ARPN Journal of Engineering and Applied Sciences                ISSN 1819-6608 (Online)
 

 
GoogleCustom Search
 
 
 
ARPN Journal of Engineering and Applied Sciences                                     July 2015  |  Vol. 10  No. 12
   
Title:

Analysis and implementation of OFDM system and channel estimation based IEEE 802.11A

Author (s):

S. K. Mydhili and A. Rajeswari

Abstract:

Channel estimation plays a very important role in any wireless communication system. Currently many related algorithms are a research hotpot. Basically channel estimation are classified into two types namely, pilot-based channel estimation and blind channel estimation. Pilot-based channel estimation estimates the channel information by obtaining the impulse response from all sub-carriers of pilot. The blind channel estimation uses statistical information of the received signals whereas pilot-based channel estimation is a practical and an effective method. This paper presents a pilot-based channel estimation of OFDM system and analyzes the degradation effect of pilot subcarriers in OFDM systems on time-domain based on the estimation performance. The effects of Inter Symbol Interference (ISI) are reduced by the splitting process. This splitting process also decreases the rate of stream of data connected with distinct subcarriers. The paper starts with basic realization principle of OFDM system and analyzes OFDM in the frequency domain using spectral analysis method.  The simulation results are shown using Matlab which compares the bit error rate (BER) performance of different modulation schemes and types of pilot and finally concluded the importance of estimation based on the achieved results based on IEEE802.11A.

   

Full Text

 

Title:

Artificial pancreas based on model predictive control

Author (s):

R. Helen

Abstract:

Diabetes is recognized as a group of heterogeneous disorders with the common elements of high blood glucose concentration and glucose intolerance, due to insulin deficiency and impaired effectiveness of insulin action. The most common types of diabetes are diabetes mellitus type 1 and diabetes mellitus type 2, which does not necessarily require insulin injections. Type 2 constitutes about 85 to 95% of the approximately 246 million people worldwide with diabetes. The number of type 1 diabetics is estimated to be 10 to 20 million worldwide. Type 1 diabetes occurs when these beta cells are destroyed by the body's own immune system. So, the model is to be developed to recover from diabetes by means of MPC controller. This constrained robust control strategy is developed to reduce risks of hypo- and hyperglycemias (low and high blood glucose concentration). Here the role of controller is to regulate the blood glucose level by giving insulin. Closed-loop performance is evaluated through simulation studies of different controllers and it becomes human friendly.

   

Full Text

 

Title:

Enhancing security in medical image communication using novel digital signature with various attacks

Author (s):

A. Umamageswari and G.R. Suresh

Abstract:

Medical image content authentication is very important, since medical image contents are more and more widely distributed. Reversible watermarking becomes a promising technique to embed the information into medical images. In this paper, we define the Region of Interest (ROI) in an image and trying to embed data in Region of Non Interest. When medical image shared through network, for the compression purpose we proposed the JPEG2000 algorithm and to improve the integrity and Authenticity hash value of the image is found by using MD5 and encrypted using RSA to form the DS (Digital Signature). DS and patient information is embedded into DICOM images. Strict authentication can be achieved by providing high security in accessing the secured medical images by medical experts which are available in the websites using Kerberos technique. The proposed method has been tested against various geometrical attacks to verity the robustness of the medical image and it has yields the fruitful results.

   

Full Text

 

Title:

Implementation fuzzy tuned artificial neural network controller for chopper fed DC series motor using a low cost microcontroller

Author (s): I. Thangaraju, M. Muruganandam and M. Madheswaran
Abstract:

In this paper the speed control of a DC series motor with Hybrid Fuzzy-Neuro Controller (FNC) is presented. The motor is connected with a DC Chopper. This configuration has been designed with current control and speed control loops. The current controller blocks the PWM signal when the current increases beyond its limit. The speed controller is based on Fuzzy-Neuro type. The performances of FNC are analyzed in respect of load variation and speed variation using MATLAB/Simulink. This system is implemented in NXP 80C51 Microcontroller based Embedded System. From the result of simulation and hardware implementation it is found that the FNC can have better control compared with Fuzzy Logic Controller (FLC).

   

Full Text

 

Title:

Prediction of scouring in the bridge pillar on intermittent river

Author (s): M. Galib Ishak, Irianto Uno and Saparuddin
Abstract:

In the planning for bridge pillar in the river, things that need to be considered are  the stability and strength of pillar.  Other things that also should be taken  into consideration  in planning is scouring that occur after the bridge pillars exist. The objective of research is to predict scouring in the river due to the influence of the pillars. This research was conducted on the intermittent river  in the eastern  side of  Palu Bay in Central Sulawesi, Indonesia. In this area, there are eight rivers but only four rivers have bridge with three spans, include Taipa River, Labuan River, Lambara River and Toaya River, and all these rivers flow toward Palu Bay. The method used in this research  is by calculate and  directly measure the variables that affect  on the scouring height, such as catchment area,  river slope, sediment diameter, rainfall, pillar width, average velocity and  height  of flow. By taking into account the effect of those variables, the results that are achieved in this research  are closer to the higher of scouring around pillars from direct measurement in the research locations. This study is also compared with those conducted by previous researchers, with the results show that the closest result is the Carsten and Froehlich equation.

   

Full Text

 

Title:

A robust line flow based WLAV state estimation technique for power systems

Author (s): Kalpanadevi M. and R. Neela
Abstract:

State Estimation techniques are widely used to estimate the operating state of power systems in the most reliable manner so that the estimated state variables reflect the current system state faithfully and these studies enable the energy management centre to operate the system in a secure manner under normal as well as contingent conditions. Those algorithms which generate a fairly good estimate in spite of the presence of bad measurements are considered to be comparatively superior and WLAV based SE has been widely accepted as one such technique whose output is almost immune to the existence of bad measurements. In this paper, a new line flow based WLAV state estimation (WLAV-LFBSE) technique for power systems using line flows and bus voltage magnitudes as state variables has been suggested. A constant, line flow based Jacobean matrix has been arrived at through suitable manipulation of network equations and this technique generates an output which are in terms of quantities of  real concern namely  line flows and bus voltage magnitudes. As these quantities undergo wide variations due to load changes, it becomes essential to study the performance of the algorithm under varying loads. The proposed method has been tested on standard test systems taking into account these load variations and the results are analysed.

