted depth of focusing, great color saturation, high contrast ratio and high resolution in combination with various video standards are the major advantages of laser projection systems compared to conventional lamp projectors. Every individual pixel is created by collinear superposition of three collimated laser beams in the image. By result, the image stays also properly focused if the distance to the projector is varying or inclined or if curved surfaces are used as a projection screen. Here the laser wavelengths used cover more than 90% of all colors which are perceptible by the human eye. The laser displays like any other system suffers from some inherent distortions. The distortions may be in shape of pincushion, barrel, parallelogram, unequal sides, non-linearity, etc.These systems use high speed scanning in horizontal direction and in vertical direction with lower speed scanning to generate the required frame rate. High acceleration forces required for high s

Keywords: LSD, Distortions, MEMS, HUD

Pages: 240 - 243 | DOI: 10.15224/978-981-07-6935-2-48

47. WIRELESSLY CONTROLLED VOICE OPERATED ROBOT

Authors: ANKIT SHARMA , MEENAKSHI SOOD , PRANAV BHASIN , VASUNDHARA ANAND

Abstract: Speech is the most common and efficient mode of communication and has large potential of being a mode of interaction with machine/computer. To communicate with the machine via speech we require an interface which replicates the human auditory system. An Automatic Speech Recognition (ASR) system is required which is able to \"hear,” understand,\" and \"act upon\" spoken information. This paper focuses on developing the speech recognition module and integrating it with robotics wirelessly. Our goal is to develop an interactive robot which performs actions in accordance with the voice commands communicated wirelessly to the robot after being processed in the ASR module which is speaker dependent and has a pre-defined command set The system would support many valuable applications like replacing a human assistant with a robot which can perform actions according to voice command in more efficient manner.

Keywords: Speech Recognition, Feature Extraction, MFCC, Robotics, Xbee, Zigbee.

Pages: 244 - 247 | DOI: 10.15224/978-981-07-6935-2-49

48. RECONFIGURABLE FRACTAL ANTENNA FOR COGNITIVE RADIO

Authors: AMIT KUMAR , ANURADHA SONKER , KRISHAN KUMAR

Abstract: Reconfigurable antennas have ability to adjust their geometry and behavior to get used to changes in environmental conditions or system requirements. Such as enhanced bandwidth, change in operating frequency, polarization, radiation pattern etc. This paper discusses the use of multiband reconfigurable fractal antennas for cognitive radio once a cognitive device manages to learn the RF environment (cognition part), from past observations and decisions using machine learning techniques.

Keywords: Speech Recognition, Feature Extraction, MFCC, Robotics, Xbee, Zigbee.

Pages: 248 - 249 | DOI: 10.15224/978-981-07-6935-2-50

49. ENSURING DATA STORAGE SECURITY IN CLOUD COMPUTING BY IP ADDRESS RESTRICTION & KEY AUTHENTICATION

Authors: BHUPESH KUMAR DEWANGAN , SANJAY KUMAR BAGHEL

Abstract: This paper, proposes an efficient way to secure the data and file in cloud server. Basically in cloud server when data is stored it is not sure whether the data is having security or not. This concept drastically reduces the communication and storage overhead as compared to the traditional replication based file distribution techniques. By utilizing the IP address restriction with data and providing key to distributed data which is stored on cloud server, whenever data corruption has been detected during the storage correctness verification, our scheme can almost guarantee the simultaneous localization of data errors, i.e., the identification of the misbehaving server(s). These scheme further supports secure and efficient dynamic operations on data blocks, including: data update, delete and append. This methodology ensure the data security on cloud computing so that any hacker cannot use the others data or download. On this paper the restriction is been done by IP address and key to ev

Keywords: Byzantine failure, IP address restriction, distributed scheme, cloud.

Pages: 250 - 254 | DOI: 10.15224/978-981-07-6935-2-51

50. A TEXT MINING APPROACH FOR AUTOMATIC CLASSIFICATION OF WEB PAGES

Authors: BHUMIKA GUPTA , SURABHI LINGWAL

Abstract: Today the web contains a huge amount of information provided as html and xml pages and their number is growing rapidly with expansion of the web. In Web text mining, the text extraction and filtering of extracted content is the foundation of text mining. Automatic Classification of text is a semi-supervised machine learning task that automatically classify a given document to a set of pre-defined categories based on its features and text content. This paper explains a generic strategy for automatic classification of web pages that deals with unstructured and semi-structured text. This work classified the datasets into different labeled classes using kNN and Naïve Bayesian classification techniques. The experimental evaluation concluded that kNN has better accuracy, precision and recall value as compared to Naïve Bayesian classification. This paper presents a unified approach that is able to provide robust classification and validation of web pages to different categories

