Skip to main content

The Institute of Doctors Engineers and Scientists

IDES is formed to carry on the business of promoting, forming, developing and organizing associations and networks Medical, Science and Engineering professors and Scientist. Our main objective is "To Promote the Research and Development activities in the Science, Medical, Engineering and Management field.


rss RSS

471
RESULTS


Show sorted alphabetically

Show sorted alphabetically

SHOW DETAILS
up-solid down-solid
eye
Title
Date Published
Creator
LAT (Limiting Ambient Temperature) of the Engine and Compressor is a key operating parameter. To improve the LAT separate air intake for compressor and engine is provided. The comparative evaluation shows improvement of LAT around 10 degrees.
Topics: Limiting Ambient Temperature, LAT of Compressor, LAT of Engine, Compressor Performance.
This paper presents a study of harmonic filters design procedure to minimize harmonic distortion caused by a harmonic source such as drives. The non – linear load considered in this paper is six pulse rectifier load. Design and simulation procedure with respect to this load is explained in details. Several types of shunt harmonic filters are presented. Shunt filters are effective in minimizing voltage distortion caused by nonlinear loads in industrial power systems. Different alternatives of...
Topics: Harmonics, passive shunt filters, single tuned filter, high pass filter, filter rating
This paper discusses the indigenous development of novel, innovative, compact, lightweight and highly efficient Permanent Magnet based Alternator incorporating Axial Flux technology. The above prototype alternator has been successfully developed and realized by the author team @ R&DE (Engrs), Pune. This development has immense potential for various defence applications where space is always at premium. The AFPM generator can be easily configured as a highly compact and lightweight power...
Topics: Axial-field alternator, twin stator, rotor compact generators, and permanent-magnet (PM) machines
Objective of this paper is to propose modeling and simulation of self-excited induction machine for wind power generation (SEIMWPG). The earlier models of such generators capable of generating electric power are facing huge mechanical losses due to wear and tear in the tightly coupled mechanical gear systems. Due to this heavy arrangement in each and every constituent mechanical assembly, the earlier design could not provide maximum efficiency. In this paper the proposed model focuses on the...
Topics: Self-excited induction generator (SEIG), mutual inductance, wind power generator (WPG), doubly-fed...
Straight cross-country pipelines are supported throughout the length of pipeline on different forms of supports at more or less regular spans. Maximizing the distance between supports will minimize the number of supports required, which in turn reduce the total cost of erecting these pipe supports. ASME has suggested the standards for support span, but the bending stress considered in its calculation is very low (15.9 Mpa). There are other references also who have listed the maximum support...
Topics: Introduction, Procedure for calculation of maximum span, Sample calculation & results,...
A novel example-based process for automated colorization of grayscale images using texture descriptors (ACTD) without any human intervention is proposed. By analyzing a set of sample color images, coherent regions of homogeneous textures are extracted. A multi-channel filtering technique is used for texture-based image segmentation. For each area of interest, state of the art texture descriptors are then computed and stored, along with corresponding color information. These texture descriptors...
Topics: Image colorization, Fuzzy C-means clustering, Gabor transform, CBIR
The greatest challenge faced by an engineer is to overcome the energy wasted due to friction in any mechanical process. In a conventional punching process, mechanical or hydraulic force is used to operate the punch which involves large amounts of metal to metal contact in the drive system components, as well as inaccuracy in the control of the punching forces at the micro level. This paper introduces the basic construction of an Electromagnetic assisted punching machine to carry out the...
Topics: Energy, Friction, Punching, Mechanical force, Hydraulic Force, Electromagnetic actuator, current,...
Magnetic resonance angiogram is a way to study cerebrovascular structures. It helps to obtain information regarding blood flow in a non-invasive fashion. Magnetic resonance angiograms are examined basically for detection of vascular pathologies, neurosurgery planning, and vascular landmark detection. In certain cases it becomes complicated for the doctors to assess the cerebral vessels or Circle of Willis from the two-dimensional (2D) brain magnetic resonance angiograms. In this paper an...
Topics: Magnetic resonance angiogram, Circle of Willis, pre-process, color-base segmentation, K-means...
This paper presents a scheme to identify the blur parameters using support vector machine (SVM) Multiclass approach has been used to classify the length of motion blur and sigma parameter of atmospheric blur. Different models of SVM have been constructed to classify the parameters. Experimental results show the robustness of the proposed approach to classify blur parameters.
Topics: Classification, support vector machine (SVM), motion blur, point spread function(PSF)
Elliptic Curve Cryptography (ECC) provides a secure means of key exchange between communicating nodes using the Diffie-Hellman (DH) Key Exchange algorithm. This work presents an ECC encryption implementation using of the DH key exchange algorithm. Both encryption and decryption of text messages using this algorithm, have been attempted. In ECC, encoding is carried out by mapping a message character to an affine point on an elliptic curve. It can be observed from the comparison of the proposed...
Topics: ECC, EC-DH, Koblitz encoding
Generation Expansion Planning (GEP) is one of the most important issues in long-term power system planning. In from past, investigators noticed to GEP and supply of energy. In power system planning, generation expansion planning is  performed for 5-yrears planning horizon or more. There are two main objective functions in GEP. First is the minimization of investment cost and another one is the maximization of reliability. GEP use future likeable engineering economics function, in order to...