   

Full Text

 

Title:

Risk analysis for performance based contracting on the road construction work

Author (s):

Benny Mochtar, Herman Parung, Johanes Patanduk and Nur Ali

Abstract:

Indonesian government has adopted a model of performance based contracting (PBC) as a solution for handling the road issues. The PBC model is an integrated contract form of design, construction and maintenance processes that using lump sum payment system. The PBC is applied to establish a condition that encourages contractors as providers of construction services to be able to properly manage risk, where during the time, the risk that caused by poor quality work of service providers has been always be a risk of project owners. But in the PBC, this risk will be under contractors’ responsibility. The purpose of this study is to identify and analyze risks that occur and its influence on the PBC project performance. The study was conducted using the survey method where questionnaire as data collection instruments were distributed to the parties involved in the PBC projects in Indonesia, either the contractors or the owners. The data were then processed using factor analysis, regression analysis and path analysis to obtain structural equation relationship between risk and performance of the PBC project. The result shows that from of the 15 most important risks that highly influence on the PBC performance, most of them were borne by the contractor.

   

Full Text

 

Title:

Study on the implementation of framework agreement construction based on risk

Author (s):

Habir, Herman Parung, Muh. Ramli Rahim and Dan Muhammad Amri

Abstract:

The contract is an important aspect that is crucial in the implementation of construction projects. Framework agreement is one of the model contracts that are still limited implementation in the construction world in Indonesia. This study aims to assess the application of Framework agreement in the construction field, especially from the aspect of risk; it starts from identification to the risk allocation of the aspect of construction contracts. The research is done in the form of a survey by capturing the opinions or perceptions, experiences, and attitudes of respondents consisted of contracting, procurement, vendor, and the project owner. From the results of the study note that the most influential risk level is variable Fossil (X8), Testing (X9), Termination of employment (X16), Delay Testing (X18), handover of some of the work ((X20), Procedure variation (X28), the Right Contractor to Halt Work (X33), the risk of service users (X36), the consequences of the risk of service users (X37) and exemption from the obligation to force majeure (X44).

   

Full Text

 

Title:

On chip communication architecture power estimation in high frequency high power model

Author (s):

Khalid B. Suliman, Rashid A. Saeed and Raed A. Alsaqour

Abstract:

System-on-Chip (SoC) on chip communication architecture solved the problem of how to interconnect hundreds of processing element (PE) and storage element (SE) inside one chip, but in the other hand it introduced power consumption hindrance in the communication elements such as bridges, bus wire, bus interface and arbiters  to the overall power usage in the chip. Various power estimation techniques was introduced mostly focusing only on the power consumed in parts of the SoC communication architecture, like the global bus interconnect or the bus wire those techniques only tackles part of the overall consumed power. This paper proposes a system level power consumption estimation model for SoC for all of the communication elements with high frequency effects and system communication activity consideration.

   

Full Text

 

Title:

Power factor improvement and harmonic compensation using ANN based shunt hybrid filter for active load

Author (s):

R. Sriranjani and S. Jayalalitha

Abstract:

In this paper the power factor improvement and harmonics compensation for active load is acquired by the Shunt Hybrid filter (SHF). Dominant harmonic current are infused by the passive filter and the hysteresis controlled shunt active filter infuses other than dominant harmonic currents and the fundamental reactive current. Supply current detection method for controlling the active filter using Artificial Neural Network (ANN) updates the weight by least mean square (LMS) algorithm, determines the reference signal for the hysteresis controller. By trial and error, the learning rate is fixed. The dynamic response of the shunt active filter for active load is studied using MATLAB Simulink and the results are verified.

   

Full Text

 

Title:

Encoding scheme for crosstalk minimization

Author (s):

P. Stephi and V. Vijaya Kumar

Abstract:

Crosstalk in on-chip buses ends up in serious issues relating delay and power dissipation. Many encoding techniques were proposed to avoid crosstalk step-down. Fibonacci based coding reduces the amount of transitions within the code words and therefore moves itself closed to an entire resolution for crosstalk step-down. The crosstalk impact may be a consequence of coupling and switching activities that’s encountered once there is a transition as compared to previous state of wire and once there are transitions in adjacent wires. There are many strategies for the reduction of power dissipation, crosstalk and delay. This paper proposes encoding theme to realize the crosstalk. This coding technique is enforced mistreatment VHDL. This proposed algorithmic program is cut back the crosstalk and delay.

   

Full Text

 

Title:

Performance analysis of artificial neural network using leakage power reduction techniques for DSP applications

Author (s):

K. Gopika Rani, S.J. Jesanthe, N. Mathan and A. Nandhini

Abstract:

The statistics regarding the functionality of the brain was acquired tremendously. This leads to the birth of new technology called neural networks. A vast amount of information was processed in a human brain with the help of neurons. The interconnection between the neurons and the parallelism helps the brain to do the functions in few hundred milliseconds. The neural networks were able to solve the complex tasks. Unlike the traditional method, no explicit algorithm is required. In this paper, modified clocked CMOS D Flip Flop is taken and its parameters are analyzed for better performance by applying low power techniques. Then it is applied in the Artificial Neural Network (ANN) to provide a improved way for computing mathematical functions. It concludes that all the low power techniques reduce the leakage power comparatively. This resultant ANN architecture can be applied for low power digital applications.

   

Full Text

 

Title:

The use of additional devices for reducing the deformation of the bus body when tipping

Author (s):

Kalmikov B. Y., Visotski I. Y., Ovchinnikov N. A., Petriashvili I. M. and Kalmikova Y. B.

Abstract:

The article is devoted to the solution of practical problems in the sphere of buses passive safety. Particularly, the methods of reducing bus body deformation when tipping due to reducing the height of fall of centre of gravity are worked out. The dependence of the distribution of impact energy for every stand of the left side of the bus body of LiAZ - 5256 from the length of sliding part of the piston rod device to prevent tipping is identified and investigated. The dependence of the displacement of every left cheek of bus body of LiAZ - 5256 from the length of retractable stem of suggested device is determined. The realized studies prove that devices like that the authors of the article offered are able to reduce the deformation of the pillars of the bus when while tipping. Thus, the greater is the length of the stroke of the device, the smaller is the amount of pillars movement in the direction of the residual space of the passenger compartment of the bus.

   

Full Text

 

Title: Graphically enhanced visual concealment of large objects
Author (s):

Leonardo Frizziero, Luca Piancastelli and Tiziano Bombardi

Abstract:

Inexpensive, flicker free, flat, large, extremely bright LCD panels can be effectively used to conceal very large objects both stationary and moving. CCDC (Charge Coupled Device Camera) may capture the surrounding environment and reproduce it on the LCD screens. LCDs may easily be installed on the surface of the objects. It is also possible to use the video cards of personal computers and laptops to digitally process the image captured with the CCDS and obtain patterns to disguise the real appearance of the object or the way it is moving. The visual CCD (Camouflage, Concealment, and Deception) system so obtained is extremely effective. In this paper, it is demonstrated that the digital image processing techniques necessary to obtain a successful concealment are elementary and already embedded in the hardware of video card for real time image processing. It is also possible to superimpose patterns at defined frequencies that will obscure the image to the human observer especially in case of use of magnifying optics. The CCD effect in the visual and ultralight field is extremely effective. An example of active CCD of the Ariete MBT (Main Battle Tank) is shown in this paper.

