|
ARPN Journal of Engineering and
Applied Sciences July 2015 | Vol. 10 No.
12 |
|
|
Title: |
Analysis
and implementation of OFDM system and channel estimation based IEEE
802.11A |
Author (s): |
S. K. Mydhili and
A. Rajeswari |
Abstract: |
Channel estimation plays a very important role in any
wireless communication system. Currently many related algorithms are a
research hotpot. Basically channel estimation are classified into two
types namely, pilot-based channel estimation and blind channel
estimation. Pilot-based channel estimation estimates the channel
information by obtaining the impulse response from all sub-carriers of
pilot. The blind channel estimation uses statistical information of the
received signals whereas pilot-based channel estimation is a practical
and an effective method. This paper presents a pilot-based channel
estimation of OFDM system and analyzes the degradation effect of
pilot subcarriers in OFDM systems on time-domain based on the
estimation performance. The effects of Inter Symbol Interference (ISI)
are reduced by the splitting process. This splitting process also
decreases the rate of stream of data connected with distinct subcarriers.
The paper starts with basic realization principle of OFDM system and
analyzes OFDM in the frequency domain using spectral analysis method.
The simulation results are shown using Matlab which compares the bit
error rate (BER) performance of different modulation schemes and types
of pilot and finally concluded the importance of estimation based on the
achieved results based on IEEE802.11A. |
|
|
Full Text |
|
|
Title: |
Artificial pancreas based on model predictive control |
Author (s): |
R. Helen |
Abstract: |
Diabetes
is recognized as a group of heterogeneous disorders with the common
elements of high blood glucose concentration and glucose intolerance,
due to insulin deficiency and impaired effectiveness of insulin action.
The most common types of diabetes are diabetes mellitus type 1 and
diabetes mellitus type 2, which does not necessarily require insulin
injections. Type 2 constitutes about 85 to 95% of the approximately 246
million people worldwide with diabetes. The number of type 1 diabetics
is estimated to be 10 to 20 million worldwide. Type 1 diabetes occurs
when these beta cells are destroyed by the body's own immune system. So,
the model is to be developed to recover from diabetes by means of MPC
controller. This constrained robust control strategy is developed to
reduce risks of hypo- and hyperglycemias (low and high blood glucose
concentration). Here the role of controller is to regulate the blood
glucose level by giving insulin. Closed-loop performance is evaluated
through simulation studies of different controllers and it becomes human
friendly. |
|
|
Full Text |
|
|
Title: |
Enhancing security in medical image communication using
novel digital signature with various attacks |
Author (s): |
A. Umamageswari and
G.R. Suresh |
Abstract: |
Medical image content authentication is
very important, since medical image contents are more and more widely
distributed. Reversible watermarking becomes a promising technique to
embed the information into medical images. In this paper, we define the
Region of Interest (ROI) in an image and trying to embed data in Region
of Non Interest. When medical image shared through network, for the
compression purpose we proposed the JPEG2000 algorithm and to improve
the integrity and Authenticity hash value of the image is found by using
MD5 and encrypted using RSA to form the DS (Digital Signature). DS and
patient information is embedded into DICOM images. Strict authentication
can be achieved by providing high security in accessing the secured
medical images by medical experts which are available in the websites
using Kerberos technique. The proposed method has been tested against
various geometrical attacks to verity the robustness of the medical
image and it has yields the fruitful results. |
|
|
Full Text |
|
|
Title: |
Implementation fuzzy tuned artificial neural network controller for
chopper fed DC series motor using
a low cost microcontroller |
Author (s): |
I. Thangaraju, M. Muruganandam and M. Madheswaran |
Abstract: |
In this paper the
speed control of a DC series motor with Hybrid Fuzzy-Neuro Controller (FNC)
is presented. The motor is connected with a DC Chopper. This
configuration has been designed with current control and speed control
loops. The current controller blocks the PWM signal when the current
increases beyond its limit. The speed controller is based on Fuzzy-Neuro
type. The performances of FNC are analyzed in respect of load variation
and speed variation using MATLAB/Simulink. This system is implemented in
NXP 80C51 Microcontroller based Embedded System. From the result of
simulation and hardware implementation it is found that the FNC can have
better control compared with Fuzzy Logic Controller (FLC). |
|
|
Full Text |
|
|
Title: |
Prediction of scouring in the bridge pillar on intermittent river |
Author (s): |
M. Galib Ishak, Irianto Uno and Saparuddin |
Abstract: |
In the planning for bridge
pillar in the river, things that need to be considered are the
stability and strength of pillar. Other things that also should be
taken into consideration in planning is scouring that occur after the
bridge pillars exist. The objective of research is to predict scouring
in the river due to the influence of the pillars. This research was
conducted on the intermittent river in the eastern side of Palu Bay
in Central Sulawesi, Indonesia. In this area, there are eight rivers but
only four rivers have bridge with three spans, include Taipa River,
Labuan River, Lambara River and Toaya River, and all these rivers flow
toward Palu Bay. The method used in this research is by calculate and
directly measure the variables that affect on the scouring height, such
as catchment area, river slope, sediment diameter, rainfall, pillar
width, average velocity and height of flow. By taking into account the
effect of those variables, the results that are achieved in this
research are closer to the higher of scouring around pillars from
direct measurement in the research locations. This study is also
compared with those conducted by previous researchers, with the results
show that the closest result is the Carsten and Froehlich equation. |
|
|
Full Text |
|
|
Title: |
A robust line flow based WLAV state estimation technique for power
systems |
Author (s): |
Kalpanadevi M. and R. Neela |
Abstract: |
State Estimation techniques
are widely used to estimate the operating state of power systems in the
most reliable manner so that the estimated state variables reflect the
current system state faithfully and these studies enable the energy
management centre to operate the system in a secure manner under normal
as well as contingent conditions. Those algorithms which generate a
fairly good estimate in spite of the presence of bad measurements are
considered to be comparatively superior and WLAV based SE has been
widely accepted as one such technique whose output is almost immune to
the existence of bad measurements. In this paper, a new line flow based
WLAV state estimation (WLAV-LFBSE) technique for power systems using
line flows and bus voltage magnitudes as state variables has been
suggested. A constant, line flow based Jacobean matrix has been arrived
at through suitable manipulation of network equations and this technique
generates an output which are in terms of quantities of real concern
namely line flows and bus voltage magnitudes. As these quantities
undergo wide variations due to load changes, it becomes essential to
study the performance of the algorithm under varying loads. The proposed
method has been tested on standard test systems taking into account
these load variations and the results are analysed. |
|
|
Full Text |
|
|
Title: |
Risk analysis for performance based contracting on the road construction
work |
Author (s): |
Benny Mochtar, Herman Parung,
Johanes Patanduk and Nur Ali |
Abstract: |
Indonesian government has
adopted a model of performance based contracting (PBC) as a solution for
handling the road issues. The PBC model is an integrated contract form
of design, construction and maintenance processes that using lump sum
payment system. The PBC is applied to establish a condition that
encourages contractors as providers of construction services to be able
to properly manage risk, where during the time, the risk that caused by
poor quality work of service providers has been always be a risk of
project owners. But in the PBC, this risk will be under contractors’
responsibility. The purpose of this study is to identify and analyze
risks that occur and its influence on the PBC project performance. The
study was conducted using the survey method where questionnaire as data
collection instruments were distributed to the parties involved in the
PBC projects in Indonesia, either the contractors or the owners. The
data were then processed using factor analysis, regression analysis and
path analysis to obtain structural equation relationship between risk
and performance of the PBC project. The result shows that from of the 15
most important risks that highly influence on the PBC performance, most
of them were borne by the contractor. |
|
|
Full Text |
|
|
Title: |
Study on the implementation of framework agreement construction based on
risk |
Author (s): |
Habir, Herman
Parung, Muh. Ramli Rahim and Dan Muhammad Amri |
Abstract: |
The contract is an important
aspect that is crucial in the implementation of construction projects.