Topics: Combines Cycle Generation Technology (CCGT), Generation Expansion Planning (GEP), Load Dispatch...
Placement of dental implants requires precise planning that accounts for anatomic limitations and restorative goals. Diagnosis can be made with the assistance of computerized tomographic scanning, but transfer of planning to the surgical field is limited. Precise implant placement no longer relies upon so called mental-navigation but rather can be computer guided, based on a three dimensional prosthetically directed plan. Recently, novel CAD/ CAM techniques such as stereolithographic rapid...
Topics: Rapid Prototyping (RP), Stereolithography (SLA), Dental Prosthesis, Dental Implants, Surgical Guides
Fingerprint is the dominant trait between different biometrics like iris, retina, and face. A fingerprint is the pattern of ridges and valleys on the surface on a fingertip. Now days itself this method is very powerful because of their immutability and uniqueness of patterns .immutability means the patterns by ridges and valleys are permanent and unchanged. Many techniques have been proposed for pattern recognition in fingerprint, most of them being based on minutiae and singular point. In the...
Topics: Fingerprint matching, POINCARE INDEX, Singular Point, OPENCV, BEAGLE board
Most of the routing protocols proposed for ad-hoc networks and sensor networks are not designed with security as a goal. Hence, many routing protocols are vulnerable to an attack by an adversary who can disrupt the network or harness valuable information from the network. Routing Protocols for wireless sensor networks are classified into three types depending on their network structure as Flat routing protocols, Hierarchical routing protocol and Geographic routing protocols. We mainly...
Topics: GPSR, Greedy, Perimeter, Selective forwarding attack, Sybil attack
The size and shape of opening in dam causes the stress concentration, it also causes the stress variation in the rest of the dam cross section. The gravity method of the analysis does not consider the size of opening and the elastic property of dam material. Thus the objective of study is comprises of the Finite Element Method which considers the size of opening, elastic property of material, and stress distribution because of geometric discontinuity in cross section of dam. Stress...
Topics: Openings in dam, Finite Element Method, geometric discontinuity, Koyna Dam, 2D plane strain...
In the present work the concepts of template matching through Normalized Cross Correlation (NCC) has been used to implement a robust real time object tracking system. In this implementation a wireless surveillance pinhole camera has been used to grab the video frames from the non ideal environment. Once the object has been detected it is tracked by employing an efficient Template Matching algorithm. The templates used for the matching purposes are generated dynamically. This ensures that any...
Topics: Normalized Cross correlation, template matching, Tracking, Wireless vision
This paper introduces a direct-sequence codedivision multiple access (DS/CDMA) concept which accommodates a higher number of users than the spreading factor N. This new multiple access concept makes use of two sets of orthogonal signal waveforms, one for the first set of users and the other for the additional users. The two sets of users are scrambled by a set specific pseudonoise sequence. A two stage and three stage conventional and weighted parallel detection technique is proposed to cancel...
Topics: Gold codes, Linear Parallel Interference Cancellation (LPIC), Multiple Access (MA), Multiple Access...
The problem of control associated wind energy conversion systems using horizontal-axis fixed-pitch variable speed low-power, working in the partial load region, consisting in the energy conversion maximization, is approached here under the assumption that the wind turbine model and its parameters are poorly known. Intelligent gradient detection method by using Maximum Power Point Tracking (MPPT) fuzzy control approach is proposed control solution aims at driving the average position of the...
Topics: MPPT, wind energy, optimal control, WECS
With the advent of cloud computing several security and privacy challenges are put forth. To deal with many of these privacy issues, ‘processing the encrypted data’ has been identified as a potential solution, which requires a Fully Homomorphic Encryption (FHE) scheme. After the breakthrough work of Craig Gentry in devising an FHE, several new homomorphic encryption schemes and variants have been proposed. However, all those theoretically feasible schemes are not viable for practical...
Topics: Homomorphic Encryption, Implementation, Practicality, Efficient public key, Cloud security, Privacy
Wireless Sensor Networks consists of sensor nodes that are capable of sensing the information and maintaining security. In this paper, an Anonymity and Trust Management Scheme applied to Clustered Wireless Sensor Networks (ATMC) is proposed which enhances the security level. It also provides a stable path for communication. It is observed that the performance of the network is better than existing schemes through simulation.
Topics: Anonymity, Cluster head, Trust value, subrange values, Wireless Sensor Networks
In this paper, the architecture of a Multi-plane Parallel Deflection-Routed Circular Banyan (PDCB) network based switching fabric is introduced. The PDCB network has a cyclic, regular, self-routing, simple architecture and fairly good performance. Its Performance is improved due to reduction in blocking by two-dimensional path-multiplicity of the proposed architecture. It consists of 4X4 Switching Elements. The proposed switch is shown to be fault-tolerant. A simple analytical model based on...
Topics: Fault-tolerant, Banyan, Markov chain, Performance, Deflection-routed, Switch
