Thursday, July 19, 2018

Two Dimensional Filter Design Using Evolutionary Optimization

In the last few years design of two dimensional has grown sufficient zest among researchers. The design of two dimensional finite impulse response (FIR) filters can be expound as a non-linear optimization problem. 
 
The constraints are high and estimation of large number of parameters is needed, especially in case of two dimensional finite impulse response filters. In order to improve performance we have used Binary Cat Swarm Optimization (BCSO) in which some concepts are introduced to bring down ripples. 
By Kumari Divya | Mrs. Kiran Dewangan"Two Dimensional Filter Design Using Evolutionary Optimization" 
Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-5 , August 2018,



A Performance Degradation Tolerance Way Tagged Cache

For an electronic product or chip if functional faults exist, then the product or chip is of no use. Therefore, if we take a cache memory, a secondary memory for high-speed retrieval of data stored where functional faults exist. These functional faults in the data stored in the cache can be converted into performance faults so that the caches can still be marketable. 

In processors, caches are designed as Level 1(L1), Level 2(L2), and the least hard disk. If the processor wants the data fromto memory it checks the availability of data in upper-level cache L1 and if the data is found it sends to the processor. If the data is not found in L1, it checks in lower level cache L2 and next in L3 and at the least in slow memory or hard disk.

So, in this process, many functional faults may exist which leads to making the processor faulty. So, to protect the cache memory ECC and BIST are used. For a cache redesign, a PDT cache is used where functional faults are converted into performance faults. We propose a new PDT way tagged cache design which leads to increased performance. This reduces fault rate with small hardware overhead by applying BIST or ECC method. 

By Karkagari Anjali | G. Kumara Swamy | M. Preethi "A Performance Degradation Tolerance Way Tagged Cache" 

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-5 , August 2018, 


Direct URL: http://www.ijtsrd.com/engineering/electronics-and-communication-engineering/15729/a-performance-degradation-tolerance-way-tagged-cache/karkagari-anjali

international journals in engineering, paper publication for engineering, conference issue publication

Monday, June 18, 2018

Vehicles Awake Routing Protocol with Analysis Determine Knowledge Perception for VANET

The Vehicular Ad-hoc Networks VANET ascents as an surface technology for smart transport as observed in the latter date decennary.The routing is the important element for keeping effectual communication between smart vehicles, which need to be entreated snappily. A traffic-aware routing protocol TARCO that considers integrated real-time traffic conditions for integrating delivery paths over a vehicular environs is presented. Routing in VANETs plays 0 crucial role in production of networks.VANET protocols are classified as topology based and position based concordat.

Device-to-device D2D communication is admired as a propitious technique as granting the reliable integration between vehicles. The D2D-based vehicle-to-vehicle communication links coincide by recycling the similar sequence property, solution in a more intricate Combat scenario. Thus the access mode switch and resource allocation between cellular and VANETs become a challenging issue. 

Each road segment was then assigned a weight according to the overall view of the traffic conditions and updated systematically to reflect traffic variations. Finally, the road segments providing operative and dependable data paths were used to frame a routing path with latched connectivity and a short distribution lag to the destination. Simulation results showed that the use of TARCO leads to high network performance in terms of the packet delivery ratio, end-to-end delay and communication upward.

By Mr. P. Senthil | Mrs. A. Jayanthi | R. Shobana "Vehicles Awake Routing Protocol with Analysis Determine Knowledge Perception for VANET"

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Special Issue | Active Galaxy , June 2018,


Direct Link: http://www.ijtsrd.com/papers/ijtsrd14569.pdf

URl: http://www.ijtsrd.com/engineering/computer-engineering/14569/vehicles-awake-routing-protocol-with-analysis-determine-knowledge-perception-for-vanet/mr-p-senthil

review papers, ugc approved journals for engineering, special issue publication

Online Voting Using Biometric

The problem of voting system is still critical in terms of safety and security. This paper deals with the web-based voting system using fingerprint and Aadhar card in order to provide a high performance with high security to the voting system. The Online voting using system allows the voters login to scan their fingerprint, which is then matched with an already saved image within a database that is retrieved from Aadhar card database to check the voter is eligible or not for casting the vote the verification done by the hall supervisor. The users must login by Aadhar card details based, then the voter login success full, the page will open and shows the candidate details then click on his her favorable candidates to cast their votes. This will increase the voting percentage in India and reduces the cost of contributing the elections. By using biometric fingerprint it provides high level security and reliability of every one.