Framework agreement is one of the model contracts that are still limited
implementation in the construction world in Indonesia. This study aims
to assess the application of Framework agreement in the construction
field, especially from the aspect of risk; it starts from identification
to the risk allocation of the aspect of construction contracts. The
research is done in the form of a survey by capturing the opinions or
perceptions, experiences, and attitudes of respondents consisted of
contracting, procurement, vendor, and the project owner. From the
results of the study note that the most influential risk level is
variable Fossil (X8), Testing (X9), Termination of
employment (X16), Delay Testing (X18),
handover of some of the work ((X20), Procedure variation (X28),
the Right Contractor to Halt Work (X33), the risk of service
users (X36), the consequences of the risk of service users (X37)
and exemption from the obligation to force majeure (X44). |
|
|
Full Text |
|
|
Title: |
On chip communication architecture power estimation in high frequency
high power model |
Author (s): |
Khalid B. Suliman,
Rashid A. Saeed and Raed A. Alsaqour |
Abstract: |
System-on-Chip (SoC) on chip
communication architecture solved the problem of how to interconnect
hundreds of processing element (PE) and storage element (SE) inside one
chip, but in the other hand it introduced power consumption hindrance in
the communication elements such as bridges, bus wire, bus interface and
arbiters to the overall power usage in the chip. Various power
estimation techniques was introduced mostly focusing only on the power
consumed in parts of the SoC communication architecture, like the global
bus interconnect or the bus wire those techniques only tackles part of
the overall consumed power. This paper proposes a system level power
consumption estimation model for SoC for all of the communication
elements with high frequency effects and system communication activity
consideration. |
|
|
Full Text |
|
|
Title: |
Power factor improvement and harmonic compensation using
ANN based shunt
hybrid filter for active load |
Author (s): |
R. Sriranjani and S.
Jayalalitha |
Abstract: |
In this paper the power
factor improvement and harmonics compensation for active load is
acquired by the Shunt Hybrid filter (SHF). Dominant harmonic current are
infused by the passive filter and the hysteresis controlled shunt active
filter infuses other than dominant harmonic currents and the fundamental
reactive current. Supply current detection method for controlling the
active filter using Artificial Neural Network (ANN) updates the weight
by least mean square (LMS) algorithm, determines the reference signal
for the hysteresis controller. By trial and error, the learning rate is
fixed. The dynamic response of the shunt active filter for active load
is studied using MATLAB Simulink and the results are verified. |
|
|
Full Text |
|
|
Title: |
Encoding scheme for crosstalk minimization |
Author (s): |
P. Stephi and V. Vijaya
Kumar |
Abstract: |
Crosstalk in on-chip buses
ends up in serious issues relating delay and power dissipation.
Many encoding techniques were
proposed to avoid crosstalk step-down. Fibonacci based coding reduces
the amount of transitions within the code words and therefore moves
itself closed to an entire resolution for crosstalk step-down. The crosstalk impact may be
a consequence of coupling and switching activities that’s encountered
once there is a transition as compared to previous state of wire and
once there are transitions in adjacent wires. There are many strategies
for the reduction of power dissipation, crosstalk and delay. This paper proposes encoding theme to realize the crosstalk.
This coding technique is enforced mistreatment VHDL. This proposed
algorithmic program is cut back the crosstalk and delay. |
|
|
Full Text |
|
|
Title: |
Performance analysis of artificial neural network using leakage power
reduction techniques for DSP applications |
Author (s): |
K. Gopika Rani, S.J.
Jesanthe, N. Mathan and A. Nandhini |
Abstract: |
The statistics regarding the
functionality of the brain was acquired tremendously. This leads to the
birth of new technology called neural networks. A vast amount of
information was processed in a human brain with the help of neurons. The
interconnection between the neurons and the parallelism helps the brain
to do the functions in few hundred milliseconds. The neural networks
were able to solve the complex tasks. Unlike the traditional method, no
explicit algorithm is required. In this paper, modified clocked CMOS D
Flip Flop is taken and its parameters are analyzed for better
performance by applying low power techniques. Then it is applied in the
Artificial Neural Network (ANN) to provide a improved way for computing
mathematical functions. It concludes that all the low power techniques
reduce the leakage power comparatively. This resultant ANN architecture
can be applied for low power digital applications. |
|
|
Full Text |
|
|
Title: |
The use of additional devices for reducing the deformation of the bus
body when tipping |
Author (s): |
Kalmikov B. Y.,
Visotski I. Y., Ovchinnikov N. A., Petriashvili
I. M. and Kalmikova Y. B. |
Abstract: |
The article is devoted to the solution of practical problems in the
sphere of buses passive safety. Particularly, the methods of reducing
bus body deformation when tipping due to reducing the height of fall of
centre of gravity are worked out. The dependence of the distribution of
impact energy for every stand of the left side of the bus body of LiAZ -
5256 from the length of sliding part of the piston rod device to prevent
tipping is identified and investigated. The dependence of the
displacement of every left cheek of bus body of LiAZ - 5256 from the
length of retractable stem of suggested device is determined. The
realized studies prove that devices like that the authors of the article
offered are able to reduce the deformation of the pillars of the bus
when while tipping. Thus, the greater is the length of the stroke of the
device, the smaller is the amount of pillars movement in the direction
of the residual space of the passenger compartment of the bus. |
|
|
Full Text |
|
|
Title: |
Graphically enhanced visual concealment of large objects
|
Author (s): |
Leonardo Frizziero, Luca
Piancastelli and Tiziano Bombardi |
Abstract: |
Inexpensive, flicker free, flat, large, extremely bright LCD panels can
be effectively used to conceal very large objects both stationary and
moving. CCDC (Charge Coupled Device Camera) may capture the surrounding
environment and reproduce it on the LCD screens. LCDs may easily be
installed on the surface of the objects. It is also possible to use the
video cards of personal computers and laptops to digitally process the
image captured with the CCDS and obtain patterns to disguise the real
appearance of the object or the way it is moving. The visual CCD
(Camouflage, Concealment, and Deception) system so obtained is extremely
effective. In this paper, it is demonstrated that the digital image
processing techniques necessary to obtain a successful concealment are
elementary and already embedded in the hardware of video card for real
time image processing. It is also possible to superimpose patterns at
defined frequencies that will obscure the image to the human observer
especially in case of use of magnifying optics. The CCD effect in the
visual and ultralight field is extremely effective. An example of active
CCD of the Ariete MBT (Main Battle Tank) is shown in this paper. |
|
|
Full Text |
|
|
Title: |
Design of new combined antenna for dual polarization using crossed
dipole at 2.23 GHZ and 5 GHZ |
Author (s): |
Zeyneb Berkat and
Noureddine Boukli Hacene |
Abstract: |
This paper discusses design
of new compact dual polarized antenna for wireless communication
systems, dual band for 2.23 GHz and 5.14 GHz, the polarization diversity
becomes one of the most important techniques than can be used, the main
reason for this shift is that the method does not require any extra
bandwidth or physical separations between the antennas, the final
design Consists of a rectangular patch with notches combined by a
crossed dipole in the same Ground and substrate, by optimized of this
new structure, the two polarizations in the required band are obtained.