Keywords: accuracy, automatic classification, cosine similarity, kNN, Naïve Bayes, precision, recall, tf-idf

Pages: 255 - 259 | DOI: 10.15224/978-981-07-6935-2-52

51. DESIGN OF MULTIMODE INTERLEAVER USING OFDM IN WLAN APPLICATION

Authors: PRANITA PARKHE

Abstract: Wireless technology is expected to be the dominant mode of access technology in the future, a new data range of services such as multimedia and high speed data are being offered for delivery over wireless network. The IEEE 802.11 is known as Wireless LAN, to obtain higher data rates it is used with OFDM, which is defined a speed upto 54 Mbps in 5-GHz band. In this paper we present a technique to model the interleaver used in IEEE 802.11a and IEEE 802.11g based WLAN in verilog HDL using Quartus 9.0 web edition. Our technique is comprises of OFDM which provide higher operating frequency in addition to reducing the effects like intersymbol and interchannel interferences

Keywords: WLAN; OFDM; memory; Multimode interleaver

Pages: 260 - 263 | DOI: 10.15224/978-981-07-6935-2-53

52. OPTIMAL PLACEMENT AND SIZING OF SVC FOR LOSS MINIMIZATION AND VOLTAGE PROFILE IMPROVEMENT USING ABC ALGORITHM

Authors: LAXMI SRIVASTAVA , MANJAREE PANDIT , SHRADDHA UDGIR

Abstract: The placement of Flexible AC Transmission System (FACTS) devices in power system is of great significance to ensure the promising performance of the transmission network. The FACTS devices play an important role for power system security enhancement. The FACTS devices are used to regulate the active and reactive powers and to improve voltage profile, due to their robust, fast and flexible control characteristics. Due to their high capital cost, it is necessary to place these controllers optimally in a power system. Optimal placement of FACTS devices can control the line flows and can maintain the voltages at the desired level and so can improve the voltage stability. This paper presents Artificial Bee Colony (ABC) algorithm for finding the optimal location of Static Var Compensator (SVC) to reduce the real power losses and to improve the voltage profile of a power system during single line outage contingencies. ABC algorithm is an optimization technique based on the intelligent behavio

Keywords: Line Outage Contingency, FACTS Devices, SVC, Real Power Loss, Voltage Profile, VPI, ABC Algorithm

Pages: 264 - 268 | DOI: 10.15224/978-981-07-6935-2-54

53. ANALYZING QUADTREE PARTITIONS WITH DIFFERENT THRESHOLDS ON VARIOUS TYPE OF IMAGES IN FRACTAL COMPRESSION

Authors: JEET KUMAR , MANISH KUMAR

Abstract: The paper analyzes the effect of quadtree partition method with different thresholds on various images in order to compress an image with fractal approach. The paper also addresses the cases where lossless compression cannot be achieved. The traditional fractal image compression methods are based on two different partitions on the same image but this paper provides single quadtree partition method to achieve compression.

Keywords: Quadtree, threshold, fractal and image compression

Pages: 269 - 273 | DOI: 10.15224/978-981-07-6935-2-55

54. NOVEL OPERATIONAL TRANSCONDUCTANCE AMPLIFIER BASED ON FLOATING GATE MOSFET TUNABLE GROUNDED RESISTOR

Authors: RISHIKESH PANDEY , SUMIT VERMA

Abstract: The design of tunable operational transconductance amplifier with wide linear range has become increasingly challenging with the scaling in the power supply voltage. Use of control voltage for the purpose of tunning often results in narrow linear range. In recent years the use of voltage as a control parameter has even become more difficult with the reduced supply voltage environment. In this paper, bias current approach is used to achieve the tunability of proposed FGTGR based OTA. The proposed circuit is developed using balanced CMOS OTA and FGTGR. A low-pass filter has also been proposed as an application of FGTGR based OTA. The proposed circuits have been simulated using 0.18 µm CMOS technology. The simulation results have been presented to show the effectiveness of the proposed circuits.

