Académique Documents
Professionnel Documents
Culture Documents
ICDER - 2014
INTERNATIONAL CONFERENCE ON DEVELOPMENTS
IN ENGINEERING RESEARCH
Sponsored By
INTERNATIONAL ASSOCIATION OF ENGINEERING &
TECHNOLOGY FOR SKILL DEVELOPMENT
Technical Program
31 August, 2014
Hotel Pavani Residency, Nellore
Organized By
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL
DEVELOPMENT
www.iaetsd.in
http://www.iaetsd.in
About IAETSD:
The International Association of Engineering and Technology for Skill
Development (IAETSD) is a Professional and non-profit conference organizing
company devoted to promoting social, economic, and technical advancements
around the world by conducting international academic conferences in various
Engineering fields around the world. IAETSD organizes multidisciplinary
conferences for academics and professionals in the fields of Engineering. In order
to strengthen the skill development of the students IAETSD has established.
IAETSD is a meeting place where Engineering students can share their views,
ideas, can improve their technical knowledge, can develop their skills and for
presenting and discussing recent trends in advanced technologies, new educational
environments and innovative technology learning ideas. The intention of IAETSD
is to expand the knowledge beyond the boundaries by joining the hands with
students, researchers, academics and industrialists etc, to explore the technical
knowledge all over the
world, to publish proceedings. IAETSD offers
opportunities to learning professionals for the exploration of problems from many
disciplines of various Engineering fields to discover innovative solutions to
implement innovative ideas. IAETSD aimed to promote upcoming trends in
Engineering.
About ICDER:
The aim objective of ICDER is to present the latest research and results of
scientists related to all engineering departments topics. This conference provides
opportunities for the different areas delegates to exchange new ideas and
application experiences face to face, to establish business or research relations and
to find global partners for future collaboration. We hope that the conference results
constituted significant contribution to the knowledge in these up to date scientific
field. The organizing committee of conference is pleased to invite prospective
authors to submit their original manuscripts to ICDER 2014.
All full paper submissions will be peer reviewed and evaluated based on
originality, technical and/or research content/depth, correctness, relevance to
conference, contributions, and readability. The conference will be held every year
to make it an ideal platform for people to share views and experiences in current
trending technologies in the related areas.
ICDER - 2014
CONTENTS
11
20
30
5
6
7
8
9
10
35
39
44
50
56
62
11
67
12
73
13
81
14
86
15
90
16
96
17
105
18
112
19
120
1.INTRODUCTION:
Caching is a common technique for
improving the performance of distributed
file
systems[Howard88,
Nelson93,
Sandberg85]. Client caches filter application
I/O requests to avoid network and server
traffic, while server caches filter client cache
misses to reduce disk accesses. A drawback
of this organization is that the server cache
must be large enough to filter most client
cache misses, otherwise costly disk accesses
will dominate system performance.A
solution is to add another level to the storage
hierarchy, one that allows a client to access
blocks cached by other clients. This
technique
is
known
as cooperative
caching and it reduces the load on the server
by allowing some local client cache misses
to be handled by other clients.
The cooperative cache differs from the other
levels of the storage hierarchy in that it is
distributed across the clients and it therefore
shares the same physical memory as the
local caches of the clients. A local client
cache is controlled by the client, and a
server cache is controlled by the server, but
it is not clear who should control the
cooperative cache. For the cooperative cache
to be effective, the clients must somehow
coordinate their actions.
www.iaetsd.in
2.RELATED WORK:
There is a rich body of the existing
literature on several aspects of cooperative
caching including object replacements,
reducing cooperation overhead, cooperation
performance in traditional wired networks.
The Social Wireless Networks explored in
this paper, which are often formed using
mobile ad hoc network protocols, are
different in the caching context due to their
additional constraints such as topological
insatiability and limited resources. As a
result, most of the available cooperative
caching solutions for traditional static
networks are not directly applicable for the
SWNETs. Three caching schemes for
MANET have been presented[9][11].
in. In the first scheme, CacheData, a
forwarding node checks the passing-by
www.iaetsd.in
www.iaetsd.in
www.iaetsd.in
4 A Hint-based Algorithm
The
previous
cooperative
caching
algorithms rely in part on exact information,
or facts to manage the cache. Although facts
allow these algorithms to make optimal
decisions, they increase the latency of block
accesses and the load on the managers. Our
goal in designing a cooperative caching
algorithm is to remove the reliance on
centralized control of the cooperative cache.
Clients should be able to access and replace
blocks in the cooperative cache without
involving a manager.
Reducing the dependence of clients on
managers is achieved through the use
of hints information that only approximates
the global state of the system. The decisions
made by a hint-based system may not be
optimal, but managing hints is less
expensive than managing facts. Hints do not
need to be consistent throughout the system,
eliminating the need for centralized
coordination of the information flow. As
long as the overhead eliminated by not using
facts more than offsets the effect of making
mistakes, the gamble of using hints will pay
off.
The remainder of this section describes the
components of a hint-based algorithm.
Section 4.1 describes the hint-based block
lookup algorithm. Section 4.2 describes how
the replacement policy decides whether or
not to forward a block to the cooperative
cache. Section 4.3 discusses how the
replacement policy chooses the target client
for forwarding a block. Section 4.4 discusses
the use of the server cache to mask
replacement mistakes. Finally, Section 4.5
describes the effect of the cache consistency
protocol on the use of hints.
www.iaetsd.in
www.iaetsd.in
4.2 Forwarding
When a block is ejected from the local cache
of a client, the cooperative cache
replacement policy decides whether or not
the block should be forwarded to the
cooperative cache. As discussed earlier, one
of the motivations of the replacement policy
is to ensure that only one copy of a block is
stored in the cooperative cache. If not, the
cooperative cache will contain unnecessary
duplicate copies of the same block.
The previous algorithms rely on the manager
to determine whether or not a block should
be forwarded to the cooperative cache. A
block is forwarded if it is the only copy of
the block stored in either the local caches or
the cooperative cache. Maintaining this
invariant is expensive, however, requiring
an N-chance client to contact the manager
whenever it wishes to discard a block that is
not known to be a singlet, and the GMS
www.iaetsd.in
www.iaetsd.in
Action
Discard
Discard
Send to discard cache
www.iaetsd.in
6. Conclusion
Cooperative caching is a technique that
allows clients to access blocks stored in the
memory of other clients. This enables some
of the local cache misses to be handled by
other clients, offloading the server and
improving the performance of the system.
However, cooperative caching requires
some level of coordination between the
clients to maximize the overall system
performance. Previous cooperative caching
algorithms achieved this coordination by
maintaining global information about the
system state. This paper shows that allowing
clients to make local decisions based on
hints performs as well as the previous
algorithms, while requiring less overhead.
The hint-based algorithm's block access
times are as good as those of the previous
and ideal algorithms
7.References
[1] C. Aggarwal, J.L. Wolf, and P.S. Yu,
Caching on the World Wide Web, IEEE
Trans. Knowledge and Data Eng.,
vol. 11, no. 1, pp. 94-107, Jan./Feb. 1999
[2]. Denko, M.K., Tian, J.,Cross-Layer
Design for Cooperative Caching in Mobile
Ad Hoc Networks, Proc .of IEEE
Consumer Communications and Networking
Conf( 2008).
[3]. L. Yin, G. Cao: Supporting cooperative
caching in ad hoc networks, IEEE
Transactions on Mobile Computing,
5(1):77-89( 2006).
[4]. Chand, N. Joshi R.C., and Misra, M.,
Efficient Cooperative Caching in Ad Hoc
Networks Communication System
Software and Middleware.(2006).
[5] S. Lim, W. C. Lee, G. Cao, C. R. Das: A
novel caching scheme for internet based
mobile ad hoc networks. Proc .12th
Int. Conf. Computer Comm. Networks
(ICCCN 2003), 38-43 ( Oct. 2003).
www.iaetsd.in
rgbashyan@gmail.com
shanmugameeenec@gmail.com
I. INTRODUCTION
cracks are formed in the tracks .We know that tracks are
www.iaetsd.in
Optoelectronic
Displacement
Instrument
LCD
Module
IR
Transmitter
RS
232
Cable
Receiver
GSM
Module
Microcontroller
Railway
Control
Room
Ultra
sonic
sensor
ALARM
Robot platform
Battery and
voltage
regulator
Motor
Driver
Motor
www.iaetsd.in
using
DC
motor
driven
by
PIC
command.
systems
products.
