Search results for: Manvender Kaur Sarjit Singh
985 A Survey of Attacks and Security Requirements in Wireless Sensor Networks
Authors: Vishnu Pratap Singh Kirar
Abstract:
Wireless sensor network (WSN) is a network of many interconnected networked systems, they equipped with energy resources and they are used to detect other physical characteristics. On WSN, there are many researches are performed in past decades. WSN applicable in many security systems govern by military and in many civilian related applications. Thus, the security of WSN gets attention of researchers and gives an opportunity for many future aspects. Still, there are many other issues are related to deployment and overall coverage, scalability, size, energy efficiency, quality of service (QoS), computational power and many more. In this paper we discus about various applications and security related issue and requirements of WSN.Keywords: wireless sensor network (WSN), wireless network attacks, wireless network security, security requirements
Procedia PDF Downloads 491984 Multi-Level Clustering Based Congestion Control Protocol for Cyber Physical Systems
Authors: Manpreet Kaur, Amita Rani, Sanjay Kumar
Abstract:
The Internet of Things (IoT), a cyber-physical paradigm, allows a large number of devices to connect and send the sensory data in the network simultaneously. This tremendous amount of data generated leads to very high network load consequently resulting in network congestion. It further amounts to frequent loss of useful information and depletion of significant amount of nodes’ energy. Therefore, there is a need to control congestion in IoT so as to prolong network lifetime and improve the quality of service (QoS). Hence, we propose a two-level clustering based routing algorithm considering congestion score and packet priority metrics that focus on minimizing the network congestion. In the proposed Priority based Congestion Control (PBCC) protocol the sensor nodes in IoT network form clusters that reduces the amount of traffic and the nodes are prioritized to emphasize important data. Simultaneously, a congestion score determines the occurrence of congestion at a particular node. The proposed protocol outperforms the existing Packet Discard Network Clustering (PDNC) protocol in terms of buffer size, packet transmission range, network region and number of nodes, under various simulation scenarios.Keywords: internet of things, cyber-physical systems, congestion control, priority, transmission rate
Procedia PDF Downloads 308983 Seasonal Variation in Aerosols Characteristics over Ahmedabad
Authors: Devansh Desai, Chamandeep Kaur, Nirmal Kullu, George Christopher
Abstract:
Study of aerosols has become very important tool in assuming the climatic changes over a region.Spectral and temporal variability’s in aerosol optical depth(AOD) and size distribution are investigated using ground base measurements over Ahmedabad during the months of January(2013) to may (2013). Angstrom coefficient (ἁ) was found to be higher in winter season (January to march) indicating the dominance of fine mode aerosol concentration over Ahmedabad, and the Angstrom coefficient (ἁ) was found to be lower indicating the dominance of coarse mode aerosol concentration over Ahmedabad. The different values of alpha are observed when calculated over different wavelength ranges indicating bimodal aerosol size distribution. Discrimination of aerosol size during different seasons is made using the coefficient of polynomial fit (ἁ1 and ἁ2) which shows the presence of changing dominant aerosol types as a function of season over Ahmedabad. The ἁ2- ἁ1 value is used to get the confirmation on the dominant aerosol mode over Ahmedabad in both seasons. During pre-monsoon about 90% of AOD spectra is dominated by coarse mode aerosols and during winter about 60% of AOD spectra is dominated by fine mode aerosols. This characterization of aerosols is important in assessing the response of different aerosols type in radiative forcing and over climate of Ahmedabad.Keywords: radiative forcing, aerosol optical depth, fine mode, coarse mode
Procedia PDF Downloads 499982 Detecting Venomous Files in IDS Using an Approach Based on Data Mining Algorithm
Authors: Sukhleen Kaur
Abstract:
In security groundwork, Intrusion Detection System (IDS) has become an important component. The IDS has received increasing attention in recent years. IDS is one of the effective way to detect different kinds of attacks and malicious codes in a network and help us to secure the network. Data mining techniques can be implemented to IDS, which analyses the large amount of data and gives better results. Data mining can contribute to improving intrusion detection by adding a level of focus to anomaly detection. So far the study has been carried out on finding the attacks but this paper detects the malicious files. Some intruders do not attack directly, but they hide some harmful code inside the files or may corrupt those file and attack the system. These files are detected according to some defined parameters which will form two lists of files as normal files and harmful files. After that data mining will be performed. In this paper a hybrid classifier has been used via Naive Bayes and Ripper classification methods. The results show how the uploaded file in the database will be tested against the parameters and then it is characterised as either normal or harmful file and after that the mining is performed. Moreover, when a user tries to mine on harmful file it will generate an exception that mining cannot be made on corrupted or harmful files.Keywords: data mining, association, classification, clustering, decision tree, intrusion detection system, misuse detection, anomaly detection, naive Bayes, ripper
Procedia PDF Downloads 414981 Antioxidant Potential of Methanolic Extracts of Four Indian Aromatic Plants
Authors: Harleen Kaur, Richa
Abstract:
Plants produce a large variety of secondary metabolites. Phenolics are the compounds that contain hydroxyl functional group on an aromatic ring. These are chemically heterogeneous compounds. Some are soluble only in organic solvents, some are water soluble and others are large insoluble polymers. Flavonoids are one of the largest classes of plant phenolics. The carbon skeleton of a flavonoid contains 15 carbons arranged in two aromatic rings connected by a three carbon ridge. Both phenolics and flavonoids are good natural antioxidants. Four Indian aromatic plants were selected for the study i.e, Achillea species, Jasminum primulinum, Leucas cephalotes and Leonotis nepetaefolia. All the plant species were collected from Chail region of Himachal Pradesh, India. The identifying features and anatomical studies were done of the part containing the essential oils. Phenolic cotent was estimated by Folin Ciocalteu’s method and flavonoids content by aluminium chloride method. Antioxidant property was checked by using DPPH method. Maximum antioxidant potential was found in Achillea species, followed by Leonotis nepetaefolia, Jaminum primulinum and Leucas cephalotes. Phenolics and flavonoids are important compounds that serve as defences against herbivores and pathogens. Others function in attracting pollinators and absorbing harmful radiations.Keywords: antioxidants, DPPH, flavonoids, phenolics
Procedia PDF Downloads 347980 Edge Detection in Low Contrast Images
Authors: Koushlendra Kumar Singh, Manish Kumar Bajpai, Rajesh K. Pandey
Abstract:
The edges of low contrast images are not clearly distinguishable to the human eye. It is difficult to find the edges and boundaries in it. The present work encompasses a new approach for low contrast images. The Chebyshev polynomial based fractional order filter has been used for filtering operation on an image. The preprocessing has been performed by this filter on the input image. Laplacian of Gaussian method has been applied on preprocessed image for edge detection. The algorithm has been tested on two test images.Keywords: low contrast image, fractional order differentiator, Laplacian of Gaussian (LoG) method, chebyshev polynomial
Procedia PDF Downloads 635979 Synthesis and Pharmacological Activity of Some Oxyindole Derivatives
Authors: Vivek Singh Bhadauria, Abhishek Pandey
Abstract:
Indole-2,3-diones are known for their various biological activities. By suitable control of a substituent, different novel indole-2,3-diones were synthesized. In this present study, various Schiff and Mannich bases were synthesized and characterized, and evaluated their for different pharmacological activities. The compounds were prepared by reacting indole-2,3-dione with benzyl chloride and 4-substituted thiosemicarbazides. All the synthesized compounds were characterized by the TLC, MP, Elemental analysis, FTIR, 1H-NMR and Mass spectroscopy. The compounds have been evaluated for their anticancer, antituberculosis, anticonvulsant, antiinflammatory as well as anti-SARS activity and the results are presented. Some of compounds possessed different pharmacological activity at a concentration of 200 mg/kg body weight and even at lower concentration.Keywords: indoles, isatin, NMR, biological activities
Procedia PDF Downloads 355978 Acute Exposure Of Two Classes Of Fungicides And Its Effects On Hematological Indices Of Fish (Clarius batrachus) - A Comparative Study
Authors: Pallavi Srivastava, Ajay Singh
Abstract:
Hematological assay has used for evaluation of blood changes according to its environment. It’s studies employed to evaluate possible eco-toxic risk due to the exposure of chemicals and pesticides in aquatic organisms. Fishes serve as a sensitive bio-indicator, as changes occur in its surrounding environment. The aim of present study has two-folds first we observed that after exposure of two doses of each class of fungicide i.e. 1.11mg/l, 2.23mg/l for Propiconazole and 11.43mg/l, 22.87mg/l for Mancozeb show maximum blood changes. Second we conclude that toxic effects and blood changes induced by Propiconazole is greater than Mancozeb.Keywords: hematological assay, fungicides, bio-indicator, eco-toxic risk
Procedia PDF Downloads 408977 A Modified QuEChERS Method Using Activated Carbon Fibers as r-DSPE Sorbent for Sample Cleanup: Application to Pesticides Residues Analysis in Food Commodities Using GC-MS/MS
Authors: Anshuman Srivastava, Shiv Singh, Sheelendra Pratap Singh
Abstract:
A simple, sensitive and effective gas chromatography tandem mass spectrometry (GC-MS/MS) method was developed for simultaneous analysis of multi pesticide residues (organophosphate, organochlorines, synthetic pyrethroids and herbicides) in food commodities using phenolic resin based activated carbon fibers (ACFs) as reversed-dispersive solid phase extraction (r-DSPE) sorbent in modified QuEChERS (Quick Easy Cheap Effective Rugged Safe) method. The acetonitrile-based QuEChERS technique was used for the extraction of the analytes from food matrices followed by sample cleanup with ACFs instead of traditionally used primary secondary amine (PSA). Different physico-chemical characterization techniques such as Fourier transform infrared spectroscopy, scanning electron microscopy, X-ray diffraction and Brunauer-Emmet-Teller surface area analysis were employed to investigate the engineering and structural properties of ACFs. The recovery of pesticides and herbicides was tested at concentration levels of 0.02 and 0.2 mg/kg in different commodities such as cauliflower, cucumber, banana, apple, wheat and black gram. The recoveries of all twenty-six pesticides and herbicides were found in acceptable limit (70-120%) according to SANCO guideline with relative standard deviation value < 15%. The limit of detection and limit of quantification of the method was in the range of 0.38-3.69 ng/mL and 1.26 -12.19 ng/mL, respectively. In traditional QuEChERS method, PSA used as r-DSPE sorbent plays a vital role in sample clean-up process and demonstrates good recoveries for multiclass pesticides. This study reports that ACFs are better in terms of removal of co-extractives in comparison of PSA without compromising the recoveries of multi pesticides from food matrices. Further, ACF replaces the need of charcoal in addition to the PSA from traditional QuEChERS method which is used to remove pigments. The developed method will be cost effective because the ACFs are significantly cheaper than the PSA. So the proposed modified QuEChERS method is more robust, effective and has better sample cleanup efficiency for multiclass multi pesticide residues analysis in different food matrices such as vegetables, grains and fruits.Keywords: QuEChERS, activated carbon fibers, primary secondary amine, pesticides, sample preparation, carbon nanomaterials
Procedia PDF Downloads 271976 Design an Algorithm for Software Development in CBSE Envrionment Using Feed Forward Neural Network
Authors: Amit Verma, Pardeep Kaur
Abstract:
In software development organizations, Component based Software engineering (CBSE) is emerging paradigm for software development and gained wide acceptance as it often results in increase quality of software product within development time and budget. In component reusability, main challenges are the right component identification from large repositories at right time. The major objective of this work is to provide efficient algorithm for storage and effective retrieval of components using neural network and parameters based on user choice through clustering. This research paper aims to propose an algorithm that provides error free and automatic process (for retrieval of the components) while reuse of the component. In this algorithm, keywords (or components) are extracted from software document, after by applying k mean clustering algorithm. Then weights assigned to those keywords based on their frequency and after assigning weights, ANN predicts whether correct weight is assigned to keywords (or components) or not, otherwise it back propagates in to initial step (re-assign the weights). In last, store those all keywords into repositories for effective retrieval. Proposed algorithm is very effective in the error correction and detection with user base choice while choice of component for reusability for efficient retrieval is there.Keywords: component based development, clustering, back propagation algorithm, keyword based retrieval
