Icciet Proceedings
Icciet Proceedings
ICCIET - 2014
INTERNATIONAL CONFERENCE ON CURRENT
INNOVATIONS IN ENGINEERING AND TECHNOLOGY
Sponsored By
INTERNATIONAL ASSOCIATION OF ENGINEERING &
TECHNOLOGY FOR SKILL DEVELOPMENT
Technical Program
31 August, 2014
Hotel Pavani Residency, Nellore
Organized By
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL
DEVELOPMENT
www.iaetsd.in
http://www.iaetsd.in
About IAETSD:
The International Association of Engineering and Technology for Skill
Development (IAETSD) is a Professional and non-profit conference organizing
company devoted to promoting social, economic, and technical advancements
around the world by conducting international academic conferences in various
Engineering fields around the world. IAETSD organizes multidisciplinary
conferences for academics and professionals in the fields of Engineering. In order
to strengthen the skill development of the students IAETSD has established.
IAETSD is a meeting place where Engineering students can share their views,
ideas, can improve their technical knowledge, can develop their skills and for
presenting and discussing recent trends in advanced technologies, new educational
environments and innovative technology learning ideas. The intention of IAETSD
is to expand the knowledge beyond the boundaries by joining the hands with
students, researchers, academics and industrialists etc, to explore the technical
knowledge all over the
world, to publish proceedings. IAETSD offers
opportunities to learning professionals for the exploration of problems from many
disciplines of various Engineering fields to discover innovative solutions to
implement innovative ideas. IAETSD aimed to promote upcoming trends in
Engineering.
About ICCIET:
The aim objective of ICDER is to present the latest research and results of
scientists related to all engineering departments topics. This conference provides
opportunities for the different areas delegates to exchange new ideas and
application experiences face to face, to establish business or research relations and
to find global partners for future collaboration. We hope that the conference results
constituted significant contribution to the knowledge in these up to date scientific
field. The organizing committee of conference is pleased to invite prospective
authors to submit their original manuscripts to ICCIET 2014.
All full paper submissions will be peer reviewed and evaluated based on
originality, technical and/or research content/depth, correctness, relevance to
conference, contributions, and readability. The conference will be held every year
to make it an ideal platform for people to share views and experiences in current
trending technologies in the related areas.
18
24
28
33
37
46
10
51
11
57
12
62
13
69
14
76
15
16
SINTER COOLERS
CHAOS CDSK COMMUNICATION SYSTEM
A REVIEW ON DEVELOPMENT OF SMART GRID TECHNOLOGY IN INDIA AND
ITS FUTURE PERSPECTIVES
81
83
17
88
18
95
19
107
20
113
21
118
22
123
23
127
24
134
25
142
26
146
27
155
28
166
29
30
172
31
178
32
33
34
186
193
197
35
206
36
219
37
227
38
39
40
237
245
251
41
256
42
264
43
271
44
275
45
ELIMINATING HIDDEN DATA FROM AN IMAGE USING MULTI CARRIERITERATIVE GENERALISED LEAST SQUARES
278
46
282
47
289
48
293
49
300
50
307
51
317
52
323
53
326
54
331
55
334
56
339
57
347
58
352
Abstract
Index TermsFault current, micro grid, smart grid, SFCL, wind farm,
solar, diesel.
1.
INTRODUCTION
www.iaetsd.in
Fig.1 Power system model designed in Simulink/SimPowerSystem,Fault and SFCL locations are indicated in the diagram
triggering current level the system waits until the recovery time and
then goes into normal state. SFCL is located at different locations.
A 10 MVA wind farm[1] is composed of 5 fixed-speed inductiontype wind turbines,each having a rating of 2MVA at the time of
fault the domestic load is being provided with 3MVA out of which
2.7 MVA is provided by the wind farm. The wind farm is directly
connected with the branch network B6 through the transformer
TR3.Simulink model of wind turbine generator is shown.
www.iaetsd.in
800
600
Current (Amp)
400
200
-200
-400
-600
0.25
0.3
0.35
0.4
0.45
0.5
0.45
0.5
Time(Sec)
Current(Amp)
600
400
200
0
-200
-400
-600
0.25
0.3
0.35
0.4
Time(Sec)
Current(Amp)
600
400
200
0
-200
-400
-600
0.25
0.3
0.35
0.4
0.45
0.5
Time(Sec)
400
Current(Amp)
200
-200
-400
0.3
0.35
0.4
0.45
0.5
Time(Sec)
www.iaetsd.in
3000
2500
2000
C
urrent(am
p)
1500
1000
500
-500
-1000
0.25
0.3
0.35
0.4
0.45
0.5
Time(s ec)
1000
1000
Current(amp)
500
800
-500
C
urrent(Am
p)
600
-1000
-1500
0.25
0.3
0.35
0.4
0.45
0.5
400
200
Time(Sec)
1500
-200
0.25
0.3
0.35
0.4
0. 45
0.5
0.45
0.5
Time(Sec)
1000
Current(amp)
1000
800
0
600
-500
0.3
0.35
0.4
0.45
Current(Amp)
-1000
0.25
400
0.5
Time(Sec)
200
-200
-400
1000
-600
800
-800
0.25
0.3
0.35
600
400
Current(amp)
0.4
Time(Sec)
200
1000
0
800
-200
600
-400
400
-800
0.25
0.3
0.35
0.4
0.45
C
urrent(Am
p)
-600
0.5
200
Time(Sec)
-200
-600
-800
0.25
0.3
0.35
0.4
0. 45
0.5
Time(Sec)
www.iaetsd.in
and diesel. Multiple SFCLs will not used in micro grid because of
their inefficiency both in performance and cost. The strategic
location of SFCL in a power grid which limits all fault currents and
has no negative effect on the DG source is the point of integration
of the DG sources with the power grid.
500
400
300
200
Current(Amp)
100
REFERENCES
-100
-200
-300
-400
0.25
0.3
0.35
0.4
0.45
0.5
Time(Sec)
No
SFCL
Location 1
Location 2
Location 3
Wind
787A
1020A
30% increased
1020A
30% increased
265A
67% decreased
Solar
2675A
1100A
59% decreased
1100A
59% decreased
800A
70% decreased
Diesel
916A
798A
13% decreased
798A
13% decreased
148A
84% decreased
4. CONCLUSION
This paper presented a feasibility analysis of positioning of the
SFCL in rapidly changing modern power grid. A complete power
system along with a micro grid (having a wind farm, solar, diesel
connected with the grid) was modeled and transient analysis for
three-phase-to-ground faults at different locations of the grid were
performed with SFCL installed at different locations of the grid.
This placement of SFCL results in abnormal fault current
contribution from the wind farm and other two sources such as solar
www.iaetsd.in
B. Venkanna
Dept. of ECE
RGUKT-Basar
[email protected]
II.
HDLC PROTOCOL
I.
K. Gayathri
Dept. of ECE
Intell Engg. College-Anatapur
[email protected]
FLAG
ADDRESS
CONTROL
INFORMATION
FCS
FLAG
8 bits
8 bits
8 /16 bits
variable
8 bits
INTRODUCTION
Control
www.iaetsd.in
D. Information or Data
address detect unit, FCS calculator unit, zero detection unit,
This field is not always present in a HDLC frame. It is only flag detection unit, receive control and status register unit
present when the Information Transfer Format is being and frame timer and synchronization logic unit.
used in the control field. The information field contains the
A. Transmitter Module
actually data the sender is transmitting to the receiver.
The Transmit Data Interface provides a byte-wide
E. FCS
interface between the transmission host and the HDLC
Controller. The Transmit data is loaded into the controller
The Frame Check Sequence field is 16 bits. The FCS is
on the rising edge of Clock when the write strobe input is
transmitted least significant octet first which contains the
asserted. The Start and End bytes of a transmitted HDLC
coefficient of the highest term in the generated check
polynomials. The FCS field is calculated over all bits of the
Frame are indicated by asserting the appropriate signals
addresses, control, and data fields, not including any bits
with the same timing as the data byte.
inserted for the transparency. This also does not include
The HDLC Controller will, on receipt of the first byte of a
the flag sequence or the FCS field itself. The end of the data
new packet, issue the appropriate Flag Sequence and
field is found by locating the closing flag sequence and
transmit the Frame data calculating the FCS. When the last
removing the Frame Check Sequence field (receiver section)
byte of the Frame is seen the FCS is transmitted along with
[5].
a closing Flag. Extra zeros are inserted into the bit stream
to avoid transmission of control flag sequence within the
III. HDLC MODULE DESIGN
Frame data.
In this design, HDLC procedures contain two modules, i.e.
The Transmit Data is available on TxD pin with
encoding-and-sending module (Transmitter) and receivingappropriate to be sampled by Clk. If TxEN is de-asserted,
and-decoding module (receiver). The function diagram is
transmit is stalled, and TxD pin is disabled.
shown as below.
A transmit control register is provided which can enable
or disable the channel. In addition it is possible to force the
transmission of the HDLC Abort sequence. This will cause
the currently transmitted Frame to be discarded. The
transmit section can be configured to automatically restart
after an abort, with the next frame, or to remain stalled
until the host microprocessor clears the abort.
B. Receiver Module
The HDLC Controller Receiver accepts a bit stream on
port RxD. The data is latched on the rising edge of Clock
under the control of the Enable input RxEN. The Flag
Detection block searches the bit stream for the Flag
Sequence in order to determine the Frame boundary. Any
stuffed zeros are detected and remove and the FCS is
calculated and checked. Frame data is placed on the
Receive Data Interface and made available to the host. In
addition, Flag information is passed over indicating the
Start and the End byte of the HDLC Frame as well as
showing any error conditions which may have been
detected during receipt of the Frame.
In normal HDLC protocol mode, all Receiver Frames are
presented to the host on the output register. A status
register is provided which can be used to monitor status of
the Receiver Channel, and indicate if the packet currently
being received includes any errors.
www.iaetsd.in
IV. RESULTS
V. CONCLUSION
We designed HDLC protocol sending and receiving RTL
level modules in Verilog and had them tested successfully,
which has the following advantages like easy to program
and modify, suitable for different standards of HDLC
procedures, match with other chips with different interfaces.
So this proposed method can be more useful for many
applications like a Communication protocol link for
RADAR data processing.
REFERENCES
[1] Implementation of HDLC protocol Using FPGA, [IJESAT]
International Journal of Engineering Science & Advanced
Technology, ISSN: 2250-3676, Volume-2, Issue-4, 1122
1131.
[2] M.Sridevi, DrP.Sudhakar Reddy / International Journal of
Engineering Research and Applications (IJERA) ISSN: 22489622 www.ijera.com Vol. 2, Issue 5, September- October
2012, pp.2217-2219.
[3] ISO/IEC
13239,
Information
technology
-Telecommunications and Information exchange between
systems High-level data link control (HDLC) procedures,
www.iaetsd.in
AUTOMOBILE
INNOVATION
Presented by:
Ph no: 9030633480
Abstract:
www.iaetsd.in
road.
crossing
will
generate
electric
System.We
are
using
traffic density.
this
Flow chart:
Approach:
Installation of
inductive loops
10
www.iaetsd.in
which
much accuracy.
decrease
their
inductance.
The
the
Inductive loops:
pulse
An induction
system
which
the
traffic
signal
controller
loop is
or
an electromagnetic communication
detection
to
uses
11
www.iaetsd.in
past
given
point,
as
an
electronic treadle.
induction loop.
An anti-submarine
detect
the
presence
of
scooters
and
loop"
is
applied
to metal
traffic:
(stud/cavity
modifies the
12
www.iaetsd.in
Image Processing
Inductive Loops
field
is high.You can
Working:
13
www.iaetsd.in
in
14
www.iaetsd.in
port
on
the
detector.
15
www.iaetsd.in
are
seeing
daily
in
is
Alcohol
Prevention
in
detection,the
GPS:
system
will
give
three
16
www.iaetsd.in
area
differential
global
positioning
LAUNCH
and
then
stops
the
ERA
OF
Attachments:
NEW
AUTOMOBILE..
warns
OF
car
Videos:
to
Innovation.
place
Piezo-Electric
Devices
on
Car.
References:
system,Traffic
System,Street
Lightening
Signalling
1. http://www.fhwa.dot.gov/publication
s/publiroads/98septoct/loop.cfm
System,Traffic
2. http://auto.howstuffworks.com/cardriving-safety/safety-regulatorydevices/red-light-camera1.htm
renewable energy.
Conclusion:
3. http://www3.telus.net/chemelec/Proj
ects/Loop-Detector/LoopDetector.htm
4. www.wikipedia.org
17
www.iaetsd.in
M.GOWTHAM RAJU.
N.PUSHPALATHA,
[email protected]
[email protected]
Introduction
Digital images become very popular for transferring visual
information. And there are many advantages using these
images instead of traditional camera film. The digital
18
www.iaetsd.in
( =
( , )
(2)
, )
( . )
<
+ 1)(3)
Coefficient
Quantization
Fingerprint
if y = 0
if y=kQi,j
sin ( 2)
0
(5)
19
www.iaetsd.in
20
www.iaetsd.in
21
www.iaetsd.in
Tothe best knowledge increased in the field of antiforensics. Most of the methods of this an forensics is
to find out the process that which the image
compression is takes places, such of that methods
involves in like JPEG detection and quantization table
estimation.in this method of anti-forensic the JPEG
compression of an image history also produces the
information of camera used to produce an image.
4. CONCLUSION:
22
www.iaetsd.in
23
www.iaetsd.in
I.
INTRODUCTION
24
www.iaetsd.in
1 up - W0
2 up (R0, W1)
3 up (R1, W0)
4 down (R0, W1)
5 down (R1, W0)
6 down - R0
In above steps, W represents write, R represents read, up
represents executing RAM addresses in ascending order while
down in descending order. Write0(1) represents writing
0(1)into the memory, read 0(1) represents expected data(0 or 1)
from the memory in read operation.
The BIST module contains a test pattern generator and an
output response analyzer (ORA). MarchC- algorithm is used to
generate the test patterns and a comparator is used as an ORA.
The output from the memory in read operation is compared
with expected data in the corresponding March element and
indicates whether there are any faults in memory or not. It can
also indicate if the memory test is done by activating test_done
to 1.
III.
A.
C.
25
www.iaetsd.in
but the fault addresses should not be stored thrice. So, one to
one mapping is proposed in BISD module.
Second feature is, BISR is flexible. In access mode user can
decide whether to use repairing or not. If BISR, i.e. repairing is
activated redundant locations are used for repairing .Table II
shows the operating modes of RAM.
Third feature is, its repairing speed is high. With one-one
mapping it can replace the faulty locations address with
corresponding redundant address very quickly.
TABLE II
OPERATING MODES OF RAM
D.
BISR Features
The first feature is, BISR is efficient. Normal redundant
words can be used when repairing is not activated. It saves chip
area. The fault addresses are stored only once. March algorithm
has 6 steps. The address will be read five times in one test.
Some faulty addresses will be detected mpore than one time.
Take stuck-at-1 fault, it will be detected in 2nd, 4th and 6th steps
26
www.iaetsd.in
[2]
EXPERIMENTAL RESULTS
[3]
[4]
[5]
[6]
[7]
V. CONCLUSION
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
Farzad Zarrinfa Optimizing embedded memory for the latest ASIC and
SOC design (2012) -chip design tools, technologies and methodologies
by Mentor Graphics.
C. Stapper, A. Mclaren, and M. Dreckman, Yield model for Productivity
Optimization of VLSI Memory Chips with redundancy and partially good
Product, IBM Journal of Research and Development, Vol. 24, No. 3, pp.
398-409, May 1980.
Ad J.van de Goor, Testing Semiconductor memories: Theory and
Practice, 1999, ISBN 90-80 4276-1-6 .
P. Mazumder and Y. S. Jih, A new built-in self-repair approach toVLSI
memory yield enhancement by using neural type circuits, IEEE
transactions on Computer Aided Design, vol. 12, No. 1, Jan, 1993.
W. K. Huang, Y. H. shen, and F. lombrardi, New approaches for repairs
of memories with redundancy by row/column deletion for yield
enhancement, IEEE Transactions on Computer-Aided Design, vol.
9,No. 3, pp. 323-328, Mar. 1990.
H. C. Kim, D. S. Yi, J. Y. Park, and C. H. Cho, A BISR (built-in self
repair) circuit for embedded memory with multiple redundancies, VLSI
and CAD 6th International Conference, pp. 602-605, Oct. 1999.
Shyue-Kung Lu, Chun-Lin Yang, and Han-Wen Lin, Efficient BISR
Techniques for Word-Oriented Embedded Memories with Hierarchical
Redundancy, IEEE ICIS-COMSAR, pp. 355-360, 2006.
C. Stroud, A Designers Guide to Built-In Self-Test, Kluwer Academic
Publishers, 2002.
I.Kang, W. Jeong, and S. Kang, High-efficiency memory BISR with two
serial RA stages using spare memories, IET Electron. Lett. vol. 44, no.
8, pp. 515-517, Apr. 2008.
Huamin Cao, Ming Liu, Hong Chen, Xiang Zheng, Cong Wang and
Zhihua Wang, Efficient Built-in Self-Repair Strategy for Embedded
SRAM with Selectable Redundancy,
Consumer Electronics,
Communications and Networks (CECNet), 2012 2nd International
Conference .
M. Sachdev, V. Zieren, and P. Janssen, Defect detection with transient
current testing and its potential for deep submicron CMOS ICs, IEEE
International Test Conference, pp. 204-213, Oct. 1998.
Mentor Graphics,MBIST Architect Process Guide,Software Version
8.2009_3, Aug 2009, pp. 113-116.
Pinaki Mazumder, Kanad Chakraborty,Testing and Testable Design of
High-Density Random-Access Memories.
Vonkyoung kim and Tom Chen,Assessing SRAM Test Coverage for
SubMicron CMOS Technologies,VLSI test symposium,1997,15th IEEE.
L.Dharma Teja,K. Kiruthika and V. Priyanka Brahmaiah,Built in self
repair for Embedded RAMS with efficient fault coverage using PMBIST,
International Journal of Advances in Engineering & Technology, Nov.
2013.
27
www.iaetsd.in
M.VINOD,
Assistant Professor-ECE Dept,
Siddartha Educational Academy Group of Institutions,
Tirupati,Andhra Pradesh,India-517505.
[email protected]
ABSTRACT
This paper presents the strategy of applying
Hybrid adaption techniques in MIMO OFDM system.
With the rapid growth of digital communication in recent
years, the need for high-speed data transmission is increased.
Multiple-input-multiple-output (MIMO) antenna architecture
has the ability to increase capacity and reliability of a wireless
communication system. Orthogonal frequency division
multiplexing (OFDM) is another popular technique in
wireless communication which is famous for the
efficient high speed transmission and robustness to
frequency selective channels. Therefore, the integration of the
two technologies probably has the potential to meet the ever
growing demands of future communication systems. First
focusing on OFDM in which the bit error rate (BER) of
multilevel quadrature amplitude modulation (M-QAM) in
flat Rayleigh fading channel for 128,256,512 subcarriers
was calculated and also channel estimation can be done by
using different algorithms which is carried out through
Matlab software. The channel estimation of MIMO OFDM
system is calculated by using Minimum mean square error
algorithm (MMSE) and compares the actual value and
estimation errors using Matlab simulation.
Then take the feedback from the channel estimation
and apply hybrid adaptation techniques to improve the
spectral efficiency and to reduce the transmit power. This
system is used in wireless LAN i.e. IEEE 802.11a/g,
HYPERLAN etc.,
Keywords: MIMO, OFDM, BER, M-QAM, MMSE,
MIMO OFDM
I.
INTRODUCTION
28
www.iaetsd.in
III. METHODOLOGY
Orthogonal frequency division multiplexing (OFDM) transforms
a frequency selective channel into a large set of individual
frequency non-selective narrowband channels, which is suited
for a multiple-input multiple-output (MIMO) structure that
requires a frequency non-selective characteristic at each channel
when the transmission rate is high enough to make the
whole channel frequency selective. Therefore, a MIMO system
employing OFDM, denoted MIMO-OFDM, is able to achieve
high spectral efficiency. However, the adoption of multiple
antenna elements at the transmitter for spatial transmission
results in a superposition of multiple transmitted signals at
the receiver weighted by their corresponding multipath
channels and makes the reception more difficult. This imposes a
real challenge on how to design a practical system that can offer a
true spectral efficiency improvement. If the channel is frequency
selective, the received signals are distorted by ISI, which makes
the detection of transmitted signals difficult. OFDM has emerged
as one of most efficient ways to remove such ISI. The delay
spread and Doppler spread are the most important factors to
consider in thee characterizing the SISO system. In the MIMO
system which employs multiple antennas in the transmitter and/or
receiver, the correlation between the transmitter and receiver
antenna is an important aspect of the MIMO channel.it depends
on the angle of arrival of each multipath component In fact,
MIMO technique is an essential means of increasing capacity in
the high SNR regime, providing at most N spatial degrees of
freedom. A typical multi-user MIMO communication
environment in which the multiple mobile stations are served by
single base station in the cellular system. Fig 5.1 and fig 5.2
shows the block diagram of MIMO OFDM transmitter and
receiver. This system is modification of OFDM, which provides
high BER and used in many applications such as DAB, DVB,
DSL.
is minimized:
( ) =Y-X
= (Y-X ) ^H(Y-X )
=
Y-
X -
Y+
= -2(
)+2(
to zero,
) = 0
We have
=
channel estimation as
X)
by
The ultimate goal at the receiver is to recover the signal that was Let us denote each component of the LS channel estimate
originally transmitted. A variety of equalization and signal
[ ], k = 0,1,2,3,..N-1.since X is assumed to be diagonal due
detection techniques has been developed for MIMO systems to the ICI-free condition,the LS channel estimate
can be
depending on whether it is a diversity or spatial multiplexing written for each subcarrier as
system.
[ ] = [ ]/ [ ],k = 0,1,2,N-1
The mean square error(MSE) of this LS channel estimation is
given as
29
www.iaetsd.in
=E{(
=
) (H-
)}
MIMO
And the MMSE channel estimation for MIMO OFDM system for
nth transmit antenna and nth receiver antenna is
( , )
( )
given
=
Where
( , )
=
( ( )) ,
( , )
= ( )
( ( )) +
,Where n = 1, 2.NT, m
= 1, 2.NR and NT, NR are the numbers of transmit and receive
antennas, respectively, X(n) is an N X N diagonal matrix whose
Then, the MMSE channel estimation method finds a better diagonal elements correspond to the pilots of the nth transmit
(linear) estimate in terms of W in such a way that the MSEin antenna and Y(m) is N length received vector at receiver antenna
equation is minimized. The orthogonality principle states that the m.
estimation error vector e =
is orthogonal to ,such that
E{
3.5ADAPTIVE MODULATION
}= E{( )
-W
=0
3.6ADAPTIVEMODULATOR
ANDDEMODULATOR
=
=
( _(
) +
The elements of
and
in equation are E{ , , } =
[ ] [ ] Where k and l denote the subcarrier
frequency index and OFDM symbol
(time) index,
respectively . In an exponentially decreasing multipath PDP
(power delay profile), the frequency- domain correlation [ ] is
given as [ ] = 1/1+j2i
30
www.iaetsd.in
Parameters
SYTEM
IV.SIMULATION RESULTS
FFT Size, Guard
Band,
OFDM
Symbol and No.of
Symbols used
OFDM
FFT size
128
32
Symbol duration
160
Channel
Rayleigh Fading
No of symbols used
96
Modulation
QAM
for
OFDM
Channel
OFDM
CHANNEL
ESTIMATION
Nfft=128;
Ng=Nfft/8;
Nofdm=Nfft+Ng;
Nsym=100;
Pilot
Spacing,
Numbers of Pilots
and
Data
per
OFDM Symbol
Nps=4;
Np=Nfft/Nps;
Nd=Nfft-Np;
Nbps=4; M=2^Nbps;
LS and MMSE
No of symbol Errors and
MSE value
Table.3. The
Estimation
of
OFDM
Channel
MSE OF
LSLINEAR
MSE
OF
LSSPLITTER
MSE OF
MMSE
NO.
OF
SYMBOL
ERRORS
25
5.8523e003
7.3677e-003
1.4212e003
84
30
1.8578e003
2.3317e-003
5.2873e004
32
35
5.9423e004
7.3929e-004
1.9278e004
15
31
Results
SNR
Simulation
www.iaetsd.in
40
1.9446e004
2.3583e-004
6.5509e005
11
V.CONCLUSION
45
6.7919e005
7.6674e-005
2.1960e005
50
2.7839e005
2.6372e-005
7.8805e006
Hence the each and every block of OFDM is studied and plotted
the BER analysis under AWGN channel as well as Rayleigh
fading channel and compare the simulation results for different
EbN0[dB] values and BER value.
SYSTEM
No of receive antennas
No
of
transmit
antennas
Channel
Algorithm
MIMO-OFDM CHANNEL
ESTIMATION
3
2
Rayleigh fading
MMSE
REFERENCES
[1]. C.Poongodi, P.Ramya ,A. Shanmugam,(2010) BER Analysis of
MIMO OFDM System using M-QAM over Rayleigh Fading
Channel Proceedings of the International Conference on
Communication and Computational Intelligence.
[2]. Dr.JayaKumari.J,(2010) MIMO OFDM for 4G Wireless
Systems, International Journal of ngineering Science and
Technology VOL.2 (7).
[3].PallaviBhatnagar,JaikaranSingh,MukeshTiwari(2011)
Performance of MIMO-OFDM System for Rayleigh fading
channel International Journal of Science and Advanced
Technology(ISSN 2221-8386) Volume No 3 May 2011.
[4].PuLi,Haibin Zhang, Job Oostveen, Erik Fledderus(2010)
MIMO OFDM Performance in Relation to Wideband Channel
Properties The Netherlands 21 st IEEE International Symposium
on Personal,Indoor and Mobile Radio Communications .
[5].Jia Tang and Xi Zhang(2010), Hybrid-daption-Enhanced
Dynamic Channel Allocation for OFDM Wireless Data Networks ,
Networking and information systems laboratory, department of
electrical engineering.
[6]. Viet- Ha Xian in Wang, MD.JahidurRahman, and Jay
Nadeau(2010) , Channel Prediction Based Adaptive Power
Control for Dynamic Wireless Communications Department of
electrical and computer engineering the
university of
westernOntario, London, on, Canada N6A 5B8.
[7]Ohno and iwaosasase(2010) Adaptive Transmission Power
Control for MIMO Diversity Employing Polarization Diversity in
OFDM Radio Access department of information and computer
science,kieo university JAPAN.
[8]Andrea Goldsmith Wireless Communications
[9]TheodereS.Rappaport Wireless Communications Principles and
Practices Second edition
[10] http://www.cambridge.org/9780521837163
32
www.iaetsd.in
PROF. V. M. UMALE
Department of Electronics,
Amravati University,
SSGM College of Engineering,
Shegaon 444203,
District: Buldhana, State: Maharashtra
Country:India
[email protected]
I INTRODUCTION
This digital oscilloscope provides a cheap alternative to
expensive oscilloscopes; using a VGA display and a simple
mouse interface, a user can use this scope to look at and
measure signals up to about 80Mhz. this kind of scope would
be ideal for hobbyists and students looking to learn and debug
circuits. Development is based on the Spartan III Starter Kit
from Xilinx. The ADC is simply controlled by an MCU
(another starter kit: the ATK400 from Atmel) but will soon
be controlled by the FPGA (to achieve the faster speeds).
In the future, schematics and PCB layout binaries will be
available.
1. Features
Timescale selection
Selectable trigger (Rising, Falling / Normal, Single, Auto)
Horizontal and Vertical position offsets
Grid Display On/Off/Outline
33
www.iaetsd.in
3) Functional Description:
The digital oscilloscope processes the digital data and shows
it on the VGA. This is thus have three large block, these are:
1. ADC converter 2. Display device 3. controller part (FPGA
part)
Mouse Driver:
The user define values are needed to control the oscilloscope
such as time scale, vertical offset, triggering style etc. thus a
input device is needed to give the input in This project this
block use mouse as PS2 format to give user input.
ADC converter:
This block has an analog to digital IC to convert the input
analog signal into its equivalent digital Signal. The ADC is
simply controlled by an MCU (another starter kit: the
ATK500 from Atmel) but will soon be controlled by the
FPGA (to achieve the faster speeds). The digital data from
ADC then goes to the FPGA Spartan 3 kit
34
www.iaetsd.in
IV. CONCLUSION
Fig 6: Block diagram of VGA Driver Part
V. REFERENCE
[1] Pereira, J.M.D., The history and technology of
oscilloscopes, Instrumentation & Measurement Magazine,
IEEE Volume 9, Issue 6, 2006
[2]Oscilloscope
Types:
http://www.radioelectronics.com/info/t_and_m/oscilloscope/
oscilloscope_types.php
[3] Hawkins Electrical Guide, Theo. Audel and Co., 2nd
ed. 1917, vol. 6, Chapter 63: Wave Form Measurement, pp.
1841-2625
[4]
XYZ
of
Oscilloscopes
Tutorial
http://www.tek.com/Measurement/
programs/301913X312631/?lc=EN&PRODUCT=&returnUr
l=ct=TI &cs=pri&ci=2280&lc=EN
35
www.iaetsd.in
36
4
www.iaetsd.in
I.INTRODUCTION
A.
The sign language is the fundamental communication method between the people who suffer from hearing defects. In order for an
ordinary person to communicate with deaf people, a translator is
usually needed the sign language into natural language and vice
versa. International Journal of Language and Communication Disorders, 2005) Sign language can be considered as a collection of gestures, movements, posters, and facial expressions corresponding to
letters and words in natural languages.
