ICECC-2014-International Conference on Electrical, Communication & Computing
"ICECC-2014 Conference Papers "
Enhancement of Reactive Power Compensation with DSTATCOM Inverter and MMC Technology Using Solar Photovoltaic Power[Full-Text ]
S.Amudha, Dr.C.KumarThis paper presents the design of the Distribution Static Compensator (DSTATCOM) a shunt connected device and inverter with Modular Multilevel Converter (MMC) topology into a single unit without any additional cost known as D-STATCOM INVERTER. When the source is connected to a nonlinear load, the generation of reactive power in the line is increased. In order to enhance the active power and to reduce the reactive power D-STATCOM along with INVERTER is used here. Active power required is obtained from solar which enhances the reactive power compensation. The MMC topology is a new type of Voltage Source Converter (VSC) for Medium or High-Voltage DC power transmission and other applications such as connecting renewable resources to grids. This inverter is used to control the active power Modulation Index and reactive power by using the phase angle. This inverter is placed between the grid and solar power to control the reactive and active power. This inverter provides utilities with more knowledge at end points of the distribution lines which is a cost-effective inverter and has a capability to regulate active and reactive power on distribution systems. Simulations of the D-STATCOM inverter, with 5 levels, have done by using MATLAB/Simulink.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Compensation of Voltage Unbalance using Unified Power Quality Conditioner[Full-Text ]
S.Thirukkovai, R.Anandha subalakshmi, Dr.S.M.GirirajkumarFast evolution of unbalanced loads and non-linear loads leads to lots of power quality problems such as harmonics and unbalance condition in three-phase supplying network. For global solution, Unified Power Quality Conditioner (UPQC) could be the most effective power quality protecting device for sensitive unbalanced loads, which require quality input supply. Active power filters (APFs) that have been explored in shunt, series configurations to compensate for current and voltage based distortions will play on important role for better quality solutions. UPQC can be used instantaneously in voltage or current control in a power distribution system. In the voltage control mode, the UPQC can force the voltage of a distribution bus to be balanced sinusoids. At the same time it can also perform load compensation resulting in the drawing of balanced sinusoidal currents from the distribution system bus. Both these aims are achieved irrespective of unbalance conditions in load currents or load voltages. The revalent simulation results to support the SRF-based control method presented in this paper is done using Matlab/Simulink. The proposed method is also validated through experimental study.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
The Advanced Smart Starter System - HTLC[Full-Text ]
Dr.K.Ayyar, Ann Mary AbrahamThe High Torque Low Current (HTLC) Starter is the new innovative motor soft starter system. This is a motor starting method for high inertia loads using a low voltage drive with input and output transformers to control motor torque and limit current when starting a medium/high voltage motor. The HTLC is a solution to motor starting problems where Direct on Line (DOL) or “Across the Line” starting is not feasible due to high in-rush current causing problems on the distribution system or where a reduced voltage starter cannot provide enough torque to achieve breakaway and accelerate the motor to full speed. The main features of HTLC starter system are reduction of starting inrush current from 600% to 10% and over 60% breakaway torque available during starting, significantly less costly than a fully rated VFD and multiple motors can be started from a single HTLC. The standard Synchronous motor, those designed for Line Supply and fixed speed, have brushless dc excitation and use built in induction motor features for starting. For the soft or weak line condition (allowed current <100%) the > 400% Direct On Line current will be unacceptable. Reducing the voltage will reduce the starting torque in proportion to the voltage squared, so there may not be enough torque. The HTLC system utilizes a VFD to ramp up the voltage and frequency from start to 100% speed. The relatively poor induction motor characteristics (small cage & high slip) prevent the synchronous motor from achieving good torque efficiency. The great benefit of the synchronous motor (with variable stator frequency) is that torque is proportional to the product of the stator and excitation flux.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A Permanent Magnet Brushless DC Motor Drive Based Voltage Controlled Power Factor Correction SEPIC Converter[Full-Text ]
BALAHEMALATHA.R,SARMILA HAR BEAGAM.K,SRINIVAS.K.NThis paper deals with a SEPIC DC–DC converter as a power-factor-correction converter for a permanent magnet (PM) brushless dc motor (PMBLDCM).It is fed through a diode bridge rectifier from a single-phase ac mains. A three-phase voltage-source inverter is used as an electronic commutator to operate the PMBLDCM. A speed control scheme for voltage source inverter (VSI) based PMBLDCM is developed and it is based on the control of the dc link voltage reference as an equivalent to the reference speed. The stator currents of the PMBLDCM during step change in the reference speed are controlled within the specified limits by an addition of a rate limiter in the reference dc link voltage. The proposed PMBLDCM drive (PMBLDCMD) is designed and modeled, and its performance is evaluated in MATLAB–SIMULINK environment. Simulated results are presented to demonstrate an improved power factor at ac mains of the PMBLDCMD system.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Sliding Mode Control For Speed Control Of Brushless DC Motor[Full-Text ]
Bharathi.N, Dr.A.Kavitha, B.BarathyThis paper presents a effective speed control of permanent magnet brushless DC motor drive using sliding mode controller based on reaching law. This drive system provides the advantages of PMBLDC motor and can be used in light electric vehicles and other adjustable speed drive applications. Speed regulation of a permanent magnet BLDC motor drive with various cases of reaching law based on sliding mode controllers is implemented for outer loop speed control of the drive. Performance of the speed tracking is then compared with a classical PI controller. Advantages of the proposed sliding mode control related with reduction of steady state error, settling time and percentage overshoot are summarized.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Low Cost Speed Sensor less PWM Inverter Fed Induction Motor Drive[Full-Text ]
C.Saravanan, Dr.M.A.PanneerselvamAn analysis of the PWM inverter induction motor drive with speed sensor less control is controlled by DC link current is presented in the paper. The first part of the paper is devoted to the verification of dynamic possibilities of the proposed concept of the control by means of simulation. The second part of the paper is devoted to the optimization of steady state performance. At the end the result achieved on the prototype model for 1.5Kw were presented.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Unified Power Flow Controller for Efficient Man-agement of Power Flow in a Five Bus System during Switching of a VAR Load[Full-Text ]
T. J. Catherine, S. RamkumarThis paper illustrates the efficacy of UPFC, in controlling power flow in a transmission system. Usefulness of a UPFC in controlling the power flow during normal operation as well as during a sudden demand in power on connecting a high Var load is demonstrated. Performance of a 5 bus transmission system is simulated with and without a UPFC, using MATLAB software. It is proved that the introduction of UPFC not only improves the power flow but also improves the voltage regulation without compromising the dynamic performance of the system.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Mitigation of Fault Current Level using Super Conducting Fault Current Limiter in Wind Turbine Generation Systems[Full-Text ]
JK Chithra, M.Panneerselvam, Dr. P. PrakasamWith the continuous increase of power demand, the capacities of renewable energy generation systems are being expanded. With the increased penetration of wind energy as a renewable energy source, there is a need to keep wind turbines connected to the grid during grid faults. The ability of WTGS (Wind Turbine Generation System) to remain connected to the grid during faults is termed as Fault-Ride Through capability (FRT) of the system. In this paper, the use of superconducting fault current limiter (SFCL) is proposed to improve the FRT capability of WTGS thus improving reliability of the system. A Doubly-Fed Induction Generator (DFIG) is considered as a wind-turbine generator for analysis. Detailed simulation results are obtained with and without SFCL considering the stator and rotor currents. Also, the voltage profile, real and reactive power magnitudes are analyzed. The computed results ensure that SFCL is effective in mitigating the fault current magnitude which would enhance the reliability and stability of the system as a whole.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Sliding Mode Control of a CLL Resonant dc to dc Converter for Fuel Cell Applications[Full-Text ]
N.Dhivya Aishwaryaa, Dr.K.Krishnamoorthi, Dr.R.ShivakumarIn this paper, an isolated dc/dc converter is proposed for fuel cell applications. The output voltage from the fuel cell is very low typically about 30 volts. Hence the fuel cell output has to be conditioned so that it can be used for interfacing to the load. The proposed converter is composed of two parts, a boost converter and a CLL resonant converter. The CLL converter can be designed to have an optimal switching, regardless of the load conditions. A sliding mode control strategy for the proposed converter is also presented. Sliding-mode control has been widely used in both nonlinear and linear systems. It is well-known for its strong robustness against parameter uncertainties and load variation. The proposed controller operates at two fixed switching frequencies with sliding-mode control implementation. Simulink circuit models are developed for the proposed design and the results are used to validate the performance of the proposed sliding mode control strategy.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A Smart Way of Switching Loads in Automatic Voltage Regulator Loop by Predicting its Gain Margin[Full-Text ]
Gayathri Devi Ramaraj, Sriram Rangarajan, Abhinav Venkatraman, Kaushik Rao Ramkumar.Constancy of the Generator terminal voltage is achieved by Automatic Voltage Regulator (AVR) loop. Conventional AVR uses supply dispatch where it senses the voltage changes only after the load gets connected to the grid. This paper attempts to implement demand dispatch such that the loads are made smart and can predict the voltage change in the system before they get connected to the grid. The excitation of the generator is changed prior to the load getting connected, thus preventing voltage collapse due to reactive power changes.The simulation results are obtained using MATLAB for a three phase induction motor by predicting its change in voltage before it connects to the AVR loop.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Implementation of Level shifting Multiple input switched capacitor voltage copier using summation and subtraction circuits[Full-Text ]
J.Agnus Jenith, S. BalajiHigh-efficiency dc–dc converters with high-voltage gain have been researched due to increasing demands. In recent years, multiport (multi-input–multi-output) dc–dc convertors are widely used in photovoltaic systems. The Portable consumer products consists of different sub modules and they require varied voltage or current levels of power supplies. In this paper, a level-shifting voltage-copier circuit is implemented to convert one or two input voltage levels to multiple voltage levels. The voltage copier consists of five kinds of conversion circuits. Each circuit includes only six to seven electronic Components, which can ensure the simplicity and reliability of the voltage copier. A resonant inductor is further added to improve the performance of the circuits implemented. Therefore a high-efficiency resonant voltage copier circuit is introduced. Simulation and experimental results verify the performance of the voltage copier and the design method. The circuit is simulated using MATLAB Simulink. The circuit is implemented using embedded controller. Both Simulation and Hardware results will be verified.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Minimization Of LossesIn Radial DistributionSystem UsingNetwork Reconfiguration[Full-Text ]
