Dual Frequency Circular Shaped Two Port MIMO Antenna
Design and Development of Portable Oxygen Concentrator
Design and Simulation of Antenna for Foliage Penetration Application
Performance Enhancement of Microstrip Patch Antenna with Slots for 5G Communication
Ergonomic Wheelchair - Stretcher for Enhanced Patient Mobility
The Impact of Substrate Doping Concentration on Electrical Characteristics of 45nm Nmos Device
A Study on Globally Asynchronous and locally Synchronous System
Method of 2.5 V RGMII Interface I/O Duty Cycle and Delay Skew Enhancement
Performance Analysis of Modified Source Junctionless Fully Depleted Silicon-on-Insulator MOSFET
Automatic Accident Detection and Tracking of Vehicles by Using MEMS
Efficient Image Compression Algorithms Using Evolved Wavelets
Computer Modeling and Simulation of Ultrasonic Signal Processing and Measurements
Effect of Nano-Coatings on Waste-to-Energy (WTE) plant : A Review
ANFIS Controlled Solar Pumping System
Dual Frequency Circular Shaped Two Port MIMO Antenna
Superior system and network security starts with a good indulgent of an organization’s operating environment. Organizations that have a good understanding of their operating environment and that environment’s boundaries and vulnerabilities should be able to secure their system moderately . Maintaining a high level of system security, however, is an on-going process that requires continued attention and solid organizational policies and procedures. This paper will review the various malware potential with different Operating System. It will help us to get a new system that will suitable to any operating system to safeguard from the malware.
This paper presents a new topology of Bidirectional Buck Boost Converter which produces a regulated DC output. This converter provides the steady state output using both buck and boost operation and produces an output voltage which is maintained constant with either higher or lower input voltage. The average output voltage of buck boost converter depends upon duty cycle (D), frequency (f) and input voltage (Vs). The switching frequency is maintained at 1 kHz and the output is maintained constant at 230V DC. The main application of this project is in the working of hybrid electric vehicle. By implementing this circuit in the architecture of the hybrid electric vehicle the efficiency of operation of the vehicle is increased and the cost involved is reduced. The entire proposed circuit is designed and simulated by MATLAB\SIMULINK and verified with hardware results.
In the field of rotating machines, it is necessary to monitor & online diagnosis for the analysis of vibrations of the machine. This paper focused on vibration signals which are taken from developed prototype of a Rubber Roll Sheller Machine and FFT analysis is performed on the acquired signals under no load & load Conditions. This newly developed data acquisition system is capable of acquiring vibration data from various rotating machines under different load conditions which can further be utilized efficiently for the condition monitoring of machines under various test conditions. This approach carries simplicity & flexibility from other techniques and also it is easy to operate, quickly installed, computer friendly approach and it is cost effective.
Online concurrent testing of VLSI circuits continues to be a challenge because of the need to test circuits during their normal operation. As offline test techniques and online non-concurrent BISTs cannot be used, new techniques like input vector monitoring concurrent BIST schemes were attempted. But the best of the techniques suffer from major limitations like extremely high concurrent test latency, exponential area overhead, limited fault models and therefore are not a viable solution. In this paper a novel output vector monitoring concurrent BIST scheme is presented. The proposed scheme uses the advantage of an embedded system application and tests only for faults that can occur for the currently loaded application using the run time vectors. This method brings down concurrent test latency to a small fraction, tests for all at-speed fault models, uses a scalable BIST architecture without a noticeable increase in overhead. It eliminates aliasing completely because of double vector compactors. The BIST can also be used for offline concurrent tests which can provide additional coverage to a SBST method. The applicability is validated by implementing the scheme for ALU and decoder in OC8051. To the best of our knowledge the concurrent online BIST using output vector monitoring which works for both online and offline tests is presented for the first time in the open literature.
In this paper, we have investigated the waiting time/delay of a broad class of mobile communication system-oriented queuing models. Both exact analytic and approximation algorithm techniques are employed in order to obtain the exact and approximate waiting/delay distribution of those models. We concentrate on probability distribution instead of mean value because a one-point estimate is not sufficient to provide a good performance evaluation. We propose different queuing models in order to describe different characteristics of mobile systems. Different server control mechanisms are implemented in order to optimize channel (or server) utilization. Here the tandem queues with BAS blocking policy are investigated.
This paper presents a design of miniaturized band pass filters with capacitive coupled resonators applied for realization of a printed filter for a frequency range of 2.4 to 2.5 GHz which lies in the S-band frequency range. A design technique using an approximation polynomial and a filter prototype is proposed. Circuit is simulated using agilent ADS software and its performance is determined. Correspondingly the circuit is fabricated and its output is tested. The main goal of this paper is developing a printed filter of small size at frequencies from 2.4 to 2.5 GHz. The significant size reduction is achieved by the proposed method and it allows smaller filter realization at low microwave frequencies. Other known filter configurations occupy more space for the same specifications. The simulation results are excellent and the filter is suitable for integration within various microwave subsystems.
In this paper, we first discuss the quaternion representation of colour images and quaternion matrix algebra. Colour images consisting of the three RGB channels can be represented using pure quaternion-valued pixels. Then, to perform the decomposition of such colour images, we introduce the singular value decomposition of a quaternion matrix which represents a colour image. Finally, based on this decomposition we propose a method for colour image compression without separating the colour image into three channel images. Results of the compression on three different colour images are presented.
Steganography is the technique for hiding secret information in any ordinary image. Such image in which secret information is hidden is known as stego image. Where as Steganalysis is the reverse technique in which detection of the secret information is done in the stego images .In this paper, various visual and statistical attack techniques are implemented for the detection of the secret data in the stego image.
There are two ways of doing visual attack: 1. The technique in which detection is done by knowing the cover image without the knowledge of the coding algorithm for the formation of stego image. This technique can be named as visual attack: known cover image. 2. Another technique in which detection is applied to the incoming image without any information known as universal attack .This technique can be named as visual attack: Enhanced LSB technique. With these two techniques the area of hidden data is detected on the basis of the difference in visual texture of the stego image.
Similarly two ways of doing statistical attack: 1. The technique in which detection is done by comparing the stego & cover image in which first order statistical analysis is applied without the knowledge of the coding algorithm of the stego image. This technique can be named as histogram analysis. 2. Another technique in which detection is done by the image smoothening technique by using probability distribution function. This technique can be named as statistical attack: image smoothening. With these two technique based on the difference in statistical parameter of the stego image with cover image detection is done. Further the comparison of the techniques of both the attacks is done on the basis of time, memory requirement and information requirement.