A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Sastry, J. K. R.
- I2C Based Networking for Implementing Heterogeneous Microcontroller Based Distributed Embedded Systems
Authors
1 Department of Electronics and Computer Science Engineering, KL University, Vaddeswaram, Guntur District - 522502, Andhra Pradesh, IN
Source
Indian Journal of Science and Technology, Vol 8, No 15 (2015), Pagination:Abstract
Realising a distributed heterogeneous embedded system using I2C requires investigations and findings related to design of networking, architecture, message design and flow for prioritisation, and datagram design. The existing methods for effecting communication among the heterogeneous embedded systems interconnected through I2C communication system have not addressed the heterogeneity issues. To suffice, new methods for designing Heterogeneous Embedded networks, communication systems, message flow systems and the message design have presented. The methods have been applied to an existing distributed embedded system and the results obtained proved to be exact as required. Every distributed embedded system is different and the kind of Hardware and protocol conversions required is dependent on the type of distributed embedded system. It has been shown in the paper the kind of conversions that must be undertaken considering I2C as the communication method and a set of selected heterogeneous embedded systems that are used for developing an application that monitors and controls the temperatures within a Nuclear reactor system. The way the communication must be effected is dependent on the number of masters and the slaves that must be supported on the network. A communication system architecture that suits the pilot project has been presented. A design flow method which uses priority queues has been presented to effect the communication according to the flow required. The design of datagram required for effecting the communication has also been presented in the paper. The methods have been applied to an existing distributed heterogeneous embedded system that monitors and controls the temperatures with a Nuclear reactor system and the results have been found to be exact fulfilling all the application requirements.Keywords
Architecture, Distributed, Heterogeneous, Embedded, I2C, Message Flow.- Text to Speech Conversion
Authors
1 Department of CSE, K L University, Vaddeswarm, Guntur – 522502, Andhra Pradesh, IN
2 Department of ECM, K L University, Vaddeswarm, Guntur – 522502, Andhra Pradesh, IN
Source
Indian Journal of Science and Technology, Vol 9, No 38 (2016), Pagination:Abstract
The present paper has introduced an innovative, efficient and real-time cost beneficial technique that enables user to hear the contents of text images instead of reading through them. It combines the concept of Optical Character Recognition (OCR) and Text to Speech Synthesizer (TTS) in Raspberry pi. This kind of system helps visually impaired people to interact with computers effectively through vocal interface. Text Extraction from color images is a challenging task in computer vision. Text-to-Speech conversion is a method that scans and reads English alphabets and numbers that are in the image using OCR technique and changing it to voices. This paper describes the design, implementation and experimental results of the device. This device consists of two modules, image processing module and voice processing module. The device was developed based on Raspberry Pi v2 with 900 MHz processor speed.Keywords
Image Processing, OCR, Text Extraction, Text-to-speech, Voice Processing.- On Authorship Attribution of Telugu Text
Authors
1 Department of Computer Science, S.R.R.G.A.S.C. Karimnagar, Telangana, IN
2 Government Degree College for Women, Karimnagar - 505001, Telangana, IN
3 Department of ECM, K L University, Vijayawada - 522502, Andhra Pradesh, IN
4 Department of Computer Science and Engineering, JNTU, Hyderabad - 500085, Telangana, IN
Source
Indian Journal of Science and Technology, Vol 9, No 35 (2016), Pagination:Abstract
Background/Objectives: Authorship Attribution is one of the text classification methods. It is useful to find out the author with a given set of text based on author writing style. Methods/Statistical Analysis: Various methods that include Decision Tree, K-Nearest Neighbor, Naive Bayes and Support Vector Machine) have been used to find text patterns that exist within a text based database. The classification of the text patterns is deterministic whereas the authorship attribution to the text is un-deterministic. This paper presents a method that recognize a text pattern by using the authorship features using different phases of processing which include prior processing, extracting the features, feature selection, classifying the features and then finally leading to finding the author. Findings: The task of Authorship Attribution can be imposed to a range of exercises such as Scientific Analysis, Stealing Recognition and Authorship Recognition. Exploration in the part of Authorship Attribution is in view for more than 100 centuries, but the completed consequences were unacceptable. A range of provocations have been referred which include information collections, tokenizing of the content, applying Natural Language Tools, suitability of categorization methods and reorganization of a range of appearance which can discriminate one writer from the other writers. From the prevailing analysis, it can be concluded that the pronounced accruement are individual circumstance scene of situations, since it may not be useful to other consequences of Authorship Attribution associations. From the acquired inputs, it is recognized that the word “unigram” constituent acquired the finest record when assessed with all additional appearances for all classifiers. From among different classifiers, Support Vector Machine realized the best result when evaluated in conjunction with different classifiers such as Decision Tree, K-Nearest Neighbor and Naive Bayes classifiers. Application/Improvements: This authorship attribution method is used to find out authorship of vernacular language which in this case is TELUGU.Keywords
Natural Language Processing, Text Classification.- Authenticating Clients without using their Login IDs through Mind Metrics
Authors
1 Department of Electronics and Computer Engineering, K L University, Vaddeswaram - 522502, Guntur District, Andhra Pradesh, IN
Source
Indian Journal of Science and Technology, Vol 9, No 30 (2016), Pagination:Abstract