J. NethajiThis paper presents a solution technique of solving network reconfiguration problem with the aim of minimizing Real power losses of the system for an explicit set of loads. Amongst reasonably a lot of performance standards considered for optimal network reconfiguration, voltage constraint is a significant one. This problem calls for the determination of the best combination of feeders to be opened in the Radial Distribution system (RDS) so that the resultant RDS provides the optimal performance in the preferred settings. In answering this problem, a new optimization technique called as Dijkstra Algorithm (DA) is used to reconfigure the RDS. DA follows an unique pattern for sustaining the radial nature of the network at every stage of the solution. The anticipated scheme minimizes the objective function which has been given in the problem formulation so as to reduce the I2R losses in addition to balancing of loads in the feeders. The solution method includes determination of the best switching combinations and calculation of power loss and voltage profile. The practicality of the anticipated technique is confirmed in an IEEE standard Test distribution network, where the results obtained are compared by means of available literatures. Correspondingly it has been observed from the results that the network losses are reduced when the voltage stability is improved through the network reconfiguration.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A Secured Message Digest for Efficient Database Using Improving Synchronization Algorithm for Mobile Devices[Full-Text ]
D Sathya, G AyyapanA Database Synchronization Algorithm for Mobile Devices proposesan ISAMD (Improved Synchronization Algorithms based on Secured Message Digest) algorithm based on secured message digest and efficient synchronization in order to facilitate data synchronization between a server-side database and a mobile database.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Wind Tunnel Instrumentation System[Full-Text ]
Karthigeyan S, Jai Bhavani K S, Jenifer ZThe measurement and control applications for wind tunnel testing typically include the wind speed measurement and control, pressure profile measurement and model balancing with respect to the wind in the tunnel. These measurement and control applications are difficult as well as time consuming hence needs to be automated. This paper presents the implementation aspects of a reliable and automated wind tunnel instrumentation system using LabVIEW and performance analysis using MATLAB. The automation is done by controlling the tunnel wind speed control, model balancing, auto switching of the wind tunnel at critical temperature.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Optimal Capacitor Placement in Radial Distribution System using Group Search Optimization Algorithm[Full-Text ]
Mr. Y. Mohamed Shuaib, Dr. M. Surya KalavathiPower generated in generating station is transmitted through transmission lines and fed to the consumers through distribution substation. The power distributed in to the network has losses, which is greater in distribution system than the transmission system. This problem could be addressed by placing capacitor at strategic location due to which the kW loss can be minimized by improving the voltage profile. This paper involves two methods where the first method being the Sensitivity Analysis and the second method is the Group Search Optimization Algorithm (GSO). Sensitivity Analysis is a methodical technique which is used in order to reduce the search space and to arrive at an accurate solution for recognizing the locality of capacitors. Capacitor values are allocated for the respective locations using GSO. The proposed approach is demonstrated by employing the IEEE 33 bus test system. Computational results show that by taking capacitor settings, one can minimize kW losses more efficiently.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Electromagnetic and Thermal Analysis Of An Synchronous generator[Full-Text ]
Olivia Ramya Chitranjan, V.GowrisreeThe basis of any reliable and diagnostic method of all electrical machines is an understanding of the electric, magnetic and thermal characteristics of the machine under a healthy condition and a fault condition. The processes are intrinsically coupled and the study of interdependency of electromagnetic and thermal behavior of a machine is unavoidable. In this paper the magnetic field and thermal distributions provided by Finite Element Method (FEM) simulations using ANSOFT2D, along with analytical calculation essential in foreseeing the changes in the performance of the stator and rotor of a low 7KVA, 4 pole, 30 slot Synchronous Generator is done and studied. The main aim of the project is to analyse and suggest an optimal design with best Electromagnetic and thermal performance
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
AN APPROACH TO ACHIEVE MAXIMUMPOWER POINT TRACKING USING PV SYSTEM FOR BUCK CONVERTER[Full-Text ]
A.Preethi and S.Devi VidhyaA solar cell is a non-linear power source and its output power depends on the terminal operating voltage. As the intensity of light falling on the panel varies, its voltage as well as its internal resistance both varies. It is necessary to operate a solar photovoltaic panel at its maximum power point to achieve high efficiency and maximum power transfer. Maximum power point trackers (MPPT) are used to operate a photovoltaic panel at its maximum power point. To extract maximum power from the panel, the load resistance should be equal to the internal resistance of the panel. This Paper represents a simple an systematic approach to achieve an Maximum power transfer in solar micro grid applications by impedance matching with a dc–dc converter with maximum power point tracking by the perturb and observe method. The MPPT is simulated and studied using MATLAB/SIMULINK
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Active safety and security system in vehicle based on ARM microcontroller[Full-Text ]
R.vinoth, S.Joyal IsacThe paper presents the system which prevents accident and theft of the vehicle using ARM7 microcontroller. The system consists of two CCD cameras, ultrasonic sensor, accelerometer, GSM module and ARM7 microcontroller. One camera with IR led setup is used for finger vein detection for authentication. The other camera is used for fatigue detection of driver by monitoring the position of eye. If driver’s eye is closed for particular interval of time the controller warns the driver by giving alarm. The MATLAB software is used for processing the image of finger vein and compare with stored image in database using template matching. If the captured finger vein image matches with image in database, the LCD display shows access granted and vehicle starts otherwise it will shows access denied. The line detection algorithm is used for detecting vein in the image. The PCA classification is used for feature extraction of eye from the image. The accelerometer is used for detecting the movement of the wheels. The ultrasonic sensor is used for collision avoidance and distance measurement between obstructions behind the vehicle. If the distance between the vehicle used and leading vehicle is below the preset values stored in microcontroller the vehicle slows down and collision will be avoided. The system provides complete safety and security to the vehicle.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A Control Reconfiguration Strategy For Hall Sensor FTC In Bldc Motor[Full-Text ]
N.Rajendran, M.ManikandanThis project deals with a reconfiguration strategy for sensor fault-tolerant control (FTC) in brushless DC motor based electric vehicle. The proposed active FTC system is based on two control techniques: Hall effect sensor in the case of healthy sensors and sensor less control method based on current feedback in the case of failed hall sensors. The main objective behind the reconfiguration from one control to another sensor-less control is to achieve a short and smooth transition when switching from a controller to another sensor less controller in the case of a sensor failure. The scheme describes the modeling of brushless DC motor drive based on sensored and sensor-less control methods. For sensored control, commutation logic is obtained from rotor position detection using hall effect sensor feedback. for sensor less control, it is obtained from current feed-back form the BLDC motor. The motor operations are modelled in MATLAB/SIMULINK the entire drive is simulated.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A Universal Multistage High Brightness LED Driver for Domestic and Industrial Lighting Application[Full-Text ]
S.Rajesh, S.Subash Chandra BharathiThis paper presents the multistage high brightness (HB) LED driver for the application of domestic and industrial lighting. This paper focus on the reliability because of the LED’s life may last for greater than 50,000 hours but the drivers may not; hence the driver design has to be such that they outdo the life of LED’s. The existing two stage HB LED driver is modified here as three stages to improve its reliability as well as the performance. The three stages are PFC boost converter, asymmetric half bridge converter and a current controlled buck converter. Each stage performs separate tasks to improve the efficiency of the driver circuit. This paper focussed on life and efficiency of the HB LED driver.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Study of Thyristor Controlled Series Compensator for the Enhancement of Power flow and Stability[Full-Text ]
Sangheetha AP, Dr.S.PadmaOne of the biggest challenges in power industry is to transmit the power with minimal losses and at the same time with good stability and controllability. Though newer technologies enable one to install modern power transmission network and associated facilities that can achieve efficient power transmission, it is not always possible to replace the older power networks with newer ones. Hence, cost-effective solutions need to be provided to improve the efficiency and minimize transmission losses. In this regard, Flexible Alternating Current Transmission System (FACTS) technology has been proven to be a promising solution in improving the power transmission capacity and controllability in already existing power networks. There are different types of FACTS controllers proposed for the regulation of power system. Those controllers are shunt controllers, series controllers and the combination of both. This work focusses on the series controller- Thyristor Controlled Series Compensator (TCSC). TCSC enhances power flow in the system and provides a continuous control of operating region. Different operating regions of TCSC are analyzed by varying the firing angle of thyristors and the impedance characteristics are visualized using the MATLAB software. TCSC is operated in both open loop and closed loop conditions. The results show that closed loop control of TCSC provides a better performance than the open loop system. The resonance region for the proposed system configuration is simulated using LABVIEW software. Transient stability analysis of the system with and without TCSC is performed. The simulation results show that TCSC is capable of increasing the power level and improving transient stability.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Implementation Of Fuzzy Logic Controller To Improve Dynamic Performance Of DC-DC Boost Converter[Full-Text ]
S.Sasikala, Dr.V.Jamuna, R.Revathi, G.ShanmugapriyaFuzzy logic is recently era getting increasing emphasis in process control applications. For regulating DC-DC boost converters, the algorithm of a fuzzy controller is designed. An explanation about fuzzy logic controller and its application is also discussed in this paper. Fuzzy controller is evaluated by computer simulations @Mat lab of the closed-loop performance of boost converters in respect of load regulation and line regulation. The divergence between input and output voltages in fuzzy controller is much smaller when compare to other controllers(PI controllers),good performance of transient responses under varying loading conditions and better efficiency are achieved.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Multiple Sensitive Attributes based Privacy Preserving Data Mining using k-Anonymity[Full-Text ]
P.Usha, R.Shriram, S.SathishkumarData mining is the process of extracting interesting patterns or knowledge from large amount of data. With the development of Data mining technology, an increasing number of data can be mined out to reveal some potential information about the user, because of which privacy of the user may be violated easily. Privacy Preserving Data Mining is used to mine the potential valuable knowledge without revealing the personal information of the individuals. k-anonymity is one of the Privacy Preserving model that aims at making the individual record be indistinguishable among a group records by using techniques of generalization and suppression. The existing approaches are based on homogeneous anonymization that anonymizes quasi attributes by choosing a single sensitive attribute. This approach causes high information loss and reduces the data utility. To overcome these issues in the existing system, Clustering based non-homogeneous anonymization system is proposed. In the proposed system, instead of selecting a single attribute, multiple sensitive attributes are selected. Generalization technique is applied on the most sensitive attribute and it is clustered. Based on the sensitivity level of the clusters, non-homogeneous anonymization technique (generalization and suppression) is applied to the identified quasi attributes of each cluster. The remaining non sensitive attributes are directly published. Thus the proposed system achieves high degree of data utility, reduces information loss and also achieves high degree of Data Integrity.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Wireless Xml Streaming Using Lineage Encoding[Full-Text ]