   

Full Text

 

Title:

Design of new combined antenna for dual polarization using crossed dipole at 2.23 GHZ and 5 GHZ

Author (s):

Zeyneb Berkat and Noureddine Boukli Hacene

Abstract:

This paper discusses design of new compact dual polarized antenna for wireless communication systems, dual band for 2.23 GHz and 5.14 GHz, the polarization diversity becomes one of the most important techniques than can be used, the main reason for this shift is that the method does not require any extra bandwidth or physical separations between the antennas, the final design  Consists of a rectangular patch with notches combined by  a crossed dipole  in the same Ground and substrate, by optimized of this new structure, the two polarizations in the required band are obtained. The stable peak gain, omnidirectional radiation patterns are also achieved. Due to its good performance, through simulation by CST Microwave.

   

Full Text

 

Title:

A multiple access scheduling for energy efficiency in wireless sensor networks

Author (s):

S. Bharathidasan and P. Ramamoorthy

Abstract:

Energy efficiency is a major issue in Wireless Sensor Networks. Due to path failure, sensor nodes consume high energy. So, the performance of the networks is totally degraded. To overcome this issue, we proposed Multiple Access Scheduling (MAS). It attains both throughput and network connectivity while keeping the nodes moving in dynamic manner. The scheme consists of 4 phases. In fist phase, we proposed multipath routing to provide load balancing to improve the throughput. In second phase, the CDMA based scheduling algorithm is proposed. Here the sensor nodes are assigned with the constant code words and different time slots. In third phase, energy consumption model of sensor nodes is proposed. In fourth phase, new packet format of proposed scheme is introduced. It consists of scheduling status and connectivity status.  By using the extensive simulation results using the discrete event simulator, the proposed MAS achieves higher packet delivery ratio, connectivity ratio, less overhead and delay than the existing scheme like NMRA, SBYaoGG and AFTMR.

   

Full Text

 

Title:

First order chemical reaction effects on a parabolic flow past an infinite vertical plate with variable temperature and mass diffusion in the presence of thermal radiation

Author (s):

R. Muthucumaraswamy and P. Sivakumar

Abstract:

An analysis is performed to study the effect on a parabolic flow past an infinite vertical plate with variable temperature and mass diffusion in the presence of thermal radiation. Closed form analytic solutions are obtained for temperature, concentration, velocity by Laplace Transform technique and presented graphically for different values of physical parameters. The effects of various parameters on flow variables are illustrated graphically and the physical aspects of the problem are discussed.

   

Full Text

 

Title:

Storage optimization of VOD systems by system coding comparable substance dissemination and narrow casting

Author (s):

R. Aroul Canessane, Vanitha Renganathan and R. Dhanalakshmi

Abstract:

Video on-Demand (VOD) framework concentrate all the more on patch-up administrations architectures and advancing overlays yet don't suspiciously accept the utilizer exercises and the profit of prefetching systems. Subsequently, they can not better help; we propose a system coding comparable substance conveyance plan to proficiently handle intuitive VOD operations in shared systems. In system coding comparable substance dissemination (SCCSD), features are separated into sections that are encoded into free squares. These pieces are appropriated to distinctive companions for neighbourhood stockpiling. By mining relationship inside every feature, the fragments asked for in interactivities are anticipated taking into account the data amassed through tattles. By using half and half reserving procedure, a community oriented prefetching plan is intended to upgrade asset conveyance among neighbouring companions. A beginning spilling calculation intended to join irregular system coding with a randomized changed push calculation.

   

Full Text

 

Title:

Determination of reservoir drainage area for constant-pressure systems by conventional transient pressure analysis

Author (s):

Freddy Humberto Escobar, Mashhad Fahes, Rafael Gonzalez, Diego Mauricio Pinchao and Yu Long Zhao

Abstract:

The conventional straight-line method of transient pressure analysis implies drawing a straight line whose slope and intercept are used for parameter estimation, i.e., the slope and intercept of the semilog plot will lead to the estimation of permeability and mechanical skin factor respectively. For closed systems, the slope on a Cartesian plot of the late pseudosteady-state region allows estimation of the drainage area. For constant-boundary systems, the slope is zero, and as a result the drainage area would be estimated to have an infinite value. Because of this situation, a new way of using conventional analysis ought to be applied, and this constitutes the sole purpose of this work. By drawing a horizontal line at which the steady-state period takes place and observing the time at which this regime starts, it is possible to find the drainage area. Contrary to closed systems, for constant-pressure boundary the reservoir geometry affects the starting time of steady-state period, consequently, separate solutions must be provided according to the well position and reservoir geometry. Although, one equation was formulated, six different constants are provided that have specific application depending upon well location and reservoir geometry. The proposed equation was verified with synthetic and field examples.

   

Full Text

 

Title:

Mechanical characteristics of hotmix cold laid containing Buton granular asphat (BGA) and flux oil as wearing course

Author (s):

Budiamin Tjaronge M.W, Sumarni Hamid Aly and Rudy Djamaluddin

Abstract:

Buton granular asphalt (BGA) is produced from natural rock asphalt that deposited in South Buton Island, Southeast Sulawesi in Indonesia. The national and regional road infrastructure development sustainability can be empowering by utilization of BGA as pavement material. Ordinary asphalt mixture (hotmix asphalt and hot rolled asphalt) need to be heated to construct. Technical obstacles exist, as asphalt mixing plant is required for the hotmix production and hot rolled asphalt (HRA) construction at the distance and remote areas. The employment of hotmix cold laid mixture containing Buton granular asphalt is one solution to substitute hot rolled asphalt application in the remote and distance areas. The experimental results show that the bitumen within BGA and flux oil governs the Marshall Parameters and compaction ability of mixture. At 7.8% bitumen content within BGA (30, 62% by weight of BGA content in the mixture equivalent), no significant differences on VIM, VMA stability, flow, VFB and indirect tensile strength were observed when the storing and compaction time were extended from 3 to 7 days.

