A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Saravanan, M.
- Applying PBL to a Course on Measurements & Instrumentation - Case Study of Speed Sensing
Authors
1 Dept of ECE, BEC, A.P., IN
2 Dept. of ECE, SITAMS, A.P., IN
3 Dept of EIE, VRSEC, A.P., IN
4 Dept. of EIE, SVEC, A.P., IN
Source
Journal of Engineering Education Transformations, Vol 35, No 1 (2021), Pagination: 88-101Abstract
This paper presents application of Project Based Learning – PBL using design, simulation, and construction of hardware/software modules for Speed Measurement. Speed Measurement setup had been developed for demonstration in theory, laboratories and project demos for academia in measurements & instrumentation courses. A traditional measurement setup-Stroboscope that is commonly used for demonstration in laboratories is presented to serve as a base for comparison. The proposed speed measurement for laboratory is envisioned based on counting the number of state changes of a sensing switch. Different approaches and possibilities are discussed that could be implemented in student's education. This approach is aimed at increasing knowledge, skill levels of students and help in using theoretical knowledge for application to practical & real-world problems. It also presents opportunities in instilling design thinking, skill development, integration and team work. Models based on only Software and ones that include hardware are presented for simulation & actual measurement. National Instruments – NI's software - LabVIEW, Multisim & hardware - myRIO & ELVIS ii+ are used for demonstrating different models presented here.Keywords
Measurement, Instrumentation, LabVIEW, myRIO, ELVIS, Multisim, Project Based Learning.References
- Clive L. Dym, Alice M. Agogino, Ozgur Eris, Daniel D. Frey, Larry J. Leifer, (2005), Engineering Design Thinking, Teaching and Learning, J Eng Edu, Volume 94, Issue 1, pp 103-120, https://doi.org/10.1002/j.21689830.2005.tb00832.x.
- Julio Garcia, Patricia Backer, (2007) “Assessment of LabVIEW and Multisim in the delivery of Electronics Laboratory Content”, ASEE, AC2007-235. Pp 12.286.1 – 12.286.16.
- S. J. du Preez , S. Sinha , M. Hutton, (2007), “A LabVIEW courseware customized for precollege learners”, AFRICON 2007, 10.1109/AFRCON.2007.4401571
- Professor Barry Paton, (2009), Introduction to NI ELVISII, Multisim and LabVIEW, Dalhousie University, 323777D-01.
- Ed Doering, (2014), NI myRIO Project Essentials Guide.
- NI, (2003), LabVIEW Measurements Manual, 322661B-01.
- M.Srikanth, Santosh Kumar, N.Gireesh, T. Manideep, B. Hari Chandana, K. Sangeetha, (2019), “A different way of Level Measurement for PBL in Education of students through NI LabVIEW, Multisim & myRIO”, Presented at iPACT 2019 conference Vellore, DOI – 10.1109/i-PACT44901.2019. 8960023.
- Antonio de la Piedra, An Braeken, Abdellah Touhafi, (2012), Sensor Systems based on FPGAs and their applications: A Survey, J. Sensors, ISSN 1424-8220, DOI – 10.3390/s120912235.
- Marina Miranda, Almudena da Costa, Jorge Castro, Angela Saiz-Linares, (2019), A Case study of PBL activity implemented in a Geotechnical Engg course, Proceedings of EDULEARN 19 Conference Spain, pp. 28782883.
- A Noriega, J.M. Sierra, J.L. Cortizo, M.J.
- Prieto, F.F. Linera, J.A. Martin, (2018), Project Based Learning applied to Mechatronics teaching, pp 49-56, New Trends in Educational Activity in the Field of Mechanism and Machine Theory.
- Rocio Garcia, Fernando Diaz-del-Rio, Satirnino Vicente-Diaz, Alejandro LinaresBarranco, (2009), An eLearning standard approach for supporting PBL in computer Engineering, J.Trans. Edu, Vol 52, No 3, pp 328-339, 10.1109/TE.2008.928220.
- Wei Zhan, Jay R Porter, Joseph A Morgan, (2014), Experimental Learning of Digital Communication using LabVIEW, J. Trans. Edu Vol 57, No. 1, pp 34-41, 10.1109/TE.2013.2264059.
