Refine your search
Collections
Co-Authors
Journals
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Dhanasekaran, R.
- Optimal Location and Improvement of Voltage Stability by UPFC using Genetic Algorithm (GA)
Abstract Views :247 |
PDF Views:0
Authors
Affiliations
1 Sri Krishna College of Technology, Kovaipudur, Coimbatore – 641008, Tamil Nadu, IN
2 Syed Ammal Engineering College, Ramanathapuram – 623502, Tamil Nadu, IN
1 Sri Krishna College of Technology, Kovaipudur, Coimbatore – 641008, Tamil Nadu, IN
2 Syed Ammal Engineering College, Ramanathapuram – 623502, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 8, No 11 (2015), Pagination:Abstract
Background/Objectives: This paper proposed the Optimal Location and Improvement of Voltage Stability in Electrical power transmission lines using Unified Power Flow Controller. Methods/Statistical Analysis: The optimization technique Genetic Algorithm is used to find the optimal location and rating of UPFC to improve the voltage stability of the system. The Unified Power Flow Controller is one of the important devices that are used to control the voltage magnitude and corresponding angle of sending end and receiving end bus. Results/Findings: Simulation has been implemented in MATLAB software and IEEE 39 bus system used. Conclusion/Application: The results shows that voltage profile is enhanced at buses and power losses are considerably decreased, minimization of power losses and minimization of generation cost. Thus it proves that the efficiency of GA is better than the conventional method.Keywords
FACTS - Flexible A.C. Transmission Systems, GA - Genetic Algorithm, UPFC - Unified Power Flow Controller- Design of Low EMI Power Supply using Resonant Converter
Abstract Views :151 |
PDF Views:0
Authors
G. Thiagu
1,
R. Dhanasekaran
2
Affiliations
1 Sathayabama University, Chennai, IN
2 Syed Ammal Engineering College, Ramanathapuram, IN
1 Sathayabama University, Chennai, IN
2 Syed Ammal Engineering College, Ramanathapuram, IN
Source
Indian Journal of Science and Technology, Vol 8, No 12 (2015), Pagination:Abstract
Objectives: There are several applications where even a temporary power failure can cause a great deal of public inconvenience leading to large economic losses. Methods/Analysis: In this paper the electrical power utilization will give an indirect idea of the economic growth of any country. For such critical loads, it is of paramount importance to provide an Uninterruptible Power Supply (UPS) system, as to maintain the continuity of supply in cases of power outage. Findings: Here a new UPS system with Unity Power Factor (UPF) and low Electro Magnetic Interference (EMI) has been proposed. The circuit diagram of the proposed scheme has been modeled and simulated in SIMULINK Block of the MATLAB software and the waveforms have been taken accordingly. These waveforms give a clear picture of the working and the advantages of the proposed method. Novelty of the study: The study presents a novel UPS with UPF and transformer separation by a high-frequency connectivity in the circuit. The theme was evolved for presenting a lower EMI for soft switching, besides, incorporating frequency content of switching waveforms, especially those related to the input and output of the UPS. Conclusion/Application: A 1 phase, 230V, 50Hz, simulation circuit, withstanding loading up to 3.2kW, has been presented, and the measurements indicate that lower EMI is possible, and a measurement of Power Factor of 0.996 was attained.Keywords
EMI, UPS, ZCS, ZVS, Noise- EMRCS: Efficient Multipath Routing based Cryptography Scheme in Wireless Sensor Networks
Abstract Views :140 |
PDF Views:3
Authors
Affiliations
1 Bharathiar University, Coimbatore, IN
2 Syed Ammal Engineering College, Ramanathapuram, IN
1 Bharathiar University, Coimbatore, IN
2 Syed Ammal Engineering College, Ramanathapuram, IN
Source
Wireless Communication, Vol 5, No 1 (2013), Pagination: 24-31Abstract
In Wireless Sensor Networks, Sensor nodes are controlled by either base station or without bases station. In our scheme, the sensor nodes do not depend on the base station. Once the sensor node sent a packet to the destination node, the residual energy is calculated through the multipath routing approach. There is a need of Secure and Energy based Routing in the wireless sensor network. This requirement may lead to a number of routing protocols which effectively use the limited resources available at the sensor nodes. Many routing protocols will attempt to find the efficient and secure multipath routing. In order to determine the secure and energy efficient routing, we proposed the Efficient Multipath Routing based Cryptography Scheme (EMRCS) which guard against the ciphertext attacks and all known attacks. In the first phase, we proposed multipath routing to improve the minimal energy consumption and network lifetime. In second phase, we used the concept of Elliptic Curve Integrated Encryption and Decryption Scheme to reduce the effect of attacks. In third phase, the energy consumption model is proposed. By simulation results, the proposed EMRCS achieves better delivery ratio, throughput, less delay and energy consumption in terms of mobility, time and number of nodes than the existing scheme SBYaoGG, AFTMR and NMRA.Keywords
Encryption, Decryption, Throughput, End to End Delay, Mobility, Communication Overhead, Network Lifetime, Delivery Ratio and Pause Time.- Effective Routing & Channel Assignment for Wireless Sensor Networks using Genetic Algorithm Approach
Abstract Views :141 |
PDF Views:3
Authors
Affiliations
1 Department of Electronics, Bharathiar University, Coimbatore, IN
2 Syed Ammal Engineering College, Ramanathapuram, IN
1 Department of Electronics, Bharathiar University, Coimbatore, IN
2 Syed Ammal Engineering College, Ramanathapuram, IN
Source
Networking and Communication Engineering, Vol 4, No 12 (2012), Pagination: 720-725Abstract
Concentration on achieving an optimized throughput by planning a Wireless Sensor Network (WSN) in such a way that user demands such as Coverage, Bandwidth & Mobility are satisfied.The technology implemented here is a Sensor Network, which provides broadband connectivity to mobile clients at the edge of the network. Hence we encode Wireless Sensor Networks with Genetic Algorithm (GA) which uses Genetic Operators such as Crossover & Mutation Process. To obtain effective routing and channel assignment in the network 1-point, 2-point and uniform crossover techniques implemented with the generation of individuals.
