National Conference on
Organized by
School of Electrical
#42, Avadi-Vel Tech Road, Avadi, Chennai - 600 062, Tamil Nadu, India.
i
No part of the material protected by this Copyright notice may be reproduced or utilized in any form or by any
means, electronic or mechanical including photocopying, recording or by any information storage and retrieval
system, without prior written permission from the Copyright owner.
Published by
Jai Tech
10/785, Elangovan Salai,
Mogappair East,
Chennai - 600037, Tamil Nadu.
ii
.R
R TECH
NI
Dr.S
C
ES
IO
VIS
VE
NT
UR
THE
VEL
VEL
HE
C
HE THE VIRTUES T DI
NN
IN
A I - 6 00 0 6 2 .
RSITY
TECH
IVE
UN
Dr
&
AL
VEL TECH
Vt
TECHNICAL UNIVERSITY
VEL
#42, Avadi-Vel Tech Road, Avadi, Chennai - 600 062, Tamil Nadu, INDIA.
R S
MESSAGE
Dear Students,
All the young minds of EEE, ECE, EIE department have brought together NCCCES'11,
through pure dedication and will power.
To embark on a journey of success one needs the tools of preparedness, foresight and strategy.
Education alone is not enough to complete a student's knowledge. The strive to reach your goal
and the confidence with which you handle tough situations bring out your true caliber.
Opportunities knock the door just once, and it is upto you, dear students, to recognize and
utilize it to the fullest. I am writing all these to you now as a successful person, believing in
hard work. Triumph will treat you to sweet fruits of labour if you put in hard work to the
fullest.
I presume that this conference would reveal the ambushed talents of many and result in creating
great engineers for the future .
I sincerely hope that NCCCES'11 organized by blooming blossoms will be a grand victory.
.R
R TECH
NI
Dr.S
C
ES
IO
VIS
VE
NT
UR
THE
VEL
VEL
HE
C
HE THE VIRTUES T DI
NN
IN
A I - 6 00 0 6 2 .
RSITY
TECH
IVE
UN
Dr
&
AL
VEL TECH
Vt
TECHNICAL UNIVERSITY
VEL
#42, Avadi-Vel Tech Road, Avadi, Chennai - 600 062, Tamil Nadu, INDIA.
R S
MESSAGE
Dear Students,
It gives me great pleasure to note that the students of the departments of Electrical and
Electronics Engineering, Electronics and Communication Engineering and Electronics and
Instrumentation Engineering have come together to offer a National Level Technical
Conference NCCCES'11, for our benefit.
Nothing dies faster than a new idea in a closed mind. These students have brought out the
best in them to make this event possible.
The conference serve as a platform for connecting the young and intelligent minds.
The theme of the conference , NCCCES'11 fits very well into our education philosophy
enshrined in Vision, Virtues and ventures . Endeavour towards fulfillment of this mission really
deserve our deep appreciations.
I wish the staff and students all the very best for NCCCES'11 would be a grand success.
.R
R TECH
NI
Dr.S
C
ES
IO
VIS
VE
NT
UR
THE
VEL
VEL
HE
C
HE THE VIRTUES T DI
NN
IN
A I - 6 00 0 6 2 .
RSITY
TECH
IVE
UN
Dr
&
AL
VEL TECH
Vt
TECHNICAL UNIVERSITY
VEL
#42, Avadi-Vel Tech Road, Avadi, Chennai - 600 062, Tamil Nadu, INDIA.
R S
MESSAGE
Beloved Students,
I congratulate the Departments of EEE, ECE, EIE of Vel Tech Dr.RR & Dr.SR Technical
University for holding a National Level Technical Conference NCCCES'11 on 29th and 30th
of August 2011.
A conference is a professional performance in which students share a common , ideal and
embrace a common goal, strive with trust and commitment in the end.
The four essential ingredients that make a person truly wholesome
Choose a career you love
Give it the best
Seize your opportunities
Be a member of the team
These words by Benjamin Fairless are truly inspiring. Opportunities come by rarely, and it is
the duty of the student to make the most of them.
My heartfelt wishes for the grand success of their conference.
.R
R TECH
NI
Dr.S
C
ES
IO
VIS
VE
NT
UR
THE
VEL
VEL
HE
C
HE THE VIRTUES T DI
NN
IN
A I - 6 00 0 6 2 .
RSITY
TECH
IVE
UN
Dr
&
AL
VEL TECH
Vt
TECHNICAL UNIVERSITY
VEL
#42, Avadi-Vel Tech Road, Avadi, Chennai - 600 062, Tamil Nadu, INDIA.
R S
MESSAGE
Dear Students,
I extend my hearty wishes to the students of ECE, EEE & EIE who have made this mammoth
event possible. Their fertile minds with creativity have resulted in sharing of their knowledge
in the domain of school of Electrical Sciences, which in turn has opened up new vistas of
opportunities for world class performance.
NCCCES'11, a National Level Students' Technical Conference, is a platform where
innovative minds of great caliber come together and open up new possibilities in today's
globalized competitive scenario.
Young minds have the ability to grasp and process ideas fruitfully at a faster pace.
I am sure that this conference will clearly create a stage for exhibiting talents by the student
community.
Once again I wish all the participants success in their career to create milestones continuously.
.R
R TECH
NI
Dr.S
C
ES
IO
VIS
VE
NT
UR
THE
VEL
VEL
HE
C
HE THE VIRTUES T DI
NN
IN
A I - 6 00 0 6 2 .
RSITY
TECH
IVE
UN
Dr
&
AL
VEL TECH
Vt
TECHNICAL UNIVERSITY
VEL
#42, Avadi-Vel Tech Road, Avadi, Chennai - 600 062, Tamil Nadu, INDIA.
R S
Dr. M. Koteeswaran
Vice Chancellor
MESSAGE
It augurs well for the School of Electrical Engineering in organising a National Conference
exclusively open to engineering students across the country.
We are confident that this National Conference on Communication Control and Energy
System to be held on 29-30 August 2011 will provide a platform for technical professional
students to showcase their technical skills and knowledge and demonstrate their appreciation
of the subject.
The School of Electrical Engineering deserves appreciation for having chosen the two most
relevant and pervasive subjects which have irreversibly changed the way humans live and
broken the barrier of distance by keeping people connected at all times. This has spread a vast
canvass with widest diversity in nature and content to provoke interest in every participant.
This should provide a fertile ground for cross fertilisation of ideas, technology and application
of multi disciplinary approaches in identifying and demystifying the challenges and issues in a
variety of areas of communication and energy sectors. We are sure students will seize this
opportunity and reap great benefits.
I wish the Conference Success.
Dr.M. Koteeswaran
Vice -Chancellor
.R
R TECH
NI
Dr.S
C
ES
IO
VIS
VE
NT
UR
THE
VEL
VEL
HE
C
HE THE VIRTUES T DI
NN
IN
A I - 6 00 0 6 2 .
RSITY
TECH
IVE
UN
Dr
&
AL
VEL TECH
Vt
TECHNICAL UNIVERSITY
VEL
#42, Avadi-Vel Tech Road, Avadi, Chennai - 600 062, Tamil Nadu, INDIA.
R S
Dr. E. Kannan
Registrar
MESSAGE
I have great pleasure to welcome you all to the National Conference on Communication,
Control and Energy System NCCCES 2011.
Globalization has brought many benefits, yet there is growing contentions over how these
benefits are shared and increasing recognition that globalised markets require greatly
improved global governance. Globalization is creating intense business pressure and for many
firms. Worldwide competition is fierce among organization and the recession is making it even
harder for many organizations to sustain their competitive advantage. To combat this
challenge, organizations Worldwide have been forced to look for innovation in their business
practices. Innovation is the specific tool of entrepreneurs, the means by which they exploit
change as an opportunity for a different business or service. It is capable of being presented as a
discipline, capable of being learned, capable of being practiced.
This conference aims to bring together the national practitioners in the field of Electrical
Communication and Instrumentation to exchange knowledge and understand the need for
change, with the members of their own profession and members of the multi-professional
team. This conference is designed to maximize the development of collaborative links and
provide an opportunity for informal discussions and recreation.
I am grateful to our founder & Chancellor Prof.Dr.R.Rangarajan, and Management of Vel
Tech Dr.RR & Dr.SR Technical University, Chennai, for all their help and support, without
which this event could not have taken place. I thank all the Keynote speakers, moderators and
delegates whose contributions made NCCCES-2011 a successful event. My special thanks to
the members of the conference committee whose involvement and their support are greatly
appreciated.
Dr. E. Kannan
Registrar
MESSAGE
I am very happy that Vel-Tech University is organising a National Conference on
Communication, Control and Energy System. The topics and themes covered in the event
have very high relevance to world's emerging technologies. This conference is yet another
endeavour by Vel-Tech for sharing knowledge, information and trends in technological
advancements among participants with a focus on student community. The event will also act
as a good forum for interaction amongst the students and faculty resulting in a greater bond
between them.
I am sure this conference will provide a great opportunity and a well-balanced platform for the
participants for enhancing knowledge and technical skill in relevant areas.
Best wishes for the grand success of the Conference.
Programme Committee
CHIEF PARTRONS
PARTORNS
CONVENORS
CO-CONVENORS
TECHNICAL REVIEW
STAFF COORDINATORS
STUDENTS COORDINATORS
Student Members
BUDGET COMMITTEE
PROCEEDING COMMITTEE
INVITATION PREPARATION
COMMITTEE
xi
Faculty Members
CERTIFICATE PREPARATION
Student Members
HOSPITALITY
ACCOMMODATION OF PARTICIPANTS
IN HOSTEL
COMPEERING TEAM
MULTIMEDIA PRESENTATION
DECORATION COMMITTEE
WEB DESIGNING
COMMITTEE
PARTICIPANTS
ARRANGEMENT
xii
Faculty Members
Student Members
POOJA PRAYER
PUBLICITY
NCC
RANGOLI
CLASSICAL DANCE/
BHARATHANATIYAM
Mr. V. Dillibabu
Mr. Sridhar, Lab Asst., EEE
REGISTRATION
RECEPTION
xiii
xiv
Contents
Messages
iii
Programme Committee
xi
MOBILE COMMUNICATION
Mobile Communication
R. Sridhar, S. Sivakumar, M. Ramesh and A. Rajasekar
Dhaanish Ahmed College of Engineering
11
15
19
23
4G Communications
D. Krishnakumar and J. Manikandan
Veltech Dr.RR & Dr.SR Technical University
28
1-Bit Nano-Cmos Based Full Adder Cells for Mobile Applications with Low Leakage Ground Bounce
Noise Reduction
S. Porselvi
Veltech Dr.RR & Dr.SR Technical University
37
43
49
xv
53
57
60
66
76
81
Face Detection and Recognition Method based on Skin Color and Depth Information
R. Kavitha
Vel Tech Dr. RR & Dr. SR Technical University
87
91
94
100
103
107
113
118
127
xvi
132
138
141
146
Transceiver Implementation for Software Defined Radio using DPSK Modulation and Demodulation
A. Saranya, S. Saranya Devi, B. Uma and N.L. Venkataraman
Jayaram College of Engineering & Technology
150
155
166
VLSI DESIGN
Thermal Management of 3-D FPGA: Thermal Aware Flooring Planning Tool
S. Kousiya Shehannas, D. Jhansi Alekhya and R. Vivekanandan
Panimalar Engineering College
168
173
Design and VLSI Implementation of High-Performance Face-Detection Engine for Mobile Applications
R. Ilakiya
Vel Tech Dr. RR & Dr. SR Technical University
177
179
185
188
xvii
192
Design and Implementation of High Performance Optimal PID Controller for Fast Mode Control
System
K. Pooranapriya
Anna University of Technology
195
Design of Axial Flux Permanent MAGNET Synchronous Generator for Wind Power Generation
Rakesh Raushan and Rahul Gopinath
Mahendra Institute of Technology
199
205
209
213
VIRTUAL INSTRUMENTATION
Human-Computer Interface Technology
R. Rama
Vel Tech Dr. RR & Dr. SR Technical University
219
223
228
233
239
243
xviii
248
252
Patrolbot
S. Janani, C. Sai Smarana and G. Kalarani
Jaya Engineering College
255
257
Global Chaos Synchronization of Liu-Su-Liu and Liu-Chen-Liu Systems by Active Nonlinear Control
R. Suresh and V. Sundarapandian
Vel Tech Dr. RR & Dr. SR Technical University
261
267
271
275
278
283
287
290
xix
System Implementation of Pushing DATA to Handheld Devices via Bluetooth High Speed
Specification, Version 3.0 + HS
A. Valarmathi
Rajalakshmi Institute of Technology
294
298
304
Transparent Electronics
T. Gopala Krishnan, G.D. Vigneshvar and V.R. Arun
Veltech Dr. RR & Dr. SR Technical University
307
311
314
319
AUTHOR INDEX
323
xx
Proceedings of the National Conference on Communication Control and Energy System (NCCCES'11),
Vel Tech Dr. RR & Dr. SR Technical University, Chennai, TN. 29 - 30 August, 2011. pp.1-3.
Mobile Communication
R. Sridhar, S. Sivakumar, M. Ramesh and A. Rajasekar
Dhaanish Ahmed College of Engineering, Padappai, Chennai
Email: srikannan.2009@gmail.com
long wave transmission, high transmission power
necessary (> 200kw)
I. INTRODUCTION
Mobile Communication
VI. CONCLUSION
REFERENCES
mobile office
[1]
[2]
[3]
[4]
E. Entertainment, Education
[5]
[6]
Proceedings of the National Conference on Communication Control and Energy System (NCCCES'11),
Vel Tech Dr. RR & Dr. SR Technical University, Chennai, TN. 29 - 30 August, 2011. pp.4-6.
I. INTRODUCTION
The CAMEL is a network feature and not a
supplementary service. It is a tool for the Network
operator to provide the subscribers with the operator
specific services even when roaming in the other network.
CAMEL is enhanced in to several phases by the operators
by introducing much innovative features. The first phase
of the standard has been approved in 1997 and is
currently implemented by the major GSM vendors. The
standardization of the second phase has been finalized in
1998 with products to come in 1999. Phase 3 was
finalized at the end of 1999 with products outcome in
2000. The fourth phase of CAMEL was built on the
capabilities of phase 3 and it was finalized in the year
2002 and released in 2005.
Fig. 1
Where,
gsmSCF: GSM Service Control Function.
gsmSSF: GSM Service Switching Function
gsmSRF:GSM Specialized Resource Function
gprsSSF: GPRS Service Switching Function
a) Features of Phase I
1. Introduced the concept of a CAMEL Basic call state
model (BCSM) to the Intelligent Network (IN).
B. Phase II
C. Phase III
Fig. 3
Fig. 2
b) Features in Phase II
Additional event detection points
c) Additional Feature
1. Short Message Service
Information
CAMEL
Subscription
D. Phase IV
On-line charging
Off line charging
Pre-paid subscription
Post-paid subscribers
Spending control
Call monitoring
GPRS control
SMS control
MO SMS control
MT SMS control
Fig. 4
III. CONCLUSION
c) Features of Phase IV
CALL CONTROL
Call party handling
Network-initiated call establishment
ACKNOWLEDGMENT
The author has preferred the scribd.com, and the pdfs
available in that site for scientific documents on CAMEL.
REFERENCE
Tone injection
[1]
[2]
Proceedings of the National Conference on Communication Control and Energy System (NCCCES'11),
Vel Tech Dr. RR & Dr. SR Technical University, Chennai, TN. 29 - 30 August, 2011. pp.7-10.
B. ZigBee
Based on IEEE 802.15.4 PHY/MAC, the ZigBee network
layer provides functionality such as dynamic network
formation, addressing, routing, and discovering 1 hop
neighbors. The size of the network address is 16 bits , so
ZigBee is capable to accept about 65535 devices in a
network , an the network adderss is assigned in a
hierarchical tree structure . ZigBee provides not only star
topology, but last mesh topology. Since any device can
communicate with other devices except the PAN
Coordinator, the network has high scalability and
flexibility. Besides, the self-formation and self-healing
features makes ZigBee more attractive , The deployed
ZigBee devices automatically construct the network, and
then changes such as joining/leaving of devices are
automatically reflected in the network configuration.
I. INTRODUCTION
Automatic Electric Meter reading is one method reading
and processing data automatically with computer and
communication. It is the need of improving the automatic
level of energy consumption and the necessity of rapid
development of computer and communication technology
too. It not only may relieve reading person's labor
intensity, reduce the reading mistake, but also has the
advantage of high speed and good real-time. With the
project of the wireless Electric Meter reading for wireless
communication technology, complete the design of
automatic Electric Meter reading system. Through
researching the characteristic of main wireless
communication protocol, ZigBee is chosen as lower layer
communication protocol. With these applications, the
standard is optimized for low data rate, low power
consumption, security and reliability. Here describes the
functional requirements to solve the technical issues
related to the market applications.
A. Market Needs
The utilities and Electric Metering companies continually
look for improved methods to support their day to
operations, which include: Providing flexible billing dates
for customers, Performing Monthly/Cycle billing reads,
Implementing Time-of-Use billing, Capturing Peak
Demand, Supporting Critical Peak Pricing events,
Forecasting energy usage, Positive Outage and restoration
7
B. Market Analyses
Within the typical ZigBee network there is a single
owner or stakeholder. This owner can determine
which devices are allowed on the PAN by only sharing
network keys with trusted devices. There may be two
stakeholders for a single network: the utility and the end
customer. Neither of these stakeholders necessarily trusts
the other. The utility wants to be sure that the end
customer cannot use ZigBee to inappropriately
manipulate a load control or demand response system, or
attack an energy service portal. The customers want to be
sure that the energy service portal does not allow the
utility to take liberties with their equipment or
compromise their privacy. This results in four primary
network ownership / deployment scenarios: utilityprivate, customer-private, shared, and bridged. Each of
these scenarios has different implications. All of these
scenarios are valid for EMI deployments, though their use
may be specific to particular use cases or markets.
a) Utility-Private
Utility Private HAN might include an in-home display, or
a load control device working in conjunction with energy
service portal, but it would not include any customer
controlled devices.
Fig. 5. Application-Linked
d) Application-Linked
As an example, in the scenario below, the Utility HAN is
made available strictly to utility controlled devices. The
Home Energy Management Console is a utility approved
device that also lives on a customer provided HAN. It can
respond to EMI commands, as well as sending out HA
commands to devices within the home.
IV. DESIGN OF EMI
According the design for this system, the hardware design
of EMI is divided to two parts: The Electric- Meter End
Devices and The Data Acquisition Device. The former is
to acquire the data of the Electric-Electric Meter, then
transmit the data to the Data Acquisition Device through
ZigBee network. Meanwhile display the energy and
system time on the Electric Meter for customer. The latter
functioned as a coordinator in the whole ZigBee network.
Its function is to obtain all the information of the Electric
Meters. And then transmit them to the energy
management center through the parellel port
b) Customer-Private
In the most extreme form, a customer private network
might not even include an ESP on the ZigBee network,
instead relying on some sort of customer provided device
with non-ZigBee access to usage, consumption, and price
data. Control messages in these examples would be one
determined by the end customer, not the utility, and
programmed into a home energy management console.
A. MOBILE EMR
Mobile EMR solutions consist of two scenarios, a WalkBy solution where Hand Held Computers are typically
used to gather Electric Meter information, and a Drive-By
solution where Computers used in conjunction with
dedicated radios are installed in vehicles to remotely read
Electric Meter information. Below are examples of both
scenarios .
As depicted in the above diagram, a ZigBee based profile
is used to transport the Electric Meter information to both
the Walk-by and the Drive-by solutions. The types of
Electric Metered information collected on a monthly basis
ranges from simple Consumption to very complex
REFERENCE
[1]
[2]
VI. CONCLUSION
[3]
[4]
10
Proceedings of the National Conference on Communication Control and Energy System (NCCCES'11),
Vel Tech Dr. RR & Dr. SR Technical University, Chennai, TN. 29 - 30 August, 2011. pp.11-14.
I. INTRODUCTION
Fig. 1. A typical Cloud Storage system architecture
VMware
Flexscale
Joyent
11
Rackspace
3tera
b) Advantages
Here are five key benefits of using cloud storage and of
applications that take advantage of storage in the cloud.
a) Security
Where is your data more secure, on your local hard driver
or on high security servers in the cloud? Some argue that
customer data is more secure when managed internally,
while others argue that cloud providers have a strong
incentive to maintain trust and as such employ a higher
level of security. However, in the cloud, your data will be
distributed over these individual computers regardless of
where your base repository of data is ultimately stored.
Industrious hackers can invade virtually any server, and
there are the statistics that show that one-third of breaches
result from stolen or lost laptops and other devices and
from employees accidentally exposing data on the
Internet, with nearly 16 percent due to insider theft.
c) Service Model
Software-as-a-Service (SaaS): Software as a service is
software that is deployed over the internet and/or is
deployed to run behind a firewall in your local area
network or personal computer. This is a pay-as-you
go model and was initially widely deployed for sales
force automation and Customer Relationship
management (CRM).
c) Security Concerns
While cost and ease of use are two great benefits of cloud
computing, there are significant security concerns that
need to be addressed when considering moving critical
applications and sensitive data to public and shared cloud
environments. To address these concerns, the cloud
provider must develop sufficient controls to provide the
same or a greater level of security than the organization
would have if the cloud were not used. Listed here are
ten items to review when considering cloud computing.
Fig. 4
Information Security
Network Security
Host Security
A trusted set of users is defined through the distribution
of digital certification, passwords, keys etc. and then
access control policies are defined to allow the trusted
users to access the resources of the hosts.
e) Privacy
Different from the traditional computing model, cloud
computing utilizes the virtual computing technology,
users personal data may be scattered in various virtual
data center rather than stay in the same physical location,
13
II. CONCLUSION
In this paper, we discuss a fresh technology: Cloud
Computing. Describing its definition and some existing
issues. There is no doubt that the cloud computing is the
development trend in the future. Cloud computing offers
real benefits to companies seeking a competitive edge in
todays economy. Many more providers are moving into
this area, and the competition is driving prices even
lower. Just as there are advantages to cloud computing,
there are also several key security issues to keep in mind.
One such concern is that cloud computing blurs the
natural perimeter between the protected inside the hostile
outside. Security of any cloud-based services must be
closely reviewed to understand what protections your
information has. There is also the issue of availability.
Cloud computing brings us the approximately infinite
computing capability, good scalability, service ondemand and so on, also challenges at security, privacy,
legal issues and so on. To welcome the coming cloud
computing era, solving the existing issues becomes
utmost urgency!
g) Legal Issues
Regardless of efforts to bring into line the lawful
situation, as of 2009, supplier such as Amazon Web
Services provide to major markets by developing
restricted road and rail network and letting users to
choose availability zones. On the other hand, worries
stick with safety measures and confidentiality from
individual all the way through legislative levels.
h) Freedom
Cloud computing does not allow users to physically
possess the storage of the data, leaving the data storage
and control in the hands of cloud providers. Customers
will contend that this is pretty fundamental and affords
them the ability to retain their own copies of data in a
form that retains their freedom of choice and protects
them against certain issues out of their control whilst
realizing the tremendous benefits cloud computing can
bring.
REFERENCES
[1]
[2]
[3]
[4]
C. Solution
To advance cloud computing, the community must take
adequate measures to ensure security. Before storing it at
virtual location, encrypt the data with your own keys and
make sure that a vendor is ready for security certifications
and external audits. Identity management, access control,
reporting of security incidents, personnel and physical
layer management should be evaluated before you select a
CSP. And you should minimize personal information sent
[5]
[6]
[7]
[8]
14
http://en.wikipedia.org/wiki/Cloud_computing.
Tharam Dillon, Chen Wu, Elizabeth Chang, 2010 24th
IEEEInternational Conference on Advanced Information
Networking and Applications, Cloud computing: issues
and challenges.
Barrie Sosinkey cloud computing bible.
Wikipedia.
Cloud
computing
.Retrieved
from
http://en.wikipedia.org/wiki/Cloud-computing,2010.
Jianfeng Yang, Zhibin Chen Cloud Computing security
research.
http://www.howstuffworks.com/cloud-computing
http://viewer.media.bitpipe.com/1078177630_947/
1268847180_5/WP_VI_10SecurityConcernsCloudComput
ing.pdf
http://www.infoworld.com.
Proceedings of the National Conference on Communication Control and Energy System (NCCCES'11),
Vel Tech Dr. RR & Dr. SR Technical University, Chennai, TN. 29 - 30 August, 2011. pp.15-18.
The network first needs to know the MSC and the cell in
which the mobile station is currently located. How to find
out the current residing cell of mobile station is an issue
of location management. Once the MSC the cell of the
mobile station, it can assign a pair of voice channels in
that cell for the call. If a call is in progress when the
mobile station moves into a neighbouring cell, the mobile
station needs to get a new pair of voice channels in the
neighbouring cell from the MSC so that the call can
continue. This process is called as handoff or
handover. The MSC usually adopts a channel assignment
strategy that prioritizes handoff calls over new calls.
I. INTRODUCTION
Managing location information of mobile nodes is an
important issue in mobile computing systems. Location
management is one of the fundamental issues in cellular
networks. It deals with how to track subscribers on the
move and how to update his or her movements. In mobile
communication environment, they are going to
accommodate more subscribers; the size of the cell must
be reduced to make more efficient use of the limited
frequency spectrum allocation. This will add to the
challenge of some fundamental issues in cellular
networks. Location management consists of updating the
location of the user, searching the location and
performing search-updates. Various strategies can be
discussed in this paper for the efficient performance of
updating, searching and search-updating strategies
throughout the execution.
15
16
station (MSS) are located at the leaf level of the tree. Each
MSS maintains information of the hosts residing in its
cell. The other nodes in the tree structure are called
location server (LS). Each location server maintains
information regarding mobile hosts residing in its sub
tree. Each communication link has a weight attached to it.
The weight of a link is the cost of transmitting a message
on the link. Let l[src][dest] represent the link between
nodes are and dest, and let w(l) represent the weight of
link l. the cost depends on the size of the message, the
distance between the hosts, and the bandwidth of the link.
For analysis purposes, we assume that, for all t, w (t0 =1.
essentially our cost metric is the number of messages.
V. LOCATION QUERY
A static note, say MSS or a mobile host in the cell
corresponding to the MSS, wishing to communicate with
the target mobile host first needs to know the location of
the target. Let the target mobile hosts identity be MH_id.
To locate the target, the function locate_MH is invoked.
First, MSS searches its cache for MH_ids entry. If such
an entry is found the corresponding mobile service
station, MSSi, is probed to determine if MH_id is still in
the same cell. If so, MSSi returns its own location in the
response. Otherwise, one of the virtual identities of
MH_id is arbitrarily selected. This virtual identity is used
by the hash function to determine the set of MSSs that
should be queried about MH_ids location which is the
read set for location information.
VII. LOCATING MH
The problem at hand is as follows: given an MH,
determine the location server (s) that will store the
location of the MH.
18
Proceedings of the National Conference on Communication Control and Energy System (NCCCES'11),
Vel Tech Dr. RR & Dr. SR Technical University, Chennai, TN. 29 - 30 August, 2011. pp.19-22.
And one day we will see our country a well developed and
well friendly
I. INTRODUCTION
43,732 polling stations declared sensitive
Fig. 1
Fig. 2
19
VI. BIOMETRICS
Iris recognition
Physiological
characteristics
characteristics such as,
are
more
stable
Face recognition
Finger print recognition
DNA recognition
Behavioral characteristics is the reflection of make up
Signatures
Voices
VII. IRIS SCANNING
The person who is going to vote has to send the number
provided by EC via text message , with the help of iris
scanner the server system scans the unique code which
has been sent by each individual and verify it for the
purpose of validation and authentication.
Fig. 3
Fig. 5
Fig. 4
XI. PERMISSION
Fig. 7
XII. VOTING
The success of democracy lies here. After getting the
permission from the EC server the person can vote
from his mobile.Once the code get verified ,the server
will send the polling screen via message direct to the
mobile.This will make so portable to everyone .Hence the
resulting in increase rate of vote shows the growth in
technology and economic of our country. The prerecorded
message will help to select the candidate with right choice
and also give acknowledgement.
X. VERIFICATION
XIV. BENEFITS
Time saving.
Fig. 6. One to many comparison
21
REFERENCES
XV. CONCLUSION
[1]
[2]
www.google.com
22
Proceedings of the National Conference on Communication Control and Energy System (NCCCES'11),
Vel Tech Dr. RR & Dr. SR Technical University, Chennai, TN. 29 - 30 August, 2011. pp.23-27.
I. INTRODUCTION
Cellular phones are turning out to be a menace on the
road. This is a major problem for the cellular phone
manufacturers. This paper provides a solution which
transmits a SOS signal to save the accident victim. It
describes in detail a cost-effective foolproof solution.
There are many factors to be considered when designing
such a system. In most of the accidents, the victim
becomes unconscious. How is a SOS transmitted then?
Here, many ideas can be implemented. One such solution
is described here. The cell phone is fitted with a
transducer, which detects shocks. The cell phone
automatically transmits the SOS if the shock level goes
beyond a certain percentage. The cell phone must not
trigger an accidental SOS. To ensure this, the shock level
that triggers the SOS must be high enough. Based on the
first condition, if the shock level is made very high, then
an accident might not be identified at all.
23
Table 2.1
Sample
No.,
1.
2.
3.
4.
5.
Mean
Measured Voltage
( mV )
113.2
112.7
114.3
114.5
113.3
113.6
Actual Force
( Newton )
.977
.972
.985
.987
.978
.980
Transducer
fitted in
Cellular Phone
To Base Station
High Pass
Filter
Position
Finding Signals
Trigger O/P
User
IDtoand
Switch
Trigger SMS
Subroutine
Position
Position
Finding Signals
Beacon Signal
To Various
Users
Base Stations
Goniometer and
Positioning
Equipment
Software
Robot
Help
Message
And Decoded
Fig. 1. Block Diagram
25
HELP
vicitimPosn,
helpSub);
delay( 30 );
//
wait
for
30
seconds
Response
resp1
new
Response(
scanResponse( ) );
secs
after
transmitting
to
all
subscribers
Response = scanResponse( 120 );
if( Response != NULL )
send(
HELP
ON
THE
WAY
processingFlag = False;
}
The agent given here once started, gets the victims id and
his position into the respective objects. It then puts each
of the indexes from the look up table into its
corresponding object and sends the SOS to them. It then
monitors the response and informs the victim when
somebody responds.
