Iccter Proceedings
Iccter Proceedings
Iccter Proceedings
ICCTER - 2014
2ND INTERNATIONAL CONFERENCE ON CURRENT
TRENDS IN ENGINEERING RESEARCH
Sponsored By
INTERNATIONAL ASSOCIATION OF ENGINEERING &
TECHNOLOGY FOR SKILL DEVELOPMENT
Technical Program
22 September, 2014
Hotel NRS SAKITHYAN, Chennai
Organized By
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL
DEVELOPMENT
www.iaetsd.in
http://www.iaetsd.in
About IAETSD:
The International Association of Engineering and Technology for Skill
Development (IAETSD) is a Professional and non-profit conference organizing
company devoted to promoting social, economic, and technical advancements
around the world by conducting international academic conferences in various
Engineering fields around the world. IAETSD organizes multidisciplinary
conferences for academics and professionals in the fields of Engineering. In order
to strengthen the skill development of the students IAETSD has established.
IAETSD is a meeting place where Engineering students can share their views,
ideas, can improve their technical knowledge, can develop their skills and for
presenting and discussing recent trends in advanced technologies, new educational
environments and innovative technology learning ideas. The intention of IAETSD
is to expand the knowledge beyond the boundaries by joining the hands with
students, researchers, academics and industrialists etc, to explore the technical
knowledge all over the
world, to publish proceedings. IAETSD offers
opportunities to learning professionals for the exploration of problems from many
disciplines of various Engineering fields to discover innovative solutions to
implement innovative ideas. IAETSD aimed to promote upcoming trends in
Engineering.
About ICCTER:
The aim objective of ICCTER is to present the latest research and results of
scientists related to all engineering departments topics. This conference provides
opportunities for the different areas delegates to exchange new ideas and
application experiences face to face, to establish business or research relations and
to find global partners for future collaboration. We hope that the conference results
constituted significant contribution to the knowledge in these up to date scientific
field. The organizing committee of conference is pleased to invite prospective
authors to submit their original manuscripts to ICCTER 2014.
All full paper submissions will be peer reviewed and evaluated based on
originality, technical and/or research content/depth, correctness, relevance to
conference, contributions, and readability. The conference will be held every year
to make it an ideal platform for people to share views and experiences in current
trending technologies in the related areas.
E-Passport
3
4
11
16
34
41
45
49
55
10
11
60
66
12
73
13
14
15
16
17
18
79
86
92
99
106
114
19
118
20
123
21
129
22
133
23
140
24
25
26
27
28
29
146
149
155
159
167
177
ABSTRACT:
This paper presents, that taking the photos
under dim lighting conditions using a hand-held camera
is challenging. If the camera is set to a long exposure
time, the image is blurred due to camera shake. On the
other hand, the image will be dark and noisy if it is
taken with a short exposure time with a high camera
gain. By combining information extracted from both
blurred and noisy images, however, this paper shows
how to produce a high quality image that cannot be
obtained by simply denoising the noisy image or
deblurring the blurred image alone. The aim of the
paper is image deblurring with the help of the noisy
image. First, both images are used to estimate an
accurate blur kernel, which otherwise is difficult to
obtain from a single blurred image. Second and again
using both images, a residual deconvolution is proposed
to reduce ringing artifacts inherent to image
convolution. Third, the remaining ringing artifacts in
smooth image regions are further suppressed by a gaincontrolled deconvolution process. We demonstrate the
effectiveness of our approach using a number of indoor
and outdoor images taken by off-the-shelf hand-held
cameras in poor lighting environments. We extensively
validate our method and show comparison with other
approaches with respect to blurred image noisy image
and our deblurred result.
I. INTRODUCTION
Capturing satisfactory photos under low
light conditions using a hand-held camera can be a
frustrating experience. Often the photos taken are
blurred or noisy. The brightness of the image can be
increased in three ways. First, to reduce the shutter
speed. But with a shutter speed below a safe shutter
speed (the reciprocal of the focal length of the lens, in
the unit of seconds), camera shake will result in a
blurred image. Second, to use a large aperture. A
large aperture will however reduce the depth of field.
Moreover, the range of apertures in a consumer-level
camera is very limited. Third, to set a high ISO.
However, the high ISO image is very noisy because
the noise is amplified as the cameras gain increases.
To take a sharp image in a dim lighting environment,
the best settings are: safe shutter speed, the largest
aperture, and the highest ISO.
Even with this combination, the captured image may
still be dark and very noisy. Another solution is using
a flash; this unfortunately often introduces artifacts
such as secularities and shadows. Moreover, flash
may not be effective for distant objects.
www.iaetsd.in
www.iaetsd.in
ISO.B.tB
ISO.N.tN
where t is the exposure time. We perform
the multiplication in irradiance space then go back to
image space if the camera response curve [Debevec
and Malik 1997] is known. Otherwise, a gamma (=
2.0) curve is used as an approximation.
3.1 PROCESS:
The block diagram of the process of kernel
estimation is shown in fig.1:
www.iaetsd.in
I = ND +I
(2)
Our first important observation is that the denoised
image ND is very good initial approximation to I for
the purpose of kernel estimation from Equation (1).
The residual image I is relatively small with respect
to ND. The power spectrum of the image I mainly
lies in the denoised image ND. Moreover, the large
scale, sharp image structures in ND make important
contributions for the kernel estimation. As will be
shown in our experiments on synthetic and real
images, accurate kernels can be obtained using B and
ND in non-blind convolution. Once K is estimated,
we can again use Equation (1) to non-blindly
deconvolute I, which unfortunately will have
significant artifacts,
e.g, ringing effects. Instead of recovering I directly,
we propose to first recover the residual image I
from the blurred image B. By combining Equations
(1) and (2), the residual image can be reconstructed
from a residual deconvolution:
B = IK,
(3)
where B = BND K is a residual blurred image.
Our second observation is that the ringing artifacts
from residual deconvolution of I (Equation (3)) are
smaller than those from deconvolution of I (Equation
(1)) because B has a much smaller magnitude than
B after being offset by
ND K,
(4)
The denoised image ND also provides a
crucial gain signal to control the deconvolution
process so that we can suppress ringing artifacts,
especially in smooth image regions. We propose a
deconvolution algorithm to further reduce ringing
artifacts. The above three steps - kernel estimation,
residual de-ringing approach using a gain-controlled
deconvolution, and de-ringing - are iterated to refine
the estimated blur kernel K and the deconvolute
image I.
Measurement z(k)
Calculate X
Calculate Z (K)
Calculate *l+1
|m(l*)| < ?
Y
N
*
(k)=
conv
www.iaetsd.in
V. IMPLEMENTATION DETAILS
www.iaetsd.in
6.1 Comparison:
Comparing this approach with denoising
[Portillaetal. 2003], and a standard RL algorithm.
Figure 8, from left to right, shows a blurred image,
noisy image (enhanced), denoised image, standard
RL result (using our estimated kernel), and this
result. The kernel sizes are 3131, 3333, and 4040
for the three examples. It manually tunes the noise
parameter (standard deviation) in the denoising
algorithm to achieve a best visual balance between
noise removal and detail preservation. Compared
with denoised results. The results contain much more
fine details, such as tiny textures on the fabric in the
first example, thin grid structures on the crown in the
second example, and clear text on the camera in the
last example. Because the noise image is scaled up
from a very dark, low contrast image, partial color
information is also lost. This approach recovers
correct colors through image deblurring and standard
RL deconvolution results which exhibit
www.iaetsd.in
Fig. 4
VII. CONCLUSION
This paper proposed an image deblurring
approach using a pair of blurred/noisy images. This
approach takes advantage of both images to produce
a high quality reconstructed image. By formulating
the image deblurring problem using two images, it
has developed an iterative deconvolution algorithm
which can estimate a very good initial kernel and
significantly reduce deconvolution artifacts. No
special hardware is required. This proposed approach
uses off-the-shelf, hand-held cameras. Limitations
remain in approach, however, shares the common
limitation of most image deblurring techniques:
assuming a single, spatial-invariant blur kernel. For
spatial-variant kernel, it is possible to locally estimate
kernels for different parts of the image and blend
deconvolution results. Most significantly, this
approach requires two images; the ability to capture
such pairs will eventually move into the camera
firmware, thereby making two-shot capture easier
and faster. In the future, planning to extend our
www.iaetsd.in
E-Passport
1. K.Ranjani Department of Information technology,(2nd year)
2. T.Sandhiya Department of electronics and communication engineering,(2nd year)
[email protected] [email protected]
M.Kumarasamy College of engineering, Karur.
ABSTRACT:
Area of Paper
Embedded System.
RFID
Biometric Identification
Literature survey:
www.iaetsd.in
Methodology:
ADVANTAGES:
Target Device
PIC18F452 Microcontroller
Low cost
easy to use for rural areas
automated operation
Low Power consumption
Conclusion:
We analyzed the major current
and potential uses of RFID in identity
documents. We identified some of
the areas of promise for existing and
future
deployments,
and
we
considered the security concerns
www.iaetsd.in
Reference:
[1]
[2]
International
Civil
Aviation
Organization.
Foundation
of
theInternational
Civil
Aviation
Organization. 20 June 2005.
[3]
United
States
Government
Acountability Office. Information
Security:
Radio
Frequency
Identification Technology in the
Federal Government May 2005
www.iaetsd.in
INVESTIGATION OF THERMAL
BARRIER COATING ON I.C ENGINE
PISTON
S. Lakshmanan1 G. Ranjith Babu2 S. Sabesh3 M. Manikandan4
1
Research scholar, Anna University, Chennai
1
Assistant Professor, Department of Mechanical Engineering, Veltech Multi tech Engineering
College, Avadi
234
Department of Mechanical Engineering, Veltech Multi tech Engineering college, Avadi
Abstract:
INTRODUCTION
basic requirements:
Among
those
properties,
thermal
MATERIALS
www.iaetsd.in
Type
Combustion chamber
Direct injection
`Bore
95 mm
Stroke
95 mm
Displacement
673.4 cc
Compression ratio
18:1
Max. torque
Max. HP
13 HP@2400 rpm
S.F.C
192 g/ Hp / hr
Cooling system
Lighting system
12 volts / 35 watts
www.iaetsd.in
20
BTE
(Baseline) %
10
0
0
BTE (Coated)
%
BMEP (bar)
In
the
emission
Swept volume
Speed Voltage Current Power FC
FC
FC
SFC
BMEP CV
Fuel Energy
Efficiency
measurements,
the tailpipe uHC and CO concentrations
cu.m rpm V
A
kW
s/5cc g/hr kg/s g/(kW.hr) bar
kJ/kg kW were
%
conducted. It was discovered that the CO did not
0.000673 1500
230
0
0 28.13 537.5044 0.000149 0 42500 6.345539vary 0much in either the baseline or TBC test. The
0.000673 1500
230
2 0.541176 23.38 646.7066 0.00018 1195.001 0.642937 42500 7.634731variations
7.088351
were more or less within the resolution of the
0.000673 1500
230
4 1.082353 18.57 814.2165 0.000226 752.2652 1.285873 42500 9.612278NDIR
11.26011 analyzer, which was 0.1 vol.% concentration,(21)
0.000673 1500
230
6 1.623529 17.31 873.4835 0.000243 538.0152 1.92881 42500 10.31196whereas
15.74414 the resolution of the FID used was 1 ppm.
0.000673 1500
230
8 2.164706 15.87 952.741 0.000265 440.1249 2.571747 42500 11.24764Figure
19.24587 6 compares the brake specific fuel consumption
between
0.000673 1500
230
10 2.705882 12.31 1228.27 0.000341 453.9258 3.214683 42500 14.50041 18.66073 the baseline and TBC piston tests. Results show
that, in general, the fuel consumption was lower in the
0.000673 1500
230
12 3.247059 11.86 1274.874 0.000354 392.6241 3.85762 42500 15.05059 21.5743
TBC piston tests for the same operating condition, with
BASE LINE ENGINE
an improvement of up to 6% at lower engine power. The
self-optimized cycle efficiency due to the altered ignition
characteristics in the TBC piston engine outnumbered the
VS
slightly reduced combustion efficiency with an overall
improvement in thermal efficiency as a whole. The level
COATED ENGINE
of improvement that has been predicted ranged from 2 to
12 %. They attribute this to insulation of in-cylinder
components
Swept voluSpeed
me Voltage Current Power FC FC FC SFC BMEP CV Fuel EnergyEfficiency .
A
230
230
230
230
230
230
230
kW
cu.m rpm V
0.000673 1500
0.000673 1500
0.000673 1500
0.000673 1500
0.000673 1500
0.000673 1500
0.000673 1500
0.0004
0.0003
0.0002
0.0001
0
FC
(Baseline)
kg/s
5
BP (kW)
A.THERMAL
EFFICIENCYON
FUEL
FC
(Coated)
kg/s
EXHAUST EMISSION:
CONSUMPTION:
www.iaetsd.in
A.HYDROCARBONS:
The level of emission of unburned
hydrocarbon(UHC) is considerably decreased due to
reduction of flow of heat to the water cool jackets and
exhaust system.But due to high temperature gas and high
temperature combustion wall which contributes
combustion of lubricating oil,which ultimately leads to
emission of unburned hydrocarbon.
NOx
Load vs NOx
Load vs HC
15
10
HC (Coated)
ppm
HC
10
B.Carbon monoxide(CO):
The higher temperatures both in the gases and at the
combustion chamber walls of the LHR engine assist in
permitting the oxidation of CO.The higher temperature
causes complete combustion of carbon which results in
combustion of CO emission.
Load vs CO
0.08
CO- by
volume
%(base line)
CO
0.02
0
0
10
20
LOAD (Amps)
10
20
Nox in
ppm(Final)
LOAD (Amps)
0.04
Nox in
ppm(baselin
e)
LOAD (Amps)
15
0.06
800
600
400
200
0
0
HC
(Baseline)
ppm
CO-by
volume
%(Coated)
C.Nitrogen oxides:
NOx is formed by chain reactions involving
Nitrogen and Oxygen in the air. These reactions are
highly temperature dependent. Since diesel engines
always operate with excess air, NOx emissions are
mainly a function of gas temperature and residence time.
Most of the earlier investigations show that NOx
emission from LHR engines is generally higher than that
in water-cooled engines. They say this is due to higher
combustion temperature and longer combustion duration.
. Reference reports an increase in the LHR engine NOx
emissions and concluded that diffusion burning is the
controlling factor for the production of NOx. Almost
equal number of investigations report declining trend in
the level of emission of NOx. Reference indicates
reduction in NOx level. They reason this to the
CONCLUSIONS
The results showed that, increasing the brake thermal
efficiency and decreasing the specific fuel consumption
for Light heat Rejection engine with thermal coated
piston compared to the standard engine. There was
increasing the NOx emission and O2 for thermal barrier
www.iaetsd.in
5.
6.
2.
3.
4.
Private Limited.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
REFERENCES
1.
www.iaetsd.in
Environmental friendly
Less weight
INTRODUCTION
Inflammable
Since the large demand has been
properties,
mentioned needs.
materials.
MATERIALS USED
This
experimental
study
which
which
satisfies
the
above
produce building
bricks.
The
following
CEMENT
OBJECTIVES
world
bricks
by
an
innovative
and
following characteristics,
Properties of cement
Required
Cost effective
1
www.iaetsd.in
Description
of test
Test
results
Requiremen
obtained
ts
of
IS:
8112 1989
Initial
65
Min.
setting time
minutes
30minutes
Max.
time
minutes
600minutes
412.92
Min.
Fig GGBS
QUARRY DUST
Getting good Quarry dust free from
Fineness
m /kg
225
m /kg
Fig . Cement
table
GROUND
GRANULATED
BLAST
Properties of Quarry dust
Property
Quarry
Natural
dust
sand
Bulk
density (kg/m )
Absorption (%)
Moisture
content (%)
Fine
particles
less
than
2.60
relative
3
1720-1810
1460
1.20-1.50
Nil
Nil
1.50
12-15
06
2
2nd INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ENGINEERING RESEARCH
17
www.iaetsd.in
0.075mm (%)
Sieve analysis
Zone II
Zone II
but
also
reduces
flexibility
somewhat, adds weight and may reduce Rvalue. So the trick is finding the best mix for
the application.
www.iaetsd.in
paper
pulp
before
mixing
with
other
ingredients.
WATER
Water is an important ingredient of
should be between 6 to 7.
corrosion.
Compatibility Being a liquid,
easily dispersible & compatible
with concrete/mortar mixes.
Permeability It reduces the
permeability of
water
into
concrete.
Strength . The setting time
and compressive strength of the
Improves
Increases
durability
by
improving
waterproofing of concrete.
Fig. Water Proofing Compound
MODIFIER
integral
compound
composed
liquid
of
BONDING
COMPOUND
waterproofing
surface
CUM
active
www.iaetsd.in
repairs.
bricks.
construction work.
coverage
&
ABSORPTION
lesser
wastage
durability
MATERIAL CHARACTERISTICS
BRICKS
HARDNESS
www.iaetsd.in
STRUCTURE
soluble salts.