Procedia PDF Downloads 378975 A Sub-Scalar Approach to the MIPS Architecture
Authors: Kumar Sambhav Pandey, Anamika Singh
Abstract:
The continuous researches in the field of computer architecture basically aims at accelerating the computational speed and to gain enhanced performance. In this era, the superscalar, sub-scalar concept has not gained enough attention for improving the computation performance. In this paper, we have presented a sub-scalar approach to utilize the parallelism present with in the data while processing. The main idea is to split the data into individual smaller entities and these entities are processed with a defined known set of instructions. This sub-scalar approach to the MIPS architecture can bring out significant improvement in the computational speedup. MIPS-I is the basic design taken in consideration for the development of sub-scalar MIPS64 for increasing the instruction level parallelism (ILP) and resource utilization.Keywords: dataword, MIPS, processor, sub-scalar
Procedia PDF Downloads 545974 Performance Comparison of Prim’s and Ant Colony Optimization Algorithm to Select Shortest Path in Case of Link Failure
Authors: Rimmy Yadav, Avtar Singh
Abstract:
—Ant Colony Optimization (ACO) is a promising modern approach to the unused combinatorial optimization. Here ACO is applied to finding the shortest during communication link failure. In this paper, the performances of the prim’s and ACO algorithm are made. By comparing the time complexity and program execution time as set of parameters, we demonstrate the pleasant performance of ACO in finding excellent solution to finding shortest path during communication link failure.Keywords: ant colony optimization, link failure, prim’s algorithm, shortest path
Procedia PDF Downloads 398973 A Test Methodology to Measure the Open-Loop Voltage Gain of an Operational Amplifier
Authors: Maninder Kaur Gill, Alpana Agarwal
Abstract:
It is practically not feasible to measure the open-loop voltage gain of the operational amplifier in the open loop configuration. It is because the open-loop voltage gain of the operational amplifier is very large. In order to avoid the saturation of the output voltage, a very small input should be given to operational amplifier which is not possible to be measured practically by a digital multimeter. A test circuit for measurement of open loop voltage gain of an operational amplifier has been proposed and verified using simulation tools as well as by experimental methods on breadboard. The main advantage of this test circuit is that it is simple, fast, accurate, cost effective, and easy to handle even on a breadboard. The test circuit requires only the device under test (DUT) along with resistors. This circuit has been tested for measurement of open loop voltage gain for different operational amplifiers. The underlying goal is to design testable circuits for various analog devices that are simple to realize in VLSI systems, giving accurate results and without changing the characteristics of the original system. The DUTs used are LM741CN and UA741CP. For LM741CN, the simulated gain and experimentally measured gain (average) are calculated as 89.71 dB and 87.71 dB, respectively. For UA741CP, the simulated gain and experimentally measured gain (average) are calculated as 101.15 dB and 105.15 dB, respectively. These values are found to be close to the datasheet values.Keywords: Device Under Test (DUT), open loop voltage gain, operational amplifier, test circuit
Procedia PDF Downloads 447972 Blind Data Hiding Technique Using Interpolation of Subsampled Images
Authors: Singara Singh Kasana, Pankaj Garg
Abstract:
In this paper, a blind data hiding technique based on interpolation of sub sampled versions of a cover image is proposed. Sub sampled image is taken as a reference image and an interpolated image is generated from this reference image. Then difference between original cover image and interpolated image is used to embed secret data. Comparisons with the existing interpolation based techniques show that proposed technique provides higher embedding capacity and better visual quality marked images. Moreover, the performance of the proposed technique is more stable for different images.Keywords: interpolation, image subsampling, PSNR, SIM
Procedia PDF Downloads 578971 The Feasibility of Online, Interactive Workshops to Facilitate Anatomy Education during the UK COVID-19 Lockdowns
Authors: Prabhvir Singh Marway, Kai Lok Chan, Maria-Ruxandra Jinga, Rachel Bok Ying Lee, Matthew Bok Kit Lee, Krishan Nandapalan, Sze Yi Beh, Harry Carr, Christopher Kui
Abstract:
We piloted a structured series of online workshops on the 3D segmentation of anatomical structures from CT scans. 33 participants were recruited from four UK universities for two-day workshops between 2020 and 2021. Open-source software (3D-Slicer) was used. We hypothesized that active participation via real-time screen-sharing and voice-communication via Discord would enable improved engagement and learning, despite national lockdowns. Written feedback indicated positive learning experiences, with subjective measures of anatomical understanding and software confidence improving.Keywords: medical education, workshop, segmentation, anatomy
Procedia PDF Downloads 200970 Smart Helmet for Two-Wheelers
Authors: Ravi Nandu, Kuldeep Singh
Abstract:
A helmet is a protective layer that is worn in order to prevent head injury. Helmet is the most important safety gear for two wheeler riders. However, due to carelessness of people, less importance toward safety, lot of causalities is every year. According to National Crime Records Bureau (NCRB) two wheelers claimed 92 lives every day out of which most were due to helmetless drive. The system design will be such that without wearing the helmet the rider cannot start two wheelers. The helmet will be connected to vehicle key ignition systems which will be electronically controlled. The smart helmet will be having proximity sensor fitted inside it, which will act as our switch for ignition and further with wireless connection the helmet sensor circuit will be connected to the vehicle ignition system.Keywords: helmet, proximity sensor, microcontroller, head injury
Procedia PDF Downloads 311969 Thermohydraulic Performance Comparison of Artificially Roughened Rectangular Channels
Authors: Narender Singh Thakur, Sunil Chamoli
Abstract:
The use of roughness geometry in the rectangular channel duct is an effective technique to enhance the rate of heat transfer to the working fluid. The present research concentrates on the performance comparison of a rectangular channel with different roughness geometry of the test plate. The performance enhancement is compared by considering the statistical correlations developed by the various investigators for Nusselt number and friction factor. Among all the investigated geometries multiple v-shaped rib roughened rectangular channel found thermo hydraulically better than other investigated geometries under similar current and operating conditions.Keywords: nusselt number, friction factor, thermohydraulic, performance parameter
Procedia PDF Downloads 422968 A Study of Issues and Mitigations on Distributed Denial of Service and Medical Internet of Things Devices
Authors: Robin Singh, Jing-Chiou Liou
Abstract:
The Internet of Things (IoT) devices are being used heavily as part of our everyday routines. Through improved communication and automated procedures, its popularity has assisted users in raising the quality of work. These devices are used in healthcare in order to better collect the patient’s data for their treatment. They are generally considered safe and secure. However, there is some possibility that some loopholes do exist which manufacturers do need to identify before some hacker takes advantage of them. For this study, we focused on two medical IoT devices which are pacemakers and hearing aids. The aim of this paper is to identify if there is any likelihood of these medical devices being hijacked and used as a botnet in Distributed Denial-Of Service attacks. Moreover, some mitigation strategies are being proposed to better secureKeywords: cybersecurity, DDoS, IoT, medical devices
Procedia PDF Downloads 86967 Integration of Technology for Enhanced Learning among Generation Y and Z Nursing Students
Authors: Tarandeep Kaur
Abstract:
Generation Y and Z nursing students have a much higher need for technology-based stimulation than previous generations, as they may find traditional methods of education boring and disinterested. These generations prefer experiential learning and the use of advanced technology for enhanced learning. Therefore, nursing educators must acquire knowledge to make better use of technology and technological tools for instruction. Millennials and generation are digital natives, optimistic, assertive, want engagement, instant feedback, and collaborative approach. The integration of technology and the efficacy of its use can be challenging for nursing educators. The SAMR (substitution, augmentation, modification, and redefinition) model designed and developed by Dr. Ruben Puentedura can help nursing educators to engage their students in different levels of technology integration for effective learning. Nursing educators should understand that technology use in the classroom must be purposeful. The influx of technology in nursing education is ever-changing; therefore, nursing educators have to constantly enhance and develop technical skills to keep up with the emerging technology in the schools as well as hospitals. In the Saskatchewan Collaborative Bachelor of Nursing (SCBSCN) program at Saskatchewan polytechnic, we use technology at various levels using the SAMR model in our program, including low and high-fidelity simulation labs. We are also exploring futuristic options of using virtual reality and gaming in our classrooms as an innovative way to motivate, increase critical thinking, create active learning, provide immediate feedback, improve student retention and create collaboration.Keywords: generations, nursing, SAMR, technology