VI. SIMULATION
Microphone
MW
Transmitter
Analog to
Digital
Converter
Serial Port
of Personal
Computer
SOSTransmitter
new
Subscriber( MAILERDAEMON.getVictim( ) );
Position
victimPosn
new
Position(
C program
to measure
input and
set flag
MAILERDAEMON.getPosition( ) );
Boolean processingFlag = True;
Oracle Mock
Database
Java
FRONTEND
Subscriber helpSub;
//
lookUP
look
up
table
with
all
indices
26
[2]
Rs. 2,110
Instrumentation
[3]
[4]
[5]
27
Proceedings of the National Conference on Communication Control and Energy System (NCCCES'11),
Vel Tech Dr. RR & Dr. SR Technical University, Chennai, TN. 29 - 30 August, 2011. pp.28-36.
4G Communications
D. Krishnakumar and J. Manikandan
Veltech Dr.RR &Dr.SR Technical University
This even lead to the invention of the first analog cellular
systems which was developed in the late 1960s and early
1970s. This system was "cellular" since coverage areas
were split into smaller areas called the cells" each of
which was served by a low power transmitter and receiver.
A. voice
B. fax
C. Internet.
faster
2. Higher bandwidth.
28
interference, which is measured by a required carrierto-interference ratio (C/I) s. The (C/I) s ratio also is a
function of the minimum acceptable voice quality of
system.
5. Improved features
6. Encryption.
3. Infrastructurechanges
29
4G Communications
1. Momentous capacity
2. Broadband capabilities to support greater numbers of
voice and data customers -
Frequency
Band
Bandwidth
2 - 8 GHz
5-20 MHz
Data rate
Up to 2Mbps ( 384
kbps WAN)
Up to 20 Mbps or more
Access
Wideband
CDMA
Multi-carrier CDMA or
OFDM(TDMA)
FEC
Turbo-codes
Concatenated codes
Switching
Circuit/Packet
Mobile top
speeds
200 kmph
Packet
200 kmph
IV. DISADVANTAGES
A. Why Did 3G Fail?
30
1. Alcatel
2. Nortel and
3. LG Electronics
VI. OFDM
A. Introduction
WiMaX
WiBro
3GPP
Fig. 2
Fig. 1
31
4G Communications
Fig. 4
Fig. 3
E. Disadvantages of OFDM
Highly sensitive to frequency synchronization errors
Peak to average power ratio (PARA) is high
High power transmitter amplifiers are required to have
linear transmission
Power and Capacity is wasted due to the guard band
Guard band can consume up to 20% of transmitted
power and bandwidth.
VII. MIMO
C. OFDM Receiver
A. Introduction
32
33
4G Communications
VIII. 4G TERMINALS
The critical success factors for 4g terminals are:
Service Convergence
a) Convergence it may be wireless and wired,
telecommunications and broadcasting
b) Seamless Connectivity
c) Ubiquitous
Fig. 7. Principle of code and space division multiple access
Fig. 8
34
C. Application of 4G Terminals
a) Digital Rights Management
The 4G is expected to rely heavily on multimedia
communications; DRM is an issue that needs to be taken
into account while developing this technology. DRM is
nothing but a set of technologies that provides the means
to control the distribution and consumption of the digital
media objects.
infixed
and
mobile
3.
35
4G Communications
1. Quality of service
2. Mobility control
1. Frequency Refarming
IX. CONCLUSION
2. Robust networks
3. Adhoc networks
4. Seamless networking techniques
5. Approach link techniques
6. High speed transport technology
Mobile terminal technologies :
REFERENCES
[1]
2. Battery technology
3. Human interface
[2]
[3]
5. Terminal software
[4]
36
Proceedings of the National Conference on Communication Control and Energy System (NCCCES'11),
Vel Tech Dr. RR & Dr. SR Technical University, Chennai, TN. 29 - 30 August, 2011. pp.37-42.
I. INTRODUCTION
Adders are heart of computational circuits and many
complex arithmetic circuits are based on the addition [1],
[2]. The vast use of this operation in arithmetic functions
attracts a lot of researchers attention to adder for mobile
applications. In recent years, several variants of different
logic styles have been proposed to implement 1-bit adder
cells. These adder cells commonly aimed to reduce power
consumption and increase speed. These studies have also
investigated different approaches realizing adders using
CMOS technology [3], [4]. For mobile applications,
designers have to work within a very tight leakage power
specification in order to meet product battery life and
package cost objectives. The designer's concern for the
level of leakage current is not related to ensuring correct
circuit operation, but is related to minimize power
dissipation. For portable electronic devices this equates to
maximizing battery life. For example, mobile phones
need to be powered for extended periods (known as
standby mode, during which the phone is able to receive
an incoming call), but are fully active for much shorter
periods (known as talk or active mode, while making a
1-Bit Nano-Cmos Based Full Adder Cells for Mobile Applications with Low Leakage Ground Bounce Noise Reduction
VTH
(V)
0.53
0.51
0.52
0.53
0.51
0.49
0.51
0.51
0.50
0.47
0.50
0.50
Base case
NML
(V)
0.50
0.50
0.51
0.50
0.48
0.48
0.49
0.49
0.47
0.45
0.47
0.47
NMH
(V)
0.45
0.48
0.46
0.44
0.46
0.49
0.46
0.46
0.47
0.52
0.47
0.47
VTH
(V)
0.47
0.48
0.52
0.53
0.48
0.50
0.49
0.52
0.50
0.48
0.48
0.50
Design2
NML NMH
(V)
(V)
0.44
0.50
0.47
0.51
0.51
0.48
0.50
0.44
0.46
0.49
0.49
0.49
0.49
0.50
0.49
0.50
0.48
0.47
0.47
0.52
0.47
0.52
0.47
0.47
VTH
(V)
0.53
0.51
0.52
0.53
0.51
0.49
0.51
0.51
0.50
0.47
0.50
0.50
Base case
NML
(V)
0.50
0.50
0.51
0.50
0.48
0.48
0.49
0.49
0.47
0.45
0.47
0.47
NMH
(V)
0.45
0.48
0.46
0.44
0.46
0.49
0.46
0.46
0.47
0.52
0.47
0.47
VTH
(V)
0.47
0.44
0.45
0.52
0.46
0.41
0.43
0.49
0.43
0 .41
0.41
0.48
Design2
NML NMH
(V)
(V)
0.44
0.49
0.45
0.57
0.47
0.56
0.54
0.52
0.48
0.59
0.40
0.58
0.42
0.56
0.47
0.47
0.47
0.60
0.40
0.58
0.41
0.42
0.51
0.55
B. Active Power
III. PERFORMANCE ANALYSIS AND SIMULATION
RESULTS
1-Bit Nano-Cmos Based Full Adder Cells for Mobile Applications with Low Leakage Ground Bounce Noise Reduction
Base case
3.488
Design1
2.076
Design2
1.261
Fig. 7. Layout of proposed full adder circuit (Design1) with
90nm technology
D. Area
The layouts are used to calculate the areas of proposed
designs. The parasitics have been considered in the
designs. Layouts (90nm) of proposed full adder circuits
(Design1) and (Design 2) are shown in Fig. 7 and Fig.8.
Area is reduced 55.43% and 72% in Design1 and Design2
respectively comparing to the Base case and is depicted in
Table. IV.
Table IV. Area of 1 Bit-Full Adder Cells
Design
name
2
Area (m )
Fig. 9. DIP -40 package pin ground bounce noise model [11].
Base case
Design1
Design2
1.75
0.78
0.49
40
ox
GS
DS
DS
DS
(1)
ox
DS
th
DS
(2)
41
1-Bit Nano-Cmos Based Full Adder Cells for Mobile Applications with Low Leakage Ground Bounce Noise Reduction
[3]
[4]
[5]
[6]
[7]
Fig. 13. Peak of ground bounce noise comparison with proposed
and conventional power gating technique
(Base case, Design1, Design2).
[8]
[9]
IV. CONCLUSION
In this paper, low leakage 1 bit full adder cells are
proposed for mobile applications with low ground bounce
noise. Noise immunity has been carefully considered
since significant threshold current of the low threshold
voltage transition becomes more susceptible to noise. By
using the proposed technique leakage power is reduced by
82 %( Design1), 84% (Design2) in comparison to the
conventional adder cell (Base case). Ground bounce noise
is reduced about 1.5 times and 3 times in Design1 and
Design2 respectively compared to Base case. Further,
using the proposed Novel technique the ground bounce
noise is reduced to about 4.5 times in three designs (Base
Case, Design1, Design2) compared to without applying
the technique. Area is reduced by 55.4% in (Design1),
72% (Design2) in comparison to the Base case. Active
power reduction is reduced by 40.48% (Design1), 63.38%
(Design2) in comparison to Base case. Noise immunity of
proposed full adder cells are comparable to the
conventional adder cell (Base case). The proposed novel
technique has been introduced with improved staggered
phase damping technique for further reduction in the peak
of ground bounce noise and overall power mode transition
noise. The proposed 1-bit full adder cells are designed
with 90nm technology and operated with 1V supply
voltage.
[10]
[11]
[12]
[13]
[14]
[15]
[16]
REFERENCES
[1]
[2]
[17]
Radu Zlatanovici, Sean Kao, Borivoje Nikolic, EnergyDelay of Optimization 64-Bit Carry- Lookahead Adders
With a 240ps 90nm CMOS Design Example, IEEE J.
Solid State circuits, vol.44, no. 2, pp. 569-583, Feb. 2009.
K.Navi, O. Kavehei, M. Rouholamini, A. Sahafi, S.
Mehrabi, N. Dadkhai, Low-Power and High-Performance
[18]
42
Proceedings of the National Conference on Communication Control and Energy System (NCCCES'11),
Vel Tech Dr. RR & Dr. SR Technical University, Chennai, TN. 29 - 30 August, 2011. pp.43-48.
II. BIOIDS
I. INTRODUCTION
Biometric (Biological features as a measure) recognition
refers to the use of distinctive physiological and
behavioral characteristics (e.g., fingerprints, face, hang
geometry, iris, gait, signature), called biometric identifiers
or simply biometrics, for automatically recognizing a
person.
44
B. Classification
1. Lip movement and face classification
BioID collects lip movements by means of an opticalflow technique that calculates a vector field representing
the local movement of each image part to the next image
in the video sequence of several smaller, overlapping
windows. For each window, it calculates the cepstral
coefficients, which form the audio feature vector. The
vector quantifier uses this feature vector for classifying
audio patterns. For this process, the preprocessing module
cuts the mouth area out of the first 17 images of the video
sequence. It gathers the lip movements in 16 vector fields,
which represent the movement of identifiable points on
the lip from frame to frame. shows the optical-flow vector
field of two consecutive images.
X. FINGER GEOMETRY
Finger geometry biometric is very closely related to hand
geometry. The use of just one or two fingers means more
robustness, smaller devices and even higher throughput.
45
A. Advantages
1. Glasses and contact lenses wont interfere in this.
2. Blind peoples are also involved in this.
3. Cataract, cornea transplant, surgery wont disturbs this
process.
46
Fig. 8
A. Applications
XIX. CONCLUSION
1. Electronic commerce
2. Information security
3. Entitlements authorization
4. Building entry
5. Automobile ignition
6. Forensic and police applications
7. Network access
XVI. FUTURE BIOMETRICS
The higher the security level, the higher the falserejection rate. Thus, system administrators must find an
acceptable false-rejection rate without letting the falseacceptance rate increase too much. The security level
depends on the purpose of the biometric system.
REFERENCE
[1]
[2]
[3]
48
Proceedings of the National Conference on Communication Control and Energy System (NCCCES'11),
Vel Tech Dr. RR & Dr. SR Technical University, Chennai, TN. 29 - 30 August, 2011. pp.49-52.
I. INTRODUCTION
Scene text is an attempt to recognize text in an image of a
natural scene. In this method, the scene text could be
directly recognized from a mobile camera. If a user
simply snaps a photo of a restaurant signboard,the internet
connected camera can recognize the name and the
relevant information about the restaurant. There are some
challenging issues in separating texts from camera
captured images.The images usually have nonuniform
illumination due to lighting conditions and shadows.The
intrinsic properties of scene text like homogeneity of text
pixel colors and the distinctiveness of the text pixel color
from the background color, are difficult to preserve.
Complex layout and interaction of the content and the
background are common in outdoor images.When the
system scans the whole images of the text, nontext pixels
surrounding the text could be confused for text because of
similar shape of the texts.
49
(2)
Where
describes the range of the meanshift, seedj is
the (r0,g0,b0) color value and n(r,g,b) is the number of
pixls which have (r,g,b) color value. The mean shift
algorithm is a kind of nonparametric clustering technique
which does not require prior knowledge to the number of
clusters, and does not constrain the shape of clusters. By
the mean shift clustering algorithm, a few most distinct
colors are selected as seed colors, the process of
connected component extraction should done with each
color seed.
(1)
Where AL=0.1, ACH=0.2+(h-hs)/2.
AL is the constant of linearization for luminance and ACH
is a parameter which helps to reduce the distance between
Colors having a same hue as the hue in the seed color.
HCL distance is more suitable in case of scene text
images by emphasizing hue difference. Hue is robust on
the illumination changes when compared to luminance or
RGB color.
(3)
Since most pixels having the minimum edge values
belong to the text region or background region, the
undesirable effect of boundary pixels can be avoided.
Fig. 2. Color distance in RGB and HCL
50
p= C/E
Method
Proposed
51
r=C/T
precision
0.90
recall
0.51(0.89)
REFERENCES
IV. CONCLUSION
In this paper, the proposed text extraction algorithm by
utilizing the focus information on the scene images.
First step, pixel sampling and a meanshift algorithm are
used to choose the text color candidates. Second, all the
pixels are compared to target seed color in HCL distance
measure. And then the adaptive binarization method
classifies them into two regions to form connected
components. In the last step, text verification based on the
rules is used to determine the true text components. By
52
Proceedings of the National Conference on Communication Control and Energy System (NCCCES'11),
Vel Tech Dr. RR & Dr. SR Technical University, Chennai, TN. 29 - 30 August, 2011. pp.53-56.
I. INTRODUCTION
As more and more home appliances and consumer
electronics are installed, residential energy consumption
tends to grow rapidly. A large number of home devices
increase power consumption in two aspects, standby
power and normal operation power. Those two kind of
power consumption are proportional to number of home
devices. As a result. Operational cost in the home area is
also increasing. Standby power is electricity used by
appliances and equipment while they are switched off or
not performing their primary function . As around 10% of
a total power is consumed during standby power mode,
the reduction of standby power is greatly necessary to
reduce the electricity cost in home. Many researches were
performed to reduce standby power in the region of chip,
circuit, board, and system. Those various technical
researches contributed to the reduction of standby power
of home devices. Normal operation power of home
devices. Home appliances and consumer electronics
account for about 27% of home energy consumption .
Therefore, the products with ENERGY STAR label are
recommende3d to minimize the cost of operating the
products during their life time. To reduce the normal
operation power of home devices, service-oriented power
management technology was proposed for an integrated
multi-function home server. Although advanced
53
54
55
REFERENCES
[1]
V. CONCLUSION
We proposed the HEMS based in zigbee communication
and infrared remote controls. The configured zigbee
network is composed of the home server, the zigbee hub,
and the power outlet and light. The home server is a
central controlunit. The power outlets and the light are the
sensor nodes. The home server can manage the power
outlets and the light through the zigbee hub. The zigbee
hub with IR code learning function enables a user to
control the power outlets and the light with an IR remote
control. Furthermore, we actively reduce standby power
consumption by turning off a home device and the power
outlet simultaneously through the zigbee hub. This
method eliminates the waiting of a typical automatic
power cut-off outlet. The proposed HEMS UI provides
various kinds of dashboards for th user to figure out the
detailed home energy usage information. The proposed
HEMS UI provides easy way to add, delete, and move
home devices to other power outlets. When a home device
is moved to the different outelet, the energy information
of the home device is kept consistently and seamlessly of
56
Proceedings of the National Conference on Communication Control and Energy System (NCCCES'11),
Vel Tech Dr. RR & Dr. SR Technical University, Chennai, TN. 29 - 30 August, 2011. pp.57-59.
I. DEFINITION OF TERMS
Cryptography can be defined as the processing of
information into an unintelligible (encrypted) form for the
purposes of secure transmission. Through the use of a
key the receiver can decode the encrypted message
(decrypting) to retrieve the original message.
Moderate
High
High
Criteria
57
A. Watermark Embedding
B. Watermark Extraction
58
REFERENCES
[1]
[2]
[3]
[4]
Fig. 3
59
Proceedings of the National Conference on Communication Control and Energy System (NCCCES'11),
Vel Tech Dr. RR & Dr. SR Technical University, Chennai, TN. 29 - 30 August, 2011. pp.60-65.
I. INTRODUCTION
Recent technological advances allow us to envision a
future where large number of low-power inexpensive
sensor devices is densely embedded in the physical
environment, operating together in a wireless network.
Wireless sensor networks promise an unprecedented finegrained interface between the virtual and physical worlds.
They are one of the most rapidly developing new
information technologies, with applications in a wide
range of fields including industrial process control,
security and surveillance, environmental sensing, and
structural health monitoring. Wireless sensor networks
have recently come into prominence because they hold
the potential to revolutionize many segments of our
economy and life, from environmental monitoring and
conservation, to manufacturing and business asset
management, to automation in the transportation and
health-care industries.
60
D. Military Surveillance
The focus of surveillance missions is to acquire and verify
information about enemy capabilities and positions of
hostile targets. Such mission often involves a high
element of risk for human personnel and requires high
degree of stealthiness. Hence, the ability to deploy
unmanned surveillance missions, by using wireless sensor
networks, is of great practical importance for the military.
Because of the energy constraints of sensor devices, such
systems necessitate an energy-aware design to ensure the
longevity of surveillance missions.
A. Area Monitoring
B. Traffic Monitoring
Traffic surveillance is currently performed with inductive
loop detectors and video cameras for the efficient
management of public roads. An alternative traffic
monitoring system using wireless sensor networks can
offer high accuracy and lower cost. The system consists
of two parts: wireless sensor network and access point.
Traffic information is generated at the sensor nodes and
then transferred to the access point over radio. Use of the
prototype called Traffic-Dot achieves vehicle detection
accuracy of 97% and accurately measures speed with a
node pair.
C. Object Tracking
WSN are an efficient solution for applications that
involve deep monitoring of a deployment environment.
The object-tracking demonstrates a real-world application
that uses a WSN to track objects and communicate their
information. It is an event-driven application
implemented in Java, built on top of the Crossbow MSP
410 wireless sensor system. The algorithm process the
data returned from the WSN detection signals and tracks
the object's motion. Deployment scenarios are proposed
that demonstrate suitable node topologies for the system.
The evaluation of the object-tracking system is performed
by conducting a number of indoor and outdoor
experiments [2].
B. IEEE 802.15.4WPAN
The main features of this standard are network flexibility,
low cost, very low power consumption, and low data rate
in an ad hoc self-organizing network among inexpensive
fixed, portable and moving devices. It is developed for
applications with relaxed throughput requirements which
cannot handle the power consumption of heavy protocol
stacks.
a) Components of WPAN
A ZigBee system consists of several components. The
most basic is the device. A device can be a full-function
device (FFD) or reduced-function device (RFD). A
network shall include at least one FFD, operating as the
PAN coordinator. The FFD can operate in three modes: a
personal area network (PAN) coordinator, a coordinator
or a device. An RFD is intended for applications that are
extremely simple and do not need to send large amounts
of data. An FFD can talk to RFD's or FFD's while an RFD
can only talk to an FFD.
C. Network Topologies
Topology is the study of arrangement or mapping of
elements of network, especially the physical and logical
interconnections between the nodes. Fig 2 shows three
types of topology ZigBee supports star topology, peerto-peer topology, cluster-tree topology.
a) Star Topology
In the star topology, the communication is established
between devices and a single central controller, called the
PAN coordinator. The PAN coordinator may be mains
powered while the devices will most likely be battery
powered. Applications that benefit from this topology
62
b) Peer-To-Peer Topology
In peer-to-peer topology, there is also one PAN
coordinator. In contrast to star topology, any device can
communicate with any other device as long as they are in
range of one another. A peer-to-peer network can be ad
hoc, self-organizing and self-healing. Applications such
as industrial control and monitoring, wireless sensor
networks, asset and inventory tracking would benefit from
such a topology. It also allows multiple hops to route
messages from any device to any other device in the
network. It can provide reliability by multipath routing.
c) Cluster-Tree Topology
Cluster-tree network is a special case of a peer-to-peer
network in which most devices are FFDs and an RFD
may connect to a cluster-tree network as a leave node at
the end of a branch. Any of the FFD can act as a
coordinator and provide synchronization services to other
devices and coordinators. Only one of these coordinators
however is the PAN coordinator. The PAN coordinator
forms the first cluster by establishing itself as the cluster
head (CLH) with a cluster identifier (CID) of zero,
choosing an unused PAN identifier, and broadcasting
beacon frames to neighboring devices. A candidate device
receiving a beacon frame may request to join the network
at the CLH. If the PAN coordinator permits the device to
join, it will add this new device as a child device in its
neighbor list. The newly joined device will add the CLH
as its parent in its neighbor list and begin transmitting
periodic beacons such that other candidate devices may
then join the network at that device. Once application or
network requirements are met, the PAN coordinator may
instruct a device to become the CLH of a new cluster
adjacent to the first one. The advantage of this clustered
structure is the increased coverage area at the cost of
increased message latency [4].
63
a) Components
The ZDO is responsible for defining the role of a device
as either coordinator or end device, as mentioned above,
but also for the discovery of new (one-hop) devices on the
network and the identification of their offered services. It
may then go on to establish secure links with external
devices and reply to binding requests accordingly. The
application support sub layer (APS) is the other main
standard component of the layer, and as such it offers a
well-defined interface and control services. It works as a
bridge between the network layer and the other
components of the application layer: it keeps up-to-date
binding tables in the form of a database, which can be
used to find appropriate devices depending on the services
that are needed and those the different devices offer. As
the union between both specified layers, it also routes
messages across the layers of the protocol stack.
G. Network Layer
The main functions of the network layer are to enable the
correct use of the MAC sub layer and provide a suitable
interface for use by the next upper layer, namely the
application layer. Its capabilities and structure are those
typically associated to such network layers, including
routing. On the one hand, the data entity creates and
manages network layer data units from the payload of the
application layer and performs routing according to the
current topology. On the other hand, there is the layer
control, which is used to handle configuration of new
devices and establish new networks: it can determine
whether a neighboring device belongs to the network and
discovers new neighbors and routers. The control can also
detect the presence of a receiver, which allows direct
communication and MAC synchronization. The routing
protocol used by the Network layer is an AODV distance
vector based routing algorithm. In order to find the
destination device, it broadcasts out a route request to all
of its neighbors. The neighbors then broadcast the request
to its neighbors, etc until the destination is reached. Once
the destination is reached, it sends its route reply via
unicast transmission following the lowest cost path back
to the source. Once the source receives the reply, it will
update its routing table for the destination address with
the next hop in the path and the path cost.
H. Application Layer
The application layer is the highest-level layer defined by
the specification, and is the effective interface of the
64
I. Security Services
As one of its defining features, ZigBee provides facilities
for carrying out secure communications, protecting
establishment and transport of cryptographic keys,
ciphering frames and controlling devices. It builds on the
basic security framework defined in IEEE 802.15.4. This
part of the architecture relies on the correct management
of symmetric keys and the correct implementation of
methods and security policies. Security suite consists of
cryptographic key and suites that provide encryption,
done on the basis of AES (Advanced Encryption
Standard) [7]
REFERENCES
[1]
[3]
Description
No security
Encryption only, CTR Mode
128 bit MAC
64 bit MAC
32 bit MAC
Encryption & 128 bit
MAC
Encryption & 64 bit MAC
Encryption & 32 bit MAC
[4]
[5]
[6]
[7]
IV. CONCLUSION
[8]
[9]
[10]
[11]
[12]
[13]
65
Proceedings of the National Conference on Communication Control and Energy System (NCCCES'11),
Vel Tech Dr. RR & Dr. SR Technical University, Chennai, TN. 29 - 30 August, 2011. pp.66-75.
Fig. 1. Forged Tourist Guy image allegedly captured on September 11, 2001.
camera is focused on the person, the aircraft should have appeared blurred in the image, due to its speed. The complete
ab-sence of motion blur in this image indicates a possible
forgery. On the other hand, if the original image contains
motion blur, how can a spliced region that has had motion
blur introduced in it be detected? Introducing motion blur into
a spliced object, in general, depends on the perception of the
person creating the forgery and hence, is unlikely to be
completely consistent with the blur in the rest of the image. In
this paper, we use this fact to present a solution to this
tampering detection problem. Specif-ically, we address
splicing in a motion-blurred region, with the artificial blur
introduced in the spliced part similar to the back-ground blur,
so that the inconsistency is difficult to perceive vi-sually.
Many techniques have been developed to discover splicing
and compositing of images [2]. Statistical analyses [3], [4] and
lighting inconsistencies [5], [6] may be used in order to detect
image tampering. Other methods involve exploiting certain
fea-tures of images which are characteristic of the imaging
systems, formats, and the environment [7], [8].
Many of these techniques implicitly assume the lack of any
postprocessing on the image [9]. With the appearance of sophisticated photo manipulation software, such an assumption is unlikely to hold for most believable forgeries. Therefore, significant research has gone into circumventing postprocessing (such
as blurring) of images. Some techniques [10][12] use statistics
and measures which are robust to blurring. Others [9], [13][16]
use discrepancies in defocus blur to discover forgeries. We are
not aware of any existing work that uses discrepancies in motion
blur, although the authors of [13] suggest that their methods can
be extended to motion blur as well . We provide a comparison of
our results with theirs below.
The key contributions of this paper are:
an original forgery detection approach employing motion
blur estimation via spectral characteristics of image gradi-
I. INTRODUCTION
todays
media-driven society. The power of the visual medium
is compelling and so, malicious tampering can have significant
im-pact on peoples perception of events. Misleading images are
used for introducing psychological bias, sensationalizing news,
political propaganda, and propagating urban myths. The image in
Fig. 1, taken from [1], is an instance of the latter. This photograph was widely circulated via e-mail, supposedly having been
obtained from a camera found in the debris of the World Trade
Center buildings after the attacks of September 11, 2001. The
approaching aircraft in the background seems to imply that this
image was captured mere seconds before the impact. However,
this image is clearly fake. There are many clues within this photograph that help decide that it is a hoax. A priori knowledge may
be employed to prove that this image is unauthentic. For example,
geographical knowledge or information about the type of aircraft
involved in the attacks can be used to dismiss this image as fake.
Even in the absence of such knowledge, as the
Manuscript received November 03, 2010; revised February 15, 2011; accepted February 20, 2011. Date of publication February 28, 2011; date of
current version May 18, 2011. This work was supported by a Ph.D.
scholarship awarded to P. Kakar by the Institute for Media Innovation. The
associate editor coordi-nating the review of this manuscript and approving it
for publication was Dr. Oscar C. Au.
The authors are with the Institute for Media Innovation, Nanyang Technological University, Singapore 637553 (e-mail: pkakar@pmail.ntu.edu.sg;
sudha@ntu.edu.sg; ewser@ntu.edu.sg).
Color versions of one or more of the figures in this paper are available
online at http://ieeexplore.ieee.org.
66
forensics. Instead of using spectral matting as in [17], we employ image gradients in order to take advantage of their
simpler and faster computations
B. Blur Estimation
We use a variant of the widely recognized cepstral method
[20][22] in order to estimate motion blur. Instead of employing
the cepstrum directly, we use the spectral characteristics of the
image gradients as proposed in [23]. Such an approach has been
shown to be more robust to noise and somewhat non-uniform
motion than just using the cepstrum of the image.
(1)
where is the blurred image,
is the sharp image,
is the
blurring kernel, and is the noise present. and are the pixel
coordinates.
For a horizontal uniform velocity motion blur, the blurring kernel
can be modeled as
, where is the length
of the kernel. Note that a directional blurring
kernel
can be formulated by rotating by degrees about
the x-axis. Taking the Fourier transform of (1)
(2)
where
that
. It is observed
(3)
which is known to have periodic zeros at
. These periodic zeros also appear in if is ignored. The blur extent is estimated from the cepstrum of the
image :
(4)
which has two peaks separated by
(5)
Taking the Fourier transform and omitting the noise term
(6)
Therefore, we obtain
(7)
67
occur
. Then, we have
(8)
Fig. 2. Multiple motion blur segmentation using Markov random fields [25].
The spliced regions are the Wikipedia and Youtube logos in the top and
bottom rows, respectively. Left column: Tampered images with multiple
blurs. Right column: Segmentation results.
B. Smoothing
The components of the motion blur estimates
can be
represented in magnitude and direction estimate matrices
and
, respectively, each of size
, i.e.,
.
.
.
.
.
.
.
(9)
Since
is calculated independently for each block
, we
perform a smoothing operation to correct for small variations
in the estimated blurs. We smooth both the magnitudes and
the directions of the estimates:
(10)
68
In order to automate the decision of using BEMs or just motion estimates, we employ a modification of the no-reference
69
(12)
where
is the width of the edge along the direction perpendicular to at the edge pixel and
denotes cardinality.
In order to define
in (12), let the two sides of the line
in the direction at some be denoted by and , as shown in
Fig. 5. Also, let the pixel locations of the first local maximum
and minimum from this , along the above perpendicular line,
on the side be denoted by
and
, respectively.
and
are defined similarly. Then, we can define
the edge width as
(13)
We compute the oriented
for orientations
to ,
values of
. BEMs are chosen when it is below a predetermined threshold . The chosen blur estimate
is given
by
if
otherwise.