PAPERCRETE
established in fuature.
SOUNDNESS
produced.
www.iaetsd.in
When
using
papercrete
containing
the
repellent agents
GGBS
Quarry dust
Paper
environmental.
Papercrete is having the following derivatives,
PADOBE
Fibrous concrete
Padobe has on Portland cement. it is
Padobe
Fidobe
FIBROUS CONCRETE
FIDOBE
7
2nd INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ENGINEERING RESEARCH
22
www.iaetsd.in
ECO FRIENDLY
Phenomenal growth in the construction
industry
depends
upon
the
deflectable
materials
lead
to
irreversible
EXPERIMENTAL PROCEDURE
MANUFACTURING OF BRICKS
Fig. Mould
avoid leakage.
MOULD PREPARATION
After collecting all the materials, a
mould was prepared. A typical
mould is
pulp
before
mixing
with
other
www.iaetsd.in
rd
of it was
the
papers
were
MIXING
Fig.
Immersed
Paper
Fig. Mixing
PAPERCRETE MIX RATIO
Table : PAPERCRETE MIX RATIO
Trial Mix
Identif
Ingredients (%)
ication
Dr
9
2nd INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ENGINEERING RESEARCH
24
www.iaetsd.in
Mark
N
Dr
Ce
Pa
Qua
men
pe
rry
dust
GGBS
Fi
% of weight of
cement
xit
10
Fixit
302
casting place.
First
Super
Quarry
Latex
the
ingredients
dust/
GGBS
like
were
placed.
2
.
3
.
2
P1
20%
2
P2
P3
30%
50%
50ml
mix.
measured
kept
papercrete.
Glows,
first
shoes,
and
masks
were
for mixing.
evaporation.
CASTING OF BRICKS
10
2nd INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ENGINEERING RESEARCH
25
www.iaetsd.in
Dry
Identification
Mark
GGBS
1.
P1
20
1.773
2.
P2
30
1.842
3.
50
1.862
Weight
(kg.)
P3
www.iaetsd.in
% (24 hours)
Trail
Mix
20%
30%
50%
33.85%
(M2)
23.74%
TABLE
OF PAPECRETE BRICKS
% OF WATER ABSORPTION
50
40.11
%
40
33.85
%
30
The
ordinary
conventional
bricks
23.74
%
G-20%
20
G-30%
10
G-50%
0
P1
P224 HOURSP3
COMPRESSION TEST
constant
mass.
Cool
the
Fig. Compression test
12
www.iaetsd.in
movement.
Then the load was applied
papercrete
catastrophically,
it
brick
never
failed
just compressed
like
bricks
from
same
half compression.
time.
And the compressive strength
N/mm2
( 14 Days)
20%
30%
50%
PAPECRETE BRICKS
5.9
7.5
8.7
compression testing.
10
5.9N/
mm2
7.5N/
mm2
8.7N/
mm2
G2
P1
P2 14 DAYS P3
www.iaetsd.in
HARDNESS TEST
In this test, a scratch was made on
brick surfaces. This test was carried out for all
the three proportions of brick. While the
scratch was made with the help of finger nail
on the bricks, very light impression was left on
the fibrous concrete brick surface. So this test
results that fibrous concrete bricks are
sufficiently hard.
NAILING
STRUCTURE TEST
www.iaetsd.in
would
seem
to
indicate
that
www.iaetsd.in
lines
requires
minutes.
boxes.
observed.
So, nonflammable mortar should be
put behind the outlet boxes for safety.
papercrete.
FIRE
hours.
If the interior plaster and exterior
stucco is provided on the fibrous concrete
bricks, the bricks wont burn. The only
weak point is inside the block, near
electrical outlets, switches and other places
where wires gives through walls, into
boxes etc.,. Properly wired places never
which
is
used
for
CONCLUSIONS
www.iaetsd.in
rd
to
2/5
th
lesser
than
72-77.
partition walls.
405-413.
3. Lex
Terry,
(2006)Papercrete
Thermal
Since,
these
bricks
Envelope
Council
(BETEC)
are
brick
does
Ash
(WSA)
Cement
&
Concrete
with papercrete.
Composites,
6. R.Garcia
et
Properties
auditoriums.
Construction
will
reduce
&
Concrete
used,
Cement
of
al
(2008)
Paper
and
Pozzolanic
Sludge
Building
Waste,
Materials,
the
www.iaetsd.in
Concretes
and
Smart
18
2nd INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ENGINEERING RESEARCH
33
www.iaetsd.in
www.iaetsd.in
www.iaetsd.in
II. PRELIMINARIES
In this section, we describe the S-box and
the inverse S-box operations and their compositefield realizations. The S-box and the inverse S-box
are nonlinear operations which take 8-bit inputs and
generate 8-bit outputs. In the S-box, the irreducible
polynomial of is used to construct the binary field .
Let and be the input and the output of the S-box,
respectively, where is a root of , i.e., . Then, the Sbox consists of the multiplicative inversion, followed
by an affine transformation
[1]. Moreover, let and be the input and the output of
the inverse S-box, respectively. Then, the inverse Sbox consists of an inverse affine transformation
followed by the multiplicative inversion. The
composite fields can be represented using normal
basis or polynomial basis . The S-box and inverse Sbox for the polynomial and normal bases are shown
in Figs. 1 and 2, respectively. As shown in these
figures, for the S-box using polynomial basis
(respectively normal basis), the transformation matrix
(respectively 1) transforms a field element in the
binary field to the corresponding
representation in the composite fields . It is noted that
the result of in Fig. 1 (respectively in Fig. 2) is
obtained using the irreducible polynomial of
(respectively ).
III. FAULT DETECTION SCHEME
To obtain low-overhead parity prediction,
we have divided the S-box and the inverse S-box into
five blocks as shown in Figs. 1 and 2. In these
figures, the modulo-2 additions, consisting of 4 XOR
gates, are shown by two concentric circles with a plus
inside. Furthermore, the multiplications in are shown
by rectangles with crosses inside. Let be the output of
the block denoted by dots in Figs. 1 and 2 for the Sbox. As seen in Fig. 1 and . Similarly, from Fig. 2, ,
and . One can replace with and with for the inverse Sbox. In the following, we have exhaustively searched
for the least overhead parity predictions of these
blocks denoted by in Figs. 1 and 2. A. The S-Box and
the Inverse S-Box Using Polynomial Basis The
www.iaetsd.in
www.iaetsd.in
SCREEN SHOTS
www.iaetsd.in
www.iaetsd.in
REFERENCES
www.iaetsd.in
1. INTRODUCTION
There is an increasing demand for fuel nowadays and
it is soonexpected that there will be an acute shortage
in the fuel that weare using at present. Hence there is
a need to optimize the fuelusage.
Almost 10% of fuel in a vehicle is used for
maintaining thetemperature within it for the comfort
level of the passengers andthe main factor that
influences this is the air conditioner in thevehicle.
have made a carbon nano tube which is blasted
withGraphite vapors forming a chicken wired
structure. It is thencondensed with a polymer, which
brings up the required behavior of the material i.e. it
can act both as a sun proof sheetor as a normal
transparent sheet (allows sunlight to pass through)
according to the requirement. This can be stuck to
thewindow pane. Now a voltage of 5V is given to
change itsbehaviour from sun proof sheet to normal
sheet and vice versa.This eliminates the peak thermal
temperature attained in thevehicle when parked and
hence the work load of the AC isabruptly reduced.
2.FABRICATION OF CNT
Carbon nano tubes are tubular fibrous structures
composedentirely of graphitic carbon planes. The
carbon carbon doublebonds form a hexagon shape
within the lamellar graphite planesthat resemble
common chicken wire. The orientation of thegraphite
planes is parallel to the fiber axis along with
theseamless nature of tube structure that enables their
extrememechanical properties. This can be done by
ball milling or bynormal chemical vapor
Deposition method. It is then condensedwith a
polymer such as SMP (Shape memory polymer) to
get the requiredproperty.Large quantities of SWNTs
can be synthesized by catalyticdecomposition of
methane over well-dispersed metal particlessupported
on MgO at 1000C. The thus produced SWNTs can
beseparated easily from the support by a simple
acidic treatment toobtain a product with high yields
(7080%) of SWNTs. Because the typical synthesis
www.iaetsd.in
Fig 2 SWNT
(i)Materials required:
llactide, 1,4Butanediol(BDO) , stannous octate
(Sn(Oct)2),Hexamthylene diisocyanate (HDI) ,
www.iaetsd.in
3.ADVANTAGES
According to the statistics published, there is a
consumption of about 40 billion liters of gasoline/
year for the usage of airconditioners alone, assuming
80% of vehicles use AC. Even anincrease of 0.4
km/liter will save around $6 billion annually.
The results of a study showsthat the fuel consumption
of the test vehicles with air conditioning systems in
operation increases with rising ambientair
temperature and humidity, reaching a value of about
18 percent on a typical Swiss summer day with an air
temperature of27 degrees and relative humidity of
about 60%.
4.CONCLUSION
Using the CNT sheets in the window pane
isfollowed, then around 20 billion liters of fuel can be
saved in ayear approximately and the efficiency of
the vehicle will have an increase of 5-7% from the
normal value.
www.iaetsd.in
Sorting
by
Sequence-Dependent
Assembly".Science302 (5650): 15451548.
DNA
REFERENCES:
Sen, S.; Puri, Ishwar K (2004). "Flame synthesis of
carbon nanofibers and nanofibers composites
containing
encapsulated
metal
particles".
Nanotechnology15 (3): 264268.
Naha, Sayangdev, Sen, Swarnendu, De, Anindya K.,
and Puri, Ishwar K. (2007)."A detailed model for the
Flame synthesis of carbon nanotubes and
nanofibers".Proceedings
of
The
Combustion
Institute31: 182129..
Yamada T, Namai T, Hata K, Futaba DN, Mizuno K,
Fan J, et al. (2006). "Size-selective growth of doublewalled carbon nanotube forests from engineered iron
catalysts". Nature Nanotechnology1: 131136.
MacKenzie KJ, Dunens OM, Harris AT (2010). "An
updated review of synthesis parameters and growth
mechanisms for carbon nanotubes in fluidized
beds".Industrial
&
Engineering
Chemical
Research49: 532338.
Jakubek LM, Marangoudakis S, Raingo J, Liu X,
Lipscombe D, Hurt RH (2009). "The inhibition of
neuronal calcium ion channels by trace levels of
yttrium released from
carbon nanotubes".
Biomaterials30: 63516357.
Hou P-X, Liu C, Cheng H-M (2008). "Purification of
carbon nanotubes".Carbon46: 20032025.
Ebbesen TW, Ajayan PM, Hiura H, Tanigaki K
(1994)."Purification of nanotubes".Nature367 (6463):
519..
Xu Y-Q, Peng H, Hauge RH, Smalley RE (2005).
"Controlled multistep purification of single-walled
carbon nanotubes".Nano Letters5: 163168
Meyer-Plath A, Orts-Gil G, Petrov S et al. (2012).
"Plasma-thermal purification and annealing of carbon
nanotubes".Carbon50: 39343942..
Arnold, Michael S.; Green, Alexander A.; Hulvat,
James F.; Stupp, Samuel I.; Hersam, Mark C. (2006).
"Sorting carbon nanotubes by electronic structure
using
density
differentiation".Nature
Nanotechnology1 (1): 605.
Tanaka, Takeshi; Jin, Hehua; Miyata, Yasumitsu;
Fujii, Shunjiro; Suga, Hiroshi; Naitoh, Yasuhisa;
Minari, Takeo; Miyadera, Tetsuhiko et al. (2009).
"Simple and Scalable Gel-Based Separation of
Metallic and Semiconducting Carbon Nanotubes"..
T.Tanaka. "New, Simple Method for Separation of
Metallic and Semiconducting Carbon Nanotubes".
Zheng, M.; Jagota, A; Strano, MS; Santos, AP;
Barone, P; Chou, SG; Diner, BA; Dresselhaus, MS et
al. (2003). "Structure-Based Carbon Nanotube
www.iaetsd.in
P. Dhakshinamoorthi
PG Scholar
M.E - Embedded System Technologies
Nandha Engineering College
Erode, Tamilnadu, India
[email protected]
PG Scholar
M.E - Embedded System Technologies
Nandha Engineering College
Erode, Tamilnadu, India
[email protected]
WSN,RTC(DS1307),
I. INTRODUCTION
Recently the electronics industries and others facing
major production fault due to temperature and humidity, thus
temperature cause more defects like improper soldering joints,
extra oxidation of boards and bridging, solder components.
Even though the environment, particularly some machines like
solder paste refrigerator and desiccators for storage of paste and
bare PCB respectively also have to control over these
parameters.
Also some factory looking to control their machines
temperature with certain level to improve the efficiency of the
particular machine, such a case some time lead unexpected
accident, low product quality and more.
Hence now the monitoring and control system
established with LabView tool and interfaces of
microcontroller. But the authors have coming to share their
ideas in this paper, to implement the monitoring and allotment
the temperature and humidity system with ARM with porting
of RTLinux.
The system which is implemented with RTOS is
having multitasking capability to monitor multiple tasks and
controlling it. Also the system can add more applications by
www.iaetsd.in
A.ARM PROCESSOR
ARM designs microprocessor technology that lies at
the heart of advanced digital products, from mobile phones and
digital cameras to games consoles and automotive systems, and
is leading intellectual property (IP) provider of highperformance, low-cost, power-efficient RISC processors,
peripherals, and system-on-chip (SoC) designs through
involvement with organizations such as the Virtual Socket
Interface Alliance (VSIA) and Virtual Component Exchange
(VCX). ARM also offers design and software consulting
services.
E.RTC (DS1307)
The DS1307 Serial Real time clock(RTC) counts
seconds, minutes, hours, day of the week, date, month and
year.The purpose of an RTC or a real time clock is to provide
precise time and date which can be used for various
applications. RTC is an electronic device in the form of an
Integrated Chip (IC) available in various packaging options. It
is powered by an internal lithium battery. As a result of which
even if the power of the system is turned off, the RTC clock
keeps running. It plays a very important role in the real time
systems like digital clock, attendance system, digital camera
etc. In applications where time stamp is needed, RTC is a good
option. Using RTC for designing such application has always
been a good designers choice although the beginning might
be a bit difficult.While designing any real time system which
deals with time, there are two ways of handling the time
factor. One is to generate the time internally which is done by
programming the timers of the controller and the other is to
use an RTC. The RTC is low power, 56 bytes of non-volatile
RAM for data storage, 2 serial interface wire in bi-directional
and 8 pin Dual Inline Package. The battery backup mode is
less than 500nA and it has automatic power switching to
battery when power fails at 2 5 C. The RTC operates in
industrial temperature range from 4 0 C to +85C. It is used
in TV, VCR and phonenumber recall. The DS1307 RTC is
connected to ARM controller using IC bus with time counters
refer Table 1.
UNIT
COUNTING
CYCLE
CARRY TO
NEXT UNIT
Seconds
Minutes
Hours(24)
Hours(12)
00 to 59
00 to 59
00 to 23
12AM
01 AM to 11
AM
12PM
01 PM to 11 PM
59 to 00
59 to 99
23 to 00
-
Date
C. HUMIDITY SENSOR
Humidity is the presence of water in air. The amount
of water vapor in air can affect human comfort as well as many
manufacturing processes in industries. The presence of water
vapor alsoinfluences various physical, chemical, and biological
processes. Humidity measurement in industries is critical
because it may affect the business cost of the product and the
health and safety of the personnel. Hence, humidity sensing is
very important, especially in the control systems for industrial
processes and human comfort. Controlling or monitoring
humidity is of paramount importance in many industrial &
domestic applications. In semiconductor industry, humidity or
moisture levels needs to be properly controlled & monitored
during wafer processing
Months
Years
Weekdays
Timer
01 to 31
01 to 30
01 to 29
01 to 28
01 to 12
01 to 03
0 to 6
00 to 99
CONTENT OF
THE MONTH
COUNTER
-
11PM to 12AM
31 to 01
30 to 01
29 to 01
28 to 01
12 to 01
6 to 0
No carry
1,3,5,7,8,10,12
4,6,9,11,
F.SD Card
The SD-memory card is non-volatile flash memory,
portable device used in mobile, computer and other consumer
appliances. It gives high security, memory size can vary
depends on cost, used in audio and video recording.
The SD-memory card is a Secure Digital Input
Output (SDIO) card, it support data protection, avoid the
duplication sensed value in same timing and security systems
based on identification cards in International standard ISOD. GATEWAY
7816. An embedded version of MMC is eMMC, according to
The wireless gateways from Comcast provide the
the JESD84-A43. The interfacing of SD card with ARM using
functionality of a Wi-Fi router and voice modem in a single
Serial Peripheral Interface (SPI) bus and operates in 3.3volts
device. The wireless gateway functions such as firewall, port
in Table 2. It offers up to 8-bit wide interface and can be
forwarding, port blocking, diagnostic tools and WI-FI
applied in SD-memory card compatible hardware interfaces.