Microcontroller
is
ROM,
RAM
and
number
of
I/O
ports
in
V. SENSOR
A sensor is a converter that measures a physical quantity and
converts it into a signal which can be read by an observer or
by an electronic instrument. IR transmitter and receiver is a
sensor using to detect the gap between the tracks. It originally
used for operating the device wirelessly from a short line-ofsight distance. Commonly, remote controls are Consumer
IR devices used to issue commands from a distance to
televisions or other consumer electronics such as stereo
systems, DVD players and dimmers. Remote controls for
these devices are usually small wireless handheld objects
with an array of buttons for adjusting various settings such
as television channel, track number, and volume. In fact, for
the majority of modern devices with this kind of control, the
remote control contains all the function controls while the
controlled device itself has only a handful of essential
primary controls. Most of these remote controls communicate
to their respective devices via infrared signals and a few
via radio
signals.
Earlier
remote
controls
in
1973
used ultrasonic tones. The remote control code, and thus the
required remote control device, is usually specific to a
product line, but there are universal remotes, which emulate
the remote control made for most major brand devices. The
main
USART,
timers,
compare
capture
and
pulse-width
technology
used
in
home
remote
controls
www.iaetsd.in
devices
consist
of
two
independent
voltage
and robotics.
www.iaetsd.in
VII. ADVANTAGES
1. Easy to construct
5. Avoid accidents
6. Frequently used
X. CONCLUSION
VIII. FURTHER APPLICATIONS
1. Military applications
2. Landmine detection
3. Firing situation
4. Flight runway
5. Boiler Tube
6. Refinery pipe line
www.iaetsd.in
Department of Electrical and Electronic Engineering, Madanapalle Institute of Technology and Science, Madanapalle
Department of Electrical and Electronic Engineering, Madanapalle Institute of Technology and Science, Madanapalle
Email: srinu.happytohelp@gmail.com, khadar.vl@gmail.com.
I.
INTRODUCTION
SYSTEM DESIGN
www.iaetsd.in
250W
227.6W
15.54%
+2%
30.1 V
8.30 A
37.2 V
8.87 A
-0.0034 V/K
0.00065 A/K
60X1
B.
560
1000
430-850
1250
500
243-310
3wire w/neut
1176
98.6
98.4
www.iaetsd.in
C.
min
maximum expected module
maximum power voltage(V
)
mp_min
(8)
temperature
temperature
Vmp_min = Vmp +{(
)(
)}
coefficient of Vmp
difference
(9)
temperature
Vmp_min = Vmp + {(T_max - T_STC ) (
)}
coefficient of Vmp
(10)
Where
Nmin = Minimum number of Modules in Series
Vmp = Maximum power voltage
Vmp_min = Minimum expected module maximum power voltage
T_max = Maximum temperature for the site
T_stc = Temperature at Standard Test Conditions
(18
(19)
In order to reduce losses, the overall voltage drop
between the PV array and the inverter (at STC) should be
www.iaetsd.in
String fuses
Fig.4. Sun path diagram for utility scale solar PV plant [26].
Sizing of transformer
IV.
ENGINEERNING
www.iaetsd.in
Tilt angle
Every location will have an optimal tilt angle that
maximizes the total annual irradiation (averaged over the
whole year) on the plane of the collector [20]. For fixed
tilt grid connected power plants, the theoretical optimum
tilt angle may be calculated from the latitude of the site.
Panel tilt angle() = -
(21)
360(284+ n)
Declination angle() = 23.45sin
365.24
(22)
where tiltangle
declinationangle
latitudeof thesite
n number of days in that month
Inter-row spacing
The choice of row spacing is a compromise
chosen to reduce inter-row shading while keeping the area
of the PV plant within reasonable limits, reducing cable
runs and keeping ohmic losses within acceptable limits.
Inter-row shading can never be reduced to zero [24]: at
the beginning and end of the day the shadow lengths are
extremely long, so we can maintain the inter row spacing
amoung arrays is two times to its height.
Orientation
B. Loss analysis
There are various losses are occurred in the large
scale solar pv power plant, the aggregation of those losses
in the large scale power system are shown in the fig.6 and
the percentage representation of losses in the system are
also shown in the fig.7.
Fig.8. Detailed power losses considered in sizing the power plant [26].
V.
MATLAB/SIMULINK MODELLING
www.iaetsd.in
(23)
V + IR S
I d = IS N P {{exp
VT =
Fig.9.Simulink model for the 25 mw solar PV plant
NS
n
(24)
]
VT C} - 1}
(25)
KTOP
q
(26)
2
q Eg
T
1
1
3
IS = I rs [ OP ] (exp
(
))
Tref
Kn Tref Top
I sc
I rs =
exp(
ISh =
qVoc
)
KCTop n
(27)
-1
(28)
IR S + V
RP
(29)
KTOP
VT =
q
(30)
Where
IA PV array output current
IPh Solar cell photocurrent
Ish Shunt current of PV array
PV array
Id
www.iaetsd.in
Vt
MI=
= 2 = 0.7855=78.55%
2Vdc 4
V
max-sixstep
(31)
Where VPWM is the maximum output voltage generated by
a SPWM and Vmax sixstep is the fundamental peak value of
a square wave.
C.
Filter
B.
Inverter
www.iaetsd.in
XC =
; X L2 = SL 2
CS
(32)
Therefore, f is bigger and XC is as smaller as better or both
the f and X L2 is as smaller as better. P is defined as the
rated output power of three-phase grid-connected inverter
cos is power factor, V is rated network voltage, and f is
driven frequency. Then equation (33) can be derived from
the constraint 1).
4fPL
(33)
5%
2
3V cos
2Vdc
i max = 3 + V
2L f
i max
(34)
2P
* (0.1 0.2)
(35)
3Vcos
Equations (34) and (35) can be derived from constraint 2)
and reference [25].The constraints 2) -5) show that the
values of L and C are as bigger as better.
f1
1
2
L1 + L 2
L1L 2C
D.
GRID IMPEDANCE
Filter capacitance
f =
grid frequency
VI.
(36)
www.iaetsd.in
Fig.23.Grid current
CONCLUSION
www.iaetsd.in
REFERENCES
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
P. Karki, B. Adhikary and K. Sherpa, "Comparative Study of GridTied Photovoltaic (PV) System in Kathmandu and Berlin Using
PV syst," IEEE ICSET, 2012.
H.L. Tsai, C.S. Tu, Y.J. Su, Development of generalized
photovoltaic model using MATLAB/SIMULINK, in: Proceedings
of the World Congress on Engineering and Computer Science, San
Francisco, USA, 2008
M.G. Villalva, J.R. Gazoli, E.R. Filho, Comprehensive approach to
modeling and simulation of photovoltaic arrays, IEEE Transaction
on Power Electronics 24 (2009) 1198-1204
A. A. Hassan, F. H. Fahmy, A. E.-S. A. Nafeh and M. A. El-Sayed,
"Modeling and Simulation of a Single Phase Grid Connected,"
WSEAS TRANSACTIONS on SYSTEMS and CONTROL, pp.
16-25, 2010
J.T. Bialasiewicz, Renewable energy systems with photovoltaic
power generators: Operation and modeling, IEEE Transactions on
Industrial Electronics 55 (2008) 2752-2758.
Jitendra
Kasera,
Ankit
Chaplot
and
Jai
Kumar
Maherchandani,(2012). Modeling and Simulation of Wind-PV
Hybrid Power System using Matlab/Simulink, IEEE Students
Conference on Electrical, Electronics and Computer Science.
K. T. Tan, P. L. So, Y. C. Chu, and K. H. Kwan, (2010).
Modeling, Control and Simulation of a Photovoltaic Power
System for Grid-connected and Standalone Applications, IEEEIPEC.46
J. M. Carrasco, L. G. Franquelo, J. T. Bialasiewicz, E. Galvn, R.
C. Portillo-Guisado, M. A. Martn-Prats, J. I. Len, N. MorenoAlfonso, Power electronic systems for the grid integration of
renewable energy sources: a survey, IEEE Trans. Industrial
Electronics, vol. 53, no. 4, pp.1002-1016, 2006
Soeren Baekhoej Kjaer, Member, IEEE, John K. Pedersen, Senior
Member, IEEE, and Frede Blaabjerg, A Review of Single-Phase
Grid-Connected Inverters for Photovoltaic Modules, IEEE
TRANSACTIONS ON INDUSTRY APPLICATIONS, VOL. 41,
NO. 5, SEPTEMBER/OCTOBER 2005.