- Akash Kumar, Shakith Fernando, Rajesh C Panicker, (2013), PBL in Embedded Systems Education using an FPGA Platform, J. Tans. Edu, Vol 56, No 4, pp 407-415, 10.1109/TE.2013.2246568.
- M.C Rodriguez-Sanchez, Angel Torrado Carvajal, Joaquin Vaquero, Susana Borromeo, Juan A Hernande, (2016), An Embedded Systems course for Engineering students using open source platforms in wireless scenarios, J. Trans. Edu, Vol 59, Issue 4, pp 248-254, 10.1109/TE.2016.2526676.
- Archana Mantri, Sunil Dutt, J.P Gupta, Madhu Chitkara, (2008), Design and Evaluation of PBL based course in Analog Electronics, J. Trans. Edu, Vol 51, No 4, PP 432-438, 10.1109/TE.2007.912525.
- Houcine Hassan, Carlos Dominguez, Juan Miguel Martinex, Angel Perles, Juan Vicente Capella, Jose Albal ad ejo, (2015), A Multidisciplinary PBL robot control project in Automation and Electronics Engineering, J. Trans. Edu, Vol 58, No 3, pp. 167-172, 10.1109/TE.2014.2348538.
- Isidro Calvo, Itziar Cabanes, Jeronimo Quesada, Oscar Barambones, (2108), A multidisciplinary PBL approach for teaching industrial informatics and robotics in engineering, Vol. 61, No 1, pp 21-28, 10.1109/TE.2017.2721907.
- Gimenez G, De Castro R, Key, (2019), Aspects for an effective implementation of PBL: experience in engineering studies, presented at 13 International conference th on Industrial Engineering and Industrial Management, Spain.
- Ayala L Ribeiro, Roberto A Bittencourt, (2019), A case study of an integrated programming course based on PBL, presented at 2019 IEEE Frontiers in Education confe rence, 10.1109/FIE43999.2019.9028579.
- Simone C dos Santos, Eden Santana, Lucas Santana, Pedro Rossi, Lucas Cardoso, Ulayne Fernandes, Claudio Carvalho, Pedro Torres, (2018), Applying PBL in teaching programming: an experience report, presented at 2018 IEEE Frontiers in Education Conference, 10.1109/FIE.2018.8658978.
- Joshua C. Nwokeji, Faisal Aqlan, Ayodele Olagunju, Terry Holmes, Nkeiruka C. Okolie, (2018), WIP: Implementing Project Based Learning: Some challenges from a Requirements Engineering Perspective, presented at 48th Frontiers in Education Conference, FIE 2018, San Jose, United States, 10.1109/FIE.2018.8659307.
- NI (2006), LabVIEW Basics I Intro Course Manual, 320628P-01.
- NI (2006), LabVIEW Basics II Dev Course Manual, 320629P-01
- Comparative Study on Extraction of Keywords Using Salton Buckley and Clustering of Correlation
Authors
1 Bharathiyar University, IN
2 Sri Ramakrishna Mission Vidyalaya College of Arts & Science, Coimbatore, IN
Source
Data Mining and Knowledge Engineering, Vol 5, No 2 (2013), Pagination: 62-65Abstract
Keywords are index terms that contain most important information. Keyword extraction is considered as the processing for text documents. Keyword extraction is a process by which a short list of keywords is extracted out from the documents. This brings the advantage of reaching the information sources in a quick way. In this paper, keywords are extracted from the document collections to improve the effectiveness of Information Retrieval. Keyword extraction can help people quickly find hot spots on the web, since keywords in a document provide important information about the content of the document. We develop a keyword extraction method using correlation and Salton Buckley method. Documents containing keywords are identified in correlation are better than Salton Buckley method. Experimental result carries out the performance of best way extraction of keywords.Keywords
Classification, Clustering, Correlation, Salton Buckley.- Recognition of Handwritten Tamil Characters Using Statistical Classifiers
Authors
1 Department of Computer Science and Engineering, R.M.K Engineering College, Kavaraipettai, TamilNadu, IN
Source
Biometrics and Bioinformatics, Vol 2, No 7 (2010), Pagination: 125-135Abstract
This paper describes a system to recognize handwritten Tamil characters using statistical classifier approach, for a subset of the Tamil alphabet. The process of handwriting recognition involves extraction of some defined characteristics called features to classify an unknown handwritten character into one of the known classes. A typical handwriting recognition system consists of several steps, namely: preprocessing, segmentation, feature extraction and recognition. Data input (the hand written Tamil character) were collected from different writers on A4 sized documents. They were scanned using a flat-bed scanner at a resolution of 100 dpi and stored as 256-bit color scale images. We trained the system with 500 characters belonging to 10 characters. The testing data contained a separate set of 50 characters. A training data was used to test the system, to see how well the system represents the data it has been trained on. In the test set, a recognition rate of 90% was achieved.