(15)
It is to be noted that
is an
matrix in the latter
case, as both magnitude and direction estimates are employed.
In this case, all subsequent operations are carried out independently on each of the component matrices.
The PBM computed for images containing various amounts of
motion blur is plotted in the graph shown in Fig. 6. The blur
metric was calculated as an average over ten random images
E. Segmentation
We then segment the image into two regions that exhibit
dif-ferent motion blurs. This is done by adaptively
thresholding the upsampled using Otsus method [27]. This
method also pro-vides an effectiveness metric which is used to
discard images which show consistent directions and/or
magnitudes in their mo-tion blur estimates and hence cannot
be segmented effectively. The result of segmenting the
magnitude and direction of the es-timates provides us with an
indication of regions with dissimilar motion blur.
The results from this simple segmentation can be refined by
again employing an energy-based segmentation. In this case,
70
Fig. 8. Left: Energy-based segmentation output. Right: Ideal segmentation obtained by supervised matting.
Fig. 10. Detection for spliced blurred regions. Left column: Forged images
with segmentation outputs. Right column: Ideal segmentations.
Fig. 11. Detection for non-blurred spliced region. (a) Segmentation of image
with non-blurred spliced object. (b) Ideal segmentation.
A. Evaluation Criteria
In order to evaluate the efficacy of our technique and also
de-termine the various parameters used, we employ a cost
measure that is used to determine the difference between the
observed and the ideal segmentations.
As the energy-based segmentation gives rise to a boundary
dividing the image into different regions, a cost measure like the
Hausdorff distance measure which is used widely for shape
71
Fig. 12. Probability distributions of PBM values for using BEMs and using
only motion blur estimates.
TABLE II
SEGMENTATION COST FOR DIFFERENT BLOCK OVERLAP
Fig. 13. Image patches with similar motion blur estimates, but different BEM
values. (a) High BEM value. (b) Low BEM value.
(16)
where
B. Results
Table I shows the variation of the segmentation cost with respect to the block size and Table II with respect to the block
overlap. We calculate the motion blur estimates for block sizes of
80 80, 100 100, 120 120, 140 140, and 160 160 pixels with
overlaps of 10, 15, 20, 30, and 40 pixels. The av-erage cost
function is then evaluated over 15 images for each of the 25
possible combinations of block size and overlap and the
minimum average cost is noted. It is observed that the segmentation costs are fairly robust to change in these parameters
and energy-based segmentation provides more refined results
than simply Otsus method. We choose to use values of parameters corresponding to the lowest costs for either method (shown
72
Fig. 16. Distinguishing consistent and inconsistent regions. (a) Red box in
image indicates inconsistent region; yellow box indicates consistent region.
(b) and (c) Inconsistent region detection. (d) Consistent region detection.
Fig. 14. Segmenting regions with different blur. (a) Image with inconsistent
motion blur. (b) Segmentation using motion blur estimates. (c) Segmentation
using BEMs.
Fig. 15. Segmenting an image with consistent blur. (a) Image. (b) Segmentation using BEMs. (c) Segmentation using motion blur estimates.
C. Comparisons
There are a few methods that detect image tampering based on
different blurs. The work in [9], [14], and [15] used defocus blur
modeled with a two-dimensional circular Gaussian kernel. As
these methods are based on this isotropic kernel, they cannot be
extended directly to directional motion blur. Moreover, all of
these methods require considerable human intervention in
defining parameters and interpreting results. In another work
[16], the authors proposed a method intended for highly localized blur and mentioned that it is not suitable for motion blur. In
yet another work [13], the authors suggested that it is pos-sible to
distinguish natural and artificial motion blur using their method.
So, we compare our method with [13].
The authors of [13] use discrepancies in defocus blur to detect
forgeries. We implemented their technique and compared the results of our technique with those obtained using their technique.
The technique in [13] is based on normalizing the DCT coefficients of 8 8 image blocks and then computing the inverse DCT
of the image. This technique offers the advantages of speed and
simplicity. Enhancements such as threshold selection based on
global blur estimates and morphological operations may also be
used in order to improve the results of the technique. The output
images for the best thresholds are shown in Fig. 17. As can be
seen, while our technique generates a blob that covers the region
with inconsistent blur, the method in [13] results in
73
Fig. 17. Comparison with [13]. (a) Image with spliced motion-blurred logo.
(b) and (c) Image with multiple motion blurs. (d)(f) Our results. (g)(i)
Results from [13].
TABLE III
COMPARISON OF SEGMENTATION COSTS
[4] H. Farid, Detecting Digital Forgeries Using Bispectral Analysis, Massachusetts Inst. Technol., Cambridge, MA, 1999, Tech. Rep. AIM-1657.
[5] M. Johnson and H. Farid, Exposing digital forgeries by detecting inconsistencies in lighting, in Proc. 7th Workshop Multimedia and Security, 2005, pp. 110.
[6] M. Johnson and H. Farid, Exposing digital forgeries in complex
lighting environments, IEEE Trans. Inf. Forensics Security, vol. 2,
no. 3, pt. 1, pp. 450461, Sep. 2007.
[7] M. Johnson and H. Farid, Exposing digital forgeries through chromatic aberration, in Proc. 8th Workshop Multimedia and Security,
2006, pp. 4855.
[8] M. Johnson and H. Farid, Metric Measurements on a Plane From a
Single Image, Dept. Comput. Sci., Dartmouth College, 2006, Tech.
Rep. TR2006-579.
[9] G. Cao, Y. Zhao, and R. Ni, Edge-based blur metric for tamper detection, J. Inf. Hiding Multimedia Signal Process., vol. 2073, p.
4212, 2009.
[10] B. Mahdian and S. Saic, Detection of copy-move forgery using a
method based on blur moment invariants, Forensic Sci. Int., vol.
171, no. 23, pp. 180189, 2007.
[11] Y. Yun, J. Lee, D. Jung, D. Har, and J. Choi, Detection of digital
forgeries using an image interpolation from digital images, in Proc.
IEEE Int. Symp. Consumer Electronics, 2008, pp. 14.
[12] S. Bayram, H. Sencar, and N. Memon, An efficient and robust
method for detecting copy-move forgery, in Proc. IEEE Int. Conf.
Acoustics, Speech and Signal Processing, 2009, pp. 10531056.
[13] D. Hsiao and S. Pei, Detecting digital tampering by blur
estimation, in Proc. 1st IEEE Int. Workshop Systematic Approaches
to Digital Forensic Engineering, 2005, pp. 264278.
V. CONCLUSIONS
[14] X. Wang, B. Xuan, and S. Peng, Digital image forgery detection based
on the consistency of defocus blur, in Proc. Int. Conf. Intelligent Information Hiding and Multimedia Signal Processing, 2008, pp. 192195.
74
[16] J. Zhang and Y. Su, Detecting logo-removal forgery by inconsistencies of blur, in Proc. Int. Conf. Industrial Mechatronics and
Automa-tion, 2009, pp. 14.
[17] P. Kakar, N. Sudha, and W. Ser, Detecting digital image forgeries
through inconsistent motion blur, in Proc. IEEE Int. Conf.
Multimedia & Expo, 2010, pp. 486491.
[18] A. Rav-Acha and S. Peleg, Two motion-blurred images are better
than one, Pattern Recognit. Lett., vol. 26, no. 3, pp. 311318, 2005.
[19] X. Liu and A. G. El, Simultaneous image formation and motion blur
restoration via multiple capture, in Proc. IEEE Int. Conf. Acoustics
Speech And Signal Processing, 2001, vol. 3, pp. 18411844.
[20] D. Gennery, Determination of optical transfer function by inspection
of frequency-domain plot, J. Opt. Soc. Amer. (19171983), vol. 63, p
1571, 1973.
[21] M. Cannon, Blind deconvolution of spatially invariant image blurs
with phase, IEEE Trans. Acoust., Speech, Signal Process., vol. 24,
no. 1, pp. 5863, Feb. 1976.
[22] I. Rekleitis, Steerable filters and cepstral analysis for optical flow
calculation from a single blurred image, Vis. Interface, vol. 1, pp.
159166, 1996.
75
Proceedings of the National Conference on Communication Control and Energy System (NCCCES'11),
Vel Tech Dr. RR & Dr. SR Technical University, Chennai, TN. 29 - 30 August, 2011. pp.76-80.
I. INTRODUCTION
Copyright protection is an important watermarking
application where information identifying the copyright
owner is imperceptibly embedded in multimedia data
such that this watermark information is detectable even in
degraded copies. Quantization-based watermarking is an
attractive choice as it combines high watermark capacity
with robustness against manipulation of the cover data.
The ability to embed many watermark bits (in the range of
256 to 1024 bits) allows to hide a small black-and-white
logo image. An extracted logo image can be used to
visually judge the existence of a particular watermark.
Alternatively, the normalized correlation measure
between the embedded and extracted watermark provides
for numerical evaluation. Recently, Lin et al. [1] proposed
a robust, blind watermarking scheme based on the
quantization of the significant difference between wavelet
coefficients. Their results for a 512 bit watermark
demonstrate good robustness for a wide variety of signal
processing attacks such as JPEG compression, median
filtering, sharpening, and mild rotation. However, in the
copyright protection scenario, a watermarking method
must not only withstand unintentional processing of the
cover data but also intentional, targeted attack by a
malicious adversary. For the attack scenario in this
letter,we assume that we have access to only a single
watermarked image but possess full knowledge of the
implementation details of the watermarking scheme. A
is set to 0.9 (see [1] for details). The difference max*i sec* i between the largest and second largest coefficient
of each received block is compared against to extract
one bit of watermark information wi*
(4)
To judge the presence of the watermark in the received
image, the normalized correlation (NC) between the
embedded and extracted watermark defined as
(5)
is compared against a decision threshold . If
Nc(w,w*), the watermark is declared present, otherwise
absent. For a watermark of length Nw=512 and a falsepositive probability of approximately 1.03 x 10^-7,is set
to 0.23.
(1)
where T is a threshold controlling the embedding strength
(see [1]) and is the average significant difference value
of all n blocks
III. ATTACK
The security measures employed by SDWCQare the
pseudo-random permutation of the blocks and the
watermark bits. However, the permutations merely
change the order in which blocks are watermarked and
thus the block locations where watermark bits are
embedded in the subband. In case the number of
watermark bits Nw is smaller than the number of available
blocks Nb, the attacker does not know which blocks to
target. The application scenario [1] assumes Nw=512,
block-size 7 and for a subband size of 64x64 the number
of available blocks Nb=[{64.64}/(7)]. Crucially, the
permutations do not disguise which coefficients make up
a block. Therefore, an attacker can derive the values max j
and sec j for all blocks 1jNb which potentially carry
watermark information. In [1], the authors claim that
targeting all largest coefficients would significantly
degrade the image quality and thus the commercial value
of the attacked copy. This is not the case as we show
below. The attack computes the significant difference for
all blocks 1jNb in the subband LH3. If max j sec
j<(T/2), then block is presumably carrying watermark
symbol -1 which we want to change to encode 1. Hence,
the attack increases the significant difference between the
attacked coefficients maxj and sec j
(2)
Where[.]denotes the floor operator. Similarly, to embed 1,max i is set to equal sec i .
For watermark extraction, an adaptive threshold is defined
as
(3)
where
are the ordered
significant differences of the received image and 01
is sensitive to the ratio between the two watermark
symbols. For equiprobable watermarksymbols,
(6)
whereT is a crude estimate of the threshold T used for
embedding.T can be easily determined by observing the
first sharp increase in ordered significant differences; see
Fig. 2. The variable is a small positive constant to
guarantee that the significant difference is always >T;
thus, the extractor will always decode watermark symbol
w i*=1 for all i [see (4)]. We set =2 for all images.
77
(7)
78
(8)
Reasonable values are 1=1500 and 2=3900; see Fig. 3.
Since the images energy is concentrated mainly in large
coefficients and negative coefficients are hardly affected,
the image quality is not severely degraded. The average
watermark correlation is reduced to 0.156, well below the
detection threshold. The average PSNR between the
watermarked and attacked image is 42.57 dB. See Table
IV for detailed results.
V. RESULTS
The implementation of the SDWCQ watermarking
scheme, its modification, and the related attacks are
available as Python code at http:// www.wavelab.at/
sources
Table 1. Attack Results on the SDWCQ Scheme Averaged Over
Ten Test Runs For Block-Size 7, Nw=512,T=12 AND =0.9
79
VI. CONCLUSION
This paper presents an attack on the SDWCQ method, a
recently published watermarking scheme for copyright
protection. The attack exploits knowledge of the schemes
implementation and the lack of protection of the
embedding locations to completely remove the watermark
with high PSNR. Further, we propose a simple
modification to SDWCQ which occludes the quantized
coefficients locations, inhibiting the attack. However,
also modified SDWCQ is prone to a targeted attack.
We highlight the need for a detailed security analysis,
assuming the attacker is familiar with the watermarking
schemes
implementation.
We
expect
several
quantization-based watermarking schemes to be
vulnerable to similar attacks. Evaluation of the robustness
against common signal processing operations is
insufficient for watermarking schemes in the copyright
protection scenario.
REFERENCES
[1]
80
W.-H. Lin, S.-J. Horng, T.-W. Kao, P. Fan, C.-L. Lee, and
Y. Pan, An efficient watermarking method based on
significant difference of wavelet coefficient quantization,
IEEE Trans. Multimedia, vol. 10, no. 5, pp. 746757, Aug.
2008.
Proceedings of the National Conference on Communication Control and Energy System (NCCCES'11),
Vel Tech Dr. RR & Dr. SR Technical University, Chennai, TN. 29 - 30 August, 2011. pp.81-86.
I. INTRODUCTION
Wireless sensor networks (WSNs) are essentially intended
to observe spatial-temporal characteristics of the physical
world. Locations of sensor nodes are fundamental to
providing location stamps, locating and tracking objects,
forming clusters, and facilitating routing, etc. However, a
priori knowledge of locations is unavailable in large-scale
and ad-hoc deployments, and a pure-GPS (Global
Positioning System) solution is viable only with costly
GPS receivers and good satellite coverage. In a general
scenario, only a few nodes (called anchors) are aware of
their positions either through manual configuration or
equipped with GPS receivers, and the others (called
unknown nodes) have to estimate their positions by
making use of the positions of anchors.
There are two main approaches for localization: multilateration and pattern matching. Multilateration is a
process of finding the location of an object based on
measuring the distances or angles of three or more signal
sources at known coordinates. A special case of multilateration is triangulation, ultrasonic sensors are used to
estimate the location and orientation of a mobile device.
In a distributed positioning system called Ad Hoc
Localization System is proposed, where some beacons are
aware of their own locations.
The former are used to determine the positions of the
latter. All the above systems require special hardware to
support localization. Localization, using pattern-matching
techniques is based on the localization task that can be
achieved by off-the-shelf communication hardware, such
as WiFi-enabled mobile devices. Such localization
systems are more cost-effective. Pattern-matching
localization does not rely on any range estimation
between mobile devices and infrastructure networks. For
example, a system can be based on WiFi access points at
unknown locations to serve as beacons.
Where
of Hi on Hj is
The observation
Fig. 3. (a) Evaluation of hit and false probabilities for the SSB
Scheme under different SSB
Fig. 3. (b) Evaluation of hit and false probabilities for the SSR
Scheme under different SSR
(d) +N (0,
)
84
)+10log(d/
is to
85
V. CONCLUSION
In this paper, we have proposed a Beacon Movement
Detection in wireless sensor networks for improving
localization accuracy. This paper describes a situation
where some beacon sensors localization procedure are
moved unexpectedly, called beacon movement events.
We propose to allow beacons to monitor each other to
identify such events. Four schemes are presented for the
BMD problem. Moreover, it is clear that SSB and SSR
Schemes have some errors which is improved by
86
Proceedings of the National Conference on Communication Control and Energy System (NCCCES'11),
Vel Tech Dr. RR & Dr. SR Technical University, Chennai, TN. 29 - 30 August, 2011. pp.87-90.
I. INTRODUCTION
Figure 1. Example photo of face detection by usin g Adaboost algorithm
87
Face Detection and Recognition Method based on Skin Color and Depth Information
binocular camera, depth image of a face can be estimated .
Fig.3 gives an example of the depth images and the right images
obtained from of binocular camera for a specific persons face,
what used here is the depth data.
R
R+ G B
g+
=
G
R +G
Y 11
= 0.+30 R + 0 .59 G
0.
(1)
AvgD = 1i =
(2)
(4)
r
0.333<< 0.664
g
0.246 << 0.398
Di
di=-Di AvgD
Sdi =
(3)
rg
()
(5)
(6)
i =1
gr =- 0.5 0.5
Y > 40
Av e r a ge
P ix els o f s k in co lor
Ave r a g e
P ix els of s ki n co lo r
88
TABLE I. RE SU L T S O F FAC E DE T E CT IO N
Angle
of head
rotate
Averag e time
(once)
0 50 50 100% 976.24ms
15 50 50 100% 989.21ms
30 50 49 98% 1006.15ms
89
Face Detection and Recognition Method based on Skin Color and Depth Information
For the use of PCA algorithm, the larger 150 feature values and
vectors are chosen to build the eigenface space. In the
experiment, the Euclidean distance classification is used. That
is, to calculate the Euclidean distance of projection of the test
face and various average faces. The test samples will be in the
class having the smallest Euclidean distance.
One of the successful face recognition results of a
specific person is shown in Fig.9. In TAB.II, the total face
recognition results and the successful recognition results are
obtained with different head title angles, and the face
recognition rate can be calculated. The average time used in
once recognition was also recorded. Although the percentage of
recognition is not so high, it is fast enough for the robot to do
services.
Figure 9.
Angle of
head rota te Total Success Recognitionrate
Average time
(once)
-3 0 50 40 80% 870.5ms
-1 5 50 42 82% 830.23ms
0 50 44 88% 785.72ms
15 50 42 84% 805.25ms
30 50 41 82% 826.36ms
V. CONCLUSION
90
Proceedings of the National Conference on Communication Control and Energy System (NCCCES'11),
Vel Tech Dr. RR & Dr. SR Technical University, Chennai, TN. 29 - 30 August, 2011. pp.91-93.
To better understand the difference between confidentiality and anonymity, consider the case of a medical
facility connected with a research institution. Suppose that
all patients treated at the facility are asked before leaving
the facility to donate their personal health care records
and medical histories (under the condition that each
patients privacy is protected) to the research insti-tution,
which collects the records in a research database. To
guarantee the maximum privacy to each patient, the
medical facility only sends to the research database an
anonymized version of the patient record. Once this
anonymized record is stored in the research database, the
non-anonymized version of the record is removed from
the system of the medical facility. Thus the research
database used by the researchers is anonymous.
I. INTRODUCTION
Today data confidentiality is particularly relevant because
of the value, often not only monetary, it also preserve the
updates .For example, medical data collected by
following the history of patients over several years may
represent an invaluable asset that needs to be adequately
protected. Such a requirement has motivated a large
variety of approaches aiming at better protecting data
confidentiality and data ownership. Relevant approaches
include query processing techniques for encrypted data
and data watermarking techniques. Data confidentiality is
not however the only requirement that needs to be
addressed.
Privacy-Preserving Updates to Anonymous and Confidential Databases using Cryptography with ARM
Objective
Protect IP
address
and sensitive info
Protect sensitive
authentication info
Protect
nonanonymous data
u
Protocol
Crowds [27],
Onion
Routing [26]
Policy-hiding
access
control [20]
Proposed in this paper
V. CONCLUSION
Our prototype of a Private Checker (that is, Alice) is composed by the following modules: a crypto module that is
in charge of encrypting all the tuples exchanged between
an user (that is, Bob) and the Private Updater.
REFERENCES
[1]
[2]
[3]
[4]
[5]
Fig. 4. Execution time of suppression based updates
93
Proceedings of the National Conference on Communication Control and Energy System (NCCCES'11),
Vel Tech Dr. RR & Dr. SR Technical University, Chennai, TN. 29 - 30 August, 2011. pp.94-99.
Assistant Professor, Vel Tech Dr. RR & Dr. SR Technical University, Chennai.
Email: 1anji.dvsr@gmail.com, 2jyothigoriparthi@gmail.com
means that the parameters in the time domain are doubled
compared with the parameters from IEEE 802.11a. [2]
I. INTRODUCTION
94
modulation
OFDM symbol
duration
Guard time
FFT period
Preamble duration
Sub carrier
frequency spacing
IEEE 802.11p
3,4,5,6,9,12,18,2
4,27
Bpsk,qpsk,16qpsk,64-qpsk
8s
IEEE 802.11a
6,9,12,24,36,48,5
4
Bpsk,qpsk,16qpsk,64-qpsk
4s
1.6s
6.4s
32s
0.15625MHz
0.8s
3.2s
16s
0.3125MHz
95
Development of a MATLAB Simulation Environment for Vehicle-To-Vehicle and Infrastructure Communication ...
A. Transmitter Side
Binary data is created according to a predefined mode.
This mode is created in adaptive modulation control
according to the SNR estimation at the receiver. This
mode has to be entered to the data source to create the
96
The Pad block extends the input vector along its columns.
The padding values are equal to zero, inserted at the end
of the columns, where the specified dimension of the
output is the number of points of the IFFT block
Cyclic prefix is used as a guard interval to mitigate the
effect of ISI due to the multipath propagation. A selector
block is applied as a cyclic prefix inserter to insert the last
16 subcarriers into the beginning of the OFDM symbols.
Interleaver Rows=16
Interleaver Columns = Number of transmitted bits per
block/interleaver Rows.
Development of a MATLAB Simulation Environment for Vehicle-To-Vehicle and Infrastructure Communication ...
SNR(db)
Bit rate(Mb/s)
B. Receiver Side
To convert a signal from serial to parallel, a de multiplex
block is used. A reshaping block is a subsystem of this
block and is employed to produce a matrix out of the
input vector.
In the receiver the inserted cyclic prefix must be removed,
to obtain the original input data. A selector block is used
to remove the 16 subcarriers that are inserted into the
beginning of the OFDM symbols.
BER(per packet)
Fig. 8
[2]
98
[3]
[4]
[5]
[6]
[7]
[8]
[9]
99
Proceedings of the National Conference on Communication Control and Energy System (NCCCES'11),
Vel Tech Dr. RR & Dr. SR Technical University, Chennai, TN. 29 - 30 August, 2011. pp.100-102.
I. INTRODUCTION
Traffic congestion on the road is a large problem today in
major cities. The congestion and related vehicle
accommodation problem is accompanied by a constant
threat of accidents as well. The absence of road traffic
safety takes a toll of precious lives and passes a dire threat
to our environment. According to National Highway
Traffic Safety Administration (NHTSA) [9],
100
IEEE 802.11p
3,4,5,6,9,12,18,2
4,27
Bpsk,qpsk,16qpsk,64-qpsk
8s
IEEE 802.11a
6,9,12,24,36,48,5
4
Bpsk,qpsk,16qpsk,64-qpsk
4s
1.6s
6.4s
32s
0.15625MHz
0.8s
3.2s
16s
0.3125MHz
101
[3]
[4]
[5]
[6]
[7]
[8]
[9]
VII. CONCLUSIONS
This article presents an overview of the IEEE standards
for WAVE, namely, IEEE 802.11p, IEEE 1609.1, IEEE
102
Proceedings of the National Conference on Communication Control and Energy System (NCCCES'11),
Vel Tech Dr. RR & Dr. SR Technical University, Chennai, TN. 29 - 30 August, 2011. pp.103-106.
I. INTRODUCTION
Terminology for MR/ID has been particularly challenging
as the term mentally retarded carries significant social
and emotional stigma. The American Association for
Intellectual and Developmental Disability (AAIDD) has
been particularly influential in terminology changes such
that most professionals working in the field now refer to
mental
retardation
as
intellectual
disability.
Developmental delay is often used inappropriately as
synonymous with MR/ID. Developmental delay is an
overly inclusive term and should generally be used for
infants and young children in which the diagnosis is
unclear, such as those too young for formal testing.
Approximately 10% of children have some learning
impairment, while as many as 3% manifest some degree
of MR/ID. Speech is one of the salient forms of
communication in daily life [1]. Speech is formed through
the functioning of time-varying vocal tract system. During
the production of speech, both excitation and the vocal
tract are changed constantly with time [2]. In every verbal
103
N = w
cv =
A. Feature Extraction
In this segment, the speech samples are extracted from the
normal persons and abnormal persons with the aid of the
audio synthesizer. Let Da and D b are the abnormal
person, normal person speech datasets respectively and
from these datasets the MFCC feature is extracted.
Da = {w1 , w 2 , w 3 ...w N w 1 }
(1)
D b = {1 , 2 , 3 ...N w 1 }
(2)
N NT
n 1
(3)
(4)
Y = N * ET
(5)
Y
* = w
ET
(6)
N Mean Deviation
w-window
-mean
cv-covariance vector
E Eigenvector
The aforesaid eqns are utilized to obtain the PCA of both
M a and M b here given eqns are the general sets of eqns
to generate PCA. In PCA the data are processed by
window by window. After PCA the inverse PCA also
applied to obtain the dimensionality reduced original
information again. After this process completed, the
following parameters are obtained from the MFCC
featured vectors M a , M b .The parameters are mean,
standard deviation, maximum amplitude value and its id,
minimum amplitude value and its id, MFCC length are
extracted for the MFCC featured word and as well as for
the original word also extracted and hence for each word
we have 14 inputs.
III. RESULTS AND DISCUSSION
The proposed system was implemented in the working
platform of MATLAB (version 7.11). In this with the aid
of the Free Audio Editor we generate the dataset with the
normal and abnormal female children within the age limit
6-10. For 100 normal data (words) we utilized 2 female
children and for 100 abnormal data we utilized a female
child for our system and their normal frequency range is
from 0-300 kHz.
104
IV. CONCLUSION
[2]
Fig. 4. Feature Extraction output of Normal Speech of Child 1
[3]
[4]
[5]
105
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
[18]
[19]
[20]
[21]
[22]
[23]
[24]
[25]
[26]
[27]
[28]
[29]
[30]
[31]
[32]
[33]
[34]
106
Proceedings of the National Conference on Communication Control and Energy System (NCCCES'11),
Vel Tech Dr. RR & Dr. SR Technical University, Chennai, TN. 29 - 30 August, 2011. pp.107-112.
identification,
I. INTRODUCTION
Biometrics refers to the technologies that use
physiological or behavioral characteristics to authenticate
a person's identity [1]. In recent years, the increasing
demand on enhanced security has led to an unprecedented
interest in automated personal authentication based on
biometrics. Biometric systems based on a single source of
information are called unimodal systems. Although some
unimodal systems have got considerable improvement in
reliability and accuracy, they often suffer from enrollment
problems due to non-universal biometrics traits,
susceptibility to biometric spoofing or insufficient
accuracy caused by noisy data [2], and hence, may not be
able to achieve the desired performance requirement in
real-world applications. One way to overcome these
problems is the use of multimodal biometric
authentication systems, which combine information from
multiple modalities to arrive at a decision. Some studies
have demonstrated that multimodal biometric systems can
achieve better performance comparing to the unimodal
systems [2-7].
Although existing multimodal fusion techniques have
been shown effectively to improve the accuracy of
biometrics-based verification, they also face some
limitations. For example, most existing multimodal fusion
schemes, especially some single parametric machine
learning fusion strategies, are based on the assumptions
107
108
(1)
(2)
(3)
Where
is the average image vector of the entire
training set
109
110
[4]
[5]
[6]
[7]
Fig. 5. ROC curves for different biometric systems for (a) ear,
(b) signature,(c) face (fisherface and eigenface), and (d) three
different approaches for ranklevel output fusion methods for
combining ear, face, and signature biometric systems
[8]
[9]
[10]
[11]
[12]
[13]
Fig. 6. ROC curves for different biometric systems in terms of
GAR and FAR.
[14]
VI. CONCLUSION
[15]
[16]
[17]
[18]
[19]
REFERENCES
[20]
[1]
111
112
Proceedings of the National Conference on Communication Control and Energy System (NCCCES'11),
Vel Tech Dr. RR & Dr. SR Technical University, Chennai, TN. 29 - 30 August, 2011. pp.113-117.
M.SUGANTHY1,
Scholar(Anna univ)
Asst prof(vtu chennai)
gayathricontact@gmail.com
I.
Recognition-Contourlet-Support
INTRODUCTION
113
.
extracted features are used to train the classifiers. The
optimal features subset is selected using several methods to
increase the matching accuracy based on the recognition
erformance of the classifiers.
B.Literatue survey
In [14], iris recognition technology was applied in mobile
phones. In [15], correlation filters were utilized to measure the
consistency of the iris images from the same eye. An
interesting solution to defeat the fake iris attack based on the
Purkinje image was depicted in [16]. An iris image was
decomposed in [17] into four levels by using the 2D Haar
wavelet transform, the fourth-level high-frequency
information was quantized to form an 87-bit code, and a
modified competitive learning neural network (LVQ) was
adopted for classification. A modification to the Hough
transform was made to improve the iris segmentation, and an
eyelid detection technique was used, where each eyelid was
modeled as two straight lines. A matching method was
implemented and its performance was evaluated on a large
dataset. A personal identification method based on the iris
texture analysis was described. An algorithm was proposed for
iris recognition by characterizing the key local variations in.
B Iris Normalization
114
C Contourlet Transform
115
(a)Inter-Class Distribution
(b)Inter-Class Distribution
for Classifier
1111100000011100000111100011110000
Length of chromosome, l = feature dimension
Figure.6: Binary feature vector of l dimension.
Table. I: GA Parameters
116
Parameters
Population size
Length of chromosome
code
Crossover probability
Mutation probability
Number of generation
Local
Feature
CASIA Dataset
108 (the scale of iris sample)
600 (selected dimensionality of
feature
seque
nce)
0.65
0.002
1
(2)
N
N
Method
Vector
Length(
Bit)
Feature
Extraction(ms)
2048
H
D
SV
M
100
Lim[17]
87
L
V
Q
SV
M
90.