Vasareviius D., Martaviius R. Solar Irradiance Model for Solar
Electric Panels and Solar Thermal Collectors in Lithuania //
Electronics and Electrical Engineering. Kaunas: Technologija,
2011. No. 2(108). P. 36.
M. G. Molina, and P. E. Mercado Modeling and Control of
Gridconnected PV Energy Conversion System used as a Dispersed
Generator.978-1-4244-2218-0/08/2008 IEEE B.
Soeren Baekhoej Kjaer, John K. Pedersen, Frede Blaabjerg,
Power Inverter Topologies for Photovoltaic Modules A
Review,
Verhoeven, et. al. Utility aspects of grid connected photovoltaic
power systems, International Energy Agency PVPS task V, 1998
M. Meinhardt, D. Wimmer, G. Cramer, Multi-string-converter:
The next step in evolution of string-converter, Proc. of 9th EPE,
2001, Graz, Austria.
S. Rustemli, F. Dincer, Modeling of Photovoltaic Panel and
Examining Effects of Temperature in Matlab/Simulink,
ELECTRONICS AND ELECTRICAL ENGINEERING 2011. No.
3(109).
F.Bouchafaa1, D.Beriber1, M.S.Boucherit, Modeling and control
of a gird connected PV generation system, 18th Mediterranean
Conference on Control & Automation Congress Palace Hotel,
Marrakech, Morocco June 23-25, 2010
Altas, I. H.; Sharaf, A.M., A Photovoltaic Array Simulation
Model for Matlab-Simulink GUI Environment, Clean Electrical
Power, 2007. ICCEP '07. International Conference on 21-23 May
2007 Page(s):341 345.
Huan-Liang Tsai, Ci-Siang Tu, and Yi-Jie Su, Development of
Generalized Photovoltaic Model Using MATLAB/SIMULINK
Proceedings of the World Congress on Engineering and Computer
Science 2008 WCECS 2008, October 22 - 24, 2008, San Francisco,
USA
R. Mechouma, B.Azoui, M.Chaabane, Three-Phase Grid
Connected Inverter for Photovoltaic Systems, a Review, 2012
First International Conference on Renewable Energies and
Vehicular Technology
20. Anita Marangoly George 2012 utility scale solar pv plant a guide
for developers and investors
21. Array to Inverter Matching Mastering Manual Design Calculations
solar weekly By John Berdner
22. Scaling Up for Commercial PV Systems solar weekly By John
Berdner
23. Crystalline Silicon Photovoltaic Modules solar weekly by John
Berdner
24. Array Trackers Increase Energy Yield & Return on Investment
solar weekly by Stephen Smith.
25. Juan Luis Agorreta, Mikel Borrega, Jesus Lopez, Modeling and
Control of N-Paralleled Grid-Connected Inverters With LCL Filter
Coupled Due to Grid Impedance in PV Plants Member, IEEE, and
Luis Marroyo, Member, IEEE.
26. PV syst software.
27. F. Liu, X. Zha, and S. Duan, Three-phase inverter with LCL filter
design parameters and research, Electric Power Systems, March
2010, pp. 110-115.
www.iaetsd.in
3
N.Pushpalatha
B. Neelima
Associate Professor
Assistant professor
Department of ECE, AITS
Department of ECE, AITS
Annamacharya Institute of Technology and Sciences,Tirupati,India-517520
Ch.v.Nagendra Babu
M.Tech(DECS), Student
1
nagendra.cherukupalli@gmail.com
pushpalatha_nainaru@rediffmail.com
3
neeli405@gmail.com
I. INTRODUCTION
Images captured by cameras may produce noise
due to malfunction of camera pixels. And these
captured images often were polluted by various
noises during the course in which they are generated
or transmitted. There are different types of noises,
such as White noise, salt and pepper noise, which
affect the vision of an image. Among all the types of
noises salt and pepper noise is the most frequent one.
Salt and pepper noise is a type of noise normally
seen on images. Salt and "impulsive" noise is
sometimes called salt-and-pepper noise or spike
noise. It represents itself as randomly occurring
white and black pixels. An image containing saltand-pepper noise will have dark pixels in bright
regions and bright pixels in dark regions. This type
of noise can be getting by analog-to-digital converter
errors, bit errors in transmission, etc. Here, the noise
is get by errors in the data transmission. The
corrupted pixels will be set to the either maximum
www.iaetsd.in
123
125
126
130
140
122
124
126
127
135
118
120
150
125
134
119
115
117
121
133
111
116
110
120
130
www.iaetsd.in
= , , ,, . . , ,
Ti is a threshold and yi,j is the filtered pixel
locating at position (i,j) . x Ti means that the
current pixel is much more different from its
neighbors and can be treated as a noise. x < Ti
denotes the current pixel to be regarded as a noisefree pixel. In fact, the impulse noise value is
distributed uniformly, once its value is rather close
to its neighbors such that x < Ti happens, the noise
pixel cannot be detected by SWM. Hence, this noise
pixel cannot be filtered unless the threshold is
lowered down. The lower the threshold is used, the
more are noise pixels detected, but less detail pixels
are preserved. In other words, there is a trade-off
between noise detection and detail preservation on
tuning the threshold[7].
, =
,
where = ,
<
Fig.4. Flow chart of Switching Median Filter
www.iaetsd.in
www.iaetsd.in
REFERRENCES
1.
2.
3.
4.
5.
J.
Astola
and
P.
Kuosmaneen,
Fundamentals of
Nonlinear
Digital
Filtering. Boca Raton, FL: CRC, 1997.
6.
7.
8.
9.
www.iaetsd.in
S. Savitha, PG Scholar,
Department of CSE,
Department of CSE,
savithasclick@gmail.com
thilagakarthick@yahoo.co.in
I. INTRODUCTION
Fig. 1. The Vanish system architecture [1]
www.iaetsd.in
Another scenario for storing the data and files is active storage
framework which has become one of the most important
research branches in the domain of intelligent storage systems.
For instance, Wickremesinghe et al. [34] proposed a model of
load-managed active storage, which strives to integrate
computation with storage access in a way that the system can
predict the effects of ofoading computation to Active Storage
Units (ASU). Hence, applications can be congured to match
hardware capabilities and load conditions. MVSS [35], a
storage system for active storage devices, provided a single
framework 2550 IEEE TRANSACTIONS ON MAGNETICS,
VOL. 49, NO. 6, JUNE 2013 to support various services at the
device level. MVSS separated the deployment of services
from le systems and thus allowed services to be migrated to
storage devices.
III. DISCUSSION AND RESULT
Various techniques has been covered to provide security for
the data stored in cloud alone with performance evaluation for
uploading and downloading the files. Researchers have mainly
concentrated on the algorithms that is used for key
encryption/decryption and sharing. Let us discuss various
approaches that has been used for the same.
This paper [3] describes vanish implementation that leads to
two Sybil attacks, where the encryption keys are stored in
million-node Vuze Bit Torrent DHT. These attacks happens
by crawling the DHT and saving each stored value before its
time goes out. More than 99% of Vanish messages can be
recovered with the keys efficiently in this method.
www.iaetsd.in
www.iaetsd.in
www.iaetsd.in
P. Venkatesh, PG Scholar,
Department of CSE,
Department of CSE,
venkimahalakshmi10@gmail.com
prabu_pdas@yahoo.co.in
I. INTRODUCTION
Wireless Sensor Networks is collection of sensing devices that
can communicate wirelessly. Each device can perform three
important tasks such as, Sense, process and talk to its peers.
Hence it has centralized Collection point (sink or base station).
A WSN can be defined as network devices, denoted as node,
which can sense the environment and communicate through
wireless links. The data is forwarded, possibly via multiple hops
to sink, that can use its locally or is connected to other network
(e.g. internet) through gateway. The node can be Stationary or
moving. They can be homogeneous or not [1].
