6-8 April 2014
Filter Results
-
Design of efficient MEMS based actuator for drug delivery applications
Publication Year: 2014, Page(s):1 - 6The advancements in drug delivery system are of great value when the betterment of human life comes into one's mind. Although so many improvisations have already been done over the years, but many challenges remain in this area. Typically, a drug delivery system consists of drug reservoir and a micropump and micropump requires an actuator for the purpose of pumping the fluid. In the present work, ... View full abstract»
-
Automatic control of air pressure loop in industrial gas burner
Publication Year: 2014, Page(s):1 - 4
Cited by: Papers (1)This paper is focuses automatic control of industrial gas burner using PID controller strategy at air pressure loop in industrial gas burner. Combustion at industrial gas burner is achieved by mixing L.P.G. (Liquefied Petroleum Gas) with air. In industrial gas burner, L.P.G. is transmitted with fixed pressure from cylinder & regulator mechanism but air is transmitted after direct suction f... View full abstract»
-
Efficient cross user data deduplication in remote data storage
Publication Year: 2014, Page(s):1 - 5
Cited by: Papers (1)Cloud data storage service providers such as Mozy, Dropbox, and others perform deduplication to save space by only storing one copy of each file uploaded. While using cloud data storage clients always concern for confidentiality of data. So clients usually encrypt their data, and put it on to the storage. If client specific key is used for encryption then each client has different key so in this c... View full abstract»
-
A novel polynomial basis multiplier for arbitrary elliptic curves over GF (2m)
Publication Year: 2014, Page(s):1 - 3Finite field GF (2m) arithmetic plays a crucial role in applications like Computer algebra, Coding theory and Elliptic Curve Cryptography (ECC). The GF (2m) multiplication is considered significant building block among the finite field arithmetic operations. A new shift and add polynomial basis multiplier over GF (2m) is explained in this paper for irreducible GF (... View full abstract»
-
Extracting knowledge from ontology using Jena for semantic web
Publication Year: 2014, Page(s):1 - 5
Cited by: Papers (4)Semantic Web extends the current web by standardizing the semantics. Purpose of Semantic Web is to make people share data and content among different applications. This is made possible by using ontologies which represents shared understanding of a domain. Semantic Web uses ontologies for representing knowledge in a uniform way that can be easily processed and shared among machine. This paper give... View full abstract»
-
Unsupervised outlier detection technique for intrusion detection in cloud computing
Publication Year: 2014, Page(s):1 - 4
Cited by: Papers (1)Outlier detection is becoming a recent area of research focus in data mining. Here we are proposing an efficient outlier detection concept DenOD (Density Based Outlier Detection) based on unsupervised method for intrusion detection in cloud computing environment. Unsupervised outlier detection techniques are playing big role in a various application domains such as network intrusion detection, fau... View full abstract»
-
Effective utilization of page ranking and HITS in significant information retrieval
Publication Year: 2014, Page(s):1 - 6
Cited by: Papers (2)World Wide Web is the treasury of information. It contain huge amount of interrelated data but it is very difficult to find the relevant data from it. To search for relevant information user uses search engine. Ranking algorithms are used by search engine to retrieve the most relevant and popular web pages. PageRank and HITS (Hyperlink-Induced Topic Search) algorithm are very popular among them. I... View full abstract»
-
Unhealthy region of citrus leaf detection using image processing techniques
Publication Year: 2014, Page(s):1 - 6
Cited by: Papers (11)Producing agricultural products are difficult task as the plant comes to an attack from various micro-organisms, pests and bacterial diseases. The symptoms of the attacks are generally distinguished through the leaves, steams or fruit inspection. The present paper discusses the image processing techniques used in performing early detection of plant diseases through leaf features inspection. The ob... View full abstract»
-
Retrieval of efficiently classified, re-ranked images using histogram based score computation algorithm extended with the elimination of duplicate images
Publication Year: 2014, Page(s):1 - 7