Sathiya GWith the rapid development of wireless network technologies, wireless mobile computing has become popular. Here, defined a streaming unit of a wireless XML stream called G-node to make wireless broadcasting more efficient. G-node enables mobile client to skip downloading of irrelevant data. For efficient XML twig pattern query processing, proposed two techniques such as Structure Indexing and Attribute Summarization. Structure Indexing directly captures the structural information of XML elements and Attribute Summarization reduces the size of the wireless XML stream. Here proposed Lineage Encoding to represent parent-child relationships between elements in G-nodes. Lineage Encoding makes use of light-weight and efficient bit string representation also provides algorithms for generating wireless XML stream. This scheme is the efficient wireless XML streaming approach where scalability, energy-efficiency, latency-efficiency and effective utilization of bandwidth are achieved.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Fault Diagnosis Of Induction Motor Using Vector Control Technique[Full-Text ]
R. SENTHIL KUMAR,V.GANAPATHY, K.PREMKUMAR, K.PRATHIBANANDHI, T.HARI PRASADMotor current signature analysis is the reference method for the diagnosis of induction machine faults in vector control technique. In the special reference frames electromagnetic torque of the smooth air gap machine is similar to the expression for the torque of the separately excited DC machine. Variable speed drive applications are common in the aerospace, electrical appliance, railways, and automotive industries and also in electric generators for wind turbines. In this paper, a simple and effective technique is presented that allows the diagnosis of machine faults for induction machine drives using vector control technique. In case of induction machines the control is usually preformed in the reference frame (d-q) attached to the rotor flux space vector. Simulation and experimental results are shown to validate the proposed scheme.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Wind–Hydro Hybrid System using PMSG and Pumped Storage in a Grid Connected Power System[Full-Text ]
R.Soundarapandian, B.S.AbdurThis paper deals with a new grid connected wind-hydro hybrid generation system employing one Permanent Magnet Synchronous Generator (PMSG) driven by a variable –speed wind turbine and another PMSG driven by a constant power hydro turbine with a reversible Francis turbine for pumping operation. The proposed system utilizes two back to back connected Pulse Width Modulation controlled diode and a MOSFET based voltage source converters. The main objective of the control algorithm is to achieve the Maximum Power Tracking (MPT) through rotor speeds and control of the magnitude and the frequency of the load voltage. Pumped storage system in a power system is one of the ways to raise the wind energy penetration. Utilizing two reservoirs at different altitude, pumped storage stores electricity by using surplus wind energy during times of low demand to pump water from lower reservoir to the upper reservoir as storable energy. During hours when demand is high, water is released from the upper reservoir to the lower reservoir to generate power to complement the imbalance on the grid. The required amount of power for pump is given by means of wind generation and excessive power is fed to power grid. The hybrid wind-pumped hydro system is modeled and simulated in MATLAB/simulink and the performances of the proposed system are studied for various wind- speed conditions.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
DUAL-INPUT ZVZCS DC-DC CONVERTER COMBINING A BHB AND A FB CELL[Full-Text ]
G.Tamilselvi, A.KamalThis Paper presents a new zero-voltage-switching (ZVS) isolated dc–dc converter which combines a boost half-bridge (BHB) cell and a full-bridge (FB) cell, so that two different type of power sources, i.e., both current fed and voltage fed, can be coupled effectively by the proposed converter for various applications, such as fuel cell and hybrid energy system. By fully using two highfrequency transformers and a shared leg of switches, number of the power devices and associated gate driver circuits can be reduced. With phase-shift control, the converter can achieve ZVS turn-on of active switches and zero-current switching (ZCS) turn-off of diodes. A 30–60 V input, 335 VDC output converter circuit is designed and simulated.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Minimization of Harmonics in Multilevel inverters with Unequal DC sources using Particle Swarm Optimization[Full-Text ]
D.Thenmozhi, Dr.M.BalajiMultilevel inverter (MLI) technology has recently emerged as a new kind of power conversion system that offers many benefits for high power applications. This paper focuses on Particle Swarm Optimization (PSO) based method for harmonic elimination in 7 level cascaded MLI. The main objective of this work is to eliminate lower order harmonics by solving non linear equations while satisfying fundamental components. The dc sources feeding the multilevel inverters are considered to be varying, and the switching angles are adapted to the dc source variation. This work focuses on PSO algorithm to obtain switching angles offline for different dc source values to minimize 3rd and 5th harmonic. With the switching angles obtained, Artificial Neural Networks (ANN) is trained such that the network can be used to determine the optimum switching angles corresponding to dc sources in real time .Simulation is done in Matlab/Simulink environment and the results indicate that switching angles obtained using PSO algorithm results in harmonic minimization. The results of PSO are validated using Genetic Algorithm(GA).
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Voltage Sag/Swell Mitigation Using UPQC[Full-Text ]
S.Thirukkovai, J.Venkatesan, Dr.S.M.GirirajkumarA new synchronous-reference-frame (SRF)-based control method is proposed in this project. It compensates power-quality (PQ) problems through a three-phase four-wire Unified Power Quality Conditioner (UPQC) under unbalanced and distorted load conditions. The proposed UPQC system can improve the power quality at the point of common coupling on power distribution systems under unbalanced and distorted load conditions. The main problem in the power distribution system is voltage sag, and voltage swell , to compensate these problems a power electronic device i.e., UPQC-(Unified power quality conditioner) is used in this proposed model . system. It is the combination of back to back connected series and shunt converters. The proliferation of power electronic based equipments has produced a significant impact on the quality of electrical power supply. The modern day equipments are highly sensitive to deviation from ideal sinusoidal voltages. Conventional power quality enhancement equipments are providing inadequate compensation. A very promising solution for supply voltage imperfection is UPQC (Unified Power Quality Conditioner). Unified power quality conditioners (UPQCs) allow the mitigation of voltage and current disturbances that could affect sensitive electrical loads while compensating the load reactive power. In this Paper, the simulation of UPQC connected system for voltage sag and swell mitigation is carried out using MATLAB 7.5 and the results are shown. The hardware implementation will be done using FPGA controller.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Modeling And Analysis Of Induction Motor Drive With Novel Multilevel Inverter[Full-Text ]
K.Vinothini, M.Jagabar Sathik,Dr. K.RamaniMultilevel Inverter has been recognized as an attractive topology for high voltage DC-AC conversion. Multi-level inverters are also the best form to solve power quality problems. However as the number of output level increases, the circuit becomes bulky due to the increase in the number of power devices. This paper presents a modified Cascaded H-Bridge Multilevel Inverter with reduction of power switches with the combined high and low switching frequencies. Feasibility of the developed approach has been identified with the optimum number of switches for electrical drives applications. In this paper, a detailed d-q modeling of a modified H-bridge multilevel VSI fed induction motor drive is developed. The simulation results are verified by using the Matlab/simulink 2009.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Modelling and Simulation of Single Phase Fifteen-level Inverter with Reversing Voltage[Full-Text ]
I .William Christopher, R .Ramesh, P.Sathiyabama, R.Pavithra, G.Ramyaselvi, P. SaranyaThis paper presents modeling and simulation of a single phase Fifteen-Level Inverter (FLI) with reversing voltage. Multilevel inverter offers high power capability. Its performance is highly superior to that of conventional two-level inverter due to reduced harmonic distortion, lower electromagnetic interference and higher dc link voltage. The inverter is capable of producing fifteen levels of output voltages (Vdc, 6Vdc/7, 5Vdc/7, 4Vdc/7, 3vdc/7, 2Vdc/7, Vdc/7, 0, -Vdc/7, -2Vdc/7, -3Vdc/7, -4Vdc/7, -5Vdc/7,-6Vdc/7,-Vdc) from the DC supply voltage. Theoretical predictions are validated using MATLAB Simulink tool box.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Analysis And Modeling Of New Modified Multilevel Inverter With PMSM Apllications[Full-Text ]
R.Yazhini, M.Jagabar Sathik,Dr. K.RamaniThis paper presents a new modified multilevel inverter with PMSM based on PI control technique. The proposed multilevel inverter using minimum number of switches and DC source. Where conventional multilevel inverters required more number of components, it seem to more complex control circuitry and bulky. For this complexities we achieve to reduce the number of switches in this proposed multilevel inverter will also reduce switching losses and conduction losses. The Total Harmonics Distortion and electromagnetic interference will be reduced in the proposed multilevel Inverter. The Proposed multilevel inverter output voltage level increased by using minimum number of switches driven by the multicarrier modulation techniques.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Technical Investigation on Microgrid and Power Quality Impact[Full-Text ]
R. Zahira, P. Sheshathri, M. Syed Shafiullah, Vishnu Prasad, S. VishnuA microgrid is a hybrid power system consists of several distributed generation resources and local loads, which provide the solution to supply premium power to remote or specific areas. A microgrid is electrically isolatable from the utility macrogrid and would often have sufficient cumulative capacity to meet the needs of those within in, although most microgrid concepts also specify a utility backup. Some microgrids could operate as full-time islands, while others could operate as part of the macrogrid during normal operation and only separate into an island during service interruptions. However, some undesired effects are accompanied with their installations and operations, such as imbalance, voltage fluctuation, and harmonics.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Effect of Group Velocity Dispersion (GVD) with and without initial Gaussian Chirp in Enhanced - Large Effective Area Fiber (E-LEAF)[Full-Text ]
Bhupeshwaran Mani, Chitra K, Sivasubramanian AIn this work, the effect and mechanism of Group Velocity Dispersion (GVD) in Enhanced- Large effective Area Fiber (E-LEAF) is studied. The mechanism of GVD is noted with chirped and unchirped Gaussian input pulse. Firstly, the effect of pulse broadening is noted with an unchirped pulse for various Dispersion lengths (LD) in the 20 Gbps system. Secondly, the effect of chirped pulse with an initial chirp (C) of 3 rad/sec is studied for various lengths. It is noted that the minimum pulse broadening for chirped pulse occur at the distance of 13.26 km while the dispersion length of E-LEAF without SPM is 44.21 km. Thus, the power in this case at the distance of 13.26 km, where the initial narrowing occurs is found to be 3.32mW.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Design of transceiver block using TFT-OFDMA for wireless systems[Full-Text ]