The traditional single-sink WSN may suffer from lack of
scalability. So by increasing large number of nodes, amount of
data gathered by sink increases and once its capacity is reached,
the network cannot be increased. Furthermore, for reasons
related to MAC and routing aspects, network performance
cannot be considered independent from the network size.
www.iaetsd.in
In the [7] they have used the fixed packet size in WSN rather
than the variable packet size. Even though the variable packet
size will increase the throughput of the channel and enhance the
wireless sensor network transmission mechanism the simplicity
of such independent system is also compromised. Since
choosing the variable packet size leads to the resource
management overhead they choose the fixed size data packets
for energy efficient WSN. Basically, there are three fields in the
data packet.
1) Packet header.
2) Payload/Data Segment.
3) Packet Trailer.
The packet header contains many fields that are usually less
important for WSN nodes and removing those will help us to
reduce the packet size in the WSNs. Those fields include current
segment number, total number of segments, packet identifiers,
source and destination identifiers [7].By employing these
method the overall throughput and efficiency is increased.
www.iaetsd.in
www.iaetsd.in
2.
3.
4.
5.
www.iaetsd.in
6.
7.
8.
9.
www.iaetsd.in
ABSTRACT:
A Compressed air car is a car that
uses a motor powered by compressed air.
The car can be powered solely by air, or
combined (as in a hybrid electric vehicle).
Compressed air as a source of energy in
different uses in general and as a nonpolluting fuel in compressed air vehicles
has attracted scientists and engineers for
centuries. Efforts are being made by many
developers and manufacturers to master
the compressed air vehicle technology in
all respects for its earliest use by the
mankind. The present paper gives a brief
introduction to the latest developments of a
compressed-air vehicle along with an
introduction
to
various
problems
associated with the technology and their
solution. While developing of compressed
air vehicle, control of compressed air
parameters like temperature, energy
density, requirement of input power,
energy release and emission control have
to be mastered for the development of a
safe, light and cost effective compressed
air vehicle in near future.
tunnels
of
the
INTRODUCTION
Compared to batteries, compressed
air is favourable because of a high energy
density, low toxicity, fast filling at low
cost and long service life. These issues
make it technically challenging to design
air engines for all kind of compressed air
driven vehicles. To meet the growing
demand of public transportation,
sustainable
with
environmental
consciousness, people are in the search for
the ultimate clean car with zero-emissions.
Many concept vehicles were proposed that
run on everything from solar power to
algae, but most of them are expensive and
require hard-to-find fuels .Compressed air
vehicle project in the form of light utility
vehicle (LUV) (i.e., air car in particular)
has been a topic of great interest for the
last decade and many theoretical and
experimental investigations.
HISTORY OF CAV:
Compressed air has been used
since
the
19th
century
to
power mine locomotives and trams in
cities such as Paris (via a central, citylevel, compressed), and was previously the
basis of naval torpedo propulsion.
During the construction of
the Gotthardbahn from 1872 to 1882,
pneumatic locomotives were used in the
construction
of
the Gotthard
Rail
COMPRESSED
TECHNOLOGY
AIR
www.iaetsd.in
WORKING
The air-powered car runs on a
pneumatic motor that is powered by
compressed air stored on board of the
vehicle. Once compressed air is transferred
into the on board storage tank, it is slowly
released to power the cars pistons The
engine that is installed on the compressed
air car, uses compressed air which is stored
in the cars tank. The compressed air
drives the piston down as the power
stroke. At the end of the power stroke, the
compressed air is released through the
exhaust valves and the exhaust is only air.
The motor then converts the air power into
mechanical power. That power is then
transferred to the wheels and becomes the
source of power for the car. ( i.e. the
pistons were connected to the wheels
through the HERO HONDA bikes 4
speed transmission.). This modified engine
was
mounted
on
a
rectangular
crossectional frame and a body that looked
like a curious crossbreed of a car.
2
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT
41
www.iaetsd.in
COMPRESSED
AIR
TANK
Compressed air tank is one of the
most important part of these cars. These
tanks hold 0.05m3 of air to 30 bars. It is
similar to the tanks used to carry the liquid
gas. The tank enjoys the same technology
developed to containing natural gas. These
tanks do not explode in case of accidents
since there are no metals in them if made
of carbon fibre. So the selection of
material for the storage tank matters
much
in
safety.
2. ENGINE SPECIFICATIONS
Made: HERO HONDA
Model: CD100
Stroke: 4 stroke
No. of cylinders: Single cylinder
Displacement: 110 cc
1. Approximately
0.05
mt3 of
compressed air is stored in mild
steel tank in the vehicle.
2. The engine is powered by
compressed air, stored in the tank
at 30bar. In order to reduce weight,
The tank can be made of carbon
fibre.
3. The expansion of this air pushes
the piston and creates movement.
The atmospheric temperature is
used to reheat the engine and
increase the road coverage.
4. The air condition system can be
made use of the expelled cold air.
3. THE CHASSIS
Based on design principles in
aeronautics, engine has put together
highly-resistant, yet light, chassis, zinc
rods welded together. Using these rods
enables us to build a more shockresistant chassis than regular chassis,
allowing quick assembly and a more
secure. This system helps to reduce
manufacture time.
The
modifications
comprised
4. AIR FILTER
The engine works with air taken
from the atmosphere. Air is compressed by
the off-board compressor or at service
stations equipped with a high-pressure
compressor. Before compression, the air
must be filtered to get rid of any
impurities that could damage the
engine. Carbon filters are used to
eliminate dirt, dust, humidity and other
particles which, unfortunately, are found in
the air in our cities.
of:-
www.iaetsd.in
5. REFILLING
As these energies are so easy to
store Filling stations are setup as for
petrol and diesel. The filling of tank of an
air car nearly takes 3 to 4 minutes for cars.
Either, we can set up a filling equipment
too in our house, which is quite cheaper.
6. SPECIAL FEATURES
There is absolutely no fuel
required and no combustion
in the engine cylinder.
There is no pollution at all
as only air is taken in and
air is ejected out.
No Heat is generated, as
there is no combustion.
No engine cooling system
is required, like water
Pump, radiator, and water
Circulating pipes. It was
measured practically that
the engine exhaust is a
cooled air; its temperature
was measured as low as 5
degrees Celsius.
No
air
conditioning
system in the car is
required if used, the
exhaust chilled and clean
air can be recirculated
partly in the car to cool it.
The
atmospheric
temperature can fall down,
as the exhaust is a clean and
chilled air, so the problem
of pollution can be
permanently eradicated.
Very less maintenance is
required as there wont be
any soot formation.
Very low cost materials
can be used, as there is no
heat involvement.
Weight of the engine can
be reduced in the absence
of cooling system and
because of lightweight
material,
which
will
7. EMISSION OUTPUT
Since the compressed air is
filtered to protect the compressor
machinery, the air discharged has less
suspended dust in it, though there may be
carry-over of lubricants used in the engine.
The car works when gas expands.
ADVANTAGES
Compressed-air
vehicles
are
comparable in many ways to electric
vehicles, but use compressed air to store
the energy instead of batteries. Their
potential advantages over other vehicles
include:.
4
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT
43
www.iaetsd.in
DISADVANTAGES
The principal disadvantage is the
indirect use of energy. Energy is used to
compress air, which in turn provides
the energy to run the motor. Any
conversion of energy between forms
results in loss. For conventional
combustion motor cars, the energy is lost
when oil is converted to usable fuel
including drilling, refinement, labor,
storage, eventually transportation to the
end-user. For compressed-air cars, energy
is lost when electrical energy is converted
to compressed air.
POSSIBLE IMPROVEMENTS
Compressed-air vehicles operate to
a thermodynamic process as air cools
down when expanding and heats up when
being compressed. As it is not possible in
practice to use a theoretically ideal
process, losses occur and improvements
may involve reducing these, e.g., by using
large heat exchangers in order to use heat
from the ambient air and at the same time
provide air cooling in the passenger
compartment. At the other end, the heat
produced during compression can be
stored in water systems, physical or
chemical systems and reused later.
Refueling
the
compressed-air
container using a home or low-end
conventional air compressor may take
as long as 4 hours, while the
5
www.iaetsd.in
CONCLUSION
Its important to remember that
while vehicles running on only
compressed air might seem like a distant
dream, but they still have public interest
due to their environmental friendly nature.