Protected Setup. It gives a secure wireless home network and
While the SD-memory card adds an advanced data storage
connects your computers, laptops, and other Wi-Fi electronic
functions
to an application and easily accessible.
products (such CONFERENCE
as game systems,
tablets, or
mobileINphones).
2nd INTERNATIONAL
ON CURRENT
TRENDS
ENGINEERING
RESEARCH
46
www.iaetsd.in
PIN
NUMBER
NAME
TYPE
DESCRIPTION
NCS
DI
SPI serial
(MOSI)
VSS
Ground
VDD
Power
CLK
SPI
serial
(SCLK)
VSS
Ground
DO
NC
nIRQ
Unused
Unused
data
in
clock
G. BUZZER
Buzzer is an audio signaling device and it is
mechanical, electromechanical or piezoelectric. It is used as
alarm device in timing manner and confirmation of user input
from personnel computer or other devices by making sound.
Buzzer is connected to ARM using one wire connecting wire.
H.LED
Light emitting diodes (LEDs) are semiconductor light
sources and it has two terminals. The light emitted from LEDs
varies from visible to infrared and ultraviolet regions. They
operate on low voltage and power. LEDs are one of the most
common electronic components and are mostly used as
indicators of circuit. LED display the monitoring value of
temperature and pressure in real time environment.
A. RTLinux
RTLinuxis open source hard real-time RTOS
microkernel.The function of the RTLinux is mostly depends
on kernel. The programming of RTLinux is written in Linux
command and C coding. It is portable, scalable, preemptive,
high-performance interrupt handling and multitasking kernel.
It is developed for commercial purpose by FSM Lab andWind
River System and it has connectivity with GUI and File
Systems. It is multi-environment real time kernel running in
core environment and supports multiple porting of devices. It
is easy to implement and highly secure real time system. It
supports processors and controllers embedded applications in
real time. RTLinux program coding supports compiler,
www.iaetsd.in
1-Wire bus. The 8-bit family code, a subset of the 64-bit ID,
identifies the device type and functionality.
Typically, 1-Wire slave devices operate over the
voltage range of 2.8V (min) to 5.25V (max). Most 1-Wire
devices have no pin for power supply; they take their energy
from the 1-Wire bus (parasitic supply). It is a unidirectional
bus and it is connects the LED display to ARM processor.
A. SPI BUS
SPI (Serial Peripheral Interface) bus is a low power,
full duplex, master-slave interfacing bus. It is solid role in
embedded systems whether it is system on chip processors,
both with higher end 32-bit processors such as those
using ARM,
MIC
or Power
PC and
with
other
microcontrollers such as the AVR, PIC etc. These chips
usually include SPI controllers capable of running in either
master or slave mode. In-system programmable AVR
controllers can be programmed using an SPI interface. Chip
or FPGA based designs sometimes use SPI to communicate.
So, SPI is a common technology used nowadays for
communication with peripheral devices where we want to
transfer data speedily and within real time constraints. There
are many serial interfaces right from Morse code telegraphy,
RS232, USB, Fire wire, Ethernet and many more. Each serial
interface offers advantages or disadvantages for many designs,
depending on criteria such as needed data rate, space
availability, and noise considerations. It is simple 4 wire serial
communication bus and it operates on 10MH. In SPI data is
shifted in /out one at a time and transmit data from master
device to/from one or more slave devices over short distances.
It is high speed data transferring bus and no limit upto 8 bit
transfer.The SPI bus is straightforward and versatile, enabling
simple and fast communication with a variety of peripherals.
A high speed multi-IO mode host adapter and some invaluable
tool in debugging as well as adding SPI communication
capabilities to any test system.
V. CONCLUSION
In this paper, the authors are develops the idea to
monitor the temperature and humidity value using wireless
sensor in Real time. In this paper the existing model has to
monitor the temperature and humidity value using
microcontroller. The result of this paper is more secure to keep
the monitoring data in real time RTLinux. In future, ability to
add some more tasks to monitor, such as employee
authentication checking, data logging of cctv camera and etc.
The values of the monitoring data in real time are displayed on
the LED and Buzzer for intimation of warning.
VI. REFERENCES
Better
B. IC BUS
Two wires: serial data (SDA) and serial clock (SCL).
All I2C master and slave devices are connected with only
those two wires. Each device can be a transmitter, a receiver or
both. Some devices are masters they generate bus clock and
initiate communication on the bus, other devices are slaves
and respond to the commands on the bus. In order to
communicate with specific device, each slave device must
have an address which is unique on the bus. I2C master
devices (usually microcontrollers) dont need an address since
no other (slave) device sends commands to the master .It
supports both Multi-master and Multi-slave, so it can detect
the collision easily. It supports 7 and10-bit addressing and
each device connects to the bus using software with unique
address. The maximum speed of the IC bus is 3.4Mbits/sec
and it varies depends on the modes of application. IC bus is
simple and flexible used in many applications.I2C bus is
transferred in 8-bit packets (bytes). There is no limitation on
the number of bytes, however, each byte must be followed by
an Acknowledge bit. This bit signals whether the device is
ready to proceed with the next byte. For all data bits including
the Acknowledge bit, the master must generate clock pulses. If
the slave device does not acknowledge transfer this means that
there is no more data or the device is not ready for the transfer
yet. The master device must either generate Stop or Repeated
Start condition.
[5].Prasath.A,
Dineshbabu.N,CompleteIndustrialSolution
for
Automation in Temperature andHumidity Monitoring using
Microcontrollerpresented at NCICC-2014,SNS College of
Technology at 2014.
[6].Tamilselvan.K,
Dhakshinamoorthi.P,An
Efficient
Data
Acquisition System for Microcontrollers with RTOS presented at
PCID-2014, BannariammanInstitute of Technology.
www.iaetsd.in
ABSTRACT
I. INTRODUCTION
The recent developments in the manufacturing world
have led to a revolutionary change in the design and
development of various systems. Developments in
welding technology are one of such changes.
Welding processes have been used extensively as a
joining technique, used in design and fabrication of
various structures like naval ships, airplanes,
automobiles, bridges, pressure vessels, etc. Welding
has emerged as a better option in contrast to other
joining techniques in terms of joint efficiency,
mechanical properties with a greater application
impact.
www.iaetsd.in
www.iaetsd.in
Propeller
Electromagnetic Wheels
Welding Rod holder and Rod
Stepper Motors
ATmega 16 Microcontroller
Camera
Lights
a.) Propeller
A propeller is a mechanical device for
propelling a boat or aircraft, consisting of a revolving
shaft with two or more broad, angled blades attached
to it. There are 4 propellers used in this robot. Two
propellers face the front side and the other two
propellers face the top side. When the propellers in
the front rotate clockwise the robot moves forward
and vice versa for anticlockwise direction, and when
the propellers at the top rotate clockwise the robot
moves up and vice versa for the anticlockwise
direction. The side wards movement i.e. Right to left
is done by deflecting the propeller arm.
www.iaetsd.in
www.iaetsd.in
f.) Camera
Camera is a device for recording visual
images in the form of photographs, film, or video
signals. The camera here converts the image to the
co-ordinate system. This co-ordinate system helps to
find the weld area in this context. The camera here is
supported by the focus light system on the either side.
CONCLUSION
The working safety is an important factor
for the weld done in the underwater. The threat to the
welder is from various aspects during the weld. This
exclusive model of a robot will be a solution for the
problems related to the underwater welding. There is
also a numerous future scope for this system.
REFERENCES
[1] Anand and Khajuria(2013), welding processes in
marine applications: a review, International Journal
of mechanical engineering research and robotics,
Vol.2, Jan2013, ISSN 2278-0149
www.iaetsd.in
www.iaetsd.in
MODELING OF MAGNETICALLY
COUPLED EMBEDDED Z SOURCE
INVERTER
V. Vidhya1, Jeyasree Tagore2 , ME. Applied Electronics
Professor V.Thyagarajan Ph.d ,Dean Electronics &Communication Department.
Sriram Engineering College, Perumalpattu, Chennai
[email protected],[email protected]
ABSTRACT
This Project deals with an Embedded Z source inverter to control the three phase induction motor. The Z
source inverters are recent topological options for buck boost energy conversion with a number of
possible voltage and current type circuitries. Embedded Z Source inverter is a single stage converter
which performs both buck boost energy conversions using the LC impedance network. The proposed
inverters provide high boost voltage inversion ability, a lower voltage stress across the active switching
devices, a continuous input current and a reduced voltage stress on the capacitors. In addition, they can
suppress the startup inrush current, which otherwise might destroy the devices. The microcontroller is
used to generate PWM pulses and to control operation of Z Source inverter. The complete hardware is
designed to drive the three phase induction motor. This paper presents the operating principles, analysis,
and simulation results, and compares them to the conventional switched inductor Z source inverter. The
desired three phase PWM signals are generated by using control circuit and detailed hardware results are
presented.
KEYWORD
Embedded Z source, PWM, voltage boost, Z Source Inverter, Boost inversion ability, motor drives, buck
boost.
1.
INTRODUCTION
www.iaetsd.in
SYSTEM CONFIGURATION
An impedance network abbreviated as ZSource is couples the inverter main circuit and
input power source. Z-Source circuit consists
of two capacitors and two inductors connected
in such a way as to form second order filter,
smoothens dc link voltage and current. Zsource inverter circuit provides both voltage
buck and boost properties, which cannot be
achieved with conventional voltage source
and current source inverters. Three phase
inverter circuit consists of six switches
connected in three legs, converts input dc link
voltage in to corresponding three phase ac
voltage. Microcontroller and driver circuit is
used to control on/off time of switching
devices in a proper sequence in a particular
time used in the main inverter circuit.
Microcontroller PIC used to generate
modified maximum constant boost PWM
signal. These PWM signal is applied to the
gate terminals of MOSFETs through gate. ZSource is the X Shaped structure consists of
L1, L2, C1, and C2 in which we can obtain
both buck-boost operations in single stage
conversion. In this DC Source is placed at farleft in series with diode. So, by this, chopping
is occurred in the source current which is
caused by the commutation of diode D. So, in
this condition to smoothen the source current
an additional LC filter is required which
would rise over all cost of the system and
construction of the system by this additional
LC filter is complex. So, to overcome the
above drawbacks, a new technique is
RELATED RESEARCH
www.iaetsd.in
Vd=VD= 0
Idc=IL+IC Ii= IL IC
Idc 0
Mode III:
Shoot-Through(Sx= SxON, x = A, B, or C;
D = OFF)
VL=VC +V dc /2 Vi= 0
Vd= VD= 2VC The inverter bridge is
operating in one of the seven shoot-through
states. The equivalent circuit of the inverter
bridge in this mode is as shown. This mode
separates the dc link from the ac line. This
shoot-through mode is to be used in every
switching cycle during the traditional zero
vector period generated by the PWM control.
Depending on how much a voltage boost is
needed, the shoot-through interval (T0) or its
duty cycle (T0/T) is determined. It can be
seen that the shoot-through interval is only a
fraction of the switching cycle.
Mode 1
In this mode, the inverter bridge is operating
in one of the six traditional active vectors; the
equivalent circuit. The inverter bridge acts as
a current source viewed from the DC link.
Both the inductors have an identical current
value because of the circuit symmetry. This
unique feature widens the line current
conducting intervals, thus reducing harmonic
current.
4. TYPES OF EZ-SOURCE
In this embedded Z-Source inverter, we have
A) Shunt embedded Z-Source inverter
B) Parallel embedded Z-Source inverter
A) Shunt embedded z-source inverter:
In general we have jumping currents which
flow
in the input DC source which will induce the
power Interruption in the input. By this
jumping currents, the complexity to control
maximum power and designing of system
increases. To overcome the traditional
network, Shunt EZ-Source is proposed,
Shunt EZ-Source consist two types
1. Partially shunt EZ-Source
2. Fully shunt EZ-source
Non-shoot-Through (SxSx, x = A, B, or C;
D = ON)
VL=Vdc /2 VCVi= 2VC
www.iaetsd.in
inverter:
In this PSEZ-Source inverter, VSI operates as
current source inverter during shoot-through
conditions. A switch SW is used for removing
the unwanted conditions of the diode during
voltage boost operations and it should be
turned off during traditional CSI
5.
SIMULATION RESULTS:
www.iaetsd.in
6.CONCLUSION
The partially parallel embedded Z-Source
inverter with reduced switches reduces
number of PV panels and wind power;
Capacitor rating smoothens source current and
also reduces total harmonic distortion. PPEZSource inverter makes system compact which
reduces cost and switching losses, lower
voltage stresses and line harmonics. The two
main objectives for WECSs are extracting
maximum power from wind and feeding the
grid with high-quality electricity. Compared
to conventional WECS with simple boost
converter based Z-Source inverter method, the
voltage profile is improved 35% by using
maximum constant boost with third harmonic
injection based Z-source inverter method.
REFERENCE
www.iaetsd.in
Abstract
RSVP is a receiver oriented reservation
protocol being an Internet standard approved by
Internet Engineering Task Force [IETF].The goal of the
Resource ReSerVation Protocol (RSVP) is to establish
Quality of Service information within routers and host
computers of the Internet. High speed networks support
use of dedicated resources through Resource
Reservation Protocol (RSVP). With RSVP, the network
resources are reserved and released there by providing
a mechanism to achieve a good quality of service (QoS).
This requests to reserve a path are transmitted in the
network b/w the data senders and receivers. This paper
provides an analysis of the RSVP protocol used in peerto-peer networks where each system works
simultaneously
as
client
and
server.
This
experimentation for Audio and video conferencing
application in various scenarios implemented in
OPNET software. This RSVP protocol reduces the
packet end-to-end delay.
I. INTRODUCTION
Resource ReSerVation Protocol (RSVP) is a
receiver oriented resource reservation setup protocol
designed for Integrated Services Internet. RSVP has a
number of attributes that make it be adopted as an
Internet standard approved by Internet Engineering
Task Force (IETF) [1]. These attributes include
scalability, robustness, flexibility, dynamic group
membership, and stability for multi cast sessions,
support for heterogeneous receivers, and varieties of
reservation styles. However, the RSVP designed for
www.iaetsd.in
www.iaetsd.in
I.
throughput
PRESENT WORK
www.iaetsd.in
www.iaetsd.in
www.iaetsd.in
IV. CONCLUSION
This paper presents a performance analysis
of the RSVP protocol. We simulate two logical
scenarios while incorporating the voice and the video
applications. The scenarios differ in the number of
hosts among which the communication takes place.
We use the peer-to-peer model for network
communication. The RSVP protocol is evaluated in
terms of the metrics of the control traffic sent and the
packet end-to-end delay.
Both for the voice application and video
application, a large number of RSVP control traffic is
sent only if the amount of data being transmitted
conforms to the flow specification given for RSVP.
For scenarios with small number of hosts, a large
amount of data meets the requirement, thereby
generating a large amount of RSVP control traffic.
RSVP therefore reserves the resources and allows
dedicated communication. Consequently, the
communication performance improves as the packet
end-to-end delay decreases. In contrast, for scenarios
with large amount of data, the RSVP protocol is
unable to perform well and the delay increases for
voice application.
REFERENCES
[1] M. A. Khan, G. A. Mallah* And A. Karim
Analysis Of Resource Reservation
Protocol (Rsvp) For P2p Networks.
[2] Vikas Gupta1, Baldev Raj2 Optimization
Of Real-Time Application Network Using
RSVP ISSN: 22316612 Oct. 2013
[3] Braden R., Et Al. Resource Reservation
Protocol (RSVP) -- Version 1: Functional
Specification. RFC 2205, IETF, September,
1997.
[4] Mara E. Villapol , Jonathan Billington A
Coloured Petri Net Approach To
Formalising And Analysing The Resource
Reservation Protocol
[5] Lixxia Zhang, Stephen Derring, Deborah
Estrin, Scott Shenkar, And Daniel Zappala
RSVP: A New Resource Reservation
Protocol IEEE Sep 1993.
www.iaetsd.in
VERSATILE BICYCLE
(AN AMPHIBIOUS VEHICLE)
-Shyam.C,
IV yr, Mechanical Department,
ID no: VM6446,
Veltech Multitech Engineering College
Mob:9962685946 E-Mail: [email protected]
-Saravana Muthu.K,
IV yr, Mechanical Department,
ID no: VM6484,
Veltech Multitech Engineering College
Mob:9962096121 E-Mail: [email protected]
-Santhosh.P,
IV yr, Mechanical Department,
ID no: VM6431,
Veltech Multitech Engineering College
Mob:7708577673 E-Mail: [email protected]
ABSTRACT
www.iaetsd.in
MATERIALS USED
Material
Bicycle
Thermocol
Specifications
No.
density of 20
kg/m3 ,200 mm
thickness
M.S.Sheet
M.S.Sheet
M.S.Sheet
Iron rod
3mm thickness
6 mm thickness
1 mm thickness
Tempered,
6mm dia
Standard
Standard
Standard
Single
side
threaded
Double
side
threaded
Lorry hinges
Chain drive
Sprocket
Hub
Hub
4
4
2
2
1
1
THERMOCOL
THE L - CLAMPS
The L-clamps are
re made of mild steel of thickness
3mm and 6 mm. The clamp is foldable and can be
folded while operating the bicycle on the land. The
folding is done by fixing hinges. The thermocol
blocks can be fitted and locked by using bold and
nuts. The thermocol can be attached or detached
detache
according to the riders wish. The supporting rod
should be fitted while moving in water.
www.iaetsd.in
PADDLES
The paddle is used to give displacement in water. Its
made of sheet metal of 1 mm thickness. The paddles
are nothing but blades that rotate by peddling action.