American Sign Language (ASL) National Institute on Deafness
&
Other communication Disorders, 2005) is a complete language that
employs signs made with the hands and other facial expressions and
postures of the body. According to the research by Ted Camp found
on the Web site www.silentworldministries.org, ASL is the fourth
most used language in the United States only behind English, Spanish and Italian (Comp). ASL is a visual language meaning it is not
expressed through sound but rather through combining hand shapes
through movement of hands, arms and facial expressions. Facial
37
www.iaetsd.in
.
B. Related Work
Attempts to automatically recognize sign language began to appear
in the 90s. Research on hand gestures can be classified into two cate
Gories. First category relies on electromechanical devices that are
used to measure the different gesture parameters such as hands position, angle, and the location of the fingertips. Systems that use such
devices are called glove-based systems. A major problem with such
systems is that they force the signer to wear cumbersome and inconvenient devices. Hence the way by which the user interacts with the
system will be complicated and less natural. The second category
uses machine vision and image processing techniques to create visual based hand gesture recognition systems. Visual based gesture
recognition systems are further divided into two categories: The first
one relies on using specially designed gloves with visual markers
called visual-based gesture with glove-markers (VBGwGM) that
help in determining hand postures. But using gloves and markers do
not provide the naturalness required in humancomputer interaction
systems. Besides, if colored gloves are used, the processing complexity is increased. The second one that is an alternative to the second kind of visual based gesture recognition systems can be called
pure visual-based gesture (PVBG) means visual-based gesture
without glove-markers. And this type tries to achieve the ultimate
convenience naturalness by using images of bare hands to recognize
1. Learning algorithms.
a. Neural network (e.g. research work of Banarse, 1993).
b. Hidden Markov Models (e.g. research work of Charniak, 1993).
c. Instance-based learning(research work of Kadous,1995)
2. Miscellaneous techniques.
a. The linguistic approach (e.g. research work of Hand, Sexton, and
mullan, 1994)
b. Appearance-based motion analysis (e.g. research Work of Davis
and Shah, 1993).
c. Spatio-temporal vector analysis (e.g. research Work of Wuek,
1994
a. Template matching (e.g. research work Darrell and Pentland,
1993)
b. Feature extraction and analysis, (e.g. research work of Rbine,
1991)
c. Active shape models Smart snakes (e.g. research work of Heap
and Samaria, 1995)
d. Principal component analysis (e.g. research work of Birk, Moeslund and Madsen, 1997)
e. Linear fingertip models (Research work of Davis and shah, 1993)
f. Causal analysis (e.g. research work of Brand and Irfan, 1995).
Among many factors, five important factors must be considered for
the successful development of a visionbased solution to collecting
data for hand posture and gesture recognition
38
www.iaetsd.in
Prepared image
-----------------------------------------Image resizing
Feature
extraction
Edgedetetion
Featureextraction
-----------------------------------------Feature vector
Classification
Neuralnework
Classified sign
B.Classification Phase
The next important step is the application of proper feature extraction method and the next is the classification stage, a 3-layer, feedforward back propagation neural network is constructed.
The classification neural network is shown (see figure 3).
It has 256 instances as its input. Classification phase includes network architecture, creating network and training the network. Network of feed forward back propagation with supervised learning is
used.
39
www.iaetsd.in
The goal is to design a highly distinctive descriptor for each interest point to facilitate meaningful matches, while simultaneously
ensuring that a given interest point will have the same descriptor
regardless of the hand position, the lighting in the environment,
etc. Thus both detection and description steps rely on invariance
of various properties for effective image matching. It attempts to
process static images of the subject considered, and then matches
them to a statistical database of preprocessed images to ultimately
recognize the specific set of signed letter.
that this step can't be elim nated. In this algorithm, the orientation
is in the range [- PI, PI] radians.
D. KEYPOINT DESCRIPTORS
First the image gradient magnitudes and orientations are calculated around the key point, using the scale of the key point to select the level of Gaussian blur for the image. The coordinates of
the descriptor and the gradient orientations are rotated relative to
the key point orientation. Note here that after the grid around the
key point is rotated, we need to interpolate the Gaussian blurred
image around the key point at non-integer pixel values. We found
that the 2D interpolation in MATLAB takes much time. So, for
simplicity, we always approximate the grid around the key point
after rotation to the next integer value. By experiment, we realized that, this operation increased the speed much and still had
minor effect on the accuracy of the whole algorithm. The gradient
magnitude is weighted by a gaussian weighting function with ,
equal to one half of the descriptor window width to give less
credit to gradients far from center of descriptor. Then, these magnitude samples are accumulated into an orientation histogram
summarizing the content over 4x4 subregion. Fig. 4 describes the
whole operation. Trilinear interpolation is used to distribute the
value of each gradient sample into adjacent bins. The descriptor is
formed from a vector containing the values of all the orientation
histogram entries. The algorithm uses 4x4 array of histograms
with 8orientation bins in each resulting in a feature vector of 128
elements. The feature vector is then normalized to unit length to
reduce the effect of illumination change. The values in unit length
vector are thresholded to 0.2 and then renormalized to unit length.
This is done to take care of the effect of nonlinear illumination
changes.
A. FINDING KEYPOINTS
The SIFT feature algorithm is based upon finding locations
(called key points) within the scale space of an image which can
be reliably extracted. The first stage of computation searches over
all scales and image locations. It is implemented efficiently by
using a difference-of-Gaussian function to identify potential interest points that are invariant to scale and orientation. Key points
are identified as local maxima or minima of the DoG images
across scales. Each pixel in a DoG image is compared to its 8
neighbours at the same scale, and the 9 corresponding neighbours
at neighbouring scales. If the pixel is a local maximum or minimum, it is selected as a candidate key point.
We have a small image database, so we don't need a large number
of key points for each image. Also, the difference in scale between large and small bare hands is not so big.
B.
KEYPOINT LOCALIZATION
In this step the key points are filtered so that only stable and more
localized key points are retained. First a 3D quadratic function is
fitted to the local sample points to determine the location of the
maximum. If it is found that the extremum lies closer to a different sample point, the sample point is changed and the interpolation performed instead about that point. The function value at the
extremum is used for rejecting unstable extrema with low contrast.The DoG operator has a strong response along edges present
in an image, which give rise to unstable key points. A poorly defined peak in the DoG function will have a large principal curvature across the edge but a small principal curvature in the perpendicular direction.
C.
ORIENTATION ASSIGNMENT
Figure 7: 2x2 descriptor array computed from 8x8 samples (Source: Reference 1)
40
www.iaetsd.in
tions are P-by-4 matrix, in which each row has the 4 values for a
key-point location (row, column, scale, orientation). The orientation is in the range [-PI, PI] radians
The distance of one feature point in first image and all feature
points in second image must be calculated when SIFT algorithm
is used to match image, every feature point is 128- dimensional
data, the complexity of the calculation can well be imagined.A
changed Comparability measurement method is introduced to
improve SIFT algorithm efficiency. First, Euclidean distance is
replaced by dot product of unit vector as it is less computational.
Then, Part characteristics of 128-dimensional feature point take
part in the calculation gradually. SIFT algorithm time reduced.
Euclidean Distance is distance between the end points of the two
vectors. Euclidean distance is a bad idea because Euclidean distance is large for vectors of different lengths. This measure suffers from a drawback: two images with very similar content can
have a significant vector difference simply because one is much
longer than the other. Thus the relative distributions may be identical in the two images, but the absolute term frequencies of one
may be far larger. So the key idea is to rank images according to
angle with query images. To compensate for the effect of length,
the standard way of quantifying the similarity between two images d1 and d2 is to compute the cosine similarity of their vector
representations V (d1) and V (d2)
Algorithmblockdiagram
Now apply these steps in our previous image from which SIFT
features are extracted.
41
www.iaetsd.in
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
TOTAL
7
7
8
8
7
7
8
7
7
8
8
7
7
8
8
8
8
6
8
6
193
1
1
0
0
1
1
0
1
1
0
0
1
1
0
0
0
0
2
0
2
15
66.66
66.66
100
100
66.66
66.66
100
66.66
66.66
100
100
66.66
66.66
100
100
100
100
33.33
100
33.33
92.78
Table 1 Results of training 8 samples for each sign with (0.25) Canny
Threshold
The data set used for training and testing the recognition system
consists of grayscale images for all the ASL signs used in the
experiments are shown see fig. 4. Also 8 samples for each sign
will be taken from 8 different volunteers. For each sign 5 out of 8
samples will be used for training purpose while remaining five
signs were used for testing. The samples will be taken from different distances by WEB camera, and with different orientations.
In this way a data set will be obtained with cases that have different sizes and orientations and hence can examine the capabilities
of the feature extraction scheme.
B.Recognition Rate
Figure. 9 Training chart for a network trained on 8 samples for each sign,
(0.25) Canny threshold
Figure 10 Percentage error recognition chart of neural network
no.ofcorrectlyclassifiedsigns
totaL n oofsigns
C.Experimental Results
SIGN
A
B
C
D
E
F
Recognized
samples
7
7
7
8
8
8
Misclassified
samples
1
1
1
0
0
0
Ecognition
rate
66.66
66.66
66.66
100
100
100
E.
42
www.iaetsd.in
In Figure 8, we compare Database Images 1, 3, 7 with input image key points. So Database Image 3 is closest match with input
image.
A text to sign interpreter means if the user types any sign or sentence corresponding signs are shown so that normal person to
deaf people communication can be done. Examples of showing
the sign to text converters are shown (See figure 6). Fig. 6 shows
when the user type the name BOB in the text box its corresponding signs are appear on the screen one by one above the text
or spelling.
The problem now is how we can identify a 'No Match'. For this,
we saw that the 'No Match' query images are in many cases confused with the database images that have a large number of feature vectors in the feature vectors database. We decided to compare the highest vote (corresponding to the right image) and the
second highest vote (corresponding to the most conflicting image). If the difference between them is larger than a threshold,
then there is a match and this match corresponds to the highest
vote. If the difference is smaller than a threshold, then we declare
a 'No Match'. The values of THRESHOLD were chosen by experiment on training set images either with match or no match.
The approach described above has been implemented usingMATLAB. The implementation has two aspects: training and
inference. During the training phase locally invariant features
(key points, orientation, scales and descriptors) from all training
images are retrieved using the SIFT algorithm.During inference,
the objective is to recognize a test image. A set of local invariant
features are retrieved for the test image during the inference phase
and compared against the training feature-set using the metric
explained in section 4.The title of the closest match is returned as
the final output.
In order to prove the performance of our proposed system, we
Predefined the number of gestures from B, C, H, I, L, O, Y and
create a hand gesture database. Matching is performed between
images by unit vectors. The matching is accomplished for proposed method and the result shows that it produces 98% accuracy.
In Figure 7, we can easily identify Database Images 1, 3, 7 have
more number of key-points matched with input image key-points
.So Distance Ratio
Parameter and threshold are adjusted.
43
www.iaetsd.in
(1.5 GHz AMD processor, 128 MB of RAM running under windows 2008.) WEB-CAM-1.3 is used for image capturing.
The system is proved robust against changes in gesture.Using
Histogram technique we get the misclassified results. Hence Histogram technique is applicable to only small set of ASL alphabets
or gestures which are completely different from each other. It
does not work well for the large or all 26 number of set of ASL
signs. For more set of sign gestures segmentation method is suggested. The main problem with this technique is how good differentiation one can achieve. This is mainly dependent upon the
images but it comes down to the algorithm as well. It may be enhanced using other image
Processing technique like edge detection as done in the presenting
paper. We used the well known edge detector like Canny, Sobel
and Prewitt operators to detect the edges with different threshold.
We get good results with Canny with 0.25 threshold value. Using
edge detection along with segmentation method recognition rate
of 92.33% is achieved. Also the system is made background independent. As we have implemented sign to text interpreter reverse
also implemented that is text to sign interpreter.
Gesture
Name
B
C
H
I
L
O
Y
Testing Number
150
150
150
150
150
150
150
Success
Number
149
148
148
149
148
148
149
Correct Rate
99.3
98.7
98.7
99.3
98.7
98.7
99.3
Table2. The results of classifier for the training set and Testing set
ACKNOWLEDGMENT
7. CONCLUSIONS:
REFERENCES
a.
44
www.iaetsd.in
b.
c.
d.
e.
f.
g.
h.
i.
j.
k.
l.
m.
n.
o.
45
www.iaetsd.in
Parvase Syed
network [1][2]. MANETs consist of a self-healing, peerto-peer, self-organization network in contrast to a mesh
topology has a central controller (to optimize,
determine, and distribute the routing table). MANETs
circa 2000-2015 habitually communicate at radio
frequencies (30 MHz - 5 GHz).
I.INTRODUCTION
A mobile ad hoc network (MANET) is a
continuously
self-configuring,
infrastructureless network of mobile devices connected without
wires.In MANET devices can move in any direction
independently, and will therefore nodes frequently
change its links to other nodes. Unrelated to its use
every node must forward traffic in network, and
therefore be a router. The key challenge in constructing
a MANET is equipping each node to regularly maintain
the information required to route trafficproperly. Such
networks maybe connected to the larger Internet or
mayoperate by themselves. In between nodes contain
one or multiple and different transceivers. This results in
a highlydynamic, autonomous topology.
MANETs are a kind of Wireless ad hoc
network that usually has a routable networking
surroundings on top of a Link Layer ad hoc
46
www.iaetsd.in
Digital Signature
A digital
signature or digital
signature
scheme was a type of asymmetric cryptography. For
messages sent through an insecure medium, a fine
implementation of digital signature algorithm is the one
that gives confidence to the receiver the claimed sender
only sending the messages to it, and trust the message.
47
www.iaetsd.in
48
www.iaetsd.in
Digital
Signature:
BAACK
is
an
acknowledgement-based IDS schema. All three
modules of BAACK, namely, ACK, S-ACK, and
MRA, are acknowledgment-based detection
schemes. They all rely on ACK packets to detect
misbehaviors in the network. Thus, it is very
important to confirm that all acknowledgment
packets in BAACK wereuntainted andauthentic.
Otherwise, if the attackers are veryclever to forge
acknowledgment packets, all of the three systems
will be vulnerable. To overcome this problem, need
to incorporate digital signature in secure IDS. In
order to guarantee the integrity of the IDS, in
BAACK before sending any message to destination
it must be digitally signed and verified till they are
accepted [1].
49
www.iaetsd.in
50
www.iaetsd.in
MSc (Engg), FIETE, MISTE, Department of ECE, S.R.K.R Engineering College, A.P, India
B.Tech (M.Tech), Department of ECE, S.R.K.R Engineering College, Bhimavarm, A.P, India
Abstract
In this paper we apply a multicarrier signalling technique to a direct-sequence CDMA system, where a data
sequence multiplied by a spreading sequence modulates multiple carriers, rather than a single carrier. The
receiver provides a correlator for each carrier, and the outputs of the correlators are combined with a maximalratio combiner. This type of signalling has the desirable properties of exhibiting a narrowband interference
suppression effect, along with robustness to fading, without requiring the use of either an explicit RAKE
structure or an interference suppression filter.We use band limited spreading waveforms to prevent selfinterference, and we evaluate system performance over a frequency selective Rayleigh channel in the presence
of partial band interference. There is no interference from the CDMA signals to the existing microwave systems.
Thus, there is no need for either a narrowband suppression filter at the receiver or a notch filter at the
transmitter. This paper specially analyses the BER performance under Rayleigh fading channel conditions of
multicarrier DS-CDMA in presence of AWGN (Additive White Gaussian Noise) using BPSK modulation for
different number of subcarrier, different number of users using MATLAB program
51
www.iaetsd.in
Tc
Where
BW1 (1 )
In (2),
1
..(2)
Tc
BWM
BW1
M
1
=(1+ )
MTC
.(3)
2.1 TRANSMITTER
The transmitter has input a random binary sequence
representing data, and pseudo-random spreading
signature sequences are given to multiplier. We
assume that there are N chips per symbol, and that
each user has a different signature sequence. The
sequence modulates an impulse train, where the
energy per chip is E,. After passing through a chip
wave-shaping filter, the signal out of the filter
modulates the multiple carrier signals and is
transmitted. Note that the transmitter and receiver
block diagrams for the proposed multicarrier
2. SYSTEM MODEL
In recent years, several wideband CDMA systems
have been proposed either to realize an overlay
system [5], where DS CDMA waveforms are
overlaid onto existing narrowband signals to
enhance the overall capacity, or to combat
52
www.iaetsd.in
this:
3. CHANNEL MODEL
3.1 RAYLEIGH CHANNEL MODEL
Rayleigh fading is a statistical model [9] for the
effect of a propagation environment on a radio
signal, such as that used by wireless devices.
Rayleigh fading models assume that the magnitude
of a signal that has passed through such a
transmission medium will vary randomly, or fade,
according to a Rayleigh distribution the radial
53
www.iaetsd.in
ratio
combiner:
Maximal
Ratio
f 1 H ( f ) x(t )
H ( f ) df 1
.. (4)
4. SIMULATION RESULTS
3.3 RECEIVER:
54
www.iaetsd.in
0.45
0.4
0.35
0.3
0.25
0.2
0.15
0.5
User 1 of 2 users
One user system
0.45
0.05
0.4
-50
-45
-40
-35
-30
-25
-20
SNR, dB
-15
-10
-5
0.3
0.25
0.2
0.5
0.15
0.45
0.1
0.4
0.05
0.35
-50
-45
-40
-35
-30
-25
-20
SNR, dB
-15
-10
-5
0.35
User 1 of 14 users
One user system
0.3
0.25
0.2
0.15
0.1
0.05
0.45
-50
0.4
-45
-40
-35
-30
-25
-20
SNR, dB
-15
-10
-5
0.35
0.3
0.25
0.2
0.15
0.1
CONCLUSION
0.05
-50
-45
-40
-35
-30
-25
-20
SNR, dB
-15
-10
-5
In this paper the performance of Multicarrier DSCDMA in AWGN channel and Rayleigh channel
Using BPSK modulation technique is considered. It
can be evident that as Eb/N0 increases the BER
decreases. BER vs. SNR graphs for different
number of users under Rayleigh Fading channel in
presence AWGN is plotted and analysed
successfully by using MATLAB programming.
0.45
0.4
0.35
FUTURE SCOPE:
0.3
0.25
0.2
0.15
0.1
0.05
-50
-45
-40
-35
-30
-25
-20
SNR, dB
-15
-10
-5
55
www.iaetsd.in
REFERENCES
[1] G. L. Turin, Introduction to spread-spectrum
antkultipath techniques and their application to
urban digital radio, Proc. IEEE, vol. 68.
[2] R. E. Ziemer and R. L. Peterson, Digital
Communications and Spread Spectrum Systems.
New York Macmillan.
[3] R. L. Pickholtz, D. L. Schilling, and L. B.
Milstein,
Theory
of
spreadspectrum
communications-A
tutorial,
IEEE
Trans.
Commun., vol. COM-30, no. 5,.
[4]S. Kondo and L. B. Milstein, Multicarrier
CDMA system with cochanne1 interference
cancellation, in Proc. VTC 94, Stockholm,
Sweden, pp. 164C-1644.
[5] Multicarrier DS CDMA systems in the
presence of partial band interference, in Proc.
MILCOM , Fort Monmouth, NJ.
[6] J.Proakis, Digital Communications, McGrawHill
[7]R. E. Ziemer and R. L. Peterson, Digital
Communications and Spread Spectrum Systems,
Macmillan
[8] M. Schwartz, W. R. Bennet, and S. Stein,
Communication Systems and Techniques, McGrawHill
[9] G. Brindha, Performance Analysis Of McCdma System Using Bpsk Modulation,
International Journal Of Research In Engineering &
Technology (Ijret) Vol. 1, Issue 1, 45-52
56
www.iaetsd.in
K.V.S.N.Raju
Department of ECE
SRKR Engineering College
Bhimavaram, AP, India
[email protected]
Buddaraju Revathi
Asst. Professor, Department of ECE,
57
www.iaetsd.in
A. Spatial Multiplexing
U
s
e
r
X1
Modulation
IFFT
MIMO
Channel
X2
XL
B. Diversity Schemes
Y1 Y2
YL
P-element
U
s
e
r
Demodulation
ZF/MMSE/
PIC/
Iterative
PIC
F
F
T
Receiver
antenna
array
MIMO Techniques:
Current MIMO system includes MISO and SIMO system that
uses MIMO technique to improve the performance of wireless
system can be divided into two kinds. One is spatial
multiplexing which provides a linear capacity gain in relation
to the number of transmitting antenna and the other is spatial
diversity schemes which can reduce the BER and improve the
reliability of wireless link.
58
www.iaetsd.in
x
h1,2 1 n1
x2
(1)
x
h2,2 1 n2
x2
(2)
Where,
y1 and y2 are the received symbol on the first and second
antenna, h1,1 is the channel from 1st transmit antenna to 1st
receive antenna, h 1,2 is the channel from 1st transmit antenna to
2nd receive antenna, h2,1 is the channel from 2nd transmit
antenna to 1st receive antenna, h2,2 is the channel from 2nd
transmit antenna to 2nd receive antenna, x1, and x2 are the
transmitted symbols and n1 and n2 are the noise on 1st and 2nd
receive antennas respectively.
The sampled baseband representation of signal is given by:
x
y1 h1,1 x1 h1,2 x2 n1 h1,1 h1,2 1 n1
x2
H 1, 2
H 2 ,2
H N R ,2
H 1, N T
H 2 ,NT
H N R , N T
(8)
x1
y2 h2,1x1 h2,2 x2 n2 h2,1 h2,2 n2
x2
(9)
Where,
y1, y2 are the received symbol on the 1st and 2nd antenna
respectively, h1,1 is the channel from 1st transmit antenna to 1st
receive antenna, h1,2 is the channel from 1st transmit antenna to
2nd receive antenna, h2,1 is the channel from 2nd transmit
antenna to 1st receive antenna, h2,2 is the channel from 2nd
transmit antenna to 2nd receive antenna, x1, x2 are the
transmitted symbols and n1, n2 is the noise on 1st , 2nd receiver
antennas.
The above equation can be represented in matrix notation as
follows:
y= Hx+n
(3)
Where,
y = Received symbol matrix,
H = Channel matrix,
x = Transmitted symbol matrix,
n = Noise matrix.
For a system with NT transmit antennas and NR receiver
antennas, the MIMO channel at a given time instant may be
represented as NT x NR matrix:
H 1,1
H 2 ,1
H
H N R ,1
y1 h1,1 h1,2 x1 n1
y h h x n
2 2,1 2,2 2 2
(4)
Equivalently,
(10)
y = Hx+n
Where,
W= Equalization matrix
H= Channel matrix
This matrix is known as the pseudo inverse for a general m x n
matrix where
W=[HHH+NoI]-1HH
h*
H 1*,1
h1 , 2
h 2* ,1 h1 ,1
h 2* , 2 h 2 ,1
h1 , 2
h2 , 2
x1
H
-1 H
x = (H H+N0I) H
2
(6)
y1
y
2
(12)
x1
H
-1 H y 1
x = (H H) H y
2
2
(11)
(7)
59
www.iaetsd.in
(13)
(14)
(15)
(16)
(17)
Fig. 2. BER for BPSK modulation with ZF and MMSE equalizers in 2x2
MIMO-OFDM system.
Where,
R is the output of PIC Equalizer
W is the parameter of MMSE Equalization matrix
Z is the estimated symbols of PIC Equalizer
For i = 1: nT
nT - 1
c = y- H (: , J). Z
j=1
E = Dec (W. c)
(18)
From the plot it is clear that 2x2 MIMO-OFDM system with
Iterative PIC equalizer for case of pure equalization compared
to PIC equalizer. The code BER of proposed scheme is
produced after iteration. when iteration increases the BER is
significantly improved. From simulation results the proposed
scheme Iterative PIC is quite effective compared to PIC.
Modulation scheme employed here is BPSK.
Where,
E is the estimation of transmitted symbols of iterative PIC
detector,
W is the MMSE equalization matrix,
c is the output of iterative PIC detector,
nT is the number of transmitting antennas.
60
www.iaetsd.in
V. CONCLUSION
The combination of MIMO-OFDM systems are used to
improve the spectrum efficiency of wireless link reliability in
wireless communication systems. Iterative PIC scheme for
MIMO OFDM systems transmission including the feasibility
of using the priori information of the transmit sequence of
MMSE compensation. Performance of Iterative PIC detection
technique is better compared to ZF, MMSE, PIC using BPSK
modulation scheme in high interference environment. The
simulation result shows that the performance of proposed
scheme is greatly improved compared to other detection
receivers for MIMO-OFDM systems.
VI. FUTURE SCOPE
Any type of modulation techniques such as QPSK or QAM
will integrate the channel encoding part.
REFERENCES
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
Fig .5. Performance comparison of ZF, MMSE, PIC and Iterative PIC
equalizers in 2x2 MIMO-OFDM system .
61
www.iaetsd.in
M.tech Student,
Department Of Eelectronics and Communications,
SRKR Engineering College,
ANDHRA PRADESH, INDIA.
Email: [email protected]
Asst Professor,
Department Of Eelectronics and Communications,
SRKR Engineering College,
ANDHRA PRADESH, INDIA.
Email: [email protected]
I.
II.
INTRODUCTION
62
www.iaetsd.in
fast
Fourier
transform
(FFT)
algorithms.
Decomposing is an important role in the FFT
algorithms. There are two decomposed types of the
FFT algorithm. One is decimation-in-time (DIT), and
the other is decimation-in-frequency (DIF). There is
no difference in computational complexity between
these two types of FFT algorithm. Different Radix
DIF algorithms we used are
A. Radix-2 DIF FFT Algorithm
Decomposing the output frequency sequence
X[k] into the even numbered points and odd
numbered points is the key component of the Radix-2
DIF FFT algorithm [6]. We can divide X[k] into 2r
and 2r+1, then we can obtain the following equations
[2 ] =
[ ]
[2 + 1] =
[ ]
= 0,1,2, . . ,
(1)
(2)
[2 ] =
[ ]
[ ]
(3)
[2 ] =
( [ ] + [ + /2])
= 0,1,2, . . ,
(4)
[2 + 1] =
[ ]
= 0,1,2, . . ,
1
(5)
From Equation (4) and (5), we can find out the same
components, x[n] and x[n+N/2], so we can combine
the two equations as one basic butterfly unit shown in
Figure 2. The solid line means that x[n] adds x[n + N
63
www.iaetsd.in
( )
( )
(8 + ) =
( )
( )
[ ]
+2
+4
+
+
+6
+ 8
+
+3 8
+
+
+5 8
+7 8
+
(6)
( )
(7)
8
8
8
(9)
The butterfly graph can be simplified as shown in
Figure 4
( )=
( ) + ( ) ( + 4) + (1)
( + 2) + ( ) ( + 3 4)
(8)
So, Equation (8) can then be expressed as four N/ 4 point
DFTs. The simplified butterfly signal flow graph of
64
www.iaetsd.in
[ ]+
(10)
= 0,1,2, . . ,
For example if N = 22m+1 = 2 4m, the mixedradix algorithm [7][8] combines one step of the
radix-2 algorithm and m steps of the radix-4
algorithm. The second kind of mixed-radix
algorithms in the literature refers to those specialized
for a composite N = N0 N1 N2 ... Nk. Different
algorithms may be used depending on whether the
factors satisfy certain restrictions. Only the 2 4m of
the first kind of mixed-radix algorithm will be
considered here.
The mixed-radix 4/2 butterfly unit is shown in
Figure5.
(4 + 1) =
( ) + ( ) ( + 4)
+(1) ( + 2) + ( ) ( + 3 4)
(11)
(4 + 3) =
( ) + ( ) ( + 4)
( + 2) + ( ) ( + 3 4)
(12)
Thus the N-point DFT is decomposed into one N/2 point DFT without additional twiddle factors and two
N/4 -point DFTs with twiddle factors. The N-point
DFT is obtained by successive use of these
decompositions up to the last stage. Thus we obtain a
DIF split-radix-2/4 algorithm. The signal flow graph
of basic butterfly cell of split-radix-2/4 DIF FFT
algorithm is shown in Figure 6
we have
(2) =
65
+
+
3
4
www.iaetsd.in
(1) =
(3) =
( ) + ( ) ( + 4)
+(1) ( + 2) + ( ) ( + 3 4)
( ) + ( ) ( + 4)
( + 2) + ( ) ( + 3 4)
(13)
As a result, even and odd frequency samples of
each basic processing block are not produced in the
same stage of the complete signal flow graph. This
property causes irregularity of signal flow graph,
because the signal flow graph is an L-shape
topology.
IV PRUNING TECHNIQUES
To increase the efficiency of the FFT technique
several pruning and different other techniques have
been proposed by many researchers. In this paper, we
have implemented a new pruning technique i.e.
IZTFFTP by simple modification and some changes
and also includes some tricky mathematical
techniques to reduce the total execution time.
V RESULTS
In order to compare the computational
complexities among the different radix DIF FFT
algorithms on OFDM, the calculations based on the
OFDM block sizes have been performed which are
given in Table 1 and with pruning comparison in
Table 2.
The speed improvement factors from without to
with pruning of different radix algorithms are seen in
Table 3.
