Facial recognition was the source of motivation behind the creation of eigenfaces. For this use, eigenfaces have advantages over other techniques available, such as the system's speed and efficiency. Using eigenfaces is very fast, and able to functionally operate on lots of faces in very little time. Unfortunately, this type of facial recognition does have a drawback to consider: trouble recognizing faces when they are viewed with different levels of light or angles. For the system to work well, the faces need to be seen from a frontal view under similar lighting. Face recognition using eigenfaces has been shown to be quite accurate. By experimenting with the system to test it under variations of certain conditions, the following correct recognitions were found: an average of 96% with light variation, 85% with orientation variation, and 64% with size variation.
- Page(s): 01-03
- Date of Publication: July 2013
- Amanda CicilatoNorthern Melbourne Institute of TAFE Waterdale Rd, Heidelberg, Australia
References
1. R.C. Gonzales and R.E.Woods. Digital Image processing. Prentice Hall, second edition, 2002.
2. “Face recognition using eigenfaces”, M. Turk and A. Pentland
3. “Eigenfaces for recognition”, M.Turk and A.Pentland
4. “Stellar Spectral Classification using Principal Component Analysis and artificial neural networks”, Harinder P Singh, Ravi K Gulati and Ranjan Gupta
5. Smith I L.: A tutorial on Principal Components Analysis. Student tutorial. 2002.
Amanda Cicilato "Image Processing Based Smart System" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 7, pp.01-03 2013
In this phase we are discussing about algorithm, flow chart which is used to solve problem of human gesture recognition. There is a Train Database, from which we will find out equivalent image using principal component analysis .
- Page(s): 04-05
- Date of Publication: July 2013
- Samuel AnyalVictoria University Melbourne, Australia
References
1. Advanced Engineering Mathematics by Erwin Kreyszig
2. https://en.wikipedia.org/wiki/Eigenface
3. https://csnet.otago.ac.nz/cosc453/student_tutorials/principal_components.pdf.
4.https://de.wikipedia.org/wiki/Hauptkomponentenanalyse
5. https://de.wikipedia.org/wiki/Eigenvektor
6. https://en.wikipedia.org/wiki/Gesture_recognition
7. https://en.wikipedia.org/wiki/Eigenface
Samuel Anyal "Development & Implementation of Algorithms For Facial Recognition System" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 7, pp.04-05 2013
The three dimensional numerical simulations had been carried out to investigate the influence of target span and configuration on ballistic resistance of thin aluminum target plate. 1mm thick 1100-H12 aluminum target plate was hit by 19 mm diameter ogive nosed projectile. The span was varied as 50, 76, 100, 255 and 760 mm whereas the configuration of 255 mm span diameter target was varied as 1 mm thick monolithic, double layered in-contact (2 x 0.5 mm) and double layered spaced. The spacing between the layers was also varied as 2, 5 and 10mm.The target was impacted normally by ogive nosed projectile to obtain the ballistic limit, failure mode and deformation. Johnson–Cook elasto-viscoplastic constitutive model was considered to simulate the material behavior of 1100-H12 aluminum. The ballistic limit was found to increase with an increase in span diameter. The monolithic target offered highest ballistic limit followed by layered in-contact and spaced targets respectively. The variation of spacing between the layers did not have significant influence on the ballistic limit.
- Page(s): 06-21
- Date of Publication: July 2013
- G.TiwariDepartment of Civil engineering, Indian Institute of Technology Roorkee, Roorkee 247667, India
- M.A. IqbalDepartment of Civil engineering, Indian Institute of Technology Roorkee, Roorkee 247667, India
- P.K.Gupta Department of Civil engineering, Indian Institute of Technology Roorkee, Roorkee 247667, India
References
[1] N.K. Gupta, M.A. Iqbal, G.S. Sekhon, Experimental and numerical studies on the behavior of thin aluminum plates subjected to impact by blunt and hemispherical-nosed projectiles, International Journal of Impact Engineering,32(2006)1921-1944.