Efforts should be to make them light, safe,
6
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT
45
www.iaetsd.in
1. INTRODUCTION
Cout = AB + A B Cin
A
B
(3)
Cin
Cout
(1)
(2)
www.iaetsd.in
Cout
Sum
www.iaetsd.in
(4)
3.646
58.2
0.8
3.915
84.6
0.9
5.165
144
1.0
5.401
220
www.iaetsd.in
(7)
Where,
Cl = load capacitance,
fclk = clock frequency,
= switching activity,
Isc = short circuit current,
Ileakage = leakage current,
Vdd = supply voltage
Table 2. Active power at difference voltages of 14t
full adder
Voltage 10T Full Adder(W) 14T Full Adder (W)
Fig.7. Leakage Current Waveform of Double Gate 14T
Full Adder at 0.7V
There are two types of leakage current: ac leakage and dc
leakage. Dc leakage current usually applies only to
end-product equipment, not to power supplies. Ac leakage
current is caused by a parallel combination of capacitance
and dc resistance between a voltage source (ac line) and the
grounded conductive parts of the equipment. The leakage
caused by the dc resistance usually is insignificant compared
to the ac impedance of various parallel capacitances.
0.7
9.34
13.7
0.8
15.21
23.56
0.9
21.95
39.69
29.61
61.52
www.iaetsd.in
5. CONCLUSION
The analysis carried out while analyzing both l0T and 14T
full adders individually and comparing them on the basis of
calculation of active power, leakage current and delay by
varying different parameters. The outcomes of the simulation
show that l0T full adder to be a better option with improved
performance over 14T structure. As compare to 14T double
gate full adder active power of 10T full adder is reduced from
13.7W to 9.34 W at 0.7V. As compare to 14T double gate
full adder Leakage current of 10T full adder is reduced from
58.2pA to 3.646pA at 0.7V.As compare to 10T double gate
full adder Delay of 14T double gate full adder is reduced from
171.3ps to 151ps.
Table 2 shows the active power of 10T and 14T full adder cell
using double gate MOSFET at different supply voltage. Fig 9
and fig 10 shows the active power waveform of double gate
14T and 10T full adder cell at 0.7V.
6. REFERENCES
[1] Sun, X.-G., Mao, Z.-G., and Lai, F.-C. A 64 bit parallel
CMOS adder for high performance processors, Proc. IEEE
Asia-Pacific Conf. on ASIC, 2002, pp. 205208.
4.3 DELAY
Propagation delay is required by a digital signal to travel
from that input of the circuit to the output. The propagation
delay is inversely proportional to the speed of the architecture
and hence it is important performance parameter. The basic
equation of delay in presence of sleep transistor is shown in
www.iaetsd.in
www.iaetsd.in
Abstract
In any integrated circuit Power consumption is an important
parameter in semiconductors industry. Normally flipflop and
Pdynamic=CV2.
Pshort circuit is the short circuit power which is caused by the
finite rise and fall time of input signals, resulting in both the
pull up network and pull down network to be ON for a short
while
I. INTRODUCTION
Power consumption being the major problem in achieving
high performance and it is listed as one of the top three
challenges in electronics industry. The clock system, which
consists of the clock distribution network and flip-flops and
latches, is one of the most power consuming components in a
VLSI system. It accounts for 30% to 60% of the total power
dissipation in a system. As a result, reducing the power
consumed by flip-flops will have a deep impact on the total
power consumed. A large portion of the on chip power is
consumed by the clock circuits.
Power consumption is determined by several factors
including frequency , supply voltage V, data activity ,
capacitance C, leakage, and short circuit current
P=Pdynamic+Pshort circuit+Pleakage
In the above equation, dynamic power Pdynamic is also called
the switching power,
www.iaetsd.in
2) Switching Activity:
If there is no switching in a circuit, then no dynamic power
will be consumed. There are two components to switching
activity, fclk which specifies the average periodicity of data
arrivals and E(sw) which determines how many transitions
each arrival will generate
3) Physical Capacitance:
Minimizing capacitances offers another technique for
minimizing power consumption. In order to consider this
possibility we must first understand what factors contribute
to the physical capacitance of a circuit. Power dissipation is
dependent on the physical capacitances seen by individual
gates in the circuit.
The leakage current, which is primarily determined by the
fabrication technology, consists of two components
1) Reverse bias current in the parasitic diodes formed
between source and drain diffusions and the bulk region in a
MOS transistor.
2) The sub threshold current that arises from the inversion
charge that exists at the gate voltages below the threshold
voltage.
3) The standby current which is the DC current drawn
continuously from Vdd to ground.
4) The short-circuit current which is due to the DC path
between the supply rails during output transitions.
5) The capacitance current which flows to charge and
discharge capacitive loads during logic changes.
www.iaetsd.in
www.iaetsd.in
www.iaetsd.in
VI.SIMULATION RESULTS
The simulation results for all existing and proposed flip-flops
were obtained in a 90nm CMOS technology at room
temperature using Tanner EDA Tools over various supply
voltages and frequencies. Table I show power comparison
results for the CDFF, CDMFF, CPSFF and the proposed
MT-CPSFF for 1.5, 2.5 and 3.5 supply voltage (Vdd) over
750MHz and 500MHz clock frequencies. Table I show that
CDFF has 38.39% less power consumption than
conventional DEFF at 750MHz clock frequency and 1.5Vdd.
The simulation results for all existing and proposed flip-flops
were obtained in a 90nm CMOS technology at room
temperature using Tanner EDA Tools 13.0 over
varioussupply voltages and frequencies. Table I show power
comparison results for the CDFF, CDMFF, CPSFF and the
proposed MT-CPSFF for 1.5, 2.5 and 3.5 supply voltage
(Vdd) over 750MHz and 500MHz clock frequencies. Table I
show that CDFF has 38.39% less power consumption.
Similarly at 500MHz and 3Vdd CDFF consumes 74.02% less
power than conventional DEFF. With the reduction in the
number of clocked transistor in the CDMFF as compared to
CDFF, the power consumption by CDMFF at 750MHz and
at1.5Vdd is 81.02% less as compared to the CDFF. Albeit
CDMFF reduces the power consumption to a considerable
amount, but it is susceptible to redundant clocking in
addition to a floating node. The CPSFF overcomes this
drawback by reducing the number of clocking transistors. For
500 MHz and at 3Vdd CPSFF consumes 53.80% less power
than CDMFF. Similarly at 750MHz and 1.5Vdd CPSFF
consumes 9.74% less power as compared to CDMFF. The
comparison shows that reducing the clocked transistors has a
major effect on reducing the total power consumption of the
design circuit.
www.iaetsd.in
FREQUENCY
DESIGN
NAME
ARE
A
SWI
TICHI
NG
TRAN
SISTO
R
500MHZ
POWER CONSUMPTION
1.5
CDFF
26
13
CDMFF
20
CPSFF
17
MT-CPSFF
21
MT-CPSFF
27
700MHZ
SUPPLY VOLTAGE
3
1.5
3V
9.7
54.8
14.6
82.0
1.9
49.6
2.7
53.7
1.3
22.9
2.5
32.8
1.2
7.7
2.12
11.6
1.1
7.5
2.00
10.5
VII CONCLUSION
In this paper, a new design for D and T flip-flop is introduced
to reduce internal switching activity of nodes and stand by
leakage power; along with this variety of design techniques
for low power clocking system are reviewed. This proposed
flip-flop reduces local clock transistor number and power
consumption as well. The proposed MT-CPSFF outperforms
previously existing CDFF, CDMFF and CPSFF in terms of
power and good output response by approximately 20% to
85%. Furthermore, several low power techniques, including
low swing and double edge clocking, can be explored to
incorporate into the new flip-flop to build system.
VIII REFERENCES
[1] M. Pedram, Power minimization in IC Design:
Principles and applications, ACM Transactions on Design
Automation of Electronic Systems, vol. 1, pp.3-56, Jan.
1996.
[2] S.M. Kang, Y. Leblebici CMOS Digital Integrated
Circuits analysis and design third edition, TMH, 2003.
[3] A. Keshavarzi, K. Roy, and C. F. Hawkins, Intrinsic
leakage in low power deep submicron CMOS ICs, in Proc.
Int. Test Conf., pp. 146 155, 1997.
[4] Z. Peiyi, M. Jason, K. Weidong, W. Nan, and W.
Zhongfeng Design of Sequential Elements for Low Power
Clocking System IEEE Transaction of Very large Scale
Integration July 2010.
www.iaetsd.in
S.Shafil Mohammad1,T.Prasad2
1.