Procedia PDF Downloads 110966 Interactive Multiple Functions User Interface
Authors: Manjit Singh Sidhu, Waleed Maqableh, Jee Geak Ying
Abstract:
Tangible user interfaces (TUI) that employ markers in the augmented reality (AR) environment has hampered the interactivity between the user and the software application. This is because the user lacks focus on visualizing the contents due to the interaction mechanisms whereby multiple markers may need to be used to perform a particular function. In this research, we have designed a novel TUI user interface where multiple functions could be triggered similar to a natural keyboard thus allowing user to focus more on its digital contents such as 2D/3D, text input, animation and sound. Test results of the user interface with potential users and HCI experts revealed that the multiple functions user interface was new, preferred and appreciated more as opposed to marker based user interface.Keywords: multimedia, augmented reality, engineering, user interface, visualization
Procedia PDF Downloads 448965 Performance of Non-toxic, Corrosion Resistant, and Lubricious Metalworking Fluids under Machining
Authors: Ajay Pratap Singh Lodhi, Deepak Kumar
Abstract:
Vegetable oil-based environmentally friendly metalworking fluids (MWFs) are formulated. The tribological performance, cytotoxicity, and corrosion resistance of the formulated fluids (FFs) are evaluated and benchmarked with commercial mineral oil-based MWFs (CF). Results show that FFs exhibited better machining characteristics (roughness, cutting forces, and surface morphology) during machining than CF. MTT assay and Live dead cell assay confirm the cytocompatibility nature of the FFs relative to the toxic CF. Electrochemical analysis shows that FFs and CF exhibited comparable corrosion current density.Keywords: corrosion inhibitors, cytotoxicity, machining, MTT assay, Taguchi method, vegetable oil
Procedia PDF Downloads 188964 An Analysis of Privacy and Security for Internet of Things Applications
Authors: Dhananjay Singh, M. Abdullah-Al-Wadud
Abstract:
The Internet of Things is a concept of a large scale ecosystem of wireless actuators. The actuators are defined as things in the IoT, those which contribute or produces some data to the ecosystem. However, ubiquitous data collection, data security, privacy preserving, large volume data processing, and intelligent analytics are some of the key challenges into the IoT technologies. In order to solve the security requirements, challenges and threats in the IoT, we have discussed a message authentication mechanism for IoT applications. Finally, we have discussed data encryption mechanism for messages authentication before propagating into IoT networks.Keywords: Internet of Things (IoT), message authentication, privacy, security
Procedia PDF Downloads 382963 To Ensure Maximum Voter Privacy in E-Voting Using Blockchain, Convolutional Neural Network, and Quantum Key Distribution
Authors: Bhaumik Tyagi, Mandeep Kaur, Kanika Singla
Abstract:
The advancement of blockchain has facilitated scholars to remodel e-voting systems for future generations. Server-side attacks like SQL injection attacks and DOS attacks are the most common attacks nowadays, where malicious codes are injected into the system through user input fields by illicit users, which leads to data leakage in the worst scenarios. Besides, quantum attacks are also there which manipulate the transactional data. In order to deal with all the above-mentioned attacks, integration of blockchain, convolutional neural network (CNN), and Quantum Key Distribution is done in this very research. The utilization of blockchain technology in e-voting applications is not a novel concept. But privacy and security issues are still there in a public and private blockchains. To solve this, the use of a hybrid blockchain is done in this research. This research proposed cryptographic signatures and blockchain algorithms to validate the origin and integrity of the votes. The convolutional neural network (CNN), a normalized version of the multilayer perceptron, is also applied in the system to analyze visual descriptions upon registration in a direction to enhance the privacy of voters and the e-voting system. Quantum Key Distribution is being implemented in order to secure a blockchain-based e-voting system from quantum attacks using quantum algorithms. Implementation of e-voting blockchain D-app and providing a proposed solution for the privacy of voters in e-voting using Blockchain, CNN, and Quantum Key Distribution is done.Keywords: hybrid blockchain, secure e-voting system, convolutional neural networks, quantum key distribution, one-time pad