   

Full Text

 

Title:

Analysis of homomorphic crypto systems

Author (s):

K. Brindha and S. Sudha

Abstract:

Homomorphic encryption technique does some changes manipulation to be done on the encrypted data without decrypting the encrypted data. The decryption of encrypted data is the same as if some changes done on the original data. There are some partial homomorphic encryption schemes used for some practical applications like electronic voting, e-cashing, multiparty computation and secret sharing etc., but they allow only certain specific computation on encrypted text. We describe how refreshing cipher text and Squashed decryption to play role on arbitrary computation on encrypted text in the fully homomorphic crypto system. In this paper based on the strengths and weaknesses of the existing homomorphic system we are doing the comparison of it.

   

Full Text

 

Title:

Congestion management in open access electric network using adaptive real coded biogeography-based optimization

Author (s):

A. Ramesh Kumar and L. Premalatha

Abstract:

Open access electric network faces severe congestions due to the increasing demand for power, multiple transactions in the transmission line and outage of network equipment, causing uncertainty and affecting the system security. In this article, different operating states are considered for congestion management in an electric power network. An effective algorithm to reschedule the generating units is implemented for relieving congestion as well as maintaining optimal settings of electrical parameters in the network. The main objective of our algorithm is to minimize rescheduling of power using generator sensitivity factor method and hence minimize congestion cost through the adjustment of generator price bids submitted by independent power producers. The proposed algorithm has been validated on IEEE 30-bus, IEEE 57-bus and IEEE 118-bus systems.

   

Full Text

 

Title: Optimizing mapreduce functionality in big data using cache manager
Author (s):

Devi. L and S. Gowri

Abstract:

The Map Reduce framework generates a large amount of intermediate data. These data thrown away after the tasks finish. Map Reduce is unable to utilize these data. To improve the efficiency of Map Reduce functionality by reducing repeated jobs in data nodes, we develop cache management system inside the Map Reduce framework. In which, tasks submit their intermediate results to the cache manager. Before executing the actual computing work, task queries the cache manager. In a Data Aware cache, cache request and cache reply mechanisms are designed. Implementing Cache by extending Hadoop, it improves the completion time of Map Reduce jobs. It detects the occurrence of repeated job in the incremental data process. Also, stops the repeated work and minimize the processing time so that to provide the optimized usage of Map Reduce nodes.

   

Full Text

 

Title:

Diversified optimization techniques for routing protocols in mobile ad-hoc wireless networks

Author (s):

K. Devarajan and V. Padmathilagam

Abstract:

Mobile Ad-hoc Network (MANET) is a wireless network without having a fixed infrastructure. The lack of infrastructure introduces various constraints on Ad-hoc networks. The selection of routing protocol is a big challenge in Ad-hoc network because of its dynamic behaviour. This work mainly focus to analyze  the performance of   hybrid (Zone Routing Protocol) routing protocol which combines the best features of proactive (Optimized Link State Routing) and Reactive (Ad-hoc On-demand Distance Vector) routing protocols using different performance metrics like Throughput, End-to- End Delay, Packet Delivery Ratio, Power Consumption and Packet loss ratio. In this work, Genetic Algorithm and Ant Colony Optimization technique is proposed to improve the performance of MANETs.

   

Full Text

 

Title:

Determining transportation industrial metrics using random process theory and analytical hierarchy process

Author (s):

K.R. Sekar, B. Padmakrishna, Ravi Thej Neeli and T.C. Srinivasan

Abstract:

Transportation is one of the inevitable and in-disposable shipment facilities for the huge number of people in our world. In our day to day life plenty number of segmented people use their own conveyance for any type of shipment. In our study we used to find which type of shipment is economical and also convenient for the lower and middle class people. For that here we identified three of mass transportation method much be appreciated for the people in huge mass. The three types of public transportation means are Metrorail, Monorail and Bus Rapid Transport System (BRTS). In this   paper we took 19 cities into account for the above said transportation. Our aim is to find which mode of transportation is economical and viable in the cities for the people, to obtain a conclusion we identified ten attributes for measuring the mode of public transportation. From the plenty number of websites data has been taken for the respective attributes for 19 cities the semantic table and the tuples available are vital for our observation and identification. Here we employed two methodologies in terms with the Random Process Theory (RTP) and Analytical Hierarchy Process (AHP) which is ever been used in this segment and I rightly say this is the first time we proposed such a type of a phenomenal methodology for the past  one and half decades in this field of public transportation.

   

Full Text

 

Title:

The thermal management system of laser diode: A review

Author (s):

Rasheed Nema Abed

Abstract:

This study is focused to review the recent advancements of laser diode and its temperature control mechanisms that include thermoelectric cooler, spray cooling methods, micro-channels and micro heat-pipes.  These cooling methods are significant to make laser diode in compact size, light weight with more reliability. Moreover, these cooling systems can eliminate moving parts in laser diodes which can be powered by direct current and easy in switching.  Furthermore, this study is focused to describe the challenges involved in the studied cooling methods of the laser diode and also illustrates the heat transfer coefficients and temperature control variables in different studied cooling methods of the laser diodes from literature. The proposed review illustrates the recent developments, advantages and limitations of different cooling methods of the laser diodes found in literature, and the provided review can be significant for future development of the cooling methods in future.

   

Full Text

 

Title:

Thermal noise as electromagnetic polutan in wireless communication system

Author (s):

Endah Budi P, RochmanAnanda A.S and Rudy Yuwono

Abstract:

In wireless communication system thermal noise is one of the noise that detected at the receiver. Thermal noise (Johnson Noise) exists in all resistors and results from the thermal agitation of free electrons therein by the temperature. This paper starts with a introduction on how temperature appears on the receiver and thermal noise on the receiver. The major contribution factor to thermal noise power and RMS voltage is also discussed analytically. The CDMA modem is used as a subject to study thermal noise in wireless communication system.

   

Full Text

 

Title:

A novelty approach on Tamil spam text extraction by using texton template based support vector machine and LP boosting classifier

Author (s):

Pandian A. and Mohamed Abdul Karim

Abstract:

In this proposed method, the Tamil language texts are analyzed through the Morris-Pratt Algorithm as input image that filtered with Gabor filter for edge analysis. Then, it converted into unique strings from the text blocks. The text strings consist of text stroke to analyze the pattern. By using wavelet transform, the features of pattern are extracted and it undergoes for mapping with the texton patterns. It reduces the multiple dimensional signature patterns into reduced level. It then compared with the various image transformation methods such as DST (Discrete Shearlet Transform, DWT (Discrete Wavelet Transform and DCT (Discrete Cosine Transform that trained feature based on hybrid of SVM with Linear predictive boosting (LPboosting) algorithm. The effectiveness of the result is cross validated through confusion matrix and the result shows the proposed classifiers is more accurately predicts the tested Tamil text strings with reduced misclassification levels.