Keywords: OTA, FGTGR, transconductance, Tunability

Pages: 274 - 277 | DOI: 10.15224/978-981-07-6935-2-56

55. DESIGN AND ANALYSIS OF DOMINO LOGIC CIRCUIT FOR SUBTHRESHOLD OPERATION

Authors: HEMANT SHARMA , MAYANK KUMAR RAI , SANKAR SARKAR

Abstract: This paper presents an equivalent RC delay approach to study the subthreshold operation for inverter and OR logic circuits. The inverter is designed for subthreshold current model, which is exponential in nature instead of using square law model. Based on the inverter the other Domino circuits are designed and various bulk biasing techniques are used. Taking the effect of Miller capacitance, equivalent capacitance is calculated and results of RC delay are compared with SPICE simulation in 32nm technology.

Keywords: Low power, Subthreshold, Dynamic logic circuit

Pages: 278 - 282 | DOI: 10.15224/978-981-07-6935-2-57

56. HYBRID SMART HOME SYSTEM AUTOMATION OF ELECTRICAL APPLIANCES VIA SMS AND GPRS ON ANDROID PLATFORM

Authors: ASHA MISHRA , MONICA DESWAL

Abstract: Technology is being on progress since the evolution and currently the main area of research is automation technology. SMS Based Home Automation System is the earlier technology that came in existence. Each technology has several limitations. This paper emphasizes on the limitations of this technology and some advancement in automation technology to overcome those limitations. This design is presented to overcome the user non-friendly behavior limitation of SMS based automation devices and mobility of internet/gprs and embedding the two technologies. This also focuses on comparison with existing technology. The main idea of paper is to provide user friendly interface.

Keywords: emphasizes, limitations, technology, advancement

Pages: 283 - 287 | DOI: 10.15224/978-981-07-6935-2-58

57. SMART REGULATOR AUTOMATIC ROOM TEMPERATURE MONITORING AND CONTROLLING WITH POWER SAVING APPROACH

Authors: SOUMYA ROY

Abstract: Our main goal is to design a “SMART REGULATOR” which reduces the human effort. This instrument regulates the speed of the fan automatically according to the room temperature and the user defined set point temperature. It will also display the room temperature. If the temperature is less than the set point temperature or exactly equal to the set point temperature then the fan is in off state and when the temperature of the room is greater than the set point temperature then the fan is in on state and the speed of the fan will vary proportionally according to the logic written in the program which depends on the difference between the present room temperature and the set point temperature. This regulator also counts the number of person entering in the room and also leaves from the bidirectional single door room. It will also display that number. If the number is zero that means no person present in that room or the room is empty, then it will disconnect the power supply of the room auto

Keywords: Automatic Control, Fan speed control, Human, Power Consumption, Visitor Counter

Pages: 288 - 291 | DOI: 10.15224/978-981-07-6935-2-59

58. TEXT INDEPENDENT SPEAKER IDENTIFICATION USING SOFT-COMPUTING TECHNIQUES

Authors: DINESH SHEORAN , PARDEEP SANGWAN

Abstract: Speaker recognition is an emerging and very important technique in this new era of human-machine interaction. It has two main tasks: speaker identification and speaker verification. In the past various models have been proposed for the identification of speakers with the help of statistical techniques like Hidden Markov Model, Gaussian Mixture Model. As the Artificial Neural Networks (ANNs) are the universal classifiers. The present research proposes a novel paradigm which utilizes the strong pattern matching capability of ANNs for identification of speakers. Here ten speech samples are collected from 40 different Mel Frequency Cepstral Coefficients (MFCC) are extracted for all the speakers and these coefficients are used to train ANN and then test signals are validated and verified for ANN as well as for Fuzzy Logic. The results of identification are very encouraging.

Keywords: Speaker Identification, Artificial Neural Network, Fuzzy Logic, MFCC, Hidden Markov Model, Discrete Fourier Transform, Discrete Cosine Transform

Pages: 292 - 295 | DOI: 10.15224/978-981-07-6935-2-60

59. DESIGN AND SIMULATION OF MICROSTRIP PATCH ANTENNA FOR ON-BODY COMMUNICATION USING DIFFERENT FEEDING TECHNIQUES

Authors: NAVDEEP KAUR , RAJNI

Abstract: The Body Area Network (BAN) is an area which helps constant monitoring of Human health with real-time updates of medical records through Internet. In this paper, we propose an on-body performance of wearable Microstrip patch antenna which operates in Industrial scientific Medical (ISM) frequency band at 2.45 GHz. This antenna is designed to achieve better return loss gain and bandwidth. The antenna return loss is about -25.54 db with microstrip feed and -22.68 db with coaxial feed at 2.45 GHz. Another field parameters like Gain, Directivity, Radiation and Specific Absoption Rate (SAR) values have been evaluated on the body and on free space antenna with FEM based software HFSS ver. 10.0.