INTRODUCTION
www.iaetsd.in
www.iaetsd.in
www.iaetsd.in
4.BLOCK DIAGRAM:
www.iaetsd.in
www.iaetsd.in
3
A.Rajani
P.Rajesh
Assistant Professor
Associate professor
Department of ECE
Department of ECE
Annamacharya Institute of Technology and Sciences,Tirupati,India-517520
G.Krishnaiah
M.Tech(DSCE), Student
sreekrishna.g@gmail.com
rajanirevanth446@gmail.com
3
rajeshpatur.aits@gmail.com
I. INTRODUCTION
The continuous increase in the congestion level,
especially at rush hours, on public roads , is a critical
problem in many countries and is becoming a major
concern to transportation specialists and decision
makers. The existing methods for traffic
management, surveillance and control are not
adequately efficient in terms of the performance,
cost, and the effort needed for maintenance and
support.
Many techniques has been used including,
ground level sensors like video image processing,
microwave radar, laser radar, passive infrared,
ultrasonic, and passive acoustic array. But, these
systems have a high equipment cost and their
accuracy is depends on environment conditions [1].
www.iaetsd.in
www.iaetsd.in
www.iaetsd.in
www.iaetsd.in
REFERENCES
5. I.
F.
Akyildiz,
W.
Su,
Y.
Sankarasubramaniam, and E. Cayirci, A
survey on sensor networks, IEEE
Communications Magazine, Vol. 40, 2002,
pp. 102-114.
www.iaetsd.in
Electrical
Science
and
Engineering,
Massachusetts Institute of Technology, June
2000.
www.iaetsd.in
www.iaetsd.in
Wireless
Connectivity
Over Bluetooth:
Network Arrangement:
Bluetooth network arrangements can
be either point-to-point or point-tomultipoint.
The various network arrangements
regarding Bluetooth are:
a) Single-slave
b) Multi-slave(up to 7 Slaves on one
master)
c) Scatternet
A Piconet:
When a device wants to establish a
Piconet it has to perform inquiry to
discover other Blue tooth devices in
the range. Inquiry procedure is
defined in such a way to ensure that
two devices will after some time, visit
the same frequency same time when
that happens, required information is
exchanged and devices can use paging
SLA
VE 3
MAS
TER
SLA
VE 1
SLA
VE 2
TER
SLAVE
www.iaetsd.in
SLAV
BY
A Scatternet:
Frequency
doping
in
Bluetooth:
Bluetooth has been designed to
operate in a noisy radio frequency
environment, and uses a fast
acknowledgement and frequencyhopping scheme to make link robust,
communication wise. Bluetooth radio
modules avoid interference from other
signals by hopping to a frequency
after transmitting or receiving a
packet. Thus, Bluetooth modules use
Frequency-Hopping Spread Spectrum
(FHSS) techniques for voice and data
transmission. Compared with other
systems operating in the same
frequency band, Bluetooth radio
typically hops faster and uses shorter
packets.
www.iaetsd.in
www.iaetsd.in
Short
range
wirel
ess
interf
sensor
Gate
way
logic
Publi
c
netw
ork
interf
Internet
User
www.iaetsd.in
Conditioned
along
sensor
signal is digitized and digital data is
www.iaetsd.in
Bluetooth
module
Hardware Architecture
The CPU core allows the blue
tooth module to handle inquiries and
filter page request without involving
the host device. The host controller
can be programmed to answer certain
page messages and authenticate
remote links. The link manager(LM)
software runs on the CPU core. The
LM discovers other remote LMs and
communicates with them via the link
manager protocol (LMP) to perform
its service provider role using the
services of the underlying LC. The
link manager is a software function
that uses the services of the link
controller to perform link setup,
authentication, link configuration, and
other protocols. Depending on the
implementation, the link controller
and link manager functions may not
reside in the same processor.
Another function component is
of course, the antenna, which may be
integrated on the PCB or come as a
standalone item. A fully implemented
blue tooth module also incorporates
higher-level
software
protocols,
which govern the functionality and
interoperability with other modules.
Gate way plays the role of the
Piconets master in the sensor
network. It controls establishments of
the network, gathers information
about the existing smart sensor nodes
and sensor attached to them and
provides access to them.
Discovery Of The Smart Sensor
Nodes
www.iaetsd.in
Conclution:
Blue tooth represents a great chance
for sensor-networked architecture.
This architecture heralds wireless
future for home and also for industrial
implementation. With a blue tooth RF
link, users only need to bring the
devices with in range, and the devices
will automatically link up and
exchange information.
Thus implementation of blue
tooth technology for sensor networks
not only cuts wiring cost but also
integrates the industrial environment
to smarter environment.
Today,
with
a
broader
specifications
and
a
renewed
concentration on interoperability,
manufacturers are ready to forge
ahead and take blue tooth products to
the market place. Embedded design
can incorporate the blue tooth
wireless technology into a range of
new products to meet the growing
demand for connected information
appliances.
References:
1.G.I.Pottie,
W.J.Kaiser
Wireless
Integrated
network
sensors, Communications of the
ACM, May 2002.
2.C.Shen, C.Srisathapomphat
sensor networking architecture and
application,
IEEC
personal
communication. Aug,2001.
3.C.Chellappan,
RTCBPA,
June 2003.
4.Pappa,Transducer networks,
RTCBPA, June 2003.
www.iaetsd.in
shared
pool
of
configurable
computing
resources.
I. INTRODUCTION
Public auditing scheme allow users
In recent years, the emerging cloud
computing
provides
scalability
photos.
But
for
sensitive
and
www.iaetsd.in
small
metadata
called
homomorphism
keys.
Existing public auditing schemes can
already support public auditing and various
kinds of full dynamic data updates at the same
time. However, there are a few problems that we
aim to work on this. First, thus introducing very
large communication cost for dynamic data
verification, because verification process for
each dynamic operation needs O (log n)
communication complexity and update all
replicas. Second, best our knowledge, there is no
existing integrity auditing scheme can provide
public verification and authentication of block
indices at the same time.
In this paper, we present a multi-replica
dynamic public auditing scheme that can bridge
authentication
information.
Therefore,
the
the
authors
proposed
multi-replica
block
and
all
replica
blocks.
The
www.iaetsd.in
a) Preliminaries
i)
Bilinear Pairing
auditing
efficient
useful
where
is
1. Bilinearity - ,
( , ) ;
2. Non-degeneracy
important data.
( , ) 1;
3. Computability
should
be
efficient
computable.
b) Merkle Hash Tree
the
data
node
itself
and
its
auxiliary
Auditing
A Multi-replica Merkle hash tree(MR-
Fig.3.
parties.
www.iaetsd.in
REFERENCES
[1] Yan Zhua, b, Hongxin Huc, Gail-Joon Ahnc,
Stephen
S.Yauc.
Efficient
audit
service
http://hadoop.apache.org, accessed on 25
March, 2013.
Data
Possession,"
ACM
System
www.iaetsd.in
AUTHORS
Mr.SHAIK ISMAIL
received
the
AVS
College of Engineering
&Technology, Nellore,
B.Tech
degree
in
Nehru
Anantapur,
in
Audisankara
technological
2012,
College
and
of
university
received
the
Engineering
and
Computer
Networks,
Mobile
www.iaetsd.in
Abstract Wireless
I. INTRODUCTION
Inside multi-hop Instant sensor sites (WSNs) happen
to be attracting great curiosity about many applications linked
to monitoring in addition to control associated with
environmental as well as physical circumstances, such as
industry monitoring and military operations. After a WSN will
be deployed inside field, it can be necessary in order to update
the particular installed applications or stashed parameters
inside sensor nodes. This is achieved simply by dissemination
services which ensure new applications or parameter values for
being propagated during the entire WSN making sure that all
nodes use a consistent duplicate. Normally, a brand new
program is on the order associated with kilobytes though a
parameter is simply few bytes extended. Due to such a vast
imbalance between their sizes, the look considerations in their
dissemination protocols will vary.
www.iaetsd.in
www.iaetsd.in
www.iaetsd.in
V. CONCLUSION
www.iaetsd.in
S.Sruthi1, V.Viswanath2
AbstractIn this paper, a novel low-power pulsetriggered ip-op (FF) design is presented. First, the
pulse generation control logic, an AND function, is
removed from the critical path to facilitate a faster
discharge operation. A simple two-transistor AND gate
design is used to reduce the circuit complexity. Second,
a conditional pulse-enhancement technique is devised
to speed up the discharge along the critical path only
when needed. As a result, transistor sizes in delay
inverter and pulse-generation circuit can be reduced
for power saving. Various postlayout simulation results
based on UMC CMOS 90-nm technology reveal that the
proposed design features the best power-delay-product
performance in seven FF designs under comparison.