4
Jafar Ali[48]
87
H
D
SV
M
92.
1
Ma[20]
1600
E
D
SV
M
95.
0
Daugman[3]
1
0
0
9
2.
3
9
2.
8
9
5.
9
628.5
180
260.3
80.3
21
SVM
94.2
20.3
GLCM
(Combining
Sub bands)
56
SVM
96.3
20.3
24
ED
78.6
20.3
20.3
VI.REFERENCES
[1] R. P. Wildes, Iris recognition: an emerging biometric technology,
Proceedings of the IEEE, vol. 85, no. 9, pp. 13481363, 1997.
[2] A. Jain, R. Bolle, and S. Pankanti, Biometrics: Personal Identification in a
Networked Society, Kluwer Academic Publishers, Norwell, Mass, USA, 1999.
[3] J. Daugman, Biometric personal identification system based on iris
analysis, 1994, US patent no. 5291560.
[4] T. Mansfield, G. Kelly, D. Chandler, and J. Kane, Biometric product
testing, Final Report, National Physical Laboratory, Middlesex, U.K, 2001.
[5] J. G. Daugman, High confidence visual recognition of persons by a test of
statistical independence, IEEE Transactions on Pattern Analysis and Machine
Intelligence, vol. 15, no. 11, pp. 11481161, 1993.
[6] J. Daugman, Demodulation by complex-valued wavelets for stochastic
pattern recognition, International Journal of Wavelets, Multiresolution and
Information Processing, vol. 1, no. 1, pp. 117, 2003.
The Correct
Of
Percentage
Classifier
(%)
Classifier
90.32
The
Feature
HD
V.CONCLUSION
110
F L f (x, y) m
2520
Global
Feature
117
Proceedings of the National Conference on Communication Control and Energy System (NCCCES'11),
Vel Tech Dr. RR & Dr. SR Technical University, Chennai, TN. 29 - 30 August, 2011. pp.118-126.
I. INTRODUCTION
For a long time research on human-computer interaction
has been restricted to techniques based on the use of a
graphic display, a keyboard and a mouse. Recently this
paradigm has changed. Techniques such as vision, sound,
speech recognition, projective displays and context-aware
devices allow for a much richer, multi-modal interaction
between man and machine.
Today there are many different devices available for
hand-based human-computer interaction. Some examples
are keyboard, mouse, track-ball, track-pad, joystick,
electronic pens and remote controls. More sophisticated
examples include cyber-gloves, 3D-mice (e.g. Labtecs
118
119
c) Tracking
In most cases, the identified objects will not rest in the
same position over time. If two objects of the same class
are moving in the scene, tracking is required to be able to
tell which object moved where between two frames.
There are two basic approaches to deal with the tracking
problem. First, it is possible to remember the last known
position of an identifi ed object. Given some known
constraints about the possible movements of an object
between two frames, a tracking algorithm can try to
follow the object over time.
The second possibility is to re-run the identification stage
for each frame. While this approach might seem rather
crude and also requires a very fast identification
algorithm, it might be the only feasible tracking technique
for unconstrained hand motion for two reasons:
Measurements show that hands can reach speeds of 5
m/s during normal interaction. At a frame rate of 25
frames/s the hand jumps with steps of up to 20cm
per frame.
As shown in Figure 1, fast finger motion results in
strong motion burring. The blurred fingers are almost
impossible to identify and therefore lead to unknown
finger positions during fast motion.
120
Every tracker looses track from time to time (e.g. due to occlusion)
and has to be restarted. By restarting the system at each frame,
many tracking problems can be avoided.
V. HAND SEGMENTATION
When processing video images, the basic problem lies in
the extraction of information from vast amount of data.
The Matrox Meteor frame grabber, for example, captures
over 33 megabytes of data per second, which has to be
reduced to a simple fi ngertip position value in fractions
of a second.
The goal of the segmentation stage is to decrease the
amount of image information by selecting areas of
interest. Due to processing power constraints, only the
most basic calculations are possible during segmentation.
Typical hand segmentation techniques are based on stereo
information, color, contour detection, connected
component analysis and image differencing.
Each technique has its specific disadvantages:
Stereo image based segmentation requires a hardware
setup that currently only can be found in laboratories.
Color segmentation is sensitive to changes in the overall
illumi-nation [19]. In addition, it is prone to segmentation
errors caused by objects with similar colors in the image.
It also fails, if colors are projected onto the hand (e.g.
during a presentation).
Contour detection tends to be unreliable for cluttered
backgrounds. Much stability is obtained by using a
contour model and post-processing with the condensation
algorithm, but this restricts the maximum speed of hand
movement [2].
121
N 1
-------------
t 1
( x, y) +
I ( x, y)
(1)
x,y
N ( x, y ) =
for I t 1( x, y) I t ( x, y)
(2)
----
122
( x, y) Region_of_Interest
Add number of filled pixels in circle with
diameter d1 and center (x, y)
If
If
Memorize
(x,
y)
2) There has to be the correct number of filled and unfilled pixels along the described square around (x, y).
3) The filled pixels along the square have to be
connected in one chain.
This basic algorithm runs easily at real-time and reliably
fi nds possible fingertips. We implemented two
enhancements to further improve the stability. First, it is
useful to define a minimum distance between two
fingertips to a void classifying two pixels next to each
other as different fingertips. Second, the middle position
of the chain of inner pixels along the search square shows
the direction of the fi nger. This information can be used
to determine whether the found fingertip is connected to
an outstretched finger.
If
or
(2)
(3)
Background
White
Light Condition
Diffuse Daylight
Daylight with Shadows
Droppe
d
Misclas.
Frames Frames
0
0
0
1
Slow
position
Diffuse Daylight
0
4
0
0
Diffuse Daylight
Daylight with Shadows
3
5
3
2
Diffuse Daylight
1
8
0
0
(<2.5
m/s)
Clutter
White
Fast
(<4.5
m/s)
Clutt
er
123
In section three we set up requirements for real-time barehand human computer interaction. While the functional
requirements have to be evaluated on a system level, we
can already check at this point if the non-functional
requirements are met.
c) Accuracy
The accuracy was calculated for all correctly classified
frames. The mean error for the evaluate sequences was
between 0.5 and 1.9 pixels with variances between 0.1
and 2.0. As expected, fast fi nger movements are tracked
with lower accuracy than slow movements, due to motion
blurring. Taking into account the error margin of the hand
labeling process, the overall accuracy of the algorithm is
better than one pixel and therefore suffi cient for precise
point-and-click tasks.
C. Evaluation
a) Latency
The total latency of the algorithm was between 26 and
34ms, depending on the number of pixels in the region of
interest. Image differencing alone takes about 10ms. The
maximum latency is therefore still well below the
required maximum latency of 50ms. We intentionally left
some room for the latency of image acquisition and
graphical output.
d) Finger Classification
Figure 7 shows two examples of the finger classification
algorithm. The finger positions (blue dots) and directions
(red dots) are reliably found for all fingers in front of a
cluttered background. Other fi nger-like objects such as
the pen or the ball are ignored. Additionally, the
forefingers (yellow dots) of the two hands are correctly
found. The ten fingers are grouped into two dif ferent
hand objects (not visible in the picture)3.
b) Robustness
For each sequence two types of frames have been
counted:
Dropped frames: Frames in which no finger could be
found
Misclassified frames: Frames in which the finger
position w as off by more than 10 pixels from the right
position, or frames in which the nearby fi ngershadow has been tracked instead of the finger itself.
Dropped frames usually occur if the finger mo ves very
fast. In this case they do not cause problems to most
applications, because the resting position of a finger is
usually much more important than the fast moving
position. Misclassified frames, on the other hand, are
quite annoying. If the finger controls a pointer, for e
xample, this pointer might jump forth and back erratically
between correctly and misclassified finger positions.
Table 1 shows that the algorithm is quite robust for most
circum-stances. The occasional misclassified frames can
be explained with nearby shadows and body parts that
resemble a fi nger. a simple stabilization step, that always
chooses the fi nger-position closest to the last known
position will eliminate most of those problems later on.
Of course the two demonstrated cases are just examples for many
different possible conditions and hand states. MPEG movies of the
finger finder and of all described applications can be viewed at
http://iihm.imag.fr/hardenbe/Videos.htm
124
(a)
(b)
125
VIII. CONCLUSION
In this paper, we described how a computer can be
controlled with the bare hand. We developed a simple but
effective finger fi nding algorithm that runs in real-time at
a wide range of light conditions. Other than in previous
work, our system does not constrain the hand movement
of the user. Also, there is no set-up stage. Any user can
simply walk up to the wall and start interacting with the
system.
The described user tests show that the organization of
projected items on the wall can be easily accomplished
with bare hand interaction. Even though the system takes
more time than its physical counterpart, we think that it is
still very useful: many value-adding services, such as
printing and storing, can only be realized with the virtual
representation.
Further research will be necessary to find a faster
selection-mechanism and to improve the segmentation
with a projected background under difficult light
conditions.
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[15]
[16]
[17]
[18]
[19]
126
Scale Image Features, Technical report ISRN KTH/NA/P00/ 12-SE, September 2000.
Lee, J. and Kunii, T. Constraint-based hand animation, in
Models and techniques in computer animation, 110-127,
Springer Verlag, Tokyo, 1993.
Lien, C. and Huang, C. Model-Based Articulated Hand
Motion Tracking For Gesture Recognition, Image and
Vision Computing, vol. 16, no. 2, 121-134, February
1998.
MacCormick, J.M. and Isard, M. Partitioned sampling,
articulated objects, and interface-quality hand tracking,
European Conference on Computer Vision, Dublin, 2000.
MacKenzie, I. and Ware, C. Lag as a determinant of
Human Performance in Interactive Systems. Conference
on Human Factors in Computing Systems, 488-493, New
York, 1993.
O'Hagan, R. and Zelinsky, A. Finger Track - A Robust and
Real-Time Gesture Interface, Australian Joint Conference
on Artificial Intelligence, Perth, 1997.
Quek, F., Mysliwiec, T. and Zhao, M. Finger mouse: A
freehand pointing interface, International Workshop on
Automatic Face- and Gesture-Recognition, Zrich, 1995.
Rehg, J. and Kanade, T. Digiteyes: Vision-based human
hand tracking, Technical Report CMU-CS-93-220, School
of Computer Science, Carnegie Mellon University, 1993.
Sato, Y., Kobayashi, Y. and Koike, H. Fast Tracking of
Hands and Fingertips in Infrared Images for Augmented
Desk Interface, International Conference on Automatic
Face and Gesture Recognition, Grenoble, 2000.
Segen, J. GestureVR: Vision-Based 3D Hand Interface for
Spatial Interaction, ACM Multimedia Conference, Bristol,
1998.
Stafford-Fraser, J. Video-Augmented Environments, PhD
theses, Gonville & Caius College, University of
Cambridge, 1996.
Triesch, J. and Malsburg, C. Robust Classification of
Hand
Postures
Against
Complex
Background,
International Conference On Automatic Face and Gesture
Recognition, Killington, 1996.
Ware, C. and Balakrishnan, R. Researching for Objects in
VR Displays: Lag and Frame Rate, ACM Transactions on
Computer-Human Interaction, vol. 1, no. 4, 331-356,
1994.
Zhu, X., Yang, J. and Waibel, A. Segmenting Hands of
Arbitrary Color, International Conference on Automatic
Face and Gesture Recognition, Grenoble,
Proceedings of the National Conference on Communication Control and Energy System (NCCCES'11),
Vel Tech Dr. RR & Dr. SR Technical University, Chennai, TN. 29 - 30 August, 2011. pp.127-131.
I. INTRODUCTION
A reliable biometric system, which is essentially a
pattern-recognition that recognizes a person based on
physiological or behavioral characteristic, is an
indispensable element in several areas, including
ecommerce(e.g. online banking), various forms of access
control security (e.g. PC login), and so on. Nowadays,
security has been important for privacy protection and
country in many situations, and the biometric technology
is becoming the base approach to solve the increasing
crime [1]. As the significant advances in computer
processing, the automated authentication techniques using
various biometric features have become available over the
last few decades. Biometric characteristics include
fingerprint, face, hand/finger geometry, iris, retina,
signature, gait, voice, hand vein, odor or the DNA
information, while fingerprint, face, iris and signature are
considered as traditional ones. Due to each biometric
technology has its merits and shortcoming, it is difficult
to make a comparison directly. Jain1. have identified
seven factors, which are
1. Universality,
2. Uniqueness,
3. Permanence,
4. Measurability,
A. Principle
5. Performance,
6. Acceptability,
7. Circumvention,
127
Fig. 1. IR Frame
Fig. 2. IR Frame
128
Fig. 5. IR illumination
a)
b)
c)
d)
e)
f)
g)
h)
i)
129
j)
k)
l)
m)
n)
o)
p)
q)
r)
s)
t)
u)
v)
Loop
Read pixel intensity value
If pixel intensity value lies above y, then
Convert the intensity value to 0 (white)
Elseif
If pixel intensity value lies below x, then
Convert the intensity value to 255 (black)
Else
If neighbouring pixel is edge pixel then make current
pixel 0 (white)
End if
Write the intensity value to Binary Image
End Loop
Close all Image Files
VIII. APPLICATIONS
a) Log in Control PC Access System
b) Security systems: physical admission into secured
areas
c) Healthcare: ID verification for medical equipment
d) Electronic Record Management
e) Banking and financial services: access to ATM,
kiosks, vault
IX. DISCUSSION
130
X. FUTURE WORK
We are planning to do verification and matching part
based on our low quality image based authentication
system. We are aiming to implement it as a secured smart
card and hand vein based person authentication system
and we have already started work in that direction.
REFERENCES
[1]
[2]
[3]
[4]
131
Proceedings of the National Conference on Communication Control and Energy System (NCCCES'11),
Vel Tech Dr. RR & Dr. SR Technical University, Chennai, TN. 29 - 30 August, 2011. pp.132-137.
B. Proposed System
The main aim of this project is to protect the fracture
induced by fall in the hip bones. We use MEMS sensor to
sense the fall. If the fall occurs the sensors will send the
signal to the Microcontroller Unit and it will trigger the
actuator. The actuator will open the cartridge containing
the compressed gas. Now the compressed gas flow
through the pipe connected to the airbag to fill it.
The fall detection system consists of a MEMS
accelerometer which can sense the different motion of
human being. It can detect imbalance of the elderly
person and send signal to the fall protection system
through the microcontroller output whenever a fall is
detected by MEMS accelerometer fixed on the hip of the
body. The protection unit consists of an airbag which will
be inflated to protect the elderly. The fall detection and
protection systems design is to be small, light-weight and
comfortable as the elderly have to wear it every day.
Owing to the availability of low-cost, small-size MEMS
sensor, it is possible to build self-contained inertial
sensors with overall system dimension of less than 1
cubic inch, and at the same time, the sensors unit can
track the orientation and locomotion in real time
I. INTRODUCTION
C. Features of the Proposed System
A. Existing System
Falls and fall-induced fractures are very common among
the frail and elderly person. Of all the fall-induced
fractures, hip fractures account for most of the deaths and
costs. After a hip fracture, an elderly person usually loses
his/her independence of functional mobility. Hip
protectors are protective devices made of hard plastic or
soft foam and are placed over the greater trochanter of
each hip to absorb or shunt away the energy during
mechanical impact on the greater trochanter. They are
widely demonstrated both biomedically and clinically to
be capable of reducing the incidence of hip fractures.
However, the compliance of the elderly to wear them is
very low, due to discomfort, wearing difficulties, problem
with urinary incontinence and illness, physical
difficulties, and not useful and irrelevant.
132
133
134
Fig. 3
OPTOCOUPLER
RELAY
SOLENOID
VALVE
Degree
AIRBAG
Fig. 4
135
0
20
40
60
80
90
X-axis
(Primary axis)
Vp+
1.38
1.62
1.74
1.76
1.84
1.86
Y-axis
(Cross axis)
Vp+
0.94
1.1
1.06
1.16
1.28
1.36
Z-axis
(Cross axis)
Vp+
1.36
1.36
1.48
1.48
1.46
1.42
B. Experimental Setup 2
We also used another experimental setup to measure the
voltage variation at differential angles. In the
experimental setup 1 we used analog oscilloscope to
measure the values of voltage at various angle. Here in
this experimental setup 2 we simply use a multimeter to
measure the values of voltage at various angle. The
voltage values obtained from experimental setup 2 is
more or less equal to the values obtained from setup 1.
Experimental setup 2 is also used to check fall detection
and it illustrated in the figure 7.
Experimental setup 2 is a simple arrangement. The supply
voltage for the accelerometer is get from the 3V battery
and the output of the accelerometer is connected to the
multimeter. Through the multimeter we measured the
voltage value of the accelerometer at different angles as in
the case of experimental setup 1.
After the values are measured from the setup it is plotted
in a graph and the threshold value is found. The obtained
threshold value is programmed in a microcontroller. After
the controller is programmed it is fixed on a PIC
development board and falls are detected on the
corresponding output ports in the microcontroller.
After we checked the operation of the fall detection
system on a PIC development board, the fall detection
system is developed on a general purpose PCB. The
voltage measured at various angle is plotted on table 2.
the readings are taken from 0 to 180. The variations in
voltage value are clearly shown.
Degree
0
20
40
60
80
100
120
140
160
180
X-axis Readings
X-axis
Y-axis
(Primary
(Cross axis)
axis)
X-axis
Y-axis
1.517
1.1
1.661
1.125
1.794
1.198
1.89
1.309
1.942
1.444
1.949
1.593
1.909
1.734
1.822
1.853
1.696
1.934
1.546
1.968
Z-axis
(Cross axis)
Z-axis
1.577
1.579
1.582
1.585
1.588
1.591
1.593
1.594
1.596
1.597
136
[2]
[3]
[4]
[5]
137
Proceedings of the National Conference on Communication Control and Energy System (NCCCES'11),
Vel Tech Dr. RR & Dr. SR Technical University, Chennai, TN. 29 - 30 August, 2011. pp.138-140.
I. INTRODUCTION
As wireless services increase in carrier frequency and data
bandwidth, the problems associated with in building
coverage are becoming ever more severe. Distributed
antenna systems (DAS) has been proposed as a cheaper,
upgradable alternative to placing multiple access point
and base stations throughout a building to provide
Ubiquitous coverage.
A DAS includes a central unit (CU) and a number of colocated radio units to feed remote antenna units (RU)
which are positioned where coverage is required. Radio
over fiber (RoF) technology has been proposed as a
solution to implement Optical fibre link between the CU
and RAUs
Radio over Fiber (RoF) refers to a technology
whereby light is modulated by a radio signal and
transmitted over an optical fiber link to facilitate access.
Semiconductor optical amplifiers (SOAs) and reflective
semiconductor optical amplifiers (RSOAs) will play an
important role in future optical communication links and
have been investigated recently .
When compared with RSOA, SOA has larger modulation
bandwidth but lower optical gain and higher noise figure,
for devices with similar physical dimensions [4], [5].
Efficient architectures have been proposed using
wavelength division multiplexing (WDM) techniques,
allowing a reconfigurable RoF network, therefore
colorless devices are needed. RSOA is a perfect candidate
(1)
Where N is the active regions carrier density, I is the
injection current of RSOA, L, W and d are length, width
and thickness of the active region of RSOA, respectively.
e is the electron charge. The second term to fourth term
on the right hand represents the spontaneous
recombination rate, stimulated emission recombination
rate and amplified spontaneous emission (ASE) optical
field, respectively.
is the gain compression. h is
Plancks constant. is optical frequency. Pav(z) is the
average optical power at position z .R(N) was presented
in [6].
gc is represented by
(2)
Where is the gain saturation parameter, S is the photon
density,
gm is the material gain coefficient [6].
The net gain gnet is depicted by
138
(3)
A. Static Characteristics
The optical powers versus bias current measurements
were carried out. The vector signal generator (VSG),
vector signal analyzer (VSA), photodiode (PD) and the
RF amplifier in Fig. 1 were removed in this case. An
optical power meter was used to measure the optical
power at the circulator output. The parameter extraction
algorithm was performed according to the extraction
technique in Section III. The measured and simulated
output optical powers versus bias current and optical gain
versus input optical powers characteristics of RSOA are
shown in Fig. 2.In Fig. 2(b) the measurement and model
have good fit for 90mA and 120mA.
(5)
Where is the confinement factor,
is the material loss
coefficient, and represents the material gain, which is
normally approximated by a linear function of the carrier
density, given by
Fig. 2. Measured and simulated (a) curve; (b) gain versus input
optical power under different bias currents.
Reflective Semiconductor Optical Amplifier (RSOA) Model used as a Modulator in Radio over Fiber (RoF) Systems
B. Nonlinearity
It is common to use single-tone and two-tone
measurements in order to characterize the nonlinearity of
RSOA. The RSOA was biased at 90mA. Gain,
compression point and harmonic distortions were carried
out using single tone signal (1 GHz) generated by VSG.
The RF signal was recovered by a photodiode.
[2]
[3]
[4]
[5]
[6]
[7]
C. Transmission Performance
The transmission performance of the RSOA is evaluated
with the error vector magnitude (EVM) measurements of
140
Proceedings of the National Conference on Communication Control and Energy System (NCCCES'11),
Vel Tech Dr. RR & Dr. SR Technical University, Chennai, TN. 29 - 30 August, 2011. pp.141-145.
I. INTRODUCTION
To multiply throughput of a radio link, multiple antennas
are put at both the transmitter and the receiver. This
system is referred to as Multiple Input Multiple Output
(MIMO). A 2x2 MIMO will double the throughput.
MIMO often employs Spatial Multiplexing (SM) to
enable signal (coded and modulated data stream) to be
transmitted across different spatial domains. Meanwhile,
Mobile WiMAX supports multiple MIMO modes, that's
using either SM or STC or both to maximize spectral
efficiency (increase throughput) without shrinking the
coverage area. The dynamic switching between these
modes based on channel conditions is called Adaptive
MIMO Switching (AMS). If combined with AAS
(Adaptive Antenna System), MIMO can further boost
WiMAX performance . MIMO is a hot topic in today
wireless communications since all wireless technologies
try to add it to increase data rate multiple times to satisfy
their bandwidth-hungry broadband users.
Automatic Repeat reQuest (ARQ), also known as
Automatic Repeat Query, is an error-control method for
data transmission that uses acknowledgements (messages
sent by the receiver indicating that the it has correctly
141
142
Fig. 4. Receiver architectures for MIMO systems employing BICM and HARQ.
143
REFERENCES
[1]
[2]
144
S. Lin, D. J. Costello, Jr., and M. J. Miller, AutomaticRepeat Request Error-Control Schemes, IEEE Commun.
Mag., vol. 22, Dec. 1984, pp. 517.
IEEE Std. 802.16e-2005, IEEE Standard for Local and
Metropolitan Area Networks, Part 16: Air Interface for
Fixed Broadband Wireless Access SystemsFeb. 2006.
[4]
[5]
[6]
[7]
145
Proceedings of the National Conference on Communication Control and Energy System (NCCCES'11),
Vel Tech Dr. RR & Dr. SR Technical University, Chennai, TN. 29 - 30 August, 2011. pp.146-149.
I. INTRODUCTION
The automatic accident detector is used to make an
automatic call to the ambulance as soon as the accident
has occurred. The auto dialer and the Microcontroller play
a vital role in this detection. The main working is that the
circuit is connected to the vehicle and as soon as the
accident has occurred there is a great vibration in the
vehicle .The vibration makes the auto dialer to activate.
The auto dialer then makes a call to the number saved in
its memory. The number saved may be the contact
number of the nearest hospital. Then the ambulance can
be able to arrive to the desired location as soon as
possible. The microcontroller helps the auto dialer in
transmitting and receiving the signals.
A. Main Components Used
Micro controller PIC16F877A
3202 Vibration sensor
Auto dialer.
B. Circuit Diagram
Fig. 1
II. WORKING
A. Accident Detection using Vibration Sensor
The vibration sensor with certain range of acceleration is
fixed in the vehicle. In this project 3202Vibration sensor
is used which operates at the frequency of 315Mhz.
Fig. 2
confirm the accident. If the person inside the car does not
get injured, they can press the switch and stop the
function of auto-dialer. This will helps us to avoid calling
the ambulance when not needed. The range of the
vibration sensor is 215-350Mhz. If the acceleration
crosses this range, it detects the accident. For better
operation this is placed in the center of the vehicles.
B. Microcontoller PIC16F877A
The term PIC, or Peripheral Interface Controller, is the
name given by Microchip Technologies to its single
chip microcontrollers.
These devices have been
phenomenally successful in the market for many reasons,
the most significant ones are mentioned below. PIC
micros have grown in steadily in popularity over the last
decade, ever since their inception into the market in the
early 1990s. PIC micros have grown to become the most
widely used microcontrollers in the 8- bit microcontroller
segment. The PIC16F877 is 40 pin IC. There are six
ports in this microcontroller namely PORT A, PORT B,
PORT C, PORT D and PORT E. Among these ports
PORT B, PORT C and PORT D contains 8-pins, where
PORTA contains 6-pins and PORT E contains 3-pins.
Fig. 3
Fig. 4
147
Fig. 5
After SA, which has been turned off, the largest error in
GPS is usually the unpredictable delay through the
ionosphere. The spacecraft broadcast ionospheric model
parameters, but errors remain. This is one reason the GPS
spacecraft transmit on at least two frequencies, L1 and
L2. Ionospheric delay is a well-defined function of
frequency and the total electron content (TEC) along the
path, so measuring the arrival time difference between the
frequencies determines TEC and thus the precise
ionospheric delay at each frequency.
Receivers with decryption keys can decode the P(Y)-code
transmitted on both L1 and L2. However, these keys are
reserved for the military and "authorized" agencies and
are not available to the public. Without keys, it is still
possible to use a codeless technique to compare the P(Y)
codes on L1 and L2 to gain much of the same error
information. However, this technique is slow, so it is
currently limited to specialized surveying equipment. In
the future, additional civilian codes are expected to be
transmitted on the L2 and L5.Then all users will be able
to perform dual-frequency measurements and directly
compute ionospheric delay errors.
A second form of precise monitoring is called CarrierPhase Enhancement (CPGPS). The error, which this
corrects, arises because the pulse transition of the PRN is
not instantaneous, and thus the correlation (satellitereceiver sequence matching) operation is imperfect. The
CPGPS approach utilizes the L1 carrier wave, which has a
period one one-thousandth of the C/A bit period, to act as
an additional clock signal and resolve the uncertainty. The
phase difference error in the normal GPS amounts to
between 2 and 3 meters (6 to 10 ft) of ambiguity. CPGPS
working to within 1% of perfect transition reduces this
error to 3 centimeters (1 inch) of ambiguity. By
eliminating this source of error, CPGPS coupled with
DGPS normally realizes between 20 and 30 centimeters
(8 to 12 inches) of absolute accuracy.
Relative Kinematics Positioning (RKP) is another
approach for a precise GPS-based positioning system. In
this approach, determination of range signal can be
resolved to a precision of less than 10 centimeters (4 in).
This is done by resolving the number of cycles in which
the signal is transmitted and received by the receiver. This
can be accomplished by using a combination of
differential GPS (DGPS) correction data, transmitting
GPS signal phase information and ambiguity resolution
techniques via statistical testspossibly with processing
in real-time (real-time kinematics positioning, RTK)
Fig. 7
V. GPS RECEIVER
A. Precise Monitoring
The accuracy of a calculation can also be improved
through precise monitoring and measuring of the existing
GPS signals in additional or alternate ways.
148
Fig. 9
A. A Community Alarm
Then the name and address as well as others bits of
information stored on the control centres data base are
displayed on the control centre operators screen so that
she knows as much detail as possible about the source of
the alarm. The base station also transmits the source
within the house of the alarm so the operator will know if
the pendant has been pressed or the button on the alarm or
if a smoke alarm has been triggered.
Fig. 8
149
www.google.com
www.wikipedia.com
www.car-accidents.com
Electronics for you
Project ideas for blooming Engineers.
Proceedings of the National Conference on Communication Control and Energy System (NCCCES'11),
Vel Tech Dr. RR & Dr. SR Technical University, Chennai, TN. 29 - 30 August, 2011. pp.150-154.
Field
I. INTRODUCTION
A software-defined radio system, or SDR, is a radio
communication system where components that have been
typically implemented in hardware (e.g. mixers, filters,
amplifiers, modulators/demodulators, detectors, etc.) are
instead implemented by means of software on a personal
computer or embedded computing devices. A basic SDR
system may consist of a personal computer equipped with
a sound card, or other analog-to-digital converter,
preceded by some form of RF front end. Significant
amounts of signal processing are handed over to the
general-purpose processor, rather than being done in
special-purpose hardware. Such a design produces a radio
which can receive and transmit widely different radio
protocols (sometimes referred to as a waveforms) based
solely on the software used. Software radios have
significant utility for the military and cell phone services,
both of which must serve a wide variety of changing
radio protocols in real time.The ideal receiver scheme
would be to attach an analog-to-digital converter to an
antenna. A digital signal processor would read the
converter, and then its software would transform the
stream of data from the converter to any other form the
application requires. An ideal transmitter would be
similar. A digital signal processor would generate a
stream of numbers. These would be sent to a digital-toanalog converter connected to a radio antenna. The ideal
150
Fig. 2
Fig. 3
151
Transceiver Implementation for Software Defined Radio using DPSK Modulation and Demodulation
Fig. 4
A. Dialogue Box
Fig. 6
Fig. 7
152
A. Dialogue Box
Fig. 9
B. DPSK Modulator
Fig. 8
Fig. 10
153
Transceiver Implementation for Software Defined Radio using DPSK Modulation and Demodulation
C. DPSK Demodulator
VIII. CONCLUSION
This paper presented a test platform for the exploration
and development of SDR technology using DPSK
modulation & demodulation. The hardware uses off-the
shelf components in wide bandwidth direct conversion
transceiver architecture. The software allows easy
configuration of the hardware and can be integrated with
existing software radio platforms such as OSSIE Tech or
IRIS. A simple DPSK communications link was
established between two desktop computers and
measurements at different points on this link was noted
down for future references
REFERENCES
[1]
[2]
[3]
Fig. 11
154
Proceedings of the National Conference on Communication Control and Energy System (NCCCES'11),
Vel Tech Dr. RR & Dr. SR Technical University, Chennai, TN. 29 - 30 August, 2011. pp.155-165.