66
www.iaetsd.in
OFDM
Block
Size
Radix -2
cm
1
4
12
32
80
192
2
4
8
16
32
64
cadd
2
8
24
64
160
384
Radix-4
cm
3
24
144
Radix-8
cadd
8
64
384
cm
7
112
cadd
24
384
Mixed
Radix-4/2
cm
10
28
64
160
cadd
24
64
160
384
Mixed
Radix-8/2
cm
22
60
152
cadd
64
160
384
Split
Radix-2/4
cm
0
4
12
36
92
cadd
8
24
64
160
384
Table 2: Comparison of complex additions(cadd) and complex multiplications(cm) of different radix algorithms
without pruning
OFDM
Block
Size
Radix -2
cm
0
0
12
31
76
179
2
4
8
16
32
64
cadd
2
8
24
64
160
384
Radix-4
cm
3
24
141
Radix-8
cadd
8
64
384
cm
-
cadd
-
7
112
24
384
Mixed
Radix-4/2
cm
8
26
64
157
cadd
24
64
160
384
Mixed
Radix-8/2
cm
22
60
152
cadd
64
160
384
Split
Radix-2/4
cm
0
4
12
36
90
cadd
8
24
64
160
384
Table 2: Comparison of complex additions(cadd) and complex multiplications(cm) of different radix algorithms
with pruning
FFT
Size
Radix2
Radix4
Radix8
Mixed
Radix4/2
Mixed
radix8/2
Split
radix2/4
1.25
16
32
1.03
1.05
1
-
1.07
1
1
1
1
1
64
1.07
1.02
1.01
67
www.iaetsd.in
VI CONCLUSION
The computational performance of an OFDM
system depends on FFT as in an OFDM system. FFT
works as a modulator. If the complexity decreases,
then the speed of OFDM system increases. Results
shows input zero traced radix DIF FFT pruned
algorithms are much efficient than the Radix DIF
FFT algorithms as it takes very less time to compute
where number of zero valued inputs/outputs are
greater than the total number of non zero terms, with
maintaining a good trade-off between time and space
complexity, and it is also independent to any input
data sets.
VII References
[1] B. E. E. P. Lawrey, Adaptive Techniques for
Multi-User OFDM, Ph.D. Thesis, James Cook
University, Townsville,2001, pp. 33-34.
[2] J. Mitola, III, "Cognitive Radio: An Integrated
Agent Architecture for Software Defined Radio,"
Thesis (PhD), Dept. of Teleinformatics, Royal
Institute of Technology (KTH), Stockholm
Sweden, May 2000.
[3] S. Chen, Fast Fourier Transform, Lecture
Note, Radio Communications Networks and
Systems, 2005.
[4] OFDM for Mobile Data Communications, The
International Engineering Consortium WEB
ProForum Tutorial, 2006. http://www.iec.org.
[5] Andrea Goldsmith, Wireless Communications
Cambridge university press, 2005, ISBN:
978052170416.
[6] J.G. Proakis and D.G. Manolakis, Digital Signal
Proc-essing: Principles, Algorithms and Edition,
2002, pp. 448-475.
[7] E. Chu and A. George, Inside the FFT Black Box
:Serial & Parallel Fast FourierTransform
Algorithms. CRC Press LLC, 2000.
[8] B. G. Jo and M. H. Sunwoo, New ContinuousFlow Mixed-Radix (CFMR) FFT Processor
Using Novel In-Place Strategy, Electron
Letters, vol. 52, No. 5, May 2005.
[9] Charles Wu, Implementing the Radix-4
Decimationin Frequency (DIF) Fast Fourier
Transform
(FFT)
Algorithm
Using
aTMS320C80 DSP, Digital Signal Processing
Solutions,January 1998.
[10] P. Duhamel and H. Hollmann, Split-radix FFT
Algorithm, Electron Letters, vol. 20, pp 14-16,
Jan. 1984.
[11] [4] H. V. Sorensen, M. T. Heideman and C. S.
Burrus, On Computing the Split-radixFFT,
IEEE Trans. Acoust., Speech, Signal Processing,
vol. ASSP-34, pp. 152-156,Feb. 1986.
68
www.iaetsd.in
1,2
LFC since many years [7]-[8], but these researches gave little
attention to AVR effects on the results. In fact, in LFC power
system control literature there is a lack of stability analysis for
AVR effects or the mutual effects between these loops.
Usually, these studies are based on the assumption that there is
no interaction between the power/frequency and the reactivepower/voltage control loops. But in practical systems some
interactions between these control channels do exist during
dynamic perturbations [9]. Also by neglecting the effect of
voltage deviation on load demand, an important interaction in
LFC systems is ignored. A combined model with LFC and
AVR loops and their mutual effects is considered.
In this paper the power system is designed by adding a
PSS to a combined model of LFC and AVR loops in order to
improve for more dynamic stability. The interaction of
coupling effects between LFC and AVR loops are shown [3]
and also the performance of proposed model is shown with
simulations. The results of the proposed method with PSS are
compared with a combined model without adding PSS and
also by separate models of LFC and AVR loops without any
interaction between those loops. The simulations are shown by
adding a PSS to a combined model of LFC and AVR loops. It
is observed that this proposed model can improve the dynamic
stability of a complete power system by reducing the damping
oscillations.
I. INTRODUCTION
The change in operating conditions of a power system leads
to low frequency oscillations of small magnitude that may exist
for long periods of time. In some cases these oscillations will
limit the amount of power transmitted through interconnecting
lines. So a power system stabilizer is designed to provide an
additional input signal to the excitation system in order to
damp these power system oscillations [1].
The interconnected power system model for low frequency
oscillation studies should be composed of mechanical and
electrical loops. These oscillations can be damped by varying
the exciter and speed-governor control parameters [2].
Furthermore, it has been shown that the load-voltage
characteristic of the power system has a significant effect on
its dynamic responses, and suggestions have been made for
the proper representation of these characteristics in simulation
studies [3]-[5].For economic and reliable operation of a power
system, the two main control loops are required. The Load
Frequency Controller loop (LFC) and Automatic Voltage
Regulator loop (AVR) as shown in Figure 1. The turbine is fed
by speed governor whose steam rate can be controlled by
varying the internal parameters. Automatic Generation
Control method deals with frequency through the LFC loop
and with voltage through the AVR loop. The main purpose of
these two loops is to maintain frequency and voltage at
permissible levels [6]. Lot of studies have been made about
69
www.iaetsd.in
70
www.iaetsd.in
Iq
Vd
Xq
(5)
Eq Vq X d I d
(6)
Ti s
(1)
Vt 2
2
Vd PV
P
e t
e
e X
1/2
V0 d C1Vd C2Vq Rx I d XI q
(7)
V0 q C2Vd C1Vq XI d Rx I q
(8)
V
0 tan 1 0d
V0q
(9)
V0 (V0 d 2 V0 q 2 )1/2
(10)
R1 Rx C2 X d
(11)
R2 Rx C2 X q
(12)
X 1 X C1 X q
(13)
X 2 X C1 X d
(14)
Z e 2 R1 R2 X 1 X 2
(15)
C1 1 Rx G XB
(16)
C2 XG Rx B
(17)
Yd
C1 X 1 C2 R2
Ze2
(18)
Yq
C1 R1 C2 X 2
Ze2
(19)
Fd
V0
( R2 cos 0 X 1sin 0 )
Ze2
(20)
Fq
V0
( X 2cos 0 R1sin 0 )
Ze2
(21)
(2)
1/ 2
Vq Vt 2 Vd 2
Id
Pe I qVq
Vd
(3)
(4)
71
www.iaetsd.in
K1 Fd X q X d I q Fq Eq X q X d I d
K 2 I q Yd X q X d I q Yq Eq X q X d I d
(24)
K3
1
1 X d X d Yd
(24)
K4
Xd Xd
Fd
(25)
( X d Vq )
X qVd
K 5 Fd
Fq
Vt
Vt
K6
( X d Vq )
X qVd
Yd
Yq
Vt
Vt
Vt
Vq
(23)
(26)
(27)
Fig 6. Block diagram model of PSS.
72
www.iaetsd.in
GEP s
K a K3 K 2
(1 sTa )(1 sK 3Td 0 ) K a K 3 K 6
(28)
sTW
PSS (s)
1 sTW
KS
1 sT1
1 sT2
(29)
73
www.iaetsd.in
TABLE III.
Ka
Ta
Kr
Tr
20
0.05
0.05
0.89
0.862
TABLE IV.
K1
K2
K3
K4
K5
K6
0.40
1.85
0.38
0.22
0.07
1.02
VI. CONCLUSION
In this paper the Load Frequency Control loop and
Automatic Voltage Regulator loop are combined to show the
mutual effects between these two loops in a one-area power
system. A Power System Stabilizer is designed to improve the
dynamic and steady state responses for one-area power system.
Finally it is observed that a better dynamic stability is accessed
by using a PSS to the combined LFC-AVR model.
NOMENCLATURE
TABLE I.
KP
TP
TT
TG
102
20
0.32
0.06
1.7
TABLE II.
Xd
Xq
X d'
Td 0 '
Rx
1.973
0.82
0.1
7.76
0.004
0.74
R
Ka
Ta
Pm
PL
Load disturbance
KP
TP
Kr
Tr
TT
TG
E q '
Td 0 '
Xd
Xd '
Vref
V0
Vt
Terminal voltage
VS
Stabilizer output
74
www.iaetsd.in
REFERENCES
[1] P.Kundur, Power System Stability and Control, McGraw-Hill
Inc., 1994, pp.766-770.
[2] Yau-NaN yu, Electrical Power System Dynamics, London
Academic Press, 1983, pp.66-72.
[3] E.Rakhshani, K.Rouzehi, S.Sadeh, A New Combined Model
for Simulation of Mutual Effects between LFC and AVR
Loops, Proceeding on Asia-Pacific Power and Energy
Engineering, Wuhan, China, 2009.
[4] S.C.Tripathy, N.D.Rao, and L.Roy,Optimization of exciter and
speed governor control parameters in stabilizing intersystem
oscillations with voltage dependent load characteristics.
Electric power and energy systems, vol.3, pp.127-133, July
1981.
[5] K.Yamashita and H.Miyagi,Multivariable self-tuning regulator
for load frequency control system with interaction of voltage on
load demand, IEEE Preceeedings-D, Vol.138, No.2, March
1991.
[6] D.P.Kothari, I.J.Nagrath Modern Power System Analysis,
Third Edition, pp.290-300
Authors Biography
75
www.iaetsd.in
76
www.iaetsd.in
3. Proposed Algorithm
1. Create any private key of Size 16
characters. It will be varying from 16 to 64
characters.
2. We can choose any character from 0 to
255 ASCII code.
3. Use of 16*8 key that means 128 bits in
length.
4. Divide 16 bytes into 4 blocks of KB1,
KB2, KB3 and KB4.
5. Apply XOR operation between KB1 and
KB3.Results will store in new KB13.
6. Apply XOR operation between KB2 and
KB13.Results will store in new KB213.
7. Apply XOR operation between KB213
and KB4. Results will store in new KB4213.
( KB:KEY BLOCK)
77
www.iaetsd.in
KB 13: 00011110
00011100
00010100
11110011
Step:3
Apply the EX-OR operation between KB2
& KB13
KB2: 10000100
01110110
01101001
KB13:00011110
00010100
00011101
KB213: 10011010 01100010
01110100
(CB:CIPHER BLOCK)
4. Implementation example of the
Proposed Algorithm
01100101
11110011
10010110
Step:4
Encryption Method
Apply the EX-OR operation between KB4
& KB213:
Key Generation:
Step:1
1.Take the 16 characters plain text
2.Plain text: BAPATLAENGINEERS
3. Divide the key in to 4 blocks
BAPA
KB 1
TLAE
KB2
NGIN
KB 3
EERS
The obtained key is:
11110011
00001011
11110111
KB 4
00010100
Step:2
Encryption:
Apply the EX-OR operation between KB1
& KB3
Step:1
BAPA
KB1
NGIN
KB3
BAPA- 66 65 80 65
NGIN- 78 71 73 78
KB1: 01100110
01100101
KB3: 01111000
01111000
01100101 10000000
01110001
01110011
00010100
10000000
10010100
Step:2
78
www.iaetsd.in
P1: 01100110
01100101
10101101
10000000
10101101
11010010
CB 2: 01010010 10101101
10010010
CB 3: 11010110 11011011
11111011
P2: 10000100
01110110
01101001
01110110
01100101
Step:3
11011011
10110111
10110111
CB3: 11010110
11111011
CB4: 10111111
01111000
P4: 01101001
10000011
10000010
Step:4
00110101
Plain text 3 is :
Apply the EX-OR
KB4321 & P4
Step:4
Apply the EX-OR operation between CB3 &
KB4:
CB3: 11010110
11111011
KB4: 01101001
10000011
CB4: 10111111
01111000
01100101
Step:2
Apply the EX-OR operation between CB2&
CB3:
11010010
Step:3
CB2: 01010010
10010010
KB2: 10000100
01101001
CB3: 11010110
11111011
11011011
01101001
10110010
Step:1
Apply the EX-OR
KB4213 & CB1
operation
between
10110111
01100101
11011011
10110111
10110010
00110101
01101001
10000010
operation
Decryption Method:
11010010
between
00010100
10000010
10010110
Step:5
Apply the EX-OR operation between X1 &
P2
00010100
10010100
X1: 110011010
01110100
79
01100010
10010110
www.iaetsd.in
P2: 10000100
01101001
X2: 00011110
00011101
Step:6
01110110
01100101
6. References
00010100
11110011
00010100
11110011
01100101
10000000
01110001
01110011
80
www.iaetsd.in
Sinter coolers
I. INTRODUCTION
81
www.iaetsd.in
Heat recovered from the sinter cooler can be recirculated to the sinter machine or can be used for pre
heating the combustion air in the ignition hood, for
pre heating of the raw mix to sinter machine. It can be
used to produce hot water for district heating.
A. Features
Waste gas heat of a sintering plant is recovered as
steam or electric energy. The heat recovery efficiency
is 60% for waste gas from cooler and 34% for waste
gas from sintering machine proper.
Waste gas heat recovery from sintering machine
proper also leads to the reduction of coke
consumption.
Applicable whether the cooler is of a circular type or
linear type.
CO2 emissions can be reduced, leading to a
possibility of employing this system in a CDM
project.
B. Disadvantages
1) Capital cost: The capital cost to implement a waste heat
recovery system may outweigh the benefit gained in heat
recovered. It is necessary to put a cost to the heat being offset.
2) Quality of heat: Often waste heat is of low quality
(temperature). It can be difficult to efficiently utilize the
quantity of low quality heat contained in a waste heat medium.
Heat exchangers tend to be larger to recover significant
quantities which increases capital cost.
3) Maintenance of Equipment: Additional equipment
requires additional maintenance cost.
82
www.iaetsd.in
CONCLUSION
To meet the increasing world demand for energy, the rate of
depletion of non-renewable energy sources must be reduced
while developing alternative renewable sources. This can be
achieved by increasing the overall thermal efficiency of
conventional power plants. One way to do this is by waste heat
recovery. Most of the techniques currently available recover
waste heat in the form of thermal energy which is then
converted to electricity in a conventional steam power plant.
Another approach which has received little attention so far is
direct conversion of thermal waste energy into electricity.
soo In this article, a configuration of waste heat recovery
system is described
we studied the composition and characteristics of waste heat
resources and found out a typical process of energy recovery,
conversion and utilization.
ACKNOWLEDGMENT
The preferred spelling of the word acknowledgment in
America is without an e after the g. Avoid the stilted
expression, One of us (R. B. G.) thanks . . . Instead, try
R. B. G. thanks. Put applicable sponsor acknowledgments
here; DO NOT place them on the first page of your paper or as
a footnote.
83
www.iaetsd.in
I.
II.
INTRODUCTION
CHAOTIC SYSTEM
III.
CHAOTIC SIGNALS
1
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT
84
www.iaetsd.in
(1)
SYSTEM OVERVIEW
Sk
d {+1, 1}
Figure 1: Transmitter of CDSK system
2
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT
85
www.iaetsd.in
= b|x c| F(x )
(2)
|
(3)
V.
PERFORMANCE EVALUATION
Figure 6: BER performance in Rayleigh fading
channel
VI.
CONCLUSION
3
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT
86
www.iaetsd.in
FUTURE SCOPE
REFERENCE
4
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT
87
www.iaetsd.in
Abstract
India is truculent to meet the
electric power demands of a fast expanding
economy. Restructuring of the power industry
has only increased several challenges for the
power system engineers. The proposed vision of
introducing viable Smart Grid (SG) at various
levels in the Indian power systems has
recommended that an advanced automation
mechanism needs to be adapted. Smart Grids are
introduced to make the grid operation smarter
and intelligent. Smart grid operations, upon
appropriate deployment can open up new
avenues and opportunities with significant
financial implications. This paper presents
various Smart grid initiatives and implications in
the context of power market evolution in India.
Various examples of existing structures of
automation in India are employed to underscore
some of the views presented in this paper. It also
Reviews the progress made in Smart grid
technology research and development since its
inception. Attempts are made to highlight the
current and future issues involved for the
development of Smart Grid technology for
future demands in Indian perspective.
Index Terms-- Smart Grid; Indian Electricity Act
2003; Availability Based Tariff (ABT); Demand
Side Management (DSM); Renewable Energy;
Rural Electrification (RE); Micro Grid.
I. INTRODUCTION
THE economic growth of
developing countries like India depends
heavily on reliability and eminence of its
electric power supply. Indian economy is
anticipated to grow at 8 to 9% in 2010- 2011
88
www.iaetsd.in
89
www.iaetsd.in
OF
INDIA
ON
SMART GRID
90
www.iaetsd.in
91
www.iaetsd.in
92
www.iaetsd.in
B.Rural Electrification
Technologies are advancing
day-by-day, Smart distribution technologies
allowing for increased levels of distributed
generation have a high potential to address
rural electrification needs and minimize the
erection costs, transmission losses and
maintenance costs associated with large
transmission grids. Rural Electrification
Corporation Limited (REC) is a leading
public infrastructure finance company in
Indias power sector which finances and
promotes rural electrification projects
across the nation, operating through a
network of 13 Project
offices and 5 Zonal offices. Along with the
government of India has launched various
programs and schemes for the successful
promotion and implementation of rural
electrification. One such major scheme is
93
www.iaetsd.in
CONCLUSIONS
The paper presents a
discussion on Indian Power Strategy along
with its pitfalls in various technical and nontechnical themes, with an organized
approach to evolve the conceptualization of
Smart Grid. An overview of Indian Power
Market along with brief analysis about the
power system units is described. Power
market in India is generally characterized by
the poor demand side management and
response for lack of proper infrastructure
and awareness. Smart Grid Technology can
intuitively overcome these issues. In
addition to that, it can acknowledge
reduction in line losses to overcome
prevailing power shortages, improve the
reliability of supply, power quality
improvement
and
its
management,
safeguarding revenues, preventing theft etc..
Model architecture as well as Indias Smart
Grid initiatives taken by the government and
many private bodies, are presented in the
paper. Further, various prospects of
sustainable energy and off-grid solutions,
Rural Electrification (RE) and evolution of
Micro Grid along with various policies and
94
www.iaetsd.in
Department of Control Systems, St. Marys Group of Institutions, Jawaharlal Nehru Technological UniversityHyderabad, Main Road, Kukatpally Housing Board Colony, Kukatpally, Hyderbad, Telangana, India.
*
Abstract-There will be a chance for the destruction of the system due to transient if it is not provided with adequate
protection devices. Generally, transient takes place when parameters involving in conventional flow are distorted
with respect to the time. Rapid closing of valve in a pipe network will be resulting into hydraulic transient known as
water hammer occurs due to sudden change in pressure and velocity of flow with respect to time. Due to impulsive
action, pressure surges are induced in the system travel along the pipe network with the rapid fluid acceleration
leading to the dramatic effects like pipe line failure, damage to the system etc. Considering the importance of
hydraulic transient analysis, we design a system capable of verifying pipe network containing fluid flow.This paper
demonstrates design of different pipe structures in pipe line network and analysis of various parameters like excess
pressure distribution, velocity variations and water hammer amplitude with respect to time using COMSOL
Multiphysics v 4.3. The magnitude of water transient in pipe line network at different pressure points has been
discussed in detail.
95
www.iaetsd.in
I.
INTRODUCTION
The key to the conservation of water is good water measurement practices. As fluid will be running in
water distribution system, system flow control is dependent based on the requirement for opening or closing of valves, and
starting and stopping of pumps. When these operations are performed very quickly, they convert the kinetic energy carried
by the fluid into strain energy in pipe walls, causing hydraulic transient
[1]
distribution system i.e., a pulse wave of abnormal pressure is generated which travels through the pipe network. Pressure
surges that are formed or fluid transients in pipelines are referred to as Water hammer. This oscillatory form of unsteady
flow generated by sudden changes results in system damage or failure if the transients are not minimized. So now the steady
state flow conditions are altered by this effect [2] resulting in the disturbance to the initial flow conditions of the system.
Where the system will tend to obtain a static flow rate by introduction of new steady state condition. The intensity of water
hammer effects will depend upon the rate of change in the velocity or momentum. Conventional water hammer analyses
provide information under operational conditions on two unknown parameters i.e., pressure and velocity within a pipe
system. Generally effects such as unsteady friction, acoustic radiation to the surroundings or fluid structure interaction are
not taken into account in the standard theory of water hammer, but were considered in general approach [3]. But mechanisms
acting all along the entire pipe section such as axial stresses in the pipe and at specific points in the pipe system such as
unrestrained valves will fall under fluid structure interaction extension theory for conventional water hammer method.
Figure 1. Pipe connected to control valve at the end with water inlet from reservoir.
In the past three decades, since a large number of water hammer events occurred in the light-water- reactor power plants [4], a
number of comprehensive studies on the phenomena associated with water hammer events have been performed. Generally
water hammer can occur in any thermal-hydraulic systems and it is extremely dangerous for the thermal-hydraulic system
since, if the pressure induced exceeds the pressure range of a pipe given by the manufacturer, it can lead to the failure of the
pipeline integrity. Water hammers occurring at power plants are due to rapid valve operation [5], void induced operation, and
condensation induced water hammer [6]. In existing Nuclear Power Plants water hammers can occur in case of an inflow of
sub-cooled water into pipes or other parts of the equipment, which are filled with steam or steam-water mixture [7].
The water hammer theory has been proposed to account for a number of effects in biofluids under mechanical stress, as in
the case of the origin of Korotkoff sounds during blood pressure measurement
cavity within the spinal cord
[8, 9]
[10]
. In the voice production system, the human vocal folds act as a valve
[11
which induces
pressure waves at a specific point in the airways (the glottis), through successive compressing and decompressing actions
(the glottis opens and closes repeatedly). Ishizaka was probably the first to advocate in 1976 the application of the water
hammer theory, when discussing the input acoustic impedance looking into the trachea [12]. More recently, the water hammer
theory was invoked in the context of tracheal wall motion detection
[13]
Systems, Hydropower plants, chemical industries, Food, pharmaceutical industries face this water transient problem.
96
www.iaetsd.in
The present work reports the design of different pipe channels and analysis of the pressure distribution and velocity
variation produced all along the pipe flow network when subjected to one pressure measuring point. Various parameters like
inlet input pressure, wall thickness and measurement point are changed for analysis.
II.
4.3. It is a powerful interactive environment for modelling and Multiphysics were selected because there was previous
experience and expertise regarding its use as well as confidence in its capabilities. A finite element method based
commercial software package, COMSOL Multiphysics, is used to produce a model and study the flow of liquid in different
channels. This software provides the flexibility for selecting the required module using the model library, which consists of
COMSOL Multiphysics, MEMS module, micro fluidics module etc. Using tools like parameterized geometry, interactive
meshing, and custom solver sequences, you can quickly adapt to the ebbs and flows of your requirements, particle tracing
module along with the live links for the MATLAB. At present this software can solve almost problems in multi physics
systems and it creates the real world of multi physics systems without varying there material properties. The operation of this
software is easier to understand and easier to implement in various aspects for designers, in the form of finite element
analysis system.
97
(1)
www.iaetsd.in
INTERNATIONAL
CONFERENCE
ON CURRENT
INNOVATIONS
ENGINEERING
378 - 26 - 138420 - 5
Meaning
that changes
during the time
dt maximallyINmove
20 % of theAND
meshTECHNOLOGY
length dx. Thus increasing the meshISBN:
resolution
also requires decreasing the time stepping. This advanced version of software helps in designing the required geometry using
free hand and the model can be analysed form multiple angles as it provides the rotation flexibility while working with it.
III.
THEORITICAL BACKGROUND
Water hammer theory dates to 19th century, where several authors have contributed their work in analyzing this effect.
Among them, Joukowsky
[14]
conducted a systematic study of the water distribution system in Moscow and derived a
formula that bears his name, that relates to pressure changes, p, to velocity changes, v, according to the equation
(2)
P = cU
Where is the fluid mass density and c is the speed of sound. This relation is commonly known as the Joukowsky
equation, but it is sometimes referred to as either the Joukowsky-Frizell or the Allievi equation.
For a compressible uid in an elastic tube, c depends on the bulk elastic modulus of the uid K on the elastic modulus of the
pipe E, on the inner radius of the pipe D, and on its wall thickness. The water hammer equations are some version of the
compressible uid ow equations. The choice of the version is problem-dependent: basic water hammer neglects friction and
damping mechanisms, classic water hammer takes into account uid wall friction, extended water hammer allows for pipe
motion and dynamic Fluid Structure Interaction [15, 16].
In water hammer at static condition pressure wave is a disturbance that propagates energy and momentum from one point to
another through a medium without significant displacement of the particles of that medium. A transient pressure wave,
subjects system piping and other facilities to oscillating at high pressures and low pressures. This cyclic loads and pressures
can have a number of adverse effects on the hydraulic system. Hydraulic transients can cause hydraulic equipments in a
pipe network to fail if the transient pressures are excessively high. If the pressures are excessively higher than the pressure
ratings of the pipeline, failure through pipe or joint rupture, or bend or elbow movement may occur. Conversely, excessive
low pressures (negative pressures) can result in buckling, implosion and leakage at pipe joints during sub atmospheric
phases. Low pressure transients are normally experienced on the down streamside of a closing valve. But when the valve is
closed energy losses are introduced in the system and are normally prescribed by means of an empirical law in
terms of a loss coecient. This coecient, ordinarily determined under steady ow conditions, is known as the valve
discharge coecient, especially when the pipeline is terminated by the valve. It enables to quantify the ow response in
terms of the valve action through a relationship between the ow rate and pressure for each opening position of the
valve. The discharge coecient provides the critical piece of missing information for the water hammer analysis. Because
the existing relationship between pressure and ow rate is often a quadratic law type, the empirical coecient is defined
in terms of the squared ow rate. When water distribution system comprising a short length of pipes (i.e., <2,000 ft. {600m})
will usually be less vulnerable to problems with hydraulic transient. This is because wave reflections e.g., at tanks,
reservoirs, junctions tend to limit further changes in pressure and counteract the initial transient effects. An important
consideration is dead ends, which may be caused by closure of check valves that lock pressure waves into the system in
cumulative fashion. Wave reflections will be both positive and negative pressures; as a result the effect of dead ends must be
carefully evaluated in transient analysis.
These pressure surges provide the most effective and viable means of identifying weak spots, predicting potentially
negative effects of hydraulic transient under a number of worst case scenarios, and evaluating how they may possibly be
avoided and controlled. The basic pressure surge modeling is based on the numerical conservation of mass and linear
98
www.iaetsd.in
momentum equations. For this Arbitary Lagrangian Elurian(LE)[17] numerical solution helps in providing the exact analytical
solution. On the other hand when poorly calibrated hydraulic network models results in poor prediction of pressure surges
thus leading to more hydraulic transients. In more complex systems especially, the cumulative effect of several types of
devices which influence water hammer may have an adverse effect. However, even in simple cases, for example in pumping
water into a reservoir, manipulations very unfavorable with regard to water hammer may take place. For example, after the
failure of the pump, the operator may start it again. Much depends on the instant of this starting. If it is done at a time when
the entire water hammer effect has died down, it is an operation for which the system must have been designed.
IV.
DESIGN PROCEDURE
The design and analysis of the hydraulic transient in a pipe flow includes geometry, defining the parameters for the
required geometry, providing mesh & inputs. The 3D model is constructed in the drawing mode of COMSOL Multiphysics.
In this, a pipe of length L = 20 m is constructed assuming that one end is connected to a reservoir, where a valve is placed at
the other end. The pipe with inner radius of 398.5mm, the thickness of the wall about 8 mm and Youngs modulus of
210GPa was designed. In order to verify pressure distribution, a pressure sensor measurement point at a distance of z 0 =
11.15 m from the reservoir was arranged and flow has been sent into pipe with an initial flow rate of Q 0= 0.5 m3/sec.
