Sr/No/ |
Title |
Pdf |
1 |
Study of Concepts and Technology of Various Flexible AC
Transmission Systems for Enhancing System Performance
Ms. Shweta Chourasia, Ms Ritu K.R, Prof.Leena Raikwar
Abstract-A major portion of the energy needs of a modern
society is supplied in the form of electrical energy therefore the
industrial revolution man's demand for and consumption of energy
has increased steadily. Industrially developed societies need an
ever-increasing supply of electrical power and the demand on the
North American continent has been doubling every ten years. Now,
more advanced technology is used for reliable and operation of
transmission and distribution in power system. To achieve both
reliable and benefit economically, it has become clearer that more
efficient utilization and control of the existing transmission system
infrastructure is required. In this paper we discuss about device
and their types which are use to improved utilization of the existing
power system. Improvement is provided by the application of
advanced control technologies. Power electronics has developed the
flexible AC transmission system (FACTS) devices. FACTS devices
are effective and capable of increasing the power transfer
capability of a line and support the power system to work with
comfortable margins of stability. Also cover the advantages of
different fact devices and their applications.
|
Download
|
2 |
Comparative Analysis of PRAM-NUMA model
and Extended PRAM-NUMA model
Lalit
Abstract— This paper is concentrate on comparison of two
model PRAM-NUMA and Extended PRAM-NUMA model.
The Parallel Random Access Machine –Non uniform memory
access (PRAM-NUMA) model of computation can be used to
implement efficient emulated shared memory(ESM)
computers for general purpose parallel applications. This
model forces to use conditional and looping control primitives.
An Extended PRAM-NUMA model of computation can be
used to ignore the conditional and looping control primitives
and this model is needed in case of dynamics system. The
PRAM-NUMA model is used to solve the problem of Low
“Thread-Level Parallelism (TLP)” problem. This model
shows that integrating NUMA support to the PRAM
implementation architecture can solve this paper. An
Extended PRAM-NUMA is used compute the “Thick Control
Flow (TCF)”. In this paper, programming of the extended
model are also discuss with short example.
|
Download
|
3 |
Power Optimization in One bit Full Adder Circuit
R.Suganya , K.S.Natiyaa
Abstract—The Full Adder circuit is an important component in
application such as Digital Signal Processing (DSP) architecture,
microprocessor, microcontroller and data processing units. This
paper discusses the evolution of full adder circuits in terms of
lesser power consumption and higher speed. Starting with the
most conventional 28 transistors full adder and then gradually
studied different types of full adders.This paper has also
included some of the most popular full adder cells like
Transmission gate full adder, pass transistor full adder, Static
Energy Recovery Full Adder (SERF), Adder9B, GDI based full
adder and Self resetting logic(SRL) with GDI full adder. The
simulations have been carried out by Tanner EDA tools on
250nm technology.
|
Download
|
4 |
Regression Diagnosis for the Yield estimation in Agriculture
P.Lavanya Kumari
Abstract— Nowadays, technology in precision
agriculture produces volumes of data which leads to a data
mining that must be solved using appropriate Statistical
techniques for valid conclusions. Most of the researchers can
able to select the appropriate statistical tools to address the
hypothesis under study. Due to moderate knowledge on the
philosophy of select statistical techniques they could not use
that perfectly. Considerable gains and therefore economic
advantages can be achieved by processing the data with fullfledged
statistical analysis. One of the tasks that remain to be
solved is yield prediction based on physiological parameters
(independent variables) of the plant using Multiple Linear
Regression (MLR) analysis. In some cases, multiple regression
results may seem paradoxical. Even though the overall pvalue
is very low, all of the individual p- values are high. This
means that the model fits the data well, even though none of
the independent variables is statistically significant in
predicting the yield. This may be due to the high correlation
between the independent variables called multicollinearity.