Dhivya Bharathi.R, Mrs.R.Uma MaheswariIn wireless communication, the use of multiple antennas both at the transmitter and receiver is a key technology to enable high data transmission. Multiple Input Multiple Output (MIMO) schemes are widely used in many wireless standards allowing higher throughput. In this paper, we propose the Time-Frequency Training OFDMA (TFT- OFDMA) transmission scheme for achieving high spectral efficiency as well as the bit error rate performance improvement. As the next generation wireless system is looking for multiple Gbps data rate, TFT OFDMA is proposed with low complexity. This paper proves the unification of the time and frequency domain channel estimation, whereby the path delays are firstly acquired by the time-domain received TSs without interference. Further implementation of transceiver architecture is done by FPGA Altera Cyclone IV E to support wireless standards with low complexity.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A Novel Method for Non linear effect Cross Phase Modulation due to various data rates in Dynamic Wavelength Routed Multifiber WDM networks[Full-Text ]
R.Hema, Dr.S. LakshmiThe optical communication might have achieved tremendous growth, but the fiber non linearity limits its performance. The non linear impairments in optical networks have crucial effects when data rates, transmission lengths, number of wavelengths in wavelength conversion and optical signal power level increases, so the non linear effects must be overcome.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Performance evaluation of ZigBee and Wi-Fi enabled Internet of Things[Full-Text ]
T.Vimala, Dr.Uma Raja ramZigBee, Wi-Fi and Bluetooth wireless communication systems use the ISM (Industrial Scientific and Medical) Band .Majority of Research works are indicating that ZigBee wireless technology is one of the best networks for low cost, low power and reliable control and monitoring applications. Recently, a lot of Internet based applications are becoming more popular such as VoIP, Instant messengers and email clients etc. Now more objects are embedded with IP address and communicate self using mailbox concepts. In this paper we have analyzed ZigBee nodes and Wi-Fi enabled Internet of Things.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Dynamic Channel Selection in Cognitive Radio for OFDM System[Full-Text ]
P.Perumal, Dr.M.MuruganIn this paper, we integrate overlay cognitive radio technology into 4G cellular networks for the sharing of TV spectrum. On one hand, OFDM is a promising technique for high-speed data transmission over multipath fading channels and has been considered to be the best candidate for 4G mobile networks. On another hand, the overlay cognitive radio model makes it possible to have two concurrent transmissions in a given interference region, where conventionally only one communication takes place at a given time. We investigate different service provision scenarios and propose both time domain and frequency domain overlay cognitive radio OFDM systems for next generation cellular networks. Numerical results show our proposedschemescan achieve satisfying performance in different use cases. Thus highly reliable cognitive radio scheme for OFDM based wireless communication proposed with increasing the spectral efficiency by two concurrent transmissions in a region and thesecondary users throughput is improved.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Optimization of Clusterheads and Gateways for Energy Efficient Routing in WSNs[Full-Text ]
S.Sivaramakrishnan, C.SenthilkumarIn wireless sensor networks, sensor nodes must report the sensing data to a central node, called the sink and this report always satisfies the report frequency required by the sink. This paper proposes a modified link aware clustering mechanism (MLCM) to support an energy efficient routing in WSNs. The main goal of the modified link aware clustering mechanism (MLCM) is to establish a persistent and reliable routing path by determining proper nodes to become clusterheads and gateways. In the MLCM, clusterhead and gateway candidates use the node status (e.g., residual energy), link condition (e.g., quality) and bandwidth (e.g., data rate) to determine a novel clustering metric, called the capable transmission count (CTX). It is defined as the number of transmissions that clusterhead and gateway candidates conduct. This metric can be determined by measuring the transmit power consumption, residual energy, link quality and bandwidth. The clusterhead or gateway candidate depends on a priority, derived from its capable transmission count (CTX) and to evaluate its qualification for clusterheads and gateways to construct clusters. The clusterhead or gateway candidate having the highest priority is elected as a clusterhead or a gateway, respectively. Simulation results confirm that the MLCM can achieve a high packet delivery ratio, extend the network lifetime, and reduce transmission latency.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Performance Comparison and Evaluation of Ad Hoc Routing Protocols[Full-Text ]
D.Sivakumar, B.SuganthiMobile ad hoc networks are self configurable where in nodes are mobile and they communicate with each other via wireless connections without fixed infrastructure. Due to the ever changing topology and limited bandwidth it is very difficult to establish and maintain good routes. Even though the traditional routing algorithms are widely used, usually do not meet the expectation in terms of performance. A number of routing algorithms using Swarm Intelligence from the collective behaviour of natural ants have been proposed for MANET. We focused on an adaptive and hybrid routing protocol AntHocNet as it combines the merit of proactive and reactive routing algorithms. In this paper we compare the AntHocNet, ACO based solution for hybrid ad hoc routing strategy with ad hoc on-demand multipath distance vector (AOMDV) routing protocol and AODV. An attempt has been made by using discrete event simulator NS2 and performance comparison carried with respect to packet delivery ratio, throughput, packet loss and end to end delay. In the simulation results, we observe the adaptability of AntHocNet routing protocol for changing traffic, node and link failures. The perfor-mance of AntHocNet significantly better than AOMDV and AODV.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Performance Evaluation of Survivability in Optical Networks Based on Graph Theory[Full-Text ]
D.Sheela, S.Abinaya, G. Angelo Virgin, S.ArchanaSurvivability is the ability of a network to withstand and recover from failures. Survivability in optical network is of prime concern since a node or a fiber link failure may result in huge amount of data loss. Network can be represented as a graph with nodes as vertices and links as edges. Interpretation of graph theory is very useful in evaluating and improving the performance of a network. In this paper, an important graph parameter known as algebraic connectivity is considered. The algebraic connectivity is the second smallest Eigen value of the graph which represents the robustness of the network. This paper proposes an approach in which the links are assigned with weights based on algebraic connectivity and the capacity is provisioned based on their weights. The performance of the proposed method is evaluated in terms of cost and loss of traffic due to link failures on real backbone optical networks.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Optimization of Power Allocation in Relay based Cooperative Communication using Amplify and Forward Protocol[Full-Text ]
S.Devipriya, N.VenkateswaranThis paper considers the power allocation problem in a single relay cooperative wireless system. In cooperative wireless systems, both source and relay transmits data in different phases. Here we optimize transmit power allocation (PA) for source and relay so as to minimize the average BER at destination. We use one of the global optimization techniques named Bacterial Foraging Optimization algorithm (BFOA). BFOA is an evolutionary technique based on the foraging behavior of Escherichia coli bacteria in human intestine. This algorithm has been applied to solve many real-world optimization problems arising in several application domains. Performance of power optimization using BFOA, that uses BER minimization as objective function has been analyzed and it is shown that performance of proposed scheme with BFOA optimization based power allocation outperforms equal power allocation scheme in the high value of SNR.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Sensory - Data - Enhanced Authentication by Accelerometer Sensor for Access Control Systems[Full-Text ]
G. Annapoorani, K. Prem KumarAccess card authentication used to specify the authorized persons and maintains the static information about them. It provides access to their authorizers in various governments, commercial and banking locations. By exchanging the information among the access card and its clients, access card plays a vital role to fight against stolen, loss and duplications of the access cards. In the proposed work, it merge the access card ID information and sensory information obtained from accelerometer sensor and introduces a dynamic authentication system. This can be able to solve the issues like access card loss, stolen and duplication. This solution is backward-compatible. This helps to increase the authentication key space and thereby make the environment more secure. We theoretically demonstrate simple rotations can increase key space by more than 1, 00,000 times and with an authentication accuracy of 90%. We implemented the simulations under different scenarios and applied our design to achieve the system performance experimentally.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A Hybrid Approach to detect a text in Digital Images[Full-Text ]
R. Bhavadharani, A. ThilagavathyIn this paper we present an effective approach to detect text from an image. Detecting text from an image is of great demand. Image that contains text usually have a wide variety of applications. In this paper we present an edge based approach to detect text from an image. Given an input image it is first pre- processed to remove any noise; the image is grouped into different color layers and a gray component. The region with a possibility of text in the image is detected. This approach utilizes the fact that usually the color data in text characters is different from the color data in the background. The process of localization involves further enhancing the text regions by eliminating non- text regions. Dilation operation is then performed on those texts to group them, thereby eliminating pixels that are far- away from the candidate text regions. The robustness of this approach is concluded by conducting various experiments on images with complex style, type, background, scaling etc. The results from this proposed approach shows us that it is far superior to the existing approaches in terms of false positive and false negative. Experiments are conducted over a large volume of ICDAR datasets to demonstrate the effectiveness of our proposed method.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Performance Analysis of Low Energy Adaptive Clustering Hierarchy and Optimization[Full-Text ]
M.SanjanaWireless Sensor Networks (WSNs) consist of small nodes with sensing, computation, and wireless communications capabilities. Many routing, power management and data dissemination protocols have been specifically designed for WSNs where energy awareness is an essential design issue. In this report, the performance of LEACH (Low-Energy Adaptive Clustering Hierarchy), a clustering-based protocol that utilizes randomized rotation of local cluster-based protocol that utilizes randomized rotation of cluster base stations (cluster-heads) to evenly distribute the energy load among the sensors in the network is analyzed. LEACH uses localized coordination to enable scalability and robustness for networks, and incorporate data fusion into the routing protocol to reduce the amount of information to the base station. It is able to distribute energy dissipation evenly throughout the sensors. Simulations are run in the simulator tool Castalia to study the effects of different parameters on the network lifetime and optimal values of parameters are determined.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Secure Multicast Routing in Wireless Mesh Networks against Sybil Attack[Full-Text ]
Dhivya.JWireless Mesh Networks (WMNs) have become one of the important domains in wireless communications. They comprise of a number of static wireless routers which form an access network for end users to IP-based services. In this paper, an efficient and secure mul-ticast routing on such wireless mesh networks is concentrated. This paper identify novel attacks against high throughput multicast protocols in wireless mesh networks through S-ODMRP protocol. Recently, Sybil attack is observed to be the most harmful attack in WMNs, where a node illegitimately claims multiple identities. This paper systematically analyzes the threat posed by the Sybil attack to WMS. The Sybil attack is encountered by the defense mechanism called Random Key Predistribution technique (RKP). The performance of the proposed approach which integrates the S-ODMRP and RKP is evaluated using the throughput performance metric. It is observed from the experimental result that the proposed approach provides good security against Sybil attack with very high throughput.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Feature Extraction and Classification of Hyperspectral Images using Novel Support Vector Machine based Algorithms[Full-Text ]