In clayey soil region of Malwa (M.P.), normally footing rest on yellow soil strata having low bearing capacity. Environmental changes have great impact on the behavior and strength parameter of the yellow soil. skirted footing in which vertical walls surrounds sides of the soil mass beneath the footing, is one of the recognized bearing capacity improvement technique. Construction of vertical skirts at the base of the footing, confining the underlying soil, generates a soil resistance on skirt...
Topics: Bi-angle shape skirted footing, model footing, two way eccentric load, bearing capacity, no tilt...
In order to accurately model high frequency affects, inductance has been taken into consideration. No longer can interconnects be treated as mere delays or lumped RC networks. In that frequency range, the most accurate simulation model for on-chip VLSI interconnects is the distributed RLC model. Unfortunately, this model has many limitations at much higher of operating frequency used in today’s VLSI design. The reduction in cross-sectional dimension leads to more tightly couple interconnects...
Topics: Crosstalk Model, Distributed RLCG Segment, Interconnect, Noise, Delay, VLSI
The phase frequency detector has been designed for high frequency phase locked loop in 180 nm CMOS Technology with 1.8V supply voltage using CADENCE Spectre tool. A Virtuoso Analog Design Environment and Virtuoso LayoutXL tools of Cadence have used to design and simulate schematic and layout of phase frequency detector respectively. Architecture of phase frequency detector (PFD) has simulated to get low dead zone and low power consumption. A layout has designed by above tool and DRC by Assura....
Topics: Phase locked loop (PLL), Phase frequency detector (PFD), Charge pump (CP), Voltage controlled...
Seamless interoperability between two dissimilar networks requires handoff from one network to the other. Such handoffs are known as vertical handoffs. Vertical handoff introduces a shift in the approach to handoffs. It deals with handoffs between dissimilar networks, such as from an access point to a base station or vice versa. The integration of diverse but complementary cellular and wireless technologies in the next generation of wireless communication systems requires the design of...
Topics: Vertical Handover, Base Stations, Signal Strength, Unused Bandwidth, Handover Decision Vector
Mobile Ad Hoc networks (MANET), distinct from traditional distributed systems, are dynamic and selforganizing networks. MANET requires a leader to coordinate and organize tasks. The challenge is to have the right election algorithm that chooses the right leader based on various factors in MANET. In this paper, we analyze four leader election algorithms used in mobile Ad Hoc Networks. Factors considered in our analysis are time complexity, message complexity, assumptions considered, fault...
Topics: Distributed Algorithms, Fault Tolerance, Leader Election, Mobile Ad Hoc Networks
Analysing genome rearrangements is a problem from the vast domain of comparative genomics and computational biology. Several studies have shown that closely related species have essentially the same set of genes however their gene orders differ. The differences in the gene order are the results of various large-scale evolutionary events of which reversal is the most common rearrangement event. The problem of finding the shortest sequence of reversals that can transform one genome into another...
Topics: Comparative Genomics, Genome Rearrangements Algorithms, Sorting by Reversals
This article describes and analyses the existing possibilities for using Standard Statistical Methods and Artificial Intelligence Methods for a short-term forecast and simulation of demand in the field of Asymmetric Digital Subscriber Line Internet Connection in the Czech Republic. The most widespread methods are based on Time Series Analysis. Nowadays, approaches based on Artificial Intelligence Methods, including Neural Networks, are booming. Separate approaches will be used in the study of...
Topics: Demand, Telecommunications, Standard Statistical Methods, Neural Network, Asymmetric Digital...
A conventional motorized wheelchair has been fitted with sensors and programmed with an intelligent guidance system to efficiently maneuver itself automatically from one point to another in a facility equipped with a grid of sensors that provide the wheelchair with the basic map of its course. The device described in this paper has been conceptualized such that once the wheelchair is given information regarding the starting and stopping point in a controlled facility, the wheelchair with this...
Topics: wheelchair, automatic, motorized, sensor aided, path finding
Given a graph with positive edge weights and a positive integer m, the Constrained Forest Problem (CFP) problem seeks a minimum-weight spanning subgraph each of whose components contains at least m vertices. Such a subgraph is called an m-forest. We present a genetic algorithm (GA) for CFP, which is NP-hard for me”4. Our GA evolves good spanning trees, as determined by the weight of the m-forest into which it can be partitioned by a simple greedy algorithm. Genetic operators include mutation,...
Topics: Genetic Algorithms, Spanning Forests, Constrained Forest Problem, Network Design Problems,...
Some of the recent applications in the field of the power supplies use multiphase converters to achieve fast dynamic response, smaller input/output filters or better packaging. Typically, these converters have several paralleled power stages with a current loop in each phase and a unique voltage loop. The presence of the current loops is necessary to increase dynamic response (by using Current mode control) and to avoid current unbalance among phases.
Topics: Multiphase Buck, Self balance Mechanism, Zero voltage Switching
Process Instrumentation deals with measurement and control process parameters to achieve the required quality. While teaching process related subjects, it is observed that students are not able to understand process equipment and controls associated with it theoretically. So to make the subjects understandable and interesting, simulation of processes are carried out with displays as used with distributed control system (DCS). Simulations are used across virtually in engineering to improve the...
Topics: Process Instrumentation, simulation, LabVIEW, control design, DSC
The Institute of Doctors Engineers and Scientists
by Prof. Hapse Manik M., Dr. A.G. Thosar, Prof. Sanjay M. Shinde and Prof. Satish A. Markad
texts