[2] M.A. Iqbal, A. Chakrabarti, S. Beniwal, N.K. Gupta,3D numerical simulations of sharp nosed projectile impact on ductile targets, International Journal of Impact Engineering, 37(2010)185–195.
[3] A. Arias, J.A. Rodrıguez-Martınez, A. Rusinek, Numerical simulations of impact behavior of thin steel plates subjected to cylindrical, conical and hemispherical non-deformable projectiles, Eng Fract Mech .75(2008) 1635–56.
[4] N.K. Gupta, M.A. Iqbal, G.S. Sekhon, Effect of projectile nose shape, impact velocity and target thickness on deformation behavior of aluminum plates, Int. J. Solids and Str. 44(2007) 3411–3439.
[5] N.K. Gupta, M. A. Iqbal, G.S. Sekhon, Effect of Projectile nose shape, impact velocity and target thickness on the deformation behavior of layered plates. Int. J. Impact Engng 35(2008) 37-60.
[6] R.S. Corran, P.J. Shadbolt, C. Ruiz, Impact loading of plates – an experimental investigation. International Journal of Impact Engineering 1 (1983), 3–22
[7] J. Dean, C.S. Dunleavy, P.M. Brown, T.W. Clyne, Energy absorption during projectile perforation of thin steel plates and the kinetic energy of ejected fragments. International Journal of Impact Engineering 36, (2009)1250-1258.
[8] ABAQUS/Explicit user’s manual. Version 6.7: vol. 1(2), 2007.
[9] G. R. Johnson, and W. H. Cook, A constitutive model and data for metals subjected to large strains, high strain rates and high temperatures. Proc. the seventh International symposium on Ballistics, The Hague. 1983
[10] G. R. Johnson, and W. H. Cook.Fracture characteristics of three metals subjected to various strains, strain rates, temperatures and pressures. Eng Fract Mech., 21(1985) 31-48.
[11] R. A. Westmann. J. Math Physics 43(1964)191-198.
[12]J. Awerbuch, S.R. Bodener, Analysis of the mechanics of perforation of projectile in metallic plates. International Journal of Solids and Structures 10(1973) 671-684.
[13] R. F Recht, T. W. Ipson, Appl. Mech.. Trans. ASME,30(1973)384.
[14] M.E Backman, W. Goldsmith,The mechanics of penetration of projectile into targets. International Journal of Engineering Science 16(1978)1-99.
[15] M.L. Wilkins,. Mechanics of Penetration and perforation. International journal of Impact Engineering16(1978)793-807.
G.Tiwari, M.A. Iqbal, P.K.Gupta "Influence of Target Span and Configuration on Ballistic Resistance of Ductile Material " International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 7, pp.06-21 2013
Beside advantages; recent advances and cost reductions has aroused interest in optical fiber sensing. So, the outgrowths of optical fiber telecommunications are combined with optoelectronic devices to develop optical fiber sensors. In past decades several researches have been conducted using optical fiber sensors with different techniques. Intensity, phase, and wavelength based optical fiber sensors are the most widely used sensor types. In this paper the overview, types and applications of optical fiber sensors is discussed.
- Page(s): 22-25
- Date of Publication: July 2013
- Priyanka Khandelwal Assistant Professor JECRC UDML College of Engineering, Jaipur, Rajasthan, India
References
[2] Fidanboylu, K.; Efendioglu, H.S. Fiber Optic Sensors and Their Applications. In Proceedings of 5th International Advanced Technologies Symposium (IATS’09) , Karabuk, Turkey, 13–15 May 2009.
[3] Berthold, J.W. Historical review of microbend fiber-optic sensors. J. Lightwave Technol. 1995, 13, 1193–1199.
[4] Luo, F.; Liu, J.; Ma, N.; Morse, T.F.A Fiber optic microbend sensor for distributed sensing application in the structural strain monitoring. Sens. Actuat. 1999, 75, 41–44.
[5] Méndez, A., Overview of fiber optic sensors for NDT applications, IV NDT Panamerican Conference, 1-11, 2007.
[6] F.Yu, S.Yin, Fiber optic sensors, Marcel-Dekker, 2002.