Mr.K.Aanandha Saravanan
Assistant Professor
ECE department
Veltech University
INTRODUCTION
Mr.N.Vignesh Prasanna
Assistant Professor
ECE department
Veltech University
155
information, ARS detects link failures and/or generates QoSaware network reconfiguration plans upon detection of a link
failure.
ARS has been implemented and evaluated extensively via
experimentation on our multi-radio WMN test-bed as well as
via ns2-based simulation. Our evaluation results show that
ARS outperforms existing failure-recovery methods, such as
static or greedy channel assignments, and local re-routing.
First, ARSs planning algorithm effectively identifies
reconfiguration plans that maximally satisfy the applications
QoS demands, accommodating twice more flows than static
assignment. ARS has been implemented and evaluated
extensively via experimentation on our multi-radio WMN testbed as well as via ns2-based simulation. Our evaluation results
show that ARS outperforms existing failure-recovery methods,
such as static or greedy channel assignments, and local rerouting. First, ARSs planning algorithm effectively identifies
reconfiguration plans that maximally satisfy the applications
QoS demands, accommodating twice more flows than static
assignment. Next, ARS avoids the ripple effect via QoS-aware
reconfiguration planning, unlike the greedy approach. Third,
ARSs local reconfiguration improves network throughput and
channel-efficiency by more than 26% and 92%, respectively,
over the local re-routing scheme. The rest of this paper is
organized as follows. Section II describes the motivation
behind this work. Section III provides the design rationale and
algorithms of ARS. Section IV describes the implementation
and experimentation results on ARS. Section V shows in-depth
simulation results of ARS. Section VI concludes the paper.
II. MOTIVATION
We first describe the need for self-re configurable multiradio
WMNs (mr-WMNs). Next, we introduce the network model and
assumptions to be used in this paper. Finally, we discuss the autonomously change channel and radio assignments (i.e., selflimitations of existing approaches to achieving self reconfigurable) to recover from the channel-related link failures
reconfigurability of mr-WMNs.
mentioned above.
B. Network Model and Assumptions Multi-radio WMN:
A. Why is Self-Reconfigurability Necessary?
A network is assumed to consist of mesh nodes, IEEE
Maintaining the performance of WMNs in the face of 802.11-based wireless links, and one control gateway. Each
dynamic link failures remains a challenging problem [18]. mesh node is equipped with n radios, and each radios channel
However, such failures can be withstood (hence maintaining and link assignments are initially made (e.g., see Fig. 2) by
the required performance) by enabling mr-WMNs to using global channel/link assignment algorithms [5], [12], [13].
autonomously reconfigure channels and radio1 assignments, as Multiple orthogonal channels are assumed available. For
in the following examples.
example, an IEEE 802.11a/b/g combo PCMCIA card can tune
Recovering from link-quality degradation: The quality of 16 orthogonal channels. The interference among multiple
wireless links in WMNs can degrade (i.e., link-quality failure), radios in one node is assumed to be negligible via physical
due to severe interference from other co-located wireless separation among antennas or by using shields. The gateway is
networks [8], [19]. For example, Bluetooth, cordless phones, connected to the Internet via wire-line links as well as to other
and other co-existing wireless networks operating on the same mesh routers via wireless links.
or adjacent channels cause significant and varying degrees of QoS support: During its operation, each mesh node periodically
losses or collisions in packet transmissions, as shown in Fig. 1. sends its local channel usage and the quality information for all
By switching the tuned channel of a link to other interference- outgoing links via management messages to the control
free channels, local links can recover from such a link failure.
gateway. Then, based on this information, the gateway controls
Satisfying dynamic QoS demands: Links in some areas may the admission of requests for voice or video flows. For
not be able to accommodate increasing QoS demands from admitted flows, the information about QoS requirements is
end users (QoS failures),2 depending on spatial or temporal delivered to the corresponding nodes for resource reservation
locality [20]. For example, links around a conference room
through the RSVP protocol [22]. Next,
156
157
158
QoS-Satisfiability Evaluation:
Among a set of feasible plans F, ARS now needs to identify
QoS-satisfying reconfiguration plans by checking if the QoS
constraints are met under each plan. Although each feasible
plan ensures that a faulty link(s)
159
defines and uses the expected busy air-time ratio of each link
to check the links QoS satisfiability. Assuming that a links
bandwidth requirement (q) is given, the links busy air-time
ratio (BAR) can be defined as BAR = q C and must not exceed
1.0 (i.e., BAR < 1.0) for a link to satisfy its bandwidth
requirement. If multiple links share the air-time of one
channel, ARS calculates aggregate BAR (aBAR) of end-radios
of a link, which is defined as aBAR(k) = Pl L(k) ql Cl ,
where k is a radio ID, l a link associated with radio k, L(k) the
set of directed links within and across radio ks transmission
range.
Avoiding cascaded link failures: Besides the link change,
ARS needs to check whether neighboring links are affected by
local changes (i.e., cascaded link failures). To identify
Fig. 5. Busy Air-time Ratio (BAR) of a directed link: BAR (e.g., l1) is
affected by activities of neighboring links (l0, l2,and l3) in channel 1 and is
used to evaluate QoS satisfiability of a link.
such adverse effect from a plan, ARS also estimates the QoSsatisfiability of links one hop away from member nodes whose
links capacity can be affected by the plan. If these one-hopaway links still meet the QoS requirement, the effects of the
changes do not propagate thanks to spatial
reuse of channels.
Otherwise, the effects of local changes will propagate, causing
cascaded QoS failures.
Let us consider an example in Fig. 5. Assuming BAR of
each directed link ( i) is 0.2 (e.g., 2Mbps 10Mbps ) in a tuned
channel, aBAR of each radio tuned to channel 1 does not
exceed 1.0, satisfying each links QoS requirement. In
addition, assuming that BAR( 1) increases from 0.2 to 0.4
(
in Fig. 5. To accommodate this
increase,
1)
reconfiguration plans that have a detour path through node Q
do not affect the QoS-satisfiability of the neighboring nodes.
On the other hand,
plans with radio switches (e.g.,
R(L2,M1)1 2) satisfy the QoS of link MN but cause
aBAR(OR2) to exceed 1.0, resulting in cascaded QoS failures
of links beyond node .
Choosing the best plan:
ARS now has a set of reconfiguration plans that are QoSsatisfiable, and needs to choose a plan within the set for a
local network to have evenly distributed link capacity.
However, to incorporate the notion of fair share into the
planning, ARS needs to address the following challenges.
Quantifying the fairness of a plan: ARS has to quantify the
potential changes in link-capacity distribution from a plan. To
this end, ARS defines and uses a benefit function ( ) that
quantifies the improvement of channel utilization that the
reconfiguration plan
makes. Specifically, the benefit
160
network monitor in the device driver and maintains an up-todate link-state table; and (iv) routing table manager, through
which ARS obtains or updates states of a system routing table.
Next, ARS components in the device driver are
implemented in an open source MADWiFi device driver [33].
This driver is designed for Atheros chipset-based 802.11 NICs
[34] and allows for accessing various control and management
registers (e.g. longretry, txrate,) in the MAC layer, making
network monitoring accurate. The module in this driver
includes (i) network monitor, which efficiently monitors linkquality and is extensible to support as many multiple radios as
possible [31]; and (ii) NIC manager, which effectively
reconfigures NICs settings based on a reconfiguration plan
from the group organizer.
B. Experimental Setup
To valuate our implementation, we constructed a multi hop
wireless mesh network testbed on the fourth floor of the
Computer Science and Engineering (CSE) building at the
University of Michigan. The testbed consists of 17 mesh
nodes and has multiple (up to 5) links. Each node is
deliberately placed on either ceiling panels or high-level
shelves to send/receive strong signals to/from neighboring
nodes. On the other hand, each node will experience enough
multi-path fading effects from obstacles and interference from
co-existing public wireless networks.
As shown in Fig. 7(b), each mesh node is a small-size wireless
routerSoekris board 4826-50 [35] (Pentium-III 266 Mhz
CPU, 128 MB memory). This router is equipped with two
EMP IEEE 802.11 a/b/g miniPCI cards and 5-dBi gain indoor
omni-directional antennae. Each card operates at IEEE
802.11a frequency with a pseudo ad-hoc mode, and is set to
use fixed data rate and transmission power. Next, all nodes run
the Linux OS (kernel-2.6), a MADWiFi device driver (version
0.9.2) for wireless interfaces, and the ARS implementation. In
addition, ETX [23] and WCETT [6] routing metrics are
implemented for routing protocols. Finally, the Iperf
measurement tool [36] is used for measuring end-to-end
throughput, and the numbers are derived by averaging the
experimental results of 10 runs, unless otherwise specified.
C. Experimental Results:
We evaluated the improvements achieved by ARS, including
throughput and channel efficiency, QoS satisfiability, and
reduction of ripple effects.
1) Throughput and channel-efficiency gains: We first study
throughput and channel-efficiency gains via ARSs real-time
reconfiguration. We run one UDP flow at a maximum rate
over a randomly-chosen link in our testbed, while increasing
the level of interference every 10 seconds. We also set the
QoS requirement of every link to 6 Mbps, and measure the
flows throughput progression every 10 seconds during a 400second run. For the purpose of comparison, we also ran the
same scenario under the local re-routing with a WCETT
(Weighted Cumulative Expected Transmission Time) metric
[37], and static channel-assignment algorithms. Note that we
do not intentionally run a greedy algorithm in this single-hop
scenario, because its effect is subsumed by ARS. We,
however, compare it with ARS in multi-hop scenarios in
Section IV-C3.
Fig. 8(a) compares the progression of link throughput
achieved by the above three methods. ARS effectively
reconfigures the network on detection of a failure, achieving
450% and 25.6% more bandwidth than static-assignment and
local re-routing, respectively. ARS accurately detects a links
QoS-failure using link-quality monitoring information, and
161
Fig. 8.
Gains
in
throug
hput
and
chann
el
efficie
ncy:
ARS effectively reconfigures the network around a faulty link, improving
both network throughput and channel-efficiency by up to 26% and 92%,
respectively. By contrast, local re-routing causes degradation in channelefficiency due to the use of a detour path, and static channel-assignment does
not react to faults in a timely manner.
162
V.PERFORMANCE EVALUATION
We have also evaluated ARS in large-scale network
settings via simulation. We first describe our simulation
methodology, and then present the evaluation results on ARS.
A. The Simulation Model & Methods
Fig. 10. ARSs avoidance of ripple effects: ARS finds a local reconfiguration
plan that avoids the ripple effects by considering neighboring nodes channel
utilization, whereas the greedy channel-switching and local re-routing cannot
fully recover from the failure or cause additional QoS failures.
(4.8 Mbps). On the other hand, the flows via local re-routing
achieves 82% of the throughput (3.2 Mbps), because of the use of
detour paths (f5:5!4!3, f6:1!2!3). On the other hand, while
partially recovering from the original link failures, the greedy
approach causes throughput degradation of neighboring links.
This is because one local greedy channel-switching
163
Fig. 11. Satisfying varying QoS constraints: Fig. 11(a) shows requests with
different QoS requirements. Next, Fig. 11(b) shows improved (or changed)
network capability (i) before and (ii) after reconfiguration
can help
ARS
search for
reconfigur
ation plans.
addition, we calculate the capacity gain per change as the costeffectiveness of reconfiguration planning with different k
values.
Fig. 12 plots the available capacity of the faulty area after
Fig.
12.
The impact
of
reconfigur
ation
range: The
hop length
CONCLUSION
K.
Ramanchandran,
E.
Belding-Royer,
and
M.
Buddhikot,
Interferenceaware
channel assignment in multi-radio wireless mesh networks, in
Proceedings of IEEE InfoCom, Barcelona, Spain, Apr. 2006.
[6] R. Draves, J. Padhye, and B. Zill, Routing in multi-radio, multi-hop
wireless mesh networks, in Proceedings of ACM MobiCom, Philadelphia,
PA, Sept. 2004.
[7] P. Bahl, R. Chandra, and J. Dunagan, SSCH: Slotted seeded channel
hopping for capacity improvement in IEEE 802.11 ad-hoc wireless networks,
in Proceedings of ACM MobiCom, Philadelphia, PA, Sept.2004.
[8] D. Aguayo, J. Bicket, S. Biswas, G. Judd, and R. Morris, Linklevel measurements from an 802.11b mesh network, in Proceedings of
ACM SIGCOMM, Portland, OR, Aug. 2004.
[9] A. Akella, G. Judd, S. Seshan, and P. Steenkiste, Self-management
in chaotic wireless deployments, in Proceedings of ACM MobiCom,
Cologne, Germany, Sept. 2005.
[10] J. Zhao, H. Zheng, and G.-H. Yang, Distributed coordination in
dynamic
spectrum allocation networks, in Proceedings of IEEE DySPAN,
Baltimore, MD, Nov. 2005.
164
M.
Buddhikot,
P.
Kolodzy,
S.
Miller,
K.
Ryan,
and
J.
Evans,
165
Proceedings of the National Conference on Communication Control and Energy System (NCCCES'11),
Vel Tech Dr. RR & Dr. SR Technical University, Chennai, TN. 29 - 30 August, 2011. pp.166-167.
I. INTRODUCTION
Anonymizing networks route traffic through independent
nodes in separate administrative domains to hide a clients
IP address.
Unfortunately, some users have misused such networks
under the cover of anonymity, users have repeatedly
defaced popular Web sites . Web site administrators
cannot blacklist individual malicious users IP addresses,
they blacklist the entire anonymizing network. Such
measures eliminate malicious activity
through
anonymizing networks at the cost of denying anonymous
access to behaving users.
There are several solutions to this problem, each
providing some degree of accountability. In
pseudonymous credential users log into Web sites using
pseudonyms, which can be added to a blacklist if a user
misbehaves. Unfortunately, this approach results in
pseudonymity for all users, and weakens the anonymity
provided by the anonymizing network. Anonymous
credential systems employ group signatures. Basic group
signatures allow servers to revoke a misbehaving users
anonymity by complaining to a group manager. Servers
must query the group manager for every authentication,
and thus, lacks scalability. Traceable signatures allow the
group manager to release a trapdoor that allows all
signatures generated by a particular user to be traced;
166
[2]
A. Cryptographic Primitives
Secure cryptographic hash functions. These are one-way
and collision-resistant functions that resemble random
oracles.
[3]
167
Proceedings of the National Conference on Communication Control and Energy System (NCCCES'11),
Vel Tech Dr. RR & Dr. SR Technical University, Chennai, TN. 29 - 30 August, 2011. pp.168-172.
I. INTRODUCTION
As process technology scales into the nanometer region
[1], the exponential increase of power densities across
process generations results in higher die temperatures.
Such high temperatures, when left unmanaged, could
potentially affect the chips operation. They could also
result in its accelerated aging and reduce its operating
speed, lifetime and reliability. The reliability of the chip
reduces exponentially as the temperature increases [2].
The time to failure has been shown to be a function of
exp(Ea/kT)
(1)
168
(2)
idea about the gains one can expect due to floor planning
[9]. Since the cooling due to floor planning arises due to
lateral spreading of heat, we study the maximum level of
lateral heat spreading possible. This is done using the
HotSpot thermal model which models heat transfer
through an equivalent circuit made of thermal resistances
and capacitances corresponding to the package
characteristics and to the functional blocks of the floor
plan. In the terminology of the thermal model, maximum
heat spreading occurs when all the lateral thermal
resistances of the floor plan are shorted. This is equivalent
to averaging out the power densities of the individual
functional blocks. That is, instead of the default floor plan
and non-uniform power densities, we use a floor plan with
a single functional block that equals the size of the entire
chip and has a uniform power density equal to the average
power density of the default case. On the other extreme,
we also make the thermal resistances corresponding to the
lateral heat spreading to be equal to infinity. This gives us
an idea of the extent of temperature rise possible just due
to the insulation of lateral heat flow. This gives us an idea
of the extent of temperature rise possible just due to the
insulation of lateral heat flow.
(3)
Bench
bzip2
gcc
crafty
gzip
perlbk
mesa
Eon
art
Facerc
Twolf
Mgrid
swim
(4)
(5)
Where CA, CW, and CD are the weights of area, the wire
length, and the heat diffusion, respectively. CD has a
negative sign because the thermal diffusion D needs to be
maximized. Thus in this method, the temperature part of
the objective is a rough approximation. The thermal
aware floor planning tool developed in this project makes
use of HotSpot tool to approximate the temperature part
of the objective. Even algorithms like simulated annealing
and genetic algorithm [8] can be used to tackle the floor
planning problem.
IV. POTENTIAL IN LATERAL SPREADING
Before the description of the thermal-aware floor planner,
it is important to perform a potential study that gives an
Min
56
55
54
54
54
54
54
55
52
51
47
44
Norm
123
120
120
120
114
114
113
109
104
98
75
59
Max
222
220
217
215
201
203
201
188
183
168
126
84
169
Fig. 4. Shows the reverse vertical B*-tree of the vertical B*- tree
in (a).
170
171
[9]
10]
[11]
[12]
[13]
REFERENCES
[14]
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[15]
[16]
[17]
[18]
[19]
[20]
172
Proceedings of the National Conference on Communication Control and Energy System (NCCCES'11),
Vel Tech Dr. RR & Dr. SR Technical University, Chennai, TN. 29 - 30 August, 2011. pp.173-176.
I. INTRODUCTION
There is no doubt that our daily lives are significantly
affected by electronic engineering technology. This is true
on the domestic scene, in our professional disciplines, in
the workplace, and in leisure activities. The revolutionary
changes have taken in this field in a relatively short time
and it is also certain that even more dramatic advances
will be made in the next decade .Electronics as we know
it today is characterized by reliability, low power
dissipation, extremely low weight and volume, and low
cost with an ability to cope easily with a high degree of
sophistication and complexity. The integrated circuit has
made possible the design of powerful and flexible
processor which provide high intelligent and adaptable
devices for the user.
173
174
the linear driver model does not capture the fast di/dt
behavior and cannot produce the correct waveforms at the
driver outputs.
Fig. 4. A non-linear driver model results in a much faster ampup time and a waveform with a small ledge.
175
Fig. 5. All the signals switch from low to high, and only the
ninth signal keeps low. The pre-characterized driver PWL
waveform is plotted with the one from SPICE simulation for
accuracy comparison.
(a)Delay
(b) Noise
Fig. 6. The delay and noise waveform of the victim wire on M4
is compared with the ones from the full SPICE simulation.
REFERENCES
[1]
[2]
[3]
[4]
176
Proceedings of the National Conference on Communication Control and Energy System (NCCCES'11),
Vel Tech Dr. RR & Dr. SR Technical University, Chennai, TN. 29 - 30 August, 2011. pp.177-178.
Design and VLSI Implementation of High-Performance FaceDetection Engine for Mobile Applications
R.Ilakiya, PG(Electronics &Communication Engineering)
Vel Tech Technical University
Abstract--In this paper, we proposes a novel hardware
architecture of face-detection engine for mobile applications. We
II. BASIC ALGORITHMS
used MCT(Modified Census Transform) and Adaboost learning
A. MCT (Modified Census Transform)
technique as basic algorithms of face-detection engine.
We have designed, implemented and verified the hardware
MCT presents the structural information of the window
architecture of face-detection engine for high-performan ce
with the binary pattern {0, 1} moving the 3 3 window in an image
face etection and real-time processing. The face-detection chip
small enough to assume that lightness value is almost constant,
is developed by verifying and imple menting through FPGA
though the value is actually variable. This pattern contains
and ASIC. The developed ASIC chip has advantage in realinformation on the edges, contours, intersections, etc. MCT can be
time processing, low power consumption, high performance
defined with the equation below:
and low cost. So we expect this chip can be easily use d in
mobile applications.
(X) =
( I( X
Y), I ( ))
(1)
Y N'
I. INTRODUCTION
Here X represents a pixel in the image, the 3 3 windo w of
Face-detection systems carry out a major role in biometric
which X is the center is W(X); N is a set of pixels in W(X) and Y
authentication, which uses features of the face, iris, fingerprint,
represents nine pixels each in the windo w. In addition,
retina, etc. These systems are usually used in places requiring
I (Y
is
I (X
is)the average value of pixels in the window, and )
high security, such as government agencies, bank, and research
the brightness value of each pixel in the window. As a
institutes; it is also applied to two- or three-dimensional face
comparison function, () becomes 1 in the case of )
I(<X
Y), I (
detection in areas such as artificial intelligence and robots,
other cases are 0. As a set operator, connects binary patterns of
access control systems, cutting-edge digital cameras and
function, and then nine binary patterns are connected through
advanced vehicle systems. Recently, the face-detection
operations. As a result, a total of 511 structures can be produced, as
technology is being adopted in the mobile phone applications
theoretically not all nine-pixel values can be 1. Thus connected
because of the pros in easy installation, low-cost, nonbinary patterns are transformed into binary numbers, which are the
contacting method. Most of the existing face-detection engines
values of the pixels in MCT-transformed images.
in digital camera or mobile phone have been run by software.
However, the tendency is that the technology is being
developed to be run by hardware for improving the processing
speed. These days, the technology is to combine hardware
technique of face-detection and software technique of emotion,
feeling, physiognomy and fortune recognition.
Face detection performance is known to be highly
influenced b y variations in illumination. Especially in mobile
environment, the illuminatio n condition is dependent on the
surroundings (indoor and outdoor), time, and light reflection,
etc. The proposed face-detection method is designed to detect
in the variable illumination conditions through the MCT
techniques, which can reduce the effects of illumination by
extracting the structural information of objects. The proposed
face-detection engine also renders high performance face
detection rate by extracting highly reliable and optimized
learning data through the Adaboost learning algorithm.
177
Design and VLSI Implementation of High-Performance Face-Detection Engine for Mobile Applications
REFERENCE
[1] Paul Viola and Micha el J. Jones, obust real-time face detection In
International Journal of Computer Vision, pp. 137-154, 2004.
[2] Yoav Freund and Robert E. Schapire. "A decision-theoretic generalization of on-line learning and an application to boo sting" in Journal of
Computer and System Sciences, pp. 119-139, 1997.
FACE D E T E CT IO N R E SU L T
S ET)
Type Detection rate False-positives rate
[3] Bernhard Froba and Andreas Ernst, "Face d etection with the Modified
Census Transform", IEEE International Conference. On Automatic Face
and Gesture Recognition, pp. 91-96, Seoul, Korea, May. 2004.
[4] Georghiades, A. : Yale Face Database, Center for computational Vision
and Control at Yale Un iversity, http: //cvc.yale.edu /projects /yalefaces
/yalefa
178
Proceedings of the National Conference on Communication Control and Energy System (NCCCES'11),
Vel Tech Dr. RR & Dr. SR Technical University, Chennai, TN. 29 - 30 August, 2011. pp.179-184.
I. INTRODUCTION
Floating point numbers are one possible way of
representing real numbers in binary format; the IEEE 754
[1] standard presents two different floating point formats,
Binary interchange
format and Decimal interchange
format. Multiplying floating point numbers is a critical
requirement for DSP applications involving large
dynamic range. This paper focuses only on single
precision normalized binary interchange format. Fig. 1
shows the IEEE 754 single precision binary format
representation; it consists of a one bit sign (S), an eight bit
exponent (E), and a twenty three bit fraction (M or
Mantissa). An extra bit is added to the fraction to form
what is called the significand1. If the exponent is greater
than 0 and smaller than 255, and there is 1 in the MSB of
the significand then the number is said to be a normalized
number; in this case the real number is represented by (1)
-2
-3
-22
Significand is the mantissa with an extra MSB bit. This research has
been supported by Mentor Graphics.
179
III.
100000101
- 01111111
10000110
5.
Normalize the result so that there is a 1 just
before the radix point (decimal point). Moving the radix
point one place to the left increments the exponent by 1;
moving one place to the right decrements the exponent
by 1.
1 10000110 10.01011000 (before normalizing)
1 10000111 1.001011000 (normalized)
1 10000111 0010.
Bi
Difference(R)
Bo
0
1
0
1
0
0
0
0
0
0
1
1
0
1
1
0
0
0
1
0
()=SB
(4)
()=SB
(5)
Fig.
Table 1. 1-Bit Subtractor With The Input T = 1
S
Bi
Difference(R)
Bo
0
1
0
1
1
1
1
1
0
0
1
1
1
0
0
1
1
0
1
1
SB
181
In Fig. 7:
1. Partial product: aibj = ai and bj
2. HA: half adder
3. FA: full adder
D. Normalizer
The result of the significand multiplication (intermediate
product) must be normalized to have a leading 1 just to
the left of the decimal point (i.e. in the bit 46 in the
intermediate product). Since the inputs are normalized
numbers then the intermediate product has the leading one
at bit 46 or 47
1. If the leading one is at bit 46 (i.e. to the left of the
decimal point) then the intermediate product is already
a normalized number and no shift is needed.
2. If the leading one is at bit 47 then the intermediate
product is shifted to the right and the exponent is
incremented by 1.
(6)
182
Category
Comments
Underflow
Eresult = 0
Zero
Normalized
number
255 Eresult
Overflow
Cant be compensated
during
normalization
May turn to normalized
number during
normalization (by
adding 1 to it)
May result in overflow
during
normalization
Cant be compensated
Function Generators
CLB Slices
DFF
Max Frequency
Xilinx Core
765
266
241
221.484 MHz
ACKNOWLEDGMENT
Three pipelining stages mean that there is latency in the
output by three clocks. The synthesis tool retiming
option was used so that the synthesizer uses its
optimization logic to better place the pipelining registers
across the critical path.
[2]
[3]
183
[4]
[5]
[6]
184
Proceedings of the National Conference on Communication Control and Energy System (NCCCES'11),
Vel Tech Dr. RR & Dr. SR Technical University, Chennai, TN. 29 - 30 August, 2011. pp.185-187.
I. INTRODUCTION
A. Speech Recognition System Structure
A speech recognition system (SRS) is basically a pattern
recognition system dedicated to detect speech, or in other
words, to identify language words into a sound signal
achieved as input from the environment.
II. SECTION II
A. Signal Analysis Implementation
Signal analysis is responsible for signal sampling, its
conversion in a digital representation, and vector
quantization. At end, the speech signal will be replaced by
sequences of label-codes. ( figure 2)
SPEECH
SOUND
FS
SAMPLING RATE
WINDOWING
CODE
SEQUENCE
Fig. 1
185
b k {b } k M j jk ( ) = ; 1 j N e 1 .
for all N model states and M symbols used on VQ.
: Initial Probability Vector (I) . Concerning Hmm
From Figure 5 , This Vector Will Always be Defined as
[1 0 0 0 ..],
{V V V } 1 k M ,..., ,..., : set ofM symbols
O {O O } T = 1, ..., : observation sequence in the interval
[1,T]
IV. SECTION IV
A. Methodology
As can be seen in figure 8, the left side of the internal bus
comprises the Motorola 56002 microprocessor and is
responsible for executing the software part of the speech
recognition procedure (i.e., data acquisition and signal
processing). The right side of the internal bus is composed
by the Altera FPGA design kit, which is based on the
FPGAs MAX 7K128 [UP1BOARD] and FLEX 10K20
chips [FLEX10K]. This part implements the HMMs in a
dedicated hardware, and is responsible for the pattern
186
Words Obs.
Sequence
size
Total
[clk]
FPGABASED
Time
[ms]
Classic
Viterbi Time
[s]
2 66 5280 1.320 0.577
3 66 7920 1.980 0.917
4 66 10560 2.640 1.240
a) Signal Analysis
The signal analysis step is done by the Motorola 56002
EVM, with a 16 kHz sampling rate. The following tasks
are programmed with C and Motorola assembler
languages and stored into Motorola 56002 EVM.
Furthermore, we use 10 ms sample frames, with 2/3 frame
overlapping in windowing and LPC/Cepstral steps, in
order to avoid loosing samples during parameters
extraction. After running a short speech detector
algorithm (in order to discard silence segments in the
input), the signal analysis provides an observation
sequence to the pattern matching step.
b) Pattern Matching
The pattern matching to implement these structures as
shown in figures 6 and 7, uses two Altera FPGA chips:
MAX 7K128 and FLEX 10K20, placed into an Altera
development board. In addition, we use VHDL (VHSIC
Hardware
Description
Language)
[BERG1996]
[OTT1996] to describe the whole structure proposed:
using 6-state HMM and 128 vectors in the codebook. For
each state, there is a probability table relating each codelabel with the probability of occurrence in the input
CPU
8051
FPGA
Flex 10k
FPGA
Max 7000 S
Bus Control
Memory
DSP 56002
Processor
A/D Converter
Audio IN
PC
sequence for that state. Due to space limitations in the
FPGA, we use a memory module storage, controlled by a
8051 Intel
microcontroller, to store those probability tables and
provide those values during score computation. Such
tables plays therole of Matrix B in a HMM parameters,
187
Proceedings of the National Conference on Communication Control and Energy System (NCCCES'11),
Vel Tech Dr. RR & Dr. SR Technical University, Chennai, TN. 29 - 30 August, 2011. pp.188-191.
I.
INTRODUCTION
188
Data bits
12345678
Idle bit Start bit
Parity bit
Stop bit
R_S T A RT
RX D_ SY NC =1
R _ST O P
Data
RCNT16=1110 AND
RBITCNT=FRAMELEN
Receiver Transmitter
Figure 2. UART Module
R XD _S YN C =0
R_S AM P L E
R CNT16=1110 AND
RBITCNT/ =FRAMELEN
R _CE N T E R
RC NT 1 6=0 100
AND
R_WA IT
189
X M IT _CM D _P =1
RX D_ SY NC =1
X _ST OP
XCNT16=01110 AND
XBITCNT=FRAMELEN
X _S HIF T
XCNT16=01110 AND
XBITCNT/ =FRAMELEN
Figure 4.