eye 341

favorite 1

comment 0

This paper analyzes the probability distribution of wind speed data recorded by Maharashtra Energy Development Agency (MEDA) wind farm at Ahmednagar (India). The main objective is to validate the wind energy probability by using probability distribution function (PDF) of available wind potential. The wind speed is measured with the help of three anemometers S30, S45, S60 placed at 30 m, 45 m, and 60 m height. Mean values are recorded and stored for every hour using a Data logger. For accounting...
Topics: probability distribution function, weibull distribution, maximum likelihood, lognormal...
Evaluating classifier performance is a critical problem in pattern recognition and machine learning. In this paper pattern recognition techniques were applied to identify encryption algorithms. Four different block cipher algorithms were considered, DES, IDEA, AES, and RC2 operating in (Electronic Codebook) ECB mode. Eight different classification techniques were used for this purpose, these are: Naïve Bayesian (NB), Support Vector Machine (SVM), neural network (MLP), Instance based learning...
Topics: Pattern Recognition, Classifiers, Encryption, Cryptanalysis
A quarter 3D model of cornea-aqueous humor employing elastic anisotropic formulation in collaboration with Goldmann appalanation tonometer (GAT) action is investigated in order to examine the relation between the material property variation and the deviation from the true pressure inside the human eye utilizing finite element method. In addition to that, the effect of the corneal thickness variation has also been studied. However, the clinical experimental data show tremendous variation between...
Topics: intraocular pressure, tonometer, corneal thickness, anisotropy, finite element method
Software metrics is applied evaluating and assuring software code quality, it requires a model to convert internal quality attributes to code reliability. High degree of complexity in a component (function, subroutine, object, class etc.) is bad in comparison to a low degree of complexity in a component. Various internal codes attribute which can be used to indirectly assess code quality. In this paper, we analyze the software complexity measures for regression testing which enables the...
Topics: Software Complexity, Software Metrics, Regression Testing, Control Flow Metrics1
In this paper has been designed a facility (electromechanical system) for regulation the tension force of winding fine materials. In winding fine strip material such a thread it is important to get homogeneous density of the wound package, to get high quality material in next processing of this package. In order to achieve this goal, the designed facility controls the thread tension force during winding process and the driving motor speed. And it allows adjusting the tension force of the...
Topics: Regulation, coil, tension force, speed control, fine material, lever
The Institute of Doctors Engineers and Scientists
by Mr. Sadananda M P and Mr. Sudeep Manohar
texts