Priyanka Khandelwal "Optical Fiber Sensors: Classification & Applications " International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 7, pp.22-25 2013
An improved MPPT converter with voltage and current (perturb &observe) method for photo voltaic (PV)-applications is presented in this paper. The proposed method used to implements maximum power point tracking (MPPT) by variable reference of voltage and current which is continuously changed during some time (up to 5 sec). In this algorithm a slight perturbation is introduce system. Due to this perturbation the power of the module changes. If the power increases due to the perturbation then the perturbation is continued in that direction. After the peak power is reached the power at the next instant decreases and hence after that the perturbation reverses. When the steady state is reached the algorithm oscillates around the peak point. In order to keep the power variation small the perturbation size is kept very small. The algorithm is developed in such a manner that it sets a reference voltage of the module corresponding to the peak voltage of the module. It is also observed that this algorithm fails to track the power under fast varying atmospheric conditions.
- Page(s): 26-31
- Date of Publication: July 2013
- Kamlesh K. BhartiAssistant Professor Department of Electrical Engineering, Invertis University Bareilly, India
- Sushil Kumar Assistant Professor Department of Electrical Engineering, Invertis University Bareilly, India
References
[1]. K. H. Hussein et al, “Maximum Photovoltaic Power Tracking: An Algorithm for rapidly changing atmospheric conditions,” Proc. Inst. Elect. Eng. vol. 142, pt. G, no. 1, pp. 59–64, Jan. 1995
[2].C.R. Sullivan and M.J. Powers,” A High-Efficiency Maximum Power Point Tracking for Photovoltaic Arrays in a Solar-Power Race Vehicle”, IEEE PESC„93, 1993, pp.574-580.
[3]. Xuejun Liu and A.C.Lopes, “An Improved Perturbation and Observe Maximum Power Point Tracking Algorithm for PV Arrays” IEEE PESC „2004, pp.2005-2010.
[4]. Chihchiang Hua, Jongrong Lin, and Chihming Shen,“Implementation of a DSP Controlled Photovoltaic System with Peak Power Tracking”, IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, VOL. 45, NO. 1, FEBRUARY 1998 pp 99-107.
Kamlesh K. Bharti, Sushil Kumar "Implementation Of Perturb And Obserbe Algorithm for Tracking The Maximum Power From Photo Voltaic Module Using MATLAB" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 7, pp.26-31 2013
In this era of information, need for protection of data is more pronounced than ever. Secure communication is necessary to protect sensitive information in military and government institutions as well as private individuals. Current encryption standards are used to encrypt and protect data not only during transmission but storage as well. Security has become an increasingly important feature with the growth of electronic communication. The Symmetric, or secret key algorithms, a cryptography method in which the same key value is used in both the encryption and decryption calculations are becoming more popular. The keys, in practice, represent a shared secret between two or more users that can be used to maintain a private information link. Secret key cryptography uses conventional algorithm that is Advanced Encryption Standard (AES) algorithm. The AES algorithm is capable of using cryptographic keys of 128, 192, and 256 bits to encrypt and decrypt data in blocks of 128 bits. This standard is based on the Rijndael algorithm. All the modules are compared with different families of FPGA platforms . In this paper, methodology of VHDL implementation using Xilinx – software is suggested.
- Page(s): 32-35
- Date of Publication: July 2013
- Ms Indu Bala SharmaDeptt. of Electronics and Communication Engg. Suresh Gyan Vihar University Jaipur, Rajasthan (INDIA)
References
[1] N .Singh, G .Raj., “Security on bccp trough AESencryption technique”, Special Issue of INTERNATIONAL journal of engineering science & avanced technology (2250–3676) Jul-Aug .2012.
[2] Behrouz A.Forouzan “Cryptography and network security TATA-Mcgraw hill publication 2007 edition..
[3] Stallings W. “Cryptography and Network Security:Principles and Practices.”4th ed. Pearson Education, Inc. pp. 63-173. 2006.