Keywords: Body-Centric Wireless Communications (BCWCs), On-body Communications, Microstrip patch antenna (MSA), coaxial feed, Specific Absoption Rate (SAR) Muscle tissue.

Pages: 296 - 300 | DOI: 10.15224/978-981-07-6935-2-61

60. RESOLVING BLACK HOLE ATTACK IN AODV USING PROPOSED INTRUSION DETECTION SYSTEM

Authors: ANANT VERMA, , MUKESH AZAD , ROHIT PAL , SANJAY KUMAR

Abstract: Ad hoc networks are characterized by open medium, dynamic topology, distributed cooperation and constrained capability with more challenges for security. Routing security is the most important factor in the security of the entire network. However, few of current routing protocols have the consideration about the security problems. This paper emphasizes on the black hole attack in the AODV protocol. To provide security in AODV protocol, firstly we have to trace malicious behavior of node. Specially, we analyzed the black hole node behavior and proposed a security system to detect such black hole node in the network and made the secured system that optimizes the loss of packets from such type of attack.

Keywords: black hole, node, network, secured system

Pages: 301 - 305 | DOI: 10.15224/978-981-07-6935-2-62

61. POWER QUALITY IMPROVEMENT USING T-SHAPE Z-SOURCE INVERTER OPERATING ON MAXIMUM CONSTANT BOOST SWITCHING

Authors: ABHISHEK KASHYAP , PRABHAT RANJAN SARKAR , VINEETA AGARWAL

Abstract: An important issue of compensating reactive power to enhance power quality is proposed in this paper. Non-linearity in circuit element characteristics causes reactive power to flow in circuit. A new topology faded with T shape ZSI operating on Maximum Constant Boost switching has been proposed to compensate the reactive power. Reactive compensators are a part of FACTS devices family. Here VAR compensation is being done by T shaped ZSI. We have applied max constant boost switching pattern to generate shoot through stages. To achieve better dynamic performance , as supplementary PI controller has been used to track reference value for zero reactive power and further this controller output signal is used to design switching pattern of maximum constant boost control for T shape ZSI.

Keywords: Maximum constant boost (MCB), Z Source Inverter (ZSI), VAR-volt ampere reactive, PI- proportional integral, Pulse Width Modulation-PWM, Voltage source inverter- VSI

Pages: 312 - 316 | DOI: 10.15224978-981-07-6935-2-64

62. DELAY ANALYSIS IN CARBON NANOTUBE BUNDLE INTERCONNECT FOR VLSI DESIGN

Authors: DEVENDERPAL SINGH , MAYANK KUMAR RAI

Abstract: This paper proposes to study the performance of carbon nanotube bundle in terms of delay as a VLSI interconnect at 32nm technology node. Output waveform and 90% propagation delay are analytically determined and compared with SPICE simulation result. Alpha power law model is used for representing the transistors of CMOS driver. SPICE simulation result reveals that delay increases with increase in length of interconnect.

Keywords: Carbon Nanotubes, Interconnect, Propagation Delay, L-segment RLC

Pages: 321 - 326 | DOI: 10.15224/978-981-07-6935-2-66

63. BOTNET DETECTION, MEASUREMENT AND ANALYSIS:RESEARCH CHALLENGES

Authors: DIVYA BHATT , MEENAKSHI THAPLIYAL , NEHA GARG , SHIVANI PANT

Abstract: At a present time lots of compromised computers also known as botnets, represents a very serious threat to Internet security. Botmaster have developed the ability of controlling large network of infected hosts, characterized by complex executable command set. This paper we have brief review of the recently approach related botnet detection, measurement and analysis. Now we will propose common process model for botnet detection and also concluded by presenting the identified research challenges in the botnet defense

Keywords: Botnet, Detection, Measurement, Analysis

Pages: 327 - 331 | DOI: 10.15224/978-981-07-6935-2-67

64. SOFT COMPUTING AND ITS COMPONENTS

Authors: MOHD TABISH KHAN

Abstract: Soft Computing plays a vital role in creation of intelligent machines. Almost all the techniques that constitute Soft Computing are inspired by natural processes. The following paper explores all such techniques and gives a nutshell of their working.