After designing the geometry for a flow channel in a pipe, materials are to be selected from the material browser. Water,
liquid and structural steel are selected from the built in section of material browser. Edges are selected for water flow and
steel pipe model sections. Now pipe properties are defined one by one by first selecting the round shape from the shape list
of pipe shape. Initially the reservoir acts as a constant source for pressure producing p 0 which is equal to 1 atm. As the fluid
is allowed to flow from the reservoir tank into the pipe model, the fluid enters the left boundary of the pipe first and leaves
the right boundary of the pipe with the valve in open condition. As the valve is open water is flowing at a steady flow rate, so
at time t = o seconds the valve on the right hand side is closed instantaneously creating disturbance in the normal flow rate
leading to a change in discharge at the valve. As a result of the compressibility of the water and the elastic behaviour of the
pipe a sharp pressure pulse is generated travelling upstream of the valve. The water hammer wave speed c is given by the
expression
1/ c2 =1/c2s + A
(3)
Where cs is the isentropic speed of sound in the bulk fluid and is 1481 m/s while the second terms represents the component
due to the pipe flexibility. The water density is and A the pipe cross sectional compressibility. Resulting in an effective
wave speed of 1037 m/s. The instantaneous closure of the valve will results in a water hammer pulse of amplitude P given by
Joukowskys fundamental equation [18]
(4)
P = cuo
Where u0 is the average fluid velocity before valve was closed. Exact solution can only be obtained based on the verification
of the pipe system and valve point [19]. Study was extended for different pipe line intersection models based on the reference
99
www.iaetsd.in
model
[20]
. To design a three axis pipe line intersection, from geometry more primitives, three polygons are chosen where
first polygon coordinates corresponds to x in (1 z0 L), while y & z remain in (0 0 0). For second polygon y coordinates are (1
z0 L) and the remaining are left for (0 0 0), in a similar way z coordinates are (1 z0 L), and the resulting geometry is
depicted in figure 4.
V.
VI.
MESHING
Meshing can provide the information of required outputs anywhere on the proposed structure along with the input given.
Numerical ripples are visible on the point graphs of excess pressure history at pressure sensor and water hammer amplitude.
As the closure in the valve is instantaneous the pressure profile has a step like nature. This is difficult to resolve numerically.
The ripples can be reduced by increasing the mesh resolution parameter N. So the number of mesh points (N) selected in this
model is about 400. In this model meshing is done for the Edges of the pipe. Where the maximum element size of the
parameter is defined for L/N m (L= 20 m & N= 400) and the minimum element size is 1[mm].
VII.
SIMULATION
In this study, the simulations are performed using the fundamental equation in water hammer theory that relates to
pressure changes, p, to velocity changes, v, according to the equation (2). Simulation comprises of application of different
input initial pressure at the inlet portion for different pipe network sections. Pressure measurement points are changed along
the pipe length L and computed for time interval from T=0 to T=0.24 seconds. Both the velocity and pressure are measured
at the above time interval. Other parameters like water hammer amplitude, maximum and minimum pressure for two
different geometrys; along with velocity variations are listed in table 1.
Table 1. Pressure distribution and velocity variation values for single pipe line & three pipe lines geometry.
100
www.iaetsd.in
Parameters
Single pipe
Three pipes
-9.579*105 Pa
-1.577*105 Pa
4.047*105 Pa
1.1617*106 Pa
Velocity
Variation
Range
-4
at 4.257*10 to 1.1632 m/s
T=0.23s
Excess
Pressure
distribution 1.35*106 Pa
-0.85*106 Pa
VIII.
CONCLUSION
Flow channel is designed in a pipe network and its reaction with the valve when closed was analysed using
COMSOL Multiphysics Version 4.3. Simulation for the proposed model is done by changing the initial flow rates along with
the pipe networks to explore the variations in the properties of fluid like pressure distribution and velocity variation with
respect to time. When inlet mean velocity is increased the magnitude of water hammer amplitude remains the same but the
chances for the water transient is more which results in easy breakdown of pipe section. When multiple pipe line was
connected the maximum pressure distribution and velocity variation were very less even though the water hammer amplitude
remains the same when compared for different cases. Positive pressure difference exists when multiple pipes were connected
where negative pressure difference exists for singe pipe line geometry, which states that network of pipe lines results in less
water transient effect. This study can be extended by observing the changes in the flow by inclining the pipe line, by using T,
L shaped piping geometries. Further extension was made for micro piping system by changing the dimensions of the
geometry from meters to micro meters. This study helps in building micro piping network systems that are used in bio
medical applications and Automobile industries.
IX.
ACKNOWLEDGEMENTS
The authors would like to thank NPMASS for the establishment of National MEMS Design Centre (NMDC) at
Lakireddy Bali Reddy Engineering College. The authors would also like to thank the Director and Management of the
college for providing the necessary facilities to carry out this work.
REFERENCES
1.
Avallone, E.A., T. Baumeister ID, "Marks' Standard Handbook for Engineers" McGraw-Hill, 1987, 9th Edition.
pp. 3-71.
2.
Moody, F. J., "Introduction to Unsteady Thermo fluid Mechanics" John Wiley and Sons, 1990,Chapter 9, page
405.
3.
A.S. Tijsseling, Fluid-structure interaction in liquid-lled pipe systems: A review, Journal of Fluids and
Structures, 1996,(10), PP. 109-146.
4.
Algirdas Kaliatka.; Eugenijus Uspuras.; Mindaugas Vaisnoras.; Analysis of Water Hammer Phenomena in
RBMK-1500 Reactor Main Circulation Circuit, International Conference on Nuclear Energy for New Europe
2006, Portoro, Slovenia, 2006 September 18-21.
101
www.iaetsd.in
5.
M. Giot, H.M. Prasser, A. Dudlik, G. Ezsol, M. Habip, H. Lemonnier, I. Tiselj, F. Castrillo, W. Van Hove, R.
Perezagua, & S. Potapov, Twophase flow water hammer transients and induced loads on materials and structures
of nuclear power plants (WAHALoads) FISA-2001 EU Research in Reactor Safety, Luxembourg, 2001,
November, pp. 12- 15.
6.
P. Griffith, Screening Reactor Steam/Water Piping Systems for Water Hammer, Report Prepared for U. S. Nuclear
Regulatory Commission NUREG/CR-6519, 1997.
7.
M. Giot, J.M. Seynhaeve, Two-Phase Flow Water Hammer Transients : towards the WAHA code, Proc. Int. Conf.
Nuclear Energy for New Europe '03, Portoro, Slovenia, 2003,Sept. 811, Paper 202, 8p.
8.
D. Chungcharoen, Genesis of Korotkoff sounds, Am. J. Physiol.; 1964, 207, pp. 190194.
9.
J. Allen, T. Gehrke, J. O. Sullivan, S. T. King, A. Murray , Characterization of the Korotkoff sounds using joint
time-frequency analysis, Physiol. Meas.; 2004, (25), Pp. 107117.
17. J. Donea, Antonio Huerta,J. Ph. Ponthot and A. Rodrguez-Ferran, Arbitrary Lagrangian Eulerian
Methods,UniversitedeLi`ege, Li`ege, Belgium.
18. M.S. Ghidaoui, M. Zhao, D.A. McInnis, and D.H. Ax worthy, A Review of Water
a. Hammer Theory and Practice, Applied Mechanics Reviews, ASME, 2005.
19. A.S. Tijsseling, Exact Solution of Linear Hyperbolic Four-Equation Systems in Axial Liquid-Pipe Vibration,
Journal Fluids and Structures, vol. 18, pp. 179196, 2003.
20. Model library path: pipe_flow_module /verification _models /
water_hammer_verification{.http://www.comsol.co.in/showroom/gallery/12683/}
102
www.iaetsd.in
103
www.iaetsd.in
104
www.iaetsd.in
105
www.iaetsd.in
Figure 13. Excess pressure distribution along the pipe for t= 30 s for single pipeline geometry.
Figure 14. Excess pressure distribution along the pipe for t= 30 s for three pipe line intersection geometry.
106
www.iaetsd.in
With the growing range of smart phone users, peer-to-peer content sharing is anticipated to occur a lot of usually. Thus, new
content sharing mechanisms ought to be developed as ancient information delivery schemes aren't economical for content
sharing attributable to the isolated property between sensible phones. To achieve data delivery in such complex environments,
researchers have anticipated the use of epidemic routing or store-carry-forward protocols, in this a node stores a message may
be a note and carries it until a forwarding chance arises through an encounter with other node. Earlier studies in this field
focused on whether two nodes would come across each other and the place and time of encounter.During this paper, we tend to
propose discover-predict-deliver as associate economical content sharing theme for delay-tolerant Smartphone networks. In our
projected theme,. Specifically, our approach employs a quality learning formula to spot places inside and outdoors. A hidden
markov model and viterbi algorithm is employed to predict associate individuals future quality info. analysis supported real
traces indicates that with the projected approach, eighty seven p.c of contents is properly discovered and delivered among a pair
of hours once the content is out there solely in thirty p.c of nodes within the network .In order to decrease energy consumption
we are using asymmetric multi core processors and efficient sensor scheduling is needed for that purpose we are using POMPDs
in sensor scheduling.
Keywords:- Tolerant Network, ad hoc networks, Store and forward networks, peer-to-peer network
I.INTRODUCTION
Now a days Number of advanced smart phone
clients has rapidly expanded in the recent years. users can
make different sorts of substance effectively utilizing easy to
use interfaces accessible within the advanced smart phones
phones. However substance offering among shrewd
telephones is dreary as it obliges a few activities, for example,
transferring to concentrated servers, seeking and downloading
substance. One simple route is to depend on adhoc technique
for distributed substance imparting. Shockingly with the
current adhoc steering conventions, substance are most
certainly not conveyed if a system parcel exists between the
associates at the point when substance are imparted. Thus
Delay Tolerant System (DTN) steering conventions
accomplish better execution than customary adhoc steering
conventions. These conventions don't oblige an incorporated
server. Thus the substance are put away on advanced mobile
phones itself. Smartphone's consists of many network
interfaces like Bluetooth and Wi-Fi so ad hoc networks can be
easily constructed with them. The Connectivity among
Smartphone's is likely to be alternating because of movement
patterns of carriers and the signal transmission phenomena.
A wide variety of Store-carry-forward protocols have been
anticipated by researchers. Routing in delay-tolerant
networking concerns itself with the ability to route, data from
107
www.iaetsd.in
108
www.iaetsd.in
III.RELATED WORK
A delay tolerant network (DTN) is a mobile
network where a existing source-destination path may not
exist amid a pair of nodes and messages are forwarded in a
store-carry-forward routing hypothesis [6]. Vahdat et al [2]
anticipated Epidemic routing as fundamental DTN routing
protocol in which a node forwards a message to each and
every encountered node that does not have a replica of the
message. The solution shows the finest performance terms of
delivery pace and latency but wastes bulk of bandwidth.
A substitute solution was resource based [3], [4],where
systems utilize data mules as message carriers that straightly
delivers the message to the destination. Next, opportunitybased routing protocols make use of history of encounters to
convey a message to the destination [5], [6], [7]. Prediction
based schemes [8], [9], make use of complicated utility
functions to decide whether the forward a message to the
node.
109
www.iaetsd.in
110
www.iaetsd.in
B. Discovery Efficiency
111
www.iaetsd.in
lowest latency, and both DPD and E-S&W show the highest
latency. DPD exhibits such results due to the high latency of
the discovery phase. However, the delivery latency of DPD is
much smaller than that of E-S&W and is close to that of E-E.
E-E shows the highest overhead. The latency and overhead are
tradeoffs. In summary, DPD achieves good efficiency in the
delivery phase, whereas the efficiency of the discovery phase
can be improved. Content header caching on all nodes may be
a good solution, and this issue will be addressed in future
works.
REFERENCE
[1]
[2]
[3]
[4]
[5]
[6]
[7]
J. Wu, M. Lu, and F. Li, Utility-Based Opportunistic Routing in MultiHop Wireless Networks, Proc. 28th Intl Conf. Distributed Computing
Systems (ICDCS 08), pp. 470-477, 2008.
[9]
[14]
[15]
[16]
112
www.iaetsd.in
scaling,
outsourced
easier
maintenance,
and
service
integrity
and
etc.
avoidance
of
capital
expenditure
on
storage
system
supporting
privacy-
113
www.iaetsd.in
i)
data,
do not
can be
114
www.iaetsd.in
process.
a) Design Goals
dynamics.
a) Our Framework & Definitions
We follow similar definition of previously
proposed schemes in the context of remote data
algorithms
(KeyGen,
SigGen,
GenProof,
VerifyProof).
process.
4) Batch Auditing: to enable TPA with secure
large
number
of
different
users
simultaneously.
5) Lightweight: to allow TPA to perform
115
www.iaetsd.in
(BLS).
unforgeable
that
verification
c) Privacy-Preserving
metadata
Public
Auditing
Scheme
authenticator
with random
masking
116
www.iaetsd.in
single on.
CONCLUSION
cryptosystems,
in
Proc.
of
IEEE
[6]
AUTHORS
REFERENCES
Mr.K
[1]Cong Wang, Qian Wang, Kui Ren, Wenjing
REDDY
received
Narayana
the
Engineering
ABHINANDAN
degree
in
computer
213222.
R. Tamassia,
117
www.iaetsd.in
M.Tech, Dept. of CSE, Audisankara College of Engineering & Technology, Gudur, A.P, India
2
Asst Professor, Dept. of CSE, Audisankara College of Engineering & Technology, Gudur, A.P, India
I.
INTRODUCTION
classified
as
micro-blogging
services.
users
to
micromedia
send
like
.Microblogging
temporary
pictures
services
text
or
apart
updates
audio
or
clips
from Twitter
provides
immediacy
and
movableness.
II. INVESTIGATION
Index terms - Tweets, social sensors, earthquake,
Earthquake is a disastrous event in which many
hand shaking.
118
www.iaetsd.in
negative class
gap
between
the
friends
of
different
119
www.iaetsd.in
The
previous
basis for
info.
The
earthquake
is
detected
Sequential
Importance
Sampling
(SIS)
points
sequentially.
Step1-Generation:
; s20; . . . ; sN_1 0
algorithmic
program
implementing
as
each
measurement
is
received
120
www.iaetsd.in
using
it.
V.
Step 3: Prediction.
Predict the next state of a particle set
from
Step 4:
locations
Step 5: Weighting
Re-calculate the weight of
of
events.
As
to estimate the
associate
degree
Step 6: Measurement:
the average of ( ,
CONCLUSION
)by
) .
Step 7: Iteration:
121
www.iaetsd.in
REFERENCES
[5] M. Ebner and M. Schiefner, Microblogging -
More
messaging
revolution:
Communication,
than
Fun?Proc.
IADIS
Mobile
137142, 1998.
122
www.iaetsd.in
ABSTRACT
The major aims of this technique a secure multi-owner knowledge sharing theme. It implies that any user within the cluster will
firmly share knowledge with others by the world organization trust worthy cloud. This theme is ready to support dynamic
teams. Efficiently, specifically, new granted users will directly rewrite knowledge files uploaded before their participation
whereas not contacting with knowledge owners. User revocation square measure just achieved through a very distinctive
revocation list whereas not modification the key. Keys of the remaining users the size and computation overhead of
cryptography square measure constant and freelance with the amount of revoked users. Weve a bent to gift a secure and
privacy-preserving access management to users that guarantee any member throughout a cluster to anonymously utilize the
cloud resource. We offer rigorous security analysis, and perform intensive simulations to demonstrate the potency of our theme
in terms of storage and computation overhead. To attain the dependable and adaptable in MONA, in this paper we are exhibiting
the new structure for MONA. In this strategy we are further exhibiting how we are dealing with the risks like failure of cluster
manager by increasing the number of backup cluster manager, hanging of gathering administrator on the off chance that number
of demands all the more by offering the workload in numerous gathering chiefs. Using this method states expected productivity,
scalability and a lot essentially dependability.
Keywords:- Multi owner, resource, cluster manager, revocation, Key Distribution
I.INTRODUCTION
CLOUD computing is recognized as another to ancient
information technology as a result of its resource -distribution
and low-maintenance distinctiveness. In cloud computing, the
cloud service suppliers (CSPs), like Amazon, unit able to
deliver various services to cloud users with the help of
powerful data centres. By migrating the local data
management systems into cloud servers, users can fancy highquality services and save vital investments on their native
infrastructures. One in every of the foremost basic services
offered by cloud suppliers is data storage. Permit US to place
confidence in a smart data application.
A company permits its staffs inside identical cluster or
department to store and share files inside the cloud. By
utilizing the cloud, the staffs square measure typically totally
discharged from the tough native data storage and
maintenance. However, it in addition poses a important risk to
the confidentiality of these hold on files. Specifically, the
cloud servers managed by cloud suppliers are not wholly
trustworthy by users whereas the data files hold on inside the
cloud may even be sensitive and confidential, like industry
plans. To conserve data privacy, a basic resolution is to jot
down in code data files, and so transfer the encrypted data into
the cloud [2].Sadly, planning degree economical and secure
data sharing theme for teams inside the cloud is not an easy
task as a result of the following issues.
123
www.iaetsd.in
124
www.iaetsd.in
E. Group Signature :
A cluster signature theme permits any member of the group to
sign messages whereas keeping the identity secret from
verifiers. Besides, the selected cluster manager will reveal the
identity of the signatures mastermind once a dispute happens,
that is denoted as traceability.
F. User Revocation:
A.Cloud section:
In this module, we tend to produce an area Cloud and supply
priced torrential storage services. The users will transfer their
information within the cloud. we tend to develop this module,
wherever the cloud storage may be created secure. However,
the cloud isn't absolutely trusty by users since the CSPs are
terribly possible to be outside of the cloud users trusty
domain. kind of like we tend to assume that the cloud server is
honest however curious. That is, the cloud server won't
maliciously delete or modify user information owing to the
protection of information auditing schemes, however can try
and learn the content of the keep information and therefore the
identities of cloud users.
B. Group Manager :
Group manager takes charge of followings
1. System parameters generation,
2. User registration,
3. User revocation, and
4. Revealing the important identity of a dispute knowledge
owner.
Therefore, we tend to assume that the cluster manager is
absolutely trustworthy by the opposite parties. The cluster
manager is that the admin. The cluster manager has the logs of
every and each method within the cloud. The cluster manager
is accountable for user registration and additionally user
revocation too.
C. Group Member :
1.store their non-public knowledge into the cloud server and
2.Share them with others within the cluster.
Note that, the cluster membership is dynamically modified, as
a result of the workers resignation and new worker
participation within the company. The cluster member has the
possession of fixing the files within the cluster. Whoever
within the cluster will read the files that are uploaded in their
cluster and conjointly modify it.
D. File Security:
1. Encrypting the data file.
2. File stored in the cloud can be deleted by either the group
manager or the data owner. (i.e., the member who uploaded
the file into the server).
125
www.iaetsd.in
V. CONCLUSION
In this paper, we've an inclination to vogue a secure data
sharing theme, for dynamic groups in associate world
organisation trustworthy cloud. In Mona, a user is during a
position to share data with others at intervals the cluster
whereas not revealing identity privacy to the cloud.
Additionally, Angle Sea Island supports economical user
revocation and new user modification of integrity. lots of
specially, economical user revocation are achieved through a
public revocation list whereas not modification the private
keys of the remaining users, and new users can directly
decipher files keep at intervals the cloud before their
participation. Moreover, the storage overhead and additionally
the coding computation value are constant. Intensive analyses
show that our projected theme satisfies the specified security
requirements and guarantees efficiency additionally. Projected
a science storage system that allows secure file sharing on
world organisation trustworthy servers, named Plutus. By
dividing files into file groups and encrypting each file cluster
with a completely unique file-block key, the information
owner can share the file groups with others through delivering
the corresponding safe-deposit key, where the safe-deposit
key's wont to write the file-block keys. However, it brings a
few of significant key distribution overhead for large-scale file
sharing. In addition, the file-block key should be updated and
distributed yet again for a user revocation.
REFERENCES
[1]
[2]
126
www.iaetsd.in
requirement
for
users
to
plan
ahead
for
management
leakage issues.
fact
that
cloud
computing
offers
huge
process
that
identifies
to
an
clouds, security.
I. INTRODUCTION
highlighting
its
architectural
principles,
and
key
concepts,
Internet,
state-of-the-art
computing
resources
have become
demand fashion.
127
www.iaetsd.in
privacy
of
their
data.
The
multi-tenant
application
provider;
is bound to that
the cloud.
128
www.iaetsd.in
II.
PROPOSED WORK
Receive BC training
Develop BCPs
following Figure 2.
Ensure that BCPs are available during
incident response
Ensure that incident responders receive
training appropriate to their role
Ensure that plans are tested, reviewed and
updated
Participate in the review and development
of the BCMS.
Figure 2 Business Continuity Management
Overview
129
www.iaetsd.in
Understanding
continuity
organizations
strategies
objectives
in
and
line
with
the business
is
essential
in
the
responsibilities
BCMS.
include
(EPRR)
the
staff
skills,
competencies
and
teams;
prioritized activities
business as usual.
Assurance
priority activate.
BIAs
organizations
Business
Continuity
management
has
the
vulnerabilities
following stages:
130
www.iaetsd.in
BCM programme.
evaluated.
Recovery
People
Exercises
response
structure,
business
continuity
plans,
and
are
various
sources
of
information
Audit
To
To
solutions
validate
review
compliance
the
with
organizations
the
BCM
131
www.iaetsd.in
CONCLUSION
Management Review
An annual review of this strategy will be
BIA
substantive
revision
changes
which
in
identifies
processes
and
priorities;
A
REFERNCES
significant
assessment
and/or
change
risk
in
the
threat
appetite of
the
Continuity
organization
New
Management
Systems
Requirements.
regulatory
or
legislative
requirements.
Preparedness,
Resilience
and
Response
(EPRR).
[3]
J.
Internet
Services
and
of
risks,
alerts
ISO 22301.
and
incidents
Business continuity information will be
available on the staff intranet
Business continuity training
132
www.iaetsd.in
AUTHORS
Instutiate
Technology,
of
Tirupathi,
the
Jawaharlal
Nehru
technological
Colleges.
Mobile
He
interests
Computer
Computing,
Network
133
www.iaetsd.in
M.Tech , Dept. of CSE, Audisankara College of Engineering & Technology, Gudur, A.P, India.
Professor, Dept. of CSE, Audisankara College of Engineering & Technology, Gudur, A.P, India.
wireless
networks
where
communication
is
promising
and
powerful
solution
that
can
cross-layer
optimization
scheme,
and
reliability,
it
is
not
simple
to
be
INTRODUCTION
134
www.iaetsd.in
was
proposed for
CDMA cellular
fading-free channels.
tradeoff
the
tools
were
used
to
analyze
sensor
network
and
the
network
lifetime
reliability
is
more
important
than
other
cross-layer
communication
physical layer.
problem,
since
network layer.
135
www.iaetsd.in
sensor
networks.
In
the
cooperative
network
cooperative
communication techniques.
resources
through
Problem Formulation
is
formed
first,
and
cooperative
single
the
qualities
of
omnidirectional
antenna
and
can
cooperative
We
consider
two
associated
optimization
problem.
136
www.iaetsd.in
in
which
for
the
multirelay
The broadcast
transmission
rate and
(DT)
power
mode
and
for
direct
lifetime.
cooperative
III.
COOPERATION-BASED CROSS-LAYER
in
which
for
SCHEMES
2) Single-Relay
the
cooperative
power
and
maximize-lifetime
conventional
Bellman-Ford
137
cross-layer
shortest
path
www.iaetsd.in
algorithm
which
can
be
distributively
(1)
Notation
()
Qs
i)
Table 1
Symbol and Explanation
Explanation
The effective distance between node
I and j
The latest estimate cost of the
shortest path from node j to the
destination
The set of neighboring nodes of node
i
Quality parameter
(2)
Every
distance
node
estimates
(3)
of
the
average
(4)
(5)
/
,
as
Cost(i)
min
(6)
optimization
is a
least
(7)
correlated to
the
/
,
Then,
( )
algorithm.
from
destination
conservative
SNR
outgoing links as
on
effective
Transmission
based
the
measurement
Bellman-Ford
transmission
power
i)
Transmission
adjusted.
The
min-power
scheme
for
cooperative
know
minimizing
is equal to
138
www.iaetsd.in
opportunistic
relaying
multirelay
scenario)).
Consider
(1)
(2)
(3)
(1)
(2)
(3)
outgoing links as
= min
(, )
min
( , )
(4)
(4)
of both I and j.
of both i and j.
( )
= min
destination as
), and
(5)
(6)
Go to (2).
(6)
Transmission
Go to step (2).
is as follows.
(1)
Algorithm 1.
Algorithm 3 (Min-Power Cross-Layer Scheme
Cooperative
Transmission
(MPCS-CT)
(for
139
www.iaetsd.in
(3)
(5)
destination as
()
flows.
(6)
( )
(8)
Go to (2).
(7) Go to (2).
iii) Max-Lifetime
Cross-Layer
Scheme
with
Cooperative Transmission
shortest
routing
(MPCR)
algorithm and cooperation along the shortest noncooperative path (CASNCP) algorithms.
Consider
(1)
non-cooperative
Algorithm 1.
cross-layer
its
outgoing
,
= min
( , )
links
as
with
cooperative
), and select
scheme
V. CONCLUSION
links.
140
www.iaetsd.in
and
exploit
guaranteeing
the
the
network
end-to-end
lifetime
while
accomplishment
probability.
REFERENCES
Theory
p.
476,
Lausanne,
wireless
[3] Y.-W. Hong, W.-J. Huang, F.-H. Chiu, and C.C. J. Kuo, Cooperative communications in
wireless
'02),
Information
resource-constrained
(ISIT
on
communication
Symposium
Cooperative
networks,
141
www.iaetsd.in
Abstract-
I. INTRODUCTION
The Presence [1] entitled applications such as Face-book,
Twitter etc., which is produced by mobile devices and cloud
computing [2] nature due to the prevalence of internet
[3].Way the members are engaged with their buddies on
142
www.iaetsd.in
143
www.iaetsd.in
Once path is set up, the mobile user request for the friend list
to the presence server which is present in presence cloud. And
finally the request is responded by the presence cloud after
completing an efficient search of buddys presence
information. Analyze the performance complexity of Presence
Cloud and two other architectures, a Mesh based scheme and
a Distributed Hash Table (DHT)-based scheme. Through
simulations, we also compare the performance of the three
approaches in terms of the number of messages generated and
the search satisfaction which we use to denote the search
response time and the buddy notification time. The results
demonstrate that Presence- Cloud achieves major performance
gains in terms of reducing the number of messages without
sacrificing search satisfaction. Thus, Presence Cloud can
support a large-scale social network service distributed among
thousands of servers on the internet. Presence Cloud is among
the pioneering architecture for mobile presence services. To
the best of our knowledge, this is the first work that explicitly
designs a presence server architecture that significantly
outperforms those based distributed hash tables. Presence
Cloud can also be utilized by Internet social network
applications and services that need to replicate or search for
mutable and dynamic data among distributed presence servers.
The contribution is that analyzes the scalability problems of
distributed presence server architectures, and defines a new
problem called the buddy-list search problem. Through our
mathematical formulation, the scalability problem in the
distributed server architectures of mobile presence services is
analyzed. Finally, we analyze the performance complexity of
Presence Cloud and different designs of distributed
architectures, and evaluate them empirically to demonstrate
the advantages of Presence Cloud. Server architectures of
existing presence services, and introduce the buddy-list search
problem in distributed presence Architectures in large-scale
geographically data centers.
IV. EVOLUTION
A cost analysis of the communication cost of Presence Cloud
in terms of the number of messages required to search the
buddy information of a mobile user. Note that how to reduce
the number of inter server communication messages is the
most important metric in mobile presence service issues. The
buddy-list search problem can be solved by a brute-force
search algorithm, which simply searches all the PS nodes in
the mobile presence service. In a simple mesh-based design,
the algorithm replicates all the presence information at each
PS node; hence its search cost, denote by QMesh, is only one
message. On the other hand, the system needs n _ 1 messages
to replicate a users presence information to all PS nodes,
where n is the number of PS nodes. The communication cost
of searching buddies and replicating presence information can
be formulated as Mcost = QMesh +RMesh, where RMesh is
the communication cost of replicating presence information to
all PS nodes. Accordingly, we have Mcost = O(n). In the
analysis of Presence Cloud, we assume that the mobile users
are distributed equally among all the PS nodes, which is the
worst case of the performance of Presence- Cloud. Here, the
search cost of Presence Cloud is denoted as Qp, which is
messages for both searching buddy lists and replicating
presence information. Because search message and replica
message can be combined into one single message, the
communication cost of replicating, Rp (0). It is straight
forward to know that the communication cost of searching
144
www.iaetsd.in
tables
http://www.cs.cmu.edu/~dga/15-
V. CONCLUSION
In this paper In large scale social network services mobile
presence services is supported by the scalable server
architecture called as presence cloud.
A scalable server
architecture that supports mobile presence services in largescale social network services. Presence Cloud achieves low
search latency and enhances the performance of mobile
presence services. Total number of buddy search messages
increases substantially with the user arrival rate and the
number of presence servers. The growth of social network
applications and mobile device computing capacity to explore
the user satisfaction both on mobile presence services or
mobile devices. Presence Cloud could certificate the presence
server every time when the presence server joins to Presence
Cloud. The results of that Presence Cloud achieve
performance gains in the search cost without compromising
search satisfaction.
Sharing Workloads.
[15]. Brent Hecht, Jaime Teevan , Meredith Ringel Morris, and Dan Liebling,
SearchBuddies: Bringing Search Engines into the Conversation, 2012
REFERENCE
[1 ] R.B. Jennings, E.M. Nahum, D.P. Olshefski, D. Saha, Z.-Y. Shae, and C.
Waters, A Study of Internet Instant Messaging and Chat Protocols, IEEE
Network, vol. 20, no. 6, pp. 16-21, July/Aug. 2006.
[2] Z. Xiao, L. Guo, and J. Tracey, Understanding Instant Messaging
Traffic Characteristics, Proc. IEEE 27th Intl Conf. Distributed
Computing Systems (ICDCS), 2007.
[3] Chi, R. Hao, D. Wang, and Z.-Z. Cao, IMS Presence Server:aTraffic
Analysis and Performance Modelling, Proc. IEEE IntConf. Network
Protocols (ICNP), 2008.