   

Full Text

 

Title:

Assessment of equal and unequal amplitude carriers for a single phase five level diode clamped inverter

Author (s): Sureshpandiarajan P., Natarajan S.P.,  Balamurugan C.R. and Shanthi B.
Abstract:

This work presents the comparison of various Pulse Width Modulation (PWM) techniques for the chosen single phase half bridge DCMLI (Diode Clamped Multi Level Inverter). In this paper, a single phase half bridge diode clamped multilevel inverter is simulated with sinusoidal, THI (Third Harmonic Injection), Trapezoidal, TAR (Trapezoidal Amalgamated Reference) and Stepped Wave reference with Equal Amplitude Carriers (EAC) and UEAC (Un Equal Amplitude Carriers). The proposed EAC and UEAC is applied for various PWM strategies like PD (Phase Disposition) PWM, POD (Phase Opposition and Disposition) PWM, APOD (Alternative Phase Opposition and Disposition) PWM, CO (Carrier Overlapping) PWM, PS (Phase Shift) PWM and VF (Variable Frequency) PWM with EAC and UEAC. For all the PWM methods and references the UEAC produces less THD and higher fundamental RMS (Root Mean Square) values except for ma =1. For ma =1 the EAC provides less THD (Total Harmonic Distortion) and higher fundamental RMS (Root Mean Square) values for all the PWM methods and references. The simulations are carried out through Power System Block Set/MATLAB/SIMULINK.

   

Full Text

 

Title:

Securing AODV protocol from selfish node attack

Author (s):

Mani Bharathi, Ranjith Sairam, S. Sundar and C.M. Vidhyapathy

Abstract:

Mobile ad-hoc networks are self-configuring wireless networks without any specific infrastructure. MANETs are highly subjected to several attacks due to continuously changing network topology, lack of central monitoring and lack of efficient defence mechanism. Selfish nodes in MANETs are the defective nodes which drop the packets that are not intended to them. A malicious selfish node is introduced in the network to analyze the selfish node attack and a prevention algorithm for selfish node attack is also suggested. For the analysis, the routing protocol used in this paper is AODV. Network parameters meters like throughput, end to end delay and load are evaluated and compared. Simulation tool used in this paper is Riverbed Modeler.

   

Full Text

 

Title:

An interleaved high gain boost converter with SVM inverter for a motor load using PV panels

Author (s):

P. Deepak and A. Ramesh babu

Abstract:

The Interleaved High voltage gain boost converter along with SVM inverter is proposed to power induction motor using PV panels. The high voltage gain of interleaved boost converter is obtained through asymmetrical PWM, voltage lift capacitor. The ILBC reduces the voltage stress of main switch and reduce the input current ripple. The output of PV panel is fed to the input of ILBC. The boost converter output voltage is supplied to SVM inverter, which provides the power to induction motor. The SVM inverter provides the increased fundamental output voltage; reduce the harmonic content and Torque. Simulation was carried out using MATLAB/simulink environment. The comparison of SVM inverter and PWM inverter was made to validate the proposed converter.

   

Full Text

 

Title:

Generalizing convolutional neural networks for pattern recognition tasks

Author (s):

A. R. Syafeeza, M. Khalil-Hani, H. Imran, M.  M. Ibrahim and Y. C. Wong

Abstract:

Convolutional Neural Network (CNN) promises automatic learning and less effort for hand-design heuristics in building an efficient pattern recognition system. It requires simple and minimal pre-processing stages for data preparation. These features enable CNN architecture to be applied to various pattern recognition applications. This paper proposes a four-layered CNN architecture that caters to face recognition and finger-vein biometric identification case studies. The methodology applied in designing the network is discussed in detail. For face recognition, the design is evaluated on three facial image databases with different levels of complexities. These databases are AT and T, AR Purdue, and FERET. The same four-layered CNN architecture is also tuned for finger-vein biometric identification problems. The design performance is evaluated on finger-vein biometric database developed in-house, consisting of 81 subjects. The results obtained from these case studies are promising. For face recognition applications, 100%, 99.5%, and 85.16% accuracies were obtained for AT&T, AR Purdue, and FERET, respectively. On the other hand, the result obtained from the finger-vein biometric identification case study has 99.38% accuracy. The results have shown that the proposed design is feasible for any pattern recognition problem.

   

Full Text

 

Title:

Investigation and evaluation of the solar air collector model to support the solar vortex engine

Author (s):

Ayad T. Mustafa, Hussain H. Al-Kayiem and Syed Ihtsham U. Gilani

Abstract:

In this study, mathematical and experimental models were implemented for circular solar air collector. Modeling methodology with conservation equations of continuity, momentum and energy were presented, and model solution is obtained by utilizing a developed code in MATLAB program. An experimental model of concentric circles with outer and inner diameters of 8.8 m and 1.0, respectively, was designed and fabricated in order to perform measurements for the thermal and flow processes in the system. The canopy was inclined by 8.5o. The results showed that, at same solar irradiation, the temperatures of air flow, canopy and ground are increasing by decreasing the radius. When the canopy slope increases, air flow temperature decreases and canopy temperature increases for a constant solar radiation. When the solar radiation increases, air flow, canopy and ground temperatures increases for the same collector radius. The validations of the model predictive and therefore comparisons with results of experimental model of this study and Manzanares prototype data have been done. The model results agree with the experimental results. Further investigations are recommended after installation of the vortex generation engine where the residence time of the air particles will be changed, and consequently the air stream temperature and velocity are expected to change, as well.

   

Full Text

 

Title:

ADMK: An ad hoc component for aspect and domain based mobile ranking

Author (s):

N. Senthilselvan, K.R. Sekar and P. Saravanan

Abstract:

In the present era, mobile phone is a huge market, where day by day a new brand and lot of models of mobile phones are releasing, among which choosing one best mobile is a tremendous task. Where we take the problem of choosing a mobile phone by our technique ADMK (Aspect and Domain based Mobile ranking). A variety of Sources of information about the model of mobile phones being launched in market are available, where some of the websites provide rich and valuable knowledge for users and companies. But review of products can be often fuzzy and confused. This can be effectively done by Aspect determination from different text reviews available in the social media. Firstly, it identify the aspects to be considered to rate the product. Some of the aspects like Camera, RAM, Processor, and Memory are more important than USB port, buttons, panel, design. Free text reviews are extracted from the website using web Crawler. These reviews are processed to find out the opinion of the user on each aspect. The opinion of the customer on the important aspects will have great impact on the overall rating of the product. So by finding the weight of the aspect we will rank the aspects according to their influence on the overall rating of the product. By considering the different parameters like weight of the aspect, Classifier Rating will calculate the rating more accurately. This will provide the users to by the truthful product through online-shopping.