Keywords
Preprocessing, Segmentation, Feature Extraction, Character Recognition.- Strengthening Encryption Secrecy for Private Search Using Fully Homomorphic Encryption
Authors
1 Department of Computer Science and Engineering, K. Ramakrishnan College of Engineering, IN
2 Department of Computer Science and Engineering, Sri Ramakrishna College of Engineering, IN
Source
ICTACT Journal on Communication Technology, Vol 7, No 1 (2016), Pagination: 1255-1260Abstract
A system for private searching on streaming data, allows client to send the encrypted search query to the remote server. The server uses the encrypted query on a stream of documents and returns the matching documents to the client without revealing the features of the query. A novel technique for private searching on streaming data is proposed which is based on keyword frequency that is the number of times that a keyword appears in the document is required to be higher or lower than a given threshold. This form of query searching can help the client in locating more related documents. Using fully homomorphic encryption techniques, the server can perform search for retrieving the related documents even though the search query is in encrypted form. Our scheme provides number of vital benefits for the client. They provide provable secrecy for encryption, in the view that the untrusted server cannot gather any information about the plaintext. They also reinforce hidden queries, so that the client may ask the remote server to search for a secret word without revealing the word to the server.Keywords
Homomorphic Encryption, Private Searching on Streaming Data, Trusted Security, Query Search, Efficient Retrieval.- Detection of Breast Cancer by Ultrasonic Image using Wavelet Transforms
Authors
1 School of Advanced Sciences, VIT University, Tamil Nadu, IN
2 School of Electrical Engineering, VIT University, Tamil Nadu, IN
Source
Research Journal of Pharmacy and Technology, Vol 10, No 3 (2017), Pagination: 839-842Abstract
This paper presents the approaches which are applied to develop the wavelet transformations from the ultrasonic image or sonographic image of breast cancer. We propose a result to implement feature extraction technique using the 2D-DWT and expressed the result using histogram.Keywords
Breast Cancer, Ultrasonic Image, Wavelet Transformation.- A Low Cost Hardware Based Fall Detection and Call for Help System for Elderly Person
Authors
1 PG Scholar, Dept. of ECE, IFET College of Engineering, Villupuram, Tamil Nadu,, IN
2 Associate Professor, Dept. of ECE, IFET College of Engineering, Villupuram, Tamil Nadu, IN
Source
Indian Journal of Public Health Research & Development, Vol 11, No 2 (2020), Pagination: 399-405Abstract
Context: Aging is common for a Human being. Especially an old aged person needs attention due to weakening in their physical capability. Fall is one of the major problems faced by elderly persons during their daily day activities. Falls are caused due to accident, loss of consciousness. Fall poses a serious impact on health issues of an elderly person. Fall detection is one of the necessary actions to be taken. So the fall detection system is needed. Thereby here the development of the system includes methodology based on sensor-video integration technology. The event of fall occurrence can be detected using the sensor as well as the camera and the acquired information is sent as messages and live video feed to the user in case of emergency through making use of Wi-Fi technology.Keywords
Accelerometer Sensor, Camera, Video, Emergency, Wi-Fi, Message, Fall Detection.- Energy Efficient and Secure Data Transmission using Cooperative Routing in Networks
Authors