[4] Instant Messaging and Presence Protocol IETF Working Group,http:
//www.ietf.org /html.charters/impp-charter.html, 2012.
[5] Extensible Messaging and Presence Protocol IETF Working Group,
http://www.ietf.org /html.charters/xmpp-chart er.html,2012.
[6] Open Mobile Alliance, OMA Instant Messaging and Presence Service,
2005.
[7] P. Saint-Andre, Interdomain Presence Scaling Analysis for the
Extensible Messaging and Presence Protocol (XMPP), IETF Internet
draft, 2008.
[8 ]X. Chen, S. Ren, H. Wang, and X. Zhang, SCOPE: Scalable Consistency
Maintenance in Structured P2P Systems, Proc. IEEE INFOCOM, 2005.
145
www.iaetsd.in
Abstract: Due to the high demands of video traffics over mobile networks, the wireless link
more fails to keep up the pace with the demand. There exits a gap between the request and the
link capacity which results in poor service quality of the video streaming over mobile networks
which includes disruptions and long buffering time. While demands on video traffic above
mobile webs have been float, the wireless link capacity cannot retain up alongside the traffic
request. The gap amid the traffic request and the link capacity, alongside time-varying link
conditions, by-product in poor ability quality of video streaming above mobile webs such as long
buffering period and intermittent confusion. Leveraging the cloud computing knowledge, we
advice a new mobile video streaming framework, dubbed AMES-Cloud that has two parts:
Adaptive Mobile Video Streaming (AMOV) and Efficient Communal Video Sharing (ESoV).
AMoV and ESoV craft a personal agent to furnish video streaming services effectually for every
single mobile user. For a given user, AMoV lets her private agent adaptively adjust her
streaming flow alongside a scalable video coding method established on the feedback of link
quality. In similar, ESoV monitors the common web contact amid mobile users, and their
confidential agents attempt to perfects video content in advance. We apply a prototype of the
AMES-Cloud structure to clarify its performance.
INDEX TERMS: Scalable Video Coding, Adaptive Video Streaming, Mobile Networks, Social
Video Sharing, Cloud Computing.
1. INTRODUCTION
any time.
resources
depending
upon
the
fig1
146
www.iaetsd.in
i) Public cloud
external clouds
offerings
of
Hybrid cloud:
private
provides
PaaS
offerings
configuration
facilitate
settings.
of resources:
and
types
software deployment
three
the
147
www.iaetsd.in
the
quality.
2. LITERATURE REVIEW
condition
the
most
important
step
in
software
variation.
Storing
multiple
2.2.
Adaptability:
streaming
mobile
techniques
environments
Traditional
designed
[11].
Thus
video
by
the
148
www.iaetsd.in
Mobile
Cloud
Computing
Techniques
The cloud computing
has
been well
Cloud framework
2.2.1.
Adaptive
media
Video
streaming
service
for
globally
Streaming
Techniques
environments
are
proposed,
which
Stratus.
reliable
service
149
to
the
mobile
users
www.iaetsd.in
bandwidth
efficient
increasing
The
networks.
which
affects
the
video
mobile
users
traffic
often
demands
suffer
are
from
adaptive
providers
video
demand[3].
streaming
YouTube
cloud
provide
centered
streaming
techniques
can
be
150
www.iaetsd.in
So,
the
we
are
inspired
to
exploit
3. CLOUD FRAMEWORK
As shown in the above figure, the video
4.
SOCIAL
PREFETCHING
151
AWARE
VIDEO
www.iaetsd.in
mobile
video
streaming
and
sharing
maintenance, and
2. User details
152
www.iaetsd.in
7.REFERENCES
them.
.AMES-Cloud
Framework
of
unexpected
videos
accept/reject
videos
from
then
users.
After
only
users
[3].CloudStream:
delivering
high-quality
6. CONCLUSION
Li
Erran Li,Thomas
terminating
streaming
of
videos
by
209224, 2011.
Novel
2011.
prototype
showed
method
implementation,
brings
and
improvement
to
the
Multi-Source
153
Mobile-Streaming
www.iaetsd.in
Forward
Error
Strategies
for
Correction
over
IEEE
Time / Region
Goel
Wang,
and Approaches,
VideoApplications in Next-
in
Oct. 2011.
2010.
23, 2009.
38013814, 2008.
Schulman,
Mobile
2010.
Wireless
Media
Adaptation
Streaming
Networks,in
Survey
Wiley
of
Journal
Stratus
Communication
Mobile
of
Cloud
Wireless
Energy-Efficient
using
Cloud
154
www.iaetsd.in
M.Swapna M.Tech
[email protected]
ABSTRACT:
Ad-hoc low-power wireless networks are inspiring research direction in sense
and enveloping computing. In previous security work in this area has focused primarily
on inconsistency of communication at the routing or medium access control levels. This
paper explores resource depletion attacks at the navigation protocol layer, which
permanent disable networks by quickly draining nodes battery power. The Vampire
attacks are not specific protocol, but rather rely on the properties of many popular classes
of routing protocols. We find that all examined protocols are vulnerable to Vampire
attacks, which are demolish and difficult to detect, and easy to carry out using as few as
one malicious insider send only protocol compliant messages.
1.INTRODUCTION:
the last couple of years wireless
communication has become of such
fundamental importance that a world
without is no longer imaginable for
many of using. Beyond the establish
technologies such as mobile phones and
WLAN, new approaches to wireless
communication are emerging; one of
them are so called ad hoc and sensor
networks. Ad hoc and sensor networks
are formed by autonomous nodes
communicating via radio without any
additional backbone infrastructure. Adhoc wireless sensor networks (WSNs)
promise exciting new applications in the
155
www.iaetsd.in
156
www.iaetsd.in
Once
the
programmers
start
the
system
the
above
of
spatially
distributed
2.LITERATURE REVIEW:
Before
and so on.
developing
the
tool
it
is
157
many
www.iaetsd.in
3.IMPLIMENTATION:
As
typically
node
several
parts:
radio
prerequisite,
may
not
all
participate
nodes
in
this
facility
memory,
and
Stage 1: Initialization
The
flooding.
computational
communications
speed
bandwidth.
of
158
the
successors
table
www.iaetsd.in
claiming message.
dened by
a message,
respect
to
the
claiming
constructed
returned by Algorithm 1.
by
Criteria
of
determining
inspectors:
, are locations of
,respectively.
Nodes
can
and
start
159
www.iaetsd.in
4.ALGORITHMS:
of
the
predecessors
of
the
with
previous
inspected
and
and
, the
witness
node
then
broadcasts
message
the
and
160
www.iaetsd.in
expense
messages
are
and,
detection
message,
node
wicked
the
before
and
authenticated
by
the
next
behavior
signatures
observers
integrity
by
of
verifying
and
with
adequate
procedures,
detection
every
node
probabilistic
we bring several
witnesses.
Chord
overlap
network
incurs
Then,
(RDE),
and
presents
optimal
subsequent
which
message
the
directed
and
mechanisms
storage
border
determination
161
mechanism to
www.iaetsd.in
by
intermediate
transmission,
nodes
it
should
during
not
be
number,
and
accordingly
an
it
process
the
message.
During
the
clone,
the
its
claiming
message
neighb-list.
by
node
the
witness
node
will
location,
, as an inspector,
whole
that
The
network
such
the
cloned
is
constructed by
162
www.iaetsd.in
4.4target range :
This is used along with ideal direction to
determine a target zone. When no
neighbor is found in this zone, the
current node will conclude that the
message has reached a border, and thus
throw it away.
4.2Deterministicdirected
transmission:
When node receives a claiming message
from previous node, the ideal direction
can be calculated. In order to achieve the
best effect of line transmission, the next
destination node should be node , which
is closest to the ideal direction.
Fig:Loose source routing performance
4.3Networkborder
determination:
This
takes
the
observed performance.
consideration
network
to
shape
reduce
5.CONCLUSION:
163
www.iaetsd.in
Denial-of-Service
2003.
number
of proof-of-concept
against
representative
attacks
examples
of
Attacks:
Real
2008.
number
of
weak
adversaries,
and
http://cr.yp.to/syncookies.html, 1996.
randomly-generated topology of 30
nodes.
REFERENCES:
http://www.isi.edu/nsnam/ns,2012.
Archive,
501,
MobiCom, 2004.
Oct. 2003.
Maximum
Lifetime
Routing
in
2009/
T.
Report
http://eprint.iacr.org, 2009.
[4]
Implementations of AES on
Dos-Resistant
164
www.iaetsd.in
Link
State
Routing
Wireless
Sensor
Networks,
Intl
Workshop
Peer-to-Peer
Systems, 2002.
[17] H. Eberle, A. Wander, N. Gura, C.S.
Sheueling,
and
V.
Gupta,
165
www.iaetsd.in
AllareddyAmulya M.Tech
[email protected]
Abstract:
In Cloud systems Virtual Machine technology being increasingly grown-up, compute resources which
can be partitioned in fine granularity and allocated them on require. In this paper we formulate a
deadline-driven resource allocation problem based on the Cloud environment that provides VM
resource isolation technology, and also propose an optimal solution with polynomial time, which
minimizes users payment in terms of their expected deadlines. We propose an fault-tolerant method
to guarantee tasks completion within its deadline. And then we validate its effectiveness over a real
VM-facilitated cluster environment under different levels of competition. To maximize utilization and
minimize total cost of the cloud computing infrastructure and running applications, efficient resources
need to be managed properly and virtual machines shall allocate proper host nodes . In this work, we
propose performance analysis based on resource allocation scheme for the efficient allocation of
virtual machines on the cloud infrastructure. Our experimental results shows that our work more
efficient for scheduling and allocation and improving the resource utilization.
166
www.iaetsd.in
2. RELATED WORKS:
A Static resource allocation based on peak
demand is not cost-effective because of poor
resource utilization during off-peak periods..
Resource provisioning for cloud computing,
an important issue is how resources may be
allocated to an application mix such that the
service level agreements (SLAs) of all
applications are met Heuristic algorithm that
determines a resource allocation strategy
(SA or DA) that results in the smallest
number of servers required to meet the SLA
of both classes; Comparative evaluation of
FCFS, head-of-the-line priority (HOL) and a
new scheduling discipline called probability
dependent priority (PDP). Scott et al[10]
proposed a finding the failure rate of a
system is a crucial step in high performance
computing systems analysis. Fault tolerant
mechanism, called checkpoint/ restart
technique, was introduced. Incremental
checkpoint model can reduce the waste time
more than it is reduced by the full
checkpoint model. Singh et al. presented a
slot-based provisioning model on grids to
provide scheduling according to the
availability and cost of resources.
2.1.Cloud Environment Infrastructure
Architecture:
Cloud users combine virtualization,
automated
software,
and
internet
connectivity [11] to provide their services. A
basic element of the cloud environment is
client, server, and network connectivity [13].
167
www.iaetsd.in
168
www.iaetsd.in
3.IMPLEMENTATION
By using queue set scheduling for
scheduling the task we can obtain the high
task completion with in schedule. Whenever
the queue set scheduling event occurs the
task queue is searched for the process
closest to its deadline and is scheduled for
its execution.
In queue set scheduling , at every scheduling
point the task having the shortest deadline is
taken up for scheduling. The basic principle
of this algorithm is very sensitive and simple
to understand. If a new process arrives with
cpu burst time less than remaining time of
current executing process. Queue set
satisfies the condition that total processor
utilization (Ui) due to the task set is less
than 1. With scheduling periodic processes
that have deadlines equal to their periods,
queue set has a utilization bound of 100%.
For example let us Consider 3 periodic
processes scheduled using queue set
alogorithm, the following acceptance test
shows that all deadlines will be met.
Q2
Table1:Task Parameter
Process
P1
P2
P3
Execution Time=C
3
2
1
Period=T
4
5
7
4.QUEUE
SET
SCHEDULING
ALGORITHM:
Let n denote the number of processing
nodes and m denote the number of Available
tasks in a uniform parallel real- time system.
C denotes the capacity vectore and D
denotes the deadline. In this section we are
presenting five steps of queue set scheduling
alogorithm.
obviously, each task which is picked for up
execution is not considered for execution by
other processors. Here we are giving
following methods for our new approach:
1. Perform a possible to check a specify the
task which has a chance to meet their
deadline and put them into a queue(2
) , Put the remaining tasks are also allocated
and assign that particular queue. We can
169
www.iaetsd.in
N1(corevalue0.2)+(cpuvalue0.5)+(me
mvalue 0.3);
DB.add(Ni );
end for
170
www.iaetsd.in
7. REFERENCES:
1. Amazon Elastic Compute Cloud,
http://aws.amazon.com/ec2/, 2012.
2. D. Milojicic, I.M. Llorente, and R.S.
Montero, Opennebula: A Cloud
Management Tool, IEEE Internet
Computing, vol. 15, no. 2, pp. 11-14,
Mar./Apr. 2011.
3. S. Boyd and L. Vandenberghe,
Convex Optimization. Cambridge
Univ. Press, 2009.
4. E. Imamagic, B. Radic, and D.
Dobrenic, An Approach to Grid
Scheduling by Using Condor-G
Matchmaking Mechanism, Proc.
28th Intl Conf.
Information
Technology Interfaces, pp. 625-632,
2006.
5. Naksinehaboon N, Paun M, Nassar
R, Leangsuksun B, Scott S (2009)
High
performance
computing
systems with various checkpointing
schemes.
6. Ratan Mishra and Anant Jaiswal,
Ant colony Optimization: A
Solution of Load balancing in
Cloud, in: International Journal of
Web & Semantic Technology
(IJWesT-2012) Vol 3, PP 33-50
(2012). DOI: 15121/ijwest.2012.32
7. Chandrashekhar S. Pawar and
R.B.Wagh, A review of resource
allocation
policies
in
cloud
computing, IN: World Journal of
Science and Technology (WJST)
Vol 3, PP 165-167 (2012).
8. K C Gouda, Radhika T V, Akshatha
M,
"Priority
based
resource
allocation
model
for
cloud
computing", Volume 2, Issue 1,
January 2013, International Journal
of Science,
Engineering and
Technology Research (IJSETR).
9. W. Zhao, K.Ramamritham, and
J.A.Stankovic,
Preemptive
171
www.iaetsd.in
P.VENKATESWAR RAO2
ABSTRACT
This project is to design and implement personal health record (PHR) and provide security and
stored in cloud provider. This application allows user to access their lifetime health information, it
maintained in centralized server to maintain the patients personal and diagnosis information. The
person health records should maintain with high privacy and security. The patient data is protected
from the public access through these security techniques. To convince the patients access over to
their own PHRs, before outsourcing we have to encrypt the PHRs. To protect the personal health
data stored in a partly-trusted server, we have to adopt attribute-based encryption (ABE) as a main
encryption primitive. To obtain fine-grained and scalable information access control for PHRs and
to encrypt each patients PHR file we purchase attribute based encryption (ABE) techniques. In this
project we propose a new patient centric Architecture and access mechanism to control PHRs in
multitrusted servers. We get fine grained and scalable control of data access for personal health
records stored in multi-trusted servers, and attributes based encryption (ABE) technique to encrypt
the each patients medical record into a file. In this paper we are extend Multi Authority Attribute
Based Encryption (MA-ABE) for access control mechanism.
Keywords: Personal Health Records, Cloud Computing, Data Privacy, Fine-grained access
control, Multi Authority Attribute Based Encryption.
1. INTRODUCTION
In Recent years, personal health record is
maintained as a patient centric design of health
message exchange. It allows a patient to create
and control their medical data and it can be
maintained in a single place such as data
centres. High cost of building and managing
stream of data centres and many of PHR
services are outsourced to third party service
providers, for example Google Health,
172
www.iaetsd.in
B. Revocable
Encryption:
Attributed
based
2. RELATED WORK
This article is more related to operate in
cryptographically enforced control access for
outsourced data and attribute based on
encryption data. To improve the scalability of
the above result, one-to-many encryption
methods such as ABE can be utilized. The
basic property of ABE is preventing against
the user collusion.
3. IMPLEMENTATION
a. Requirements:
The most important task is to achieve patientcentric PHR sharing. That means, the patient
should contain the fundamental control over
their own health record. It also determines
which users should have access to their
medical data. The user control write/read
access and revocation are two main security
purposes for any type of electronic health
record system. The write access control is
controlled by the person to prevent in PHR
A.Trusted Authority:
Multiple operations used ABE to realize fine
grained access outsourced data control. Each
patient EHR files are encrypted by using a
broadcast variant of CP-ABE that allows
directly. Here several communication
drawbacks of the above mentioned
operations. Mainly they are usually
pretending the use of a single trusted authority
173
www.iaetsd.in
b. Framework:
The purpose of our framework is to provide
security of patient-centric PHR access and
efficient key management at the same time. If
users attribute is not valid, then the user is
unable to access future PHR files using that
attribute. The PHR data should support users
from the personal domain as well as public
domain. The public domain may have more
number of users who may be in huge amount
and unpredictable, system should be highly
scalable in terms of complexity in key
management
system
communication,
computation and storage.
The owners
endeavour in managing users and keys should
be minimized to enjoy usability. By using
attribute based encryption we can encrypt
personal health records self-protective that is
they can access only authorized users even on
a semi trusted server.
c. Architecture of implementation:
174
of
patients
medical
www.iaetsd.in
4. TECHNIQUES
a. Attribute Based Encryption
b. Multi-Authority ABE
ii.
User
Access
Confidentiality:
Privilege
175
www.iaetsd.in
6. CONCLUSION
This PHR system fights against the security
attackers and hackers. The secure data sharing
is used to protect the information from
unauthorized user. We have proposed a novel
approach for existing PHR system providing
high security using Attribute Based
Encryption which plays main role, because
these are the unique competition, and it is
difficult to hack. The ABE model increases
and operates with MAABE.
7. REFERENCES
[9] S. Narayan, M. Gagne, and R. SafaviNaini, Privacy preserving EHR system using
attribute-based infrastructure, ser. CCSW
10, 2010, pp. 4752.
176
www.iaetsd.in
177
www.iaetsd.in
of
ngerprint
is
three-
believed that
1. INTRODUCTION
SIGNIFICANT
improvements
in
ngerprint
achieved in terms of
Jingled.
178
www.iaetsd.in
explicitly in order
spurious minutiae.
However,
rich
information
of
the
A method to judge whether an extracted minutia is a
performance is moderate.
variations
ridge
in
impression
conditions,
179
www.iaetsd.in
Fingerprint
recognition
(also
known
as
and
the
other
is
finger
templates
available
in
database)
matching.
identification.
2. EXISTING SYSTEM
A. Fingerprint Recognition
Fig.2. Fingerprint Recognition System
background
well
Before
outperforms
information).
algorithm
(irrelevant
optimized
Orientation
field plays an
important role in
180
www.iaetsd.in
3. PROPOSED SYSTEM
A. entropy
Correlation-based matching:
hand, high
Minutiae-based matching:
for
fingerprint
comparison.
In
minutiae-based
181
www.iaetsd.in
Wiener Filtering:
B. Correlation
the
Wiener
filter
in
perform
we
have
to
C. Energy
technology.
we
182
www.iaetsd.in
below.
the city. For the 8-puzzle if xi(s) and y(s) are the x
Manhattan distance.
ALGORITHM
FOR
CALCULATING
been computed.
Output: feature vector
1. Calculate Entropy for query image (En) using -sum
image is matched.
183
www.iaetsd.in
0.420820.
4. EXPERIMENTAL RESULTS
The proposed algorithm has been participated in
FVC2004. In FVC2004, databases are more difficult
than in FVC2000/FVC2002 ones. In FVC2004, the
organizers have particularly insisted on: distortion,
dry, and wet ngerprints. Especially in ngerprints
database DB1 and DB3 of FVC2004, the distortion
between some ngerprints from the same nger is
large. Our work is to solve the problem of distorted
ngerprint matching, so the evaluation of the
proposed algorithm is mainly focused on DB1 and
DB3 of FVC2004. The proposed algorithm is also
compared with the one described by Luo et al. and
the
one
proposed
by
Bazen
et
al
Fig.5. Experimental results of the proposed algorithm on
103_2.tif and 103_4.tif in FVC2004 DB3. The images have
been scaled for view. (a) 103_2.tif. (b) Enhanced image of
103_2. (c) 103_4.tif. (d) Enhanced image of 103_4. The
similarity of these two ngerprints is 0.484 111.
5. CONCLUSION
This paper has proposed a quick and efficient
technique of fingerprint recognition using a set of
texture statistical based features. The features are
derived from a correlation coefficient, an entropy
coefficient and an energy coefficient. The features
can be calculated by using fingerprint miniature
points. Moreover such texture based by using color
finger print images. The fingerprint images may be
184
www.iaetsd.in
6. REFERENCES
pp. 846-853.
Biometric
Identity
Verification,
DOI:10.1504/IJBM.2010.030415
[2]. A. K. Jain, A. Ross and S. Prabhkar, An
Introduction
to
Biometric
Recognition,
AUTHORS
IEEE
K.Phalguna
Rao,
completed
M.Tech
information
technology
from Andhra University
presently Pursuing PhD.
Life member of ISTE. He
is working as Professor in
the Dept of CSE Published
several papers in the
International Journals and International and
national conferences. Attended several
International and national workshops.
Research Interest areas are Data Base
Systems,
Network
Security,
cloud
Computing, Bioinformatics.
Conference on
Image Processing
Identity-Authentication
System
using
1365-1388.
[6]. D. Maltoni, D. Maio, A. K. Jain and S. Prabhkar,
Handbook of Fingerprint Recognition.
[7]. S. Chikkerur, S. Pankanti, A. Jea and R. Bolle,
Fingerprint Representation using Localized Texture
Features, The 18th
International Conference on
Conference
on
Computer
and
with
Rotation-Descriptor
Texture
Features,
185
www.iaetsd.in
S. Dorababu
Department of CSE
ASCET, Gudur.
A.P, India
[email protected]
ABSTRACT
Here with in this report most of us recommend excess management connected with heterogeneous wireless sensor
networks (HWSNs), utilizing multipath aiming to help solution client enquiries near questionable in addition to
malevolent hubs. The main element thought of the repeating administration is usually to effort this buy and sell -off
concerning vitality utilization compared to this increase in trustworthiness, ease, In addition to security to help boost
this framework very helpful lifetime. All of us program this trade off being an enhancement matter intended for
alterably choosing the best repeating degree to use to help multipath aiming intended for disruption tolerance while
using the purpose that the inquiry reaction achievements likelihood is actually increased although dragging out this
very helpful lifetime. Other than, most of us consider this to be enhancement matter to the circumstance in which a
voting-based disseminated disruption finding calculations is actually linked with find in addition to oust malevolent
hubs in a HWSN. DSR seemed to be specifically designed for utilization in multi-hop wireless random
communities. Ad-hoc method permits the actual network to become entirely self-organizing in addition to selfconfiguring meaning you don't have on an active network structure or even management. To meet these trouble
when using the Slow Gradual cluster election Algorithm (GCA), it is reducing energy usage of community
groupings in addition to overall communities. The item elected the actual gradual cluster amid nodes that happen to
be practical for the actual gradual cluster head in addition to proved the power effectiveness inside network.
Key words Heterogeneous wireless sensor Networks; multipath routing; interruption location; dependability,
security; energy conversation
several completely new multipath direction-finding
protocols particularly intended for sensor networks.
Multipath direction-finding is an effective approach,
which often selects a number of trails to supply files
through supplier in order to desired destination in
wireless sensor systems. Multipath direction-finding
ensures a number of trails between your sourcedestination match. Within sole way completely new
route development procedure is actually begun,
which often boosts energy use. Node disappointment
additionally reasons packets to be lowered and may
cause a hold off in delivering your data to the
destroy, as a result the real-time demands of the
multimedia system apps will not be met. Multi-path
routing boosts the volume of feasible paths and also
via that that improves the heavy ness and also
throughput of the transmissions. Multipath directionfinding is actually commercial intended for major
I. INTRODUCTION
Wireless sensor Networks (WSN) is made of
spatially spread autonomous detectors in order to
check real as well as environmental conditions, for
instance temperature, noise , force, for example. and
to cooperatively go the files through the community
with a major position. Greater modern wireless
networks usually are bi-directional, additionally
which allows manage connected with sensor action.
The improvement connected with wireless sensor
networks has been encouraged simply by military
apps for instance battlefield surveillance; today like
wireless communities are widely-used in many
manufacturing and also client apps, for instance
manufacturing procedure monitoring and also
manage, appliance wellness monitoring, and so on.
Wireless sensor networks(WSNs) include resulted in
186
www.iaetsd.in
Bao et ing.,[15] Suggested your scalable clusterbased hierarchical confidence operations standard
protocol with regard to WSN to help successfully
manage detrimental nodes.. Some sort of story
likelihood style summarize some sort of HWSN
composed a lot of sensor nodes having unique social
along with good quality regarding assistance (QOS)
behaviours. Anomaly structured breach recognition
used in both the recognition likelihood along with
false beneficial likelihood
187
www.iaetsd.in
188
www.iaetsd.in
SCHEMES:
1. Multi Course-plotting
2. Intrusion Patience
3. Energy Productive
4. Simulation Procedure
1. Multi Course-plotting
Within this component, Multipath redirecting is
regarded a highly effective system regarding failing
along with attack tolerance to improve facts shipping
inside WSNs. Principle concept is actually that this
chance involving at least one particular journey
achieving this kitchen sink node or even base stop
increases as we convey more walkways carrying out
facts shipping. Alot of previous exploration dedicated
to using multipath redirecting to improve
consistency, a few attentionshas been paid out to be
able to using multipath redirecting to be able to
accept insider attacks. These reports, nonetheless,
generally pushed aside this tradeoff among QoS
attain versus. Power usage that may negatively
shorten the system life time.
2. Intrusion tolerance
3. Energy Productive
Within this component, you will discover a pair of
approaches by which power successful IDS might be
carried out inside WSNs. One particular strategy
particularly pertinent to be able to level WSNs is
designed for a second time beginners node to be able
to feedback maliciousness along with power
189
www.iaetsd.in
4 Simulation Procedures
Within this component, the cost of executing this
active redundancy managing protocol defined earlier
mentioned, as well as recurrent clustering, recurrent
attack diagnosis, along with query digesting via
multipath redirecting, with regard to power usage
IDS:
Intrusion Detection System (IDS)[9] is a device or
software application that monitors network or system
activities for malicious activities and produces
reports to a management station. Intrusion Detection
and prevention System (IDPS) are primarily focused
on identifying possible incidents, logging information
about them and reporting attempts.
190
www.iaetsd.in
Energy Consumption
VI. REFERENCES
Iterations
Fig5Energy consumption in DSR & GCA method
[1]
V. CONCLUSION
In this paper we performed a trade-off investigation
of vitality utilization vs. Qos pick up in
dependability, opportunity, and security for excess
administration of grouped heterogeneous remote
sensor systems using multipath directing to answer
client inquiries. We created a novel likelihood model
to dissect the best excess level in wording of way
191
www.iaetsd.in
MANET,"
InternationalConference
on
Communication and Networking, 2008, pp.
Computing,
192
www.iaetsd.in
ABSTRACT
INTRODUCTION
Mechanical stresses applied to piezoelectric
materials distort internal dipole moments and
generate electrical potentials (voltages) in
direct proportion to the applied forces. These
same crystalline materials also
lengthen or shorten in direct proportion to
the magnitude and polarity of applied
electric fields. Because of these properties,
these materials have long been used as
sensors and actuators. One of the earliest
practical applications of piezoelectric
materials was the development of the first
SONAR system in 1917 by Langevin
who used quartz to transmit and receive
ultrasonic waves. In 1921, Cady first
proposed the use of quartz to control the
resonant frequency of oscillators. Today,
piezoelectric sensors (e.g., force, pressure,
acceleration) and actuators (e.g., ultrasonic,
micro positioning) are widely available. The
same properties that make these materials
useful for sensors can also be utilized to
generate electricity. Such materials are
capable of converting the mechanical energy
of compression into electrical energy, but
developing piezoelectric generators is
challenging because of their poor source
characteristics (high voltage, low current,
high impedance). This is especially true at
low frequencies and relatively low power
output.
193
www.iaetsd.in
PIEZOELECTRIC CRYSTAL?
The phenomenon of generation of a voltage
under mechanical stress is referred to as the
direct piezoelectric effect, and the
mechanical strain produced in the crystal
under electric stress is called the converse
piezoelectric effect.
194
www.iaetsd.in
CONFIGURATION:
FOOT
STEP
GENERATION:
POWER
APPLICATIONS:
The above method can be employed in many
ways like
1.railway station.
2. malls in cities.
3. escalators. Etc
195
www.iaetsd.in
CONCLUSION:
As the results shows that by using double
actuators in parallel we can reduce the
charging time of the battery and increase the
power generated by the piezoelectric device.
In second research where a piezoelectric
generator was put to the test and generated
some 2,000 watt-hours of electricity. The
setup consists of a ten-meter strip of asphalt,
with generators lying underneath, and
batteries in the roads proximity. So that it is
clear by using parallel combination we can
overcome the problems like of impedance
matching and low power generation. The
results clearly show that piezoelectric
materials are the future of electric power
generation.
Reference:
[1]- Piezoelectric Plates and Buzzers, Oct.
17,
2009.
[Online].
Available:
http://jingfengele.en.alibaba.com/product/50
91700650159415/Piezoelectric_Buzzer_Plates.html
[Accessed: Oct.17, 2009].