Procedia PDF Downloads 94962 Speed up Vector Median Filtering by Quasi Euclidean Norm
Authors: Vinai K. Singh
Abstract:
For reducing impulsive noise without degrading image contours, median filtering is a powerful tool. In multiband images as for example colour images or vector fields obtained by optic flow computation, a vector median filter can be used. Vector median filters are defined on the basis of a suitable distance, the best performing distance being the Euclidean. Euclidean distance is evaluated by using the Euclidean norms which is quite demanding from the point of view of computation given that a square root is required. In this paper an optimal piece-wise linear approximation of the Euclidean norm is presented which is applied to vector median filtering.Keywords: euclidean norm, quasi euclidean norm, vector median filtering, applied mathematics
Procedia PDF Downloads 474961 An Overview of Adaptive Channel Equalization Techniques and Algorithms
Authors: Navdeep Singh Randhawa
Abstract:
Wireless communication system has been proved as the best for any communication. However, there are some undesirable threats of a wireless communication channel on the information transmitted through it, such as attenuation, distortions, delays and phase shifts of the signals arriving at the receiver end which are caused by its band limited and dispersive nature. One of the threat is ISI (Inter Symbol Interference), which has been found as a great obstacle in high speed communication. Thus, there is a need to provide perfect and accurate technique to remove this effect to have an error free communication. Thus, different equalization techniques have been proposed in literature. This paper presents the equalization techniques followed by the concept of adaptive filter equalizer, its algorithms (LMS and RLS) and applications of adaptive equalization technique.Keywords: channel equalization, adaptive equalizer, least mean square, recursive least square
Procedia PDF Downloads 450960 Fabrication of Miniature Gear of Hastelloy X by WEDM Process
Authors: Bhupinder Singh, Joy Prakash Misra
Abstract:
This article provides the information regarding machining of hastelloy-X on wire electro spark machining (WEDM). Experimental investigation has been carried out by varying pulse-on time (TON), pulse-off time (TOFF), peak current (IP) and spark gap voltage (SV). Effect of these parameters is studied on material removal rate (MRR). Experiments are designed as per box-behnken design (BBD) technique of response surface methodology (RSM). Analysis of variance (ANOVA) results indicates that TON, TOFF, IP, SV, TON x IP are significant parameters that influenced the MRR, and it is depicted that value of MRR is more at high discharge energy (HDE) and less at low discharge energy (LDE). Furthermore, miniature impeller and miniature gear (OD≤10MM) is fabricated by WEDM at optimized condition.Keywords: advanced manufacturing, WEDM, super alloy, gear
Procedia PDF Downloads 225959 A Study of Chaos Control Schemes for Plankton-Fish Dynamics
Authors: Rajinder Pal Kaur, Amit Sharma, Anuj Kumar Sharma, Govind Prasad Sahu
Abstract:
The existence of chaos in the marine ecosystems may cause planktonic blooms, disease outbreaks, extinction of some plankton species, or some complex dynamics in oceans, which can adversely affect the sustainable marine ecosystem. The control of the chaotic plankton-fish dynamics is one of the main motives of marine ecologists. In this paper, we have studied the impact of phytoplankton refuge, zooplankton refuge, and fear effect on the chaotic plankton-fish dynamics incorporating phytoplankton, zooplankton, and fish biomass. The fear of fish predation transfers the unpredictable(chaotic) behavior of the plankton system to a stable orbit. The defense mechanism developed by prey species due to fear of the predator population can also terminate chaos from the given dynamics. Moreover, the impact of external disturbances like seasonality, noise, periodic fluctuations, and time delay on the given chaotic plankton system has also been discussed. We have applied feedback mechanisms to control the complexity of the system through the parameter noise. The non-feedback schemes are implemented to observe the role of seasonal force, periodic fluctuations, and time delay in suppressing the given chaotic system. Analytical results are substantiated by numerical simulation.Keywords: plankton, chaos, noise, seasonality, fluctuations, fear effect, prey refuge