X_S T A RT
X CN T 16= 011 11
X_ WAIT
Figure 5.
B. Receiver Simulation
During receiver simulation, the receiving sampling clock
freq uency generated by the baud rate generator is set to 153600
Hz, UART receiving baud rate is set to 9600bps. The input
sequence is: 00110110001, including the start bit 0, parity bit 0 and
1 stop bit. The received data is stored into the register rbuf.
190
C. Transmitter Simulation
During transmitter simulation, the sending clock frequency
generated by the baud rate generator is set to 153600 Hz, and
UART transmitting baud rate is set to 9600bps. Fig. 7 shows
the transmitter module simulation diagram. The simulation
report shows that this module uses 78 logic elements(<1%,
13 pins (4%), and meets timing requirement.
IV. CONCLUSION
Figure 7
191
Proceedings of the National Conference on Communication Control and Energy System (NCCCES'11),
Vel Tech Dr. RR & Dr. SR Technical University, Chennai, TN. 29 - 30 August, 2011. pp.192-194.
I. INTRODUCTION
Fuzzy logic has emerged as a profitable tool for the
controlling of complex industrial process,as well as for
household & entertainment electronics,diagnosis system
& other expert system.It is a superset of conventional
(Boolean)logic that has been extended to handle the
concept of partial truth(truth values between completely
true & completely false)Fuzzy logic was introduced by
Dr.Lofti zadeh of UC/Berkely in 1960s as a mean to
model the uncertainity of natural language, but only
recently its use has spread over a large range of
Engineering applications. Fuzzy logic attempt to simulate
human thought process, even in technical environments.
In doing so, the fuzzy logic approach allows the designer
to handle efficiently very complex closed-loop control
problems, reducing engineering time & cost.
Fuzzy logic is mainly used in industrial automation for
relatively slow process. Fuzzy controls supports nonlinear design techniques that are now being exploited in
motor control applications. An example includes the
192
.stator frequency
frequency speed (
is set
according to a pre-defined
constant law (block B),
so the motor flux is kept at its nominal value. Voltage and
frequency values are then input to the voltage source
inverter (block c).
Assuming that fast response is not required a linear
approximation of the induction motor steady state model
can be used. slip frequency is almost proportional to
torque and must be limited, setting(indirectly)a limit to
both peak torque and stator current.
IV. CONTROLLER DESIGN
193
Fig.5 shoes that the input speed error and error var are
obtained from
and
,after saturation and
normalization respectively through block P1 and block
P3.the slip_Inc value is normalized through block P4 and
then added to its previous value to give, after saturation,
the slip value, which is the motor slip control output.
Table 2. Simulation Speed Response Performance - J = 10.10
2
kg.m2
V. SIMULATION RESULTS
The computational simulations compare the behavior of
PI and fuzzy logic controllers, showing their speed and
slip values during motor starts-up and then in response to
a sudden load change from zero to nominal motor torque
value.
First simulations were performed with the motor-load
inertia value for which the PI controller parameters were
optimized, which is the same value of the experimental
194
Proceedings of the National Conference on Communication Control and Energy System (NCCCES'11),
Vel Tech Dr. RR & Dr. SR Technical University, Chennai, TN. 29 - 30 August, 2011. pp.195-198.
I. INTRODUCTION
In the process of re-entry, High speed vehicle is a kind of
fast time-varying parameters within a wide range, strong
non-linear complexity object. Mach number and angle of
attack change large range and are subject to external
disturbances. The traditional PID control is often difficult
to obtain satisfactory control performance. At present, the
universal application is robust control, adaptive control
and sliding-mode control, etc[1][2], which not only increase
the complexity of the controller design but also there is no
relevant analysis for the parameters of the stability of the
high speed vehicle.
(1)
Where,
(2)
Design and Implementation of High Performance Optimal PID Controller for Fast Mode Control System
(3)
Where, G s the filter and Gc is the Oustaloup filter:
(4)
G is as follows:
(5)
In which the parameters are determined by the optimal
algorithm. In order to improve the approximation
accuracy of the amplitude- frequency and phasefrequency in frequency bands, take the error between
amplitude -frequency and phase frequency of the
fractional calculus approximation algorithm and the actual
amplitude -frequency and phase-frequency as the
optimization performance index. That is,
(6)
Where, M1 , P1 represent the actual amplitude frequency
and phase frequency.M2, P2 represent the amplitudefrequency of the approximation algorithm. is the
adjustment factor, and it can adjust the weight of the
amplitude frequency and phase frequency.
Generally take = 0.3.Make the J to a minimum to
determine parameters of the filter G through the
optimization.
(8)
196
(9)
vehicle are
(10)
The characteristics polynomial is:
(11)
Theorem : Set the stability domain of the Mach number
and angle of attack S, when K = (Ma,)S,the stability
condition of the control system is that characteristic roots
are in the left-hand of the s plane. The boundaries of the
stability domain S which are described by real root
boundary (RRB), infinite root boundary (IRB) and
complex root boundary (CRB) can be determined by the
D-decomposition method:
RRB : P(0:K) = 0
IRB: P(;K)
CRB:P(
(12)
0
(13)
From the figure we can see that the stability region first
decreases and then increases as the increases. Changes
are apparent when [5 ,30]. The stability domain of
traditional PID is minimum and the fractional order PID
expands the stability domain. Illustrate the Fractional
order PID is not sensitive to changes in system parameters
than the traditional PID. And the application is broader.
Therefore, should take fractional-order, and take a
smaller value.
Finally determine the value of by the combination of
ITAE index.
B. The Impact on the Stability Region Caused by
Take = 1 , and = 0 0.2 0.4 0.6 0.8 1. The stability
domains of the high speed vehicle are shown in Figure 4.
is the
From the figure we can see that the stability region first
decreases and then increases as increases. The range of
stable region is smaller than the traditional PID when is
smaller. The stable region will remain when is 0.6 0.8
and the range of stable region is bigger than the traditional
PID. Therefore should take a larger value. Finally
determine the value of by the combination of ITAE
index or take = 1 to simple the fractional PID design
197
Design and Implementation of High Performance Optimal PID Controller for Fast Mode Control System
[2]
[3]
[4]
[5]
[6]
Fig. 6. Simulation results of attack
[7]
198
Proceedings of the National Conference on Communication Control and Energy System (NCCCES'11),
Vel Tech Dr. RR & Dr. SR Technical University, Chennai, TN. 29 - 30 August, 2011. pp.199-204.
I. INTRODUCTION
To convert wind power into electricity, many types of
generator concepts have been used and proposed. Most of
the low-speed wind turbine generators presented is
permanent-magnet (PM) machines. These have the
advantages of high power density, high efficiency and
reliability since there is no need of external excitation and
conductor losses are removed from the rotor.
Wind energy conversion (WEC) conventional systems
with gearbox have been more and more replaced by WEC
systems without gearbox, since the WEC systems with
gearbox are subject to vibration, noise and fatigue. Directdrive generators must have a large number of poles, since
rotational speed of the wind turbine is very low.
Generators with a large number of poles are easily
achieved using permanent magnets in synchronous
generator.
Design of Axial Flux Permanent MAGNET Synchronous Generator for Wind Power Generation
Bgo =
Br
2gr
1+
Lm
(4)
(5)
2
B g1 m k w N ph Dav L i
2
(1)
2
B g1 Acm k w D av
Li
4
(2)
B m = 0 rH m + B r
(3)
200
Ac =
3 2I2N ph
D av
(6)
Symbol
Do
Di
Lya
2p
q.
Nph
g.
Lm
Wtbi
Wti
Db
dt1
dt2
Ds
Designed Value
215 mm
85 mm
30 mm
12
1
372
1.5 mm
4 mm
3mm
6.5 mm
19 mm
1.5 mm
1.5mm
22 mm
A. FEA Model
Flux linkage
3
Flux linkage in wb
2
1
0
-1 0
Y
100
200
300
400
500
-2
-3
-4
angle in e le c de g
Induced emf
150
100
50
R
B
0
-50
50
100
150
200
250
300
350
400
450
-100
-150
angle in elec deg
flux linkage in wb
0.6
0.4
0.2
R
Y
0
-0.2
10
20
30
40
50
-0.4
-0.6
Time in ms
INDUCED EMF
INDUCED EMF IN V
200
150
100
50
0
-50 0
B
20
40
60
80
100
-100
-150
-200
TIME IN ms
201
120
Design of Axial Flux Permanent MAGNET Synchronous Generator for Wind Power Generation
Current in A
3
2
1
-1 0
0
20
40
60
80
100
120
-2
-3
-4
time in ms
flux linkage
0.8
flux linkage in wb
0.6
0.4
0.2
r
y
0
-0.2 0
200
400
600
800
1000
-0.4
-0.6
-0.8
electrical angle
induced EMF
200
induced EMF in V
150
100
50
0
-50 0
R
Y
100
200
300
400
500
600
700
800
900
-100
-150
-200
Electrical angle
Fig. 11. Flux linkage and EMF waveform for Fractional slot
winding
202
C p = C T
(10)
When Cp=0.593(Betz
A typical Cp
curve is shown in Fig.15.
This
characteristic defines Cp as a function of the
tip-speed
ratio (TSR) given by equation(11).
(11)
= r R / V
where R is the radius of the wind turbine rotor.
1
Pa = AV 3
2
(7)
(8)
T
Tmax
(9)
203
Design of Axial Flux Permanent MAGNET Synchronous Generator for Wind Power Generation
VII. CONCLUSION
This paper presents the basic analytical design of a small
axial flux permanent magnet wind generator and the 3D
static and transient FEA analysis. Flux distribution, EMF
induced and its harmonic spectrum in AFPMSG are
obtained and analyzed. It also proves that there is a
significant reduction in cogging torque by optimizing the
basic design by applying skewing, fractional slot winding
and different pole arc to pole pitch ratio. This design
could be implemented practically and performance may
be verified with results obtained.
Appendix I. Specification of AFPMSG model
Parameter
Output kVA, Q
Rated speed of the machine
Nph
Frequency f
Phase voltages Eph
No of pole p
Average flux density Bav
Ampere conductors ac
Specifications
1 KVA
500 rpm
50HZ
110 volt
12
0.608
20000
REFERENCES
[1]
[2]
[3]
Fig. 17. Cogging torque for 75% and 65% pole arc to pole pitch
ratio
[4]
[5]
[6]
[7]
[8]
204
Proceedings of the National Conference on Communication Control and Energy System (NCCCES'11),
Vel Tech Dr. RR & Dr. SR Technical University, Chennai, TN. 29 - 30 August, 2011. pp.205-208.
I. INTRODUCTION
The technology and performance of high-brightness light
emitting diodes (HB LEDs) has undergone significant
improvements driven by new applications in liquid-crystal
display (LCD) backlighting, automobiles, traffic lights,
and general-purpose lighting. As a solid state light source
which does not contain mercury, HB LEDs have been
widely accepted because of their superior longevity, low
maintenance requirements, and continuously-improving
luminance, and they have great potential to replace
existing lighting sources such as incandescent lamps and
fluorescent lamps in the future.
Another active PFC implementation employs a single
stage ac/dc converter, where the PFC stage is integrated
with the dc/dc stage, resulting in a reduced complexity
and cost. There are two embodiments of the single-stage
PFC ac/dc converters: without and with a bulk capacitor
at the primary side, as illustrated in Figs. 2 and 3,
respectively. Although the fly back single-stage PFC
circuit in Fig. 2 has the advantage of a low component
count, its output voltage has a high ripple at twice the line
frequency unless very large output capacitors are used.
For an LED load, a small change in the driving voltage
results in an increase of the LED current by orders of
magnitude. Therefore, with this approach, a post-regulator
is often required, which adds cost and lowers the
efficiency.
The fly back single-stage PFC topology shown in Fig. 3
presents one of the most cost-effective single-stage
solutions. In this converter, the PFC stage operates in
205
and low THD can be achieved such that the line current
harmonics meet the limits set by the IEC 61000-3-2 Class
C standard, with a relatively high efficiency, if the line
voltage range is limited to either the universal low-voltage
(90 -140 V AC) or high voltage range (180 - 276 V AC).
(2)
Magnetizing current iM can be expressed as
(3)
(4)
It can be seen from (4) that during the off time, secondary
current is composed of two components, namely, the
reflected magnetizing current and the reflected primary
current which draws energy directly from the input line.
Generally, direct energy transfer from the line to the
output improves the conversion efficiency.
4) Mode (d): Switch Q1 is turned off and inductor current
iLB reaches zero at t = T3. Energy stored in the
transformer continues to be released to the secondary
side.
5) Mode (e): Switch Q1 remains turned off and secondary
current is falls to zero at t = T4. Capacitor COSS and
magnetizing inductance LM forms a series resonant
circuit. During the resonance switch voltage decreases
and reaches a minimum of (VB -nVO), and the switch is
turned on again at this moment (t = T5), achieving partial
zero-voltage switching.
(1)
It can be seen that during the on-time of switch Q1,
energy from two sources is stored in the fly back
transformer. Namely, part of the magnetizing energy is
supplied from the bulk capacitor, whereas part of the
energy is supplied directly from the line. Generally, direct
energy storage from the line improves the conversion
efficiency.
2) Mode (b): Switch Q1 is turned off at t = T1.
Magnetizing current iM continues to increase, and output
capacitor COSS of switch Q1 is charged by the sum of
206
V. CONCLUSION
A single-stage fly back power-factor-correction front-end
for HB LED applicationis presented in this paper. With
the integration of the PFC stage and dc/dc stage,
significant reduction of component count, size, and cost
can be achieved. Theoretical results obtained show that at
VIN = 110 V AC, VO = 24 V, and IO = 3.25 A, the
proposed PFC front-end for LED driver has achieved an
efficiency of around 87.50%, a power factor of 0.98 and a
total harmonic distortion (THD) of 14% for the line
current with harmonic contents meeting IEC 61000-3-2
Class C standard. Experimental results have also been
obtained at high line when the inductance of the input
current shaping inductor is increased. Measured output
voltage ripple with an actual LED load at VO = 24 V, IO
= 3.8 A is less than 20 mV. Therefore, LED strings can be
directly driven without a post regulator, improving the
efficiency, lowering the cost, and reducing the size.
REFERENCES
[1]
[2]
[3]
208
Proceedings of the National Conference on Communication Control and Energy System (NCCCES'11),
Vel Tech Dr. RR & Dr. SR Technical University, Chennai, TN. 29 - 30 August, 2011. pp.209-212.
I. INTRODUCTION
One of the major issue in power system is the losses
occurs during the transmission and distribution of
electrical power. As the demand increases day by day, the
power generation increases and the power loss is also
increased. The major amount of power loss occurs during
transmission and distribution. The percentage of loss of
power during transmission and distribution is
approximated as 26%. The main reason for power loss
during transmission and distribution is the resistance of
wires used for grid. The efficiency of power transmission
can be improved to certain level by using high strength
composite over head conductors and underground cables
that use high temperature super conductor. But, the
transmission is still inefficient. According to the World
Resources Institute (WRI), Indias electricity grid has the
highest transmission and distribution losses in the world
a whopping 27%. Numbers published by various Indian
government agencies put that number at 30%, 40% and
greater than 40%. This is attributed to technical losses
(grids inefficiencies) and theft . Any problem can be
solved by stateof-the-art technology. The above
discussed problem can be solved by choose an alternative
option for power transmission which could provide much
higher efficiency, low Transmission cost and avoid
power theft. Microwave Power Transmission is one of the
promising technologies and may be the righteous
alternative for efficient
II. HOW WIRELESS ENERGY COULD WORK
Resonance, a phenomenon that causes an object to vibrate
when energy of a certain frequency is applied. Two
Fig. 1
209
B. Transmitting Antenna
210
Fig. 4
B. Disadvantages
The Capital Cost for practical implementation of WPT
seems to be very high and the other disadvantage of the
211
Fig. 5
Fig. 7
Fig. 6
[1]
IX. CONCLUSION
The concept of Microwave Power transmission (MPT)
and Wireless Power Transmission system is presented.
The technological developments in Wireless Power
Transmission (WPT). The advantages, disadvantages,
biological impacts and applications of WPT and
experimentally demonstrated the efficient of
non
radiative power transfer over distances up to 8 times the
[2]
[3]
[4]
[5]
212
http://cleantechindia.wordpress.com/2008/07/16/
indiaselectricity-transmission-and-distribution-losses/
www.sciencemag.org
Nikola Tesla, The Transmission of Electrical Energy
Without Wires as a Means for Furthering Peace,
Electrical World and Engineer. Jan. 7, p. 21, 1905
http://www.fullinterview.com
"Goodbye
wires".
MIT
News.
2007-06-07.
http://web.mit.edu/newsoffice/2007/wireless-0607.html
Proceedings of the National Conference on Communication Control and Energy System (NCCCES'11),
Vel Tech Dr. RR & Dr. SR Technical University, Chennai, TN. 29 - 30 August, 2011. pp.213-218.
I. INTRODUCTION
The UPFC can be used for power flow control, loop flow
control and load sharing among parallel corridors, voltage
regulation, enhancement of transient stability and
mitigation of system oscillations.The steady state models
of the UPFC treat the UPFC either as one series voltage
source and one shunt current source model or two voltage
source model. Mainly this focuses on the development of
steady state UPFC model and its implementation into a
power flow algorithm. Firstly, power injection
transformation of a two-voltage source UPFC model is
derived in rectangular form the power flow equations are
quadratic. Certain degree of numerical advantages can be
obtained from the form. The rectangular form also leads
naturally to the idea of an optimal multiplier. After
detailed considerations of issues in implementation of
UPFC in power flow by various power flow algorithms
adopted. Here the sending end of the UPFC is
transformed into a PQ bus, whilst the receiving end is
transformed into a PV bus and a standard Newton
Raphson load flow is carried out. Moreover, since the
UPFC parameters are computed after the load flow has
converged, there is no way of knowing during the
iterative process whether or not the UPFC parameters are
within limits. This has provided the motivation for
developing from first principles a new UPFC model
213
f1
Y1 f1 (x10 ,------x n 0 ) x1
0
0
Y
f
(x
,------x
)
2 2 1
f 2
n
= x
0
0
Yn f n (x1 ,------x n ) fn
x1
f1
f
0
1 x 1
x2
x n
x 2 0
f 2
f2
x2
x n
f n
fn
x n 0
x2
x n
B=J*C
Here J is the first derivative matrix known as the jacobian
matrix.
P J1 ..J 2 e
Q = J ..J f
2 4
B. UPFC Mathematical Modelling
To formulate UPFC, the power injected model introduced
Vse = rVs e j
Where 0<=r<=rmax and 0<= <=2
IV. FUZZY LOGIC CONTROLLER
In this, parameter adjustment, namely control vector
update is through the use of fuzzy logic. The adjustment
procedure is illustrated schematically in fig.6
W = Wspecified - WCalculated
Fig. 10
This showcases the simulation results using MATLAB
package for the considered four case studies. In each case
UPFC is installed in specified line for power flow control.
All these case studies are followed by plotting of active
and reactive power differences against number of
iterations.
VI. CASE-1. POWER FLOW CONTROL IN LINE 1-3
Table 1. Bus Data before Installation of UPFC
Bus
No
Voltage
Mag
(p.u)
Phase
angle
Deg
1.060
0.000
1.021
-8.017
Load
MW
MVAR
GENERATOR
MW
MVAR
0.000 0.000 261.278
16.979
2.400 1.200 0.000
0.000
Line flow
MW MVAR
83.361
5.201
Line losses
MW
MVAR
2.818
7.126
= 88 MW
1.060
1.016
Phase
angle
Deg
0.000
-8.458
Load
Generator
MW MVAR MW
MVAR
0.000
2.400
0.000
1.200
261.278 -16.979
0.000
0.000
Line
From
to
1
3
Line flow
MW MVAR
87.999
7.997
Line losses
MW
MVAR
3.158
216
8.542
=10.199995 MW
Line
From to
4
12
Voltage
Mag(p.u)
6
10
1.012
1.040
Load
MW
MVAR
0.00 0.00
5.80 2.00
Line
to
10
Line flow
MW MVAR
16.233 1.547
= 53 MW
Generator
MW
MVAR
0.00 0.00
0.00 0.00
Line losses
MW
MVAR
0.00
4.917
= -9.376171 MW
Phase
angle
Deg
-11.405
-16.171
Line flow
MW MVAR
45.010 15.547
Line losses
MW
MVAR
0.000
1.355
1.006
1.063
Phase
angle
Deg
-10.595
-17.390
Load
MW MVAR
7.600
11.200
1.600
7.500
Generator
MW
MVAR
0.00 0.00
0.00 0.00
= 18MW
Line flow
MW MVAR
53.003
Line losses
MW
MVAR
10.003
0.00
6.396
Voltage Phase
angle
Mag
(p.u)
Deg
1.011 -11.578
1.038 -16.880
Load
MW
MVAR
0.00 0.00
5.80 2.00
Generator
MW
MVAR
0.00
0.00
0.00
0.00
Line flow
MW MVAR
17.999
2.006
= -11.740193MW
=-7.287912 MW
Line losses
MW
MVAR
0.000
1.674
Bus. No
Voltage
Mag(p.u)
15
23
1.033
1.019
Phase
angle
Deg
-16.411
-16.773
Load
Generator
MW
MW
MVAR
MVAR
8.20 2.500 0.00 0.00
3.20 1.600 0.00 0.00
=4.058937MW
Line
From
15
1.013
1.055
Phase
angle
Deg
-9.678
-15.445
Load
MW
MVAR
7.60 1.60
11.20 7.50
to
23
Line flow
MW MVAR
5.631 4.721
Line losses
MW
MVAR
0.051
0.102
= 12MW
Generator
MW
MVAR
0.00
0.00
0.00
0.00
217
Voltage
Mag(p.u)
15
23
1.015
0.987
Phase
angle
Deg
-16.045
-16.974
Load
MW
MVAR
8.20 2.50
3.20 1.60
Generator
MW
MVAR
0.00 0.00
0.00 0.00
REFERENCES
[1]
to
23
Line flow
MW MVAR
12.004 8.00
Line losses
MW
MVAR
0.202
0.408
=8.666033MW
218
Proceedings of the National Conference on Communication Control and Energy System (NCCCES'11),
Vel Tech Dr. RR & Dr. SR Technical University, Chennai, TN. 29 - 30 August, 2011. pp.219-222.
I. INTRODUCTION
The human hand has a complex anatomical
structureconsisting of many connected parts and joints,
involvingcomplex relations between them providing a
total of roughly27 degrees of freedom (DOFs) [2]. User
Interface development requires a sound understanding of
human hands anatomical structure in order to determine
what kind of postures and gestures are comfortable to
make. Although handpostures and gestures are often
considered identical, the distinctions between them need
to be cleared. Hand posture is a static hand pose without
involvement of movements. Forexample, making a fist
and holding it in a certain position is a hand posture.
Whereas, a hand gesture is defined as a dynamic
movement referring to a sequence of hand postures
connected by continuous motions over a short time span,
such as waving good-bye. With this composite property
of hand gestures, theproblem of gesture recognition can
be decoupled into twolevels- the low level hand posture
detection and the high levelhand gesture recognition.In
vision based hand gesture recognition system,
themovement of the hand is recorded by video camera(s).
Thisinput video is decomposed into a set of features
takingindividual frames into account. Some form of
filtering may also be performed on the frames to remove
the unnecessarydata, and highlight necessary components.
For example, thehands are isolated from other body parts
as well as otherbackground objects. The isolated hands
are recognized fordifferent postures. Since, gestures are
nothing but a sequenceof hand postures connected by
219
220
221
[2]
[3]
[4]
[5]
222
Proceedings of the National Conference on Communication Control and Energy System (NCCCES'11),
Vel Tech Dr. RR & Dr. SR Technical University, Chennai, TN. 29 - 30 August, 2011. pp.223-227.
I. INTRODUCTION
1)
A microprocessor- based intelligent control
device for streetlight control applying fuzzy decision
theory to distinguish various interferences accurately and
to make it operate reliably, which can turn on or off the
transformer automatically according to environmental
light [7].
223
Fig. 7
224
A. SISO
We assume that the input to the system is the
environmental light x1. We further assume that the
environmental light can be Big, Medium, and Small. The
output DN can range between 0 and 63 and is divided into
Small, Medium, and Big. Figure 9 shows the fuzzy sets
describing the above. Labels for the membership
functions are given in Table 1. The rules base, with its
rules, is in Table 2.
Fig. 9. Fuzzy sets showing the input and the output of the SISO
system
For k = 1, 2, , n
(1)
Environmental light x1
225
Output Control DN
Fig. 11. Fuzzy sets showing the inputs and the output of the
DISO system
Table 3. Labels for the membership functions in the DISO
system
Fig. 13. The result of the simulation of the DISO system using
surface viewer of MATLAB fuzzy logic toolbox
226
REFERENCES
[1]
[2]
[3]
Fig. 16. Front panel and block diagram in LabVIEW
[4]
[5]
[6]
1) Low cost.
[7]
227
Proceedings of the National Conference on Communication Control and Energy System (NCCCES'11),
Vel Tech Dr. RR & Dr. SR Technical University, Chennai, TN. 29 - 30 August, 2011. pp.228-232.
I. INTRODUCTION
Driven by the rapid growth of the Internet,
communication technologies, pervasive computing,
automobiles, airplanes, wireless and portable consumer
electronics, Embedded Systems and Systems-on-Chip
(SoC) have moved from a craft to an emerging and very
promising discipline in todays electronic industry.
Testing of a fabricated very large scale integrated
embedded systems and system-on-chip is a process that
applies a sequence of inputs to the circuit and analyzes the
circuits output sequence to ascertain weather it functions
correctly. As the chip density grows to beyond millions of
gates, testing becomes a formidable task. Vast amounts of
time and money have been invested by the semiconductor
industry just to ensure the high testability of products. A
number of semiconductor companies estimate that about
7% to 10% of the total cost is spent in single device
testing [17]. This figure can rise to as high as 20% to 30%
if the cost of in-circuit testing and broad-level testing is
added. However, the most important cost can be the loss
in time-to-market due to hard-to-detect faults. Recent
studies show that a six-month delay in time-to-market can
cut profits by 34% [17]. Thus, testing can pose serious
problems in embedded system and systems-on-chip
designs.
Part of reason testing cost so much is the traditional
separation of design and testing. Testing is often viewed
inaccurately as a process that should start only after the
228
229
230
231
[2]
[3]
[4]
232
Proceedings of the National Conference on Communication Control and Energy System (NCCCES'11),
Vel Tech Dr. RR & Dr. SR Technical University, Chennai, TN. 29 - 30 August, 2011. pp.233-238.
I. INTRODUCTION
MEMS technology can be implemented using a number
of different materials and manufacturing techniques; the
choice of which will depend on the device being created
and the market sector in which it has to operate.
II. MATERIALS FOR MEMS MANUFACTURING
1. Silicon
B. Surface Micromachining
Surface micromachining uses layers deposited on the
surface of a substrate as the structural materials, rather
than using the substrate itself.
2. Polymers
3. Metals
III. MEMS BASIC PROCESSES
1. Deposition processes
2. Physical deposition
3. Chemical deposition
4. Patterning
5. Lithography
6. Etching processes
233
B. Diagonising
234
Fig. 3. The soft contact lens like sensor, with its MEMS antenna
(golden rings), its MEMS sensor (silver ring close to the outer
edge), and microprocessor.
B. MEMS Microphones
Fig. 5. 3D model of DLP mirror
236
VIII. CONCLUSION
C. Cardio MEMS
237
by
automotive
pressure
sensors
and
airbag
accelerometers, and new products, such as miniaturized
guidance systems for military applications and wireless
tire pressure sensors. Much of the growth in MEMS
business is expected to come from products that are in
early stages of development or yet to be invented. Some
of these devices include disposable chips for performing
assays on blood and tissue samples, which are now
performed in hospital laboratories, integrated optical
switching and processing chips, and various RF
communication and remote sensing products.
[4]
[5]
[6]
238
Proceedings of the National Conference on Communication Control and Energy System (NCCCES'11),
Vel Tech Dr. RR & Dr. SR Technical University, Chennai, TN. 29 - 30 August, 2011. pp.239-242.
I. INTRODUCTION
Together with speed and cost, energy consumption is now
a primary performance metric for battery-operated
embedded systems. A well-designed embedded system
should be globally optimized to the target application,
from user interface right through to device technology.
This kind of global optimization over many layers of
software and hardware is challenging, due to the need for
extensive inter-disciplinary collaborations. Energy
estimation is a routine job in low-level hardware design.
Unfortunately, at this stage, the specific application of
most hardware components is not known, and designers
cannot perform an application-specific optimization.
Another opportunity for optimization is given to software
and system designers; but they are often unfamiliar with
hardware-related energy issues. This problem is
compounded because traditional energy estimation tools
like SPICE and Power Mill [1] are designed for use by
low level hardware engineers, which can discourage
designers working at a higher level to attempt global
optimization.
With the increasing trend towards low-power design, a
higher-fidelity,
system-level
energy
estimation
239
Characterization 1
Characterization 2
Characterization 3
Linear mode
Non linear model
Including restarting
cost
G = cS
G = cS+I
G = cS+I +nR
All the three characterization schemes are useful for highlevel petrol consumption estimation. Of course,
Characterization 3 is more accurate than Characterization
2, and Characterization 2 is better than Characterization 1.
However, if a vehicle stops only a few minutes and the
engine is never turned off during the entire trip, all the
characterization schemes may show similar accuracy.
Now, suppose we need to devise petrol consumption
saving scheme that is useful when a vehicle temporary
stops at a parking space. Characterization 1 shows that the
vehicle does not consume any petrol when the speed is
zero, i.e. the vehicle stops. Thus, there is even no need to
devise such a petrol consumption saving technique.
Characterization 2 shows that I is still consumed while
the vehicle stops. Thus, the best way to save petrol
consumption from Characterization 2 is turning off the
engine whenever the vehicle stops even for just a second.