[2]- Anil Kumar(2011) Electrical Power
Generation Using Piezoelectric CrystalInternational Journal of Scientific &
Engineering Research- Volume 2, Issue 5,
May-2011.
[3]- www.BEProjectReport.com
196
www.iaetsd.in
Sri.G.VEERANNA
Asst.Professor
I.
INTRODUCTION
solar
PV
dramatically
197
www.iaetsd.in
renewable resource.
integration,
II.
while
a grid-scale BESS
improving
overall
power
PHOTOVOLTAIC
INTEGRATION
on
198
www.iaetsd.in
= 0.01
(6)
(2)
(3)
III.
the
temperature according to
power
(4)
(5)
199
www.iaetsd.in
in
combination
series-parallel
frequency support.
200
www.iaetsd.in
off, according to
1
=2
1
2
is system angular
speed,
system goals.
is the
C. Frequency Response
defined as
201
www.iaetsd.in
Where
is the
is the power
is
is the nominal
202
www.iaetsd.in
IV.
SIMULATION RESULTS
Fig.5., Ramp Rate control to 50 kW/min for a 1 MW photovoltaic installation and a 1.5 MW/1 MWh BESS for a full day
203
www.iaetsd.in
204
www.iaetsd.in
storage
4MW/min.
systems
in
renewable
energy
V.
CONCLUSION
VI.
REFERENCES
205
www.iaetsd.in
Dr K RAMA SUDHA
PROFESSOR
I.INTRODUCTION
FLEXIBLE arm manipulators mainly applied:
space robots, nuclear maintenance, microsurgery,
collision control, contouring control, pattern
recognition, and many others. Surveys of the
literature dealing with applications and challenging
problems related to flexible manipulators may be
found in [1] and [2].
The system, which is partial differential
equations (PDEs), is a distributed-parameter system
of infinite dimensions. It makes difficult to achieve
high- level performance for nonminimum phase
behavior. To deal with the control of flexible
manipulators and the modeling based on a truncated
(finite dimensional) model obtained from either the
206
www.iaetsd.in
207
www.iaetsd.in
ku jm vm c
(2)
n
Where J is the inertia of the motor [in kilograms
square meters], is the viscous friction coefficient
[in Newton meters seconds], and
c is the
coul m
c .sign (m )
coul (m 0)
(3)
And when 0
min(ku, coup )(u 0)
c .sign(u )
max(ku,coup )(u 0)
(4)
208
www.iaetsd.in
by
C. Complete-System Dynamics
kuc Jm vm c
(10)
The controller to be designed will be robust with
respect to the unknown piecewise constant torque
disturbances affecting the motor dynamics. Then
the perturbation-free system to be considered is the
following:
kuc jm vm
(11)
ku Jm vm c
n
c( m t )
(5,6,7)
Equation (5) represents the dynamics of the
flexible beam; (6) expresses the dynamics of the dc
motor; and (7) stands for the coupling torque
measured in the hub and produced by the
translation of the flexible beam, which is directly
proportional to the stiffness of the beam and the
difference between the angles of the motor and the
tip position, restively.
u c ( s) s( s B)
(12)
Fig.3 shows the compensation scheme of the
coupling torque measured in the hub.
The regulation of the load position t(t) to track a
given smooth reference trajectory * t (t ) is desired.
m (s) s 2 2
(8)
2 1/2
Where = (c/(mL )) is the unknown natural
frequency of the bar due to the lack of precise
knowledge of m. as done in [10], the coupling
torque can be canceled in the motor by means of
the a compensation term. In the case, the voltage
applied to the motor is of the form
u uc
k .n
(9)
209
www.iaetsd.in
mL2
t t
c
e t
(13)
System (9) is a second order system in which it
is desired to regulate the tip position of the
flexible bar t , towards a given smooth
c
mL2
(18)
e e d
m
mL2 *
m t
t t *t t
c
*
(14)
Subtracting (10) from (9), we obtain an
expression in terms of the angular tracking
errors:
c
e t
e m e t
mL2
(15)
Where e m m * m t , e t t * t t . For
s 0 *
*m 1
(19)
t t
s2
The tip angular position cannot be measured,
but it certainly can be computed from the
expression relating the tip position with the
motor position and the coupling torque. The
implementation may then be based on the use
of the coupling torque measurement. Denote
the coupling torque by it is known to be
given by:
em et
mL2
K2et K1et K0 et d
c
0
(16)
c m t mL2 n coup
(20)
e e d
m
1
t m
c
(21)
(17)
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT
210
www.iaetsd.in
s 3 k 2 s 2 0 1 k1 s 0 k 2 k 0 0 (23)
Identifying each term of the expression (18)
with those of (19), the design parameters
2 , 1 , 0 can be uniquely specified.
2
(s p) 4 s 4 4 ps 3 6 p 2 s 2 4 p 3 s p 4 0
(28)
4
3
2
s ( 3 B ) s ( 3 B 2 A) s 1 As 0 A 0
(29)
Where the parameter p represents the common
location of all the closed-loop poles, this being
strictly positive.
IV. IDENTIFICATION
As explained in the previous section, the
control performance depends on the knowledge of
the parameter . In order to do this task, in this
section, we analyze the identification issue, as
well as the reasons of choosing the algebraic
derivative method as estimator.
Identification
of
continuous-time
system
parameters has been studied from different points
of view. The surveys led by Young in [27] and
Unbehauen and Rao in [29] and [30], respectively,
describe most of the available techniques.
The different approaches are usually classified
into two categories:1) Indirect approaches: An
equivalent discrete-time model to fit the date is
k
e
k
e
k
3 m
2 m
1 e m ( ) d ( )
v
J
0
ev e m
t t
K
K
k 0 (e m ( 2 ))d ( 2 )d ( 1 )
0 0
(24)
the following integral reconstructor for the
angular-velocity error signal e is obtained:
m
K
v
e m ev ( ) d ( ) e m .
J 0
J
(25)
211
www.iaetsd.in
2
oe ne (t )
(30)
t [,)
d e (t ) for
z1 z 2 4t t (t )
z2 2t (t )
z3 z 4
(31)
z4 t 2 ( m (t ) t (t ))
(32)
2
ds 2
ds 2
ds
(34)
Employing the chain rule, we obtain
s2
d 2 ( t )
d
d 2 ( m ) d 2 ( t )
4s t 2 t 2 (
)
2
ds
ds
ds 2
ds 2
(35)
Consequently, in order to avoid multiplications
by positive powers of s, which are translated as
undesirable time derivatives in the time domain,
we multiply the earlier expression by s 2 . After
some rearrangements, we obtain
d 2 ( t )
d
4 s 1 t 2 s 2 t
2
ds
2 ds
2
d ( m ) d 2 (t )
s 2 (
)
ds 2
ds 2
(36)
Let L denote the usual operational calculus
transform acting on exponentially bounded
signals with bounded left support (see[38]).
Recall that
taking
this
into
212
www.iaetsd.in
INTERNATIONAL CONFERENCE
ON CURRENT
INNOVATIONS IN ENGINEERING AND TECHNOLOGY
t
t
[t t (t ) 4 t ( )d 2 t ( )dd
0
0 0
t t
t t
2
( )d d 2 t ( )dd
(37)
The time realization of (37) can be written via
time-variant linear (unstable) filters
d e (t ) z 3
ne (t ) t 2 t (t ) z1
0 0
0 0
z1 z 2 4t t (t )
z2 2t (t )
d f (t ) F ( s)d e (t )
(40)
Where n f (t ) and d f (t ) are the filtered
z3 z 4
z 4 t 2 ( m (t ) t (t ))
2 oe ne (t )
t [,)
d e (t ) for
(38)
2
oe ne (t )
t [,)
d e (t ) for
(41)
213
www.iaetsd.in
(43)
x oe , t t1
(44, 45)
VI. SIMULATIONS
The major problems associated with the control
of flexible structures arise from the structure is
a distributed parameter system with many
modes, and there are likely to be many
actuators [40][44]. We propose to control a
flexible beam whose second mode is far away
from the first one, with the only actuator being
the motor and the only sensors as follows: an
encoder to measure the motor position and a
pair of strain gauges to estimate the tip
position. The problem is that the high modal
densities give rise to the well-known
phenomenon of spillover [45], where
contributions from the unmodeled modes affect
the control of the modes of interest.
Nevertheless, with the simulations as follows,
we demonstrate that the hypothesis proposed
before is valid, and the spillover effect is
negligible. In the simulations, we consider a
saturation in the motor input voltage in a range
of [10, 10] [in volts]. The parameters used in
the simulations are as follows: inertia J = 6.87
105 [kg m2], viscous friction = 1.041
(46) The
*m m
s( s 365)
feedforward term in (27), which depends on the
214
www.iaetsd.in
given by
m * (t )
RESULTS
(48)
1.2
0.8
(49)
0.6
a n g le in ra d
m (t )
0.4
0.2
-0.2
0
0.5
1.5
2.5
time in sec
3.5
4.5
0.9
0.8
0.7
a n g le in r a d
0.6
0.5
0.4
0.3
0.2
0.1
m * m 0.3s 25.7
*
s 30
t t
1 *
t (t ) t * (t ) 4.7.103*t (t ) *t (t ) (51)
2
oi
m * m 2.7 s 17.7
*
s 30
t t
For
0.5
1.5
2.5
time in sec
3.5
4.5
(50)
215
www.iaetsd.in
REFERENCES
-3
x 10
a n g le in ra d
-1
-2
-3
0
0.5
1.5
2.5
time in sec
3.5
4.5
Error
CONCLUSION
A two-stage GPI-controller design scheme
is proposed in connection with a fast online
closed-loop continuous-time estimator of the
natural frequency of a flexible robot. This
methodology only requires the measurement of
the angular positionof the motor and the
coupling torque. Thus, the computation of
angular velocities and bounded derivatives,
which always introduces noise in the system
and makes necessary the use of suitable lowpass filters, is not required. Among the
advantages of this technique, we find the
following advantages: 1) a control robust with
respect to the Coulomb friction; 2) a direct
estimation of the parameters without an
undesired translation between discrete- and
continuous-time domains; and 3) independent
statistical hypothesis of the signal is not
required, so closedloop operation is easier to
implement. This methodology is well suited to
face the important problem of control
degradation in flexible arms as a consequence
of payload changes. Its versatility and easy
implementation make the controller suitable to
be applied in more than 1-DOF flexible beams
by applying the control law to each separated
dynamics which constitute the complete
system. The method proposed establishes the
basis of this original adaptive control to be
applied in more complex problems of flexible
robotics.
216
www.iaetsd.in
217
www.iaetsd.in
218
www.iaetsd.in
Dr.K.Rama Sudha
ME Control systems
Professor
control.
I. INTRODUCTION
the
generalized
219
proportional
integrator
controller
www.iaetsd.in
INTEGRATOR CONTROLLER
mL2t c m t
(1)
ku J m V m T c T coup
T coup
Gb s t
2 0 2
m s s 0
2
(2)
c
m t
n
(4)
(3)
Where
c
mL
is
the
unknown
natural
where m and L are the mass in the tip position and the
motor,
coup
is the
T coup
u uc
K
(5)
/n
ku c J m V m T c
(6)
ku c Jm Vm
(7)
220
www.iaetsd.in
A K / J,B v/ J
m s
A
u c s s s B
proposed
* t t with m
(8)
The
feed-forward
technique
has
t , towards
* m t , that
been
* m t
mL2 *
t t * t t
c
(10)
m and
e t
torque
disturbances
affecting
the
motor
c
e m e t
mL2
(11)
t , e t
t * t t . For this
Where e m m
controller,
t t . This
em et
m t
mL2
t t
c
mL2
K2et K1et K0 et d
c
0
(12)
e t t e t 0
(9)
221
c
mL2
e e d
m
(13)
www.iaetsd.in
1
t m
c
(17)
c
mL2
t
m
(14)
e e d
t
poles in the left half of the complex plane. All three poles
estimation error. When the reconstructor is used in the
s 3 3as 2 3a 2 s a 3 0
(18)
need to be changed
system is,
s 3 k 2 s 2 0 1 k1 s 0 k 2 k 0 0
2
s 0 *
*m 1
t t
s2
(15)
2 , 1 , 0 can be uniquely
specified.
(15)
* mr .
c m t mL2 n coup
(16)
222
www.iaetsd.in
v
J
ev em k3em k2em k1 em ( )d( )
K
K
0
(20)
t t
stable.
To
design
the
parameters
( s p ) 4 s 4 4 ps 3 6 p 2 s 2 4 p 3 s p 4 0 (24)
t
K
v
e m ev ( )d ( ) e m
J 0
J
(21)
Where the parameter p represents the common location of
all the closed loop poles. The characteristic equation of the
Replacing
e m (21)
into
(17)
and
after
some
2 s 2 1 s 0
*
(uc u c )
( mr m )
s( s 3 )
*
(22)
3 , 2 , 1 , 0
may be
uniquely obtained.
u *c (t )
1 *
B
m (t ) m (t )
A
A
(23)
223
www.iaetsd.in
B. Outer loop
m * m 2.7 s 17.7
s 30
*t t
IV. SIMULATIONS
(28)
* m t in (10) is
given by:
A. Inner loop
* m t 0.123* t t * t t
(29)
C. Results
A = 61.14(N/(Vkgs)), B = 15.15((Ns)/(kgm))
The system should be as fast as possible, but taking care of
negative real axis. If closed loop poles are located in, say,
following expression:
ss 365
*m m
The feed-forward term in (23) is computed in accordance
with,
u * c 0.02* m 0.25 * m
(27)
224
www.iaetsd.in
trajectory is achieved.
D. Some remarks
and
225
www.iaetsd.in
REFERENCES
compensation
term
since
the
controller
2004.
V. CONCLUSIONS
[3]
[4]
Ramrez,
Questioning
some
paradigms
of
signal
69, 1992.
payload changes, J.
226
www.iaetsd.in
Dr.R.VIJAYA SANTHI
PG Scholar
Asst.Professor
Department Electrical Engineering,
Andhra University,
Visakhapatnam,
Andhra Pradesh.
beam
which
gathers
an
online
identification
I.
INTRODUCTION
distributed-parameter
system
of
infinite
control,
sliding-mode
control,
neural
true
and
completely
false. Furthermore,
when
227
www.iaetsd.in
control
in
good
the
replacement
face
of
for
system
conventional
parameter
and
load
a lumped-mass model.
II.
MODEL DESCRIPTION
A. Flexible-Beam Dynamics
the load is bigger than that of the bar, then the mass
228
www.iaetsd.in
therefore, the rest of the modes are very far from the
consider
simplified model:
one
mode
of
vibration.
The
main
= (
= (
where
(3)
+
(4)
(5)
(1)
and = (3
= (
flexural rigidity
respectively.
and
( )
( )=
( )
=(
(6)
(7)
compensation term.
The system in (4) is then given by
(8)
B. DC-Motor Dynamics
The controller to be designed will be robust with
respect to the unknown piecewise constant torque
following:
=
. Then,
(9)
law.
(2)
229
www.iaetsd.in
( )=
( )
(10)
controller:
( ) to
( ) is
( )
(13)
evolves, governed by
( )
=0
(14)
The parameterization of
is
(11)
III.
INNER LOOP
CONTROLLER
( ) is desired, with
acting as an auxiliary
trajectory by
( ) +
The
()
desired.
reduction-gear terms.
( )=
, generated as an
(12)
following
feedback
controller
is
proposed:
Where
(13)
( ) ( )
( ) ( ) ( )
(15)
( ),
230
www.iaetsd.in
The following integral reconstructor for the angularvelocity error signal is obtained:
( ) ( )
Replacing
IV.
(16)
FUZZY-PID CONTROLLER
Here, A classical FLS is represented as in
obtained
(
)=
) (17)
)=
( )+
( )
(18)
the
complex
,
parameters {
plane
,
to
design
the
and
equalizing
the
terms
of
the
two
following
Table:1
polynomials:
+4
+6
+4
=0
(19)
Input2
+(
=0
+ )
+(
Input1
N
Z
P
N
P
N
N
Z
N
P
N
P
N
P
N
(20)
strictly positive.
Defuzzificator/Reductor:
The
defuzzificator
231
www.iaetsd.in
1) and
2) respectively.
BLOCK DIAGRAM OF THE SINGLE LINK FLEXIBLE MANIPULATOR USING FUZZY PID
CONTROL
Fig.5., Block Diagram Of The Single Link Flexible Manipulator Using Fuzzy PID Control
232
www.iaetsd.in
V.
They are;
1.
Integral controller
2.
3.
given bellow
I)
233
www.iaetsd.in
II)
III)
234
www.iaetsd.in
IV)
VI.
VII.
CONCLUSION:
REFERENCES:
2006.
controller
the
is
being
designed
based
on
235
www.iaetsd.in
Dec.2001.
Wiley, 1998.
Continuous-Time
North-Holland, 1987.
Systems.
Dordrecht,
The
236
www.iaetsd.in
Author-1: K.MOHAN
Email.id: [email protected]
puttur.
Puttur.
ABSTRACT
Three-factor authentication method was introduced as
advancement to two-factor authentication schemes in
remote authentication. The three factors used in
authentication are a smart card, password and a
biometric. The authentication is based on the
characteristics of these three factors. To improve the
security in the remote authentication, biometric was
introduced. Due to the uniqueness and the
characteristics of biometrics, they are quite suitable for
user authentication and also reduce the drawbacks
inherited from passwords and smart cards.
INTRODUCTION
An authentication issue can be a bit of data and
technique accustomed certify or verify the identity
of a personal or completely different entity
requesting access below security constraints. 3
authentication could be a system wherever in 2 or a
lot of various factors area unit wont to demonstrate
the persons. victimization higher than one issue is
typically referred to as strong authentication. the
method of multiple answers to challenge queries
equally as retrieves something you have or
237
www.iaetsd.in
AUTHENTICATION METHODS:
Token Based Authentication:
The Token primarily based technique class is once
more because the name suggests authentication
supported a TOKEN such as: a key, a magnetic
card, a wise card, a badge and a passport. even as
once someone loses a key, he wouldn't be ready to
open the lock, a user agency loses his token
wouldn't be ready to login, per se the token
primarily based authentication class is kind of
liable to fraud, thieving or loss of the token itself.
238
www.iaetsd.in
RFID
Recieve
Door
Lock
Webcam
FPGA
PC
ALARM
MMS
Modem
FPGA
An FPGA could be a device that contains a matrix
of reconfigurable gate array logic electronic
equipment. once a FPGA is organized, the inner
electronic equipment is connected in a very means
that makes a hardware implementation of the
software package application. in contrast to
processors, FPGAs use dedicated hardware for
process logic associate degree don't have an
software. FPGAs are actually parallel in nature
therefore totally different process operations don't
need to contend for identical resources. As a result,
the performance of 1 a part of the appliance isn't
affected once further process is additional. Also,
multiple management loops will run on one FPGA
device at totally different rates. FPGA-based
management systems will enforce essential
interlock logic and may be designed to forestall I/O
forcing by associate degree operator. However, in
contrast to hard-wired computer circuit board
(PCB) styles that have fastened hardware
239
www.iaetsd.in
240
www.iaetsd.in
MMS Modems
A GSM electronic equipment is AN external
electronic equipment device, like the Wavecom
FASTRACK electronic equipment. Insert a GSM
SIM card into this electronic equipment, And
connect the electronic equipment to an offered port
on your laptop. A GSM electronic equipment is a
laptop Card put in an exceedingly pc, like the
Nokia Card Phone.
A GSM electronic equipment may even be a
typical GSM mobile with the suitable cable and
code driver to attach to a port on your laptop.
Phones like the Nokia 7110 with a DLR-3 cable, or
varied Ericsson phones, square measure typically
used for this purpose.
RF DETAILS
The TWS-434 and RWS-434 are
extremely small, and are excellent for applications
requiring short-range RF remote controls. The
transmitter module is only 1/3 the size of a
standard postage stamp, and can easily be placed
inside a small plastic enclosure. TWS-434: The
transmitter output is up to 8mW at 433.92MHz
with a range of approximately 400 foot (open area)
outdoors. Indoors, the range is approximately 200
foot, and will go through most walls.....
241
www.iaetsd.in
Previous Analysis:
Results:
242
www.iaetsd.in
After Recognition
Unauthorized Person
Whether person is checking as authorized or
unauthorized
8. CONCLUSION:
There are several schemes that manage three-factor
authentication method. however it's a really
troublesome task to get both client aspect and
server aspect security. They additionally tried to
produce privacy of the user biometric. Even though
the theme achieved privacy protection, it couldnt
face up to positive identification attack.
additionally server aspect attack is another crucial
issue in such remote authentication schemes. Face
recognition technologies have been associated
generally with very costly top secure applications.
Hence, our projected theme in all probability
addresses the concerns of user privacy, example
protection and trust problems and gives advantage
of protective data from the user except the
specified identity.
Authorized Person
REFERENCES
[1] D.V. Klein, Foiling the Cracker: A Survey of,
and Improvements to, Password Security, Proc.
Second USENIX Workshop Security, 1990.
[2] A.K. Jain, R. Bole, and S. Pankanti, Eds.,
Biometrics: Personal Identification in Networked
Society, Norwell, MA: Kluwer, 1999.
[3] D. Malone, D. Maio, A. K. Jain, and S.
Prabhakar, Handbook of Fingerprint Recognition
ACM SIGOPS Operating Syst. Rev., vol. 38, no. 4,
pp. 91-96, Oct. 2004
[4] Ed. Dawson, J. Lopez, J. A. Montenegro, and
E. Okamoto, BAAI: Biometric Authentication and
Authorization Infrastructure, Proc. IEEE Intern.
Conference on Information Technology: Research
and Education (ITRE03), pp. 274-278, 2004.
[5] J.K. Lee, S.R. Ryu, and K.Y. Yoo, Fingerprint
Based Remote User Authentication Scheme Using
Smart Cards, Electron. Lett., vol. 38, no. 12, pp.
554-555, Jun. 2002.
Remaining Balance
243
www.iaetsd.in
in a
244
www.iaetsd.in
Author2: V.VISWANATH
Email id: [email protected]
Email.id: [email protected]
M.TECH in VLSI System Design,
Puttur, Chittor(Dist).
Puttur, Chittor(Dist).
1. Introduction:
Due to rapid advances in electronic technology,
electronics market is becoming
More competitive, which results in consumer
electronic products requiring even more stringently
high quality. The design of consumer electronic
products requires not only light weight and slim size,
but also low power and fast time-to-market.
Therefore, the integrated circuit (IC) designers have
to consider more important issues such as chip area,
power consumption, operation speed, circuit
regularity, and so on. Due to these design issues
relevant to the key competitive factors of electronic
systems, IC designers and electronic design
automation (EDA) vendor are very concerned about
the development of effective methodologies to fetch
smaller chip area design, lower power consumption,
245
www.iaetsd.in
2. Design Considerations
A. Impact of Logic Style
The logic style used in logic gates basically
influences the speed, size, power dissipation, and the
wiring complexity of a circuit. The circuit delay is
determined by the number of inversion levels, the
number of transistors in series, transistor sizes [3]
(i.e., channel widths), and intra- and inter-cell wiring
246
www.iaetsd.in
247
www.iaetsd.in
3. Design Technologies:
There are many sorts of techniques that intend to
solve the problems mentioned above
Full Adder Design:
So = HCi + HCo (1)
Co = HCi + HA (2)
Where H = A Xor B and H = A Xnor B. A Full
Adder is made up of an XORXNOR module, a sum
module and a carry module.
248
www.iaetsd.in
4. Simulation Analysis:
Full Adder was designed with different logic using
Tanner Tools and simulated
Tabulation:
Circuit
SR-CPL
Power Dissipation
2.309128e-005 watts
Transmission Gate
4.876595e-008 watts
References:
[1] Neil H. E. Weste & David Harris, CMOS VLSI
Design- A circuit and Systems Perspective, 4th
edition, Addison Wesley, 2010
[2] C. N.Marimuthu, Dr. P. Thangaraj, Aswathy
Ramesan, Low power shift and add multiplier
design", International Journal of Computer
Science and Information Technology, June 2010,
Vol. 2, Number 3.
[3] Marc Hunger, Daniel Marienfeld, New SelfChecking Booth Multipliers, International Journal of
Applied Mathematics Computer Sci.,
249
www.iaetsd.in
250
www.iaetsd.in
Email.id: [email protected]
M.TECH in Vlsi System Design,
Puttur, Chittor(Dist).
Puttur, Chittor(Dist).
ABSTRACT:
This paper presents the look and development of
vehicle plate recognition for automated toll
collection. Vehicle plate recognition (LPR) is that
the extraction of car plate information from a
picture since it's simpler and faster than the
normal token based ticket system, it's all the
potential to interchange the prevailing system.
Moreover, it saves users valuable time by
reducing the queue length before of the toll
counter. Its accustomed pay the quantity
automatically and open & close the toll gate
automatically. A vehicle plate is installed on each
vehicle. A recognition device at the gate reads
this knowledge from the vehicle and compares it
with the info within the on-line database and
permits the access consequently by gap the gate.
This data is employed to print a daily or monthly
bill for toll collection from the vehicles. This
model has low complexity and takes fewer times
in terms of car plate segmentation and character
recognition. We aim to scale back the time
consumed to pay the toll gate amount and also to
assist the RTO, local department to trace the
vehicle, just in case} if it absolutely was stolen or
used for any illegal activities. Yet as we are
reaching to increase the protection features
within the toll gate because now a days toll gate
are the doorway to the most cities. If we increase
the protection within the toll gate section
automatically the protection within the city are
also increased. The proposed open-end credit
has been designed using very (high-speed
integrated
circuit)
hardware
description
language (VHDL) and simulated. Finally, it's
downloaded in a very field programmable gate
array (FPGA) chip and tested on some given
scenarios. The FPGA implementation is
administrated in one among the applying area
automatic toll assortment.
251
www.iaetsd.in
Database Image
252
www.iaetsd.in
253
www.iaetsd.in
OPERATION:
254
www.iaetsd.in
REFERENCES
[1]
Kin Seong Leong, Mun Leng Ng, Member,
IEEE, Alfio R. Grasso, Peter H. Cole,
"Synchronization of RFID Readers for Dense RFID
Reader Environments", International Symposium
on Applications and the Internet Workshops
(SAINTW06), 2005
[2]
Manish Buhptani, Shahram Moradpour,
"RFID Field Guide - Developing Radio Frequency
Identification Systems", Prentice Hall, 2005, pp 79, 16-225, 160, 231
[3]
Raj Bridgelall, Senior Member, IEEE, "
Introducing a Micro-wireless Architecture for
Business Activity Sensing ", IEEE International
Conference RFID, April 16-17,2008
[4]
Sewon Oh, Joosang Park, Yongioon Lee,
"RFID-based Middleware System for Automatic
Identification", IEEE International Conference on
Service Operations and Logistics, and Information,
2005
[5]
Shi-Cho Cha Kuan-Ju Huang Hsiang-Meng
Chang, " An Efficient and Flexible Way to Protect
Privacy in RFID Environment with Licenses ", IEEE
International Conference RFID, April 16-17,2008
[6]
Urachada Ketprom, Chaichana Mitrpant,
Putchapan Lowjun, Closing Digital Gap on RFID
Usage for Better Farm Management, PICMET
2007, 5-9 August 07
255
www.iaetsd.in
PG Scholar
Professor
types
interruptions
of
which
outages
can
and
cost
service
significant
affecting power
with large
magnitude,
which is completely
I INTRODUCTION
256
www.iaetsd.in
quality problems.
Injection
ensuring
transformers: Injection
the
maximum
transformers
reliability
and
gains.
capacitors,
superconducting
magnetic
energy
storage
device
compensation
has
capability
big
of
impact
the
on
the
system.
257
www.iaetsd.in
and
reactive
power
compensation
are
USING DVR
Rs + jXS
(1)
RL + jXL
(2)
voltage drops
or
Vk = Vt + Vl
(3)
(4)
258
www.iaetsd.in
of
sensitive
loads
from
voltage
inserts
series
voltage [6]
VDVR
and
to the supply grid, i.e. the line breaker does not trip.
maintained.
can be written as
Vinj = VL + VS
(5)
Where;
this component.
condition.
(6)
259
www.iaetsd.in
term duty
cycle describes
the
260
www.iaetsd.in
IV SIMULATION FIGURES
261
www.iaetsd.in
V SIMULATION RESULTS
The faults in the three phase source can be eliminated by calculating phase angle . But the calculation of
becomes complex some times. So by using PWM generator the calculation of the phase angle can be found
easily from the magnitude part only.
The figure8 shows the three phase waveform where fault occur at phase A. By using DVR with PWM
generator the fault is eliminated and the output waveform is shown in figure9.
262
www.iaetsd.in
VI CONCLUSION
fault cur- rents, IEEE Trans. Power. Electron., vol. 22, no. 4, pp.
mitigation.
implementation, IEEE Trans. Ind. Electron., vol. 54, no. 4, pp. 2249
nominal value.
VII REFERENCES
[1]
[2]
Voltage
Sags
and
interruptions,
ser.
IEEE
Press
Series
on
[3]
2967-2972.
[4] N. G. Hingorani, Introducing custom power, IEEE Spectr., vol. 32, no.
voltage restorer, IEEE Trans. Power Del., vol. 26, no. 4, pp. 2398
[6]
voltage regulator (DVR), in Proc. IEEE Power Eng. Soc. Winter Meeting,
Columbus, OH.