Cited by: Papers (1)Internet Image search is a day to day activity performed by user. User enters a keyword in search engines like Google, Yahoo, Bing etc for retrieval of keyword related images, where millions of images are retrieved through search engines. The problem with a keyword search is that keywords entered by user are very short and ambiguous, hence images which are retrieved are of different categories and... View full abstract»
-
Real time automation of agricultural environment
Publication Year: 2014, Page(s):1 - 4
Cited by: Papers (2)The paper, “Real time automation of agricultural environment”, using PIC16F877A and GSM SIM300 modem is focused on automating the irrigation system for social welfare of Indian agricultural system. This system will be useful for monitoring the soil moisture condition of the farm as well as controlling the soil moisture by monitoring the level of water in the water source and accordingly switching ... View full abstract»
-
Navigation of autonomous mobile robot using different activation functions of wavelet neural network
Publication Year: 2014, Page(s):1 - 6
Cited by: Papers (2)An autonomous mobile robot is a robot which can move and act autonomously without the help of human assistance. Navigation problem of mobile robot in unknown environment is an interesting research area. This is a problem of deducing a path for the robot from its initial position to a given goal position without collision with the obstacles. Different methods such as fuzzy logic, neural networks et... View full abstract»
-
A novel design of 4-bit distributed MEMS transmission line (DMTL) phase shifter using an RF shunt capacitive MEMS switch for phased array antenna
Publication Year: 2014, Page(s):1 - 6
Cited by: Papers (1)In this paper, coplanar waveguide (CPW) of dimension (0.2/1.6/0.2) mm has been used as the transmission line on which a ten number of Capacitive Shunt RF MEMS Switches are periodically spaced in order to achieve appreciable phase shift. The dimensions of the transmission line may be designed to provide a transmission line of 50Ω characteristic impedance periodically. A 4-bit Distributed MEMS trans... View full abstract»
-
Enhancing ADSTM using ROHC in wireless networks
Publication Year: 2014, Page(s):1 - 5IP transition is one of the innovative and challenging areas for the researchers in the recent times. Presently, the transition scheme in Advanced Dual Stack Transition Mechanism (ADSTM) is consuming more time in wireless networks, which impede in general performance of the network. This paper discusses the fast transition of IPV4 packets to IPV6 packets in the Wireless networks via ADSTM. To enha... View full abstract»
-
Ontological user profiling for adaptive re-ranking in mobile web search
Publication Year: 2014, Page(s):1 - 5Due to the explosion of digital information on the web, web search has become common activity for everyone. Search engine is the most widely used online application for this purpose. With the advancement of mobile technology and networking, mobile web search has gained its own importance in a short span of time. Mobile being a portable, but also a constrained device, it has its own characteristics... View full abstract»
-
Differential evolution based optimal fuzzy logic control of pH neutralization process
Publication Year: 2014, Page(s):1 - 5Differential evolution (DE) is a member of evolutionary algorithm family which has gained popularity due to its conceptual simplicity and better convergence. This paper presents fuzzy logic based pH control scheme for neutralization process in which DE is used to optimize the input and output membership functions of fuzzy inference system (FIS). The fitness function for optimization is integral of... View full abstract»
-
A novel 4T XOR based 1 bit full adder design
Publication Year: 2014, Page(s):1 - 4
Cited by: Papers (3)This paper puts forward a methodology for designing 1 bit full adder using a newly proposed 4T xor gate. The 4T xor gate is formed of 2 pMOS and 2 nMOS transistors. The sum is formed using 2 xor gate and the carry is formed using a 2T mux. The resulting 1 bit full adder is made up of 10 transistors. The simulation is done using Cadence Virtuoso Simulator using 180nm technology and 1.8V power suppl... View full abstract»
-
A review paper on 3-T Xor cells and 8-T adder design in Cadence 180nm
Publication Year: 2014, Page(s):1 - 6
Cited by: Papers (1)The paper gives a review of already existing 3-T XOR cells and provides an optimized value of (W/L) on the basis of simulation results obtained, so as to improve the threshold loss problems present in the existing designs of 3-T XOR cells thus helping improve the driving capability, however the driving capability is not sufficient for large circuits like multipliers, hence has a scope for further ... View full abstract»