[4] “Advanced encryption standard (AES)”, Federal Information Processing Standards Publication (FIPS PUB) 197, National Institute of Standards and Technology (NIST), November, 2001.
[5] Olivier Frider ETR6 « Advanced Encryption System », écoled’ingénieurs du Canton de Vaud, Mai 2004.
[6] Ashwini M. D, Mangesh S. D and Devendra N. K “,FPGA Implementation of AES Encryption and Decryption”, Proceeding of International Conference On Control, Automation, Communication And Energy Conservation -2009.
[7] Daemen J. and Rijmen V., “Rijndael: The Advanced Encryption Standard”. Dr. Dobb’s Journal, March 2001.
[8] NIST, “DRAFT NIST Special Publication 800-131, Recommendation for the Transitioning of Cryptographic Algorithms and Key Sizes”, Federal Information Processing Standards Publication (FIPS PUB) 197, National Institute of Standards and Technology (NIST), January, 2010.
[9] J. Daemen and V. Rijmen, AES Proposal: Rijndael, AES Algorithm Submission, Sept. 3, 1999.
[10] Qin H., Nonmember, SASAO T. and IGUCHI Y.,Members ,“A Design of AES Encryption Circuit with 128 bit keys using Look-UP Table Ring on FPGA”,IEICE TRANS. INF. & SYST.,VOL.E89-D,NO.3 MARCH 2006.
[11] Rahman T., Pan S. and Zhang Q., “Design of a HighThroughput 128-bit (Rijndael Block Cipher)”, Proceedingof International Multiconferrence of Engineers andcomputer scientists 2010 Vol II IMECS 2010, March 17-19,2010,Hongkong.
[12] Hodjat A. and Varbauwhede I.,“A 21.54 Gbits Fully Pipelined AES Processor on FPGA”, IEEE Symposim on Field-Programmable Custom Computing Machines,April 2004.
[13] Jarvinen et al, “A fully pipelined memoryless 17.8 Gbps AES-128 encrypter”,International Symposium on Field Programmable Gate arrays,pp.207-215.2003.
[14] Sounak Samanta., “FPGA Implementation of AES Encryption and Decryption, B.E. III Yr, Electronics & Communication Engg, Sardar Vallabhbhai National Institute of Technology, Surat, 2007.
[15] P. Noo-intara, S. Chantarawong, and S.Choomchuay“Architectures for MixColumnTransform for the AES,” Proceeding of ICEP,2004.
Ms Indu Bala Sharma "VHDL Implementation of AES Encryption and Decryption" International Journal of Latest Technology in Engineering,Management & Applied Science-IJLTEMAS vol.2 issue 7, pp.32-35 2013
Significant progress has been made towards making adhoc net-works secure and DoS resilient. However, little attention has been focused on quantifying DoS resilience: Do adhoc networks have sufficiently redundant path sand counter-DoS mechanisms to make DoS attacks largely ineffective? Or are there attack and system factors that can lead to devastating effects? In this paper, we design and study DoS attacks in order to assess the damage that difficult-to-detect attacker scan cause. The first attack we study, called the JellyFish attack, is targeted against closed-loop flows such as TCP; Although protocol compliant, it has devastating effects. The second is the Black Hole attack, which has effects similar to the JellyFish, but on open-loop flows. We quantify via simulations and analytical modeling the scalability of DoS attacks as a function of key performance parameters such as mobility, systemize, node density, and counter-DoS strategy. One perhaps surprising result is that such DoS attacks can increase the capacity of adhoc networks, as they starve multi-hop flows and only allow one-hop communication, a capacity-maximizing, yet clearly undesirable situation.
- Page(s): 36-45
- Date of Publication: July 2013
- Dr. Gaurav Kumar JainAssociate Professor, RCERT, Sitapura, Jaipur(Raj.), India
- Indra KishorM.Tech. Scholar,YIT, Sitapura, Jaipur (Raj.), India
References
[1] V. Gupta, S. Krishnamurthy, and M. Faloutsos,.Denial of Service Attacks at the MAC Layer in Wireless Ad Hoc Networks,. in Proc.of IEEE MILCOM ’02, 2002, pp. 1118 . 1123.