Characterization 3 considers the engine restarting cost,
and thus we better keep the engine running during a short
stop, which is a practical solution while previous ones are
not applicable to real situation. Consequently, for the
derivation of a power saving policy, we must be
extremely careful in abstraction of low-level behaviors
even for high-level approaches, unlike in case of highlevel power estimation.
is a finite input
240
E=
It is not easy to determine the exact time that delimits the
period for the dynamic energy, i.e., VC1(i++). Improper
division into dynamic and static energy may cause severe
errors if there are major changes in clock frequency. To
avoid this, we have to measure the cycle-accurate energy
at various clock frequencies. We need to cross-check the
dynamic energy values measured at different clock
frequencies and thus confirm the dynamic energy values
[10].
VI. PROPOSE HARDWARE DESIGN
The embedded hardware has a central processing unit
which performs ALU operation. An internal bus for data
communication with memory device and to store the
output bit in latch D flip-flop. The power requirement of
the unit can be calculate and required power can be
delivered to the unit require in operation. Whenever an
241
VII. CONCLUSION
We come to conclusion that the energy requirement
module will measure the energy requirement of the
module and that energy will use for switching a transistor
which will activate the module for require duration of
time and will remain idle in other time. This will optimize
the power usage of embedded system. System
components are modeled as finite-state machines,
associating transitions with dynamic energy and states
with leakage power. The superior modeling ability of the
energy state machine enables precise energy estimation
while providing a fast and user-friendly environment for
system designers who are not familiar with device
technologies. The series of energy measurement and
estimation tools are easy and free energy exploration
environment which encourages users without detailed
knowledge to perform a system-level energy
optimization.
REFERENCE
[1]
242
Proceedings of the National Conference on Communication Control and Energy System (NCCCES'11),
Vel Tech Dr. RR & Dr. SR Technical University, Chennai, TN. 29 - 30 August, 2011. pp.243-247.
I. INTRODUCTION
Automation control systems form the basis for significant
pieces of our nations critical infrastructure. Time-critical
and safety-critical automation systems are at the heart of
essential infrastructures such as oil refineries, automated
factories, logis-tics and power generation systems.
Discrete and process control represent an important
domain for real-time embeddedsystems with over a
trillion dollars in installed systems and $90 billion in
projected revenues for 2008 .
In order to meet the reliability requirements, automation
sys-tems are traditionally severely constrained along three
dimen-sions, namely, operating resources, scalability of
interconnected systems and flexibility to mode changes.
Oil refineries, for example, are built to operate without
interruption for over 25 years and can never be shutdown
for preventive maintenance or up-grades.
243
B. Research Challenges
While there has been considerable research in the general
area of wireless sensor networks, a majority of the work
has been on open-loop and non-real time monitoring
application. As we extend the existing programming
paradigm to closed-loop control applications with tight
timeliness and safety re-quirements, we identify five
primary challenges with the design, analysis and
deployment of extending such networks:
1. Programming motes in the event-triggered paradigm
is tedious for control networks. It is hard to provide
any ana-lytical bounds on the response time, stability
and timeliness of tasks in an event-driven regime [3,
4]. Real-time tasks are time-triggered while sensor
inputs are event-triggered. It is generally easier to
incorporate sporadic tasks in a time-triggered regime
than vice versa.
244
245
A. EVM Architecture
We now consider the design of the EVM within the nanoRK RTOS framework. The EVM describes its own
instruction set for efficient control, task and fault
management between nodes. As with Mate, the EVM is
based on a FORTH-like interpreter. The interpreter runs
within nano-RK as a super task. However, unlike Mate,
the EVMs instruction set is extensible at runtime.
Furthermore, EVM instructions are focused on node-tonode communication and control rather than PC-to-node
control. We describe two main architectural components
within the EVM
Figure 3. nano-RK sensor RTOS with interfaces to the
EVM. EVM includes parametric and programmable
control algorithms for runtime logical-task to physicalnode mapping.
EVM node-specific operations and object transfers for
efficient node-to-node communication.
246
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
247
Proceedings of the National Conference on Communication Control and Energy System (NCCCES'11),
Vel Tech Dr. RR & Dr. SR Technical University, Chennai, TN. 29 - 30 August, 2011. pp.248-251.
I. INTRODUCTION
With
the
rapid
development
of
national
economy,automobiles have increased greatly as the
human's important vehicles. However,it is the
development of modern technology that makes the
commit means of crimes become smarter and the
automobiles stolen events more frequent. Electronics antitheft is the most widely used among all the appliances at
the moment.But the chip one and the network one are the
developing directions of the auto-guard technology.RFID
Radio Frequency Identification technology which is
passive,contactless,security and convenient identifies
objectives automatically and gets the data through the
radio frequency signals.It meets the need of the
intellectualized guarding perfectly.GSM(Global System
for Mobile Communication) is a case which is the most
mature and widely used in mobile communication
system.It ensures the information transmission so
realtime, security and reliable that realizes the long
distance control[1].This paper is about a design of a new
fashion auto-guard which is a smart measurement
generalized in the automobile security area.
A. Controller
The core of this system is micocontroller which includes
monitoring circuit (checkingthestate), matrix keyboard,
actuator, sound-light alarm devices (loudspeaker and car
light),CAN communication and power managment.This
system will send sound-light alarm as soon as the damage
is checked by the sensor to warn the thieves and send the
information to ECU(Electronic Control Unit). In that
case, ECU can control the delay to cut off the electric
circuit and oil circuit.In the meanwhile,the ECU also
sends message to hosts for help.So it is convenient to
control the auto for hosts.And users can also select the
priority of auto control casually,such as MCU,ECU or
hosts.
B. RFID
RFID system consists of three parts.They are antenna,tag
and reader.The principle of RFID system is that the reader
puts the signals to be sent into a carrier signal with a
certain frequency after encoding.And then the signals will
be sent out by antenna.When the pulse signals are
received by tag which works within the scope of
reader,the circuit in the chip will do some work like
modulating,decrypting,and decoding.And then it will
make a distinguish about the command request,
passwords or permission.If it is the read command,the
248
249
Design of new Auto Guard Anti-Theft System Based on RFID and GSM Network
251
Proceedings of the National Conference on Communication Control and Energy System (NCCCES'11),
Vel Tech Dr. RR & Dr. SR Technical University, Chennai, TN. 29 - 30 August, 2011. pp.252-254.
I. INTRODUCTION
This paper is based on the perception of the road
environment using Global Positioning System, ARM
processor and various sensors. A passenger will sit in the
vehicle, which will drive autonomously and it will
conduct experimental tests on sensing, decision, and
control subsystems, and will collect data throughout the
driving, it only needs human interventions to define the
destination. It performed in unfriendly environments; the
previous vehicles were fielded and operated during
challenges defined by precise rules and in predefined
scenarios. The current technology is mature enough for
the deployment of non-polluting and no-oil based
autonomous vehicles for people and goods transportation
in real environment conditions, thus setting a new
milestone in the domain of intelligent vehicles. This paper
is taken all those advantages to drive autonomously using
the processors and mechanical systems are interconnected
by CAN (Control Area Network) protocol. This is more
Secured and concerned in avoiding accidents by the
installation of RADAR warning system.
Moreover it can also detect the unexpected obstacles and
damages in paths can also be easily detected by sensors
which are fixed at frontal bumper and all other sides of
the car. The main control of the whole system is
embedded with ARM7 (LPC2148) chip inside the car.
And also we can add addition security system to the car
using ARM processor. The full system is controlled using
this processor like when to apply the brake and speed etc.
Moreover the speed and the brake system can handle by
the cruise control in the processor.
252
(a)
Fig. 2
(b)
Fig. 3
254
Proceedings of the National Conference on Communication Control and Energy System (NCCCES'11),
Vel Tech Dr. RR & Dr. SR Technical University, Chennai, TN. 29 - 30 August, 2011. pp.255-256.
Patrolbot
S. Janani, C. Sai Smarana and G. Kalarani
1,2
Student, Pre- Final Year, Dept Of EIE, 3Asst. prof &HoD / EIE
Jaya Engineering College
Email: 1daalu.ja@gmail.com, 2smarana91@gmail.com, 3kalaaravindhnithish@yahoo.co.in
Abstract This paper reviews current advances in the
development of remote surveillance and security tasks.
Humans no matter how good they are, will not be able to
recognize everyone but with Artificial Intelligence, Patrolbot
can program all possible faces into them and allow them to
do facial recognition and alert the crime authorities in time
before anything happens which is used in airports. It is a
special eye-safe laser-rangefinder display footprints of
intruders walking by, even in darkness and verifies false
alarms .It also has a robotic visual sensors and cameras that
will enable it to read from dials 20 feet away.
Thus patrol bots will be more efficient than human security
personnel. It also employs revolutionary ARCS (Automatic
Robotic Control System) controls shared by AGVs which
map buildings on-the-fly and navigate point-to-point without
wires or other retrofitting.
A Patrolbot run with embedded linux on versalogics p-IIIbased vsbc-8 board patrolbot is made by active media
robotics. It can listen to speech and respond.
I. INTRODUCTION
PatrolBot is a programmable autonomous general purpose
service robot rover built by MobileRobots Inc. It is a high
quality, differential-drive robot designed for research
projects that require reliable, continuous 24X7 use or a
mid-size payload. The PatrolBot has been designed from
the ground up to carry payloads and sensors over all
normal indoor surfaces in wheelchair-accessible facilities.
PatrolBots are manufactured in various configurations and
serve as bases for companies developing delivery robots,
security robots, environmental monitoring rovers, robot
guides and other indoor service robots.
II. CAPABILITIES OF PATROLBOT
PatrolBot can scan buildings, create floor plans and
navigate them autonomously using a laser range-finding
sensor inside the robot. It employs Monte Carlo/Markovstyle localization techniques using a modified valueiterated search technique for navigation. It searches for
alternative paths if a hall is blocked, circumnavigates
obstacles and re-charges itself at its automated
Fig. 1
A. Visual Sensors
Patrolbot also has robotic visual sensors and cameras that
will enable it to read from dials 20 feet away.
B. Microphone and Speaker
It also has a microphone and speaker system that will
enable the Patrolbot to communicate with a person.
Hence, in this way the controller will not be put in harms
way. The Patrolbot will also be able to pick up small
objects and deliver them to locations as specified by the
controller.
255
Patrolbot
C. Eye Laser
PatrolBots special eye-safe laser-rangefinder displays
footprints of intruders walking by, even in darkness
D. Gas Sensor
A gas sensor reads oxygen, CO2 and H2S levels and can
sound alarm on the robot and/or at the control station if
acceptable levels are exceeded; likewise for smoke and
temperature. PatrolBot verifies false alarms, instructing
intruders to scan their IDs within a prescribed time to
avert alarms and further investigation.
V. APPLICATIONS OF PATROLBOT
A. Patrolbots in Enterprise
Robot is used to increase reliability, to increase flexibility,
to increase redundancy, to provide better situational
awareness to the staff, to reduce risk to the staff and to
save money.
PatrolBot provides situational awareness to the other
guards. To be looking at something and to see the floor
plan, see where the robot is in the floor plan and what it's
looking at perhaps from a 360 view and a pan-tilt-zoom
view, that gives you what's called situational awareness.
Fig. 2
Fig. 3
256
www.MobileRobots.com
James Lee,Robotics Istitute, Carnegie Mellon University,
Pittsburgh
Proceedings of the National Conference on Communication Control and Energy System (NCCCES'11),
Vel Tech Dr. RR & Dr. SR Technical University, Chennai, TN. 29 - 30 August, 2011. pp.257-260.
I. INTRODUCTION
During the past four decades, a significant attention has
been paid to the construction of reduced order observers
and stabilization using reduced-order controllers for linear
control systems [1-10]. In the recent decades, there has
been a good attention paid to the control problem of large
scale linear systems. This is due to the practical and
technical issues like information transfer networks, data
acquisition, sensing, computing facilities and the
associated cost involved which stem from using full order
controller design. Thus, there is a great demand for the
control of large scale linear systems with the use of
reduced-order controllers rather than full-order
controllers.
In this paper, we present the design of reduced-order
controllers for large scale linear discrete-time control
systems. Our design is carried out by first deriving a
reduced-order model of the large scale linear discretetime plant retaining only the dominant state of the given
system. The dominant state of a linear control system
corresponds to the slow modes of the linear system, while
the non-dominant state of the control system corresponds
to the fast modes of the linear system [3-10].
As an application of our recent work [9-10], we first
derive the reduced-order model of the given linear
discrete-time control system. Using the reduced-order
model obtained, we characterize the existence of a
reduced-order controller that stabilizes the full linear
system, using only the dominant state of the system.
This paper is organized as follows. In Section II, we
derive sufficient conditions for the derivation of reduced
In this section, we consider a large scale linear discretetime control system given by
(1)
x
x = s ,
xf
where
x s (k + 1) A ss
x (k + 1) = A
f
fs
A sf x s (k)
Bs
+ u(k)
A ff x f (k) B f
(2)
257
Design of Reduced Order Controller for the Stabilization of Large-Scale Linear Control Systems
x(k) = M z(k)
(3)
(12)
(13)
where
P = G ff1G fs , Q = G ff1 ( I f ) f
1
(14)
(4)
Substituting (13) into (2), we get the reduced order model
of the original linear system as
where
= M 1 AM = s
0
0
f
x s (k + 1) = A s x s (k) + Bs u(k)
(5)
where
=M B= s
f
1
A s = A ss + A sf P and Bs = Bs + A ff Q
(6)
x s (k + 1) A s
x (k + 1) = A
f
f
s
+ u(k)
f z f (k) f
0 z s (k)
(7)
Bs
x (k) + u(k)
0 f
Bf
x (k)
0 s
= K s x s (k)
x
(k)
f
(8)
(
x (k + 1) = ( A
)
B K ) x (k)
x s (k + 1) = A s Bs K s x s (k)
z f (k) (I f )
f u(k)
(9)
(18)
i.e.
1
(17)
u(k) = K s
0 x s (k)
(16)
z s (k + 1) s
z (k + 1) = 0
f
(15)
(19)
i.e.
z s (k) G ss
z (k) = G
f
fs
G sf x s (k)
G ff x f (k)
x s (k) = A s Bs K s
(11)
x s (0)
(20)
=
0.0363 0.1598 0.0247 0.7480
k = ik
i =1
Thus, we obtain
x s (k + 1) = A s x s (k) + Bs u(k)
where
(21)
2.7375 1.0961
A s =
0.4343 1.9577
where
2.6966
0.3557
A=
0.0490
0.7553
(23)
and
0.2628
Bs =
.
0.1301
Clearly,
and
the
system
pair
(A , B )
is
completely
0.9126
0.4523
.
B=
0.6721
0.3895
u = K s x s
(24)
259
K s = [ 38.8383 43.9036 ]
Design of Reduced Order Controller for the Stabilization of Large-Scale Linear Control Systems
x s (k + 1) = A s Bs K s x s (k)
(25)
system
(25)
is
globally
x s (k) = A s Bs K s
x s (0).
10
x s (0) =
10
is depicted in Figure 1.
V. CONCLUSIONS
In this paper, sufficient conditions are derived for the
design of reduced order controllers by obtaining a reduced
order model of the original plant using the dominant state
of the system. The reduced order controllers are assumed
to use only the state of the reduced order model of the
original plant. An example has been presented to illustrate
the effectiveness of the proposed design of reduced order
controllers for a four-dimensional linear discrete-time
control system.
REFERENCES
[1]
260
Proceedings of the National Conference on Communication Control and Energy System (NCCCES'11),
Vel Tech Dr. RR & Dr. SR Technical University, Chennai, TN. 29 - 30 August, 2011. pp.261-266.
x = Ax + f (x)
(1)
y = By + g(y) + u
(2)
261
Global Chaos Synchronization of Liu-Su-Liu and Liu-Chen-Liu Systems by Active Nonlinear Control
e = y x,
y 1 = a(y 2 y1 ) + u 1
(3)
y 2 = by1 + y1 y 3 + u 2
(7)
y 3 = cy 3 y1 y 2 + u 3
e = By Ax + g(y) f (x) + u
(4)
(5)
V(e) = e T Pe,
where P is a positive definite matrix. Note that
V : R n R n is a positive definite function by
construction. We assume that the parameters of the master
and slave system are known and that the states of both
systems (1) and (2) are measurable.
(8)
V(e)
= e T Qe,
: R n R n is
where Q is a positive definite matrix, then V
a negative definite function.
Thus, by Lyapunov stability theory [25], the error
dynamics (4) is globally exponentially stable and hence
the condition (5) will be satisfied. Then the states of the
master system (1) and the slave system (2) will be
globally and exponentially synchronized.
e i = y i x i , (i = 1, 2, 3)
e 1 = a(e 2 e1 ) + u 1
e 2 = be1 + y1 y 3 x1 x 3 + u 2
e 3 = ce 3 y1 y 2 + x1 x 2 + u 3
x 3 = cx 3 x1 x 2
(9)
u 1 = (a + b)e 2
x 1 = a(x 2 x1 )
x 2 = bx1 + x1 x 3
(8)
u 2 = e 2 y1 y 3 + x1 x 3
(6)
(10)
u 3 = y1 y 2 x1 x 2
Substituting (10) into (9), the error dynamics simplifies to
262
e 1 = ae1 be 2
e 2 = be1 e 2
e 3 = ce 3
(11)
x 1 = (x 2 x1 )
1
V(e) = e12 + e 22 + e 32 ,
2
(12)
x 2 = x1 + kx1 x 3
x 3 = x 3 hx1 x 2
V(e)
= ae12 e 22 ce 32 ,
(14)
(13)
3
y 1 = (y 2 y1 ) + u 1
y 2 = y1 + ky1 y 3 + u 2
(15)
y 3 = y 3 hy1 y 2 + u 3
where y1 , y 2 , y 3 are the states of the system (15) and
A. Numerical Results
The Liu-Chen-Liu system (14) is one of the threedimensional chaotic systems discovered by the scientists
L. Liu, S.Y. Chen and C. X. Liu, which is a new reversed
butterfly-shaped attractor.
(16)
e i = y i x i , (i = 1, 2, 3)
Then the error dynamics is obtained as
263
(17)
Global Chaos Synchronization of Liu-Su-Liu and Liu-Chen-Liu Systems by Active Nonlinear Control
e 1 = (e 2 e1 ) + u1
e 2 = e1 + k ( y1 y 3 x1 x 3 ) + u 2
(18)
e 3 = e 3 h(y1 y 2 x1 x 2 ) + u 3
We choose the nonlinear controller as
u1 = ( + )e 2
u 2 = e 2 k(y1 y 3 x1 x 3 )
(19)
u 3 = h(y1 y 2 x1 x 2 )
e 1 = e1 e 2
e 2 = e1 e 2
e 3 = e 3
(20)
V(e) =
1 2
e1 + e 22 + e 32 ,
2
x 1 = a(x 2 x1 )
(21)
x 2 = bx1 + x1 x 3
V(e)
= e12 e 22 e 23 ,
(23)
x 3 = cx 3 x1 x 2
(22)
y 1 = (y 2 y1 ) + u1
y 2 = y1 + ky1 y 3 + u 2
(24)
y 3 = y 3 hy1 y 2 + u 3
e i = y i x i , (i = 1, 2, 3)
(25)
e 1 = (e 2 e1 ) + ( a)(x 2 x1 ) + u1
e 2 = e1 + ( b)x1 + ky1 y 3 x1 x 3 + u 2
e 3 = e 3 + (c )x 3 hy1 y 2 + x1 x 2 + u 3
(26)
u1 = ( + )e 2 + (a )(x 2 x1 )
u 2 = e 2 + (b )x1 ky1 y 3 + x1 x 3
(27)
u 3 = ( c)x 3 + hy1 y 2 x1 x 2
Substituting (27) into (26), the error dynamics simplifies
to
A. Numerical Results
For simulations, the fourth-order Runge-Kutta method
with time-step 10 6 is used to solve the differential
264
e 1 = e1 e 2
e 2 = e1 e 2
e 3 = e 3
(28)
V(e) =
1 2
e1 + e 22 + e 32 ,
2
(29)
V(e)
= e12 e 22 e 23 ,
REFERENCES
(30)
[1]
[2]
[3]
A. Numerical Results
For simulations, the fourth-order Runge-Kutta method
with time-step 10 6 is used to solve the differential
equations (23) and (24) with the active nonlinear
controller (27).
The parameters of the chaotic systems are chosen as in (8)
and (16). The initial conditions of the master and slave
systems are chosen as x(0) = (8, 2, 7) and y(0) = (2, 7,1).
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
Fig. 4. Error Trajectories for Systems (23) and (24)
[14]
[15]
VI. CONCLUSIONS
In this paper, nonlinear control method based on
Lyapunov stability theory has been deployed to achieve
global chaos synchronization for the following three cases:
[16]
[17]
Global Chaos Synchronization of Liu-Su-Liu and Liu-Chen-Liu Systems by Active Nonlinear Control
[18] J. H. Park, Adaptive control for modified projective
synchronization of a four-dimensional chaotic system with
uncertain parameters, J. Computational and Applied
Math., vol. 213, no. 1, 288-293, 2008.
[19] J. H. Park, Chaos synchronization of nonlinear Bloch
equations, Chaos, Solitons and Fractals, vol. 27, no. 2,
pp. 357-361, 2006.
[20] H. T. Yau, Design of adaptive sliding mode controller for
chaos synchronization with uncertainties, Chaos, Solitons
and Fractals, vol. 22, pp. 341-347, 2004.
[21] R. Suresh and V. Sundarapandian, Synchronization of an
optical
hyperchaotic
system,
International
J.
Computational and Applied Math., vol. 5, no. 2, pp. 199207, 2010.
266
Proceedings of the National Conference on Communication Control and Energy System (NCCCES'11),
Vel Tech Dr. RR & Dr. SR Technical University, Chennai, TN. 29 -30 August, 2011. pp.267-270.
I. INTRODUCTION
Automatic PD is a rapidly evolving area in image analysis
and surveillance, it is essential in many Applications such
as advanced robotics and intelligent vehicles. It is a
challenging problem due to changing articulated pose,
style and color of clothing, background, illumination and
weather conditions. More importantly, robust pedestrian
identification and tracking are highly dependent on
reliable detection and segmentation in each frame.
There are many different techniques which have been
proposed to address the problem of people detection.
Most popular methods are based on feature extraction,
267
New Improved Methodology for Pedestrian Detection in Advanced Driver Assistance System
C. Adaboost Algorithm
Adaboost is an iterated learning method, a strong learning
algorithm upgraded from a group of weak learning
algorithms. And the algorithm is implemented by
changing the distribution of data, via training set result to
determine the correctness of the classification of samples
and the last total accuracy of classification, then
determine the weight of every single sample, and combine
the weak classifiers obtained by every training process
together as the final decision classifier. In Adaboost,
every training sample is assigned with a weight, which
indicates the probability of some kind of weak classifier
to be selected into the training set. If one sample is not
classified correctly, when construct the next training set,
the probability to be chosen will increase. In contrast, the
probability will decrease. In this way, Adaboost can focus
on those more difficult samples which has more extra
information.
However, when training classifier by using adaboost, it is
a great probability to encounter such situation that if one
or several samples of the training set is difficult to be
classified correctly, after several rounds of updating, these
difficult samples will be assigned by a high weight.
And during the subsequent training process, the selected
weak classifier and weight will be the small portion of the
total samples, in other words, training samples are simply
over fitting on these samples. For the purpose of reducing
over fitting, there are two ways to achieve: pick out the
high weight difficult samples, its easy to implement but
also restrict the classification capacity; or adjust the
weight of difficult samples, and this way is adopted by
this paper.
B. Edgelet Features
Improved edgelet features were proposed by Bo Wu and
Jie Xu for moving pedestrian detection. Edgelet is a short
segment of line or curve, which represents for a little part
268
B. Database
The training dataset used in experiments contains more
than 3000 images, most positive samples consist of two
well-known pedestrian datasets as shown in Fig.6 , the
MIT dataset and the INRIA dataset with the size of 32
64 pixels, and others come from surveillance videos.
Also, the head-shoulder training samples are obtained by
cutting the image from these two datasets and zoom out to
20 20 pixels. Some negative samples are selected from
the INRIA dataset, and others are from the Internet. And
the experiments are carried out on videos from CAVIAR
sequences and campus, which are down sampled to
320 240 pixels in our framework.
IV. RESULTS
After experimentally testing various images from the MIT
and INRIA datasets, following results as shown in Fig.4
and Fig.5 were obtained. Fig.4 shows detection rate for
head-shoulder detection for various methods like Haarlike, HOG and edgelet. From the obtained results it can be
clearly concluded that Edgelet provides better Detection
Rate than the Har- like and HOG methods.
269
New Improved Methodology for Pedestrian Detection in Advanced Driver Assistance System
[1]
[2]
[3]
[4]
[5]
[6]
Fig. 6. MIT dataset and the INRIA dataset used for training and
testing purpose
V. CONCLUSION
A number of feature descriptors have been proposed.
Previously HOG features were extensively used along
with SVM classifier for PD. HOG features and SVM
[7]
[8]
270
Proceedings of the National Conference on Communication Control and Energy System (NCCCES'11),
Vel Tech Dr. RR & Dr. SR Technical University, Chennai, TN. 29 - 30 August, 2011. pp.271-274.
I. INTRODUCTION
An emerging research field in physics focused on spindependent phenomena applied to electronic devices is
called spintronics. The promise of spintronics is based on
manipulation not only of the charge of electrons, but also
their spin, which enables them to perform new functions.
Currently, the ability to manipulate electron spin is
expected to lead to the development of remarkable
improvements in electronic systems and devises used in
photonics, data processing and communications
technologies only.Now this paper brings out an innovative
idea of extending the hands of spintronics in MEDICAL
FIELD, in the detection of cancer cells even when they
are very few in numbers in the human body.This approach
is relied on two important aspects:
the behavior of electron spin in a magnetic field
the cancer cells abnormality over normal cells
II. SPINTRONICS
Spintronics, or spin electronics, refers to the study of the
role played by electron spin in solid state physics, and
possible devices that specifically exploit spin properties
instead of or in addition to charge degrees of freedom. In
spintronics electron spin, in addition to charge, is
manipulated to yield a desired outcome.
An electron is just like a spinning sphere of charge. It has
a quantity of angular momentum (its "spin") and an
associated magnetism, and in an ambient magnetic field
its energy depends on how its spin vector is oriented.
Every electron exists in one of two states, namely, spin-up
and spin-down with its spin either +1/2 or 1/2. In other
words, an electron can rotate either clockwise or
counterclockwise around its own axis with constant
frequency. . Two spins can be "entangled" with each
other, so that neither is distinctly up nor down, but a
combination of the two possibilities.
III. CANCER CELLS
Cancer cells are the somatic cells which are grown into
abnormal size. The cancer cells have different
electromagnetic pattern when compared to normal
cells.For many types of cancer, it is easier to treat and
cure the cancer if it is found early. There are many
different types of cancer, but most cancers begin with
abnormal cells growing out of control, forming a lump
that's called a tumor. The tumor can continue to grow
until the cancer begins to spread to other parts of the
body. If the tumor is found when it is still very small,
curing the cancer can be easy. However, the longer the
tumor goes unnoticed, the greater the chance that the
cancer has spread. This makes treatment more
difficult.Tumor developed in human body, is removed by
performing a surgery. Even if a single cell is present after
the surgery, it would again develop into a tumor. In order
to prevent this, an efficient method for detecting the
cancer cells is required.
Here, in this paper, we introduce a new method for
detecting the cancer cells after a surgery. This accurate
detection of the existence of cancer cells at the beginning
stage itself ensures the prevention of further development
of the tumor.
271
B. Spin Detectors
Mott polarimeter
Compton polarimeter
Moller type polarimeter
Typical Mott polarimeters require electron energies of
~100 keV. To achieve these energies, high voltages are
needed. Because of these voltage requirements, spacing
between electrodes need to be sufficient to prevent
electric discharge. The designed polarimeter uses energies
of ~25 keV, requiring a smaller potential between the two
hemispheres and hence a smaller overall design. More
importantly, this device has a higher efficiency, defined to
be I/Io. This is because of its smaller size. Increased
efficiency improves the figure of merit.
273
If Sx=Sy
Then,There are no cancer cells in the surgery undergone
part of the body and all the cells have been removed by
the surgery.
If the change in spin in the unaffected part is not equal to
the change caused by the surgery undergone part of the
body, i.e.
If Sx not equals Sy
IX. CONCLUSION
Thus the usage of electron spin in the cancer cell
detection provides way for the entry of spintronics in
medical field. The approach suggested in this paper acts
as an efficient way of cancer cell detection after surgery
thereby preventing the further growth of tumor cells.
REFERENCES
[1]
[2]
Fig. 9. Determination of the spin orientation
274
S.A.Wolf,A.Y.Chtchelkanova,D.M.Tregor,Spintronics:A
retrospective and Perspective,IBM Journal of Research
and Development-Spintronics Volume 50 Issue 1, January
2006
Hinkel G.W,Farell D,Hook S.S, Panero N.J,
Ptak.KCancer therapy through nanomedicine6-12,June
2011, volume 5 Issue 2
Proceedings of the National Conference on Communication Control and Energy System (NCCCES'11),
Vel Tech Dr. RR & Dr. SR Technical University, Chennai, TN. 29 - 30 August, 2011. pp.275-277.
I. INTRODUCTION
Chemotherapeutic cancer treatment necessitates making
complex, and often life-critical, decisions about the best
way to administer cytotoxic (i.e. destroying the cells)
drugs. Typically patient information is incomplete and
noisy, the range of treatment options is subject to
complex constraints and the aims of treatment are multiobjective. For these reasons, medical decision support is a
rich application area for evolutionary algorithms and
related techniques
II. THE NEW APPROACH
Swarm robotics is a new approach to the coordination of
multirobot systems which consist of large numbers of
mostly simple physical robots. It is supposed that a
desired collective behavior emerges from the interactions
between the robots and interactions of robots with the
environment. This approach emerged on the field of
artificial swarm intelligence, as well as the biological
275
IV. ALGORITHM
Ant colony optimization (ACO) is a class of optimization
algorithms modeled on the actions of an ant colony. ACO
methods are useful in problems that need to find paths to
goals.