Background/Objectives: The main objective of this paper is to provide a novel method of identification and authentication of a user through a process of enhancing the password level protection to provide authorised use of the resources hosted on the WEB. Methods/Statistical Analysis: The authentication process that uses mind metrics has been implemented within ARM7 Micro controller which is made to act as central server. The process of authentication and the implementation of the same have been explained through an architectural diagram. Software which has been written using KEIL IDE is burnt into a Micro controller and the implementation of an authentication process has been implemented through a GSM device connected to a Micro controller. Findings: A novel approach that considers a Personnel secret token known as mind metrics has been presented. The server sends across the mind metrics to the user after completing the identification phase and the user from then uses password and mind metrics to carry secured communication between the user and the server. Applications/Improvements: The method has been implemented both as a software and hardware solution. The software solution has been implemented within a GSM application for enabling text message notification.Keywords
ARM, Authentication, KEIL IDE, Key Loggers, Login systems, Mind Metrics.- Camera based Text to Speech Conversion, Obstacle and Currency Detection for Blind Persons
Authors
1 Department of Electronics and Computer Engineering, KL University, Vaddeswaram - 522 502, Guntur District, Andhra Pradesh, IN
Source
Indian Journal of Science and Technology, Vol 9, No 30 (2016), Pagination:Abstract
Background/Objectives: The main object of this paper is to present an innovated system that can help the blind for handling currency. Methods/Statistical Analysis: Many image processing techniques have been used to scan the currency, remove the noise, mark the region of interest and convert the image into text and then to sound which can be heard by the blind. The entire system is implemented by using Raspberry Pi Micro controller based system. In the proto type model an IPR sensor is used instead of camera for sensing the object. Findings: In this paper a novel method has been presented using which one can recognize the object, mark the interesting region within the object, scan the text and convert the scanned text into binary characters through optical recognition. A second method has been presented using which the noise present in the scanned image is eliminated before characters are recognized. A third method that can be used to convert the recognised characters into e-speech through pattern matching has also be presented. Applications: An embedded system has been developed based on ARM technology which helps the blind persons to read the currency notes. All the methods presented in this paper have been implemented within an embedded application. The embedded board has been tested with different currency notes and the speech in English has been generated that identify the value of the currency. Further work can be done to generate the speech in different other both National and International Languages.Keywords
Camera based Detection for Blind Persons, Currency Detection, Raspberry Pi Board, Text to Speech Conversion.- Incorporating Implied Volatility in Pricing Options using Binomial Tree
Authors
1 KL University, Vaddeswaram, Guntur District - 522502, Andhra Pradesh, IN
2 JNTU Kakinada, Kakinada - 533003, Andhra Pradesh, IN
Source
Indian Journal of Science and Technology, Vol 9, No 17 (2016), Pagination:Abstract
Background/Objectives: The main objective of this paper is to present an n-step binomial model which can be used to price an option under any exotic conditions. Methods/Statistical Analysis: Mathematical models have been presented using which an n-step binomial model can be developed. The model can be used for estimating price of options under n of number exotic conditions that influence the option price. Findings: Pricing of exotic options like Asian, American etc., undertaken through Binomial Trees using only one-step considering maximum and minimum values that can be taken by the underling at the maturity leads to a rough approximation of the option price. The approximation is possible by assuming stock price movements to be in one or two binomial steps during the life of the option. A binomial tree extended to an N-step Model can be used to price various exotic options. A study of the convergence in European option price with respect to Number of steps (N) and variation in price of Asian and American options with respect to confidence factor (k) (proxy for implied volatility) using the maximum and minimum boundaries on the value of k gives the investors the ability to change the value of k so that they can have their own opinions concerning the risk-neutral probability distribution.Keywords
Binomial Tree, Implied Volatility, Pricing Options.- Pricing Options Considering Bankruptcy of Underlying Issuer
Authors
1 KL University, Vaddeswaram, Guntur District - 522502, Andhra Pradesh, IN
2 Jawaharlal Nehru Technological University, Kakinada - 533503, Andhra Pradesh, IN
Source
Indian Journal of Science and Technology, Vol 9, No 17 (2016), Pagination:Abstract
Background/Objectives: The main objective of this paper is to present a model that takes bankruptcy of the seller while calculating the risk involved in fixing the premium at which the underlying options are sold. Methods/Statistical Analysis: A mathematical model which is based on probability distribution have been presented in the paper that extends the binary decision tree model to include bankruptcy for assessing the risk in selling underlying option at premium. Findings: A novel method has been presented that extends the binomial tree for taking into account default probability of the seller. The model can be used by the option seller for computing the risks involved in fixing the premium at which the options can be sold. It has been observed that the option prices considering the bankruptcy are higher compared to the option prices without bankruptcy.Keywords
Bankruptcy, Pricing Option, Underlying Issuer- Performance Evaluation of Fractionally Spaced Constant Modulus Algorithm (FSCMA) in Relation to CMA (Constant Modulus Algorithm) Method for Blind Equalization of Wireless Signals
Authors
1 KL University, Vaddeswaram, Guntur District, IN
2 Andhra University, Visakhapatnam, IN
Source
International Journal of Advanced Networking and Applications, Vol 5, No 1 (2013), Pagination: 1818-1824Abstract
Wireless communication is being used for many purposes and has become very frequently used mode of communication. Blind equalization methods are being used to estimate the received signal without the necessity to use the trained sequences in the input. Many methods CMA (Constant Modulus Algorithm), FS-CMA (Fractionally spaced CMA), PC-CMA(Phase compensation CMA), MMA(Multi-Modulus Algorithms) are being used for blind equalization. However all the methods are affected due to Inter symbol interference (ISI) and Bit error rate(BER) in the transmission.It has been proved [9] that CMA performs reasonably well compared to LMS methods in the absence of trained sequences. However the method suffers from issues such as Partial spacing, non-phase compensation etc.
In this paper the performance evaluation of FS-CMA in comparison to CMA considering the model parameters at which the maximum performance can be achieved is presented. The performance of FS-CMA as against CMA in respect toInter Symbol interference ISI[1] and Bit error rate (BER), considering optimum parameters has also been presentedin this paper.