   

Full Text

 

Title:

The Meredith ramjet: An efficient way to recover the heat wasted in piston engine cooling

Author (s):

Luca Piancastelli and Giampiero Donnici

Abstract:

Piston engines with power up to 1000HP (735.5 kW) are becoming popular in the aeronautical field for the high efficiency and the possibility to work with  Diesel, jp4 and jp8 fuels up to altitudes up to 20,000m (65,000 ft). This paper updates a secondary advantage of piston engines: the Meredith effect. The Meredith duct is a ramjet powered by the heat wasted in cooling. In this way the efficiency of the original piston engine that can be higher than 50% which is the normal in common rail diesel engines. Even if the efficiency of this ramjet is lower than 30%, an accurate Design of this secondary engine can add a significant amount of thrust to the fan or the propeller powered by the piston engine. This effect, well known since the beginning of WWII, is being thoroughly analysed in this paper with regard of the efficiency. Previous papers introduced and a new radiator, with wing section tubes. As it will be seen the main design variable for the Meredith ramjet it the air temperature increase. This paper demonstrates that it is not convenient to increase this temperature over 200°C for aircrafts flying at about 600km/h@6000m (~330knots@20,000ft). The in-wing duct appears to be slightly better than the in-fuselage or the in-nacelle ones.

   

Full Text

 

Title:

Dynamic damping torsional vibrations in the transmission of rear-wheel drive and all-wheel drive vehicles

Author (s):

Ryzhikov V.A., Sapronov Y.G., Gorin S.L., Astsaturov Y.G.

Abstract:

A new system of dynamic absorption of vibrations in the vehicle’s transmission is observed in this article. The proposed solution provides the absorption of torsional vibrations near the resonance frequency. The basis of the kinematic scheme is based on the principle of dynamic absorption of vibrations. The design of the damping device of the angular type is observed. A mathematical model of the transmission of the car with the damping device and the results of computer modelling in MathCad are considered.  According to the results of the mathematical analysis of the results the parameters of the damping device are determined.

   

Full Text

 

Title:

Finite element analysis of unsteady MHD free convection flow past an infinite vertical plate with Soret, Dufour, thermal radiation and heat source

Author (s):

J. Anand Rao, P. Ramesh Babu and R. Srinivasa Raju

Abstract:

A study has been carried out to analyze the combined effects of Soret (thermal-diffusion) and Dufour (diffusion-thermo) on an unsteady magnetohydrodynamic free convection flow past an infinite vertical plate in a porous medium in presence of thermal radiation and heat source. A uniform magnetic field acts perpendicular to the porous surface. Energy equation takes into account of viscous dissipation, thermal radiation and Dufour effects. The governing differential equations are transformed into a set of non-linear coupled partial differential equations and solved using similarity analysis with numerical technique using appropriate boundary conditions for various physical parameters. The dimensionless governing equations are solved numerically using Galerkin finite element method. Favourable comparisons with previously published work on various special cases of the problem are obtained. The effects of various physical parameters on the dimensionless velocity, temperature and concentration profiles are presented graphically. In addition, the local values of the Skin-friction coefficient, Nusselt number and Sherwood number are also shown in tabular form.

   

Full Text

 

Title:

Characterization of the naturally fractured reservoir parameters in infinite-conductivity hydraulically- fractured vertical wells by transient pressure analysis

Author (s):

Freddy Humberto Escobar, Yu Long Zhao and Mashhad Fahes

Abstract:

It has become common to hydraulically fracture a naturally fractured formation to increase the well’s production potential. Since the mass transfer between fractured network and hydraulic fracture is much higher than that from matrix to fractures, the hydraulic fracture-fracture network interporosity flow parameter is much higher that that of matrix-fracture network. As a result, the transition period behavior from naturally fractured to homogeneous takes place before radial flow regime during the early bilinear, linear or elliptical (birradial) flow regimes. The purpose of this paper is to provide expressions by both conventional analysis and TDS technique for characterizing the naturally fractured parameters when the transition period interrupts the response of an infinite-conductivity fracture. The developed expressions for both methodologies were satisfactorily tested with simulated examples.

   

Full Text

 

Title:

Architectural design of 8 bit floating point multiplication unit

Author (s):

Usha. S and Vijaya Kumar. V

Abstract:

In the recent high speed processor, floating point ALU (FP ALU) is one of the important units to perform the arithmetic and logical functions of the floating point number. Floating point multiplication is one of the arithmetic operations that take more computational time and when implemented in hardware, it requires more area due to the large number of component. However the advantage of implementing the floating point unit in the hardware system is to overcome the overflow and underflow conditions that occur in the logical operation. This paper presents a high speed 8 bit multiplier. To increase the speed and to reduce the power consumption due to the clock load, wave pipelining method has been used. The coding is written in VERILOG HDL and the design is analyzed in the Xilinx environment.

   

Full Text

 

Title:

Flame detection in videos using binarization

Author (s):

Apoorva Bansal, Srinivas Koppu, V Madhu Viswanatham and Sujatha R.

Abstract:

Detection of flame based on computational vision has visible attention in the past years. Many selective features such as shape, colour, texture, etc., have been used to detect flames. The drawback to detect flames with these features are that they uses Lucas-Kanade method which is an optical flow method and it adopt flow constancy same for the adjacent pixels. This will reduce the reliability to detect flames from the videos. In this paper point-wise approach is used in which the conditions are applied to every pixel instead of continuous regions. And also this paper is not uses thermal heat fire detection method as used in classical approach. In this paper we have used binarization algorithm which provides accuracy of detecting fire flames as it very useful for detecting suspicious regions of flames in video files and also helps to eliminate background nosiness from the videos. With the first section, moving pixel’s region is calculated and differentiated from the rigid object region. Then features are extracted as frame separation, flicker colour detection, source matching, radius of fire object region, gradient area and stream of frames are then stack into a video file. Then with the output of feature extraction, the flames are recognized whether they are present or not. If the flames are detected then fire alarm is raised to take fast action on fire and similarly send the result to the server for security purpose. The proposed procedure can be used on a huge video record. This paper allows a well-ordered atmosphere to inspect frame rate and provide robustness. The major advantage of the proposed algorithm is that it works well with CCTV cameras and low resolution video files that can detect the flames located at the far distance and can be used for commercial purposes.