Keywords
Population, Cross Over, Mutation, Throughput.- Segmentation of Brain Tumor on MRI Images Using Modified GVF Snake Model
Abstract Views :137 |
PDF Views:3
Authors
Affiliations
1 RVS College of Engineering & Technology, ECE Department, Coimbatore, IN
2 Syed Ammal Engineering College, Ramanathpuram, Coimbatore, IN
1 RVS College of Engineering & Technology, ECE Department, Coimbatore, IN
2 Syed Ammal Engineering College, Ramanathpuram, Coimbatore, IN
Source
Digital Image Processing, Vol 3, No 16 (2011), Pagination: 1076-1078Abstract
Medical image segmentation is the most important process and research focus in the medical image processing field. Snakes, or active contours, are used extensively in computer vision and image processing applications, particularly to locate object boundaries. In this paper the gradient vector flow (GVF) snake model is modified with thinning canny edge detection is used for brain tumor segmentation. The thinning canny operator is used to calculate the edge map gradient for GVF snake model. Then the GVF deforms with initial contour. Simulation results show that the GVF model with thinning canny operator can extract the boundary of brain tumor accurately. This method can overcome the problem that traditional snake cannot have efficient converge to the weak boundary.Keywords
GVF Snake, Segmentation, Brain Tumor, Deformable Model.- A Survey on Image Segmentation Techniques for Medical Images
Abstract Views :154 |
PDF Views:3
Authors
Affiliations
1 RVS College of Engg. &Technology, ECE Department, Coimbatore, IN
2 Department of ECE, Nehru Institute of Engineering and Technology, Coimbatore, IN
1 RVS College of Engg. &Technology, ECE Department, Coimbatore, IN
2 Department of ECE, Nehru Institute of Engineering and Technology, Coimbatore, IN
Source
Digital Image Processing, Vol 1, No 1 (2009), Pagination: 21-26Abstract
Image segmentation is one of the primary steps in image analysis for object identification. The main aim is to recognise homogeneous regions within an image as distinct and belonging to different objects Image segmentation plays a crucial role in many medical imaging applications by automating or facilitating the delineation of anatomical structures and other regions of interest. We present herein a critical appraisal of the current status of semi-automated and automated methods for the segmentation of anatomical medical images. We conclude with a discussion on the future of image segmentation methods in biomedical research.Keywords
Medical Imaging, Classification, Deformable Models, Magnetic Resonance Imaging.- Stress and Failure Analysis of a Second Stage Sun Gear in Planetary Gearbox
Abstract Views :159 |
PDF Views:0
Authors
Affiliations
1 K. S. Rangasamy College of Technology, Tiruchengode, IN
2 K. S. R College of Engg., Tiruchengode, IN
1 K. S. Rangasamy College of Technology, Tiruchengode, IN
2 K. S. R College of Engg., Tiruchengode, IN
Source
Manufacturing Technology Today, Vol 9, No 4 (2010), Pagination: 3-7Abstract
Sun gear is one of the most important elements used in planetary gearbox. This paper describes the detailed bending and contact stress analysis and failure analysis on the failed second stage sun gear. The possible failure reasons were analyzed. Insufficient heat treatment of the sun gear could have also resulted in a lower endurance limit of the sun gear case region than that possible in the chosen sun gear material. Chemical analysis was found that the alloy is 15 Ni Cr1 Mo12. The hardness distribution across the sun gear tooth thickness at the pitch line was measured with 100 gm load. The carburized case depth was found to be about 0.7 mm where hardness reaches a value of 632.1 HV. The presence of retained austenite is higher near the surface. This retained austenite may weaken the surface. Scanning electron microscope (SEM) result indicates the critical pitting area is located in the surrounding area of the pitch line.Keywords
Stress Analysis, Failure Analysis, Pitting, Retained Austenite.- A Review On Construction Methods For Regular And Non-Quasi Cyclic LDPC Codes
Abstract Views :193 |
PDF Views:0
Authors
Affiliations
1 Department of Electronics and Communication Engineering, Mohamed Sathak Engineering College, IN
2 Department of Electrical and Electronics Engineering, Syed Ammal Engineering College, IN
1 Department of Electronics and Communication Engineering, Mohamed Sathak Engineering College, IN
2 Department of Electrical and Electronics Engineering, Syed Ammal Engineering College, IN
Source
ICTACT Journal on Communication Technology, Vol 10, No 3 (2019), Pagination: 2024-2029Abstract
Low Density Parity Check (LDPC) codes are one of the most powerful error correction codes available today. Its Shannon capability that closely matches performance and lower decoding complexity has made them the best choice for many wired and wireless applications. This Paper provides an overview of the LDPC codes and compares the Gallager method, the Reed-Solomon-based algebraic method, and the combinatorial Progressive Growth (PEG) method for constructing regular LDPC codes and also Overlapped and Modified overlapped message passing algorithm for Non-Quasi Cyclic(NQC) LDPC codes.Keywords
Low-Density Parity-Check (LDPC) Codes, Reed-Solomon (RS) Codes, SPA, Tanner Graph, Progressive Edge Growth (PEG), Message Passing, Non-Quasi Cyclic (NQC).References
- R. Gallager, “Low-Density Parity-Check Codes”, IRE Transactions on Information Theory, Vol. 8, No. 1, pp. 2128, 1962.