Keywords: Soft Computing, Neural Networks, Evolutionary Algorithm, Bayesian Network

Pages: 332 - 335 | DOI: 10.15224/978-981-07-6935-2-68

65. DESIGNING OF CONTROLLER BASED ON ARTIFICIAL NEURAL NETWORK FOR LIQUID LEVEL SYSTEM

Authors: ANIRUDHA NARAIN , ANKIT KUMAR

Abstract: The objective of this paper is to investigate and find a solution by designing the intelligent controllers for controlling liquid level system using Artificial Neural Network. The controllers also can be specifically run under the circumstance of system disturbances. To achieve such objectives, a prototype of liquid level control system has been built and implementations of neural network control algorithms are performed. In neural network control, the approach of Model Reference Adaptive Neural Network Control based on the back propagation algorithm is applied on training the system. The control algorithms based on Neural Network is developed and its performances is observed for the liquid level system.

Keywords: Artificial neural Network (ANN), Liquid Level System, Model Predictive Contol (MPC), MATLAB/SIMULINK

Pages: 336 - 341 | DOI: 10.15224/978-981-07-6935-2-69

66. FBG BASED REAL TIME DERAILMENT ASSESSMENT IN RAILWAYS

Authors: AJIT KUMAR , S.K.GHORAI

Abstract: This paper proposes the use of FBG sensor to measure the lateral and vertical forces at the rail-wheel contact point. The ratio of lateral and vertical force at the flange contact contact point is called Nadal limit for a certain critical value for which derailment is likely to occur. Simulation has been done for the measurement of lateral and vertical forces with the increasing velocity and taking the range of radius of curve from 600m to 1000m

Keywords: Fiber Bragg Grating, Nadal’s limit, flange climb derailment, curve negotiation

Pages: 342 - 346 | DOI: 10.15224/978-981-07-6935-2-70

67. SEARCH OF CATEGORIZED INTERNET CONTENT BASED ON CONSUMPTION ANALYSIS IN THE SOCIAL NETWORK OF A USER

Authors: BHANU LUTHRA , MANDEEP KAUR

Abstract: In Today’s World, the consumption of internet content has increased manifold. The number of people as well as number of websites has increased exponentially. Therefore there is a big need for performing a consumption analysis of this internet consumption. There are various applications to track this consumption at individual levels, but none to do it for a closed group like a family or a class or a project team. Our work proposes an application which not only tracks the internet consumption of the individuals but also collaborates it for a social group and displays the summary in a categorical format. Such an application will club the internet content visited and consumed by a group of people connected together by their own choice and categorizes the recorded data into various heads based on type as well as level. The result of this application can be customized on the basis of inputs given by a user, providing a very crisp summary which has a plethora of practical advantages to variou

Keywords: providing, crisp, summary, plethora, practical

Pages: 347 - 351 | DOI: 10.15224/978-981-07-6935-2-71

68. CLASSIFICATION OF STREAM DATA IN THE PRESENCE OF DRIFTING CONCEPT

Authors: L.G. MALIK , SNEHLATA S. DONGRE , SUDHIR RAMRAO RANGARI

Abstract: Mining stream data have recently garnered a great deal of attention for Machine Learning Researcher. The major challenges in stream data mining are drifting concept that deals with data whose nature changes over time. Concept drift is one of the core problems in Stream data mining and machine learning. Classification of Stream data in the presence of drifting concepts is more difficult and one of the core issue. In this paper, A Classifier based on hybrid approach is proposed and implemented that handle concept drifting stream data. The proposed classifier is used Naives Bayes as base learner for classification of concept drifting stream data where as concept drift is detected and handled by using drift detection method. Experiments and results on datasets show that the proposed approach performs well with improvement in accuracy of classification and can detect and adapt to concept drifts.

Keywords: concept drift, stream data, classification, drift detection.

Pages: 332 - 355 | DOI: 10.15224/978-981-07-6935-2-72

69. DEVELOPMENT OF CONTENT FOR M-LEARNING

Authors: SARTAJ SINGH SANDHU , NIKITA PASHINE , RAGHAV GARG , RUSHITAA GUPTA

Abstract: There has been noticeable advancement in mobile technology. The lay mans’ perception of a mobile as mere communication device underwent significant changes. One such change is M-learning which has taken its roots from e-learning. Mobile learning (M-learning) provides educational opportunities through mobile phones, PDA, digital media players. The best feature about M-learning is that exact information can be grasped anytime, anywhere without many constraints. Though, M-learning requires researcher’s attention in developing issues, processing capabilities and small screen displays.The paper discusses about mobile learning technologies, opportunities and challenges for success of M-learning. It is observed that most of the students in India have mobile phones and m-learning is an upcoming research field that aims at effective transition of learning tools from digital boards to hand held devices. Developing of M-learning content is a Herculean task in today’s date as the content developed

Keywords: Learning, E-learning, Mobile Content, Design issues for mobile learning.