The stable peak gain, omnidirectional radiation patterns are also
achieved. Due to its good performance, through simulation by CST
Microwave. |
|
|
Full Text |
|
|
Title: |
A multiple access scheduling for energy efficiency in wireless sensor
networks |
Author (s): |
S. Bharathidasan
and P. Ramamoorthy |
Abstract: |
Energy efficiency is a major issue
in Wireless Sensor Networks. Due to path failure, sensor nodes consume
high energy. So, the
performance of the networks is totally degraded. To overcome this issue,
we proposed Multiple Access Scheduling (MAS). It attains both throughput
and network connectivity while keeping the nodes moving in dynamic
manner. The scheme consists of 4 phases. In fist phase, we proposed
multipath routing to provide load balancing to improve the throughput.
In second phase, the CDMA based scheduling algorithm is proposed. Here
the sensor nodes are assigned with the constant code words and different
time slots. In third phase, energy consumption model of sensor nodes is
proposed. In fourth phase, new packet format of proposed scheme is
introduced. It consists of scheduling status and connectivity status.
By using the extensive simulation results using the discrete event
simulator, the proposed MAS achieves higher packet delivery ratio,
connectivity ratio, less overhead and delay than the existing scheme
like NMRA, SBYaoGG and AFTMR. |
|
|
Full Text |
|
|
Title: |
First order chemical reaction effects on a parabolic flow past an
infinite vertical plate with variable temperature and mass diffusion in
the presence of thermal radiation |
Author (s): |
R. Muthucumaraswamy
and P. Sivakumar |
Abstract: |
An analysis is
performed to study the effect on a parabolic flow past an infinite
vertical plate with variable temperature and mass diffusion in the
presence of thermal radiation. Closed form analytic solutions are
obtained for temperature, concentration, velocity by Laplace Transform
technique and presented graphically for different values of physical
parameters. The effects of various parameters on flow variables are
illustrated graphically and the physical aspects of the problem are
discussed. |
|
|
Full Text |
|
|
Title: |
Storage optimization of VOD systems by system coding comparable
substance dissemination and narrow casting |
Author (s): |
R. Aroul Canessane,
Vanitha Renganathan and R. Dhanalakshmi |
Abstract: |
Video on-Demand (VOD)
framework concentrate all the more on patch-up administrations
architectures and advancing overlays yet don't suspiciously accept the
utilizer exercises and the profit of prefetching systems. Subsequently,
they can not better help; we propose a system coding comparable
substance conveyance plan to proficiently handle intuitive VOD
operations in shared systems. In system coding comparable substance
dissemination (SCCSD), features are separated into sections that are
encoded into free squares. These pieces are appropriated to distinctive
companions for neighbourhood stockpiling. By mining relationship inside
every feature, the fragments asked for in interactivities are
anticipated taking into account the data amassed through tattles. By
using half and half reserving procedure, a community oriented
prefetching plan is intended to upgrade asset conveyance among
neighbouring companions. A beginning spilling calculation intended to
join irregular system coding with a randomized changed push calculation. |
|
|
Full Text |
|
|
Title: |
Determination of reservoir drainage area for constant-pressure systems
by conventional
transient pressure analysis |
Author (s): |
Freddy Humberto Escobar,
Mashhad Fahes, Rafael Gonzalez, Diego Mauricio
Pinchao and Yu Long Zhao |
Abstract: |
The
conventional straight-line method of transient pressure analysis implies
drawing a straight line whose slope and intercept are used for parameter
estimation, i.e., the slope and intercept of the semilog plot will lead
to the estimation of permeability and mechanical skin factor
respectively. For closed systems, the slope on a Cartesian plot of the
late pseudosteady-state region allows estimation of the drainage area.
For constant-boundary systems, the slope is zero, and as a result the
drainage area would be estimated to have an infinite value. Because of
this situation, a new way of using conventional analysis ought to be
applied, and this constitutes the sole purpose of this work. By drawing
a horizontal line at which the steady-state period takes place and
observing the time at which this regime starts, it is possible to find
the drainage area. Contrary to closed systems, for constant-pressure
boundary the reservoir geometry affects the starting time of
steady-state period, consequently, separate solutions must be provided
according to the well position and reservoir geometry. Although, one
equation was formulated, six different constants are provided that have
specific application depending upon well location and reservoir
geometry. The proposed equation was verified with synthetic and field
examples. |
|
|
Full Text |
|
|
Title: |
Mechanical characteristics of hotmix cold laid containing
Buton granular
asphat (BGA) and
flux oil as wearing course |
Author (s): |
Budiamin Tjaronge M.W,
Sumarni Hamid Aly and Rudy Djamaluddin |
Abstract: |
Buton granular asphalt (BGA)
is produced from natural rock asphalt that deposited in South Buton
Island, Southeast Sulawesi in Indonesia. The national and regional road
infrastructure development sustainability can be empowering by
utilization of BGA as pavement material. Ordinary asphalt mixture (hotmix
asphalt and hot rolled asphalt) need to be heated to construct.