-
Improved image compression using row & column cosine hybrid wavelet transform with various color spaces
Publication Year: 2014, Page(s):1 - 6
Cited by: Papers (1)Image Compression is becoming a major area of research due to tremendous amount of applications needing transmission & reception of images. The wavelet transforms & hybrid wavelet transforms by now are proven to be better for image compression. This paper presents a novel technique for image compression using row & column cosine hybrid wavelet transforms generated by Orthogonal Transfo... View full abstract»
-
Design of wireless electric board for writing and sketching using ARM based embedded system
Publication Year: 2014, Page(s):1 - 4Nowadays using multimedia applications is common in classroom teaching. As we know that use of chalk produces dust which pollutes air and also it is found that chalk dust causes hazardous effects on health of students and parents. In the other hand, use of multimedia helps in better teaching and learning process. Companies like Hitachi, Panasonic, are manufacturing smart equipments which can effic... View full abstract»
-
Low actuation voltage capacitive RF MEMS switch for Ku-band applications
Publication Year: 2014, Page(s):1 - 5
Cited by: Papers (1)This paper presents a unique model of shunt capacitive Microelectromechanical switch which works at RF frequency (12-18 GHz) with low insertion loss and high isolation. Low actuation voltage, removal of stiction and making a switch to work at Ku band frequency are main goals of this design. The ribs that are used in this model are made very stiff to avoid stiction problem. Hafnium Dioxide (HfO<... View full abstract»
-
Stockwell transform reduces the Doppler frequency bin size of GPS receiver
Publication Year: 2014, Page(s):1 - 6GPS or GNSS signal is contaminated with noise when it reaches the ground receiver because of which the receiver has poor performance. The Doppler frequency also make the acquisition system of receiver, more ambiguous. The acquisition system uses a code delay-Doppler frequency bin to detect the correct signal with threshold. Generally the resolution of code delay-Doppler frequency bin, depends upon... View full abstract»
-
Design and implementation of fuzzy based robust controller for process control instrumentation
Publication Year: 2014, Page(s):1 - 9Precised and robust controllers are need of Industries like Chemical, Petrochemical plants which required to operate with the defined parameters and unknown disturbances. Therefore a robust controller is required to maintain process parameters. Conventional PID Controller tuning requires lot of mathematical hard work. Though, mathematical controllers are easy to implement, but are not précised one... View full abstract»
-
MPTCP combining congestion window adaptation and packet scheduling for multi-homed device
Publication Year: 2014, Page(s):1 - 6Evolution of use of wireless technologies in laptops and mobile terminals, which are equipped with several network interfaces, has provided users to take advantage from multi-homing to access network services anywhere, at any time and from any network. Advantage with multihomed host is that some of the traffic from more congested paths can be shifted to less congested path, thus controls congestio... View full abstract»
-
Market basket analysis using artificial neural network
Publication Year: 2014, Page(s):1 - 6
Cited by: Papers (1)Market basket analysis is based upon the identification and analysis of purchasing patterns of the customers. The problem with market basket analysis is the varying needs of the customers with respect to seasons and time and so we need to perform it time and again. Another problem that arises while doing market basket analysis is with Apriori algorithm in which we need to find candidate sets and f... View full abstract»
-
Obtaining the natural frequencies of linear time-invariant dynamic systems from driving-point system-function measurements employing conceptual source-measure units
Publication Year: 2014, Page(s):1 - 7This paper presents two mathematical conceptualizations of driving-point system-function measurement of linear time-invariant (LTI) systems with lumped-parameter description. Whereas the formalization of this dual pair of Source-Measure Units (SMU) has been - for the twin purposes of ease of demonstration and ready cognizance - effected with a specific relevance to electrical quantities, the under... View full abstract»