Pages: 356 - 360 | DOI: 10.15224/978-981-07-6935-2-73

70. POWER-AWARE VIRTUAL MACHINE SCHEDULING-POLICY FOR VIRTUALIZED HETEROGENEOUS MULTICORE SYSTEMS

Authors: INDERVEER CHANA, , TARANPREET KAUR

Abstract: This paper presents a systematic approach to correctly provision server resources in data centers, resulting in minimum energy consumption and SLA violations. In particular, we describe a hybrid method for efficient server provisioning in virtualized heterogeneous multicore Cloud data centers. The objective is to place VMs on host while keeping total utilization of CPU below defined threshold and then optimizing the VM allocation by constrained consolidation of VMs leveraging live migration and switching off idle nodes to minimize power consumption. As excessive migration of VMs can lead to significant SLA violation which can hamper required Quality of Service, in proposed approach not only overall number of used servers are minimized, but also number of migrations are minimized, resulting in minimum energy consumption and least SLA violations. We present evaluation results showing that our approach can provide up to 13% of energy savings, reduced SLA violations and fewer VM migrations

Keywords: Green IT; Cloud computing; Energy efficiency; Allocation of virtual machines; Resource management; Virtualization; Dynamic consolidation

Pages: 361 - 366 | DOI: 10.15224/978-981-07-6935-2-74

71. ADAPTIVE DISPLAY LUMINANCE CONTROL FOR OPTIMIZED CONTRAST RATIO

Authors: J.K. QUAMARA , KAMAL KUMAR , SURENDER SINGH SAINI , VINOD KARAR

Abstract: The new generation displays are loaded with several new features to make these systems more user-friendly. There are several attributes of a display such as resolution, luminance and contrast levels, refresh rate, etc. which decides its rating and application. These systems with the human eye features like adaptive display luminance control (ADLC) under varying ambient luminance conditions add more challenge to design of display systems. The ADLC can be achieved by varying the display luminance according to the ambient luminance level. In this paper, various parameters which are important for adaptive luminance control have beendiscussed. Various types of light sensors, methodology and required parameters have been discussed in detail for realizing the display luminance adaptively while maintaining an adequate contrast ratio in real time.

Keywords: Luminance, Contrast, Viewing area, Display devices, Adaptive Display Luminance Control

Pages: 367 - 371 | DOI: 10.15224/978-981-07-6935-2-75

72. AN OVERVIEW OF SPEECH PROCESSING TECHNIQUES

Authors: DINESH SHEORAN , PARDEEP SANGWAN , SUSHIL KUMAR

Abstract: After years of research and development the accuracy of automatic speech recognition (ASR) remains one of the most important research challenges e.g. speaker and language variability, vocabulary size and domain, noise. The design of speech recognition system require careful attentions to the challenges or issue such as various types of speech classes, speech representation, feature extraction techniques, database and performance evaluation. This paper presents a study of basic approaches to speech recognition and their results shows better accuracy. This paper also presents what research has been done around for dealing with the problem of ASR

Keywords: Automatic speech recognition, hidden markov model, acoustic model, MFCC

Pages: 372 - 375 | DOI: 10.15224/978-981-07-6935-2-76

73. AUTOMATED MICROANEURYSM DETECTION AND DIABETIC RETINOPATHY GRADING

Authors: M.S. GAIKWAD , SHARVARI PATIL

Abstract: Diabetic retinopathy is a serious complication of diabetes mellitus and a major cause of blindness worldwide. Microaneurysms are the first clinically observable lesions indicating diabetic retinopathy. We propose an ensemble-based framework to improve microaneurysm detection. Unlike the well-known approach of considering the output of multiple classifiers, we propose a combination of internal components of microaneurysm detectors, namely preprocessing methods and candidate extractors.