The best solution is to understand the cause of
multicollinearity and remove it. This paper helps in ways for
identification and elimination of multicollinearity that could
result in best-fit model. A recommendation for full-fledged
process of regression diagnosis which estimates and eliminates
the multicollinearity successfully to get optimal predictors is
provided with the help of a case study.
|
Download
|
5 |
A Novel Framework for Effective Video
Streaming and Sharing Resources on a
Cloud Environment
Tammineni Anil Kumar, H.Swapna Rekha
Abstract—The rapidly increasing power of personal
mobile devices (smart phones, tablets, etc.) is
providing much richer contents and social
interactions to users on the move. This trend
however is throttled by the limited battery lifetime
of mobile devices and unstable wireless
connectivity, making the highest possible quality of
service experienced by mobile users not feasible.
The recent cloud computing technology, with its
rich resources to compensate for the limitations of
mobile devices and connections, can potentially
provide an ideal platform to support the desired
mobile services. Tough challenges arise on how to
effectively exploit cloud resources to facilitate
mobile services, especially those with stringent
interaction delay requirements. While demands on
video traffic over mobile networks have been
souring, the wireless link capacity cannot keep up
with the traffic demand. The gap between the traffic
demand and the link capacity, along with timevarying
link conditions, results in poor service
quality of video streaming over mobile networks
such as long buffering time and intermittent
disruptions., In this paper by leveraging the cloud
computing technology, we propose a new mobile
video streaming framework, dubbed AMES-Cloud,
which has two main parts: AMoV (adaptive mobile
video streaming) and ESoV (efficient social video
sharing). AMoV and ESoV construct a private agent
to provide video streaming services efficiently for
each mobile user. For a given user, AMoV lets her
private agent adaptively adjust her streaming flow
with a scalable video coding technique based on the
feedback of link quality. Likewise, ESoV monitors
the social network interactions among mobile users,
and their private agents try to prefetch video content
in advance. Till now there was no proper device or
mechanism to operate in this way in cloud domain,
so this is the first time to propose such a new cloud
framework for video streaming. By conducting
various experiments on real time data sets we finally
came to a conclusion that by doing this application
we can able to reduce a lot of wastage of space in
data base.
|
Download
|
6 |
A Novel Dynamic Resource Allocation
for Creating a New Web Site
Partitions in Cloud Computing
Environment
Ramesh Yajjala, Majji .Venkata Appala Naidu, Boyidi . Suri Babu
Abstract—A major feature of the cloud services is
that users’ data are usually processed remotely in
unknown machines that users do not own or operate.
Cloud computing allows business customers to scale
up and down their resource usage based on needs.
Many of the touted gains in the cloud model come
from resource multiplexing through virtualization
technology. In this paper, we present a system that
uses virtualization technology to allocate data center
resources dynamically based on application
demands and support green computing by
optimizing the number of servers in use.
Virtualization, in computing, refers to the act of
creating a virtual (rather than actual) version of
something, including but not limited to a virtual
computer hardware platform, operating system (OS),
storage device, or computer network resources. We
introduce the concept of “skewness” to measure the
unevenness in the multi-dimensional resource
utilization of a server. By minimizing skewness, we
can combine different types of workloads nicely and
improve the overall utilization of server resources.
We develop a set of heuristics that prevent overload
in the system effectively while saving energy .By
conducting various experiments and trace down
simulations , we finally came to a conclusion that by
doing this application we can able to reduce a lot of
wastage of space in cloud server data base.
|
Download
|
7 |
A novel protocol for web page
Personalized recommendation
Model by using frequent access
Path algorithm
P.Revathi, G. Jyothi
Abstract—The emergence of personalized
recommendation technology relieves us of infinite
data and the commercialized world by saving us
plentiful time and energy on searching information.
But the recommendation results are not Satisfactory.