[7]
263
www.iaetsd.in
I INTRODUCTION
Electric utilities and end users of
electric power are becoming increasingly
concerned about meeting the growing
energy demand. Seventy five percent of
total global energy demand is supplied by
the burning of fossil fuels. But increasing
air pollution, global warming concerns,
diminishing fossil fuels and their
increasing cost have made it necessary to
look towards renewable sources as a future
264
www.iaetsd.in
Renewable
energy
resources
mainly can be used for power generation,
heating and transportation purposes. In
case of power generation, the generation
can take place either as a separate unit to
feed a particular area or the renewable
energy resources can be interconnected to
the grid at the transmission level, subtransmission level and distribution level to
enhance load supplying capability of the
grid. Large wind farms, concentrated solar
power photovoltaic system, bio-power,
hydro power, geothermal power are
interconnected at the transmission and subtransmission levels. Photovoltaic system,
small wind farm, hydro power and fuel
cells are interconnected at the distribution
level. The resources are connected to grid
using grid interfacing inverter by suitable
controlling of the inverter switches. But
their highly intermittent nature may result
in instability and power quality problems;
hence an appropriate control circuitry is
required.
II SYSTEM DESCRIPTION:
The proposed system consists of RES
connected to the dc-link of a gridinterfacing inverter as shown in Fig. 1. The
voltage source inverter is a key element of
a DG system as it interfaces the renewable
energy source to the grid and delivers the
265
www.iaetsd.in
1=
Where
RES.
. (1)
is the power generated from
The current flow on the other side of dclink can be represented as,
. (2)
Where
,
and
are total power
available at grid-interfacing inverter side,
active power supplied to the grid and
inverter losses, respectively. If inverter
losses are negligible then
=
B. Control of Grid Interfacing Inverter:
Fig.1. Schematic of proposed renewable
based distributed generation system
A. DC-Link Voltage and Power Control
Operation:
Due to the intermittent nature of RES,
the generated power is of variable nature.
The dc-link plays an important role in
transferring this variable power from
renewable energy source to the grid. RES
are represented as current sources
connected to the dc-link of a gridinterfacing inverter. Fig. 2 shows the
systematic representation of power transfer
from the renewable energy resources to the
266
www.iaetsd.in
( )
. (4)
= sin +
. (5)
( )
( ) ..
(6)
. (7)
Where
and
are proportional and integral gains of dcvoltage regulator. The instantaneous
values of reference three phase grid
currents are computed as
. (8)
.. (9)
. (10)
The neutral current, present if any, due to
the loads connected to the neutral
conductor should be compensated by forth
leg of grid-interfacing inverter and thus
should not be drawn from the grid. In other
words, the reference current for the grid
neutral current is considered as zero and
can be expressed as
= sin(). (3)
= sin
.. (11)
The reference grid currents (Ia* , Ib* ,Ic*
and In*)are compared with actual grid
currents
(Ia* , Ib* ,Ic* and In*) to compute the
current errors as
267
www.iaetsd.in
.... (12)
(23)
. (13)
.. (24)
.. (14)
Similarly
. (15)
the
charging
currents
, and
on dc
bus due to the each leg of inverter can be
expressed as
.. (25)
.. (26)
(27)
... (16)
... (28)
... (17)
.. (18)
If
switch
, then upper
will be OFF
. (19)
and
in the
inverter.
If
(20)
will be OFF
a leg of inverter.
Where
, and
are
the three-phase ac switching voltages
generated on the output terminal of
inverter. These inverter output voltages
can be modeled in terms of instantaneous
dc bus voltage and switching pulses of the
inverter as
.. (21)
(22)
268
www.iaetsd.in
269
www.iaetsd.in
IV CONCLUSION
V REFERENCES
[1] M. Singh , K. vinod , A. Chandra, and
Rajiv K.varma. Grid interconnection of
renewable
energy sources at the distribution level
with
power-quality
improvement
features, IEEE Transactions on power
delivery, vol. 26, no. 1, pp. 307-315,
January 2011
Aug. 2006.
[9] B. Renders, K. De Gusseme, W. R.
Ryckaert, K. Stockman, L. Vandevelde,
and M. H. J. Bollen, Distributed
generation for mitigating voltage dips in
low-voltage distribution grids, IEEE
Trans. Power. Del., vol. 23, no. 3, pp.
15811588, Jul. 2008.
270
www.iaetsd.in
Abstract: From the last few years, the Smartphone users has swiftly increased so peer-to-peer ad hoc content sharing is liable to crop up frequently.
As the usual data delivery schemes are not proficient for content sharing because of random connectivity amid Smartphones latest content sharing
mechanisms should be developed. To achieve data delivery in such exigent environments, researchers have anticipated the use of encounter-based
routing or store-carry-forward protocols, in this a node stores a message may be a note and carries it until a forwarding chance arises through an
encounter with other node. Earlier studies in this field focused on whether two nodes would come across each other and the place and time of
encounter. This paper proposes discover-predict-deliver as proficient content sharing scheme.Here we make use of a hidden markov model in order to
predict the future mobility information of individual's .The existing system approximately consequences in a 2 percent CPU overhead , diminish the
Smartphone battery lifetime by 15 percent .So to minimize energy consumption we propose the use of sensor scheduling schemes in an opportunistic
context.
Key words: Encounter Based Routing, Content Sharing, sensor scheduling Schemes, hidden markov model
1.Introduction
The Smartphone users have been rapidly increasing
day-by day[1]. A Smartphone consists of more advanced computing
capability and connectivity than basic phones. As interfaces of
Smartphone are more handy and accessible users can share any type
of contents like images, videos such multimedia content. But content
sharing is bothersome. It involves numerous user activities. To
minimize users burden we can depend upon an ad hoc technique of
peer-to-peer content sharing. Mobile ad hoc network is characterized
as multi-hop wireless communications between mobile device.
Smartphone's consists of many network interfaces like Bluetooth and
Wi-Fi so ad hoc networks can be easily constructed with them. The
Connectivity among Smartphone's is likely to be alternating because
of movement patterns of carriers and the signal transmission
phenomena. A wide variety of Store-carry-forward protocols have
been anticipated by researchers.
271
www.iaetsd.in
limit and
query lifetime limit. We employ
the- 26controlled
INTERNATIONAL CONFERENCE ON CURRENT INNOVATIONS IN ENGINEERING
AND split
TECHNOLOGY
ISBN: 378
- 138420 - 5
replication-based [9] routing scheme that performs a single-copy
scheme. This single-copy scheme turn both query lifetime and
distance limits into random walk, and the scheme is not powerful as
In this segment we examine the problem of soon as content-carrier nodes (i.e., destinations) are not eminent. By
content sharing in delay tolerant networks and depict substitute distinguishing, the controlled replication-based scheme dispenses a
solutions. As specified in the introduction, we spotlight on mobile set of message replicas and evade the excessive spread of messages.
opportunistic networking scenarios where the nodes will be
communicating using the DTN bundle protocol. A few devices in the 2.1.2. Content delivery
network store content which they are ready to share with others. All
When the
query matching content is discovered, the
nodes are willing to assist and provide a restricted amount of their
local system resources (bandwidth, storage, and dispensation power) content carrying node should transmit only a subset of results. This
to aid other nodes. Our objective is to permit users to issue queries constraint is needed to limit the amount of resources utilized both
for content that is stored on the other nodes everywhere in the locally and globally for sending and storing the responses, and to
network and consider the possibility of such a node to acquire the eliminate potential copies . The query originator sets a limit for both
required information. To ease searching, we suppose that nodes are the number of replications or duplicates and the amount of content
capable to carry out searches on their local storage and uncover the that should be produced. When nodes require to forward a query
appropriate results for a given query. The content sharing process is message,
characterized into two stages: the content discovery phase and the the limits incorporated in the query message are used to make the
content delivery phase. In content discovery phase, the user inputs forwarding decision. If the amount of the content go beyond the
or enters in a content sharing application requests for the content. response limit, the node wants to select which ones to forward.
The application initially searches the content it its own or individual
database and if not found, the application then creates a query that is
forwarded based on the users request. The content delivery phase is 2.2. Mobility Prediction
commenced, only when the content is found and the content is then
Numerous studies have largely specified
another
forwarded to the query originator.
problem of content sharing: mobility learning and prediction.
Beacon Print discover meaningful places by constantly determining
constant scans for a time period. Place Sense senses the arrival and
exit from a place by utilizing invasive RF-beacons. The system uses
a radio beacons retort rates to attain vigorous beacon conclusion.
EnTracked is a position tracking system for GPS-enabled devices.
The system is configurable to recognize different tradeoffs amid
energy consumption and heftiness.
Mobility prediction has been extensively
studied in and out of the delay-tolerant networking area. Markovbased schemes, make the problem as a Hidden Markov or semiMarkov model and probabilistic prediction of human mobility. In
contrast, neural network based schemes try to match the observed
user behaviour with earlier observed behaviour and estimate the
prospect based on the experimental patterns.
2.1. Content sharing
272
www.iaetsd.in
influence
evaluation of encounter opportunity
two
nodes.- 5
INTERNATIONAL
CONFERENCE ON CURRENT INNOVATIONS IN ENGINEERING
ANDthe
TECHNOLOGY
ISBN: amid
378 - 26
- 138420
3.Problem Definition
In the existing system, the energy consumption is more so
the battery lifetime will be reduced. By using sensor scheduling
mechanisms energy consumption can be reduced and can increase
the lifespan of the batteries.
4. Proposed System
5.Results
5.2.Discovery Efficiency
The ratio of discovered contents to the generated queries within a
specified period or time is discovery ratio or efficiency. DPDs
discovery performance is skewed to the two forwarding. In Epidemic
routing , queries are forwarded to each and every node. In hops-10
and hops-5, a query message is then forwarded till its hop count
achieve 10 and 5, correspondingly. When a query matching content
is accessible only on a small number of nodes, the discovery
methods illustrates a low discovery speed. With an rising query
lifespan, both DPD and Epidemic demonstrate a high discovery ratio
since with a longer time, each query is forwarded to more number of
nodes.
5.3.Prediction accuracy
273
www.iaetsd.in
meaningful places
are chosen
random INNOVATIONS
locations for IN
trajectory
[7] J. Wu,
Lu, and F. Li, Utility-Based Opportunistic
Routing
INTERNATIONAL
CONFERENCE
ONatCURRENT
ENGINEERING
ANDM.
TECHNOLOGY
ISBN: 378 - 26
- 138420in- 5
deviations of 0.1, 0.2, and 0.3, correspondingly. So as the trajectory
deviation raise, the prediction accuracy drop off. Prediction accuracy
is calculated as the ratio of accurately predicted locations to the
overall predicted locations.
6.Conclusion
In this paper we have proposed a proficient content
sharing scheme for Smartphone based DTNs. In this we have
anticipated discover-predict-deliver as a effectual content sharing
method which is capable of discovering the content and delivers it
to the appropriate destination. The scheme also present the mobility
information of individuals. We made an try to make use of the
availability and communication technology of current Smartphone.
We have also compared our proposed scheme with traditional
schemes.
In this paper we have also proposed sensor scheduling
schemes to enhance the lifespan of a battery. By the effectiveness of
the sensing in sensor scheduling we can reduce energy consumption
of the smartphones.
Finally, our system has still has room for improvement
by considering the privacy issues.
6. References
[1] T3IGroupLLc , Http:://www.telecomweb.com, 2010.
[2] A. Vahdat and D. Becker, Epidemic Routing for Partially
Connected Ad-Hoc Networks, technical reports, Dept. of Computer
Science and engineering, Duke Univ.., Sept. 2000.
[3] A. Balasubramanian, B.N. Levine, and A. Venkataramani.,
DTN Routing as a .Resource Allocation Problem, Proc. ACM
SIGCOMM.., pp. 373-384, 2007.
[4] R.C. Shah, S. Roy, S. Jain, and W. Brunette, Data MulesModeling a Three-Tier Architecture for Sparse Sensor Networks,
Elsevier Ad Hoc Networks J...., vol. 1, pp. 215-233, Sept. 2003.
[5] A. Lindgren, A. Doria, and O. Schelen, Probabilistic -Routing in
Intermittently Connected Networks, SIGMOBILE Mobile
Computer Comm....Rev., vol. 7, no. 3, pp. 19-20, 2003.
[6] C. Liu and J. Wu, An Optimal Probabilistic Forwarding
Protocol in Delay Tolerant Networks, Proc. ACM MobiHoc, pp. 14,
2009.
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT
274
www.iaetsd.in
Abstract: Due to largely mounting of photo sharing in social network services, there is a strong need for large scale content-based face image
retrieval which is enabling device for many emerging applications. It is very exigent to find a human face image from large scale database which might
hold huge amount of face images of people. Existing methods regulate the location and illumination differences between the faces and abolish
background contents while retrieving face images, which leads to decline the important context information. This paper intends to utilize automatically
discovered human attributes that contain semantic signs of the face photos to recover large scale content-based face image retrieval. In this paper two
methods are used to develop image retrieval in both offline and online stages, they are attribute-enhanced sparse coding (ASC) and attribute-embedded
inverted indexing (AEI). Reranking is further used with these two methods to attain significant retrieval outcome. Proposed system exploits
automatically discovered human attributes which balance the information loss and attain good retrieval performance compared to existing system.
Keywords: Content-based image retrieval, face image, human attributes, sparse coding, reranking.
.
1. Introduction
The unpredictable expansion of image data escorts to the need of
explore and enlargement of Image Retrieval. Image retrieval is the
field of study concerned with searching and retrieving digital images
from a collection of database. However, Image retrieval survey
moves from keyword, to low level features and then to semantic
features. Compel towards semantic features is due to the problem of
the keywords/text which can be much distorted and time consuming
while low level features cannot always describe high level notions in
the users mind.
275
www.iaetsd.in
In order
to conquerONthese
restrictions,
CBIR IN
was
first
INTERNATIONAL
CONFERENCE
CURRENT
INNOVATIONS
ENGINEERING
AND TECHNOLOGY
introduced by Kato [1]. The term, CBIR, is widely used for
retrieving desired images from a large collection, which is based on
extracting the features from images themselves. In general, the
purpose of CBIR is to present an image conceptually, with a set of
low-level optical features such as color, texture, and shape [2].
Large scale
database
Query image
Preprocessing
Face
detection
Aligned face
Facial landmark
detection
Face alignment
Attribute detection
Local patches
Patch-level
LBP features
3. Problem Definition
Several schemes were introduced for face image retrieval, but all
these techniques endure with some limitations. Previous mechanisms
for face image retrieval stabilize the location and lighting differences
between the faces and prohibit background contents. Such common
approaches give up the important context information. Using
automatic discovery of human attributes it is possible to balance
such information loss. Existing methods uses low level features for
face retrieval that have lack of semantic descriptions about face
which escorts to poor results. Also all current retrieval systems
struggle with low recall problems which diminishes the performance
of the system. By concerning all these factors, this paper proposes
two methods (ASC, AEI) which detect the human attributes
automatically to resolve recall problems. Reranking method is united
with these two methods to boost up system performance.
Attribute enhanced
sparse coding
Patch-level
sparse codewords
Reranking image
results (no forged
images)
Attribute embedded
inverted indexing
Reranking
Image results
(with forged
face images)
4. Proposed System
This paper intends to employ automatic discovery of human
attributes which contains semantic signs of face image for efficient
large scale face image retrieval. To improve CBIR two methods are
used named ASC and AEI that combines low level features with
high level concepts to afford semantic descriptions of face. Another
technique named reranking is used with these two methods to
improve the performance of retrieval system.
276
www.iaetsd.in
5. Experimental Results
we estimate and visualize results using real examples. Figure 3
illustrates the results of ranking images. Red boxes in the figure
specify forged images. After using the reranking method majority of
images are correct. In figure 4 the graph demonstrates how efficient
the image retrieval is in the proposed method. In proposed system
individual attribute detection can be done within few milliseconds,
because here we are using automatic attribute detection.
References
[1] M. Lew, N. Sebe, C. Djeraba and R. Jain, Content-based
Multimedia Information Retrieval: State of the Art and Challenges,
Transactions on Multimedia Computing, Communications, and
Applications, 2006.
[2] N. Krishnan, and C. Christiana, Content-based Image Retrieval
using Dominant Color Identification Based on Foreground Objects,
Fourth International Conference on Natural Computation, 2008.
[3] Rapid object detection using boosted cascade of simple features,
P. Viola and Jones, IEEE Conference on Computer Vision and
Pattern Recognition, 2001.
[4] Locating facial features using extensive active shape model,
European Conference on Computer Vision, S. Milborrow and F.
Nicolls, 2008.
[5] Face image retrieval and matching with biometrics, IEEE
Transactions on Information Forensics and Security, U. Park and A.
K. Jain, 2010.
[6] Scalable face image retrieval using identity based quantization
and multi reference relevance ranking, Z. Wu, Q. Ke, and H.Y.
Shum, IEEE Conference on Computer Vision and Pattern
Recognition, 2010.
6. Conclusion
All current image retrieval systems standardize the position and
illumination variations between the faces and abolish background
contents while retrieving face images, which escorts to refuse the
vital context information. In this paper, two schemes are projected
and united to extend automatically detected human attributes to
extensively develop content-based face image retrieval. This is the
primary idea ofASSOCIATION
uniting low-level
features, high&level
attributes and
INTERNATIONAL
OF ENGINEERING
TECHNOLOGY
FOR SKILL DEVELOPMENT
277
www.iaetsd.in
ABSTRACT:Data hiding and extraction schemes are growing in todays communication world suitable to rapid growth of data tracking and tampering
attacks. Data hiding, a type of steganography, embeds information into digital media for the reason of identification, annotation, and copyright. In this
narrative techniques are used for addressing the data-hiding method and estimate these techniques in glow of three applications: copyright protection,
tamper proofing, and augmentation data embedding. Thus we necessitate a proficient and vigorous data hiding schemes to defend from these attacks.
In this project the blindly extraction method is measured. Blindly extraction means the novel host and the embedding carriers are not necessitate
to be recognized. Here, the hidden data embedded to the host signal, via multicarrier SS embedding. The hidden data is extracted from the digital media
like audio, video or image. The extraction algorithm used to extract the hidden data from digital media is Multicarrier Iterative Generalized Least Squares
(M-IGLS).
KEY WORDS:Data hiding, Blind Extraction, Data tracking, Tampering attacks, Steganography.
distorted or not. Equally the data extraction schemes also offer a
good recovery of hidden data.This is the purpose of the protected
communication.
1. INTRODUCTION
Data hiding, while comparable to compression, is divergent from
encryption. Its objective is not to limit or standardize admittance to
the host signal, other than slightly to guarantee that embedded data
continue inviolate and recoverable. Two significant uses of data
hiding in digital media are to afford evidence of the copyright, and
assertion of content integrity. Data tracking and tampering are
hastily rising in all over the place like online tracking,Mobile
tracking etc. hence we require a tenable communication scheme for
transmitting the data. Forthat, we are having lots of data hiding
schemes and extraction schemes. Data hiding schemes are
primarily used in military communication systems similar to
encrypted message, for finding the sender and receiver or its
extremely subsistence. Originally the data hiding schemes are used
for the copy write purpose.[1]Breakable watermarks are used for
the certification purpose, i.e. to find whether the data has been
2. RELATED WORK
The techniques used for data hiding contrast depending on the
magnitude of data being hidden and the mandatory invariance of
those data to exploitation. Since that no one method is proficient of
achieving each and every one these goals, a group of processes is
considered necessary to extent the variety of likely applications.
The procedural challenges of data hiding are terrible. There are
numerous data hiding and data extraction schemes are comes into
existence. The key data hiding procedure is steganography. It is
fluctuate from cryptography in the means of data hiding. The target
of steganography is to conceal the data from a third party where the
purpose of cryptography is to create data incomprehensible by a
third party.
1
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT
278
www.iaetsd.in
INTERNATIONAL
ON CURRENT
INNOVATIONS
IN ENGINEERING
AND TECHNOLOGY
In this [2] CONFERENCE
steganalysis process
is used.
The ambition
of
substitute
the "intricate
ISBN:
378of
- 26
- 138420
5
areas" on the bit
planes
the
vessel- image
with the secret data. The most significant feature of Steganography
is that the embedding capability is incredibly huge. For a 'normal'
image, approximately 50% of the data might be disposable with
secret data earlier than image damage becomes perceptible.
3. PROPOSED SYSTEM
3.1 Steganography
Steganography can be used to hide a message deliberate for
afterward reclamation by a definite person or collection. In this
case the intent is to avoid the message being perceived by any
other revelry.Steganography includes the cover up of information
inside computer files..The other major area of steganography is
copyright marking, where the message to be included is used to
declare patent over a article. This can be further divided into
watermarking and fingerprinting. In digital steganography,
electronic communications may include steganographic coding
inside of a transportlayer, such as a document file, image file,
program or protocol
Digital steganography can conceal top secret data (i.e. secret
files) extremely strongly by embedding them into some media data
known as "vessel data." The vessel data is also referred to as
"carrier, cover up, or replica data". In Steganography images used
for vessel data. The embedding action put into practice is to
2
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT
279
www.iaetsd.in
Table-1
Multi-carrier iterative generalized least squares
Algorithm
3
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT
280
www.iaetsd.in
CONFERENCE
ON CURRENT
INNOVATIONS IN ENGINEERING
AND TECHNOLOGY
ISBN: 378 - 26
- 138420 - which
5
1) d INTERNATIONAL
:= 0; initialize B^(0)
2 {1}KM
arbitrarily.
system
is to afford a good quality extraction
technique
2) d := d + 1;
measured the blindly improvement of data. This technique uses the
V^(d) := Y(B^(d-1))T[B^(d-1)(B^(d-1))T]-1;
M-IGLS algorithm for the extraction. The data is entrenched via
B^(d) := sgn{(V^(d))TRy^-1 (V^(d)))-1(V^(d))T Ry^-1 Y}
DCT transform by multicarrier SS embedding. This extraction
3) Repeat Step 2 until B^(d) = B^(d1).
procedure will afford high signal to noise fraction and it will
achieve the possibility of fault improvement equals to notorious
host and embedding carriers. This method is improved by using
harmony search algorithm where it offers small time utilization and
RESULTS
high assault confrontation.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
4
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT
281
www.iaetsd.in
M.Tech , Dept. of CSE, Audisankara College of Engineering & Technology, Gudur, A.P, India.
Assoc Professor, Dept. of CSE, Audisankara College of Engineering & Technology, Gudur, A.P
unwanted messages.
messages
and
to
handle the
context
information.
The problem of implementing Context-aware
Information Filters is that the two goals to route
messages and record context updates efficiently
indexing.
INTRODUCTION
context updates.
implement
information
filters,
several
282
www.iaetsd.in
follows:
methods
i)
personalized
varying rates.
information
delivery
have
that
update
the
context
only
Context
Stock Brokering
project.
ii) Messages
iii) Profiles
varying,
bursty
update rates.
All
interests
of
subscriber.
interests.
In
contrast,
context
283
www.iaetsd.in
profiles.
v):
for
reference
Context-Aware
b) CIF Architecture
As shown also in Figure, a CIF has four main
components:
(a)
context
management,
(b)
Context management
first
component
manages
context
incoming messages.
ii) Indexes
processed.
1. Handle_message(Message m):
284
www.iaetsd.in
i)
General Idea
iii) Merge
message.
AGILE
generalizes
techniques
from
message
processing
more
efficient.
Both
match
the
the
message
by
reevaluating
with
Local
Escalations)
index
structures
devised
specifically
for
285
www.iaetsd.in
Escalation
This operation is triggered by increasing the
stock of Warehouse by one; i.e., a context update
De-escalation
handle
message
and
update
context
286
www.iaetsd.in
(4)
(5) EndFor
(6) DataStore[c].a := v;
EndIf
The
algorithm
for
update
context
is
forEach p in RES
(3)
f := test(p, m)
(4)
if (f > 0)
(5)
(6)
if (DEpolicy(p))
(7)
AGILEindex[f].deescalate(p)
(8)
(9)
(10)
endIf
endIf
EndFor
(2)
If (AGILEindex[i] indexes a ^
(c.a AGILEindex[i].probe(v))
(3)
AGILEindex[i].escalate(c, v)
287
www.iaetsd.in
A.-M.
Kermarrec.
Publish/Subscribe.
35(2):114131, 2003.
The
Many
ACM
Faces
Comput.
of
Surv.,
2004.
[9] F. Fabret, H. A. Jacobsen, F. Llirbat, J.
[5] O. Cooper, A. Edakkunni, M. J. Franklin, W.
Fast
SIGMOD, 2001.
Publish/Subscribe
Systems.
In
VLDB, 2004.
[6] A. K. Dey. Understanding and Using
Context.
Personal
and
Ubiquitous
Filtering.
TODS,
28(4):467516,
2003.
288
www.iaetsd.in
ABSTRACT:
Traditional methods of content-based image retrieval make use of image content like color,
texture as well as gradient to symbolize images. By combine low-level characteristics with
high level human features, we are capable to discover enhanced feature representations and
attain improved retrieval results. The recent effort explains automatic attribute recognition
has sufficient quality on numerous different human attributes. Content-based face image
retrieval is strongly associated to the problems of face recognition however they focus on
finding appropriate feature representations in support of scalable indexing systems. To
leverage capable human attributes automatically identified by attribute detectors in support of
getting better content-based face image retrieval, we put forward two orthogonal systems
named attribute enhanced sparse coding as well as attribute-embedded inverted indexing.
Attribute-embedded inverted indexing believes human attributes of chosen query image in a
binary signature as well as make available resourceful recovery in online stage. Attributeenhanced sparse coding make use of global structure and employ quite a lot of human
attributes to build semantic-aware code words in offline stage. The projected indexing system
can be effort less integrated into inverted index, consequently maintaining a scalable
structure.
Keywords: Content-based image retrieval, Attribute recognition, Feature representations,
Binary signature, Semantic-aware code words.
substantial computation outlay in support
of dealing with high dimensional features
as well as generate explicit models of
classification, it is non-trivial to directly
pertain it towards tasks of face retrieval.
Even though images obviously have
extremely high dimensional representation,
those within similar class generally lie on a
low dimensional subspace [1]. Sparse
coding can make use of semantics of
information and attain capable results in
numerous different applications for
instance image classification as well as
face recognition. Even though these works
accomplish significant performance on
keyword based face image recovery as
well as face recognition, we put forward to
make use of effectual ways to merge lowlevel features and automatically noticed
facial attributes in support of scalable face
image retrieval [11]. Human attributes are
high level semantic description concerning
an individual. The recent effort explains
1. INTRODUCTION:
In the recent times, human attributes of
automatically detected have been revealed
capable in various applications. To get
better the value of attributes, relative
attributes were applied. Multi-attribute
space was introduced to standardize
assurance scores from various attributes
[4]. By means of automatically detected
human attributes, excellent performance
was achieved on retrieval of keyword
based face image as well as face
verification detectors in support of search
of similar attribute. Due to increase of
photo sharing or social network services,
there increase tough needs for extensive
content-based retrieval of face image.
Content-based face image retrieval is
strongly associated to the problems of face
recognition however they focus on finding
appropriate feature representations in
support of scalable indexing systems [8].
As face recognition generally necessitate
289
www.iaetsd.in
290
www.iaetsd.in
3. RESULTS:
Attribute-enhanced sparse coding make
use of global structure and employ quite a
lot of human attributes to build semanticaware code words in offline stage.
Attribute embedded inverted indexing
additionally believe local attribute
signature concerning attribute-enhanced
sparse coding as well as attributeembedded inverted indexing as shown in
fig1.
Attribute-embedded
inverted
indexing believes human attributes of
query image and still make sure proficient
recovery in online stage. The experimental
result illustrate that by means of code
words generated by projected coding
system, we can decrease the quantization
error as well as attain salient gains in face
recovery on public datasets. The projected
291
www.iaetsd.in
292
www.iaetsd.in
requirement
for
users
to
plan
ahead
for
management
leakage issues.
fact
that
cloud
computing
offers
huge
process
that
identifies
to
an
clouds, security.
I. INTRODUCTION
highlighting
its
architectural
principles,
and
key
concepts,
state-of-the-art
have
become
demand fashion.
293
www.iaetsd.in
privacy
of
their
data.
The
multi-tenant
some level of failures while using commoditybased solutions. Also, the cloud providers cannot
the cloud.
294
www.iaetsd.in
II.
PROPOSED WORK
Receive BC training
Develop BCPs
following Figure 2.
Ensure that BCPs are available during
incident response
Ensure that incident responders receive
training appropriate to their role
Ensure that plans are tested, reviewed and
updated
Participate in the review and development
of the BCMS.
Figure 2 Business Continuity Management
Overview
295
www.iaetsd.in
Understanding the
continuity strategies
organizations
objectives
in line
and
business
is
essential
in
with the
responsibilities
BCMS.
include
(EPRR)
the
staff
skills,
competencies
and
teams;
prioritized activities
business as usual.
Assurance
priority activate.
organizations
Business
Continuity
management
has
the
dependencies,
vulnerabilities
following stages:
296
www.iaetsd.in
BCM programme.
evaluated.
Recovery
People
Premises
Exercises
response
structure,
business
continuity
plans,
and
are
various
sources
of
information
Audit
To
To
solutions
validate
review
compliance
the
with
organizations
the
BCM
297
www.iaetsd.in
CONCLUSION
Management Review
An annual review of this strategy will be
BIA
substantive
revision
changes
which
in
identifies
processes
and
priorities;
A
REFERNCES
significant
assessment
and/or
change
in
the
risk
appetite
threat
of
the
Continuity
organization
New
Management
Systems
Requirements.
regulatory
or
legislative
requirements.
Preparedness,
Resilience
and
Response
(EPRR).