P.Elaveni, N.VenkateswaranIn this paper, Hyperspectral image feature extraction and classification using two algorithms KPCA-SVM and ICA-SVM is proposed. Hyperspectral images are high dimensional, with a large amount of spectral and spatial information. Spatial information describes the physical features such as the texture, color etc. of the materials present in the hyperspectral image of interest, while the spectral information comprises of the reflectance values of these materials across different wavelengths. In this paper, principal components and Independent Components are chosen as the feature of interest. They are extracted by using the Kernel Principal Component Analysis and Independent Component Analysis algorithms respectively. These features are then used for training the Kernel based Support Vector Machine (SVM) to perform the classification process. Simulations are carried out to verify the efficacy of KPCA vs. ICA methods.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Analysis of Variational Methods in Image Restoration[Full-Text ]
D.Aishwarya, N.VenkateswaranIn this paper, image restoration using Variational methods based on Partial Differential Equation is presented for the removal of blur and noise. The algorithms presented are aimed to reduce the total variation in the image degraded by the noisy environment. Compared to linear filtering methods which introduce spurious oscillations at the abrupt jumps of the signal, the methods presented found to be superior. Extensive simulations have been carried out to show the effectiveness of our algorithms. Simulation results show improvements both visually and quantitatively compared to the observed image. In addition, it is capable of removing both multiplicative and additive noise from the image that is affected by blur.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Analysis of Enhancement Techniques for Retinal Images[Full-Text ]
Nirmala K, Venkateswaran NIn this paper, analysis of retinal image enhancement techniques is presented to facilitate the detection of certain pathologies and for automatic extraction of anatomical ocular structures. Adaptive gamma correction, modified histogram equalization, adaptive intensity transformation, dynamic stochastic resonance and principal components analysis enhancement techniques are applied on the retinal images and the performance is compared. The simulation results indicate PCA enhancement technique is better for further analysis of any retinal disorder diagnosis.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Gender Recognition From Face Images Based on Textural Analysis and Machine Learning Approach[Full-Text ]
S.MuthuPandian,P.RadhaKrishnan,S.PrakashThe system gender classification from face images based on textural analysis and an artificial neural network. Face granulation process is applied for input faces for slices representation using Difference of gaussian approach. Here Weber’s Local Descriptor is used for gender recognition. Here this local descriptor extends it by introducing local spatial information through divide an image into a number of blocks, calculate WLD descriptor for each block and concatenate them. This spatial WLD descriptor has better discriminatory power and followed by statistical features are evaluated which is useful to distinguish the maximum number of samples accurately and probabilistic neural network with RBF kernel classifier will be used as classifier. The simulated results will be shown that spatial WLD descriptor with used classifier gives much better accuracy with lesser algorithmic complexity than state of the art gender recognition approaches
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Comparison between Lossless Compression of the Dithered Image Using Pseudo-Distance Transform and Modified Pseudo-Distance Transform[Full-Text ]
R.Divya,M.K VidhyaLakshmiWhen high-bit resolution images is to be displayed in low bit resolution display devices, the total number of bits in an image is need to be reduced especially for low cost or small (mobile) devices. To solve the bit reduction problem, a color quantization technique is used called dithering. This dithering technique is employed on high bit resolution images. The dithering process is used to reduce number of colors but it cannot be used efficiently for storage and transmission . For the storage and transmission of images, several compression techniques have been proposed in past decades. To improve the compression ratio, compression techniques that takes data structure into account must be developed. In this paper, the pseudo-distance transform is used for dithered images, it yields better compression ratio results than in GIF and PNG.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A New Time Reduction Encoding Scheme for Contourlet based Fractal Image Compression[Full-Text ]
Vidhyalakshmi M.K, Surya S, Dr. S LakshmiA Image Compression algorithm based on Fractals in Contourlet domain is presented. Fractal Image Compression finds the self-similarity property of an image using Partitioned Iteration Function System (PIFS) to encode it. The major problem of FIC is poor image quality in high compression ratio and requires more computation time. In this paper, a new FIC scheme is proposed to improve the image quality at higher compression ratio and speed up the compression algorithm using Contourlet algorithm along with Genetic algorithm. This proposed algorithm compares the parameters BPP, CR, processing time and PSNR.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Contourlet Based Feature Extraction Method for Classification of Breast Cancer using Thermogram Images[Full-Text ]
B.BalasuganyaBreast cancer is the most common cause of cancer deaths among in women worldwide. Thermography is a non-invasive, non-contact imaging technique as well as not using radiation or compression for capture the images, so it is widely used in the medical arena. Medical thermography has proved to be useful in various medical applications including the detection of breast cancer where it is able to identify the local temperature increase caused by the high metabolic activity of cancer cells. Breast thermography is a safe and painless diagnostic procedure for an early detection of breast cancer. This paper proposes a Contourlet transform based GLCM features for the classification of breast thermogram images. These features are calculated from cancer and normal region and classified into normal or abnormal by using SVM network.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Extraction Of Exudate And Hemorrhage In Ocular Fundus Image Using Morphological Operations[Full-Text ]
R.Sathya Priya, S.KalyaniDiabetic Retinopathy is a major cause for blindness. The primary sign of these diseases are the formation of exudate or hemorrhage which may lead to sight degradation. The conventional method followed by opthalmogists is the regular supervision of the retina. As this method takes time and energy of the opthalmogists, a feature based algorithm for the detection of exudate and hemorrhage in color fundus image is proposed in this work. This method reduces the professionals work to examine on every fundus image rather than only on abnormal image. The method is based on segmenting all objects that have contrast with the background including the exudate and hemorrhage. The exudates are yellow lesions formed due to the leakage of proteins and lipids from the retinal blood vessels while the hemorrhages are red lesions formed due to the leakage of blood into the interior surface of eye. The optic disc that best appear in red component are detected using Hough transform while the blood vessels that best appear in green component are extracted using morphological operations and local entropy thresholding. The extracted features are removed in order to obtain the initial part of the exudate and hemorrhage. Then the final part of the exudate and haemorrhage are separated from the fundus image using morphological reconstruction algorithm using the statistical colour properties.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Development of a cost effective set up in a Surface Plasmon Resonance based Instrument using an USB interfaced Embedded Controller & GUI on a PC[Full-Text ]
M.Rajavelan, S.Ananthi, K.PadmanabhanIn a typical Surface Plasmon Resonance based instrument, a right angled prism is used in the optics. A laser beam is shone on one side of the prism, which passes via the hypotenuse side of the prism by refraction. But, above a critical angle of incidence, the beam is totally reflected internally and passes out of the second side of the prism. A gold plated glass plate is kept on the surface of this hypotenuse. In a standard SPR, the positioning of the gold plate will be adjacent to the analyte solution, which will be a flow cell comprising of the liquid chamber. So, depending upon the flow cell component and refractive index (R.I.), the Surface Plasmon resonance taking place in the gold, causes a dip of the reflected light, which is sensed by a photo detector. The angle at which this occurs shifts if the flow cell fluid R.I. changes. It is a very sensitive change and is therefore used for detecting and analyzing biological samples, particularly proteins. An SPR prototype instrument setup is developed and its results are also verified with the simulation results. The SPR generated in real time is also plotted in a laptop computer by a suitably developed HID based visual basic program interfaced through a programmed PIC 18F2550 microcontroller. The design principles are explained bringing out the cost effectiveness of the same.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Power Efficient 3VL Memory Cell Design Using Carbon Nanotube Field Effect Transistors[Full-Text ]
S.Tamil Selvan, Dr. M.Sundarajan,G.LaxmanaaThis paper presents a design of a 3VL memory cell using carbon nano-tube field-effect transistors (CNTFETs). 3VL is a promising alternative to conventional binary logic, as it has better performance in terms of area, power and also reduces interconnect delay. This cell uses a control gate for the write and read operation to make them separate. Transmission gate is used as control gate in this circuit. The CNTFET used for design has different threshold voltages to achieve ternary logic. This multi threshold voltage is obtained by varying the diameter of the CNT used. Chirality of the CNTFETs is utilized for varying the diameter of the CNT and it also avoids the usage of additional power supplies. The channel length used here is 18nm wide. The power consumption is reduced as there is absence of stand-by power dissipation. Second order effects are removed by using CNTFET in the circuit. The two memory operations, bit read and bit write operation of the proposed ternary cell perform correctly at 0.9V power supply. In a ternary system, it only takes log3 (2n) bits to represent an n-bit binary number. The proposed ternary memory cell achieves a significant saving in area compared with existing design since the ? rules are different for CNTFET. The parameters are measured using HSPICE.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Design and Simulation of Integrated FDD-RC for an UAV[Full-Text ]
N.Mahalakshmi,Dr.S.LakshmiAccording to a reliability study conducted by the US Office of the Secretary of Defense, about 80 % of flight incidents concerning unmanned aerial vehicles (UAV) are due to faults affecting propulsion, flight control surfaces, or sensors. To allow autonomous aerial vehicles to continue their missions, there is an absolute necessity to identify unexpected changes (faults) in the system before they lead to a complete breakdown (failure).The aim of the paper is to present the concept of the integrated system dedicated for Fault detection and diagnosis and Reconfigurable controller for the unmanned aerial vehicle (UAV). This work combines Stateflow with Simulink to efficiently model hybrid systems. This type of modeling is particularly useful for systems that have numerous possible operational modes based on discrete events. Traditional signal flow is handled in Simulink while changes in control configuration are implemented in Stateflow. In this paper, representation of a fuel control system for a gasoline engine is alsoimplemented. The system is highly robust in that individual sensor failures are detected and the control system is dynamically reconfigured for uninterrupted operation.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Design and Implementation of Testable Reversible Sequential Circuits and Garbage Output[Full-Text ]