   

Full Text

 

Title:

A navigation system for the visually impaired using embedded technology

Author (s):

V. Ramya, Laxmi Raja and T. Akilan

Abstract:

India is one of the countries with a huge population of blind and visually impaired with very least population of them using Navigation systems. Many navigation systems are available in the market but most of them are either costly or lack in accuracy and user friendliness. Bearing all this in mind we have designed and implemented a GSM and GPS based navigation system. This system has a ARM cortex multiprocessor as the core element. While navigating in an unknown geographical area, the user can effectively use this system to precisely know where he/she is using the GPS. The user is provided with a touch keypad and a microphone, using which he can take notes like mapping the area for future movement there. Also the user can obtain information regarding weather and light conditions at the given time and area using the temperature and light sensors provided. The blind usually uses a cane or walking stick to identify obstacles in the path and move around. But sometimes it cannot detect obstacles like overhanging tree branch or a person suddenly moving across. Here the user can be warned by auditory impulses regarding the obstacle using sensors. Similarly the visually impaired can be lost in a surrounding or if he wishes to convey an emergency signal to his caretaker, a simple one touch button can send a SMS via the GSM module to the caretaker, regarding the precise location of the user. At time of low light, say during evening or night, the light sensor detects it and a LED light goes on. This enables the user to indicate other persons in the surrounding area that he is there. These are the various applications of this system using modern computer science and communication technologies where cheap and effective service can be given to the users.

   

Full Text

 

Title:

Survey on computer programs and methods for heart diseases prediction and classification

Author (s):

S. Nithya and C. Suresh Gnana Dhas

Abstract:

This paper presents several approaches carried out for the prediction, risk assessment of heart diseases such as Coronary Artery Disease (CAD), Congestive Heart Failure, Myocardial Infarction (MI). Researchers of applied soft computing, image processing, data mining has taken strenuous efforts in prediction, risk assessment and classification of cardiac diseases. The paper thoroughly reviewed their contribution and several cross functional research dimensions.

   

Full Text

 

Title:

Effect of tool geometry on surface modification of aluminium 6063 by friction stir processing

Author (s):

D. Amirtharaj, G. Rajamurugan, S. Sivachidambaram and D. Dinesh

Abstract:

Aluminium alloy 6063 has a wide application in special machine elements, architectural sections, automobiles and frame systems. AA6063 has high strength to weight ratio but low hardness and wear resistance property. Friction Stir Processing (FSP) is a surface modification process through which mechanical properties of the surface can be improved by reinforcing ceramic particles. In this present investigation, surface property of Aluminium alloy 6063 is modified by reinforcing Boron Carbide (B4C) powder particles via FSP. The distribution of B4C particles were examined for different reinforcing techniques, based on Hardness and Impact strength, by keeping volume fraction (22.38%) constant. The tool pin profiles such as threaded cylindrical and square pin were also compared for the best distribution of B4C in the surface of base metal through different reinforcing techniques. The tool rotational speed 1200rpm, travel speed 40mm/min and axial force 10kN are kept constant.

   

Full Text

 

Title:

Efficient data compression technique using modified adaptive rice golomb coding for wireless sensor network

Author (s):

S. Kalaivani and C. Tharini

Abstract:

Wireless sensor networks (WSN) are energy constrained network since each node in WSNs are typically powered by batteries with limited capacity. Compressing the data sensed at each sensor node in an energy efficient manner is necessary for extending the network lifetime of wireless sensor network. In each sensor node the communication module is the main energy consuming unit and therefore data compression is one of the techniques that could be used to reduce the amount of data transmitted among the nodes. The proposed algorithm, Modified Adaptive Rice Golomb Coding (MARGC) is one such compression technique to prolong the life time of the network. Simulation results using different datasets demonstrate the feasibility and efficacy of MARGC algorithm. The algorithm has also been implemented in real time using NI WSN hardware.

   

Full Text

 

Title:

Piezoresistivity of carbon nanotubes strain sensors

Author (s):

Gaurav Sapra

Abstract:

Carbon nanotubes are highly sensitive to strain even at macro and nanoscale. The high strain sensitivity is due to its piezoresistive behaviour. The piezoresistivity of CNT and their polymer composites are derive from three main components i.e. contact resistance between CNTs, tunneling resistance between neighbouring CNTs and CNT piezoresistivity. The contact resistance of CNT network depends on the region of contact and it lies in the range between few hundred to thousand kΩs. While the tunneling resistance of CNT network depends on the distance between its neighbouring CNTs. As the distance d between CNTs increases within 1nm due to its applied strain the tunneling resistance increases exponentially. The tunneling effect is more dominant when the concentration of CNT filler in composite is close to percolation threshold. The piezoresistivity of CNT/polymer composites are also dependent on environmental conditions such as temperature, pressure etc. It changes with the change in temperature due to infiltration of polymer into CNT networks.

   

Full Text

 

Title:

Survey of optimistic power aware routing protocols in mobile datacenter networks

Author (s):

Ganesan Veerappan and C. Suresh Gnana Dhas

Abstract:

A Mobile Datacenter Network (MDNET) is a self configuring network composed of movable nodes without any fixed infrastructure like Ad-hoc. The mobile data center is a type of data center that is designed and packaged in a small and mobile facility, usually in a standard shipping container. These small-scale data centers can easily be transported and deployed to remote and mobile locations. A mobile data center is also known as a modular data center. The very basic and closely watchable important issue for mobile datacenter networks is to find the route between source and destination that is a major technical challenge due to the dynamic topology of the network. Routing protocols in MDNETs could be differing depending on the application, infrastructure and network architecture. This paper presents a survey on power aware routing protocols for wireless mobile datacenter networks. Survey focus on recent development and modifications in this widely used field. This discussion is centered on proposed power saving algorithms. Furthermore we will discuss about the conventional protocols and in addition to we also see how these are customized to make these protocols efficient power utilizer.

   

Full Text

 

Title:

Intuitionistic double layered fuzzy graph

Author (s):

J. Jesintha Rosline and T. Pathinathan

Abstract:

In fuzzy graph theory, double layered fuzzy graph and intuitionistic fuzzy graph have been defined already by different authors. In this paper Intuitionistic double layered fuzzy graph is defined with examples. Some of its theoretical concepts were studied using different concepts in IFG.

   

Full Text

 

Title:

Anti cancer activity of ZnO nanoparticles on MCF7 (breast cancer cell) and A549 (lung cancer cell)

Author (s):

Selvakumari D., Deepa R., Mahalakshmi V., Subhashini P. and Lakshminarayan N.