In this case it is of vital significance to find new
ways or to improve existing technology in order to
uplift the quality of personalized recommender
system. Here we focus on the frequent access path
algorithm used in the recommender model which is
very popular in web site recommender system then
focus on the frequent access path algorithm used in
the recommender model, point out the limitation in
this algorithm and then improve it. Web logs record
actions and behaviors of users. By mining and
analyzing these logs we can find users browsing and
access patterns, and this is very important and useful
to the web site optimization and recommender Here
in this paper we mainly target on the most recent
user weblogs that are accessed for purchasing any
item, so that if any user chooses any item which is
already shopped or not shopped till that time, it is
the ability of our application to give suggestions for
the user to suggest the most recent product that was
sold for more number of users. By conducting
several experiments and simulations on this current
web-personalization concept on various real time
web sites, we finally came to an conclusion that this
new frequent access path technique is most suited
for users in choosing items pair wise in online more
easier than compared with non frequent path
identification websites.
|
Download
|
8 |
An New Approach of Performing Computer
Inspection on Data Files by Applying Several
Clustering Algorithms
Prasada Rao Peeri, B.Shalini
Abstract—The goal of the inspection is to identify
defects. In an inspection, a defect is any part of the
work product that will keep an inspector from
approving it. The process should have entry criteria
that determine if the inspection process is ready to
begin. This prevents unfinished work products from
entering the inspection process. The entry criteria
might be a checklist including items such as "The
document has been spell-checked‖. Computer
Inspection is a branch of information security which
examines structured data with regard to a lot of files
which are stored already in some parts of the system.
The aim is to discover and analyse patterns of
fraudulent activities. Data from application systems
or from their underlying databases is referred to as
structured data. Unstructured data in contrast is
taken from communication and office applications
or from mobile devices. This data has no
overarching structure and analysis thereof means
applying keywords or mapping communication
patterns. Analysis of unstructured data is usually
referred to as data inspection. In computer
inspection analysis, hundreds of thousands of files
are usually examined. Much of the data in those files
consists of unstructured text, whose analysis by
computer examiners is difficult to be performed. In
this context, automated methods of analysis are of
great interest. We present an approach that applies
document clustering algorithms to computer data
files analysis of all previously stored data in a
remote location on a computer. We illustrate the
proposed approach by carrying out extensive
experimentation with three well-known clustering
algorithms (K-means, K-medoids, Single Link,
Complete Link, Average Link, and Cosine
Similarity Measure) applied on some of the text
documents of having different categories like games,
sports, living beings, animals, food items, books
and so on. In addition, two relative validity indexes
were used to automatically estimate the number of
clusters. Related studies in the literature are
significantly more limited than our study. Our
experiments show that the proposed architecture is
best suited for forensic analysis of unstructured
documents.
|
Download
|
9 |
Technology Development Towards Robust Speech Recognition: A Review
Kapang Legoh, Utpal Bhattacharjee, T. Tuithung
Abstract—In this paper, we reviewed major technological developments during last few decades and the trend towards development of robust Automatic Speech Recognition (ASR) system. Our attempt is to provide a technological perspective to the progress that has been made in the field of automatic speech recognition. It has been the dream of researchers to develop a machine that recognizes speech like human under different adverse environments and understands natural language but reality is that the performance of the system drastically degrades due to adverse conditions like ambient noise, channel and device distortions, speaker variability, session variability, articulation effects etc. Performance of ASR system also falls when the system is trained and tested in mismatched conditions. So, achieving performance at par with human is still a distant dream. In this paper, we report a review on the advances in the speech recognition technology from early development stage (history) to latest technology trends towards robust recognition system. The technology advances discussed are based on the feature domain approach and model adaptation techniques and also a brief review on hybrid model of hidden markov model and artificial neural networks is given.
|
Download
|
10 |
Analysis of Shunt Active Power Filter based on
Average Power and Self-adaptive Algorithms
M.Gokila, A.Thiyagarajan, S.Kalpana
Abstract—Presence of Harmonics for a long time in a power
supply shapes the performance of a power system. Therefore,
estimation of harmonics is very importance while analyzing a
power system network. Various filters have been devised to
achieve an optimal control strategy for harmonic reduction. This
paper discusses the various algorithms to analyze harmonics in
the power system. The objective is to estimate the power system
voltage magnitude in the presence distortions taking into account
the noise by employing different estimation approaches. In this
paper, The Design a Shunt Active Power Filter (SAPF) based on
Average Power Algorithm (APA) and Self-adaptive Algorithms
is discussed. Two components are included in the reference active
current. One is the instantaneous active current that should be
sent from power system to loads based on APA. The other part,
calculated mainly by a filter based on Self-adaptive Algorithm, is
the instantaneous active current that should be sent to SAPF to
maintain the DC-link voltage invariable and also it combines
these two parts to get the final instantaneous reference active
current value. Gating signals are generated by the current
hysteresis regulator, the inverter compensates the reactive power
and restrain the harmonics to make there is only fundamental
active current in the power system. Simulations and results are
obtained using MATLAB/SIMULINK.