Manikandan.B,Vijayaprabhu.AThe conservative reversible gates are used to designed reversible sequential circuits. The sequential circuits are flip flops and latches. The conservative logic gates are Feynman, Toffoli, and Fredkin. the design of two vectors testable sequential circuits based on conservative logic gates. All sequential circuit based on conservative logic gates can be tested for classical unidirectional stuck-at faults using only two test vectors. The two test vectors are all 1s, and all 0s. The designs of two vectors testable latches, master-slave flip-flops and double edge triggered (DET) flip-flops are presented. We also showed the application of the proposed approach toward 100% fault coverage for single missing/additional cell defect in the quantum- dot cellular automata (QCA) layout of the Fredkin gate. The conservative logic gates are in terms of complexity, speed and area.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
DESIGN OF A PHASE LOCKED LOOP AS A FREQUENCY MULTIPLIER USING SELF HEALING CIRCUIT[Full-Text ]
Miss.Kiruthika Priya.V, Mrs.L.Jiban Priya DeviHigh performance digital systems use clocks to sequence operations and synchronize between functional units and between ICs. The circuit performance are degraded by some factors such as variability, leakage and improper matching in the device. when this particular PLL is made in the CMOS technology, it will lead to some leakage and variability. This paper proposes the PLL design as a frequency multiplier using self-healing circuit that will detect the fault and compensate the condition. we use self-healing prescalar and self-healing VCO by Bottom level detector and Current compensator for the correct functioning. The complete design is done in PROTEUS software and checked.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
FPGA Based Implementation of Video Denoising Using Warped Filter[Full-Text ]
V.Thenmozhi, G.Themozhi.Noise in video signal plays a major problem in most of the communication systems. Video denoising is the process of removing noise from the video signal. In order to increase compression effectiveness and improve subjective quality of video sequences video denoising process using Warped Filter is done. Warped Filter is an all pass filter; it is widely used for various video and audio processing applications. This project proposes the design, simulation and implementation of a real time video denoising on FPGA. Contourlet transform is proposed as an alternative over Wavelet transform. The Gaussian noise presents in the input signal is removed effectively. Initially a software model is constructed using MATLAB, and then with the same data’s, the hardware implementation using FPGA is done for the proposed Video denoising architecture.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
DESIGN OF 2.4GHz 5W RF POWER AMPLIFIER USING GaN TECHNOLOGY[Full-Text ]
A.Banu priya, M.H.Masood, Rajesh KunnathThis paper presents the design of RF Power amplifier for WLAN(Wireless Local Area Network) application is a challenging job as it is required to meet stringent specifications like stable Performance of the system, operate at temperature extremes and other mechanical aspects. For narrowband operation (2.3-2.9GHz), it is necessary to design RF Power Amplifier with optimal gain around 13dB. The RF Power Amplifier using CREE GaN technology designed specifically for high gain, high efficiency and wide bandwidth capabilities for wi-fi and wiMAX applications. It plays a major role in amplifying the required high frequency RF signal without distortions and other impairments which would decrease the usefulness of the signal. To address this, efforts has been made to design an RF power amplifier operating at 2.4GHz of frequency by using GaN technology by using ADS software.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A Comparative Study of Pipelining Techniques for Recursive Filter Implemented in FPGA[Full-Text ]
Ayesha Firdous, Dr.B.RajanThis paper presents different pipelining approach for higher order recursive digital filter. The performance of the filter is increased by pipelining the filter. Clustered look-ahead, scattered look-ahead pipelining methods and implementation of IIR filter in FPGA are analyzed. Clustered look-ahead pipeline is not always stable. To achieve a stable pipeline filter scattered look-ahead pipelining is used. The second order all pole recursive filter is considered and 3-level pipelined transfer function is obtained using clustered look-ahead and scattered look-ahead pipelining techniques. The filter is implemented in direct form-I structure.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Area-Efficient Network-on-Chip Router In Packet Switching[Full-Text ]
S.Jayashree, K.Kavitha, R.PorselviNetworks-on-chip (NoC) has been widely proposed as the future communication paradigm for use in the next generation System-on-chip (SoC). Conventional analytic models for the performance analysis of Network-on-chip often possess a surplus amount of area and delay constraints, where the number and position of processor elements or faulty blocks vary during run time. Indeed, we propose an efficient router which reduces the number of slices and eliminates the use of arbiter which in turn reduces the area. A detailed comparative analysis with the existing method is performed in terms of area and delay. It is captured in the Verilog Hardware Description Language. Moreover, simulation results have confirmed that the proposed system is the most efficient one regarding with its performance.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Single & Multicarrier Daubechie Scaling Function Signals for Modulation of Digital Communication Signals[Full-Text ]
Dr.S.Ananthi, K.R.Balaji, Prof.K.PadmanabhanDigital modulation schemes use phase shifted sine wave segments to encode data symbols. Reception is based on phase detection. In this paper, a different scheme of encoding digital data using wavelet functions instead of sinusoidal waves is explained. We consider the use of Wavelet scaling functions of Daubechie (DB4 to DB24). They provide several clues for identification of the data symbol instead of just by one criterion viz., the phase of the carrier as in the PSK schemes. So, this method is found to be better in bit errors due to noise. Several schemes are developed, from 1 bit to 8 bits per symbol, using two to 16 wavelet based waveforms and additional amplitude and shift modulations, offering improved bit error ratio. It can also be proved mathematically to be superior to the normal sine modulation schemes. Further, the method has been extended to multi carrier modulation schemes similar to IEEE802.1x. Spectral method of demodulation has been tried and found successful in receiver decoding.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Cardiac Action Potential Observation with Multi Channel Electrodes & Digital Signal Processing[Full-Text ]
Dr. S. Ananthi, V.Vignesh, Prof. K.PadmanabhanThe ECG waveforms typically taken from an ECG recorder depend on the changes in external potential observed between body surface electrodes due to the heart’s conduction of impulses. The cardiac fibers have an action potential waveform which is due to the excitation of the nerves of conduction propagating through the heart chambers. Conduction of the cardiac action potential from the endocardial to epicardial cells occurs via cell-to-cell transmission. This waveform is a trapezoidal one with a sharp rise and a plateau region. The sharpness of the rise is of course conveyed on the ECG electrodes. But the variations in the plateau region are due to the slow Ca channels, drawing large amount of Ca inside during depolarization. The externally recorded ECG waveforms provide some information about the conduction in the heart. Abnormal muscular ischemia is also reflected in the conducted waveforms. Additional disturbances caused in the path such as bundle branch block etc can also be diagnosed from these waveforms. The leads 1, 2 and 3 are limb leads, which the AV leads, which are six, are positioned one by one on the chest wall in a definite anatomical layout. These signals portray the ventricular activity. Apart from a rather broad outline of the conduction in the heart, this macro ECG signals do not enable localized problems to be identified. For this purpose, a method of multiple electrode data acquisition in a simultaneous manner is proposed and implemented in this paper. Much like the six AV leads; additionally many electrodes are kept on the chest wall in suitable points around the myocardium. These signals are all taken simultaneously. It is well known that the ECG signal externally observed is but a derivative of the action potential waveforms in the fibres. The ECG, through its peak crest and breadth of the QRS complex provides but limited information about the speed of propagation of the cardiac impulses. When we use multiple electrodes e1 to en, we are able to obtain differential signals from any two consecutive electrodes. From this, by integration, the pattern of the action potential waveform propagating in this region inside is available. In the ventricular conduction, the width of the plateau period is indicative of contractile force of the fibres. The time course and space course of the variation of the plateau period is to be obtained for each and every heart beat. This information provides ample data on the uniformity of the conduction, much less the problematic conduction disturbances easily, even at a premature stage of malfunctioning. For this purpose, real time data acquisition is to be done from multiple channels. We employ the very same pre amplifiers used in standard ECG machines and then digitize the analog signals at a suitable sample rate. The SDK 6747 kit is used with its ADC in multiple channels. The data acquired is processed through a DSP program. This program does real time instantaneous calculations of the integrated signals from the n electrodes. The pattern of variations of the rise time, plateau and tail slope are recorded and displayed. The data so acquired is fed to the computer through the available communication port on the DSP kit. The data is received by a MATLAB program which evaluates many parameters about the spatial and temporal propagation of the action potential in the heart. The continuous observation of this data, with an additional superimposed model picture heart is able to provide instant information for diagnostics in critical patients, as to when and where the myopathical symptom has originated.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Speaker Independent Isolated Tamil Words for Speech Recognition using MFCC, IPS and HMM[Full-Text ]
K.Murali Krishna, M.Vanitha LakshmiThe process of converting an acoustic waveform into the text resembling the information, conveyed by the speaker is termed as speech recognition. Nowadays, normally Hidden Markov Model (HMM) based speech recognizer with Mel Frequency Cepstral Coefficient (MFCC) feature extraction is used. The proposed speech feature vector is generated by projecting an observed vector onto an Integrated Phoneme Subspace (IPS) based on Independent Component Analysis (ICA) or Principal Component Analysis (PCA). The performance of the new feature has to be evaluated for Isolated Tamil Word Speech Recognition. The proposed method is expected to provide higher recognition accuracy than conventional method in clean environment.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Memristor-The Future of Artificial Intelligence[Full-Text ]
L.kavinmathi, C.Gayathri, K.Kumutha priyaDue to increasing demand on miniaturization and low power consumption, Memristor came into existence. Our design exploration is Reconfigurable Threshold Logic Gates based Programmable Analog Circuits using Memristor. Thus a variety of linearly separable and non-linearly separable logic functions such as AND, OR, NAND, NOR, XOR, XNOR have been realized using Threshold logic gate using Memristor. The functionality can be changed between these operations just by varying the resistance of the Memristor. Based on this Reconfigurable TLG, various Programmable Analog circuits can be built using Memristor. As an example of our approach, we have built Programmable analog Gain amplifier demonstrating Memristor-based programming of Threshold, Gain and Frequency. As our idea consisting of Programmable circuit design, in which low voltages are applied to Memristor during their operation as analog circuit element and high voltages are used to program the Memristor’s states. In these circuits the role of memristor is played by Memristor Emulator developed by us using FPGA. Reconfigurable is the option we are providing with the present system, so that the resistance ranges are varied by preprogram too.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A Design Of Unsupervised Learning Of Weight Changing Synaptic Memory BIST[Full-Text ]