Abstract:

ZnO nanoparticles have been proved to be promising in cancer treatment, including the tumor cells destruction with minimal damage to the healthy cells. In the present study highly pure ZnO nanoparticles with a narrow size distribution of 16-19 nm were prepared by the simple DMC (Dry Mechano-Chemical) method in the lab. The anticancer activity on MCF7 (Breast cancer cell) and A549 (Lung Cancer cell) were determined by the MTT (Methylthiazolydiphenyl-tetrazolium bromide) assay. A549 and MCF-7 cells were exposed to ZnO-NPs and it exhibited 50% reduction at a very low concentration 31.2 μg/ml. Thus, the reduction in cell viability with NPs induces cytotoxicity in cancerous cells. There is a size dependent effectiveness of ZnO nanoparticles in the removal of cancer cells and also a positive correlation with reduced toxicity.

   

Full Text

 

Title:

Analysis of poverty: Using fuzzy triangular analytical hierarchy process

Author (s):

Raj Kumar and T. Pathinathan

Abstract:

Grading the poor helps the government to establish a better policy to distribute resources more reasonably, and therefore provide a government aid to the deserving families more effectively. The traditional single-factor model (Income and consumption expenditure model) is not adequate, because poverty grade analysis involves various factors of different weights. Some factors cannot be analysed by classical algorithm namely income – expenditure and consumption model. In this paper we establish a multi-criteria decision model (MCDM). We use fuzzy triangular analytical hierarchy process (FTAHP) to analyse poverty. We determine the indexes of poverty grade according to maximum membership degree which is derived from the Fuzzy AHP- Fuzzy Triangular Numbers comparison criteria importance matrices .In this way we quantify the qualitative data.

   

Full Text

 

Title:

Performance analysis of nutritional contents in food images using SARAN

Author (s):

Kavitha S. and  Pavithra S.

Abstract:

In the present day scenario, analysis of nutrition and calories in daily food intake has become indispensable. The increasing obesity problems have made a significant effect on the people to be concerned about the calories they consume. In this paper, we propose a food calorie measurement system that can help them to measure and manage daily food intake. This method is employed to identify if the food image is good or rotten. If it is found to be good then it is taken for calorie measurement analysis and classified based on standard calorific tables using Self- Adaptive Resource Allocation Network [SARAN]. Then, based on the BMI of a person, the result alarms about whether the food under analysis is suitable to the person or not. The results show that the accuracy of the system is acceptable and it will greatly improve and facilitate current manual calorie measurement techniques.

   

Full Text

 

Title:

Optimizing the parameters for friction stir welding of dissimilar aluminium alloys  AA 5383/AA 7075

Author (s):

S. Sivachidambaram, G. Rajamurugan and D. Amirtharaj

Abstract:

Aluminium alloys which exhibits very attractive mechanical, physical and chemical properties have intensive demand in various areas especially marine structure. In order to join aluminium alloys various welding methods are employed but the recent innovative and environmental friendly techniques is friction stir welding. In this study dissimilar aluminium alloys AA 5383 and AA7075 have been joined using friction stir welding. The factors which influencing the welding parameter are tool rotation speed, transverse feed which are varied to 700, 800, 900 rpm and 40, 60, 80 mm/min. The 6mm plates are joined by keeping the axial force constant at 10kN. The weldment is achieved using a square tool of pin diameter 8mm. The effect of welding parameters chosen are  evaluated using hardness testing to know the resistance to wear of the weld metal and tensile testing to know the properties and ductility of a weldment. The maximum tensile strength obtained is for the parameter of 700 rpm and 40 mm/min transverse feed produced a high tensile strength of 211MPa.

   

Full Text

 

Title:

Rapid control prototyping of voltage controller for three phase voltage source inverter

Author (s):

Saptarshi De, O.V. Gnana Swathika and S. Hemamalini

Abstract:

This paper presents rapid control prototyping of voltage source inverter (VSI). Control techniques for power converters are developing day by day. However, it is not practical to implement a controller in hardware to test its performance in real time. It is possible to implement the designed controller with real time simulator and then test it with the actual power converter circuit. Such a simulation is known as rapid control prototyping (RCP). In this paper, a three phase voltage source inverter (VSI) is designed and implemented in hardware and the control technique for the VSI is implemented using a real time simulator and then interfaced with the hardware model of the VSI. The main aim of this paper is to implement rapid control prototyping for verifying the performance of the controller designed for the specific power electronic circuit.

   

Full Text

 

Title: Intuitionistic pentagonal fuzzy number
Author (s): Ponnivalavan K.  and   Pathinathan T.
Abstract:

In this paper we define Intuitionistic Pentagonal Fuzzy Number and include basic arithmetic operations like addition, subtraction for Intuitionistic Pentagonal Fuzzy Number. We present examples for the above defined operations between Intuitionistic Pentagonal Fuzzy Numbers and also Score and Accuracy Function of an Intuitionistic Pentagonal Fuzzy Numbers.  Finally we give examples for Intuitionistic Pentagonal Fuzzy Number.

   

Full Text

 

Title: Simulation and analysis of CNTFET based inverter
Author (s): Gaurav Sapra
Abstract:

Carbon nanotubes due to its numerous extraordinary properties are turning out to be the forefront material for future electronics. In comparison to silicon based FETs, CNTFETs possesses higher k gate dielectric, quasi- ballistic transport at low voltage, higher transconductance, higher drive current, higher average carrier velocity, lower heat dissipation and higher switching speed. Due to all these advantages a lot of research has been done in modeling CNTFET based electronic devices. The high performance p type and n type single walled CNTFET devices are modeled using a Stanford University Verilog code in Symica DE simulator. This paper demonstrated CNTFET inverter by serially connecting p type and n type single walled CNTFETs models in simulator. Finally, a comparative performance analysis of CNTFET inverters over conventional and multi gate MOSFET inverters has been addressed.

   

Full Text

 

Title: Autonomous and voice enabled embedded wheel chair
Author (s): V. Ramya and T. Akilan
Abstract:

As the technology increases we can solve many problems of the people. There are lots of persons who cannot walk very easily due to blindness. For them traveling with safety is a major problem. An intelligent electric vehicle is thus required to solve their problem. The vehicle is made with a lot of technologies such as Digital image processing for obstacle detection, edge detection and road detection, Sonar based obstacle avoidance, GSM based emergency servicing and semi-automatic control system for vehicle. We propose a design of completely intelligent electric vehicle for  blind  which can be implemented  successfully. The vehicle is designed in such a way that it can climb footpaths. The vehicle is designed to obey all traffic signals so that the design is apt for real world.

   

Full Text

 

 

 

     

  

   

  

  

  

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

arpnjournals.com   Publishing Policy                                                  Review Process                                           Code of Ethics