Keywords: Diabetic retinopathy

Pages: 376 - 382 | DOI: 10.15224/978-981-07-6935-2-77

74. CRACKING MD5 HASHES BY SIMULTANEOUS USAGE OF MULTIPLE GPUS AND CPUS OVER MULTIPLE MACHINES IN A NETWORK

Authors: JEGA ANISH DEV

Abstract: Cryptographic Hash functions find ubiquitous use in various applications like digital signatures, message authentication codes and other forms of security. Their associated vulnerabilities therefore make them a prevalent target for cyber criminals. General means of defeating hash based authentication involves both discovering and exploiting inherent weakness in cryptographic hash functions or by straight forward brute force attack on the hash Digest. The latter in most cases presents to be an extremely time intensive task. Recent times have however seen usage of GPUs for brute forcing hashes thus significantly accelerating the rate of brute forced hashes. This has further been extended to use simultaneous usage of multiple GPUs over multiple machines. Usage of CPUs for brute forcing have more or less lost importance over the advent of GPU based cracking. This paper presents an efficient method of maximally using computing resources by simultaneously using Graphics Processing Units (GPU

Keywords: MD5 Hash cracking, CUDA based cracking, combined usage of CPU and GPU for hash cracking, Botnet computing power

Pages: 383 - 387 | DOI: 10.15224/978-981-07-6935-2-78

75. FLOATING POINT UNIT IMPLEMENTATION ON FPGA

Authors: PARDEEP SANGWAN , SUSHIL KUMAR , MANISH

Abstract: As densities of FPGA are increasing day by day, the feasibility of doing floating point calculations on FPGAs has improved. Moreover, recent works in FPGA architecture have changed the design tradeoff space by providing new fixed circuit functions which may be employed in floating-point computations. By using high density multiplier blocks and shift registers efficient computational unit can be developed. This paper evaluates the use of such blocks for the design of floating-point units including adder, subtractor, multiplier and divider

Keywords: units, including adder, subtractor, multiplier, divider

Pages: 388 - 393 | DOI: 10.15224/978-981-07-6935-2-79

76. MITIGATION OF VOLTAGE SAG AND SWELL USING BATTERY BASED DYNAMIC VOLTAGE RESTORER

Authors: A. JAYALAXMI , G.ROHIT KUMAR , J. BANGARRAJU , K.R.MAHANTH REDDY , V. RAJAGOPAL

Abstract: This paper describes the mitigation of voltage sag and swell using battery based dynamic voltage restorer (DVR). The DVR is a power electronic based converter that provides three-phase controllable voltage source, whose magnitude of voltage and angle adds/subtracts to the source voltage during sag/swell. The DVR can inject a voltage at fundamental frequency in each phase of required magnitude and phase. The DVR can restore the load voltage within few milliseconds. DVR is a fast and efficient solution to voltage sag and voltage swell problems. The estimation of references voltages are based on Synchronous Reference Frame Theory (SRFT) and gate pulses are generated by sensing the source, load terminal voltages and supply currents. The Mitigation of voltage sag and swell using SRFT for Battery based DVR issimulated by using MATLAB/SIMULINK and power system Block set (PSB) toolboxes.

Keywords: DVR, Voltage Sag and Swell, Power Quality, Voltage harmonics.

Pages: 394 - 398 | DOI: 10.15224/978-981-07-6935-2-80

77. LOW-COST INSTRUSION DETECTION SYSTEM BASED ON OPTO-ELECTRIC SENSOR

Authors: NITIN SINGH , RAGHUVIR S.TOMAR

Abstract: This paper introduces a hardware design method of an electronic Intrusion Detection System based on the Optoelectric Sensor, which can be used to achieve the protection of valuables and to detect the intrusion in an protected area. The circuit design is simple, compact, low cost and provides the reliable notice of intrusion. The stability and reliability of this design has been verified by the experiments.

Keywords: Optoelectric Sensor, Intrusion detection

Pages: 399 - 401 | DOI: 10.15224/978-981-07-6935-2-81

78. COMPARATIVE STUDY OF EXCESS PERMITTIVITY IN NORMAL AND DIABETES MELLITUS OF HUMAN ERYTHROCYTES

Authors: AJAY VASISHTH , GAGAN ANAND , PIYUSH KUCHHAL , S NAGAVENI

Abstract: This paper reveals the data on excess permittivity of normal and diabetes mellitus of human erythrocytes. In the present investigation, erythrocytes suspension of normal and diabetic blood is subjected to Non Uniform Electric Field (NUEF) produced by pin-pin electrode configuration. At least 40-45 samples were taken the data of excess permittivity of normal blood and diabetic mellitus were taken into consideration. The results shows that the variation in the dielectric properties affects the whole body with respect to excess permittivity as in table 1.3.The average data reveal significant variation in excess permittivity of erythrocytes of diabetic patients. When compared with that of healthy persons as shown in graphical representation of 2.1 & 2.2. (1).

Keywords: Erythrocytes, Diabetes mellitus, Pin-Pin electrode Configuration, Normal blood.