The paddle blades are welded to a hollow pipe which
is welded to a hub.
ub. The hub is welded with the
sprocket and chain drive connects the paddle sprocket
with the rear double threaded hub sprocket. Thus the
paddle rotate by the chain drive power transmission.
There are 6 blades in total which acts as paddle in the
versatile bicycle.
EXPERIMENTAL DETAILS
Average speed in water : 4 to 5 km/hr
Average speed on land : 15 to 20 km/hr
Time for fitting the
thermocol blocks
: 2 to 3 mins
: 1 to 2 mins
www.iaetsd.in
BUOYANCY FORCE
ADVANTAGES
BICYCLE
PROPERTIES
OF
EXPANDED
POLYSTYRENE (THERMOCOL)
Typical Properties:
Density Range
15-30
Kg/m
0.8-1.6
Kg/cm
1.4-2.0
Kg/cm
Tensile Strength
3-6 kg/cm
Application Range
-200 +80
deg C
Water absorption by %
Volume for 7 days in 0.5%
water
Self ignition point
300 C
Melting Range
100-200C
OF
VERSATILE
www.iaetsd.in
DESIGN CALCULATIONS
Density of water
Density of thermocol
1 g/cm3
= 20 kg/m3 =>
0.02g/cm3
Weight
Bicycle
25 kg
Rider
75 kgs
Total
www.iaetsd.in
APPLICATIONS
BICYCLE
OF
VERSATILE
like
Velachery,
Madipakkam,
LIMITATIONS
BICYCLE
OF
VERSATILE
www.iaetsd.in
COST OF FABRICATION
S.NO
COMPONENTS
COST
BICYCLE
2000
THERMOOL
1000
M.S.SHEET
1000
MISCELLENEOUS
(HUBS,SPROCKETS,CHAINS
ETC)
1000
FABRICATION
(LABOR,TRANSPORTATIONS
ETC)
2000
TOTAL
7000
REFERENCE BOOKS
An Introduction To Fluid Dynamics by Bachelor
Fluid mechanics by R.K.Bansal
COMMERCIALIZATION
PRODUCT
OF
OUR
FUTURE
DEVELOPMENTS
VERSATILE BICYCLE
ACHIEVEMENTS
BICYCLE SO FAR
OF
VERSATILE
IN
easily
www.iaetsd.in
MRINALINI SHRIDHAR
STUDENT
SRM UNIVERSITY
R OVIYA
STUDENT
SRM UNIVERSITY
www.iaetsd.in
in both the aspects ,but only thing was that there need
to be a lot of adjustments in the rules given by each
model. We are in the scoop of improving the
database system and protecting it. In 2005, about
45% of the inquired entities have reported increased
unauthorized access to information due to the poor
system management. In 2007, financial application
fraud was the leading cause and found it double as
compared to the previous year also 59% of the
respondents outlined insider abuse as the security
problem. In 2013, survey the number has dropped
down and the security was much more than the past
few years. The statistics being, the percentage threats
due to insiders has been dropped to 20% and the
financial fraud which was a cause before were
eliminated in the upcoming years. Now only 10-20%
are reported as unauthorized users. This shows that
the database security has been improving day to day
and researches have been conducted every time a
model is proposed before implementing to action.
USERS
TASK /JOB
ACCESS
CONSTRAINTS
SESSIONS
3.RELATED WORKS
RBAC supports three well known principles and
hence we work out our plan in 3 steps:
1. Principle of minimal authority
2. Divide and rule method of duties
3. Data abstraction
User
Data secured
Data abstraction
Data
FIG 2. DATA FLOW DIAGRAM
The sensitivity of an attribute is based on
the database application. We have to divide the
attributes into 3 divisions so as to protect the
attributes according to the sensitivity or the position
order they hold. Sensitivity refers to the position
order a data has to be protected. If the data are least
sensitive we can give it minimal protection. If the
data are highly sensitive in the attribute set we need
www.iaetsd.in
NAME*
STAFF ID*
ADDRESS*
DATABASE
STAFF
TABLE NAME
ATTRIBUTE NAME
GETS
Name [i], Staff-id [j], Address
[d], Phone no [a]
STAFF
ACCOUNT
SALARY TYPE
ACCOUNTS
Administrator
ACCOUNT
ATTRIBUTE
Light
sensitivity
a, b, c, d, i, ,j ,k
Medium
sensitivity
e, f
II
High sensitivity
g, h, l
III
AMT DEPOSIT***
STATUS**
WEIGHTS
a) Principal of minimal authority- Also known as
the principle of least privilege means that the access
to the information system or its resources for only its
own legitimate purpose by every user or the module.
In simple words, we can say that an authorized user
can access that information system or the resource
only for their own privileged purpose. Privileged/
Authority refers to the right a user has or granting
access to the user to use a particular system. For
example, the user defined in its domain can access
only its domain and its attributes. The person
accessing a bank account can go through only their
bank procedures and account. The system does not
access or grant permission to access other accounts.
Similarly an admin user accessing a computer can go
into only the admin user account all other password
accounts are blocked for the admin user.
b)Divide and rule method of duties- it can also be
termed as the separation of duties among the users. It
helps the task to be completed faster. A mutual
exclusive role is achieved to complete a particular set
of task. RBAC brings this advantage of time
management. the database is secured as well as the
data are given to the authorized people easily with
security.
c)Data abstraction- Data abstraction is a simple
concept of accessing the data whenever we want to
but with the permission of authorized people. It has
different modes to it.
www.iaetsd.in
4. IMPLEMENTATION
RBAC is a complex system that involves a
strategic process prepared by an expertise. RBAC is
best implemented by applying a structured and
detailed procedure. The use of divide and rule
method is very essential to implement these process.
Each task or step is broken down into sub tasks for
the work and implementation to be easier and more
efficient. The steps involved are:
DEVELOP PLANS
COMPILE
DEFINE ROLES
INTERGRATE
IMPLEMENT
FIG 4.PROCESS
www.iaetsd.in
Syntax:
P=>0
no process
|P|P
composition of the process
| O(P).X output value of the process, X is the
outcome.
| I(P).Y
input value/ getting input from the
user of the process, Y is the input variable.
| !!I(P).Y repetition of the input variables.
6.CONCLUSION
Intrusion detection mechanism helps to
secure the data in an organization. In this paper we
have discussed in detail how the database could be
secured by using Role Based Access Control System.
The key benefits of RBAC are high efficiency and
low maintenance cost for any type of organization be
it big or small. Also RBAC system could be designed
and used to improve the operational performance and
strategic business value. This system could
streamline and automate any business procedures,
thus providing high/ better/ faster benefits to the user.
It also helps to maintain privacy and confidentially of
the employees in any organization. Thus we can
conclude that mission to protect any key business
process is a main vision of RBAC system in database
intrusion detection.
www.iaetsd.in
REFERENCES
[1] Intrusion detection database system with dynamic
threshold value By Khomlal sinha and Tripti Sharma
[2] Database Intrusion Detection using Weighted
Sequence Mining Abhinav Srivastava1, Shamik Sural1 and
A.K. Majumdar2
[3] J. Han, M. Kamber, Data Mining: Concepts and
Techniques, Morgan Kaufmann Publishers (2001).
[4] U. Fayyad, G. P. Shapiro, P. Smyth, The KDD Process
for Extracting Useful Knowledge from Volumes of Data,
Communications of the ACM, pp. 27-34 (1996).
[5] R. Bace, P. Mell, Intrusion Detection System, NIST
Special Publication on Intrusion Detection System (2001).
[6] A. Srivastava, S. Sural, A.K. Majumdar, Weighted
Intratransactional Rule Mining for Database Intrusion
Detection, Lecture Notes in Artificial Intelligence, Springer
Verlag, Proceedings of Pacific-Asia Conference in
Knowledge Discovery and Data Mining, pp. 611-620
(2006).
[7] W. Lee, S.J. Stolfo, Data Mining Approaches for
Intrusion Detection, Proceedings of the USENIX Security
Symposium, pp. 79-94 (1998).
[8] D. Barbara, J. Couto, S. Jajodia, N. Wu, ADAM: A
Testbed for Exploring the Use of Data Mining in Intrusion
Detection, ACM SIGMOD, pp. 15-24 (2001).
[7] C. Y. Chung, M. Gertz, K. Levitt, DEMIDS: A Misuse
Detection System for Database Systems, IFIP TC-11 WG
11.5 Working Conference on Integrity and Internal Control
in Information System, pp. 159-178 (1999).
[8] V.C.S. Lee, J.A. Stankovic, S.H. Son, Intrusion
Detection in Real-time Database Systems Via Time
Signatures, Real Time Technology and Application
Symposium, pp. 124 (2000).
[9] Intrusion detection database system with dynamic
threshold value By Khomlal sinha and Tripti Sharma
[10] Database Intrusion Detection using Weighted
Sequence Mining Abhinav Srivastava1, Shamik Sural1 and
A.K. Majumdar2
[11] S.Y. Lee, W.L. Low, P.Y. Wong, Learning
Fingerprints for a Database Intrusion Detection System,
Proceedings of the European Symposium on Research in
Computer Security,
pp. 264-280 (2002).
www.iaetsd.in
Mathivani.M,
Department of EEE,
Kongu Engineering College,
Perundurai.
[email protected]
based
upon
are
The
Brainwaves and Addiction.
ABSTRACT:
Addiction is a chronic disease
causing disorder in the brain memory
and related circuits leading to
characteristic biological, psychological,
social and spiritual manifestations. This
is
reflected
in
an
individual
pathologically pursuing relief by
unrecommended substance use and other
behaviors. In the world, about 47% of
people are found to spend their waking
hours in thinking of matters apart from
their normal mind-set and about 80% of
the people are addicted to one more
addictive substances. In this paper we
are going to explain how addiction could
be avoided using an embedded device by
using the phenomenon of frequency
following response of the brain by
controlling brain waves.
Brain,
1.1.THE BRAIN:
Brain, an electrochemical organ
which functions as a coordinating centre
of sensation, nervous activity and
intelligence. At the root of all our
thoughts, emotions and behaviours is the
communication between neurons within
our brains. Brainwaves are produced by
synchronised electrical pulses from
masses of neurons communicating with
each other. The Brainwaves are
produced by the lobes of the brain and
they are,
Frontal lobe
Parietal lobe
Temporal lobe
Occipital lobe
Limbic lobe
Insular cortex
1.INTRODUCTION:
Before going on to details we
are supposed to know
the basic
terms.The basic terms that this paper is
www.iaetsd.in
Fig 1.1
Researchers have speculated that
a fully functional brain generates as
much as 10 watts of electrical
power.Other conservative investigators
calculated that the brain generates 50
milli volts. Although, the generated
power is limited in very specific ways it
occurs as a charateristics of the human
brain.
1.2.BRAINWAVES:
Electrical activity emanating from
the brain is displayed in the form of
brainwaves. It is important to know that
all humans display five different types of
electrical patterns or brain waves
across the cortex. Our brainwaves
change according to what were doing
and feeling. When slower brainwaves
are dominant we can feel tired, slow,
sluggish, or dreamy. The higher
www.iaetsd.in
Brainwaves
Frequency range
(Hertz)
1)
Delta
0.5 4
2)
Theta
5-8
3)
Alpha
9 14
4)
Low Beta
15 32
5)
High Beta
32 40
6)
Gamma
40-100
Fig 1.2
1.2.1.ADDICTION:
There are two types of addiction:
Physical dependency
Psychological dependency.
Physical dependence can happen
with the chronic use of many drugs
including many prescription drugs even
if taken as instructed. Thus, physical
dependence in and of itself does not
constitute addiction, but it often
accompanies addiction.
In this paper, we are going to solely
consider the psychological addictions in
designing the addiction avoider device.
1.2.2.PSYCHOLOGICAL
DEPENDENCY:
A person becomes dependent on
something to help alleviate specific
emotions. Psychological dependence
begins after the first trial which a person
then becomes satisfied and the
satisfaction increases with each use. This
constant feeling leads to psychological
reinforcement which eventually leads to
dependence. Along with substances,
www.iaetsd.in
www.iaetsd.in
Fig 1.4
The Atmel 8515(Refer Fig 1.4)
microcontroller is a 40 pin, 4 MHz 8bit
microcontroller and has 8K FLASH, 512
EEPROM, 512 SRAM.The AT90S8515
is
a
low-power
CMOS
8-bit
microcontroller. It has an internal analog
to digital converter (ADC) and internal
battery.
The signal that is sent by the
sensors is converted from analog to
digital signal. The microcontroller has a
Fig 1.3
2.3.EXPLANATION
WORKING:
OF
THE
www.iaetsd.in
2.3.3.OSCILLATORS:
The oscillator is designed in such
a way that it produces a particular audio
wave below 1500 Hz. The oscillator will
be designed such that it has 10 13 Hz
difference in frequency with oscillator 1.
This difference in frequency creates
Binaural Beats. Thus if the brain of an
individual produces 32 40 Hz (High
Beta waves) i.e. if he/she is in stress or
addicted to some substance, the binaural
beats having a frequency of about 10-13
Hz creates a stimulus making the brain
to move towards the stimulated
frequency.
5.DEMERITS:
1) Those meeting any of the
following
criteria/conditions should not use
binaural beats
Brain disorders
Pregnant women
People with heart disorders
Photosensitive people
2.3.4.STEREO HEADPHONE:
The sensation of auditory
binaural beats occurs when two coherent
sounds of nearly similar frequencies are
presented one to each ear with stereo
headphones or speakers. This is done by
sending audio waves from one oscillator
to one of the two sides of the headphone
and another oscillator to another side of
the headphone.
6.CONCLUSION:
Addiction Avoider is the safest
and simplest device to use in prevention
of Addiction. It is used for any type of
addiction like addiction caused by taking
narcotic drugs or alcohol and simple
addictions like overeating, sexual
intercourse and mannerisms.
3.FUTURE PROSPECTS:
www.iaetsd.in
7.REFERENCE:
[1]Wilson.R.Palacios, Cocktails and
dreams: Perspectives on drugs and
alcohol use
[12]www.angelfire.com/empire/serpentis
666/Brainwaves.htm
www.iaetsd.in
I.Introduction
Glass fiber Reinforced Plastics (GFRP) are widely
being used in the automotive, machine tool
industry, aerospace components, sporting
equipments [1] because of their particular
mechanical and physical properties such as specific
strength and high specific stiffness. An aircraft
fuselage structure around 100,000 holes is
required for joining purpose [2, 3]. About 60% of
the rejections are happening in aircraft industry
due to the defects in the holes [4]. Many of these
problems are due to the use of non-optimal
cutting tool designs, rapid tool wear and cutting
parameters [5, 6]. Among the defects caused by
drilling with tool wear, Delamination appears to be
the most critical [7].The surface finish of the work
piece is an important attribute of hole quality in
any drilling operation. During machining many
www.iaetsd.in
A. ANOVA
The Analysis of variance is extensively used to
analyze the experimental results. ANOVA tests the
significance of group difference between two or
more groups. The normal probability plot
represents that all the points on the normal plot
lie close to the straight line (main line) or not.
Versus fits plots represents that how far deviation
occur from the normal distribution. An interaction
plot is occurs when the change in response from
the one level of a factor to another level differs
from change in response at the same two level
second factor. A main effect plot is present when
different levels of an input affect the responses
directly.
A. Methodology
www.iaetsd.in
C.
Constant
4.873
2.352
2.07
0.05
8.56e-4
1.09e-3
-0.78
0.442
2.494
1.367
1.49
0.151
0.2487
0.1673
2.07
0.017
Source
DF
SS
MS
Regression
77.44
25.81
2.05
0.135
Residual
Error
23
289.54
12.59
Total
26
366.99
www.iaetsd.in
E .Defuzzification
The aggregate output of all the rules which is in
the form of fuzzy set is converted into a numerical
value (crisp number) that represents the response
variable for the given data sets. In the present
work, the centroid defuzzification method is used
for this purpose. It is the most popular method
used in most of the fuzzy logic applications. It is
based on the centroid calculation and returns
center of area under the curve.The predicted
values of surface roughness are compared with
the experimental output, prediction model output
and fuzzy output. The comparison of prediction
performance in fuzzy logic output, prediction
model output with the experimental results is
given in the Table 3.
20
15
Experimental
Value
10
5
Predicted
Value
Fuzzified
Value
1 5 9 13 17 21 25
Hole number
www.iaetsd.in
Table 3: Surface roughness values for Experimental output, Predicted output and Fuzzy output
S.