Technical obstacles exist, as asphalt mixing plant is required for the
hotmix production and hot rolled asphalt (HRA) construction at the
distance and remote areas. The employment of hotmix cold laid mixture
containing Buton granular asphalt is one solution to substitute hot
rolled asphalt application in the remote and distance areas. The
experimental results show that the bitumen within BGA and flux oil
governs the Marshall Parameters and compaction ability of mixture. At
7.8% bitumen content within BGA (30, 62% by weight of BGA content in the
mixture equivalent), no significant differences on VIM, VMA stability,
flow, VFB and indirect tensile strength were observed when the storing
and compaction time were extended from 3 to 7 days. |
|
|
Full Text |
|
|
Title: |
Analysis of homomorphic crypto systems |
Author (s): |
K. Brindha and S. Sudha |
Abstract: |
Homomorphic encryption
technique does some changes manipulation to be done on the encrypted
data without decrypting the encrypted data. The decryption of encrypted
data is the same as if some changes done on the original data. There are
some partial homomorphic encryption schemes used for some practical
applications like electronic voting, e-cashing, multiparty computation
and secret sharing etc., but they allow only certain specific
computation on encrypted text. We describe how refreshing cipher text
and Squashed decryption to play role on arbitrary computation on
encrypted text in the fully homomorphic crypto system. In this paper
based on the strengths and weaknesses of the existing homomorphic system
we are doing the comparison of it. |
|
|
Full Text |
|
|
Title: |
Congestion management in open access electric network using adaptive
real coded biogeography-based optimization |
Author (s): |
A. Ramesh Kumar
and L. Premalatha |
Abstract: |
Open access electric network
faces severe congestions due to the increasing demand for power,
multiple transactions in the transmission line and outage of network
equipment, causing uncertainty and affecting the system security. In
this article, different operating states are considered for congestion
management in an electric power network. An effective algorithm to
reschedule the generating units is implemented for relieving congestion
as well as maintaining optimal settings of electrical parameters in the
network. The main objective of our algorithm is to minimize rescheduling
of power using generator sensitivity factor method and hence minimize
congestion cost through the adjustment of generator price bids submitted
by independent power producers. The proposed algorithm has been
validated on IEEE 30-bus, IEEE 57-bus and IEEE 118-bus systems. |
|
|
Full Text |
|
|
Title: |
Optimizing mapreduce functionality in big data using cache manager |
Author (s): |
Devi. L and S. Gowri |
Abstract: |
The Map Reduce framework generates a large amount of intermediate data.
These data thrown away after the tasks finish. Map Reduce is unable to
utilize these data. To improve the efficiency of Map Reduce functionality
by reducing repeated jobs in data nodes, we develop cache management
system inside the Map Reduce framework. In which, tasks submit their
intermediate results to the cache manager. Before executing the actual
computing work, task queries the cache manager. In a Data Aware cache,
cache request and cache reply mechanisms are designed. Implementing
Cache by extending Hadoop, it improves the completion time of Map Reduce
jobs. It detects the occurrence of repeated job in the incremental data
process. Also, stops the repeated work and minimize the processing time
so that to provide the optimized usage of Map Reduce nodes. |
|
|
Full Text |
|
|
Title: |
Diversified optimization
techniques for routing protocols in mobile ad-hoc wireless networks |
Author (s): |
K. Devarajan and V.
Padmathilagam |
Abstract: |
Mobile Ad-hoc Network (MANET) is a wireless network without having a
fixed infrastructure. The lack of infrastructure introduces various
constraints on Ad-hoc networks. The selection of routing protocol is a
big challenge in Ad-hoc network because of its dynamic behaviour. This
work mainly focus to analyze the performance of hybrid (Zone Routing
Protocol) routing protocol which combines the best features of proactive
(Optimized Link State Routing) and Reactive (Ad-hoc On-demand Distance
Vector) routing protocols using different performance metrics like
Throughput, End-to- End Delay, Packet Delivery Ratio, Power Consumption
and Packet loss ratio. In this work, Genetic Algorithm and Ant Colony
Optimization technique is proposed to improve the performance of MANETs. |
|
|
Full Text |
|
|
Title: |
Determining transportation industrial metrics using random process
theory and analytical hierarchy process |
Author (s): |
K.R. Sekar, B. Padmakrishna,
Ravi Thej Neeli and T.C. Srinivasan |
Abstract: |
Transportation is one of the
inevitable and in-disposable shipment facilities for the huge number of
people in our world. In our day to day life plenty number of segmented
people use their own conveyance for any type of shipment. In our study
we used to find which type of shipment is economical and also convenient
for the lower and middle class people. For that here we identified three
of mass transportation method much be appreciated for the people in huge
mass. The three types of public transportation means are Metrorail,
Monorail and Bus Rapid Transport System (BRTS). In this paper we took
19 cities into account for the above said transportation. Our aim is to
find which mode of transportation is economical and viable in the cities
for the people, to obtain a conclusion we identified ten attributes for
measuring the mode of public transportation. From the plenty number of
websites data has been taken for the respective attributes for 19 cities
the semantic table and the tuples available are vital for our
observation and identification. Here we employed two methodologies in
terms with the Random Process Theory (RTP) and Analytical Hierarchy
Process (AHP) which is ever been used in this segment and I rightly say
this is the first time we proposed such a type of a phenomenal
methodology for the past one and half decades in this field of public
transportation. |
|
|
Full Text |
|
|
Title: |
The thermal management system of laser diode: A review |
Author (s): |
Rasheed Nema Abed |
Abstract: |
This study is focused to
review the recent advancements of laser diode and its temperature
control mechanisms that include thermoelectric cooler, spray cooling
methods, micro-channels and micro heat-pipes. These cooling methods are
significant to make laser diode in compact size, light weight with more
reliability. Moreover, these cooling systems can eliminate moving parts
in laser diodes which can be powered by direct current and easy in
switching. Furthermore, this study is focused to describe the
challenges involved in the studied cooling methods of the laser diode
and also illustrates the heat transfer coefficients and temperature
control variables in different studied cooling methods of the laser
diodes from literature. The proposed review illustrates the recent
developments, advantages and limitations of different cooling methods of
the laser diodes found in literature, and the provided review can be
significant for future development of the cooling methods in future.
|
|
|
Full Text |
|
|
Title: |
Thermal noise as electromagnetic polutan in wireless communication
system |
Author (s): |
Endah Budi P, RochmanAnanda
A.S and Rudy Yuwono |
Abstract: |
In wireless communication
system thermal noise is one of the noise that detected at the receiver.
Thermal noise (Johnson Noise) exists in all resistors and results from
the thermal agitation of free electrons therein by the temperature. This
paper starts with a introduction on how temperature appears on the
receiver and thermal noise on the receiver. The major contribution factor
to thermal noise power and RMS voltage is also discussed analytically.