J.
Internet
Services
and
of
risks,
alerts
and
ISO 22301.
incidents
Business continuity information will be
available on the staff intranet
Business continuity training
298
www.iaetsd.in
AUTHORS
Instutiate
Technology,
of
Tirupathi,
the
Jawaharlal
Nehru
technological
Colleges.
Mobile
He
interests
Computer
Computing,
Network
299
www.iaetsd.in
AMBA 2.0
Advanced System Bus (ASB)
Advanced Peripheral Bus (APB2 or APB)
AMBA 3.0
Advanced eXtensible Interface ( AXI v1.0)
Advanced High-performance Bus Lite
(AHB-Lite v1.0)
Advanced Peripheral Bus (APB3 v1.0)
Advanced Trace Bus (ATB v1.0)
AMBA 4.0
AXI Coherency Extensions (ACE)
AXI Coherency Extensions Lite (ACE-Lite)
Advanced eXtensible Interface 4 (AXI4)
Advanced eXtensible Interface 4 Lite (AXI4Lite)
Advanced eXtensible Interface 4 Stream (AXI4-Stream v1.0)
Advanced Trace Bus (ATB v1.1)
Advanced Peripheral Bus (APB4 v2.0)
AMBA defines both a bus specification and a technologyindependent methodology for designing, high-integration
embedded controllers. Advanced eXtensible Interconnect
(AXI4.0) was introduced in AMBA 3.0 as the successor on-chip
bus protocol of the AHB in AMBA 2.0. The AXI4.0 protocol is a
high-performance and high bandwidth bus includes a number of
features that make it suitable for high-speed submicrons
interconnect.
1.1 AMBA axi4.0 Architecture
AMBA AXI4 supports burst and unaligned data transfers. In
AMBA AXI4.0 system i n t e r fa c e 16 masters to slaves. Each
master and slave has their own 4 bit identification tags. .
AMBA AXI4 system c o n s i s t s o f m a s t e r , s l a v e a n d
b u s i n t e r c o n n e c t s . The AXI4.0 consists of five channels
namely write address, write data, read data, read address, a n d
w r i t e r e s p o n s e ch an n el s.
The A X I 4 . 0 protocol supports the following mechanisms:
Burst and unaligned data transfers and up-dated write
r e s p on s e a ckn owl e d g m en t .
A burst data bits wide 8, 16, 32, 64, 128, 256,512 or
1024 bits.
Updated AWCACHE and ARCACHE signalling
details.
300
www.iaetsd.in
301
www.iaetsd.in
2. PROPOSED WORK
The AXI4.0 to APB4.0 Bridge provides an interface between the
high-performance AXI domain and In this proposed work data
transactions can be done between high speed AXI4.0 bus to low
power APB4.0 bus using asynchronous FIFO.Which act as a
interface between them. Read and write transfers on the AXI4.0
bus are converted into corresponding transfers on the APB4.0.
2.1 Asynchronous FIFO
Asynchronous FIFOs are widely used in the computer
networking industry to receive data at a particular clock and
transmit them at another clock. An asynchronous FIFO has two
different clocks one for read and one for write. There are issues
that arise when passing data over asynchronous clock values.
Data could be over-written and hence lost when the write clock is
faster than the read clock, . In order to overcome these problems,
control signals like write pointer, read pointer, empty and full
flags are required.
302
www.iaetsd.in
the write pointer will equal array _size -1. This means that the
last location in the array is the next location that will be written
to. At this condition, the write pointer to become 0 due to write,
and set full. Note that in this condition the write pointer and read
pointers are equal, and not empty or null but the FIFO said to be
full. This implies that the FIFO full/empty decision depends on
the write pointer and read pointers when they will become equal
due to the read or write operation between them but not based on
the pointer values alone. When the pointer equality is a reset or a
read, the FIFO said to be empty; if the cause is a write, the FIFO
said to be full.
Now consider that we begin a multiple reads. The read pointer is
incremented by each read operation till the point where the read
pointer equals array_ size -1. At this point, the data from this
location of RAM or array size is available on the output bus of
FIFO.Succeeding logic reads this data and provides a read signal
(active for one clock). And hence the read pointer to become
equal to the write pointer again (after both pointers have
completed one cycle through the array). However, empty is set
since pointers are equal due to read operation.
303
www.iaetsd.in
304
www.iaetsd.in
3. CONCLUSION
305
www.iaetsd.in
4. FEATURES
5. FUTURE SCOPE
[5]
http://www.arm.com/products/system-ip/amba/ambaopenspecifications.php
[6]
ARM, "AMBA Protocol
Specification 4.0",
www.arm.com, 2010 ARM,AMBA Specification
[7] LogiCORE IP AXI to APB Bridge (v1.00a) DS788 June
22, 2011 Product Specification.
[8] Simulation and Synthesis Techniques for Asynchronous
FIFO Design Clifford E.Cummings, Sunburst
Design, Inc. SNUG San Jose 2002 Rev 1.2.,FIFO
Architecture, Functions, and Applications SCAA042A
November 1999.
[9]
Lahir, K., Raghunathan A., Lakshminarayana G.,
LOTTERYBUS: a new high-performance
communication architecture for system-on- chip deisgns,
in Proceedings of Design Automation
Conference, 2001.
[10] Ying-Ze Liao, "System Design and Implementation of AXI
Bus", National Chiao Tung University,
October 2007.
AUTHOR BIOGRAPHY
6. ACKNOWLEDGMENT
I A VIJAY KUMAR would like to thank Assistant Prof T.
Vinaysimha Reddy, who had been guiding through out to
complete the work effectively and successfully, and would also
like to thank the Prof.P Sanjeeva Reddy HOD, ECE Department
and other Professors for extending their help & support in giving
technical ideas about the paper and motivating to complete the
work effectively & successfully.
7. REFERENCES
ARM, AMBA Specifications (Rev2.0). [Online]. Available
at http://www.arm.com, 1999
[2] ARM, AMBA AXI Protocol Specification (Rev 2.0),
Available at http://www.arm.com, March 2010
[3] Shaila S Math, Manjula R B, Survey of system on chip
buses based on industry standards, Conference on
Evolutionary Trends in Information Technology(CETIT),
Bekgaum,Karnataka, India, pp. 52, May 2011
[1]
[4]
Design and Implementation of APB Bridge based on
AMBA 4.0 (IEEE 2011), ARM Limited.
306
www.iaetsd.in
1. Introduction
We present the design and execution of an
automated resource management system that
achieves a good balance between the two
goals. We make the following contributions:
We develop a resource allocation system
that can avoid excess in the system
effectively while minimizing the number of
servers used. We introduce the concept of
skewness to compute the uneven
utilization of a server. By minimizing
skewness, we can improve the overall
utilization of servers in the face of
multidimensional resource constraints. We
design a load prediction algorithm that can
capture the future resource usages of
applications accurately without looking
2. Related Work
There have been many studies of load
balancing for the cloud environment. Load
balancing in cloud computing was describe
in a white paper written by Adler who
307
www.iaetsd.in
where
is the average use of all resources
for server p. In practice, not all types of
resources are performance dangerous and
hence we only need to consider bottleneck
resources in the above calculation. By
minimizing the skewness, we can combine
different types of workloads nicely and
improve the overall utilization of server
resources. In the following, we describe the
308
www.iaetsd.in
309
www.iaetsd.in
4.System Model
There are several cloud computing
categories with this work focused on a
public cloud. A public cloud is based on the
standard cloud compute model, with service
provided by a service provider. A large
public cloud will include many nodes and
the nodes in different geographical
locations. Cloud partition is used to manage
this large cloud. A cloud partition is a
subarea of the public cloud with divisions
based on the geographic locations. The
architecture is shown in Fig.1.The load
opposite strategy is based on the cloud
partitioning concept. After creating the cloud
partitions, the load balancing then starts:
when a job arrives at
310
www.iaetsd.in
change to idle
311
www.iaetsd.in
different
situations
based
on
the
with
each
parameter
being either static or dynamic. m
represents the total number of the
parameters.
5 Cloud Partition
Balancing Strategy
5.1 Motivation
Good load balance will improve the
presentation of the entire cloud. However,
there is no common method that can adapt to
all possible different situations. Various
methods have been developed in improving
existing solutions to resolve new problems.
Each exacting method has advantage in a
particular area but not in all situations.
Therefore, the current model integrates
several methods and switches between the
load balance method based on the system
status. A relatively simple method can be
Load
312
www.iaetsd.in
313
www.iaetsd.in
viewed as a game. Game theory has noncooperative games and cooperative games.
In cooperative games, the decision makers
eventually come to an agreement which is
called a binding agreement. Each decision
maker decides by comparing notes with each
others. In non-cooperative games, each
decision maker makes decisions only for his
own benet. The system then reachs the
Nash equilibrium, where each decision
maker makes the optimized decision. The
Nash equilibrium is when each player in the
game has chosen a strategy and no player
can benet by changing his or her strategy
while the other players strategies remain
unchanged.
6.Future Work
Since this work is just a conceptual
framework, more work is needed to
implement the framework and resolve new
problems. Some important points are:
(1) Cloud division rules: Cloud division is
not a simple problem. Thus, the framework
will need a complete cloud division
methodology. For example, nodes in a
cluster may be far from other nodes or there
will be some clusters in the same geographic
area that are still far apart. The division rule
should simply be based on the geographic
location (province or state).
314
www.iaetsd.in
315
www.iaetsd.in
[15] S. Aote and M. U. Kharat, A gametheoretic model for dynamic load balancing
in distributed systems, in Proc. The
International Conference on Advances in
Computing, Communication and Control
(ICAC3 09), New York, USA, 2009, pp.
235-238.
316
www.iaetsd.in
become
semi-structured
heterogeneous
effective
relationships
between
we
measure
objects
rather
in
approach
functions
current
search
the
similarity
only
than
role for
similarity search in
information
network structure.
measures
to
heterogeneous
networks
his
317
www.iaetsd.in
semantic meaning.
introduce
similarity
meta-path
based
First,
its
for
level
complex
description
heterogeneous
for
better
Meta
similarity
given
homogeneous
MEASURE
For the bibliographic network scheme, where an
The similarity between two objects in a link-
FRAMEWORK
Given
a user-specified meta-path,
318
several
www.iaetsd.in
several
similar product.
straightforward
measures
in
the
following.
This motivated us to propose a new, meta-path
Path count: the number of path instances
between objects.
multiplication.
measure.
network
similarity
functions,
Properties of PathSim
are
1. Symmetric.
2. Self-maximum
3. Balance of visibility
information networks.
319
www.iaetsd.in
IV.
more
PATH
efficient
than
Pairwise
computation
as PathSim-baseline.
large-scale
networks,
we
propose
to
derive
longer
b) Co-Clustering-Based Pruning
meta-path-based
In the baseline algorithm, the computational
concatenation method, which first generates coclusters of two types of objects for partial
a) Baseline
320
www.iaetsd.in
experiments.
bounds.
The
PathSim-Pruning
quality.
can
between objects.
[1]
Heterogeneous
Information
Networks
algorithm.
V. EXPECTED RESULTS
Association
Thesaurus
Construction
321
www.iaetsd.in
Information
and
Knowledge
Fourth
Intl
Conf.
Semantic
and
G.
Weikum,
Naga:
322
www.iaetsd.in
features or properties:
i)
problems
and
the
existing
as a service.
Performance
Diagnosis,
Service-
iii) Knowledge-based.
Oriented.
INTRODUCTION
The Cloud
Manufacturing
Systems
advanced
technologies
such
as
based on knowledge.
v) Physically
model
called
distributed
and
logically
centralized
cloud
manufacturing is proposed.
323
www.iaetsd.in
are
restricted
by
different
persons
or
organizations.
a) Existing System
The
art
of
debugging
for
a) Cloud Trace
cloud
them.
bottlenecks.
experience.
b) Proposed System
b) Cloud Monitoring
Cloud
Monitoring
provides
the
experiences.
With minimum configuration and no
II. PROPOSED WORK
The
Cloud
Debugger
separate infrastructure to
maintain,
Cloud
completely
traditional approaches.
324
www.iaetsd.in
SSH to VM instantly
Engineering
Manufacture.
doi:10.1177/
0954405411405575
Toward
Scalable
III.
Fine-Grained,
Performance
for
CONCLUSION
1245-1255, 2013.
between
tracing
granularity
and
and
T.
Sun,
Performance
Problems
Mortier,
Using
Magpie
for
Request
FUTURE ENHANCEMENT
First Author
Second Author
work.
REFERENCES
[1] http://googlecloudplatform.blogspot.in / 20 14 /06 /enabling-developers-to-tame-product
-ion-systems-in-the-cloud.html.
325
www.iaetsd.in
Naresh.G
Abstract-
Cloud
computing
is
emerging
patterns.
Index
terms-
Cloud
Computing,
storage
INTRODUCTION
PERSPECTIVES
Cloud computing is the delivery of the
While the benefits of storage networks have
326
www.iaetsd.in
a) System Model
attacks:
Perimeter
defence
strategies
focus
on
User: who have data to be stored in the cloud
organizations?
[7].
systems.
(CSP): who
has
data theft
o
b) Adversary Model
possibly malicious.
but
so on.
understanding
of
networked
storage
327
www.iaetsd.in
recommended:
which
also
encrypt
authentication
appropriate
permissions
will
enhance
security,
policies,
processes
and
Constant
control
monitoring
of
published
OS
technology
necessary
to
maintain
an
Data Storage
to Storage Network:
Extending
network
perimeter
defence
328
www.iaetsd.in
protocol
NAS appliances
challenge
from
the Storage
data
interfaces
on
not
only
determine
the
Monitor
traffic
patterns
on
the
data
activity
more blocks the data are split into, the poorer the
reliability of traditional data storage
V. CONCLUSION
Implement
authentication
clearly understood.
Implement
strong
authorization
using
Access
REFERENCES
a) Correctness verification
o
http://www.microsoft.com/business/engb/sol
utions/Pages/Cloud.aspx
We
can
correctness
do
that
by integrating the
verification
and
error
329
www.iaetsd.in
[2]
EMC,
Information-Centric
Security.
http://www.idc.pt/resources/PPTs/2007/IT&
Internet_Security/12.EMC.pdf.
[3] End-User Privacy in HumanComputer
Interaction.
http://www.cs.cmu.edu/~jasonh/publications
/fnt-enduser-privacy-in-human-computerinteractionfinal. pdf.
[4] ESG White Paper, the Information-Centric
Security Architecture. http://japan.emc.com/
collateral/analystreports/emc-white-paper
v4-4-21-2006.pdf.
[5] Subashini S, Kavitha V., A survey on
security issues in service delivery models of
cloud computing, Journal of Network and
Computer Applications (2011) vol. 34 Issue
1, January 2011 pp. 1-11.
AUTHORS
First Author
Second Author
330
www.iaetsd.in
Introduction:
Cloud computing is large group of remote
servers interconnected together that provide a facility
of sharing. The cloud computing is high utility
technology in world and having the ability to change
IT software industry. Due to its simple architecture
most of companies are adapting cloud computing.The
number of cloud service providers are increasing day
by day as the number of cloud users are increasing in
day to day life. The increase of web traffic and load
make load balancing as a big research topic.
331
www.iaetsd.in
Related work:
Load balancing can be implemented in both
static and dynamic schemes.
Cloud analyst is a tool provided by cloud bus
Round
Robin
ESCG
Throttled
Overall
response
time
300.12
300.12
300.12
Data center
processing
time(m.sec)
0.35
0.35
0.35
0.50
0.50
0.50
16
16
16
VM
cost($)
Total cost
Proposed work:
By using the cloud analyst tool both static and
dynamic schemes are analyzed and there by a
better load balancing model and scheme is
determined
Static schemes:
332
www.iaetsd.in
Algorithm
Start
Overall
response
time
Data center
processing
time
(m.sec)
VM cost($)
Round
Robin
ESCG
Throttled
223.34
209.75
209.74
13.84
10.11
10.10
5.3
4.45
4.03
18.3
18.3
18.3
Else
Total
Search for another partition.
333
www.iaetsd.in
References:
1. Gaochao XU Jungie pang: Load balancing
model based on partitioning public cloud.
2. Dr.Hemanth s mahalle : Load balancing on
cloud centers.
3. Bhathiya: Cloud analyst cloud sim based
visual modeller for analyzing cloud computing
environments and applications
Conclusion:
Finally dynamic schemes are effective in
balancing load when compared to static
schemes. In dynamic schemes throttled and
equally spread current execution are better to
balance the load based on dynamic load
environments.
Acknowledgements:
I would thank my head of department
Prof.Mr.M.Rajendra&myguideMr.CH.MadhuBabu
sir for guiding me to this project. I thank my parents,
friends lecturers who gave a contribution for this
project.
334
www.iaetsd.in
Scholar, Dept of CSE, Audisankara College of Engineering & Technology, Gudur, AP, India.
Prof, Dept of CSE, Audisankara College of Engineering & Technology, Gudur, AP, India.
2Asst
AbstractWebsite design is easy task but, to navigate user efficiently is big challenge, one of the reason is user
behavior is keep changing and web developer or designer not think according to users behavior. Designing well
structured websites to facilitate effective user navigation patterns has long been a hallenge in web usage mining with
various applications like navigation prediction and improvement of website management. This paper addresses how
to improve a website without introducing substantial changes. Specifically, we propose a mathematical
programming model to improve the user navigation on a website while minimizing alterations to its current
structure. Results from extensive tests conducted on a publicly available real data set indicate that our model not
only significantly improves the user navigation with very few changes, but also can be
effectively solved. We have also tested the model on large synthetic data sets to demonstrate that it scales up very
well. In addition, we define two evaluation metrics and use them to assess the performance of the improved website
using the real data set. Evaluation results confirm that the user navigation on the improved structure is indeed greatly
enhanced. More interestingly, we find that heavily disoriented users are more likely to benefit from the improved
structure than the less disorientedusers.
I.
INTRODUCTION
Previous studies on website has focused on a variety
of issues, such as understanding web structures ,
finding relevant pages of a given page , mining
informative structure of a news website, and
extracting template from WebPages . Our work, on
the other hand, is closely related to the literature that
examines how to improve website navigability
through the use of user navigation data. Various
works have made an effort to address this question
and they can be generally classified into two
categories to facilitate a particular user by
dynamically reconstituting pages based on his profile
and traversal paths, often referred as personalization,
and to modify the site structure to ease the navigation
for all users, often referred as transformation.
335
www.iaetsd.in
LITERATURE REVIEW:
336
www.iaetsd.in
III.
METRIC
FOR
EVALUATING
NAVIGATION EFFECTIVENESS
IV.
PROBLEM
FORMULATION
V.
COMPUTATIONAL
EXPERIMENTS
AND PERFORMANCE EVALUATIONS
VI.
Problem Description
Difficulty in navigation is reported as the problem
that triggers most consumers to abandon a website
and switch to a competitor. Generally, having
traversed several paths to locate a target indicates that
this user is likely to have experienced navigation
difficulty. Therefore, Webmasters can ensure
effective user navigation by improving the site
structure to help users reach targets faster. Thesis
easy navigated websites can create a positive attitude
toward the firm, and stimulate online purchases,
whereas websites with low usability are unlikely to
337
www.iaetsd.in
338
www.iaetsd.in
M.Tech 2nd year, Dept. of CSE, Audisankara College of Engineering & Technology, Gudur, A.P, India.
Asst Professor, Dept. of CSE, Audisankara College of Engineering & Technology, Gudur, A.P, India.
Abstract Transport
I.
this
INTRODUCTION
is
many-to-one
called
common.
Hence
TCP
TCP
incast
congestion.
Data-center
many-to-one communication,
control,
round
trip
time,
TCP
throughput.
339
www.iaetsd.in
many-to-one
traffic
pattern
is
window
increase
of
all
incoming
connections.
340
www.iaetsd.in
Fig. 3.
Networks.
packet drops.
each
The amount
of
data
transmitted by
341
www.iaetsd.in
buffer
overflow
significantly
reduces
TCP
network.
job distribution.
connections is achieved.
342
www.iaetsd.in
= max (0,
oversubscribed
bandwidth
adjustment. A larger
during
window
provides
receive-window-based
TCP connection.
i)
Bandwidth Estimation
interface
algorithm
should
perform
this
343
www.iaetsd.in
source/destination
IP
address,
TCP connection.
= max (
+ (1 )
network statistics,
and
receive window.
monitoring activities
throughput
difference
represented as
Tdib
(aie
of
connection
aim)/
aie.
is
large.
iv) Choosing
Fairness
among
Multiple
Connections
window.
adjusted
based
on
its
incoming
measured
344
www.iaetsd.in
throughput.
our
technique
conservatively
estimates
the
[5] M. Alizadeh, A. Greenberg, D.Maltz, J.
we
used
Network
driver
interface
statistics;
monitoring,
filtering
74.
PanasasActiveScale
storage
cluster:
degree
in
Computer
Chadalavada
at
Audisankara
Ramanamma
College
of
and B.Mueller, Safe and effective finegrained TCP retransmissions for datacenter
345
www.iaetsd.in
Professor
Audisankara
College
in
of
DSRC
(Data
Software
Research
346
www.iaetsd.in
D.TEJASWINI.,M.TECH
C.RAJENDRA.,M.TECH.,M.E.,PH.D.
ABSTRACT
Cloud computing is an emerging field in the development of business and
organizational environment. As it provides more computation power and storage space users
can process many applications.Due to this large number of intermediate datasets are
generated and Encryption and decryption techniques are used to preserve the intermediate
data sets in cloud. An Upper bound constraint based approach is used to identify sensitive
intermediate data sets and we apply suppression technique on sensitive data sets in order to
reduce the time and cost. The Value Generalization Hierarchy protocol is used to achieve
more security so that number of users can access the data with privacy.Along with that
Optimized Balanced Scheduling is also used for the best mapping solution to meet the system
load balance to the greatest extent or to reduce the load balancing cost
The Privacy preservation is also ensured with dynamic data size and access
frequency values. Storage space and computational requirements are optimally utilized in the
privacy preservation process. Data distribution complexity is also handled in the scheduling
process.
Keywords: Cloud computing, privacy upper bound, intermediate data sets, optimized
balanced scheduling, value generalization hierarchy protocol.
1. INTRODUCTION
Cloud computing mainly relies on sharing
of resources to achieve coherence and
economies of scale similar to a utility over
a network. The basement of cloud
computing is the broader concept of
converged infrastructure and shared
services. The cloud mainly focuses on
maximizing the effectiveness of shared
resources. Cloud resources are not only
347
www.iaetsd.in
3.SYSTEM ARCHITECTURE
2.RELATED WORK.
Encryption is usually integrated with other
methods to achieve cost reduction, high
data usability and privacy protection. Roy
et al. [8] investigated the data privacy
problem caused by Map Reduce and
presented a system named Airavat which
incorporates mandatory access control
with differential privacy. Puttaswamy et al.
[9] described a set of tools called
Silverline which identifies all encryptable
data and then encrypts them to protect
privacy. Encrypted data on the cloud
prevent privacy leakage to compromisedor
malicious clouds, while users can easily
access data by decrypting data locally with
keys from a trusted organization. Using
dynamic program analysis techniques
Silverline automatically identifies the
encryptable application data that can be
safely encrypted without negatively
affecting the application functionality. By
modifying the application runtime, e.g. the
PHP interpreter, we show how Silverline
can determine an optimal assignment of
encryption keys that minimizes key
management overhead and impact of key
compromise. Our applications running on
the cloud can protect their data from
security breaches or compromises in the
348
www.iaetsd.in
4.IMPLEMENTATION
4.1 Requirements
The problem of managing the intermediate
data which is generated during dataflow
computations, deserves deeper study as a
first-class problem. They are the following
two major requirements that any effective
intermediate storage system needs to
satisfy: availability of intermediate data,
and minimal interference on foreground
network traffic generated by the dataflow
computation.
Data Availability: A task which is in a
dataflow stage cannot be executed if the
intermediate input data is unavailable. A
system that provides higher availability for
intermediate data will suffer from fewer
delays for re-executing tasks in case of
failure. In multi-stage computations, high
availability is critical as it minimizes the
effect of cascaded re-execution.
Minimal Interference: At the same time,
the data availability cannot be pursued
over-aggressively. In particular, since
intermediate data is used immediately, and
there is high network contention for
foreground traffic of the intermediate data
transferred to the next stage. So an
intermediate data management system
needs to minimize interference.
349
www.iaetsd.in
5. CONCLUSION
In this paper, focus is mainly
contributed towards identification of the
areas
where
the
most
sensitive
intermediate datasets are present in cloud.
An upper bound constraint based approach
is used where data sets needs to be
350
www.iaetsd.in
6.REFERENCES
[1] L. Wang, J. Zhan, W. Shi, and Y.
Liang, In Cloud, Can Scientific
Communities Benefit from the Economies
of Scale?, IEEE Trans. Parallel and
Distributed Systems, vol. 23, no. 2, pp.
296-303, Feb.2012.
[2] Xuyun Zhang, Chang Liu, Surya
Nepal, Suraj Pandey, and Jinjun Chen, A
Privacy Leakage Upper Bound ConstraintBased Approach for Cost-Effective
Privacy Preserving of Intermediate Data
Sets in Cloud, IEEE Transactions On
Parallel And Distributed Systems, Vol. 24,
No. 6, June 2013.
[3] D. Zissis and D. Lekkas, Addressing
Cloud Computing Security Issues, Future
Generation Computer Systems, vol. 28, no.
3, pp. 583- 592, 2011.
[4] D. Yuan, Y. Yang, X. Liu, and J. Chen,
On-Demand
Minimum
Cost
Benchmarking for Intermediate Data Set
Storage in Scientific Cloud Workflow
Systems,
J.
Parallel
Distributed
Computing, vol. 71, no. 2, pp. 316-332,
2011.
351
www.iaetsd.in
Prof C.Rajendra
[email protected]
ABSTRACT: This paper detects malicious activities on wireless mesh networks with
wireless routing protocols. Upon the selection of route discovery malicious attacks are
ahead to compromise the nodes such as network partitioning, node isolation activities
.The cardinal covering in the routing protocols address the packets in the network.
When attacks are take place by the opponent, negotiate the attacker node and choose
another way to send the packet from source to destination .But it cant be moved from
the wireless network. Here proposing, looking into the Clustering protocols along with
id-based key update protocols, which is very predicting in wireless networks.
Cryptography techniques improvise the packet in an assured way from source to
destination and it doesnt render to secure the network/system.
Keywords: Wirelessmeshnetworks, clustering, MSR protocol, adversary nodes, updating key.
of a seamlessly connected world into reality.
1. INTORDUCTION:
Wireless mesh networks (WMNS)
routing
network
technique,
must
352
the
allow
message
for
is
continuous
www.iaetsd.in
connections
and
broken
blocked
or
reconfiguration
paths,
around
using self-
particularly
hard
for
an
adversary
to
2. RELATED WORK:
mesh
data
from
opponents
by
algorithms
the
to
group
the
nodes
using
to
protect
data
from
adversary
nodes
identifying
networks
after
using
wireless
networks
Multi-path
353
www.iaetsd.in
which
can
be
fixed
or
variable.
CHs
in
its
cluster,
thus,
4. IMPLEMENTATION:
clustering
technology for
communication
networks
bandwidth
and
avoids
next
showing
generation
rapid
wireless
progress
and
cluster
interactions.
Therefore,
clustering
spreads
network
connection
adversary
nodes
about
topological
clustering
and
cryptographic
key
3. PAPER ORGANIZATION:
section
implementation
discuss
the
354
www.iaetsd.in
protect
Here
routes
message
routes.
data
from
unit
misbehaving
opponents.
(LMU).
nodes
Clustering
the
and
as
group
to
reach
the
destination.
The
task
re-generating
to
protect
data
i.e.
observed
communications,
wireless
particularly
networks
where
in
mobile
routes
LMUs.
For
each
message
are
states
355
www.iaetsd.in
observed.
not observed.
node(s)
is observed.
observed.
observes
the
behavior
of
the
RREP-
Receipt
of
RREP
is
observed.
7. LMU complete- forwarding a valid RREP
is observed.
8. Timeout RREP-Timeout after receipt of a
RREP.
356
www.iaetsd.in
nodes of node N
respect
clustering
one.
with
Introducing
set
up
and
maintenance.
Mobility-Adaptive
Clustering
following properties.
initial
properties
the
Distributed
Events
to
different
Neighbor
has
State
changes
X broadcasts RREQ.
1to 4
N broadcasts RREQ.
4to 4
N sends RREP to X.
4to 6
X sends RREP to S.
6to 7
Y broadcasts RREQ.
1to 4
N broadcasts RREQ.
4to 4
Timeout
N broadcasts RREQ.
4to5
1to3
Z broadcasts RREQ.
3 to4
Z sends RREP to N
4to7
DMAC
is
fully
distributed.
node
intra-cluster
communication
inter-cluster
and
fast
357
www.iaetsd.in
nodes.
backbone network.
algorithm
4.4
the
MCBP
(minimum
cost
blocking
5. CONCLUSION:
pieces algorithm.
i.
Key Update:
backbone network.
358
www.iaetsd.in
Australasian
364.
these
group
Mobile
key
and
additional
Computing,
2005
International
Information
on
make
conference
74
clustering
6. REFERENCES:
Tools
and
Applications
to
Networked
kumar
T,
Ramesh
Babu
and
B,
networks,
wireless
energy-
SIGMOBILE
Mob.
Comput.
2001.
Highly-resilient,
Estrin,
routing
D.
mesh
networks.
359
www.iaetsd.in