1 Department of Computer Science and Engineering, KPR Institute of Engineering and Technology, IN
2 Department of Computer Science and Engineering, Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology, IN
3 Department of Computer Science Engineering, Balaji Institute of Technology and Science, IN
Source
ICTACT Journal on Communication Technology, Vol 11, No 1 (2020), Pagination: 2115-2120Abstract
Wireless Sensor Networks (WSNs) are emerging as a promising technology because of their wide range of applications in industrial, environmental monitoring, military and civilian domains. Due to economic considerations, the nodes are usually simple and low cost. They are often unattended, however, and are hence likely to suffer from different types of novel attack. WSNs are increasingly being deployed in security-critical applications. Due to their inherent resource-constrained characteristics, they are prone to various security attacks, and a black hole attack is a type of attack that seriously affects data collection. In this paper, using the recent advances in uncertain reasoning that has originated from the artificial intelligence community, we propose a trust management scheme named Hybrid and Efficient Intrusion Detection Systems that enhances the security in networks. Here, we have used two frameworks for Trust Calculation and Decision Making process. The trust value is derived using Bayesian Inference, and Decision Making is based on Dempster-Shafer theory, which is a mathematical theory of evidence.Keywords
WSN, Dempster-Shafer Theory, Intrusion Detection System, Artificial Intelligence.References
- S. Shakkottai, X. Liu and R. Srikant, “The Multicast Capacity of Large Multihop Wireless Networks”, IEEE/ACM Transactions on Networking, Vol. 18, No. 5, pp. 1691-1700, 2010.
- Z. Qian, X. Tian, X. Chen, W. Huang and X. Wang, “Multicast Capacity in MANET with Infrastructure Support”, IEEE Transactions on Parallel and Distributed Systems, Vol. 25, No. 7, pp. 1808-1818, 2014.
- Z. Li, C. Wang, C. Jiang and X. Li, “Multicast Capacity Scaling for Inhomogeneous Mobile Ad Hoc Networks”, Ad Hoc Networks, Vol. 11, No. 1, pp. 29-38, 2013.
- S. Zhou and L. Ying, “On Delay Constrained Multicast Capacity of Largescale Mobile Ad-Hoc Networks”, Proceedings of International Conference on Communications and Networks, pp. 1-7, 2010.
- J.P. Jeong, T. He and D.H.C. Du, “TMA: Trajectory-based Multicast Forwarding for Efficient Multicast Data Delivery in Vehicular Networks”, Computer Networks, Vol. 57, No. 13, pp. 662-672, 2013.
- X. Ge, J. Yang, H. Gharavi and Y. Sun, “Energy Efficiency Challenges of 5G Small Cell Networks”, IEEE Communications Magazine, Vol. 55, No. 5, pp. 184-191, 2017.
- T. Han, X. Ge, L. Wang, K.S. Kwak, Y. Han and X. Liu, “5G Converged Cell-Less Communications in Smart Cities”, IEEE Communications Magazine, Vol. 55, No. 3, pp. 44-50, 2017.
- X. Ge, S. Tu, G. Mao, C. Wang and T. Han, “5G Ultra-Dense Cellular Networks”, IEEE Wireless Communications, Vol. 23, No. 1, pp. 72-79, 2016.
- Z. Su, Q. Xu, Y. Hui, M. Wen and S. Guo, “A Game Theoretic Approach to Parked Vehicle Assisted Content Delivery in Vehicular Ad Hoc Networks”, IEEE Transactions on Vehicular Technology, Vol. 66, No. 7, pp. 6461-6474, 2016.
- B. Yang, Y. Cai, Y. Chen and X. Jiang, “On the Exact Multicast Delay in Mobile Ad Hoc Networks with F-Cast Relay”, Ad Hoc Networks, Vol. 33, pp. 71-86, 2015.
- X. Wang, W. Huang, S. Wang, J. Zhang and C. Hu, “Delay and Capacity Tradeoff Analysis for Motioncast”, IEEE/ACM Transactions on Networking, Vol. 19, No. 5, pp. 1354-1367, 2011.
- C. Hu, X. Wang and F. Wu, “Motioncast: On the Capacity and Delay Tradeoffs”, Proceedings of 10th ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp. 18-21, 2009.