The CDMA modem is used as a subject to study thermal noise in wireless
communication system. |
|
|
Full Text |
|
|
Title: |
A novelty approach on Tamil spam text extraction by using texton
template based support vector machine and LP boosting classifier |
Author (s): |
Pandian A. and
Mohamed Abdul Karim |
Abstract: |
In this proposed method, the
Tamil language texts are analyzed through the Morris-Pratt Algorithm as
input image that filtered with Gabor filter for edge analysis. Then, it
converted into unique strings from the text blocks. The text strings
consist of text stroke to analyze the pattern. By using wavelet
transform, the features of pattern are extracted and it undergoes for
mapping with the texton patterns. It reduces the multiple dimensional
signature patterns into reduced level. It then compared with the various
image transformation methods such as DST (Discrete Shearlet Transform,
DWT (Discrete Wavelet Transform and DCT (Discrete Cosine Transform that
trained feature based on hybrid of SVM with Linear predictive boosting (LPboosting)
algorithm. The effectiveness of the result is cross validated through
confusion matrix and the result shows the proposed classifiers is more
accurately predicts the tested Tamil text strings with reduced
misclassification levels. |
|
|
Full Text |
|
|
Title: |
Assessment of equal and unequal amplitude carriers for a single phase
five level diode clamped inverter |
Author (s): |
Sureshpandiarajan P., Natarajan S.P.,
Balamurugan C.R. and Shanthi B. |
Abstract: |
This work presents the
comparison of various Pulse Width Modulation (PWM) techniques for the
chosen single phase half bridge DCMLI (Diode Clamped Multi Level
Inverter). In this paper, a single phase half bridge diode clamped
multilevel inverter is simulated with sinusoidal, THI (Third Harmonic
Injection), Trapezoidal, TAR (Trapezoidal Amalgamated Reference) and
Stepped Wave reference with Equal Amplitude Carriers (EAC) and UEAC (Un
Equal Amplitude Carriers). The proposed EAC and UEAC is applied for
various PWM strategies like PD (Phase Disposition) PWM, POD (Phase
Opposition and Disposition) PWM, APOD (Alternative Phase Opposition and
Disposition) PWM, CO (Carrier Overlapping) PWM, PS (Phase Shift) PWM and
VF (Variable Frequency) PWM with EAC and UEAC. For all the PWM methods
and references the UEAC produces less THD and higher fundamental RMS
(Root Mean Square) values except for ma =1. For ma
=1 the EAC provides less THD (Total Harmonic Distortion) and higher
fundamental RMS (Root Mean Square) values for all the PWM methods and
references. The simulations are carried out through Power System Block
Set/MATLAB/SIMULINK. |
|
|
Full Text |
|
|
Title: |
Securing AODV protocol from selfish node attack |
Author (s): |
Mani Bharathi, Ranjith
Sairam, S. Sundar and C.M. Vidhyapathy |
Abstract: |
Mobile ad-hoc networks are
self-configuring wireless networks without any specific infrastructure.
MANETs are highly subjected to several attacks due to continuously
changing network topology, lack of central monitoring and lack of
efficient defence mechanism. Selfish nodes in MANETs are the defective
nodes which drop the packets that are not intended to them. A malicious
selfish node is introduced in the network to analyze the selfish node
attack and a prevention algorithm for selfish node attack is also
suggested. For the analysis, the routing protocol used in this paper is
AODV. Network parameters meters like throughput, end to end delay and
load are evaluated and compared. Simulation tool used in this paper is
Riverbed Modeler. |
|
|
Full Text |
|
|
Title: |
An interleaved high gain boost converter with SVM inverter for a motor
load using PV panels |
Author (s): |
P. Deepak and A. Ramesh babu |
Abstract: |
The Interleaved High voltage
gain boost converter along with SVM inverter is proposed to power
induction motor using PV panels. The high voltage gain of interleaved
boost converter is obtained through asymmetrical PWM, voltage lift
capacitor. The ILBC reduces the voltage stress of main switch and reduce
the input current ripple. The output of PV panel is fed to the input
of ILBC. The boost converter output voltage is supplied to SVM inverter,
which provides the power to induction motor. The SVM inverter provides
the increased fundamental output voltage; reduce the harmonic content
and Torque. Simulation was carried out using MATLAB/simulink
environment. The comparison of SVM inverter and PWM inverter was made to
validate the proposed converter. |
|
|
Full Text |
|
|
Title: |
Generalizing convolutional neural networks for pattern recognition tasks |
Author (s): |
A. R. Syafeeza,
M. Khalil-Hani, H. Imran, M. M. Ibrahim
and Y. C. Wong |
Abstract: |
Convolutional Neural
Network (CNN) promises automatic learning and less effort for
hand-design heuristics in building an efficient pattern recognition
system. It requires simple and minimal pre-processing stages for data
preparation. These features enable CNN architecture to be applied to
various pattern recognition applications. This paper proposes a
four-layered CNN architecture that caters to face recognition and
finger-vein biometric identification case studies. The methodology
applied in designing the network is discussed in detail. For face
recognition, the design is evaluated on three facial image databases
with different levels of complexities. These databases are AT and T, AR
Purdue, and FERET. The same four-layered CNN architecture is also tuned
for finger-vein biometric identification problems. The design
performance is evaluated on finger-vein biometric database developed
in-house, consisting of 81 subjects. The results obtained from these
case studies are promising. For face recognition applications, 100%,
99.5%, and 85.16% accuracies were obtained for AT&T, AR Purdue, and
FERET, respectively. On the other hand, the result obtained from the
finger-vein biometric identification case study has 99.38% accuracy. The
results have shown that the proposed design is feasible for any pattern
recognition problem. |
|
|
Full Text |
|
|
Title: |
Investigation and evaluation of the solar air collector model to support
the solar vortex engine |
Author (s): |
Ayad T. Mustafa, Hussain H.
Al-Kayiem and Syed Ihtsham U. Gilani |
Abstract: |
In this study, mathematical and experimental models were implemented for
circular solar air collector. Modeling
methodology with conservation equations of continuity, momentum and
energy were presented, and model solution is obtained by utilizing a
developed code in MATLAB program. An experimental model of concentric
circles with outer and inner diameters of 8.8 m and 1.0, respectively,
was designed and fabricated in order to perform measurements for the
thermal and flow processes in the system. The canopy was inclined by 8.5o.
The results showed that, at same solar irradiation, the temperatures of
air flow, canopy and ground are increasing by decreasing the radius.
When the canopy slope increases, air flow temperature decreases and
canopy temperature increases for a constant solar radiation. When the
solar radiation increases, air flow, canopy and ground temperatures
increases for the same collector radius. The validations of the model
predictive and therefore comparisons with results of experimental model
of this study and Manzanares prototype data have been done. The model
results agree with the experimental results. Further investigations are
recommended after installation of the vortex generation engine where the
residence time of the air particles will be changed, and consequently
the air stream temperature and velocity are expected to change, as well. |
|
|
Full Text |
|
|
Title: |
ADMK: An ad hoc component for aspect and domain based mobile ranking |
Author (s): |
N. Senthilselvan, K.R. Sekar
and P. Saravanan |
Abstract: |
In the present era, mobile phone is a huge
market, where day by day a new brand and lot of models of mobile phones
are releasing, among which choosing one best mobile is a tremendous
task. Where we take the problem of choosing a mobile phone by our
technique ADMK (Aspect and Domain based Mobile ranking). A variety of
Sources of information about the model of mobile phones being launched
in market are available, where some of the websites provide rich and
valuable knowledge for users and companies. But review of products can
be often fuzzy and confused. This can be effectively done by Aspect
determination from different text reviews available in the social media.
Firstly, it identify the aspects to be considered to rate the product.