No
Plate
thickness
t (mm)
Speed
s(rpm)
Feed
f(mm/rev)
Point
angle
()
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
5
5
5
5
5
5
5
5
5
10
10
10
10
10
10
10
10
10
15
15
15
15
15
15
15
15
15
280
280
280
900
900
900
1800
1800
1800
280
280
280
900
900
900
1800
1800
1800
280
280
280
900
900
900
1800
1800
1800
0.18
0.71
1.40
0.18
0.71
1.40
0.18
0.71
1.40
0.18
0.71
1.40
0.18
0.71
1.40
0.18
0.71
1.40
0.18
0.71
1.40
0.18
0.71
1.40
0.18
0.71
1.40
10732'07"
10729'47"
10725'32"
10720'44"
10717'58"
10715'20"
10719'31"
10712'25"
10708'28"
10702'57"
10647'11"
10639'47"
10630'09"
10628'42"
10624'50"
10621'20"
10619'26"
10616'32"
10632'07"
10558'10"
10552'37"
10544'12"
10536'04"
10514'39"
10522'42"
10508'35"
10458'49"
Fuzzy
output
3.19
11.98
6.49
4.09
9.16
8.79
12.96
7.27
3.33
5.64
8.98
11.42
1.76
7.12
8.58
7.72
10.07
8.97
8.37
10.48
15.75
5.43
18.25
11.43
4.74
6.64
8.55
2.15
10.00
5.75
3.62
7.87
7.87
12.1
5.75
2.50
3.62
7.87
10.00
2.19
5.75
7.87
5.75
10.00
7.87
7.87
10.00
14.30
3.62
16.4
10.00
3.62
5.75
7.87
6.3224
7.6421
9.3602
5.7892
7.1089
8.8270
5.0152
6.3349
8.0530
7.5674
8.8871
10.6052
7.0342
8.3539
10.0720
6.2602
7.5799
9.2980
8.8124
10.1321
11.8502
8.2792
9.5989
11.3170
7.5052
8.8249
10.5430
www.iaetsd.in
VI .Conclusion
[11]M.Chandrasekaran,
M.Muralidhar,
C.M.Krishna and U.S.Dixit, Application of soft
computing techniques in machining performance
prediction
and
optimization:a
literature
review,Int J Adv Manuf Technol,Vol.46(2010) 445464.
VII .References
[14]
Bala
Murugan
Gopalsamy,Biswanath
Mondal,Sukamal Ghosh,Optimisation of machining
parameters for hard machining:grey relational
theory approach and ANOVA,The International
journal of Advanced Manufacturing Technology 45
(2009) 1068-1086.
[15]Vikram
Banerjee
et.al,Design
space
exploration of mamdani and sugeno inference
systemsfor fuzzy logic based illumination
controller, International journal of VLSI and
Embedded system-IJVES (2012) 97-101.
www.iaetsd.in
2
1
[email protected],[email protected]
1.INTRODUCTION:
RECENT emergence of data enabled
mobile devices and wireless-enabled data
applications have fostered new content
dissemination models in todays mobile
ecosystem. A list of such devices includes
Apples
iPhone,
Googles
Android,
Amazons Kindle, and electronic book
readers from other vendors. The array of
data applications includes electronic book
and magazine readers and mobile phone
Apps. The level of proliferation of mobile
applications is indicated by the example fact
that as of October 2010,Apples App Store
offered over 100,000 apps that are
downloadable by the smart phone users.
Wireless mobile communication is a fastest
growing segment in communication
industry[1]. It has currently supplemented or
replaced the existing wired networks in
many places. The wide range of applications
and new technologies[5] simulated this
enormous growth. The new wireless traffic
will support
heterogeneous traffic,
consisting of voice, video and data. Wireless
networking environments can be classified
in to two different types of architectures,
infrastructure based and ad hoc based. The
former type is most commonly deployed
one, as it is used in wireless LANS and
global wireless networks. An infrastructure
based wireless network uses fixed network
access points with which mobile terminals
Keywords:Data
Caching,
Cache
Replacement,SWNETs,Cooperative caching,
content provisioning, ad hoc networks
www.iaetsd.in
2.RELATED WORK:
There is a rich body of the existing
literature on several aspects of cooperative
caching including object replacements,
reducing cooperation overhead, cooperation
performance in traditional wired networks.
The Social Wireless Networks explored in
this paper, which are often formed using
mobile ad hoc network protocols, are
different in the caching context due to their
additional constraints such as topological
insatiability and limited resources. As a
result, most of the available cooperative
caching solutions for traditional static
networks are not directly applicable for the
SWNETs. Three caching schemes for
MANET have been presented[9][11]. In the
first scheme, CacheData, a forwarding node
checks the passing-by objects and caches the
ones deemed useful according to some
predefined criteria. This way, the subsequent
requests for the cached objects can be
satisfied by an intermediate node. A
problem with this approach is that storing
large number of popular objects in large
number of intermediate nodes does not scale
well.The second approach, CachePath, is
different in that the intermediate nodes do
not save the objects; instead they only
record paths to the closest node where the
objects can be found. The idea in CachePath
is to reduce latency and overhead of cache
resolution by finding the location of objects.
This strategy works poorly in a highly
mobile environment since most of the
recorded paths become obsolete very soon.
The last approach in is the HybridCache in
which either CacheData or CachePath is
used based on the properties of the passingby objects through an intermediate node.
While all three mechanisms offer a
www.iaetsd.in
www.iaetsd.in
www.iaetsd.in
cooperative
cache
replacement
Algorithm for Social wireless networks
4.1 Coordinated
Policies
Cache
replacement
www.iaetsd.in
N-chance
Cache Consistency
Block-based
Block Location
Manager-based
Replacement Policy
Random Client
Duplicate Avoidance
Non-singlets deleted
Server Caching
Traditional
Table.1 key features of the N-chance, GMS
6. Conclusion
general comparison were made of the major
replacement policies in wireless networks
and summarized the main points. Numerous
replacement policies are proposed for
wireless networks, but a few for cooperative
caching in ad hoc networks.The operation,
strengths and drawback of these algorithms
are summarized. Finally some alternatives
are provided for cache replacement and
identified topics for future research.
7.References
[1] C. Aggarwal, J.L. Wolf, and P.S. Yu,
Caching on the World Wide Web, IEEE
Trans. Knowledge and Data Eng.,
vol. 11, no. 1, pp. 94-107, Jan./Feb. 1999
www.iaetsd.in
www.iaetsd.in
PI LAYOUT
5/19/11
9:04 AM
Page 101
ABSTRACT
Due to the increasing popularity of smart
phones and other mobile data devices such as
netbooks and ebook readers, mobile data traffic
is experiencing unprecedented growth. As
today's cellular providers attempt to deliver
high quality, low latency video and multimedia
applications for wireless devices, they are
limited to a carrier frequency spectrum ranging
between 700 MHz and 2.6 GHz. The global
bandwidth shortage facing wireless carriers has
motivated the exploration of the underutilized
millimeter wave (mm-wave) frequency spectrum
for
future
broadband
cellular
communicationnetworks.In this article, we
explore the 3300 GHz spec-trum and describe
a millimeter-wave mobile broadband (MMB)
system that utilizes this vast spectrum for
mobile communication. We describe the
millimeter-wave spectrumand its propagation
characteristics. We then discuss the network
architecture, followed by the air interface design
of the MMB system. After that, we conclude the
article with a summary and brief discussion of
future work.
INTRODUCTION
A vast amount of spectrum in the 3300 GHz
range remains underutilized. The 330 GHz
spectrum is generally referred to as the super
high frequency (SHF) band, while 30300 GHz is
referred to as the extremely high frequency
(EHF) or millimeter-wave band. mm-wave
frequencies could be used to augment the
currently saturated 700MHz to 2.6 GHz radio
sprectrum bands for wireless communications.
The combination of cost effective CMOS
technology that can now operate well into the mwave frequency bands, and high-gain, steerable
antennas at the mobile and base station,
strengthens the viability of mm-wave carrier
frequencies
allow
for
larger
bandwidth
allocations, which translate directly to higher
data transfer rates. Mm-wave sprectrum would
allow service providers to significantly expand
the channel bandwidths far beyond the present
20 MHz channels used by 4G customers.
www.iaetsd.in
PI LAYOUT
5/19/11
9:04 AM
Page 102
3 GHz
164
300 GHz
RF spectrum above 3
GHz has been largely
54 GHz
99 GHz
99 GHz
60 GHz oxygen
absorption band
in exploring this
28.35
27.50
28.60
29.10
29.25
29.50
31.075 31.225
GHz
fixed wireless
communications.
75
M
Hz
150
MHz
850 MHz
150
MHz
75
M
Hz
LMDS bands
71
76
81
5 GHz
86
92
94
2
GHz
5 GHz
95 GHz
0.9
GHz
12.9 GHz
70 / 80 / 90 GHz bands
(c)
www.iaetsd.in
PI LAYOUT
5/19/11
9:04 AM
Page 103
MILLIMETER-WAVE PROPAGATION
Attenuation (dB)
FREE-SPACE PROPAGATION
Millimeter waves travel solely by line-of-sight, and
are blocked by building walls and attenuated by
foliage. Transmission loss of millimeter wave is
accounted for principally by free space loss. A
misconception
among
wireless
general
engineers is that free-space propagation loss
depends on frequen-cy, so higher frequencies
propagate less well than lower frequencies. The
reason for this miscon-ception is the underlying
assumption often used in radio engineering
textbooks that the path loss is calculated at a
specific frequency between two isotropic
antennas or /2 dipoles, whose effective aperture
area
increases
with
the
wavelength
(decreases with carrier frequency). An antenna
with a larger aperture has larger gain than a
smaller one as it captures more energy from a
passing radio wave. However, with shorter wavelengths more antennas can be packed into the
same area.
In addition, large numbers of
antennas enable transmitter and receiver
beamforming with high gains.[3]
REFLETION, DIFFRACTION, FOLIAGE AND
OTHER PENETRATION LOSSES
Another common myth in wireless engineering
community is that rain and atmosphere make mmwave spectrum useless for mobile communications.
However, when one considers the fact that today's
cell sizes in urban environments are on the order of
200 m, it becomes clear that mm-wave cellular can
overcome these issues.
Material
Thickness (cm)
< 3 GHz
[6, 8]
40 GHz
[7]
60 GHz
[6]
Drywall
2.5
5.4
6.0
Office whiteboard
1.9
0.5
9.6
Clear glass
0.3/0.4
6.4
2.5
3.6
Mesh glass
0.3
7.7
10.2
Chipwood
1.6
.6
Wood
0.7
5.4
3.5
Plasterboard
1.5
2.9
Mortar
10
160
Brick wall
10
t178
Concrete
10
17.7
175
where,
L = The loss due to foliage. Unit: decibels (dB)
f = The transmission frequency. Unit: gigahertz
(GHz)
d = The depth of foliage along the path. Unit:
meters (m)
www.iaetsd.in
PI LAYOUT
5/19/11
9:04 AM
Page 104
www.iaetsd.in
PI LAYOUT
5/19/11
9:04 AM
Page 105
Packet data
server gateway
MBS_1
MBS_2
MBS_3
CBS_A
MBS_6
MBS_5
MBS_4
50
0m
m
1k
MS1
MBS_8
1k
Network
MS1
CBS_B
MS2 MBS_7
MBS_9
MBS_10
MS4
MBS_11
CBS_C
MBS_14
MBS_12
MS3
Cellular base station (CBS)
MBS_13
MMBcommunication link
(a)
(b)
waves at < 3 GHz frequencies can better penetrate obstacles and are less sensitive to non-lineof-sight (NLOS) communication link or other
impairments such as absorption by foliage, rain,
and other particles in the air. Therefore, it is
advantageous to transmit important control
channels and signals via cellular radio frequencies, while utilizing the millimeter waves for high
data rate communication.
www.iaetsd.in
PI LAYOUT
5/19/11
9:04 AM
Page 106
LINK BUDGET
The key factors that determine the downlink link
budget of an MMB system are the base station
transmission power, transmitter and receiver
beamforming gains, and path loss.
Table 3 shows the link budget for four different MMB systems. A 20 dB margin is assumed
to account for cable loss and losses due to penetration, reflection, or diffraction. A noise figure
of 10 dB and an implementation loss of 5 dB are
assumed at the receiver. As shown in Table 2,
with 35 dBm transmission power, 1 GHz system
bandwidth, 28 GHz carrier frequency, and realistic assumptions of transmitter and receiver
antenna gains (case 1), more than 2 Gb/s can be
achieved at 1 km distance.
CONCLUSION
Given the worldwide need for cellular spectrum and
the relativelylimited amount of research done on
mm-wave mobile communications, we have
discussed frequency range 3-300 GHz to gain insight
on path loss, building penetration loss, Doppler
spread and multipath for the design of future mmwave cellular broadband systems.
www.iaetsd.in
PI LAYOUT
5/19/11
9:04 AM
Page 107
ACKNOWLEDGEMENT
We would like to thank our college staffs and
officials for providing us with constant support
and encouragement.
REFERENCES
Case 1
Case 2
Case 3
Case 4
TX power (dBm)
35.00
35.00
25.00
25.00
30.00
30.00
30.00
30.00
28.00
72.00
28.00
72.00
Distance (km)
1.00
1.00
0.50
0.50
121.34
129.55
115.32
123.53
Other losses
20.00
20.00
20.00
20.00
15.00
15.00
15.00
15.00
61.34
69.55
65.32
73.53
Bandwidth (GHz)
1.00
1.00
1.00
1.00
174.00
174.00
174.00
174.00
10.00
10.00
10.00
10.00
74.00
74.00
74.00
74.00
SNR (dB)
12.66
4.45
8.68
0.47
5.00
5.00
5.00
5.00
2.77
0.91
1.74
0.4
www.iaetsd.in
ABSTRACT
Although conventional sweeping vehicles
already exist, they are designed to operate on a
small scale and use IC engines which are
proving to be more and more expensive and
polluting with increasing fuel costs and
increasing global warming. The whole system
comprises of three separate DC motor systems
each of which control the vacuum system, the
sweeping system and the overall propulsion
system of the vehicle. The amount of carbon
I. INTRODUCTION
With increasing vehicular traffic and road
usage levels, it is necessary for a machine that
can effectively maintain road related rubbish
to be developed. The electric road cleaner aims
to utilize the high torque that a DC motor can
provide simultaneous vehicular propulsion and
at the same time sweep and vacuum the road
thereby combining the work conventionally
done with different systems under one.
VACCUM SYSTEM
It is the heart of the cleaning process and
is used to suck in all the rubbish present on
the road that is suitably swept in by the
sweeper circuit.
SWEEPER SYSTEM
It is used to suitably push the rubbish
towards the vacuum suction point. It
www.iaetsd.in
SENSOR SYSTEM
The sweeping system is connected to a
mount that can be raised or lowered
depending on the gradient of the road and
obstacles. The sensor and sweeper systems
work in tandem.
Sub-system Battery:
This is used to run the vacuum and
sweeping sub-systems and produce an
output of 12V and comprise of 5-12V
batteries connected in parallel and again
the discharging is controlled by a
dedicated micro-controller.
2. MOTOR
The motor used is a BLDC motor. It can
produce 10 HP output power with an input
voltage of 120V. The current rating is
70A, maximum speed is 3450rpm. The
motor gets its input from the controller.
The motor is directly coupled to the
wheels.
3. CONTROLLER
1. BATTERY SYSTEM
In place of an internal combustion engine,
the proposed car has a bank of batteries -the battery system. The battery system is
composed of two subsystems 1. For the
propulsion motor 2. For the sweeping and
vacuuming systems.
The controller used in this vehicle is a dcdc controller manufactured in the name
CURTIS 1231c-86XX. The above shows
Propulsion Battery:
www.iaetsd.in
Gear
torque=motor
torque*(input
speed/output speed)*gear efficiency
Input speed=3000rpm
Output speed=1000rpm
Gear efficiency=0.85
Gear torque=50*(3000/1000)*0.85
=127.5Nm
Controller characteristics:
Voltage (V): 96-144.
Current (A): 500.
2 MIN RATING (A): 500.
5 MIN RATING (A): 375.
1 HOUR RATING (A): 225.
1. CHOPPER CIRCUIT
T: Output torque.
N: Operating speed of motor.
Re-arranging:
T= (60*P)/(2*pi*N).
T=(60*20*765)/(2*3.1415*3000).
T=50 NM(approx).
www.iaetsd.in
BUCK
2. CONTROL CIRCUIT
www.iaetsd.in
V. VACUUM SYSTEM
Vaccum-2:
The second vacuum system acts as a
suction/blower device based on the season.
In summer when the moisture on the roads
is minimal the setup is used as a vacuum
device. During rainy seasons, the setup
funnels hot air from the main motor
toward the ground thus drying up moisture
and enabling easier vacuuming and
preventing sand from sticking to the
ground. This is also a universal motor
coupled to the fan controlled by a chopper
and the field has a reversal circuit used to
control the direction of rotation.