eye 523

favorite 0

comment 0

The Dynamic Host Configuration Protocol (DHCP) provides a framework for passing configuration information to hosts on a UDP network. Computers that are connected to IP networks must be configured before they can communicate with other hosts. The most essential information needed is an IP address. DHCP eliminates the manual task by a network administrator. DHCP is based on the Bootstrap Protocol (BOOTP), adding the capability of automatic allocation of reusable network addresses and additional...
Topics: DHCP, BOOTP, DORA, Lease file, security, CUnit, TCP, UDP and IP address
Nowadays high strength and high performance concrete are widely used in many civil engineering constructions. To produce them it is required to reduce the water/powder ratio and increase the binder content. Superplasticizers are commonly used to achieve the workability. Silica fume is one of the popular pozzolanas used in concrete to get imporved properties. The use of silica fume in conjuction with superplastisizers has become the backbone of high strength and high performance concrete. An...
Topics: high strength concrete, high performance concrete, superplastcizer, silica fumeI.
This paper proposes comparative study of two basic approaches such as Morphological Approach (MA) and Correlation Approach (CA) and three modified algorithms over the basic approaches for detection of micronatured defects occurring in plain weave fabrics. A Hybrid of CA followed by MA was developed and has shown to overcome the drawbacks of the basic methods. As automation of MA using DC Suppressed Fourier Power Spectrum Sum (DCSFPSS), DCSFPSSMA could not yield improvement in Overall Detection...
Topics: DCSFPSS, Defect Independent Template, Correlation, Morphological, Periodicity, Tribrid Approach
Nonlinear dynamics of a third order phase locked loop (PLL) using a resonant low pass filter in the face of continuous wave (CW) and frequency modulated (FM) input signals is examined. The role of design parameters of the loop resonant filter and the modulation index of the input FM signal on the system dynamics is studied numerically as well as experimentally. The occurrence of chaotic oscillations in the PLL is verified by evaluating some well-known chaos quantifiers like Lyapunov Exponents...
Topics: Third Order PLL, Resonant Filter, Stability Analysis, Chaotic dynamics, Lyapunov Exponent.
In this paper we explore the area of congestion avoidance in computer networks. We provide a brief overview of the current state of the art in congestion avoidance and also list our extension to the TCP congestion avoidance mechanism. This extension was previously published on an international forum and in this paper we describe an improved version which allows multiprotocol support. We list preliminary results carried out in a simulation environment. New introduced approach called Advanced...
Topics: congestion control, command, delay, flow age, loss rate, notification system, performance,...
A Direct Digital Frequency Synthesizer designed core is implemented and validated in this paper. This electronics paper proposed the details of programming model optimal and feasible architecture of Direct Digital Synthesizer that eliminates the need for the manual tuning and tweaking related to component aging and temperature drift in analog synthesizer solutions. A Direct Digital Synthesizer play a vital role in Digital frequency Down Conversion in such an application, the DDC (Digital Down...
Topics: Direct Digital Frequency Synthesizer, Performance of Digital Frequency Synthesizer, Design...
In this paper, two different Wavelet based Image Compression techniques are compared. The techniques involved in the comparison process are WDR and ASWDR. The above two techniques are implemented with different types of wavelet codecs. Wavelet difference reduction (WDR) has recently been proposed as a method for efficient embedded image coding. This method retains all of the important features like low complexity, region of interest, embeddedness, and progressive SNR. ASWDR adapts the scanning...
Topics: Wavelet Image Compression, WDR, ASWDR
This paper presents a novel voltage mode (VM) first order Single input three output multi function filter employing second generation current conveyor transconductance amplifier (CCII-TA). The proposed circuit employs only one active element, one grounded capacitor and three resistors. The angular pole frequency of the proposed circuits can be tuned electronically with the help of bias current. The proposed circuit is very appropriate to further develop into an integrated circuit. Sensitivity...
Topics: Second-generation Multiple output current conveyor transconductance amplifier (CCII-TA), Analog...
In this research, climatic data for various regions of Iran were obtained from meteorological organizations in their original formats and then were converted to ICM1 input files for MEPDG2 software by algorithms. The major aim of this research is to assess the environmental effects on fatigue cracking, so more than 300 analyses were conducted on a specific pavement with climatic data from various regions of Iran, since pavement temperature and humidity profile have important effects on...
Topics: MEPDG model, Climatic parameters, Fatigue cracking