Some of the aspects like Camera, RAM, Processor, and Memory are more
important than USB port, buttons, panel, design. Free text reviews are
extracted from the website using web Crawler. These reviews are
processed to find out the opinion of the user on each aspect. The
opinion of the customer on the important aspects will have great impact
on the overall rating of the product. So by finding the weight of the
aspect we will rank the aspects according to their influence on the
overall rating of the product. By considering the different parameters
like weight of the aspect, Classifier Rating will calculate the rating
more accurately. This will provide the users to by the truthful product
through online-shopping. |
|
|
Full Text |
|
|
Title: |
The Meredith ramjet: An efficient way to recover the heat wasted in
piston engine cooling |
Author (s): |
Luca Piancastelli
and Giampiero Donnici |
Abstract: |
Piston engines with power
up to 1000HP (735.5 kW) are becoming popular in the aeronautical field
for the high efficiency and the possibility to work with Diesel, jp4
and jp8 fuels up to altitudes up to 20,000m (65,000 ft). This paper
updates a secondary advantage of piston engines: the Meredith effect.
The Meredith duct is a ramjet powered by the heat wasted in cooling. In
this way the efficiency of the original piston engine that can be higher
than 50% which is the normal in common rail diesel engines. Even if the
efficiency of this ramjet is lower than 30%, an accurate Design of this
secondary engine can add a significant amount of thrust to the fan or
the propeller powered by the piston engine. This effect, well known
since the beginning of WWII, is being thoroughly analysed in this paper
with regard of the efficiency. Previous papers introduced and a new
radiator, with wing section tubes. As it will be seen the main design
variable for the Meredith ramjet it the air temperature increase. This
paper demonstrates that it is not convenient to increase this
temperature over 200°C for aircrafts flying at about 600km/h@6000m
(~330knots@20,000ft). The in-wing duct appears to be slightly better
than the in-fuselage or the in-nacelle ones. |
|
|
Full Text |
|
|
Title: |
Dynamic damping torsional vibrations in the transmission of rear-wheel
drive and all-wheel drive vehicles |
Author (s): |
Ryzhikov V.A., Sapronov Y.G.,
Gorin S.L., Astsaturov Y.G. |
Abstract: |
A new system of dynamic
absorption of vibrations in the vehicle’s transmission is observed in
this article. The proposed solution provides the absorption of torsional
vibrations near the resonance frequency. The basis of the kinematic
scheme is based on the principle of dynamic absorption of vibrations.
The design of the damping device of the angular type is observed. A
mathematical model of the transmission of the car with the damping
device and the results of computer modelling in MathCad are considered.
According to the results of the mathematical analysis of the results the
parameters of the damping device are determined. |
|
|
Full Text |
|
|
Title: |
Finite element analysis of unsteady MHD free convection flow past an
infinite vertical plate with Soret, Dufour, thermal radiation and heat
source |
Author (s): |
J. Anand Rao, P.
Ramesh Babu and R. Srinivasa Raju |
Abstract: |
A study has been carried out
to analyze the combined effects of Soret (thermal-diffusion) and Dufour
(diffusion-thermo) on an unsteady magnetohydrodynamic free convection
flow past an infinite vertical plate in a porous medium in presence of
thermal radiation and heat source. A uniform magnetic field acts
perpendicular to the porous surface. Energy equation takes into account
of viscous dissipation, thermal radiation and Dufour effects. The
governing differential equations are transformed into a set of
non-linear coupled partial differential equations and solved using
similarity analysis with numerical technique using appropriate boundary
conditions for various physical parameters. The dimensionless governing
equations are solved numerically using Galerkin finite element method.
Favourable comparisons with previously published work on various special
cases of the problem are obtained. The effects of various physical
parameters on the dimensionless velocity, temperature and concentration
profiles are presented graphically. In addition, the local values of the
Skin-friction coefficient, Nusselt number and Sherwood number are also
shown in tabular form. |
|
|
Full Text |
|
|
Title: |
Characterization of the naturally fractured reservoir parameters in
infinite-conductivity hydraulically- fractured vertical wells by
transient pressure analysis |
Author (s): |
Freddy Humberto Escobar,
Yu Long Zhao and Mashhad Fahes |
Abstract: |
It has become common to hydraulically fracture a naturally fractured
formation to increase the well’s production potential. Since the mass
transfer between fractured network and hydraulic fracture is much higher
than that from matrix to fractures, the hydraulic fracture-fracture
network interporosity flow parameter is much higher that that of
matrix-fracture network. As a result, the transition period behavior
from naturally fractured to homogeneous takes place before radial flow
regime during the early bilinear, linear or elliptical (birradial) flow
regimes. The purpose of this paper is to provide expressions by both
conventional analysis and TDS technique for characterizing the
naturally fractured parameters when the transition period interrupts the
response of an infinite-conductivity fracture. The developed expressions
for both methodologies were satisfactorily tested with simulated
examples. |
|
|
Full Text |
|
|
Title: |
Architectural design of 8 bit floating point multiplication unit |
Author (s): |
Usha. S
and
Vijaya Kumar. V |
Abstract: |
In the recent high speed
processor, floating point ALU (FP ALU) is one of the important units to
perform the arithmetic and logical functions of the floating point
number. Floating point multiplication is one of the arithmetic
operations that take more computational time and when implemented in
hardware, it requires more area due to the large number of component.
However the advantage of implementing the floating point unit in the
hardware system is to overcome the overflow and underflow conditions
that occur in the logical operation. This paper presents a high speed 8
bit multiplier. To increase the speed and to reduce the power
consumption due to the clock load, wave pipelining method has been used.
The coding is
written in VERILOG HDL and the design is analyzed in the Xilinx
environment. |
|
|
Full Text |
|
|
Title: |
Flame detection in videos using binarization |
Author (s): |
Apoorva Bansal, Srinivas Koppu, V Madhu Viswanatham and Sujatha R. |
Abstract: |
Detection of flame based on
computational vision has visible attention in the past years. Many
selective features such as shape, colour, texture, etc., have been used
to detect flames. The drawback to detect flames with these features are
that they uses Lucas-Kanade method which is an optical flow method and
it adopt flow constancy same for the adjacent pixels. This will reduce
the reliability to detect flames from the videos. In this paper
point-wise approach is used in which the conditions are applied to every
pixel instead of continuous regions. And also this paper is not uses
thermal heat fire detection method as used in classical approach. In
this paper we have used binarization algorithm which provides accuracy
of detecting fire flames as it very useful for detecting suspicious
regions of flames in video files and also helps to eliminate background
nosiness from the videos. With the first section, moving pixel’s region
is calculated and differentiated from the rigid object region. Then
features are extracted as frame separation, flicker colour detection,
source matching, radius of fire object region, gradient area and stream
of frames are then stack into a video file. Then with the output of
feature extraction, the flames are recognized whether they are present
or not. If the flames are detected then fire alarm is raised to take
fast action on fire and similarly send the result to the server for
security purpose. The proposed procedure can be used on a huge video
record. This paper allows a well-ordered atmosphere to inspect frame
rate and provide robustness. The major advantage of the proposed
algorithm is that it works well with CCTV cameras and low resolution
video files that can detect the flames located at the far distance and
can be used for commercial purposes. |
|
|
Full Text |
|
|
Title: |
A
navigation system for the visually impaired using embedded technology |
Author (s): |
V.