Vacuum-1:
This a universal motor driven vacuum
creator used to suck in the dust irrespective
of the season and road conditions. The
universal motor is coupled to the fan and is
driven by a chopper which is fed from a
lead acid battery source. The chopper used
is a BOOST chopper.
Boost Chopper:
The above shows the block diagram of the
reversal system. The motor has two
windings one for forward operation and
the other for reverse operation, by using a
DPDT switch to switch between the
windings, the direction of operation of the
universal motor can be reversed.
Universal motor:
Universal motors can rotate at a speed of
up to 20000 rpm. It is used for low torque
applications. The motor used in the
vacuum system is a 1400W 12v DC motor.
www.iaetsd.in
raised
by
the
stepper
motor.
Suction Pressure=(1/2)*rho*V^2.
rho-Density of air=1.225.
Suction Pressure: 30 KPA.
V-Velocity of the fan blade.
Re-arranging:
V=Sqrt((2*Suction Pressure)/rho).
V=Sqrt((2*30*10^3)/1.225).
V=Sqrt(48,979.592).
V=221.31 M/SEC.
V=(R*W*2*pi)/60
Where,
R-Radius of fan blade.
W-Speed in RPM.
Re-arranging:
R= (60*V)/(W*2*pi).
R= (221.31*60)/(10000*2*3.1415).
R= 13278.6/62830.
R=0.211M.
1. PING SENSOR:
The ping sensor is an ultrasonic sensor
which measures the distance from the
vehicle and any obstacle. If the distance is
lesser than 2m, the sweeper system will be
www.iaetsd.in
VII. ADVANTAGES
The principal advantages of this system
involve its large adaptability and relative cost
efficiency. Absence of regular fuelling reduces
fuel costs and the design of the system with
only a electric energy source means that there
is no need for a separate oil fuel for the vehicle
and additional electricity for the other systems.
VIII. CONCLUSION
The proposed paper deals with the use of a electric
vehicle for sweeping and vacuuming purposes. An
electric vehicle has the dual advantage of both being
relatively eco-friendly as well as much more cost
efficient. Instead of individual systems for the sweeper
and cleaner using electric systems and operating the
vehicle on combustion engine, the systems use of pure
electric propulsion means the unit can be designed as a
whole. The entire vehicle can be modified and
redesigned as needed for operation. The vehicle can save
costs on fuel in the long run as well as the fact that
electricity remains the only future resource for mankind.
This vehicle can also reduce road pollution and thereby
help reduce the amount of accidents that occur due to
improper road maintenance.
3. ALGORITHM:
Step 1: start the process
Step 2: send trigger signals to the
microcontroller
IX. REFERENCES
[1] en.wikipedia.org
[2] http://www.evworld.com
[3] http://www.saxton.org
[4] http://www.fueleconomy.gov
[5] http://auto.howstuffworks.com
www.iaetsd.in
www.iaetsd.in
Robins Anto
Head of Department
Mar Baselios Christian College of
Engineering and Technology
Sreenath B
Kuttikanam, Peermade
Asst Professor, Dept of EEE
[email protected]
Amal Jyothi College of Engineering
Kanjirappally, Kottayam
[email protected]
efficiency of the system. H-bridge multilevel inverters are
more suitable for renewable energy harvesting due to the
presence of separate DC sources.
II.
Introduction
Due to approximate short circuit characteristics of
AC network, a little DC voltage component can accidently be
produced by grid connected inverters which can create large
DC current injections. If output transformers are not used,
these inverters must prevent excessive DC current injection,
which may cause detrimental effects on the network
components, in particular the network transformers which can
saturate, resulting in irritant tripping. This may also increase
the losses and reduce the lifetime of the transformers, if not
tripped. Moreover, the existence of the DC current component
can induce metering errors and malfunction of protection
relays and can create an adverse effect on the overall
functioning of the solar power plant.
1
2nd INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ENGINEERING RESEARCH
114
www.iaetsd.in
III.
Experimental Result
2
2nd INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ENGINEERING RESEARCH
115
www.iaetsd.in
Conclusion
3
2nd INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ENGINEERING RESEARCH
116
www.iaetsd.in
References
[1] Yanqing Li, Cheng Chen, Qing Xie, Research of An Improved Gridconnected PV Generation Inverter Control System, 2010 International
Conference on Power System Technology, pp.1-6, 0ctober 2010
[16]
[20] Carrasco, J. M., Franquelo, L. G., and Alfonso, N. M., "Power Electronic
systems for the grid integration of renewable energy sources: A survey,"
IEEE Transactions on Industrial Electronics, Vol. 53, No. 4, pp. 10021016, 2006.
[6] Ashraf Ahmed, Ran Li, Precise Detection and Elimination of Grid
Injected DC from Single Phase Inverters, International Journal of
Precision Engineering and Manufacturing, Vol. 13, No. 8, pp. 13411347, August 2012
WWW.pvresources.com/balance
of
Photovoltaic
Inverter,
system/inverters.aspx
Kitamura.
A, Yamamoto.
F, Matsuda.
H, Akhmad.
K,
Hamakawa,Yoshihiro,Test results on DC injection phenomenon of grid
connected PV system at Rokko test centerPhotovoltaic
Specialists
Conference, 1996, Conference Record of the Twenty Fifth IEEE,
Page(s): 1377 - 1379 , 1996
[15] Singla and Vijay Kumar Garg, "Modeling of solar photovoltaic module
& effect of insolation variation using matlab/simulink," International
Journal of Advanced Engineering Technology, Vol IV Issue III Article 2
pp.05-09 July-Sept,2013
4
2nd INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ENGINEERING RESEARCH
117
www.iaetsd.in
1
2
, .
Email:[email protected]
under
1. INTRODUCTION
Many of the organizations show interest on cloud, because
with low cost we can access resources from cloud in a
flexible and secure manner. Cloud shares their resource to
multiple users. Cost of resources varies significantly
depending on configuration for using them. Hence efficient
management of resources is of prime interest to both Cloud
Providers and Cloud Users. The success of any cloud
management software critically depends on the flexibility,
scale and efficiency with which it can utilize the underlying
hardware resources while providing necessary performance
isolation. Successful resource management solution for
cloud environments needs to provide a rich set of resource
controls for better isolation. Here dynamic resource
allocation and load balancing is the challenging task to
provide effective service to clients. Due to peak demands
for a resource in the server, resource is over utilized by
clients through virtualization. This may degrade the
performance of the server. In under utilization usage of
resource is very poor when compare to over utilization, for
this we are migrate client processing from VM to other
VM.
1.
2.
www.iaetsd.in
2. SYSTEM OVERVIEW:
VM Scheduler
Predictor
Hotspot
Coldspot
Migration List
Usher CTRL
Dom 0
U
S
H
E
R
L
N
M
M
M
A
L
L
O
T
E
R
DomU
W
UU
DomU
E
B
S
E
R
V
E
R
WS
R
M
T
D
E
S
K
T
O
P
Dom 0
U
S
H
E
R
L
N
M
M
M
A
L
L
O
T
E
R
DomU
UM
DomU
UD
A
P
N
S
R
E
D
U
C
E
S
E
R
V
E
R
WS
Xen Hypervisor
Dom 0
U
S
H
E
R
L
N
M
M
M
A
L
L
O
T
E
R
DomU
M
A
I
L
DomU
UL
S
E
R
V
E
R
O
G
S
E
R
V
E
R
WS
Xen Hypervisor
Xen Hypervisor
PM2
PMn
PM1
E (t) = * E (t - 1) + (1 - ) * O (t), 0 1.
www.iaetsd.in
Where E (t):
O (t):
Median
error
High error
Low error
ewma (0.7)
W=1
5.6%
fusd(-0.2, 0.7)
W=8
3.3%
56%
44%
77%
23%
58%
41%
www.iaetsd.in
CONCLUSION
We have presented an approach for implementation and
evaluation of a resource management system for cloud
computing services. We have also shown in our paper of
how we can multiplex virtual resource allocation to
physical resource allocation effectively based on the
fluctuating demand. We also make use the skewness metric
to determine different resource characteristics appropriately
so that the capacities of servers are well utilized. We can
apply our algorithm to achieve both overload avoidance
and green computing for systems which support multiresource constraints.
Temperature (p) =
Where R is the set of overloaded resources in server p and
rt is the hot threshold for resource r. if the temperature is
zero then the server is in cold spot. if temperature is one
server is in hot spot.
If the utilization of resource is below average to its actual
capacity then it is in cold threshold. Potentiality of server is
wastage due to the server running idly, so it was not
satisfying the green computing threshold, to save the
energy we are show downing it. The utilization of all
resources from server which satisfies the green computing
threshold but not in risk stage then we can call it as warm
threshold.
REFERENCES:
[1] Zhen Xiao, Senior Member, IEEE, Weijia Song, and Qi Chen,
Dynamic Resource Allocation Using Virtual Machines for Cloud
Computing Environment, VOL. 24, NO. 6, JUNE 2013
[2] L. Siegele, Let It Rise: A Special Report on Corporate IT,
The Economist, vol. 389, pp. 3-16, Oct. 2008.
www.iaetsd.in
www.iaetsd.in
A.Narayana Rao
I.
Introduction
www.iaetsd.in
II.
SYSTEM MODEL
III.
A. Bilinear Maps
Pairing is one of the building blocks of the CPLM design.
An efficiently computable, non-degenerate function e:
GGGT which satisfies the bilinearity property defines
pairing. The bilinearity property states that e(gp,gq) = e(g,g,)pq
for any p,q Z*q. Z*q is a finite field modulo q, G and GT are
www.iaetsd.in
B. Branching Program
A binary branching program is a triplet ({m1, , mk}, L,
R). The first element of the triplet is a set of nodes in the
binary branching tree. The internal nodes represent the
intermediate decision nodes while the leaf nodes represent the
label nodes. A decision node is represented as an attributethreshold pair (ai, t i), where ai represents the attribute index
and ti represents the threshold value. The attribute value
supplied by the client vai is compared with the threshold value
ti. At each decision node i, if vai ti then L(i) becomes the
index of the next node. If vai > ti then R(i) becomes the index
of the next node. The label nodes contain classification
information. The nodes are traversed starting from the root
node by comparing the value supplied by the client with the
threshold value until one of the label nodes is reached.
C. Homomorphic Encryption
In CPLM, additive homomorphic public-key encryption
technique is used. In homomorphic encryption, if HE(p) and
HE(q) are two encrypted messages, then the encryption of the
addition of the two messages is obtained as follows HE(p+q) =
HE(p) * HE(q), where * is an operation in the cipher text
space. In CPLM homomorphic encryption is used to obtain
tokens corresponding to the client attribute vector.
Police VM
CA
unit1
CA
unit2
CA
unit3
www.iaetsd.in
H1 : {0, 1} G, H2 : G G Zq , H3 : MM Zq , H4 :
GT MM, and H5 : GMM G. The system parameter is
included in the following steps implicitly.
Store: This step is performed by the company. Let PRF(s0, i)
and PRF(s1, i) denote two pseudo-random functions. They
take as inputs a secret key sj , j {0, 1} and a i, defined by
PRF : {0, 1} [1,N k] {0, 1}C+C , where N represents the
maximum number of the clients accessing the companys
monitoring program in a particular time slot.
For j [1, k], the company computes the identity
representation sets S[0;tj+ ij ] and S[tj+ ij+1;Max]. (0)ij =
PRF(s0, (i1)k+j), (1)ij = PRF(s1, (i 1) k + j) and ij =
(1)ij + (0)ij , where j [1, k].
Let Q represent a random permutation of the set [1, k]
= (1, 2, , k) where Q[1] = 1. The company distributes
PRF(s0, ), {tj + ij , aj |i [1,N], j [1, k]} and the random
permutation Q to the STA. The STA computes the identity
representation set. For j [1, k], the STA runs the ReKey(id1,
id2, msk) algorithm on the identities id1 S[0;tj+ ij ] and id2
S[0;tj+ (i+1)j ], or the identities id1 S[tj+ ij+1;Max] and
id2 S[tj+ (i+1)j+1;Max]. The STA then delivers all the
generated re- encryption keys according to the permuted order
to the cloud.
The ReKey algorithm is as follows.
ReKey(id1, id2, msk): This algorithm is performed by the
STA. When a delegator D receives a request of re-encryption
from id1 to id2, it first executes the Ext algorithm on id2 to
produce skid2. Then it outputs the re-encryption key from id1 to
id2:
rkid1;id2 = (rk(1) id1;id2, rk(2) id1;id2)= (H1(id1)s gH2(skid2||Nid1;id2
)
,Nid1;id2 ) and Nid1;id2 is a random element from G.
The Ext algorithm works as follows.
Ext(id, msk): This algorithm is performed by the STA and a
client. Upon receiving an identity id as input, the client first
selects a random number z Zq, and computes the value u1
=H1(id)z and sends it to the STA. The STA outputs the
transformation key corresponding to the identity id: u2 = us1
where s = msk and delivers it back to the client. Then the
client calculates his private key skid =u1/z2 =H 1(id)zsz1=H1(id)s.
It is to be noted that the STA deduces no information on the
clients identity as H1(id)z is just a random group element
under a random oracle model.
Starting with the node p1, the company chooses two
symmetric keys kQ[L(j)] and kQ[R(j)] for each decision node pj
whose children are internal nodes. Then, it executes the
encryption algorithm Enc(id1, kQ[L(j)]||Q[L(j)]) and Enc(id2,
kQ[R(j)]||Q[R(j)]), where the identity id1 S[0;tj+ ij ] and the
identity id2 S[tj+ ij+1;Max], respectively, in order to produce
two cipher text sets CQ[L(j)] and CQ[R(j)]. Let TCj be represented
by {CQ[L(j)],CQ[R(j)]}. The cipher texts TCQ[L(j)] and TCQ[R(j)] are
encrypted using kQ[L(j)] and kQ[R(j)] for the two child nodes,
using a semantically secure symmetric key encryption scheme.
When pj represents the parent node of the leaf nodes, the
information attached to the two leaf nodes are encrypted using
the two symmetric keys.
Fig. 1 Police VM
IV.
CPLM DESIGN
The system time is divided into time slots. Each time slot
can range from a week to a month. It is assumed that a
maximum of N users can access the monitoring program
during a given slot. Whenever a client tries to access a
monitoring program, it is assigned an index i by the STA,
where i [1,N].
CPLM with an efficient Privacy Shield reduces not
only the computational burden on the company but also the
communication overhead for the cloud. As shown in Fig. 2,
the high level idea is as follows. Key private re-encryption
scheme is employed as an underlying tool. The company
produces a single set of cipher text and delivers it to the cloud,
instead of generating a cipher text for each client. The
company then obliviously delivers the identity threshold
representation sets to the STA for the thresholds of the
decisional branching nodes and the indices of the concerned
attributes so that the STA can produce the re-encryption keys
corresponding to the rest of the clients in the system by
making use of the key private re-encryption scheme. The
produced re-encryption keys are then distributed to the cloud.
The cloud then runs the re-encryption scheme using the rekeys
and the single set of cipher text delivered by the company to
produce the cipher texts for the rest of the clients. The key
private re-encryption scheme assimilates the outsourcing
decryption to ensure that the CPLM scheme incorporates
security and efficiency characteristics. As a result of the
decryption algorithm of the proxy re-encryption scheme, the
interactions between clients and the cloud is also decreased.
CPLM with an efficient Privacy Shield consists of the
following five steps.
SecParam: This step is performed by the cloud server by
taking into consideration the security parameters provided by
the client. If the client opts for special security request, the
regular VM and the Police VM are scheduled alternatively. If
the performance of the VM is a priority and if the number of
clients accessing the monitoring program is less than 300, the
police VM is scheduled after ten regular VMs. If the number
of clients accessing is between 300 and 600, the police VM is
scheduled after 15 regular VMs else it is scheduled after 20
regular VMs. If the performance of the VM is not a priority,
then the police VM is scheduled after 15, 20, 30 regular VMs
for the above corresponding range of clients accessing the
monitoring program.
Setup: This step is performed by the STA. The STA takes as
input the security parameter 1 , and outputs the system
parameter SP = (G,GT , q, g,Hi, i = 1, 2, 3, 4, 5), the key pair
for the STA (pk, msk) = (y, s) = (gs, s). G and GT are bilinear
groups of prime order q, g represents a random primitive root
in G, Hi, (i {1, 2, 3, 4, 5}) represents cryptographic hash
functions.
www.iaetsd.in
Randomness data
Attribute
STA
Tokens
Company
Re-Keys
Client
Encrypted
Branching
Program
Decrypted
Label
Outsourcing
Decryption
Algorithm
Cloud Server
Re-Encrypted
Branching Program
V.
Conclusion
www.iaetsd.in
References
[1] P. Mohan, D. Marin, S. Sultan, and A. Deen, Medinet: personalizing the
self-care process for patients with diabetes and cardiovascular disease using
mobile telephony. Conference Proceedings of the International Conference
of IEEE Engineering in Medicine and Biology Society, vol. 2008, no. 3, pp.