By Dr. S. Hemalatha | Ms. M. Gowthami | V. Karthi "Online Voting Using Biometric"

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Special Issue | Active Galaxy , June 2018, 

Direct Link: http://www.ijtsrd.com/papers/ijtsrd14568.pdf

URl: http://www.ijtsrd.com/engineering/computer-engineering/14568/online-voting-using-biometric/dr-s-hemalatha

research papers, paper publication for engineering, conference issue publication

Integrity Assurance with Minimum Location Disclosure on Mobile Devices by Using Pmac

Since the boom of smart phones and location-based services, spatio-temporal data i.e., user locations with timestamps have become increasingly essential in many real-life applications. To ensure these data are faithfully extracted from the underlying location tracking hardware and not altered by any malicious party or the user himself herself, integrity assurance schemes such as digital signatures or message authentication codes MAC must be adopted. However, these conventional schemes disclose to the verifier the complete plaintext location and thus jeopardize users' privacy. Propose an integrity assurance scheme with minimum location disclosure. 
 
That is, the granule of the disclosed location is just small enough to prove the user is has been to a certain place, and the verifier cannot learn anything beyond it. To this end, a new MAC scheme called Prefix-verifiable MAC PMAC , based on which we design indexes and protocols to authenticate both spatial and spatio-temporal predicates. Security analysis and experimental results show our scheme is both secure and efficient for practical use.
 
By Mr. P. Senthil | Mrs. S. DurgaDevi | Bhargavi M. B. "Integrity Assurance with Minimum Location Disclosure on Mobile Devices by Using Pmac"
 
Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Special Issue | Active Galaxy , June 2018

Direct Link: http://www.ijtsrd.com/papers/ijtsrd14567.pdf

URl: http://www.ijtsrd.com/engineering/computer-engineering/14567/integrity-assurance-with-minimum-location-disclosure-on-mobile-devices-by-using-pmac/mr-p-senthil

best journal, manuscript submission, call for paper engineering

Cost Based On Product Quality Prediction Using Datamining

In real time problem is the finding the top-k profitable product in the existing market. To find in the best product in the market such the new product could not dominate by other product in the market. Authentication and skyline analysis are best decision-making applications. In the existing focus the customers to analysis the set of product from a pool of given products. Set of product in the existing market want to identify possible product such that novel product are not dominated by other in market. There are two problem occasion of the finding top-k preferable products are studied. In first problem instance to set the cost of these products maximized number of total in income.

By S. Veeramalai | Mr. T. Praveen | S. Pradeepa Natarajan "Cost Based On Product Quality Prediction Using Datamining"

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Special Issue | Active Galaxy , June 2018, 

Direct Link: http://www.ijtsrd.com/papers/ijtsrd14564.pdf

URl: http://www.ijtsrd.com/engineering/computer-engineering/14564/cost-based-on-product-quality-prediction-using-datamining/s-veeramalai

multidisciplinary journal, submit paper online, indexed journal

Controlling Traffic Signals Through GPS for Ambulance

In today's world, traffic jams during rush hours is one of the major interest. During surge hours, Emergency vehicles like Ambulances get caught in jams. Due to this, these emergency vehicles are not able to reach their target in time, resulting into a loss of human lives. We have Developed a system which is used to provide clearance to any emergency Ambulance vehicle by Turning all the red lights to green on the path of the emergency vehicle, hence providing a Complete green bay to the desired vehicle. A green bay is the synchronization of the green phase Of traffic signals. 

With a "green bay" setup, a vehicle transient through a green signal will continue to receive green signals as it travels down the road. Around the world, green bay is used to great effect. In the existing system we don't have automatic control traffic signal, due to this Emergency ambulance not able to reach the hospital within time. For this system we have implemented effective smart ambulance system by using GPS Technology. This project is Targeted to design and develop a real time smart ambulance system.

By Mrs. S. DurgaDevi | Mr. P. Senthil | T. Keerthana "Controlling Traffic Signals Through GPS for Ambulance"

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Special Issue | Active Galaxy , June 2018, 

Direct Link: http://www.ijtsrd.com/papers/ijtsrd14563.pdf

URl: http://www.ijtsrd.com/engineering/computer-engineering/14563/controlling-traffic-signals-through-gps-for-ambulance/mrs-s-durgadevi

research publication, ugc approved journals for engineering, special issue publication