Ramya, Laxmi Raja and T. Akilan |
Abstract: |
India is one of the countries with a huge population of blind and
visually impaired with very least population of them using Navigation
systems. Many navigation systems are available in the market but most of
them are either costly or lack in accuracy and user friendliness.
Bearing all this in mind we have designed and implemented a GSM and GPS
based navigation system. This system has a ARM cortex multiprocessor as
the core element. While navigating in an unknown geographical area, the
user can effectively use this system to precisely know where he/she is
using the GPS. The user is provided with a touch keypad and a
microphone, using which he can take notes like mapping the area for
future movement there. Also the user can obtain information regarding
weather and light conditions at the given time and area using the
temperature and light sensors provided. The blind usually uses a cane or
walking stick to identify obstacles in the path and move around. But
sometimes it cannot detect obstacles like overhanging tree branch or a
person suddenly moving across. Here the user can be warned by auditory
impulses regarding the obstacle using sensors. Similarly the visually
impaired can be lost in a surrounding or if he wishes to convey an
emergency signal to his caretaker, a simple one touch button can send a
SMS via the GSM module to the caretaker, regarding the precise location
of the user. At time of low light, say during evening or night, the
light sensor detects it and a LED light goes on. This enables the user
to indicate other persons in the surrounding area that he is there.
These are the various applications of this system using modern computer
science and communication technologies where cheap and effective service
can be given to the users. |
|
|
Full Text |
|
|
Title: |
Survey on computer programs and
methods for heart diseases prediction and classification |
Author (s): |
S.
Nithya and C. Suresh Gnana Dhas |
Abstract: |
This
paper presents several approaches carried out for the prediction, risk
assessment of heart diseases such as Coronary Artery Disease (CAD),
Congestive Heart Failure, Myocardial Infarction (MI). Researchers of
applied soft computing, image processing, data mining has taken
strenuous efforts in prediction, risk assessment and classification of
cardiac diseases. The paper thoroughly reviewed their contribution and
several cross functional research dimensions. |
|
|
Full Text |
|
|
Title: |
Effect of tool geometry on surface modification of aluminium 6063 by
friction stir processing |
Author (s): |
D.
Amirtharaj, G. Rajamurugan, S. Sivachidambaram and D. Dinesh |
Abstract: |
Aluminium alloy 6063 has a wide application in special machine elements,
architectural sections, automobiles and frame systems. AA6063 has high
strength to weight ratio but low hardness and wear resistance property.
Friction Stir Processing (FSP) is a surface modification process through
which mechanical properties of the surface can be improved by
reinforcing ceramic particles. In this present investigation, surface
property of Aluminium alloy 6063 is modified by reinforcing Boron
Carbide (B4C) powder particles via FSP. The distribution of B4C
particles were examined for different reinforcing techniques, based on
Hardness and Impact strength, by keeping volume fraction (22.38%)
constant. The tool pin profiles such as threaded cylindrical and square
pin were also compared for the best distribution of B4C in
the surface of base metal through different reinforcing techniques. The
tool rotational speed 1200rpm, travel speed 40mm/min and axial force
10kN are kept constant. |
|
|
Full Text |
|
|
Title: |
Efficient data compression technique using modified adaptive rice golomb
coding for wireless sensor network |
Author (s): |
S.
Kalaivani and C. Tharini |
Abstract: |
Wireless sensor
networks (WSN) are energy constrained network since each node in WSNs
are typically powered by batteries with limited capacity. Compressing
the data sensed at each sensor node in an energy efficient manner is
necessary for extending the network lifetime of wireless sensor network.
In each sensor node the communication module is the main energy
consuming unit and therefore data compression is one of the techniques
that could be used to reduce the amount of data transmitted among the
nodes. The proposed algorithm, Modified Adaptive Rice Golomb Coding (MARGC)
is one such compression technique to prolong the life time of the
network. Simulation results using different datasets demonstrate the
feasibility and efficacy of MARGC algorithm. The algorithm has also been
implemented in real time using NI WSN hardware. |
|
|
Full Text |
|
|
Title: |
Piezoresistivity of carbon nanotubes strain sensors |
Author (s): |
Gaurav Sapra |
Abstract: |
Carbon nanotubes are highly sensitive to strain even at macro and
nanoscale. The high strain sensitivity is due to its piezoresistive
behaviour. The piezoresistivity of CNT and their polymer composites are
derive from three main components i.e. contact resistance between CNTs,
tunneling resistance between neighbouring CNTs and CNT piezoresistivity.
The contact resistance of CNT network depends on the region of contact
and it lies in the range between few hundred to thousand kΩs. While the
tunneling resistance of CNT network depends on the distance between its
neighbouring CNTs. As the distance d between CNTs increases within 1nm
due to its applied strain the tunneling resistance increases
exponentially. The tunneling effect is more dominant when the
concentration of CNT filler in composite is close to percolation
threshold. The piezoresistivity of CNT/polymer composites are also
dependent on environmental conditions such as temperature, pressure etc.
It changes with the change in temperature due to infiltration of polymer
into CNT networks. |
|
|
Full Text |
|
|
Title: |
Survey of optimistic power aware
routing protocols in mobile datacenter networks |
Author (s): |
Ganesan
Veerappan and C. Suresh Gnana Dhas |
Abstract: |
A
Mobile Datacenter Network (MDNET) is a self configuring network composed
of movable nodes without any fixed infrastructure like Ad-hoc. The
mobile data center is a type of data center that is designed and
packaged in a small and mobile facility, usually in a standard shipping
container. These small-scale data centers can easily be transported and
deployed to remote and mobile locations. A mobile data center is also
known as a modular data center. The very basic and closely watchable
important issue for mobile datacenter networks is to find the route
between source and destination that is a major technical challenge due
to the dynamic topology of the network. Routing protocols in MDNETs
could be differing depending on the application, infrastructure and
network architecture. This paper presents a survey on power aware
routing protocols for wireless mobile datacenter networks. Survey focus
on recent development and modifications in this widely used field. This
discussion is centered on proposed power saving algorithms. Furthermore
we will discuss about the conventional protocols and in addition to we
also see how these are customized to make these protocols efficient
power utilizer. |
|
|
Full Text |
|
|
Title: |
Intuitionistic double layered fuzzy graph |
Author (s): |
J.