755758.
[Online].
Available:
http://www.ncbi.nlm.nih.gov/pubmed/19162765
[2] L. Ponemon Institute, Americans opinions on healthcare privacy,
available: http://tinyurl.com/4atsdlj, 2010.
[3] A. V. Dhukaram, C. Baber, L. Elloumi, B.-J. van Beijnum, and P. D.
Stefanis, End-user perception towards pervasive cardiac healthcare services:
Benefits, acceptance, adoption, risks, security, privacy and trust, in
PervasiveHealth, 2011, pp. 478484.
[4] N. Singer, When 2+ 2 equals a privacy question, New York Times,
2009.
[5] E. B. Fernandez, Security in data intensive computing systems, in
Handbook of Data Intensive Computing, 2011, pp. 447466.
[6] A. Narayanan and V. Shmatikov, Myths and fallacies of personally
identifiable information, Communications of the ACM, vol. 53, no. 6, pp. 24
26, 2010.
[7] A. Cavoukian, A. Fisher, S. Killen, and D. Hoffman, Remote home
health care technologies: how to ensure privacy? build it in: Privacy by
design, Identity in the Information Society, vol. 3, no. 2, pp. 363378, 2010.
[8] X. Zhou, B. Peng, Y. Li, Y. Chen, H. Tang, and X. Wang, To release or
not to release: evaluating information leaks in aggregate human-genome
data, Computer SecurityESORICS 2011, pp. 607627, 2011.
[9] R. Wang, Y. Li, X. Wang, H. Tang, and X. Zhou, Learning your identity
and disease from research papers: information leaks in genome wide
association study, in Proceedings of the 16th ACM conference on Computer
and communications security. ACM, 2009, pp. 534544.
[10] M. Green, S. Hohenberger, and B. Waters, Outsourcing the decryption
of abe ciphertexts, in Usenix Security, 2011.
[11] D. Boneh and M. K. Franklin, Identity-based encryption from the weil
pairing, in CRYPTO, 2001, pp. 213229.
[12] E. Shi, J. Bethencourt, H. T.-H. Chan, D. X. Song, and A. Perrig,
Multidimensional range query over encrypted data, in IEEE Symposium on
Security and Privacy, 2007, pp. 350364.
[13] A. Sahai and B. Waters, Fuzzy identity-based encryption, in
EUROCRYPT, 2005, pp. 457473.
[14] V. Goyal, O. Pandey, A. Sahai, and B. Waters, Attribute-based
encryption for fine-grained access control of encrypted data, in ACM
Conference on Computer and Communications Security, 2006, pp. 89 98.
[15] M. Blaze, G. Bleumer, and M. Strauss, Divertible protocols and atomic
proxy cryptography, in EUROCRYPT, 1998, pp. 127144.
[16] G. Ateniese, K. Fu, M. Green, and S. Hohenberger, Improved proxy reencryption schemes with applications to secure distributed storage, ACM
Trans. Inf. Syst. Secur., vol. 9, no. 1, pp. 130, 2006.
[17] Tzong-An Su, A mechanism to prevent side channel attacks in cloud
computing environments.
www.iaetsd.in
V.Vidhya2,
M. E.Applied Electronics,
Sriram Engineering College,
Perumalpattu, Chennai,
Tamilnadu, India
[email protected].
critical building blocks in low power SoC
integration.
ABSTRACT
This paper provides an integrated, high efficiency,
high voltage, class-F Power Amplifier (PA) for
increasing the efficiency of Ultrasonic Transducer. It
also provides harmonic termination technique for
high efficiency class F PAs. The effect of different
output harmonic terminations on the Power- Added
Efficiency (PAE) of the PA has also been analyzed.
Theoretically, high efficiency can be attained in classF operation by maximally flattening the current and
voltage waveforms at the drain of active device.
II.
DPD
TECHNIQUE
CPU
TRANSMITTER
OBJECT
RECEIVER
I.
INTRODUCTION
POWER
AMPLIFIER
APPLICATION
www.iaetsd.in
www.iaetsd.in
V.
IMPLEMENTATION AND
EXPERIMENTAL RESULTS
harmonic
termination
IV.
DIGITAL PREDISTORTION
TECHNIQUE
To reduce the harmonic distortions from the
transmitter, a DPD linearization technique is
designed and implemented. The DPD system is
composed of a digital-to-analog converter (DAC),
an analog-to-digital converter, and a field
programmable gate array (FPGA) where the digital
components for the DPD algorithm, the delay
synchronization unit, and the lookup table memory
are implemented. The DPD linearization is divided
into two stages: calibration and evaluation. At the
beginning of the calibration stage t0, the DPD
FPGA and the DAC send an ideal input sinusoidal
calibration signal u(t) to the input, where the output
of the amplifier o(t) can be expressed as a Taylor
expansion in terms of u(t), i.e., o(t) = A1 u(t) +
A2 u(t)2 + A3 u(t)3 + where A1, A2, and
A3 are the first-, second-, and third order gains of
the amplifier. As discussed in [15], the output
signal of the amplifier is attenuated, fed back into
the DPD FPGA, delay adjusted, and then
subtracted into the ideal input signal to equalize the
input containing the inverse response of the power
amplifier nonlinearities. During the evaluation
stage, the equalized amplifier output signal
becomes
oeq(t + tD) =A1 eq(t)+A2 eq(2t)+A3
eq(3t)+ =A1 u(t) + residue, where tD is the
amplifier group delay, eq(t) is the equalized input
signal with being the angular frequency, and
residue is the remaining harmonic components
above the fourth order.
www.iaetsd.in
REFERENCE
1.
2.
3.
VI.
Amplifier
4.
CONCLUSION
Pout
(dBm)
Gain (dB)
Efficiency
(%)
Class AB
33.89
17.89
40.09
Class F
34.66
17.86
65.17(appro
x)
5.
6.
7.
8.
9.
www.iaetsd.in
[email protected]
Abstract
This paper presents a quantum protocol
based on public key cryptography for secure
transmission of data over a public channel. The
security of the protocol derives from the fact that
Alice and Bob each use secret keys in the multiple
exchange of the qubit. Unlike the BB84 protocol and
its many variants where the qubits are transmitted
in only one direction and classical information
exchanged thereafter, the communication in the
proposed protocol remains quantum in each stage. In
the BB84 protocol, each transmitted qubit is in one of
four different states; in the proposed protocol, the
transmitted qubit can be in any arbitrary state.
Disparate and heterogeneous networks will be a
growing reality in the future. Additionally, some of
the regulatory, national interest, and security
requirements might force a geographic boundary
between networks.
I.
INTRODUCTION
1
2nd INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ENGINEERING RESEARCH
133
www.iaetsd.in
III.
PROPOSED EMBEDDED
SECURITY SERVICES AND INTEGRATED
SECURE OBS ROUTER ARCHITECTURE
II.
OPTICAL BURST
SWITCHING (OBS)BACKGROUND
2
2nd INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ENGINEERING RESEARCH
134
www.iaetsd.in
FIG2(a)
FIG:2(b)
3
2nd INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ENGINEERING RESEARCH
135
www.iaetsd.in
Fig 3
Secure edge router architecture:
The OBS edge router aggregates traffic into
bursts based on destination edge router addresses, and
possibly QoS parameters. The basic operation of an edge
router can be found in Reference [10]. We extend the
basic OBS edge router architecture to support embedded
OBS security services as shown in Figure 4. At the point
of ingress direction, the assembled bursts and their
corresponding headers are encrypted before transmission
onto the optical link. At the point of egress direction, the
received burst headers are authenticated before their
corresponding bursts are decrypted and disassembled.
The key management functions include both classical
and quantum components. The classical key distribution
protocol uses the control channel, while the QKD is via
Q-channels. The burst integrity control interacts with the
burst assembly process in the burst transmitter and
retransmits bursts as necessary.
4
2nd INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ENGINEERING RESEARCH
136
www.iaetsd.in
QUANTUM
CRYPTOGRAPHY
FOR
ENHANCED SECURITY
5
2nd INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ENGINEERING RESEARCH
137
www.iaetsd.in
sin
cos
is clear from the relation
R() R() = (cos
sin )
(sin
cos )
x
(cos
sin )
( sin
cos )
cos ( + )
sin( + )
sin( + )
cos ( + )
V.
IMPLEMENTATION:
X= 0
1
1
Z=
0
Y
1
0 -i
i
0
0 -1
QCAD is a windows-based environment for quantum
computing simulation which helps in designing circuits
and simulating them. QCAD can simulate the designed
the circuits and show results (states Of qubits).
Fig 7.Illustration of
cryptography protocol .
recommended
quantum
6
2nd INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ENGINEERING RESEARCH
138
www.iaetsd.in
communication
followed
by
two
hops
of
communications through classical channels, all three
hops of communication in the new protocol are quantum,
providing more security; (3) the newprotocol never
reveals the actual quantum state of the key on the
communication link, allowing the protocol to be
extended beyond trusted routers.
REFERENCES:
1.
2.
3.
4.
5.
6.
VI.
Conclusion
7.
8.
9.
10.
11.
12.
13.
7
2nd INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ENGINEERING RESEARCH
139
www.iaetsd.in
DEETI SREEKANTH.
Department of Electrical and Electronic Engineering-JNTUH college of engineering,Jagityal, Karimnagar
investment of the power system. As Partial Discharges
(PD) measurement is an efficient tool for diagnosis
purposes, there have been extensive efforts to analyze
various aspects of PD such as measurement, recognition
and localization. PD measurement on transformer in
operation is very difficult because it is necessary to
make the discrimination between PD and different
sources of noise. PD are usually detected acoustically or
electrically. The system for acoustic measurement
cannot be calibrated because in its way the acoustic
wave passes through different barriers with various
acoustic impedances and is exposed to the reflection
phenomenon. The acoustic method is used only for
monitoring and localization. In contrast, the electric
methods offer both a determination of the apparent
charge and PD localization.
The acoustic emission method, which is widely used in:
(i) diagnostics of cutting tools and machine cutting
process, (ii) machinery and civil structures condition
assessment, (iii) fatigue and fracture materials research,
(iv) detection of material defects, (v) orogenic and
earthquake prediction research, (vi) rockbursts
prediction in deep mines and (vii) in chemical reactions
and phase transitions research.
At present, there are a few methods, which allow to
monitor the development of partial discharges, such as:
DGA - Dissolved Gas in oil Analysis, UHF - Ultra High
Frequency and AE -Acoustic Emission. Each method is
characterized by certain advantages and disadvantages,
which were summarized in Table 1. From the listed
methods, the most applicable and least expensive seems
to be the AE method.
The main advantages of the AE method are: (i) tests can
be taken when the transformer is online (during applied
voltage or induced voltage tests), (ii) simple test
procedure, (iii) susceptibility to external electrical
disturbances is relatively low, and (iv) possibility of
partial discharge recognition, location and on-line
monitoring (Institute of Electrical and Electronics
Engineers [IEEE], 2007; Kuffel et al., 2000; Lundgaard,
1992a, 1992b; Markalous et al., 2003).
In order to develop and optimize the acoustic emission
for power transformer diagnostics, the author followed
the approach outlined below:
selection of optimal AE signal processing methods
and parameters for efficient PD detection and
recognition,
laboratory research of PDs parameters generated in
properly prepared models of oil/paper insulating
systems (imitating real
PD sources in power
transformers),
1.INTRODUCTION
www.iaetsd.in
METHODS
UHF
DGA
AE
Detection
yes
yes
yes
Detection
sensitivity
High(~10p
C,
depending
on time of
PD
activity)
No
High(~1-10pC,
depending on distance
and location of the PD
source )
Moderate(>300
pC, depending
on location of
the PD source
)
Limited
Limited
No
yes
yes
Location
Limited
Limited
yes
Installation
difficulty
Moderate
(transform
er must
be turned
off)
Moderate(through oil
valve,transformer
under load/ through
dielectric window,
transformer must be
turned off and opened)
Low(
transformer
under load)
Limited by number of
valves or dielectric
windows
Open
structure,
typically 1-16
Intensity
measurement
Identification
sensors
1
(due to
high
costs)
www.iaetsd.in
(a)
(b)
Fig.2. General view of the AE sensors water proof
enclosure with permanent magnets (a); typical AE
sensors placement on transformer tank (b).
www.iaetsd.in
(a)
(b)
www.iaetsd.in
PD2
PD4
PD5
PD6
PD7
PD8
PD9
PD10
PD3
www.iaetsd.in
www.iaetsd.in
!!
!
I.
INTRODUCTION
Antivirus systems have been in use for a long time now
since the numbers of virus has been increasing in the past few
years. Different anti-virus systems provide a variety of
distinctive features that offer to make systems highly secure
from malware. However, the fundamental way they function is
always consistent. Conventional anti-viruses scan recursively
burrowing into file systems as well as connected peripherals
identifying files that contain malware signatures either in plain
text or obfuscated formats. The problem is that this process is
a high energy consuming process and also requires a bulk of
memory in order to function. These systems also require to be
updated frequently to update the malware definitions (i.e. the
signatures) of new malware that are created every hour.
This paper describes a more efficient architecture to
overcome the problems of the existing conventional systems.
This is done by looking at malware in their most primitive
form to understand the basic process that any malware involves
itself in--from hooking itself into the operating system to
executing stealthily. We also look at as how anti-virus systems
detect these malicious files so that we can create a more
intuitive and real-time system that handles malware effectively
before it attacks the system.
II.
HOW VIRUSES WORK
Malware come in many different forms. It ranges from
commons viruses, to malicious scripts, worms, Trojans,
rootkits, etc. A virus is anything that can cause havoc to the
www.iaetsd.in
III.
HOW ANTI-VIRUS SOFTWARE WORKS
There are several AVs available in the market today. A lot of
them offer special features, which have a certain edge over
other systems. Regardless of these features, a typical AV
system consists of few common components A database of
virus signatures, a scanner and few auxiliary modules to make
it easy for the user to customize the way the AV system
behaves. A definition repository (a file or database) contains
several code signatures that may be used to identify if a file is
infected / infectious. These signatures need to be frequently
updated as time progresses and new viruses are manufactured
every hour. This becomes an overhead to the user to update
the system every now and then. Also, the AV system tends to
become larger and larger as time progresses due to the
vastness of the definition file and the enormity of the new
signatures that keep getting added. To complicate this further,
the AV system itself contains a scanner module, which sweeps
through the file system, testing each file if it may contain plain
text or obfuscated forms of the virus signature. The entire
search process requires a substantial amount of memory and
slows down the overall performance of the system. It has been
observed that a system is much faster when an AV system is
not present than otherwise.
Thus, it is possible to conclude that an anti-virus system,
which uses the conventional architecture, cannot be a realtime system and the success rate and efficiency depends on the
number of virus signatures present as well as the kind of
obfuscation algorithms that it can detect. Our goal is to
describe a better architecture that prevents this overhead and
also serves a higher success rate. Such a system is described in
the next section.
IV.
THE IMPROVED ARCHITECTURE
It has already been described in Section II that any malware
requires a space in the process table in order to run and
therefore has an entry point. Exploiting this fact, we can
design an architecture that ensures that each process that starts
must be filtered using a set of rules that can be pre-defined as
well as user-defined. This is very much alike to the system
used by firewalls--where a list is used to decide whether a
www.iaetsd.in
REFERENCES
1.
2.
3.
4.
5.
VII.
IMPLEMENTATION
Using C# an implementation was made using the Diagnosis
namespace in the .NET framework to intercept process
www.iaetsd.in
[email protected],[email protected],[email protected],
4
[email protected]
ABSTRACT
Bone Mineral Density (BMD) is the
bone.
Osteoporosis is defined
as a
in
(BMD).The
the
y-axis
of
second
MEMS
1. INTRODUCTION
developed
Bone quality is a
composite of
method.
Our device
consists of an
microscopic
damage
the
quality
of
the
www.iaetsd.in
mineral
aging,
years.
loss
occurs
with
good
mechanical
following
conditions
it
dynamic
response
to
condition
[5].
indication
is
of
important
its
to
study
more
realistic
The
change
loading
in
conditions
affecting
were
normal
present:
bone
Peak
evaluated.
condoyle.
The
impact
force
applied
DC
motor
hits
the
Medialisis
in
the
leg.
Condolosis
region
automated
hammer
is
controlled
The
by
at a sampling
www.iaetsd.in
acquiring
generating signals
response
data
are
and
displaying
data
and
acquired.USB-1208
and
TracerDAQ
digital
I/O
software
devices.
included
for
www.iaetsd.in
3. RESULTS
In
this
study,
ten
subjects
Sl.n
o
Subjects
Details
Accelero
meter-1
output
(Max)
3.0986
Accelero
meter-2
output
(Max)
1.4351
1.
Men
(15-20)
2.
Women
(15-20)
1.7428
0.9744
3.
Men
(45-50)
2.5747
1.0590
4.