Its maximum power saving against rival designs is up
to 38.4%. Compared with the conventional transmission
gate-based FF design, the average leakage power
consumption is also reduced by a factor of 3.52.
Index Terms Flip-op, Low power, Pulsetriggered.
1.
I NTRODUCTION
www.iaetsd.in
Fig :Conventional Pulse-Triggered FF designs (a) ipDCO (b) MHLLF (c) SCCER
www.iaetsd.in
www.iaetsd.in
www.iaetsd.in
CONCLUSION
In this paper, we devise a novel low-power pulsetriggered FF design by employing two new design
measures. The rst one successfully reduces the
number of transistors stacked along the discharging
path by incorporating a PTL-based AND logic. The
second one supports conditional enhancement to
the height and width of the discharging pulse so
that the size of the transistors in the pulse
generation circuit can be kept minimum.
Simulation results indicate that the proposed design
excels rival designs in performance indexes such as
power, D-to-Q delay, and PDP. Coupled with
these design merits is a longer hold-time
requirement inherent in pulse-triggered FF designs.
However, hold-time violations are much easier to
x in circuit design compared with the failures in
speed or power.
www.iaetsd.in
REFERENCES
[1] H. Kawaguchi and T. Sakurai, A reduced
clock-swing ip-op(RCSFF) for 63% power
reduction, IEEE J. Solid-State Circuits , vol. 33,
no. 5, pp. 807811, May 1998.
www.iaetsd.in
Keywords:On-line
Social
Networks,
Classication,Fuzzy rule based classication
systems,Imbalanced data-sets , Genetic rule
selection
1.INTRODUCTION
Online Social Networks (OSNs) are today
one of the most popular interactive medium
to communicate, share and disseminate a
considerable amount of human life
information.
Daily
and
continuous
communications imply the exchange of
several types of content, including free text,
image, audio and video data. The huge and
dynamic character of these data creates
the premise for the employment of web
content mining strategies aimed to
automatically discover useful information
dormant within the data. They are
instrumental to provide an active support in
complex and sophisticated tasks involved
in OSN management, such as for instance
access control or information filtering.
Information filtering has been greatly
explored for what concerns
textual
documents and more recently, web content
[1-3].Information filtering can therefore be
used to give users
the
ability
to
automatically control the messages written
on their own walls, by filtering out
unwanted messages. Indeed, today OSNs
provide very little support to prevent
unwanted messages on user walls [4-6]. No
content-based preferences are supported
and therefore it is not possible to prevent
undesired messages, Providing this service
is not only a matter of using previously
www.iaetsd.in
2. LITERATURE REVIEW
The main contribution of this paper is the
design of a system providing customizable
content-based message filtering for OSNs,
based on ML techniques. As we have
pointed out in the introduction, to the best of
our knowledge we are the first proposing
such kind of application for OSNs.
However, our work has relationships both
with the state of the art in content-based
filtering, as well as with the field of policybased personalization for OSNs and, more in
general, web contents. Therefore, in what
follows, we survey the literature in both
these fields.
2.1 Content-based filtering:
Information filtering systems are designed
to classify a stream of dynamically
generated
information
dispatched
asynchronously by an information producer
and present to the user those information
that are likely to satisfy his/her requirements
[3]. In content-based filtering each user is
assumed to operate independently. As a
result, a content-based filtering system
selects information items based on the
correlation between the content of the items
and the user preferences as opposed to a
collaborative filtering system that chooses
items based on the correlation between
people with similar preferences. Documents
processed in content-based filtering are
mostly textual in nature and this makes
content-based filtering close to text
classification. The activity of filtering can be
modeled, in fact, as a case of single label,
binary classification, partitioning incoming
www.iaetsd.in
www.iaetsd.in
www.iaetsd.in
www.iaetsd.in
www.iaetsd.in
Class
Positive class
Negative class
Positive
prediction
True
positive(TP)
False
positive(FP)
Negative
Prediction
False
Negative(FN)
True
Negative(TN)
www.iaetsd.in
6. CONCLUSION
In this paper, we have proposed an HFRBCS
approach for classification with imbalanced
data-sets. Our aim was to employ a
hierarchical model to obtain a good balance
among different granularity levels. A fine
granularity is applied in the boundary areas,
and a thick granularity may be applied in the
rest of the classification space providing a
good generalization. Thus,this approach
enhances the classification performance in
the overlapping areas between the minority
and majority classes.Furthermore, we have
made use of the SMOTE algorithm in order
to balance the training data before the rule
learning
generation
phase.
This
preprocessing step enables the obtention of
better fuzzy rules than using the original
data-sets and therefore, we improve the
global performance of the fuzzy model to
filter out unwanted messages from Online
Social Networking (OSN).
7.REFERENCES
[1] R. Alcal, J. Alcal-Fdez, F. Herrera, J.
Otero, Genetic learning of accurate and
compact fuzzy rule based systems based on
the 2-tuples linguistic representation,
www.iaetsd.in
www.iaetsd.in
_____________________________________________________________________________
Cloud computing provides multiple services to the cloud users, particularly in Infrastructure as a service (Ias)
clouds user may install vulnerable software on their virtual machines. Attackers exploit these virtual machines to
compromise as zombie and by using it attacker can perform Distributed denial of service (DDOS) attacks. The
Distributed Denial of service attacks (DDOS) caused by the extreme flow of requests from clients to the cloud
sever at the same time. The DDOS attacks are very much high in the existing Intrusion detection systems. To
overcome these problems a modified approach called Effective Intrusion Detection and reducing Security risks in
Virtual Networks (EDSV) is proposed. It enhances the intrusion detection by closely inspecting the suspicious
cloud traffic and determines the compromised machines A novel attack graph based alert correlation algorithm
is used to detect DDOS attacks and reduced to low level by incorporating access control and software switching
mechanism. It also reduces the infrastructure response time and CPU utilization.
Keywords: cloud computing, Network Security, DDOS, Intruder, Zombie detection
I.
INTRODUCTION
It
supports three
important
www.iaetsd.in
services,
priorities,
warranties
and
responsibilities,
guarantees.
In
cloud
simultaneously.
Also
this
II.
EXISTING SYSTEM
focuses
on
the
detection
of
virtual
machines
and
secure
TIME(ms)
www.iaetsd.in
suspicious
virtual machine
for
further
detailed investigation.
Time(ms)
time
taken to
create
virtual
machines.
PROPOSED SYSTEM
the
proposed
system,
avoiding
and
measurement.
Analytical
Attack
graph
is
node
successful
software
to target
attack.
switching
node represent
EDSV
solution
incorporates
to
cloud
service
provider
allows
isolate
www.iaetsd.in
etc
.This
Intrusion
detection
then
Account
T1,
Intruders
table
T2,
10. else
11. (Accept the login request) and (Start
communication)
12.
end_ if
13. end_ if
14. end_ if
15. end_ if
correlation
analyser
performs
three
major
alert
correlation
and
countermeasure
then
initial
node
to target
node represent
int_mac_a in T2)
www.iaetsd.in
alerts as edges.
by adding it.
loaded,
The
the
database
with
alert
network
controller
is
major
classification of alerts.
www.iaetsd.in
detection
system.
References
about
network
flow
and
accuracy,
hybrid
intrusion
be
computing
v1.0,
https://cloudsecurityalliance.org/topthreats/
csathreats.v1.0.pdf,March 2010.
IV.
CONCLUSIONS
IEEE
creates alert
effective
countermeasures.
Software
Trans.
Dependable
and
Secure
2012.
survey:
framework
and
www.iaetsd.in
updating
attack
graphs,
Computer
9. Open
vSwitch
project,
graph
based
network
www.iaetsd.in
thus
distinguished.
those
occurrences
still
cannot
be
substring containing q.
Shortest unique substring queries have
I.
INTRODUCTION
www.iaetsd.in
shortest
unique
substring
every 1 | |, [ ] = [ ]. X is called a
denoted by
from the
minimal substrings.