Jesintha Rosline and T. Pathinathan |
Abstract: |
In fuzzy graph theory, double layered fuzzy graph and
intuitionistic fuzzy graph have been defined already by different
authors. In this paper Intuitionistic double layered fuzzy graph is
defined with examples. Some of its theoretical concepts were studied
using different concepts in IFG. |
|
|
Full Text |
|
|
Title: |
Anti cancer activity of ZnO
nanoparticles on MCF7 (breast cancer cell) and A549 (lung cancer cell) |
Author (s): |
Selvakumari D., Deepa R., Mahalakshmi V., Subhashini P. and
Lakshminarayan N. |
Abstract: |
ZnO
nanoparticles have been proved to be promising in cancer treatment,
including the tumor cells destruction with minimal damage to the healthy
cells. In the present study highly pure ZnO nanoparticles with a narrow
size distribution of 16-19 nm were prepared by the simple DMC (Dry
Mechano-Chemical) method in the lab. The anticancer activity on MCF7
(Breast cancer cell) and A549 (Lung Cancer cell) were determined by the
MTT (Methylthiazolydiphenyl-tetrazolium bromide) assay. A549 and MCF-7
cells were exposed to ZnO-NPs and it exhibited 50% reduction at a very
low concentration 31.2 μg/ml. Thus, the reduction in cell viability with
NPs induces cytotoxicity in cancerous cells. There is a size dependent
effectiveness of ZnO nanoparticles in the removal of cancer cells and
also a positive correlation with reduced toxicity. |
|
|
Full Text |
|
|
Title: |
Analysis of poverty: Using fuzzy
triangular analytical hierarchy process |
Author (s): |
Raj
Kumar and T. Pathinathan |
Abstract: |
Grading the poor helps
the government to establish a better policy to distribute resources more
reasonably, and therefore provide a government aid to the deserving
families more effectively. The traditional single-factor model (Income
and consumption expenditure model) is not adequate, because poverty
grade analysis involves various factors of different weights. Some
factors cannot be analysed by classical algorithm namely income –
expenditure and consumption model. In this paper we establish a
multi-criteria decision model (MCDM). We use fuzzy triangular analytical
hierarchy process (FTAHP) to analyse poverty. We determine the indexes
of poverty grade according to maximum membership degree which is derived
from the Fuzzy AHP- Fuzzy Triangular Numbers comparison criteria
importance matrices .In this way we quantify the qualitative data. |
|
|
Full Text |
|
|
Title: |
Performance analysis of nutritional contents in food images using SARAN |
Author (s): |
Kavitha S. and Pavithra S. |
Abstract: |
In
the present day scenario, analysis of nutrition and calories in daily
food intake has become indispensable. The increasing obesity problems
have made a significant effect on the people to be concerned about the
calories they consume. In this paper, we propose a food calorie
measurement system that can help them to measure and manage daily food
intake. This method is employed to identify if the food image is good or
rotten. If it is found to be good then it is taken for calorie
measurement analysis and classified based on standard calorific tables
using Self- Adaptive Resource Allocation Network [SARAN]. Then, based on
the BMI of a person, the result alarms about whether the food under
analysis is suitable to the person or not. The results show that the
accuracy of the system is acceptable and it will greatly improve and
facilitate current manual calorie measurement techniques. |
|
|
Full Text |
|
|
Title: |
Optimizing the parameters for friction stir welding of dissimilar
aluminium alloys AA 5383/AA 7075 |
Author (s): |
S.
Sivachidambaram, G. Rajamurugan and D. Amirtharaj |
Abstract: |
Aluminium alloys which exhibits very attractive mechanical, physical and
chemical properties have intensive demand in various areas especially
marine structure. In order to join aluminium alloys various welding
methods are employed but the recent innovative and environmental
friendly techniques is friction stir welding. In this study dissimilar
aluminium alloys AA 5383 and AA7075 have been joined using friction stir
welding. The factors which influencing the welding parameter are tool
rotation speed, transverse feed which are varied to 700, 800, 900 rpm
and 40, 60, 80 mm/min. The 6mm plates are joined by keeping the axial
force constant at 10kN. The weldment is achieved using a square tool of
pin diameter 8mm. The effect of welding parameters chosen are evaluated
using hardness testing to know the resistance to wear of the weld metal
and tensile testing to know the properties and ductility of a weldment.
The maximum tensile strength obtained is for the parameter of 700 rpm
and 40 mm/min transverse feed produced a high tensile strength of
211MPa. |
|
|
Full Text |
|
|
Title: |
Rapid control prototyping of voltage controller for three phase voltage
source inverter |
Author (s): |
Saptarshi De, O.V. Gnana Swathika and S. Hemamalini |
Abstract: |
This paper presents rapid control prototyping of voltage source inverter
(VSI). Control techniques for power converters are developing day by
day. However, it is not practical to implement a controller in hardware
to test its performance in real time. It is possible to implement the
designed controller with real time simulator and then test it with the
actual power converter circuit. Such a simulation is known as rapid
control prototyping (RCP). In this paper, a three phase voltage source
inverter (VSI) is designed and implemented in hardware and the control
technique for the VSI is implemented using a real time simulator and
then interfaced with the hardware model of the VSI. The main aim of this
paper is to implement rapid control prototyping for verifying the
performance of the controller designed for the specific power electronic
circuit. |
|
|
Full Text |
|
|
Title: |
Intuitionistic pentagonal fuzzy number |
Author (s): |
Ponnivalavan K. and Pathinathan T. |
Abstract: |
In
this paper we define Intuitionistic Pentagonal Fuzzy Number and include
basic arithmetic operations like addition, subtraction for
Intuitionistic Pentagonal Fuzzy Number. We present examples for the
above defined operations between Intuitionistic Pentagonal Fuzzy Numbers
and also Score and Accuracy Function of an Intuitionistic Pentagonal
Fuzzy Numbers. Finally we give examples for Intuitionistic Pentagonal
Fuzzy Number. |
|
|
Full Text |
|
|
Title: |
Simulation and analysis of CNTFET based inverter |
Author (s): |
Gaurav Sapra |
Abstract: |
Carbon nanotubes due to its numerous extraordinary properties are
turning out to be the forefront material for future electronics. In
comparison to silicon based FETs, CNTFETs possesses higher k gate
dielectric, quasi- ballistic transport at low voltage, higher
transconductance, higher drive current, higher average carrier velocity,
lower heat dissipation and higher switching speed. Due to all these
advantages a lot of research has been done in modeling CNTFET based
electronic devices. The high performance p type and n type single walled
CNTFET devices are modeled using a Stanford University Verilog code in
Symica DE simulator. This paper demonstrated CNTFET inverter by serially
connecting p type and n type single walled CNTFETs models in simulator.
Finally, a comparative performance analysis of CNTFET inverters over
conventional and multi gate MOSFET inverters has been addressed. |
|
|
Full Text |
|
|
Title: |
Autonomous and voice enabled embedded wheel chair |
Author (s): |
V.
Ramya and T. Akilan |
Abstract: |
As
the technology increases we can solve many problems of the people. There
are lots of persons who cannot walk very easily due to blindness. For
them traveling with safety is a major problem. An intelligent electric
vehicle is thus required to solve their problem. The vehicle is made
with a lot of technologies such as Digital image processing for obstacle
detection, edge detection and road detection, Sonar based obstacle
avoidance, GSM based emergency servicing and semi-automatic control
system for vehicle. We propose a design of completely intelligent
electric vehicle for blind which can be implemented successfully. The
vehicle is designed in such a way that it can climb footpaths. The
vehicle is designed to obey all traffic signals so that the design is
apt for real world. |
|
|
Full Text |
|
|
|
|
|
|