This article presents a 3rd current-mode quadrature oscillator using current controlled current conveyor transconductance amplifier (CCCCTA) and operational transconductance amplifier (OTA) as active element as active elements. The proposed circuit is realized from a noninverting lossless integrator and an inverting second order low-pass filter. The oscillation condition and oscillation frequency can be electronically/orthogonally controlled via input bias currents. The circuit description is...
Topics: oscillator, current-mode, CCCCTA, OTA
This paper presents the need to operate the power system economically and with optimum levels of voltages has further led to an increase in interest in Distributed Generation. In order to reduce the power losses and to improve the voltage in the distribution system, distributed generators (DGs) are connected to load bus. To reduce the total power losses in the system, the most important process is to identify the proper location for fixing and sizing of DGs. It presents a new methodology using...
Topics: Distributed generation, optimal DG placement, Power loss Reduction, Artificial Bee Colony...
The objective of this work is to develop a hardware-based watermarking system to identify the device using which the photograph was taken. The watermark chip will be fit in any electronic component that acquires the images, which are then watermarked in real time while capturing along with separate key. Watermarking is the process of embedding the watermark, in which a watermark is inserted in to a host image while extracting the watermark the watermark is pulled out of the image. The ultimate...
Topics: Digital watermarking, VLSI, Genetic algorithm, colour space transformation, Hardware Implementation
In this paper, a novel technique is applied to detect fault in the transmission line using wavelet transform. Three phase currents are monitored at both ends of the transmission line using global positioning system synchronizing clock. Wavelet transform, which is very fast and sensitive to noise, is used to extract transients in the line currents for fault detection. Fault index is calculated based on the sum of local and remote end detail coefficients and compared with threshold value to...
Topics: Wavelet transform, transmission line faults, power system protection, fault transients,...
Image noise is unwanted information in an image and can occur at any moment of time such as during image capture, transmission, or processing and it may or may not depend on image content. In order to remove the noise from the noisy image, prior knowledge about the nature of noise must be known otherwise noise removal causes the image blurring. Identifying nature of noise is a challenging problem. Many researchers have proposed their ideas on image noise identification and each of the work has...
Topics: Image noise, PNN, kurtosis, skewness
ANSYS, one of the CAE software is widely used to perform various types of analysis under various loading condition. But the major drawback of the software is that it does not provide ‘undo’ option because of which it becomes quite hectic to edit the entered parameter in the same iteration. Also slight change in dimension or in boundary condition, force user to perform the same steps of analysis once again. Macro files are used to store ANSYS Parametric Design Language (APDL). So the...
Topics: ANSYS, Macro, APDL Programming, CFD Analysis, Laminar Flow, CAE
Design of Pedal Operated machine for Injection Moulding with compound lever system has been reported in this paper. Authors designed this pedal operated injection moulding machine to reduce the manual effort to operate the machine. Human fatigue can also be reduced as the posture of the operator changes and leg is used to operate the pedal operated machine. The efficiency of an operator may also be improved and operation will be quick, resulting improved productivity by using this machine.
Topic: Injection Moulding
Machining tests were carried out by turning En- 31steel alloy with tungsten carbide tools using soluble oilwater mixture lubricant under dif ferent machining conditions. First-order and second-order surface roughness predicting models were developed by using the experimental data by applying response surface methodology and factorial design of experiments. The established equations show that the feed rate is the main influencing factor on the surface roughness followed by tool nose radius and...
Topics: Response surface method, surface roughness, metal cutting, factorial design
Data Warehousing is the main Business Intelligence instrument for the analysis of large amounts of data. It permits the extraction of relevant information for decision making processes inside organizations. Given the great diffusion of Data Warehouses, there is an increasing need to integrate information coming from independent Data Warehouses or from independently developed data marts in the same Data Warehouse. In this paper, we provide a method for the semi-automatic discovery of common...
Topics: Data Warehouse, P2P OLAP, dimension integration
Flash memory is a non-volatitle memory that offers several superior advantages as a data storage device in many electronic gadgets. However its two operational characteristics, namely 1) Out-place updating and 2) Cleaning process will affect its performance as an efficient storage sub-system if not managed wisely. This paper proposes a new block cleaning scheme, called Greedy and Frequency-based (GR-FB). The scheme combines the victim block selection procedure and the valid-data re-organizing...