Men
(Dia.-4550)
Women
(45-50)
1.6174
1.5279
2.0781
1.1746
Women
(Dia.4550)
3.2633
0.5723
had
5.
Tabulation
A typical impulse response of tibia of
normal subject
that the
acceleration
value
axes
reading
accelerometer.
from
The
the
Channel
MEMS
0,
and
www.iaetsd.in
4. CONCLUSION
The impulse response technique for
York, 1991
745-753, 1983.
bone
in
vivo:
methodology
of
World
International
Health
Organization:
Classification
of
Aging
Clinical
and
Experimental
www.iaetsd.in
www.iaetsd.in
Department of Electrical and Electronics Jayaram College of Engineering and Technology, Trichy, India
#
[email protected]
*[email protected]
@
[email protected]
www.iaetsd.in
IV.AERODYNAMICS
Aerodynamics is the science and study of the
physical laws of the behaviour of objects in an air flow and
the forces that are produced by air flows. The shape of the
aerodynamic profile is decisive for blade performance. Even
minor alterations in the shape of the profile can greatly alter
the power curve and noise level. Therefore a blade designer
does not merely sit down and outline the shape when
designing a new blade. The aerodynamic profile is formed
with a rear side, is much more curved than the front side
facing the wind.
Two portions of air molecules side by side in the air
flow moving towards the profile at point A will separate and
pass around the profile and will once again be side by side at
point B after passing the profiles trailing edge.
time
time
mass
density area velocity
time
AV 3
Power 2 (density ) area (velocity )
2
1
www.iaetsd.in
Example:
V = 10 m/s
A = (2 m)2 = 4 m2
= 1.2 kg/m3
B. Power production
A train moving at 125mph would generate a wind speed
equivalent to 60 feet/second. Wind blowing with such speed
will let a normal wind power generator harness about 3500w
of power.
If a train is about 656 feet long, running at the pace
of 187mph, and it moves along a 0.62 mile railway track in
about 18 seconds, the power generated in this small period by
the turbine laid on the tracks will be 2.6kW.
The kinetic energy of the wind is the source of the
driving force of a wind turbine. That kinetic energy can be
depicted by the formula
E = f. mspec .v3
E = the kinetic energy
mspec =the specific mass (weight) of air
v = the velocity of the moving air (the wind)
f = a calculating factor without any physic meaning
The power in the wind is proportional to:
a) The area of windmill being swept by the wind
b) The cube of the wind speed
c) The air density - which varies with altitude.
The formula used for calculating the power in the wind is
shown below:
Power = (density of air x swept area x velocity cubed)/2
P = . (A) (V)3
Where,
P is power in watts (W)
is the air density in kilograms per cubic meter (kg/m3)
A is the swept rotor area in square meters (m2) & V is the
wind speed in meters per second (m/s).
IV. PROBLEMS TO FACE
The major problem occurring in this system is some
alternation has want to made in train design the train not able
to move on the overflows or bridges, because mass of
Windmill producing opposing force toward the train. Similar
the train subjected to meet some problems related to
aerodynamically.
[2]
[3]
www.iaetsd.in
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
E. Muljadi and C.P. Butterfield, Pitch-Controlled VariableSpeed Wind Turbine Generation, 1999 IEEE Industry
Applications Society Annual Meeting, Phoenix, Arizona, October
3-7, 1999.
Grauers, A., Direct driven generators .Technology and
development trends, Proceedings of the Nordic Wind Power
Conference 2000 (NWPC 2000), Trondheim, Norway, Mars 1314, 2000.
Shyam Lal Verma, Ajay Bangar, Ankit Soni, Shravan
Gajendragadkar-2012 Renewable and Non-Conventional Energy
Sources and Engineering System ISSN No. 2231 6477,
Volume-1, Issue-3.
BJ Furman, K Youssefi - Wind Power and Wind Turbines
WWW/K-12/airplane/short.html.
Emrah Kulunk- Aerodynamics of Wind Turbines, New Mexico
Institute of Mining and Technology USA.
Ramler, J. R. and R. M. Donovan: Wind Turbines for Electric
Utilities: Development Status and Economics, Report
DOE/NASA/1028-79/23, NASA TM-79170, AIAA-79-0965,
June 1979.
WWW.world wind energy association report 2012.
Www.wwindea.org.
http://www.grc.nasa.gov/WWW/K-12/airplane/short.html.
http://ww2010.atmos.uiuc.edu/(Gh)/guides/mtr/prs/hghdef.rxml.
http://en.wikipedia.org/wiki/Wind_turbine_design.
www.iaetsd.in
I. INTRODUCTION
The Federal Aviation Administration (FAA) estimates that
the rising number of flights and passengers will overwhelm
the current Air Traffic Control (ATC) by 2015 leading to
increase in delays, higher costs and greater environmental
impact. With increased traffic, very light jets, unmanned
aerial vehicles and commercial space flight in the near
future, the national airspace system must be upgraded to
function efficiently. To meet this challenge the FAA is
rolling out the NextGen- Air Traffic Control system called
the Automatic Dependent Surveillance-Broadcast (ADSB). ADS-B enables the widespread use of Satellite Based
GPS technology. It provides air traffic controllers
information that will facilitate the efficient navigation of an
air craft through the congested airspace.
www.iaetsd.in
Source:- Aero_Q2-10_article02.pdf
A. WORKING OF ADS-B
II.ADS-B
MODE A
12 Bit
MODE C
12 Bit
MODE S
56/112 Bit
ADS-B
112 Bit
www.iaetsd.in
Frequency
Uses
1030/1090
MHz
Identifying
1090
MHz
Multiple
Table 1
Comparison of different modes
B. ARCHITECTURE
ADS-B OUT needs:
ADS-B IN:
TCAS capable
Additional wiring
Traffic selector in cockpit
EIS2 capable
On-Board Airport Navigation System.
C.APPLICATIONS OF ADS-B
www.iaetsd.in
TYPE
Independent
Cooperative
Primary
Surveillance data Does not depend on
Surveillance received by radar
aircraft equipment
Radar
Secondary
Surveillance data Requires aircrafts to
Surveillance
received by
have a working a
Radar
aircraft
ATCRBS transponder
Automatic
Surveillance data Requires aircrafts to
Dependent
received by
have a working ADS-B
Surveillance(AD
aircraft
function
S-B)
TABLE II
Analysis of Radar and ADS-B technology
www.iaetsd.in
www.iaetsd.in
B. Working of GAGAN
The Global Navigation Satellite System (GNSS) data is
received and processed at widely dispersed INRES which
are strategically located to provide coverage over the
required service volume. Data is forwarded to the INMCC,
which process the data from multiple INRES to determine
the differential corrections and residual errors for each
monitored satellite and for each predetermined ionosphere
grid point (IGP). Information from the INMCC is sent to
the INLUS and uplinked along with the GEO navigation
message to the GAGAN GEO satellite. The GAGAN GEO
satellite downlinks this data to the users via two L-band
ranging signal frequencies (L1 and L5), with GPS type
modulation, to improve the accuracy and availability and
provide integrity. GAGAN will provide augmentation
service for GPS over India, Bay of Bengal, South-East
Asia, and Middle East expanding into Africa. GAGAN
will be compatible and interoperable with other SBAS
systems such as the Wide Area Augmentation System
(WAAS) of USA, the European Geostationary Navigation
Overlay Service (EGNOS) of European Union (EU) and
the Multi-functional Satellite Augmentation System
(MSAS) of Japan. It will fill the gap between the European
EGNOS and the Japanese MSAS to provide seamless air
navigation service across regional boundaries.
V. 1996 CHARKHI DADRI MID-AIR COLLISION
www.iaetsd.in
VII.LIMITATIONS
ADS-B provides a lot more beneifts than the presently used
www.iaetsd.in
ACKNOWLEDGEMENT
We would like to express our sincere gratitude to the
Department
of
Electronics
and Communication
Engineering and all the Faculty Mentors of SRM
University for their constant motivation and guidance in
this project. We also wish to thank Prof. Shanti Prince and
Prof. Kalimuthu of Electronics Department for reviewing
our progress and their constructive feedback. Finally, we
are grateful to Prof. Samita Kher, Sinhgad University for
his/her continued support and encouragement for the
project.
REFERENCES
[1]. C. Rekkas and M. Rees, Towards ADS-B
implementation in Europe, in 2008 Tyrrhenian International
Workshop on Digital Communications
- Enhanced Surveillance of Aircraft and Vehicles. IEEE, Sep. 2008,
pp. 14.
[2]. K. Sampigethaya and R. Poovendran, Security and privacy of
future
Aircraft wireless communications with off board systems, in 2011
Third
International Conference on Communication Systems and Networks
(COMSNETS 2011). IEEE, Jan. 2011, pp. 16.
[3]. W. Y. Ochieng, K. Sauer, D. Walsh, G. Brodin, S. Griffin, and
M. Denney, GPS Integrity and Potential Impact on Aviation Safety,
Journal of Navigation, vol. 56, no. 1, pp. 5165, Jan. 2003.
www.iaetsd.in
ABSTRACT :
Namakkal.
commonly
quickly
packet
an
the
unauthorized access.
for
unauthorized
identification
packet,
of
and
Server
proposing
distributed
used
detect
to
and
prevent
react
to
Attacker
Internet
INTRODUCTION :
While the Internet as a business
LAN
Firewall
www.iaetsd.in
Proactive tracing:
the
of the packets.
Reactive Tracing:
the
attack
refers
system.
TRACEBACK METHOD :
ability
required
to
Tracing Methods:
perform
(1)Hop-by-Hop Tracing :
of
The
target
IP
(Internet
Protocol)
are
packets
that
arrive
one
after
groups.
by-hop.
www.iaetsd.in
IP N/W
necessary
Overlay Network :
to
implement
new
protocol.
Traceback Approaches:
IP
address
Although
have
most
been
of
proposed.
the
existing
important
routers.
to
unauthorized
be
access
able
to
using
trace
single
hop-by-hop
traceback
www.iaetsd.in
an attack packet.
detected
unauthorized
access,
we
used.
consists
level
components:
identifier
when
identifier
sending
to
the
interface
of
the
following
three
(1)Sensor :
the
datalink-level
identifier
function
in
address
unit.
buffer
memory
in
forwarding
nodes
to
www.iaetsd.in
(3)Monitoring Manager :
In response to a request from a
entire network.
Process Method:
Process Flow:
source identification,
boundary
if
neighboring
therefore
suggest
an
controls
the
tracing
process
and
Network (AMN).
The
monitoring
manager,
boundary,
the
the
monitoring
www.iaetsd.in
The image cannot be display ed. Your computer may not hav e enough memory to open the image, or the image may hav e been corrupted. Restart y our computer, and then open the
file again. If the red x still appears, y ou may hav e to delete the image and then insert it again.
the
AMNs
boundary,
Packet Feature :
Traceback Protocol:
Version
Header Length
Identification
trace
order
from
Protocol
A part of IP data
to
the
IP addresses
monitoring
manager.
A trace request and a notice of
the tracing result exchanged
between monitoring managers.
www.iaetsd.in
Versi
Header
Type of
on
Length
Service
Total Length
Identification
TTL
Flags
Protocol
Fragment
Header Checksums
Source IP Address
Destination IP Address
Options
Padding
Implementation
of
Our
and
Upstream
Network
Interface
Traceback System:
Decision
tracing tasks.
Implementation of Tracer:
module.
Packet
Search
2 modules.
manager
using
Notification
of
Processing Result.
process
After routing process,
Packet Conversion and Store process
gets a packet to forward and creates a
record containing the address of the
Routing
Process
Packet
store
Packet
Info
Area
Trace
Informa
tion
N/w
interface
Decision
module
www.iaetsd.in
Information Management:
Protocol process
Structure of tracer
Trace algorithm:
information
into
packet
that
information
stores
network
between
interface
two
units
packet
forwarding
Step 3:
features
time
which
of
includes
the
packet
Step
5:
Compares
the
Address
in trace information.
obtaining
network
interface
Checking
the
network
interface
www.iaetsd.in
Conclusion :
is
forged,
and
have
Method
3:
Order-driven
query
method
Without providing a
obtaining
fixed
network
table,
interface
identical
packets
are
sent
from
introduce
the
tracer
function.
communications.
in
the
ARP
table,
some
Authors :
Engineering
obtaining
the
latest
network
of Engineering
REFERENCES :
1.Mr.Ragav,
Technical
Lead-
NIIT,Chennai
2.Mr.D.Namachivayam,
Assistant
www.iaetsd.in
www.iaetsd.in
Research Scholar
St. Peters University
St. Peters Institute of Higher Education and Research
Avadi, Chennai-600 054
2
Abstract This paper investigates OFDMA and SCFDMA techniques combined with the Orthogonal
Frequency Division Multiplexing (OFDM). Single
carrier frequency Division Multiple Access(SC-FDMA)
is a notable application of Multiple Input Multiple
Output(MIMO) system. SC-FDMA is one of the most
promising techniques aiming at solving the capacity
problem of wireless communication systems and
achieving higher spectral efficiency, depending on
multiplexing signals based on their spatial signature.
On the other hand most third generation mobile phone
systems are using Code Division Multiple Access
(CDMA) as their modulation technique. CDMA is not
so complicated to implement as OFDM based systems.
As CDMA has a wide bandwidth, it is difficult to
equalize the overall spectrum - significant levels of
processing would be needed for this as it consists of a
continuous signal and not discrete carriers. Not as easy
to aggregate spectrum as for OFDM. For this reason,
CDMA is also investigating so that the performance of
OFDM-SC-FDMA can be compared. Various OFDMA
techniques are investigated including LTE or Long
Term Evolution is the brand name given to the efforts
of 3GPP 4th Generation technology development efforts
mostly in Europe and UMB (Ultra-Mobile Broadband)
is the brand name for similar efforts by 3GPP2, linear
detection schemes, minimum mean square error,
ordered successive cancellation, and maximum
likelihood methods. Promising results are obtained to
enhance spectral efficiency on the expense of
computational complexity which needs to be addressed.
I.
www.iaetsd.in
IV.
Evolution of LTE
www.iaetsd.in
V.
MIMO-OFDMA
SNR-OFDMA
www.iaetsd.in
VII.
What is OFDM?
X.
Principle of OFDM
Why OFDM?
www.iaetsd.in
XI.
The basic principle of OFDM is to split a highrate data stream into a number of lower rate
streams that are transmitted simultaneously over
a number of subcarriers. The block diagram
showing a simplified configuration for an
OFDM transmitter and receiver is given in Fig.1
& Fig. 2. [3]
XII.
Orthogonality
OFDM Applications:
www.iaetsd.in
XIV.
www.iaetsd.in
XVII.
Transceiver result
This simulates model of OFDMA and SCFDMA in Matlab. The block diagrams of
OFDMA and SC-FDMA are shown in Figure
16.1 and Figure 16.2 respectively, below. The
block diagrams of OFDMA and SC-FDMA are
similar to OFDM system, except the additional
subcarrier mapping and the position of some
blocks.[19]
Figure 17.1: BER vs SNR of OFDMA with
Adaptive Modulation.
Figure:16.1 Transmitter
www.iaetsd.in
XVIII.
The power spectral density of OFDMA and SCFDMA are shown in figure 19.1and figure 19.2
respectively.
www.iaetsd.in
b)
www.iaetsd.in
XXI.
Conclusion
XXII.
REFERENCES
[1] Broadband
MIMO-OFDM
Wireless
Communications : PROCEEDINGS OF THE
IEEE, VOL. 92, NO. 2, FEBRUARY 2004
[2] Design and BER Performance of MIMOOFDM
for
Wireless
Broadband
Communications, International Journal of
Modern Engineering Research (IJMER) Vol.3,
Issue.3, May-June. 2013 pp-1382-1385.
[3] A Review on OFDM: Concept, Scope & its
Applications, IOSR Journal of Mechanical and
Civil Engineering (IOSRJMCE) ISSN : 22781684 Volume 1, Issue 1 (May-June 2012), PP
07-11
[4] IMPLEMENTING SC-FDMA &OFDMA IN
MATLAB:
International
Journal
of
Computing and Corporate Research ISSN
(Online) : 2249-054X Volume 3 Issue 6
November 2013 International Manuscript ID :
2249054XV3I6112013-05 1
[5] A Modified Fast FFT Algorithm for OFDM
Based Future Wireless Communication
System: International Journal of Soft
Computing and Engineering (IJSCE) ISSN:
2231-2307, Volume-1, Issue-6, January 2012
[6] Fairness
Aware
Group
Proportional
Frequency Domain Resource Allocation in LSC-FDMA Based Uplink*: Int. J.
Communications, Network and System
Sciences,
2011,
4,
487-494
doi:10.4236/ijcns.2011.48060
Published
Online
August
2011
(http://www.SciRP.org/journal/ijcns)
[7] Orthogonal Frequency Division Multiplexing
Based Wireless Communication System for
Digital Broadcast Applications: IP Multimedia
Communications A Special Issue from IJCA www.ijcaonline.org
www.iaetsd.in
www.iaetsd.in