Pages: 402 - 406 | DOI: 10.15224/978-981-07-6935-2-82

79. COMPARATIVE STUDY OF EXCESS PERMITTIVITY IN NORMAL AND DIABETES MELLITUS OF HUMAN ERYTHROCYTE

Authors: AJAY VASISHTH , GAGAN ANAND , PIYUSH KUCHHAL , S NAGAVENI

Abstract: This paper reveals the data on excess permittivity of normal and diabetes mellitus of human erythrocytes. In the present investigation, erythrocytes suspension of normal and diabetic blood is subjected to Non Uniform Electric Field (NUEF) produced by pin-pin electrode configuration. At least 40-45 samples were taken the data of excess permittivity of normal blood and diabetic mellitus were taken into consideration. The results shows that the variation in the dielectric properties affects the whole body with respect to excess permittivity as in table 1.3.The average data reveal significant variation in excess permittivity of erythrocytes of diabetic patients. When compared with that of healthy persons as shown in graphical representation of 2.1 & 2.2. AJAY VASISHTH,

Keywords: virtual structure, multi-vehicle system, ormation control, consensus

Pages: 402 - 406 | DOI: 10.15224/978-981-07-6935-2-82

80. LOW-COST INSTRUSION DETECTION SYSTEM BASED ON OPTO-ELECTRIC SENSOR

Authors: NITIN SINGH , RAGHUVIR S.TOMAR

Abstract: This paper introduces a hardware design method of an electronic Intrusion Detection System based on the Optoelectric Sensor, which can be used to achieve the protection of valuables and to detect the intrusion in an protected area. The circuit design is simple, compact, low cost and provides the reliable notice of intrusion. The stability and reliability of this design has been verified by the experiments.

Keywords: Optoelectric Sensor, Intrusion detection

Pages: 399 - 401 | DOI: 10.15224/978-981-07-6935-2-81

81. MITIGATION OF VOLTAGE SAG AND SWELL USING BATTERY BASED DYNAMIC VOLTAGE RESTORER

Authors: A. JAYALAXMI , G.ROHIT KUMAR , J. BANGARRAJU , K.R.MAHANTH REDDY , V. RAJAGOPAL

Abstract: This paper describes the mitigation of voltage sag and swell using battery based dynamic voltage restorer (DVR). The DVR is a power electronic based converter that provides three-phase controllable voltage source, whose magnitude of voltage and angle adds/subtracts to the source voltage during sag/swell. The DVR can inject a voltage at fundamental frequency in each phase of required magnitude and phase. The DVR can restore the load voltage within few milliseconds. DVR is a fast and efficient solution to voltage sag and voltage swell problems. The estimation of references voltages are based on Synchronous Reference Frame Theory (SRFT) and gate pulses are generated by sensing the source, load terminal voltages and supply currents. The Mitigation of voltage sag and swell using SRFT for Battery based DVR issimulated by using MATLAB/SIMULINK and power system Block set (PSB) toolboxes.

Keywords: DVR, Voltage Sag and Swell, Power Quality, Voltage harmonics

Pages: 394 - 398 | DOI: 10.15224/978-981-07-6935-2-80

82. FLOATING POINT UNIT IMPLEMENTATION ON FPGA

Authors: SUSHIL KUMAR , PRADEEP SANGWAN

Abstract: As densities of FPGA are increasing day by day, the feasibility of doing floating point calculations on FPGAs has improved. Moreover, recent works in FPGA architecture have changed the design tradeoff space by providing new fixed circuit functions which may be employed in floating-point computations. By using high density multiplier blocks and shift registers efficient computational unit can be developed. This paper evaluates the use of such blocks for the design of floating-point units including adder, subtractor, multiplier and divider.

Keywords: floating, point standard

Pages: 388 - 393 | DOI: 10.15224/978-981-07-6935-2-79

Popular Proceedings

ICETM 2023

9th International E-Conference on Engineering, Technology and Management

ESSHBS 2017

7th International Conference On Advances In Economics, Social Science and Human Behaviour Study

ASET 2017

7th International Conference on Advances in Applied Science and Environmental Technology

ACSM 2017

7th International Conference on Advances in Civil, Structural and Mechanical Engineering

CSM 2017

5th International Conference on Advances in Civil, Structural and Mechanical Engineering

SEM 2017

5th International Conference on Advances in Social, Economics and Management

ICETM 2022

8th International E- conference on Engineering, Technology and Management

ACSEE 2019

8th International Conference on Advances in Civil, Structural and Environmental Engineering