Topics: flash memory, cleaning process, wear-leveling, frequency, simulation, data
This is a simple algorithm which is based on number theory system and file differential technique. It employs a technique which unlike other is independent of repetition and frequency of character.In the algorithm original file is broken into some small files using differential techniques and then every small file is considered as certain n-base number system where n is the number of different characters in the file. Now the compression is done converting this nbase number system to binary...
Topics: Number system, Bit saving, Differential technique.
Variable Frequency Transformer (VFT) is a controllable bi-directional transmission device that can transfer power between asynchronous networks. It avoids both HVDC link and FACTS based power transmission control system. Basically, it is a rotatory transformer whose torque is adjusted in order to control the power flow. In this paper, a simulated model of VFT is used as a controllable bidirectional power transmission device that can control power flow through the connected asynchronous power...
Topics: Variable frequency transformer (VFT), MATLAB, Asynchronous power systems, Power flow.
The Elmore delay is fast becoming ineffective for deep submicron technologies, and reduced order transfer function delays are impractical for use as early-phase design metrics or as design optimization cost functions. This paper describes an accurate approach for fitting moments of the impulse response to probability density functions so that delay and slew metric can be estimated accurately at an early physical design stage. PERI (Probability distribution function Extension for Ramp Inputs)...
Topics: Moment Matching, Delay Calculation, Slew Calculation, Inverse Gamma Distribution, VLSI.
Kochi, the commercial capital of Kerala and the second most important city next to Mumbai on the Western coast of India, is a land having a wide variety of residential environments. The present pattern of the city can be classified as that of haphazard growth with typical problems characteristics of unplanned urban development. This trend can be ascribed to rapid population growth, our changing lifestyles, food habits, and change in living standards, institutional weaknesses, improper choice of...
Topics: Ecological Footprint Analysis, Environmental Management, Kochi City
Kerala, God’s own country is blessed with immense natural resources. It’s high time that the state’s natural resources being utilized effectively. While sustainable development is the need of the hour, we have to take lead in initiating activities that would minimize the exploitation of our natural resources resulting in their effective utilization. This paper narrates an overview of innovative building materials especially using natural fibres available in Kerala and discusses the...
Topics: coir, straw, pineapple leaf fibre, off-white rice husk, cotton fibre, tapioca stalk
The high spectral efficiency or high user data rates from multiuser diversity scheme using MIMO systems with antenna selection and MRC reception is very important development for modern cellular communications. Usually in a service area of such system, the channel type is assumed to remain constant, and in a Rayleigh fading environment such systems are found to provide the highest data rate to a scheduled user. In a service area using multiuser diversity MIMO technology, the users at different...
Topics: Multiuser MIMO, Spectral efficiency, Absolute SNR scheduling, Normalized SNR scheduling.
Modern embedded systems are built around the soft core processors implemented on FPGA. The FPGAs being capable of implementing custom hardware blocks giving the advantage of ASICs, and allowing the implementation of processor platform are resulting in powerful Configurablesystem on chip(C-SoC)platforms. The Microchip’s PIC microcontroller is very widely used microcontroller architecture across various embedded systems. The implementation of such core on FPGA is very much useful in CSOC based...
Topics: CPU, RISC, IP Core, IC, MXE, Xilix.
Damping of power system oscillations with the help of proposed optimal Proportional Integral Derivative Power System Stabilizer (PID-PSS) and Static Var Compensator (SVC)-based controllers are thoroughly investigated in this paper. This study presents robust tuning of PID-PSS and SVC-based controllers using Genetic Algorithms (GA) in multi machine power systems by considering detailed model of the generators (model 1.1). The effectiveness of FACTSbased controllers in general and SVC-based...
Topics: Controllability, Genetic algorithms, Observability, Power system modeling, Static VAr compensators.
Fingerprint Identification is a widely used Biometric Identification mechanism. Up till now different techniques have been proposed for having satisfactory Fingerprint Identification. The widely used minutiae-based representation did not utilize a significant component of the rich discriminatory information available in the fingerprints. Local ridge structures could not be completely characterized by minutiae. The proposed filter-based algorithm uses a bank of Gabor filters to capture both...
Topics: Core Point, Euclidean Distance, Fingerprints, Feature Vector, Finger Code, Gabor Filter-bank