[2] P. Kyasanur and N. Vaidya, .Detection and Handling of MAC Layer Misbehavior in Wireless Networks,. in Proc. of IEEE Dependable Systems and Networks, 2003, pp. 173 . 182.
[3] S. Radosavac, N. Benammar, and J. S. Baras, .Cross-Layer Attacks in Wireless Ad Hoc Networks,. in Information Sciences and Systems. Princeton University, 2004, pp. 1266.1271.
[4] Y.-C. Hu, A. Perrig, and D. B. Johnson, .Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks,. in Proc. of IEEE INFOCOM ’03., March 2003.
[5]Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols,. in Proc. of ACM WiSe 2003., September 2003.
[6] I. Aad, J.-P. Hubaux, and E. W. Knightly,.Denial of Service Resilience in Ad Hoc Networks,. in Proc. of ACM MobiCom ’04, 2004, pp. 202-215.
[7] J. V. E. Molsa, .Increasing the DoS Attack Resiliency in Military Ad Hoc Networks,. in Proc. of IEEE MILCOM ’05, 2005, pp. 1 . 7.
[8] Q. Gu, P. Liu, S. Zhu, and C.-H. Chu,Defending Against Packet Injection in Unreliable Ad Hoc Networks,. in Proc. of IEEE GLOBECOM ’05, 2005.
[9] S. Desilva and R. V. Boppana, .Mitigating Malicious Control Packet Floods in Ad Hoc Networks,. in Proc. of IEEE WCNC ’05, 2005, pp. 2112 . 2117.
[10] S. Marti, T. J. Giuli, K. Lai, and M. Baker, .Mitigating Routing Misbehavior in Mobile Ad hoc Networks,. in Proc. of ACM MobiCom ’00, 2000, pp. 255.265.
[11] J. Kong, X. Hong, Y. Yi, J.-S. Park, J. Liu, and M. Gerla, .A Secure Ad-hoc Routing Approach using Localized Self-healing Communities,. in Proc. of ACM MobiHoc ’05., 2005.
[12] Y. Hu, A. Perrig, and D. B. Johnson, .Ariadne: A Secure OnDemand Routing Protocol for Ad Hoc Networks,. in Proc. of MobiCom ’02,Atlanta, USA, Sept. 2002
Dr. Gaurav Kumar Jain, Indra Kishor "Mobile Ad Hoc Network With Dynamic Denial of Service Attacks" International Journal of Latest Technology in Engineering,Management & Applied Science-IJLTEMAS vol.2 issue 7, pp.36-45 2013
We study the problem of computing multicast trees with minimal bandwidth consumption in multi-hop wireless mesh networks. For wired networks, this problem is known as the Steiner tree problem, and it has been widely studied before. We demonstrate in this paper, that for multihop wireless mesh networks, a Steiner tree does not o er the minimal bandwidth consumption, because it neglects the wireless multicast advantage. Thus, we re-formulate the problem in terms of minimizing the number of transmissions, rather than the edge cost of multicast trees. We show that the new problem is also NP-complete and we propose heuristics to compute good approximations for such bandwidth-optimal trees. Our simulation results show that the proposed heuristics o err a lower bandwidth consumption compared with Steiner trees.
- Page(s): 56-61
- Date of Publication: July 2013
- Sundeep JoshiDeepshikha Kala Sansthan, Jaipur(Raj.), India
- Gaurav Kumar Jain Deepshikha Kala Sansthan, Jaipur(Raj.), India
- Mukul Kulshrestha Lecturer, Govt. Polytechnic College, Kota(Raj.), India
- Pinkey Kulshrestha Lecturer, Govt. Polytechnic College, Kota(Raj.), India
References
1. S. Deering, ”Multicast Routing in a Datagram Internetwork,” Ph.D. Thesis, Electrical Engineering Dept., Stanford University, Dec. 1991.
2. S.-E. Deering and D.-R. Cheriton, ”Multicast Routing in datagram internetworks and extended LANs,” Transactions on Computer Systems, vol.8, no.2, May 1990, pp. 85–110.