|
Download
|
11 |
A New Fragmented Mechanism for
Topology Control in MANETS
with Cooperative Communications
Jakka.Lakshmi Priyanka, Katta.Naga Raju , Dr Yella.Venkateswarulu
Abstract—A MANET is a Mobile Adhoc Network
which is mainly formed without wires and it is free
to move independently in any direction without any
fixed boundary conditions. As MANET’s can
move independently they can also able to join for
any network dynamically based on the receiving
network. MANET’s are mainly used for mobile
devices for having communication between one
other with wireless media, for this cooperative
communication has received tremendous interest
for MANET communication. Previous work is
mainly conducted on link-level and physical layer,
so there was been several issues raised by such a
type of communication. There will be no
concentration of network-level upper layer, such as
topology control, routing and network capacity as
they were largely ignored. I propose a Capacity-
Optimized Cooperative (COCO) topology control
scheme, which was mainly designed in order to
improve network capacity in MANET’s by taking
both upper layer network capacity and physical
layer into consideration for data communications.
As an extension for this current paper, we have
implemented fragmentation, where the data is
fragmented meanwhile when travels from Source
to destination which will be reconfigured when the
authentication will be passed. We have conducted
several experiments on the proposed method so
that all our simulation results clearly tells that, the
proposed new co-operative topology control
scheme can substantially improve the network
capacity in MANET’s.
|
Download
|
12 |
A new security mechanism for
Prevention of DNS spoofing to
Isolate phishing attacks
Jagdeep Kaur, Tanupreet Singh, Barjinder Singh
Abstract—Phishing is an internet scam done by Web criminals.
It harms the user's confidentiality through Phished Websites.
DNS spoofing is also involved in Phishing in which attackers
spoof the data by mimicking the original Website. DNS spoofing
can inject Fake DNS server in place of Original Server and user
directly redirect to a fake server and server get User's passwords
and credit card numbers which is harmful for user data. If we
prevent DNS spoofing then phishing attack can be isolated so we
are working to prevent DNS spoofing In this paper we present a
robust algorithm that is combination of (RSA + bit stuffing) for
the prevention of DNS server from DNS spoofing. In this
algorithm RSA accounts for legacy of user by providing the
Digital signature, while bit stuffing is used for digesting the
message so that it remain confidential for the intruders, if any
changes persists (violation of integrity) destination can't decipher
the message with the help of public key of sender. So this way
we can provide more robustness for DNS. Simulation has been
carried out using NS2.35 Trace files has been analyzed for evaluation
purpose. Proposed algorithm describes a generalized approach
that works on public cryptosystem along with bit stuffing, public
cryptosystem that accounts for authenticity and bit stuffing that
deals with message confidentiality by digesting message from
arbitrary length size to fixed length. This process overcomes the
limitation of RFC 2535.
|
Download
|
13 |
Comparative Analysis of ECC-MAC With Existing MAC Protocol In VANETs
Nancy Sharma, Tanu Preet Singh
Abstract—In order to avoid transmission collisions in VANETs where high mobility and speed are the main characteristics, a MAC protocol is required. The objective of this work is to compare the performance of our proposed technique with existing protocol VERMAC by using simulations and to analyze the impact of mobility and the density of nodes on the behavior of these protocols in a Vehicular Ad hoc Network (VANET). Four performance metrics have been considered that includes Throughput, Latency, packet delivery ratio and Percentage adaptability to speed. The results show that our proposed technique provides significantly better network performance than existing protocol VERMAC .
|
Download
|