Research in the segmentation of medical images will strive towards improving the accuracy, precision, and computational speed of segmentation methods, as well as reducing the amount of manual interaction. Accuracy and precision can be improved by incorporating prior information from atlases and by combining discrete and continuous-based segmentation methods. The medical images consists a general framework to segment curvilinear 2D objects The proposed method based on Watershed algorithm is...
Topics: medical images, marker controlled watershed transform, markov random fields, digital mammograms...
Sensors and actuators are critical components of several embedded systems (ES) and can trigger the incidence of catastrophic events [1-3]. Sensor and actuator faults detection is difficult [2, 3] and impacts critically the system performance. While integrating sensors and actuators with the rest of (sub) system, there is a need to identify all failure modes and rectify them. Several researchers have addressed software integration issues [6, 7]; however sensors and actuators integration issues...
Topics: Sensor and actuator fault model, manifestation of faults communicating FSM, sensor/ actuator...
Face recognition is still an open problem. Many 2D face recognition approaches came into light to achieve high recognition rate. But these approaches are still challenged by the changes in illuminations, expressions, pose, noise, etc. A 3D face recognition technique is proposed to overcome such challenges and to enhance robustness to expression variations. Here, we compare the person at different age groups with higher recognition rate in comparison to 2D face recognition techniques. We propose...
Topics: speeded up robust features, fisher linear discriminant, depth image, principal component analysis
This paper gives an overview and analyzes the different existing anti spamming techniques both content based, non content based methods and a combination of the duo. It also suggests that a small change in one of the parameters in the fuzzy string matching method could be useful to produce better results.
Topics: email, spam, computer forensics, fuzzy string match
CBIR operates on a totally different principle from keyword indexing. Primitive features characterizing image content, such as color, texture, and shape are computed for both stored and query images, and used to identify the images most closely matching the query. There have been many approaches to decide and extract the features of images in the database. Towards this goal we propose a technique by which the color content of images is automatically extracted to form a class of meta-data that...
Topics: CBIR, Histogram Bins, Standard deviation, Variance, Precision, Recall.
Protecting sensitive information of an Autonomous System (AS) is a critical issues. False origin with IP source address spoofing is a major threat for AS which causes serious attacks like insider attack, DDoS, unauthorized access of intellectuals and many more. Intra domain IP source address spoofing is still a challenge for security experts due to less secure router architecture and unavailability of perfect solution. In this paper, we aim to modify current LAN communication technology in...
Topics: IP spoofing, Replay Attack, DDoS Attack, Autonomous System
In this work, the analysis and simulation work is proposed for the low-power (reduced subthreshold leakage) and high performance SRAM bit-cells for mobile multimedia applications in deep-sub-micron (DSM) CMOS technology. The sub-threshold leakage analysis of the P3 SRAM cell has been carried out. It has been observed that due to pMOS stacking and full supply body-biasing, there is a reduction of 70% and 86% in sub-threshold leakage current at VDD=0.8V and VDD=0.7V respectively as compared to...
Topics: Sub-threshold Leakage, Standby Power, Stacking, Conventional SRAM cell, PP-SRAM, P3-SRAM
Human eyes are the best evaluation model for assessing the image quality as they are the ultimate receivers in numerous image processing applications. Mean squared error (MSE) and peak signal-to-noise ratio (PSNR) are the two most common full-reference measures for objective assessment of the image quality. These are well known for their computational simplicity and applicability for optimization purposes, but somehow fail to correlate with the Human Visual System (HVS) characteristics. In this...
Topics: PSNR, HVS, RGB color model, Quality Measure (Q), Subjective Evaluation, DMOS.
Cryptographic VLSI chip has a significant role to resist the attacks which is the growing customer concern of hardware security. Redundancy introduces a great amount of randomness & non linearity in any kind circuitry (combinational or sequential). We introduce a new type of redundancy in sequential circuits to make redundant scan registers that are indistinguishable with the original scan registers. They are sequentially undetectable as well as redundant, which makes it highly secured. The...
Topics: Functional equivalence, Isomorphic redundancy, RScR
Electrically controlled frequency reconfigurable comb type antenna is presented in this paper. Reconfigurability is achieved by placing a PIN diode in each slot of the comb type antenna. The proposed antenna has very compact size and works on 8 different bands depending upon the state and number of PIN diode (ON/OFF). Ansoft Designer 7 is used to simulate the equivalent model for the PIN diode and proposed antenna is fabricated on FR4 substrate using photolithography process. As the antenna...
Topics: PIN diode, frequency reconfigurable, Micro strip patch antenna, comb type antenna, multi band...