Procedia PDF Downloads 84958 Water Supply and Demand Analysis for Ranchi City under Climate Change Using Water Evaluation and Planning System Model
Authors: Pappu Kumar, Ajai Singh, Anshuman Singh
Abstract:
There are different water user sectors such as rural, urban, mining, subsistence and commercial irrigated agriculture, commercial forestry, industry, power generation which are present in the catchment in Subarnarekha River Basin and Ranchi city. There is an inequity issue in the access to water. The development of the rural area, construction of new power generation plants, along with the population growth, the requirement of unmet water demand and the consideration of environmental flows, the revitalization of small-scale irrigation schemes is going to increase the water demands in almost all the water-stressed catchment. The WEAP Model was developed by the Stockholm Environment Institute (SEI) to enable evaluation of planning and management issues associated with water resources development. The WEAP model can be used for both urban and rural areas and can address a wide range of issues including sectoral demand analyses, water conservation, water rights and allocation priorities, river flow simulation, reservoir operation, ecosystem requirements and project cost-benefit analyses. This model is a tool for integrated water resource management and planning like, forecasting water demand, supply, inflows, outflows, water use, reuse, water quality, priority areas and Hydropower generation, In the present study, efforts have been made to access the utility of the WEAP model for water supply and demand analysis for Ranchi city. A detailed works have been carried out and it was tried to ascertain that the WEAP model used for generating different scenario of water requirement, which could help for the future planning of water. The water supplied to Ranchi city was mostly contributed by our study river, Hatiya reservoir and ground water. Data was collected from various agencies like PHE Ranchi, census data of 2011, Doranda reservoir and meteorology department etc. This collected and generated data was given as input to the WEAP model. The model generated the trends for discharge of our study river up to next 2050 and same time also generated scenarios calculating our demand and supplies for feature. The results generated from the model outputs predicting the water require 12 million litter. The results will help in drafting policies for future regarding water supplies and demands under changing climatic scenarios.Keywords: WEAP model, water demand analysis, Ranchi, scenarios
Procedia PDF Downloads 419957 SFO-ECRSEP: Sensor Field Optimızation Based Ecrsep For Heterogeneous WSNS
Authors: Gagandeep Singh
Abstract:
The sensor field optimization is a serious issue in WSNs and has been ignored by many researchers. As in numerous real-time sensing fields the sensor nodes on the corners i.e. on the segment boundaries will become lifeless early because no extraordinary safety is presented for them. Accordingly, in this research work the central objective is on the segment based optimization by separating the sensor field between advance and normal segments. The inspiration at the back this sensor field optimization is to extend the time spam when the first sensor node dies. For the reason that in normal sensor nodes which were exist on the borders may become lifeless early because the space among them and the base station is more so they consume more power so at last will become lifeless soon.Keywords: WSNs, ECRSEP, SEP, field optimization, energy
Procedia PDF Downloads 300956 Study and Analysis of a Susceptible Infective Susceptible Mathematical Model with Density Dependent Migration
Authors: Jitendra Singh, Vivek Kumar
Abstract:
In this paper, a susceptible infective susceptible mathematical model is proposed and analyzed where the migration of human population is given by migration function. It is assumed that the disease is transmitted by direct contact of susceptible and infective populations with constant contact rate. The equilibria and their stability are studied by using the stability theory of ordinary differential equations and computer simulation. The model analysis shows that the spread of infectious disease increases when human population immigration increases in the habitat but it decreases if emigration increases.Keywords: SIS (Susceptible Infective Susceptible) model, migration function, susceptible, stability
Procedia PDF Downloads 261