Artificial 'ants' simulation agents locate optimal solutions
by moving through a parameter space representing all
possible solutions.
Real ants lay down pheromones directing each other to
resources while exploring their environment. The
simulated 'ants' similarly record their positions and the
quality of their solutions, so that in later simulation
iterations more ants locate better solutions.
One variation on this approach is the bees algorithm,
which is more analogous to the foraging patterns of the
honey bee.
V. NANO ROBOTS
Nanotechnology as a whole is fairly simple to understand,
but developing this universal technology into a nanorobot
has been slightly more complicated. Nan robots are
essentially an adapted machine version of bacteria. They
are designed to function on the same scale as both
bacteria and common viruses in order to interact with and
repel them from the human system.
Since they are so small that you cant see them with your
naked eye, they will also possibly be used to perform
miracle functions. Nanobots measure more like six
atoms across, but they are far more complicated in design
and need to be engineered in such a way that they are
autonomous.
The ideal nanobots consist of a transporting mechanism,
an internal processor and a fuel unit of some kind that
enables it to function. The main difficulty arises around
this fuel unit, since most conventional forms of robotic
propulsion cant be shrunk to nanoscale with current
technology. Scientists have succeeded in reducing a robot
to five or six millimeters, but this size still technically
qualifies it as a macro-robot.
276
277
Proceedings of the National Conference on Communication Control and Energy System (NCCCES'11),
Vel Tech Dr. RR & Dr. SR Technical University, Chennai, TN. 29 - 30 August, 2011. pp.278-282.
I. INTRODUCTION
Machine vision is an important sensor technology with
potential application in many industrial operations. Many
of the current application of machine vision are in
inspection, robotics and measurement. Machine vision
system may allow us for complex inspection for close
dimensional tolerance and improved recognition and part
location capabilities and increased speed.
The Recent development of PC-driven instruments and
the evolution of the networking capabilities of PCs over a
world wide network (Internet) have led to the realization
distributed measurement systems for industrial
applications.
The remote testing of instruments is an interesting
application that has not yet been exploited mainly due to
the security issues. In general, the tachometers are tested
manually; it leads some observational and environmental
errors. Machine vision is concerned with the sensing of
vision data and its interpretation by the computer .The
vision system consist of the Charge Coupled Device
278
279
280
Table 1
S.no
1
2
3
4
5
6
7
Input
frequency
34
51
68
85
102
119
136
Standard
Angle
342
324
37
290
273
257
241
Observed
Angle
340
326
305
288
270
256
240
Percentage
Of error
-0.58
0.61
-0.65
-0.68
-1
-0.38
-0.41
281
[2]
[3]
[4]
[5]
[6]
REFERENCES
[1]
[7]
282
Proceedings of the National Conference on Communication Control and Energy System (NCCCES'11),
Vel Tech Dr. RR & Dr. SR Technical University, Chennai, TN. 29 - 30 August, 2011. pp.283-286.
I. INTRODUCTION
Conventional solar cells have two main drawbacks:
Efficiencies and their expensive manufacturing cost. The
first drawback, inefficiency is almost unavoidable with
silicon cells. This is because the incoming photons, or
light, must have the right energy, called the band gap
energy, to knock out an electron. If the photon has less
energy than the band gap energy then it will pass through.
If it has more energy than the band gap, then that extra
energy will be wasted as heat. These two effects alone
account for the loss of around 70 percent of the radiation
energy incident on the cell. Nano particles are motes of
matter tens of thousands of times smaller than the width
of a human hair. Because they're so small, a large
percentage of nano particles' atoms reside on their
surfaces rather than in their interiors. This means surface
interactions dominate nano particle behavior. And, for
this reason, they often have different characteristics and
properties than larger chunks of the same material. Nanostructured layers in thin film solar cells offer three
important advantages. First, due to multiple reflections,
the effective optical path for absorption is much larger
than the actual film thickness. Second, light generated
electrons and holes need to travel over a much shorter
path and thus recombination losses are greatly reduced.
As a result, the absorber layer thickness in nanostructured solar cells can be as thin as 150 nm instead of
several micrometers in the traditional thin film solar cells.
283
cell
284
compared
with
285
which
help
would utilize
preserve
the
[2]
[3]
[4]
286
Proceedings of the National Conference on Communication Control and Energy System (NCCCES'11),
Vel Tech Dr. RR & Dr. SR Technical University, Chennai, TN. 29 - 30 August, 2011. pp.287-289.
I. INTRODUCTION
Nanotechnology is having an impact on several aspects of
food science, from how food is grown to how it is
packaged. This is a paper which gives a brief message on
the inclusion of nano technology and nano particles in
current food processing and packaging units. The food
industry is the largest manufacturing sector in the world.
It presents a very different innovation scenario than the
chemical and pharma industries do, and introducing new
processing technologies has always been challenging.
Nanotechnology research in the food industry is getting
focused on food packaging. The final step in food
processing is packaging the processed food. In present
world almost all food products are packed mostly using
plastic materials. These plastic materials are toxic and we
cannot preserve food in it for a long time, due to this the
food items might get contaminated. The contamination
process makes the packed food material unfit to consume,
so the packing materials has to undergo number of
sterilization process before getting ready for packing.
287
X. NANOCOMPOSITES
288
XII. CONCLUSION
289
Proceedings of the National Conference on Communication Control and Energy System (NCCCES'11),
Vel Tech Dr. RR & Dr. SR Technical University, Chennai, TN. 29 - 30 August, 2011. pp.290-293.
I. INTRODUCTION
The invention of the transistor enabled the first
radiotelemetry capsules, which utilized simple circuits for
in vivo telemetric studies of the gastro-intestinal (GI)
tract. These units could only transmit from a single sensor
channel, and were difficult to assemble due to the use of
discrete components. The measurement parameters
consisted of either temperature, pH or pressure, and the
first attempts of conducting real-time noninvasive
physiological measurements suffered from poor
reliability, low sensitivity, and short lifetimes of the
devices. The first successful pH gut profiles were
achieved in 1972, with subsequent improvements in
sensitivity and lifetime. Single-channel radiotelemetry
capsules have since been applied for the detection of
disease and abnormalities in the GI tract where restricted
access prevents the use of traditional endoscopy. Most
radiotelemetry capsules utilize laboratory type sensors
such as glass pH electrodes, resistance thermometers, or
moving inductive coils as pressure transducers. The
relatively large size of these sensors limits the functional
complexity of the pill for a given size of capsule.
Adapting existing semiconductor fabrication technologies
to sensor development has enabled the production of
highly functional units for data collection, while the
exploitation of integrated circuitry for sensor control,
signal conditioning, and wireless transmission has
290
comprises the oxygen sensor and an optional nickelchromium (NiCr) resistance thermometer.
Fig. 1
1) Sensor Chip 1
An array of 4X2 combined temperature and pH sensor
platforms were cut from the wafer and attached on to
glass cover slip using photo resist cured on a hotplate.
The cover slip acted as temporary carrier to assist
handling of the device during the first level of lithography
when the electric connection tracks, the electrodes and the
bonding pads were defined.
B. Control Chip
The ASIC was a control unit that connected together the
external components of the microsystem. It is a novel
mixed signal design that contains an analog signal
conditioning module operating the sensors, an 10-bit
analog-to-digital and digital-to-analog converters, and a
digital data processing module. An RC relaxation
oscillator provides the clock signal.
The analog module offer a combination of both a power
saving scheme and a compact integrated circuit design.
The temperature circuitry biased the diode at constant
current, so that a change in temperature would reflect a
corresponding change in the diode voltage. The pH
ISFET sensor was biased as a simple source and drain
follower at constant current with the drain-source voltage
changing with the threshold voltage and pH. The
conductivity circuit operated at direct current measuring
the resistance across the electrode pair as an inverse
function of solution conductivity. An incorporated
potentiostat circuit operated the amperometric oxygen
sensor with a 10-bit DAC controlling the working
electrode potential with respect to the reference. The
analog signals had a full-scale dynamic range of 2.8 V.
The analog signals were sequenced through a multiplexer
prior to being digitized by the ADC.. The digital data
processing module conditioned the digitized signals
through the use of a serial bitstream data compression
algorithm, which decided when transmission was required
by comparing the most recent sample with the previous
sampled data. This technique minimizes the transmission
length, and is particularly effective when the measuring
environment is at quiescent, a condition encountered in
many applications.
291
Fig. 3
292
[4]
293
Proceedings of the National Conference on Communication Control and Energy System (NCCCES'11),
Vel Tech Dr. RR & Dr. SR Technical University, Chennai, TN. 29 - 30 August, 2011. pp.294-297.
Valarmathi1010@gmail.com
294
295
MO D U LE
F UN C T ION
Location
Front
End
Servers
Front
End
Servers
Handheld
Devices
Front
End
Servers
296
D. Conclusion
Hypermarket and superstore usually distribute their fliers
manually or by mail, which is inefficiency as well as
consuming workforce and material. We proposed a proactive
advertising system to cope with this problem. Hypermarket can
reduce the cost of distributing handbills by using this system
which also provides dynamic delivering of advertisement. In
other words, hypermarket can make and deliver advertisement
on the fly depending on real time sales data without resort to
printing it. We have completed the field test in a local
superstore and the result was satisfied. The proactive
advertising system can also apply to similar places such as food
court, amusement park and cinema. It can be used as an
alternative advertising method for these places.
Fig 3. Flow chart of push mechanism
No matter whether a device rejects receiving files or it is not
registered, the above mechanism can response a correct action
to the device either stops pushing files or pushes registration
program. In other words, customers can interact with the
system so that hypermarket cannot force them to receive
advertisements.
T AB L E 2. COMPARISON OF TECHNOLOGIES
Technical
Specifications
Bluetooth v2.1 +
EDR Bluetooth v3.0 + HS
Mobile phones,
gaming, headsets,
stereo audio
streaming,
automotive, PCs,
etc.
297
REFERENCES
[1] Bluetooth SIG, Bluetooth Basics,
[2] Paper by Yu-Liang Chen(1,2), Hung-Jen Chou(1), ChenPu Lin(1), Hsien-Tang Lin(2), Shyan-Ming Yuan(1 ,3) YuChia Liu, Blueg, A New Blog-like P2P System built on
Bluetooth, Master Thesis of Computer Science and
Engineering, National Chiao Tung University, Jun 2006.
[3] Bruce Hopkins, Part 1: File transfer with JSR-82 and
OBEX,
[4] Nai-Shuoh Yeh, Linux Bluetooth Protocol Stack/BlueZ
on SCAN Device, Computer and Communication, CEPS,
Volume 107, Mar 2004, pp. 38-47.
[5] Chatschik, B., An overview of the Bluetooth wireless
technology, Communicatio ns Magazine, IEEE Volume
39, Issue 12, Dec 2001, pp. 86 94.
Proceedings of the National Conference on Communication Control and Energy System (NCCCES'11),
Vel Tech Dr. RR & Dr. SR Technical University, Chennai, TN. 29 - 30 August, 2011. pp.298-303.
Algorithm proposed
for text detection and recognition.
The method we propose belongs to the topdown category, and consists of two main
tasks as illustrated by Fig a text detection
task, and a text recognition task applied to
the detected text regions. Following the
cascade altering idea, which consists of the
sequential processing of data with more and
more selective 3lters, the text detection task
is decomposed into two subtasks. These are
a text localization step, whose goal is to
quickly extract potential text blocks in
images with a low rejection rate and a
reasonable precision, and a text veri3cation
step based on machine learning. Such an
approach allows us to obtain high
performance with a lower computation cost
than other methods. To address the
recognition
task
we
propose
a
multihypotheses approach. More precisely
in this approach, the text image is segmented
two or three times, assuming a different
number of classes in the image each time.
The different classes, all considered as text
candidates, are processed by a commercial
optical character recognition (OCR)
software, and the 3nal result is selected from
the generated text string hypotheses using a
con3dence level evaluation based on
language modeling. Additionally, we
propose a segmentation method based on
Markov random field to extract more
Dv(s) = Cv(s)
Rect vand Dh(s) = Ch(s)
Rect h..(`1)
299
300
DCT COEFFICIENTS.
The last feature vector we tested is
composed of discrete cosine transform
(DCT) coe Acients computed over 16 16
blocks using a fast DCT algorithm .These
frequency domain features are commonly
used in texture analysis.
MULTI-LAYER
PERCEPTRONS
(MLPS)
MLPs are a widely used neural
network, usually consisting of multiple
layers of neurons: one input layer, hidden
layers and one output layer. Each neuron in
the hidden or output layers computes a
weighted sum of its inputs (each output of
the neurons in the previous layer) and then
passes this sum through a non-linear transfer
function to produce its output. In the binary
classification case, the output layer usually
consists of one neuron whose output
encodes the
class membership. In theory, MLPs can
approximate any continuous function, and
the goal in practice consists of estimating
the parameters of the best approximation
from a set of training samples. This is
usually done by optimizing a given criterion
using a gradient descent algorithm.
SUPPORT
VECTOR
MACHINE
(SVMS)
SVMs are a technique motivated by
statistical learning theory which have shown
their ability to generalize well in highdimensional spaces, such as those spanned
by the texture patterns of characters. The
key idea of SVMs is to implicitly project the
input space into a higher dimensional space
(called feature space) where the two classes
are more linearly separable. This projection,
denoted , is implicit since the learning and
decision process only involve an inner dot
product in the feature space, which can be
directly computed using a kernel K defined
on the input space. In short, given m labeled
training samples: (x1, y1); : : : ; (xm, ym),
where yi = 1 indicates the positive and
301
302
303
Proceedings of the National Conference on Communication Control and Energy System (NCCCES'11),
Vel Tech Dr. RR & Dr. SR Technical University, Chennai, TN. 29 - 30 August, 2011. pp.304-306.
ECE, 2EEE
veltech Dr RR & Dr SR technical university, Chennai.
Abstract Energy conservation has taken new leap in the
decade but the main problem is that excess use of energy on
each household. We are presenting a unique method for
charging over hyperactive customers with extra charge
We will use power measurement unit instead of energy rate
at each instant of time is measured hence is an option of an
hyperactivity of customer, for us we require few components
like sampler, ADC, controllers
Our paper can easily be implemented at each household on
proper basis
I. EXISTING SYSTEM
The most common type of electricity meter is the electro
mechanical induction watt-hour meter
The electromechanical induction meter operates by
counting the revolutions of an aluminum disc which is
made to rotate at a speed proportional to the power. The
number of revolutions is thus proportional to the energy
usage. It consumes a small amount of power, typically
around 2 watts.
The metallic disc is acted upon by two coils. One coil is
connected in such a way that it produces a magnetic flux
in proportion to the voltage and the other produces a
magnetic flux in proportion to the current. The field of the
voltage coil is delayed by 90 degrees using a lag coil.[17]
This produces eddy currents in the disc and the effect is
such that a force is exerted on the disc in proportion to the
product of the instantaneous current and voltage. A
permanent magnet exerts an opposing force proportional
to the speed of rotation of the disc. The equilibrium
between these two opposing forces results in the disc
rotating at a speed proportional to the power being used.
The disc drives a register mechanism which integrates the
speed of the disc over time by counting revolutions, much
like the odometer in a car, in order to render a
measurement of the total energy used over a period of
time.
The type of meter described above is used on a singlephase AC supply. Different phase configurations use
additional voltage and current coils.
Fig. 1
304
5
15 - 30
Ceiling Fan
Computer
Laptop
Desktop PC
Printer
Coffee Maker
Clock Radio
Dishwasher
Dryer (Clothes)
Electric*
Gas Heated
Electric Blanket
Electric Clock
Electric Frying Pan
Freezer
Conventional 14cf
(15 hrs/day runtime)
10 - 50
305
20 - 75
80 - 200
100
800
1
1200 - 1500
4000
300 - 400
200
1
1200
445
112
300 - 1000
350
150 - 1000
1500
400
100
1200
1000
CFL Bulbs
100
23
75
20
60
15
11
600 - 1500
250
40
Microwave
Popcorn Popper
Refrigerator/Freezer (runtime in hours/day)
Conventional 20cf (15)
Conventional 16cf (15)
Fig. 2
Appliance
Air Conditioner
Room*
Central*
Air Conditioners rated in tons
Per Ton
e.g., 5 Ton AC Unit
Blender
Blow Dryer
CB Radio
CD Player
540
475
112
70
60
50
30
100
15
450
D. Blockdiagram
10 - 30
10 - 25
800 - 1500
500
250
750
1000
1200
1000
1100
1100
900
1400
200 - 700
150
40
1200
500
Fig. 2
IV. CONCLUSION
We in this paper have submitted a model of meter which
could easily differentiate between normal users and
hyperactive users to differentiate power charging
The system not only warns the user of extra power
consumption but also helps to differentiate them from
other users
306
Proceedings of the National Conference on Communication Control and Energy System (NCCCES'11),
Vel Tech Dr. RR & Dr. SR Technical University, Chennai, TN. 29 - 30 August, 2011. pp.307-310.
Transparent Electronics
T. Gopala Krishnan, G.D. Vigneshvar and V.R. Arun
Veltech Dr. RR & Dr. SR Technical University
Abstract Transparent electronics is an emerging science
and technology field focused on producing invisible
electronic circuitry and opto-electronic devices. Applications
include consumer electronics, new energy sources, and
transportation.the first scientific goal of this technology
must be to discover, understand, and implement transparent
high-performance electronic materials. The second goal is
their implementation and evaluation in transistor and circuit
structures. The third goal relates to achieving applicationspecific properties since transistor performance and
materials property requirements vary, depending on the
final product device specifications.
I. INTRODUCTION
During the past 10 years, the classes of materials available
for transparent electronics applications have grown
dramatically. Historically, this area was dominated by
transparent conducting oxides (oxide materials that are
both electrically conductive and optically transparent)
because of their wide use in antistatic coatings, touch
display panels, solar cells, flat panel displays, heaters,
defrosters, smart windows and optical coatings. All
these applications use transparent conductive oxides as
passive electrical or optical coatings
II. TRANSPARENT ELECTRONICS DEVICES
In order to produce a transparent-electronics-based
system, appropriate materials must be selected,
synthesized, processed, and integrated together in order to
fabricate a variety of different types of devices. In turn,
these devices must be chosen, designed, fabricated, and
interconnected in order to construct circuits, each of
which has to be designed, simulated, and built in such a
way that they appropriately function when combined
together with other circuit and ancillary non-circuit
subsystems. Thus, this product flow path involves
materials devices circuits systems, with each
level of the flow more than likely involving multifeedback iterations of selection, design, simulation,
fabrication,
integration,
characterization,
and
optimization. From this perspective, devices constitute a
second level of the product flow path. The multiplicity,
performance, cost, manufacturability, and reliability of
available device types will dictate the commercial product
space in which transparent electronics technology will be
able to compete
307
Transparent Electronics
Fig. 1
Fig. 2
308
Fig. 3
Disposable electronics
Large-area electronics
Macroelectronics
Flexible electronics
VIII. TECHNICAL
An active matrix OLED display consists of a matrix of
OLED pixels that generate light upon electrical activation
that have been deposited or integrated onto a thin film
transistor (TFT) array, which functions as a series of
switches to control the current flowing to each individual
pixel.[5]
Typically, this continuous current flow is controlled by at
least two TFTs at each pixel, one to start and stop the
charging of a storage capacitor and the second to provide
a voltage source at the level needed to create a constant
current to the pixel and eliminating need for the very high
currents required for passive matrix OLED operation.[6]
TFT backplane technology is crucial in the fabrication of
AMOLED displays. Two primary TFT backplane
technologies, namely polycrystalline silicon (poly-Si) and
amorphous silicon (a-Si), are used today in AMOLEDs.
These technologies offer the potential for fabricating the
active matrix backplanes at low temperatures (below
150C) directly onto flexible plastic substrates for
producing flexible AMOLED displays.
Wearable electronics
Reversible Display, Front Drive Structure for Color
Electronic
Paper,
Color
Micro
encapsulated
Electrophoretic Display, Novel Display Structure Front
Drive Structure. Indium oxide nano wire mesh as well as
indium oxide thin films were used to detect different
chemicals, including CWA simulants.
XI. FUTURE SCOPE
It should be apparent from the discussion that although
much progress has been made in developing new
materials and devices for high performance transparent
solar cells, there is still plenty of opportunity to study and
improve device performance and fabrication techniques
compared with the nontransparent solar cell devices. In
particular, the stability of transparency solar cells has not
been studied yet. Solution-processable transparent PSC s
have become a promising emerging technology for
tandem solar cell application to increase energy
conversion efficiency. The transparency of solar cells at a
specific light band will also lead to new applications such
as solar windows. The field of energy harvesting is
gaining momentum by the increases in gasoline price and
environment pollution caused by traditional techniques.
Continued breakthroughs in materials and device
performance, accelerate and establish industrial
applications. It is likely that new scientific discoveries
and technological advances will continue to cross fertilize
each other for the foreseeable future
309
Transparent Electronics
310
Proceedings of the National Conference on Communication Control and Energy System (NCCCES'11),
Vel Tech Dr. RR & Dr. SR Technical University, Chennai, TN. 29 - 30 August, 2011. pp.311-313.
I. INTRODUCTION
Fig. 1
312
(a)
(b)
VIII. CONCLUSION
This paper has attempted to give a snapshot of
completed, ongoing and emerging applications of
mobile phone based health care technologies. With
regard to the concerns mentioned here, it is worth noting
that mobile phone technologies are affecting but not
limit to the medical field of
life. Emerging
technological trends provide promising solutions for
mobile health care applications. In order to facilitate
wider application of mobile health care and offer better
service to the patients, efforts in compatibility,
standards, and security are needed.
[1]
[3]
REFERENCES
[2]
[4]
[5]
[6]
313
http://www.who.int/topics/chronic_diseases/en/, Latest
access on 2008; Sep.16.
http://www.who.int/topics/ageing/en/, Latest access on
2008; Sep.16.
Intille SS. A new research challenge: Persuasive
technology to motivate healthy aging. IEEE Trans
InfTechnol Biomed 2004; 8:235-237.
Chen W, Wei D, Zhu X, Uchida M, Ding S, Cohen M. A
mobile phone-based wearable vital signs monitoring
system. Proceedings of the 2005 the fifth international
conference on computer and information technology.
Shanghai, China 2005.
Kogure Y, Matsuoka H, Kinouchi Y, Akutagawa M.
The development of a remote patient monitoring system
using Javaenabled mobile phones. Proceedings of the
2005 IEEE engineering in medicine and biology 27th
annual conference. Shanghai, China 2005.
Takeuchi H, Kodama N, Hashiguchi T, Hayashi D.
Automated healthcare data mining based on a personal
dynamic healthcare system. Proceedings of the 28th
IEEE EMBS annual international
Proceedings of the National Conference on Communication Control and Energy System (NCCCES'11),
Vel Tech Dr. RR & Dr. SR Technical University, Chennai, TN. 29 - 30 August, 2011. pp.314-318.
I. INTRODUCTION
Machine vision is an important sensor technology with
potential application in many industrial operations. Many
of the current application of machine vision are in
inspection, robotics and measurement. Machine vision
system may allow us for complex inspection for close
dimensional tolerance and improved recognition and part
location capabilities and increased speed.
The Recent development of PC-driven instruments and
the evolution of the networking capabilities of PCs over a
world wide network (Internet) have led to the realization
distributed measurement systems for industrial
applications.
The remote testing of instruments is an interesting
application that has not yet been exploited mainly due to
the security issues. In general, the tachometers are tested
manually; it leads some observational and environmental
errors. Machine vision is concerned with the sensing of
vision data and its interpretation by the computer .The
vision system consist of the Charge Coupled Device
314
315
316
Input
frequency
34
51
68
85
102
119
136
Standard
Angle
342
324
37
290
273
257
241
Observed
Angle
340
326
305
288
270
256
240
Percentage
Of error
-0.58
0.61
-0.65
-0.68
-1
-0.38
-0.41
317
REFERENCES
[1]
[2]
[3]
[5]
[6]
[7]
318
Proceedings of the National Conference on Communication Control and Energy System (NCCCES'11),
Vel Tech Dr. RR & Dr. SR Technical University, Chennai, TN. 29 - 30 August, 2011. pp.319-322.
I. INTRODUCTION
Today people can communicate any time, anywhere, and
with anyone over a cellular phone network. Moreover, the
Internet lets people download immense quantities of data
from remotely located servers to their home computers.
Essentially,
these
two
technologies
enable
communications between terminals located at a distance
from each other. Short-range wireless communication
systems such as Blue tooth and wireless local area
networks. Throughput is reduced by packet collisions. In
crowded spaces such as meeting rooms and auditoriums
filled with people , Communication is not secure because
signals can be intercepted.The ultimate human area
network solution to all these constraints of conventional
technologies is intrepid communication, in which the
human body serves as the transmission medium. In
everyday services, if we could use the human body itself
as a transmission medium, then this would be an ideal
way of implementing human area networks because it
would solve at a stroke all the problems throughput
reduction, low security, and high network setup costs.
II. RED TACTON
Red Tacton involves initiating action with a touch that
could result in a wide range of actions in response. So,
NTT Combined touch and action to coin the term Tacton,
and then added the word Red - a Warm color -- to
emphasize warm and cordial communications, creating
the name RedTacton. RedTacton is a new Human Area
Networking technology that uses the surface of the human
319
Fig. 3
VI. APPLICATIONS
Information recorded in the RedTacton device is sent to
the touched objects. Thereby, the following applications
are inhibited.
1) Personalization
1.1) Personalization of mobile phones,
1.2) Personalization of Automobiles
2) New Behavior patterns
2.1) Conferencing system
3) Security Applications
3.1) User verification and lock management at
entrance. It forms a replacement for biometric
systems and also the alternative for a secured
world
V. ANALYSIS
The results showed that the system had no significant
practical problems at a transmission speed of 10 Mbit/s.
Besides communications between two hands, we also
demonstrated reliable communication between a foot and
320
Fig. 5
Fig. 6
321
322
Author Index
A
Aanandha Saravanan, K.
Adarsh, R.
Alexzander, S.
Amal Raj, S.
Anandkumar Singh, H.
Anjugam, M.
Anupama, A.S.
Anusha Meenakshi, S.
Arun, V.R.
Arun Karthik Kani, P.
Ashok Kumar, J.
Ashwin Kumar, K.S.
Asif Iqbal, A.
Himanshu Joshi
7, 81, 155
283
205
4
239
248
290
138
307
287
185
304
287
B
Bala Aiswarya, R.
Balaji, R.
Balasathiya, D.
Baskaran, M.
Bharath Kumar, R.
Bharathi, C.R.
49
304
15
138
223, 283
103
C
Chandra Sekhar, N.
57
D
Deepa, D.
Devendran, A.
Dhivya, M.
Dinesh Kumar, C.K.
Divya Devi Mohan
Divya, R.
53
311
43
11
275
166
E
Elakkiya, E.
Ethiraj, S.
290
138
G
Gauthugesh, V.
Gayathri, R.
Gokul, B.
Gopala Krishnan, T.
Gowri, G.
Gowtham, S.
H
Hemanth Kumar, H.
43
107, 113
233
307
146
319
19
23
I
Ilakiya, R.
177
J
Janani, N.
Janani, S.
Jayanth, D.
Jhansi Alekhya, D.
Johnson, S.
252
255
11
168
192
K
Kalarani, G.
Kastro, A.
Kavitha, K.
Kavitha, M.
Kavitha, P.
Kavitha, R.
Kiran Mohan
Kousiya Shehannas, S.
Krishnakumar, D.
Krishnamoorthy, R.
Kumara swamy, G.
255, 275
7
146
257
290
87
319
168
28
81
213
L
Lalithkrishnan, H.
319
M
Malar Vizhi, K.
Manikandan, J.
Manohar, K.
Manthan Shah
Maragathavalli, P.
Maruti, A.M.V.N.
Mohanraj, J.
Murugan, V.
132
28
213
267
127
57
173
278, 314
N
Naga Jyothi, G.
Nagalalitha, C.
Naresh, C.
Naveena, S.
P
Parijatham, S.
Pooranapriya, K.
Porselvi, S.
323
100, 94
252
19
49, 53
252
195
37
Author Index
Prabhu, H.
Praveen, C.
Pravin Jadhav
Prem Kumar, V.
R
Radhika, K.
Raghavi, V.
Rahul Gopinath
Rajasekar, A.
Rakesh Raushan
Rama, R.
Ramakanth, A.
Ramanjaneyulu, D.V.S.
Ramesh, M.
Reenu Aradhya Surathy
S
Sai Smarana, C.
Sankara Gomathi
Sankeerthana, M.
Sanket Borhade
Sapna, S.
Saranya Devi, S.
Saranya, A.
Saravana Kumar, R.
Saravanan, J.
Sateesh Kedarnath Kumar, N.
Sathyasri, B.
Sayee Kumar, S.
Selvi, C.
Shanthi, V.
Sherly Sofie, C.I.
Sindhusha, V.
283
118
267
205
53
271
199
1
199
219
141
100, 94
1
275
255
76
278, 314
267
15
150
150
223
223, 287
141
155
228
298
103
76
278, 314
Sivakumar, S.
Sridhar, R.
Suganthy, M.
Sujitha, A.
Sundarapandian, V.
Suraj
Suresh, K.
Suresh, R.
Swati, G.
1
1
107, 113
188
257, 261
209
213
261
76
U
Uma, B.
Umamaheswari, T.
150
60
V
Valarmathi, A.
Vanaja, S.
Vanitha, T.
Venkatanadhan, G.
Venkataraman, N.L.
Venkateshwari, D.
Vignesh, M.
Vignesh, N.
Vigneshvar, G.D.
Vignesh Prasanna, N.
Vijay Gaikwad
Vijayarani, B.
Vinoth, K.
Vinoth, M.
Vivekanandan, R.
Y
Yuvaraj, M.
324
294
66
91
4
150
243
304
7, 81
307
155
267
179
11
209
168
233