V.Saravanakumar, D. Dolphin Kiruba, S.Tamil VendanDesign for low power testing is a primary concern in modern circuits. In this paper a novel test pattern generator (TPG) is proposed which is more suitable for memory built in self test (BIST) architecture, used for testing of circuits. The objective of the BIST is to reduce power consumption during testing of circuits. The proposed memory BIST requires test pattern generator, Device under test (DUT) output measurement sensor and Artificial Neural Network (ANN). Design approach hinges on the ability to meet strict area and power constrains of the circuits. In this work, we design a high efficient test pattern generator using an unsupervised leaning Artificial Neural Network(ANN) .High precision RAM storage of weighted coefficients during operation or standby ,using this platform we design an HEBBIAN learning algorithm and it is used to train Artificial Neural Network(ANN) ,which generate BIST with high fault coverage and low overhead.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Hand Written Characters & Gesture Recognition using PSOC[Full-Text ]
S.V. Chidambaram, K. PrabakaranNowadays, the growth of miniaturization technologies in electronic circuits and components has greatly decreased the dimension and weight of consumer electronic products, such as smart phones and handheld computers, and thus made them more handy and convenient. This paper presents an accelerometer-based digital pen for handwritten digit and gesture trajectory recognition applications. The digital pen consists of a tri-axial accelerometer, a microcontroller, and a Zigbee wireless transmission module for sensing and collecting accelerations of handwriting and gesture trajectories. Using this project we can do human computer interaction. Users can use the pen to write digits or make hand gestures, and the accelerations of hand motions measured by the accelerometer are wirelessly transmitted to a computer for online trajectory recognition. So, by changing the position of mems (Micro Electro Mechanical Systems) we can able to show the alphabetical characters in the PC. The acceleration signals measured from the tri-axial accelerometer are transmitted to a computer via the wireless module.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Efficient Channel Allocation Schemes for Cognitive Radio Networks[Full-Text ]
Sitadevi BharatulaIn today’s wireless scenario, most of the spectrums (licensed bands) are already allocated for license users for exclusive use. Few unlicensed bands are left open for unlicensed users, i.e. ISM bands 900MHz and 2.4GHz. Licensed bands are under-utilized but unlicensed bands are crowded resulting on spectrum scarcity. Solution is to let unlicensed users use the license frequencies, provided they can guarantee interference perceived by the primary license holder will be minimal which the concept of Cognitive Radio (CR). With the fast growing of multimedia communication applications, Cognitive Radio Networks (CRNs) have gained the popularity as they can provide high wireless bandwidth and support quality driven wireless multimedia services. This paper deals with efficient channel allocation scheme for Secondary Users (SUs) in CRNs based on their priority. In the proposed system, the frequencies (spectrum resources) are allocated efficiently by using Greedy Algorithm. The main advantages of this proposed system are; it allocates spectrum resources with less interference thereby increasing the throughput. The results obtained show that this algorithm makes better utilization of unutilized licensed bands.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
AUTOMATIC SEGMENTATION OF LIVER IN CT IMAGES[Full-Text ]
A.S.Dhanalakshmi, K.LekshmiNow-a-days accurate way of measuring liver is essential for segmentation. Several efforts have been designed for acquiring liver segmentation procedures in the field of medical image processing. Although some intelligent segmentation procedures have been designed, their own performances are still challenged by the poor image contrast. Medical image segmentation performs significant role in image processing technique. Segmentation is generally a part of image analysis which means that a part of partitioning an image into multiple segments or extracting the region from the whole image. Image segmentation is usually to cluster pixels into salient image regions. Within this report, the notion of involving, Auto-context Product (ACM) is employed to segment the liver from CT images. Auto-context model will be performed iteratively to develop a sequence of classifiers by means of integrating both image appearance and along with context features in the local patch. Specifically, Auto-context model (ACM) and multiple sequences of ACM-based classifier are generally constructed, respectively in each atlas space during the training stage. Thus in the testing stage, a new image will be segmented by applying the sequence of learned classifier of each atlas and fusing multiple segmentation results from multiple atlas. Finally, the ACM method is applied to segment the liver and in addition to reduce the average volume overlap error and achieve more accuracy and efficiency.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
PERFORMANCE IMPROVEMENT OF BLDC MOTOR USING FUZZY LOGIC CONTROLLER[Full-Text ]
Sharmila Kumari.M, Sumathi.V, Vivekanandan S, Shobana SThis project deals with a fuzzy controller based sensorless control of brushless DC motor. It works on “Indirect position sensing” method. Using voltage and current waveform position detection can be derived. Using voltage difference measured at the motor terminals position information can be found. Fuzzy controller is used here for precise control and to get better performance. This Controller is effectively implemented using MATLAB. The voltage and current waveform are using MATLAB. Since fuzzy controller is used no need for separate processors like i.e. FPGA or DSP. So this drive system has more advantage than the conventional sensor less control. The proposed drive system is cost effective, more flexible and robust.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Sporadic Associated Mobile Networks with Auto Adjust Dispute Realisation Routing Protocol[Full-Text ]
S. Sivakumar, Dr. S. Sivasubramanian and P. Sathish SaravananFor Delay Resistant Networks that are perhaps compiled of an immense number of devices in miniature such as smart phones of heterogeneous capacities in price of energy resources and buffer spaces, this paper introduces a modern multi-copy routing protocol, called Auto Adjust Utility-based Routing Protocol (AAURP). An entourage of environment parameters, such as wireless channel condition, nodal buffer occupancy, and encounter statistics, are collectively considered to characterize AAURP for the ability to name possible chances for forwarding messages to the destination via a modern function utility based mechanism. Thus, AAURP can reroute messages around nodes feeling high buffer occupancy, wireless noise and congestion, while taking a substantially small amount of transmissions. In AAURP, the developed utility function is proved to be able to achieve optimal performance, which is further examined via a random modelling approach. To verify the formulated analytical model and compare the suggested AAURP wide simulations are conducted with a number of recently reported encounter-based routing approaches in terms of delivery ratio, delivery delay, and the number of transmissions needed for the message delivery. The simulation results show that AAURP outstrips all the counterpart multi-copy encounter-based routing protocols conceived in the study.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Detecting and Preventing the Botnet’s Activity based on DNS Investigation[Full-Text ]
P. Ashok, G. ManimalaAttackers, typically busy to initiate malicious threat to scratch the compromised host. Botnet’s are newly developed technology by attackers and its task to raise the traffic in DNS service to launch attacks. Due to increased traffic in DNS, botmaster’s create a new channel between server and client to disseminate commands to all bots; it has capability to command and control the Operating System and repeatedly generate more queries over DNS which increase the traffic. Many botnet operators used HTTP, IRC server to pass the information. In this paper, we proposed feasible approach called Wide Packet Inspection to analyze the DNS traffic to control and avoid the Botnet. This paper provides a countermeasure against botnet operators to slow down the bot activity.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Link-Stability and Energy Aware Routing Protocol in Distributed Wireless Networks[Full-Text ]
P.Yazhini , Rajadevi.RA mobile ad hoc network (MANET) is an autonomous collection of mobile nodes that communicate over relatively bandwidth constrained wireless links. Link changes occur frequently and there is a limited bandwidth that makes the communication challengeable. The existing routing protocol like DSR, AODV selects the shortest path between the source and destination. It won’t check the stability of the link for flooding. So there is a chance of link failure. Recovering from the failure of the link in MANET leads to more energy consumption. The problem of link failure can be overcome by an approach called Link Stability and Energy aware routing. Link Stability and Energy aware routing algorithm is used. The Delivery Probability based Route Stability protocol describes the node mobility the energy efficiency in the network. Here the stability of the link is determined by the residual energy of the nodes in the network. So the chance of the link failure is reduced and the energy of the nodes is saved. The protocol performance has been evaluated in terms of Collision rate and Average energy consumption.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Selfish nodes handling in replica allocation by clustering over MANET[Full-Text ]
D.Kanimozhi , Dr.S.VaradhaganapathyA mobile ad hoc network (MANET) is a infrastructure-less network with self configuring capability of mobile nodes connected by wireless. Each node moves freely in any direction, and will therefore change its links to other devices frequently. Since mobile hosts move freely, disconnections occur frequently and this causes frequent network division. So, the data sharing in network play a vital role. For effective data sharing, the data replication is needed. Many data replication techniques have been proposed to minimize performance degradation. In most cases it is assumed that all mobile nodes collaborate fully in terms of sharing their memory space. Some nodes decide not to cooperate. Performance of the network and data accessibility is affected by these selfish nodes. The proposed work examines the impact of selfish nodes in a mobile ad hoc network from the perspective of replica allocation. It is termed as selfish replica allocation. The work includes developing a selfish node detection algorithm that considers a replica allocation technique for effective selfish replica allocation.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Improving Test Efficiency through Multiple Criteria Coverage Based Test Case Prioritization[Full-Text ]
N.Prakash, K.GomathiSoftware Testing is the set of activities conducted with the intent of finding bugs in software. It is the most important phase of software development life cycle and consumes significant resources in terms of effort, time and cost. Regression testing is used to reduce the cost of Software testing. It is effective technique to conduct testing with modified piece of code. The purpose of regression testing is to confirm that a recent program or code change has not adversely affected existing features. To reduce the cost and time of the regression testing, Test case prioritization approach is used. Test case prioritization techniques prioritize the test cases in an order that attempts to maximize the objective function such as improving the rate of fault detection. The existing system prioritizes test cases that cover only one coverage criteria. The execution of prioritized test cases for single coverage criteria is not efficient for regression testing. So, testing should be conducted multiple times for each coverage criteria. The proposed system prioritizes test cases which cover more than one criterion such as code coverage, branch coverage, function coverage, path coverage and fault coverage. Thus, the Coverage information is gathered and analyzed both manually and with the help of automation coverage tool. Based on the coverage information, it uses Multiple Criteria Coverage Based Test Case Prioritization method to prioritize the test cases and improves efficiency through execution of single prioritized test cases, for conducting regression testing. The proposed test case prioritization method is empirically studied with three standard applications and it is compared with existing prioritization method. This study shows that the proposed method improves the performance of regression testing.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Design of Reactive Routing Protocols to Improve the Performance of VANET[Full-Text ]