< .
length of string S.
Third, we show that, using O(n h) time
and O(n) space, we can compute a shortest unique
substring for every position in a given string,
where h is variable theoretically in O(n) but on
real data sets often much smaller than n and can be
treated as a constant.
II. SMALLEST UNIQUE SUBSTRING QUERIES
substring
queries,
and
discuss
the
[ , ] is also
www.iaetsd.in
[ , ] is
exactly on suffix of S.
unique for
< . Symmetrically,
<
.
Moreover, we define the left SUS be the
leftmost-SUS(p).
4.
S = 11011001.
www.iaetsd.in
2)
anything.
When we expand the tree from j = 1 to j =
I during phase i+1, the occurrences of this three
phases follow some properties. First, after case 2
or case 3 happen, and then case 1 will never
happens. With these properties, once we meet case
3 at step j of phase i, we can immediately finish
the current phase and start the phase i+1 at step j.
To
ensure
O(n)
construction
time,
5. Return [ , + 1]
in Algorithm 2.
www.iaetsd.in
T of S
either i = p or j = p.
2. if
[ , ] be
3.
them
( );
4. else
5.
[ , ] be [1, ];
substring
6. else if
7.
9. end if
11.
then
p;
14.
12. end if
13. if
B. The Framework
1 do
10.
[, ]
1 then = ; = ,
end if
(| |)
1.
2. Initialize
for 1
| |;
(1), denoted by [1, ] as
3. Output LSUS
| |
1,
www.iaetsd.in
[, ]
6. Let
suffix tree;
7. Let S[i, j] be the shortest substring among the
following
.
strings:
.
,
(1)
[ , ],
<
and (4) [
(3)
position k to propagate
[ , ] as a SUS at
= [ , ] .
8. suppose .
>
call PROPAGATE ( [ , ], + 1
10.
[ , ], and
>
call PROPAGTE( [ , ], + 1
13.
end if
,
14.
15.
<
> then
return
5: else if .
I null then
[ , ]; return
7: end if
8: supposed .
9:
> 1 then .
;
is longer than
[, ]
11. end if
12. if
2:
6:
position ;
9. if .
(2)
if
10: .
11:
At the beginning, we initialize p.cand to
>
12:
13:
[ , ]
call PROPAGATE (
<
17: else [ , ]
18:
if < then
19:
20:
, + 1);
< then
[, ]
16:
C. MUS Propagation
end if
14: else if
15:
[ , ] ends before .
21:
24:
25:
[ , ]
call PROPAGATE(
else
, + 1)
>
call PROPAGATE ( [ , ], + 1)
22:
23:
end if
end if
return
www.iaetsd.in
V. EXPECTED RESULTS
Suppose we want to conduct extensive
experiments on three real data sets and a group of
synthetic data sets to evaluate our methods.
Mainly we consider three real data sets will be
used in our experiments. the first data set is an
introduction of R language, appear of the FAQa on
the R project website (http://www.r-project.org/).
The second real data set is the genome sequence of
Mycoplasma genitalium, the pathogentic bacterium that has one of the smallest genomes known
for any free-living organism. The third data is the
Bible.
REFERENCES
[1] B. Haubold, N. Pierstorff, F. Moller, and T.
Wiehe, Genome comparison without alignment
using
shortest
unique
substrings,
BMC
P.
Weiner,
Linear
pattern
matching
For
the R-sequence,
we chose the
319327.
[4] E. Ukkonen, On-line construction of suffix
trees, Algorithmica, vol. 14, pp. 249260, 1995.
(FOCS97), 1997.
A taxonomy
decreases.
2, July 2007.
VI.
CONCLUSION
of
suffix
array
construction
substrings,
in
Proc.
20th
Annual
5467.
www.iaetsd.in
Journal
of
Proteomics
and
www.iaetsd.in
www.iaetsd.in
www.iaetsd.in
Environmental Aging:
Core Insulation: Water Absorption., Chemical
contamination.
Stator/Rotor Insulation: Water Absorption.,
Chemical Contamination.
www.iaetsd.in
www.iaetsd.in
Reference
Insulation
Resistance (IR)/
Mega ohm
[2]
[11]-[15]
Winding
resistance/DC
conductivity Test
Polarization index
(PI)
(DC HIPOT)
DC High potential
test
[2], [8],
[11]
Positive Features
Negative Features
Easy to perform
[2]
[11]-[13]
[6]
[11]-[13]
Easy to perform,
Less sensitive to temperature than IR-test
Easy to perform, if test doesnt fail the
insulation is likely to work flawlessly until
the next maintenance periodmore
predictive character than PI and IR
(AC HIPOT)
AC High potential
Test
Growler
[2]
[12],[13]
SurgeTest
[2],[4],[11]
[16]
[16]
Signature Analysis of
Terminal voltage
after switch-off
Partial Discharge
[2],[1]
Dissipation factor
[2],[14],[15
]
Inductive Impedance
[2]
----
www.iaetsd.in
TABLE II
DIFFERENT METHODS TO TEST THE STATOR INSULATION SYSTEM OF ELECTRICAL DRIVES
Method
Reference
Positive Features
Negative sequence
current
[31],[34]
Sequence Impedance
Matrix
[51]-[52]
[49]
Pendulous oscillation
phenomenon
Airgap Flux signature,
Axial leakage Flux
Current signature
analysis
Vibration signature
analysis
Online partial
discharge
[50]
[54]
[55]-[56]
[57]-[58]
[7],[41]-[48]
Ozone
[6]
By-product of PD
High Frequency
Impedance
[34]-[36]
Temperature
monitoring
[6],[24],[27][35]
Detects deterioration in
phase-to-ground and faults
in turn-to-turn insulation
Leakage currents
[32],[33]
Detects deterioration in
phase-to-ground and
phase-to-phase insulation
Detects faults and
problems with phase-toground and turn-to-turn
insulation
Condition Monitors
and Tagging
compounds
[6],[24]
Non-invasive, interpretation of
results subjective.
Non-invasive, capable of
determining the cause of
deterioration.
----
Negative Features
Non-idealities that complicate
fault detection
Non-idealities that complicate
fault detection
Non-idealities that complicate
fault detection, neutral of the
machine has to be accessible
---Invasive, results strongly
depend on the load.
Further research advised to
generalize results.
Non-invasive,Further research
advised to generalize results.
Difficulty in interpretation of
the data, not applicable to low
voltage machines, additional
equipment required.
Invasive(gas analysis tube or
electronic instrument).
Invasive(search coil), not tested
widely yet.
Invasive if sensors are required,
a lot of data and additional
information like ambient
temperature required.
---Invasive (equipment for
detection of particles required
and chemicals have to be
applied to machine)
www.iaetsd.in
www.iaetsd.in
References:
[1] H. W. Penrose, Test methods for determining the impact of
motor condition on motor efficiency and reliability, Ph.D.
dissertation, ALLTEST Pro, LLC, Old Saybrook, CT.
[2] G. C. Stone, E. A. Boulter, I. Culbert, and H. Dhirani,
Electrical Insulation for Rotating Machines: Design, Evaluation,
Aging, Testing, and Repair. Piscataway, NJ: IEEE Press, 2004.
[3] A. Siddique, G. S. Yadava, and B. Singh, A review of stator
fault monitoring techniques of induction motors, IEEE Trans.
Energy Convers., vol. 20, no. 1, pp. 106114, Mar. 2005.
[4] D. E. Schump, Testing to assure reliable operation of electric
motors, in Proc. IEEE Ind. Appl. Soc. 37th Annu. Petrol. Chem.
Ind. Conf., Sep. 1012, 1990, pp. 179184.
[5] J. Geiman, DC step-voltage and surge testing of motors,
Maint.Technol.,vol. 20, no. 3, pp. 3239, 2007.
[6] Improved motors for utility applications, General Elect. Co.,
Schenectady, NY, p. 1763-1, EPRI EL-4286, Oct. 1982.
[7] G. C. Stone, Advancements during the past quarter century in
on-line monitoring of motor and generator winding insulation,
IEEE Trans.Dielectr. Electr.Insul., vol. 9, no. 5, pp. 746751, Oct.
2002.
[8] M. E. H. Benbouzid, Bibliography on induction motors faults
www.iaetsd.in
www.iaetsd.in
10
www.iaetsd.in