3. J. Moy, ”Multicast routing extensions for OSPF,” Computer communications of the ACM, vol.37, no.8, August 1994, pp.61–66.
4. T. Ballardie, P. Francis and J. Crowcroft, ”Core Based Trees (CBT) – An archi- tecture for scalable inter-domain multicast routing, ” Proc. of ACM SIGCOMM’93, San Francisco, CA, October 1993, pp.85–95.
5. S. Deering, D.-L. Estrin, D. Farinacci, V. Jacobson, C.-G. Liu and L. Wei, ”The PIM architecture for widearea multicast routing,” IEEE/ACM Transactions on Networking, vol.4, no.2, April 1996, pp. 153–162.
6. C. Cordeiro, H. Gossain and D. Agrawal, ”Multicast over Wireless Mobile Ad Hoc Networks: Present and Future Directions” IEEE Network, no. 1, Jan 2003, pp. 52–59.
7. R.-M. Karp, ”Reducibility among combinatorial problems,” In Complexity of com- puter computations,Plenum Press, New York, 1975, pp.85–103.
8. B.-M. Waxman, ”Routing of MultipointConnections,” IEEE Journal on Selected Areas in Communications, vol. 6, no. 9, December 1998, pp. 1617–1622.
9. L. Kou, G. Markowsky, and L. Berman, ”A fast algorithm for Steiner trees,” Acta Informatica, no. 15, vol. 2, 1981, pp. 141–145.
10. J. Plesnik, ”The complexity of designing a network with minimum diameter,” Networks, no. 11, 1981, pp. 77–85.
11. A. Zelikovsky, ”An 11/6-approximation algorithm for the network Steiner prob- lem,” Algorithmica, no. 9, 1993, pp.463–470.
12. S. Rajagopalan and V. V. Vazirani. ”On the bidirected cut relaxation for the metric Steiner tree problem,” in Proceedings of the 10th Annual ACMSIAM Symposium on Discrete Algorithms, 1999, pp. 742–751.
13. S. Even, ”Graph Algorithms,” Computer Science Press, 1979, pp. 204–209.
14. H. Lim and C. Kim, ”Multicast Tree Construction and Flooding in Wireless Ad Hoc Networks,” Proceedings of the 3rd ACM international workshop on Modeling, analysis and simulation of wireless and mobile systems, Boston, MA, USA. August, 2000, pp. 61–68.
Sundeep Joshi, Gaurav Kumar Jain, Mukul Kulshrestha, Pinkey Kulshrestha "Low Bandwidth utilization in Wireless Networks" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 7, pp.56-61 2013
In terms of our contemporary education industry, which offers Products and services based on Intelligence Quotient (IQ). Umpteen products & services are offered in the industry by different Organizations and government bodies in an organized and unorganized way in terms of “courses”. These courses serve both higher and lower segments of education industry; it ranges from small Play schools to Business schools - affiliated by the private universities and government bodies like CBSE, ICSE boards etc. Currently in India & rather across the world role of education cannot be ignored & people are serious about it. In India ample private social trusts are running their schools and colleges and everybody is catering their products and services. Currently our industry focus towards IQ only but in terms of complete development of the student “Complete direction” is required too. We are not denying the fact that IQ does not have a significant role for the development of child .Our concern is 360 degree approach and we will achieve this by creating a healthy mental balance by focusing IQ along with significant focus on Spiritual Quotient (SQ) and Emotional Quotient (EQ), Adverse Quotient (AQ) too. In India our roots are so strong in terms of our culture. Our education system is growing but multi dimensional & that too a balance development is required as a” vision”. Focus toward Emotional Quotient (EQ), Spiritual Quotient (SQ) cannot be ignored. As if till today even, focus of entire education fraternity is lacking towards the fact that Emotional Quotient (EQ) and Spiritual Quotient (SQ) is important. It had been yet ignored more of – that is why we can see “live examples” of these “big scams & corruption” in our political and economical systems. Across the world Human values are deteriorating. After all who is responsible for everything wrong going around us? Our so called “well educated” people & society. It is an alarming situation for all of us. In the later progression of this article we will see how dramatically our “Lab experiments” will prove that contemporary education system lacks in terms of complete development of the child. Only getting educated does not matter a lot – education with values is very important, but current education system is a “failure” reason being it had given us proficient professionals but they lack “values”(Moral & spiritual both) ,we have dynamic leaders in our political system but they also lack in terms “ human values” . Whole society is striving –but the real solution to this problem is “reviewing & monitoring the education systems as per human needs not as human materialistic needs” .Our Current Education Industry has lot more scope to improvise in terms of satisfying the student needs but to serve this noble cause We need to have “Insight & Realization”. A consistent Monitoring is required to follow the eternal path, delivering real education with “passion & Innovation” is important.“Passionate teachers & innovative students” are real assets to any nation. A Nation emerge when knowledge part is properly implemented & followed properly for the progressive cause.