- Shu Lin and Costello, “Error Control Coding”, Pearson Prentice Hall, 2004.
- Othman O. Khalifa, Sheroz khan, Mohamad Zaid and Muhamad Nawawi, “Performance Evaluation of Low Density Parity Check Codes”, International Journal of Computer Science and Engineering, Vol. 1, No. 4, pp. 6770, 2013.
- Ivana Djurdjevic, Jun Xu, Khaled Abdel-Ghaffar and Shu Lin, “A Class of Low-Density Parity-Check Codes Constructed Based on Reed-Solomon Codes with Two Information Symbols”, IEEE Communication Letters, Vol. 7, No. 7, pp. 317-319, 2003.
- C.E. Shannon, “A Mathematical Theory of Communication”, The Bell System Technical Journal, Vol. 27, No. 3, pp. 623-656, 1948.
- S.Y. Chung, G. D. Forney,T.J. Richardson and R. Urbanke, “On the Design of Low-Density Parity-Check Codes within 0.0045 dB of the Shannon Limit”, IEEE Communication Letters., Vol. 5, No. 3, pp. 58-60, 2001.
- J. C. MacKay, “Good Error-Correcting Codes Based on very Sparse Matrices”, IEEE Transactions on Information Theory, Vol. 45, No. 2, pp. 399-432, 1999.
- T. Richardson and R. Urbanke, “Modern Coding Theory”, Cambridge Press, 2003.
- Angelos D. Liveris, Zixiang Xiong and Costas N. Georghiades, “Compression of Binary Sources with Side Information at the Decoder Using LDPC Codes”, IEEE Communications Letters, Vol. 6, No. 10, pp. 440-442, 2002.
- Xiao Yu Hu, Evangelos Eleftheriou and Dieter M. Arnold, “Regular and Irregular Progressive Edge-Growth Tanner Graphs”, IEEE Transactions on Information Theory, Vol. 51, No. 1, pp. 386-398, 2005.
- R.C. Baumann, “Radiation-Induced Soft Errors in Advanced Semiconductor Technologies”, IEEE Transactions on Device and Materials Reliability, Vol. 5, No. 3, pp. 301-316, 2005.
- M.A. Bajura, Y. Boulghassoul, R. Naseer, S. DasGupta, A.F.Witulski, J. Sondeen, S.D. Stansberry, J. Draper, L.W. Massengill and J.N. Damoulakis, “Models and Algorithmic Limits for an ECC-Based Approach to Hardening Sub-100nm SRAMs”, IEEE Transactions on Nuclear Science, Vol. 54, No. 4, pp. 935-945, 2007.
- H. Naeimi and A. Dehon, “Fault-Secure Encoder and Decoder for Memory Applications”, Proceedings of IEEE International Symposium on Defect and Fault-Tolerance in VLSI Systems, pp. 409-417, 2007.
- T.Y. Chen, K. Vakilinia, D. Divsalar and R.D. Wesel, “Protograph based Raptor-like LDPC Codes”, IEEE Transactions on Communications, Vol. 63, No. 5, pp. 15221532, 2015.
- S. Myung, S.I. Park, K.J. Kim, J.Y. Lee, S. Kwon and J. Kim, “Offset and Normalized Min-Sum Algorithms for ATSC 3.0 LDPC Decoder”, IEEE Transactions on Broadcasting, Vol. 63, No. 4, pp. 734-739, 2017.
- Y. Xu, L. Szczecinski, B. Rong, F. Labeau, D. He, Y. Wu and W. Zhang, “Variable LLR Scaling in Min-Sum decoding for Irregular LDPC Codes”, IEEE Transactions on Broadcasting, Vol. 60, No. 4, pp. 606-613, 2014.
- F. Alberge, “Min-Sum Decoding of Irregular LDPC Codes with Adaptive Scaling based on Mutual Information”, Proceedings of IEEE International Symposium on Turbo Codes and Iterative Information Processing, pp. 71-75, 2016.