P.S. Dinesh, J. Vijay FranklinVehicular Ad-Hoc Networks (VANET) is a subclass of Mobile ad-hoc networks which gives as an eminent method for Intelligent Transport System (ITS). The analysis of routing protocols in VANET is essential and basic for intelligent ITS. In this paper discussed the pros/cons and the applications of a typical routing protocol used for vehicular ad-hoc networks. It evaluates the backward designed purpose, and tracks the progression of routing protocols. In this paper, an effort has been made to evaluate the performance of vehicular networks by using two reactive routing protocols namely Ad-hoc On demand Distance Vector (AODV) and Dynamic Source Routing (DSR) are the detection algorithms which works as gateway and a geographical routing protocol namely Greedy Perimeter Stateless Routing (GPSR) which is used to update network topology information available to all nodes in VANETs for different scenarios. Comparisons of protocols are made on the basis of different parameters such as throughput, packet loss, packet delivery ratio and end-to-end delay using NS2 simulator.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Video Files Using Flexible Macro Block Ordering[Full-Text ]
Anitha.T, Ganesh Shankar.SThis paper proposes two data hiding approaches using compressed MPEG video. The first approach hides message bits by modulating the quantization scale of a constant bitrates video. A payload of one message bit per macro block is achieved. A second order multivariate regression is used to find an association between macro block-level feature variables and the values of a hidden message bit. The regression model is then used by the decoder to predict the values of the hidden message bits with very high prediction accuracy. The second approach uses the flexible macro block ordering feature of H.264/AVC to hide message bits. Macro blocks are assigned to arbitrary slice groups according to the content of the message bits to be hidden. A maximum payload of three message bits per macro block is achieved. The proposed solutions are analyzed in terms of message extraction accuracy, message payload, excessive bitrates and quality distortion. Comparisons with previous work reveal that the proposed solutions are superior in terms of message payload while causing less distortion and compression overhead
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Extraction of Semantic Video Content using Ontology Model[Full-Text ]
N.H.Angela Lincy,K.SelvaVideo-based applications has recently revealed the need for extracting the content in videos. Raw data and low-level features alone are not sufficient to fulfill the user ’s needs; that is, a deeper understanding of the content at the semantic level is required. Currently, manual techniques, which are inefficient, subjective and costly in time and limit the querying capabilities, are being used to bridge the gap between low-level representative features and high-level semantic content. In this proposal, a semantic content extraction system that allows the user to query and retrieve objects, events, and concepts are extracted. An ontology-based video semantic content model that uses spatial/temporal relations in event and concept definition is introduced here. This metaontology definition provides a wide-domain applicable rule construction standard that allows the user to construct an ontology for a given domain. In addition to domain ontologies, additional rule definitions (without using ontology) are used to lower spatial relation computation cost and to be able to define some complex situations more effectively. Genetic Algorithm-based object extraction method is integrated to capture and classify the semantic content. Thus by using this proposal, the objects, events and concepts of videos are extracted more accurately.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Online Oversampling Principle Component Analysis for Streaming Data Problems[Full-Text ]
P.Indira Priya, A.AnnapooraniIn a network unauthorized access to a computer is more prevalent that involves a choice of malicious activities. Hence it is essential for a system to be aware of normal system activities. Data mining is the process of summarizing information from various perspectives. Confessing of sensitive information poses another security risk when large amount of interrelated data is processed. This is where intrusion detection plays a vital role in identifying the suspect. Several data mining approaches for intrusion detection have been proposed as a countermeasure and anomaly detection is one such technique. However , most anomaly detection methods are typically implemented in batch mode, and thus cannot be easily extended to large scale problems without sacrificing computation and memory requirements. In this paper , the system propose an online oversampling principle component analysis (osPCA) algorithm is used to detect the presence of outliers from a large amount of data via an online updating technique. In terms of accuracy and efficiency, the osPCA is preferable for online large scale or streaming data problems.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Establising Downclosure Property on Mining High Utility Frequent Itemsets From Large Databases[Full-Text ]
K.Raghavi, K.Anita Davamani, M.KrishnamurthyIn today’s world a vast amount of knowledge is stored in the web and database. Due to the availability of huge knowledge repositories, getting the relevant information is a challenging task and hence it must be mined and extracted. Association Rule Mining is one approach for extracting useful knowledge from database which includes frequent patterns and association rules between the items or attributes of a dataset with varying levels of strength. An efficient algorithm has been proposed to effectively prune the search space and efficiently capture all high utility itemsets with no miss. The challenge of utility mining is in restricting the size of the candidate itemset and simplifying the computation for calculating the utility. The existing up-growth algorithm reduces the no of candidate’s item set but having complex strategies and not holding the downward closure property in up-tree. Here we use new algorithm to maintain downward closure property which is used in every FP-Tree and this algorithm removes complex strategies as well as reduces no of candidate itemset effectively. The new algorithm efficiently finds the high utility items. The main focus of this work is that a new Association Rule Mining has been proposed to enhance the capabilities of the existing Association Rule Mining algorithms in terms of the number of scans and memory utilization.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Improving Search Performance for Bigdata Processing Using Machine Learning Algorithm[Full-Text ]
G.Jeeva, E.K.SubramanianBig data usually includes data sets with sizes beyond the ability of commonly used software tools to capture, manage, and process the data within a tolerable elapsed time. Data mining algorithms of increasing sophistication are being implemented in MapReduce, bringing new challenges for performance measurement and tuning. We focus on Hadoop framework which is distributed model frameworks for processing large scale data intensive applications for different purposes. Hadoop provides HDFS and Map Reduce but it still to improve the process. So it use Mahout with hadoop it perform machine learning tasks on voluminous amounts of data. These tasks have application in fields such as pattern recognition, data mining, bioinformatics, and recommendation systems. In this existing system it evaluate the performance of clustering algorithms and classification algorithms supported by Mahout within two different cloud runtimes, Hadoop and Granules. Cluster analysis is the most important data mining methods. Efficient parallel algorithms and frameworks are the key to meeting the scalability and performance requirements entailed in such scientific data analyses. In order to improve the deficiency of the long time in large-scale datasets clustering on the commodity system. In this project to propose the new k-means algorithm based on MapReduce framework. This algorithm runs on Hadoop cluster. The results show that the MapReduce framework K-Means clustering algorithm can obtain a higher performance.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
CDAP: Congestion Detection and Avoidance Protocol for Dynamic Multilevel Priority Packet Scheduling in Sensor Networks[Full-Text ]
C.Vijayakumaran, K. JanakyThe packet collision is one of the major sources of energy consumption in WSN. Due to packet collision, deadlock will occur in packet processing and scheduling schemes. The existing WSN uses various packets scheduling scheme and if a real time task holds the resources for a longer period of time, other tasks need to wait for longer period time, causing the occurrence of a deadlock. The occurrence of deadlock situation degrades the performance of task and packet scheduling schemes in terms of end to-end delay. In this paper, energy efficient Congestion Detection and Avoidance Protocol (CDAP) is proposed for dynamic multilevel priority packet scheduling (DMP) scheme which includes of three mechanisms. 1) First Use buffer and weighted buffer difference for congestion detection; 2) Propose a bottleneck-node-based source data sending rate control scheme; and 3)Use Flexible Queue Scheduler for packets transfer. The result of simulation of the proposed work shows that CDAP achieves efficient congestion control and flexible weighted fairness for dynamic multilevel priority packet scheduling. Therefore it significantly enhances packet delivery ratio and reduce end-to-end delay without increasing total energy consumption. It leads to higher energy efficiency and better QoS in terms of throughput, fairness compared to the tested baseline approach.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Selective Harmonic Elimination In UPS – A Survey[Full-Text ]
E.Anandha Banu, Dr.D. Shalini PunithavathaniUninterruptable power supplies (UPS) are widely used to supply critical loads and provide reliable and high quality energy to the load. Inverter is the main component of UPS. In this majority of power utilities are non linear loads, so there is a possibility of generation of harmonics. This paper presents a survey of different topologies, control strategies and modulation techniques used by UPS. The multilevel concept is used to decrease the harmonic distortion in the output waveform without decreasing the inverter power output. This paper presents the most important topologies like diode-clamped inverter (neutral- point clamped), capacitor-clamped (flying capacitor), and cascaded multilevel with separate dc sources. This paper also presents the most relevant control and modulation method that is selective harmonic elimination. Here, in the existing literature, all the methods, which are already available for harmonic elimination in UPSs, are discussed and the best suited method is found out that is with low total harmonic distortion and with less computational time and the future work how it can be extended.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Agile Development to Implement Cloud ERP[Full-Text ]
N.Javed, K. Mohana PriyaAgile Development methodologies are very promising in the software industry. Agile development techniques are very realistic and understanding the fact that requirement in a business environment changes constantly.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Load Frequency Control using IMC based PID Controller[Full-Text ]
S. Jennathu Beevi, R. Jayashree, P. AnbumalarIn this paper the internal model control (IMC) based PID load frequency control for two area power system is presented. The Performance of IMC based PID and conventional PI controllers are compared for the same two area power system with non-reheat turbines. The damping of the two area power system is improved by an IMC based PID controller. The effectiveness of the proposed controller is compared by applying load disturbances. The dynamic response of the load frequency control problem is studied using MATLAB simulink package. The results indicate that the proposed IMC based PID controller exhibits better performance.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Neuro-Fuzzy System for Classification of Bio-Medical Signals[Full-Text ]
Rohini S, Menaka RClinical results are often made based on doctors heuristics experience and intuitions rather than on the information concealed in the database. This rich data can be used to detect the cardiac diseases like Arrhythmia which is the irregularity in the heart beat. For reliable recognition of cardiac Arrhythmia the analysis of the electrocardiogram (ECG) signal plays a vital role. This paper deals with the acquisition of the ECG signal from MIT-BIH Arrhythmia Database Directory. The acquired signals are pre-processed and features are extracted using Fast Fourier Transform (FFT), which helps in the detection of the peak of the ECG signal. These extracted features are given as the input vector to train the Artificial Neural Network (ANN). Back propagation neural network is used to classify the signals into normal and abnormal.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------