- Page(s): 62-72
- Date of Publication: July 2013
- Bhvyadeep BhatiaResearch Scholar,GyanVihar University, Jaipur, Rajasthan, India
References
1. https://www.swashritsociety.com/holistic-child.html#
Above link try to follow 360 degree child development –Actually following the concept of IQ & EQ but SQ (Spiritual quotient) & AQ (Adverse quotient) is completely ignored. Where as we have discussed all kind of quotient required to focus for the complete development of child.
2. www.google.com , child 360 degree development of children.
3. Self Experiential learning - as a an Education Industry professional.
Bhvyadeep Bhatia "Entrepreneurship in Education Industry" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 7, pp.62-72 2013
Wimax stands for Worldwide Interoperability for Microwave Access. This technology is a telecommunications technology that offers transmission of wireless data via a number of transmission methods; such as portable or fully mobile internet access via point to multipoints links. In this paper, we investigate the evolution and performance of different routing protocol in 802.16 networks. The simulation results show that the Multipath Ad-hoc on demand Vector Routing Protocol (MAODV) has the best performance in terms of the packet delivery fraction, network load, packet loss and E-E delay comparison with other protocols.
- Page(s): 73-76
- Date of Publication: July 2013
- Bharat Raj Pandey Research Student in NITM Gwalior, MP, India
- Umesh Barhadiya Asst. Professor in NITM Gwalior, MP, India
- Devendra Singh GourResearch Student in ITM Gwalior, MP, India
References
[1] C.E. Perkins, E.M. Royer & S. Das, Ad Hoc on Demand Distance Vector (AODV) Routing, IETF Internet draft, draft-ietf-manet-aodv-08.txt, March 2001.
[2] D. Kim, J. Garcia and K. Obraczka, ―Routing Mechanisms for Mobile Ad Hoc Networks based on the Energy Drain Rate‖, IEEE Transactions on M obile Comp uting. Vo l 2, no 2, 2003, pp.161-173.
[3] David B. Johnson and David A. Maltz. ―Dy namic source routing in ad hoc wireless networks‖, Mobile Comp uting, Kluwer Academic Publishers. 1996 pp.153–181, 1996.
[4] M.Caleffi, G.Ferraiuolo and L.Pauro, ―On Reliability of Dynamic Addressing Protocols in Mobile Ad hoc Networks‖, Proceedin gs of WRECOM‘07, Wireless Rural and Emergency Communications Conference, Roma, Italy, October 2007.
[5] Marina MK, Das SR. Routing performance in the presence of unidirectional links in multihop wireless networks. In Proceedings of ACM MobiHoc, 2002.
[6] Mahesh K. Marina ‗‘Ad hoc on-demand multipath distance vector routing‘‘ wireless communications and mobile computing Wirel. Commun. Mob. Comput. 2006; 6:969–988 Published online in Wiley InterScience (www.interscience.wiley.com). DOI: 10.1002/wcm.432
[7]T.G. Basavaraju ‗Impact of MAC Layer on the Performance of Routing Protocols in Mobile Ad hoc Networks‘ International Journal of Information and Communication Engineering 3:8 2007
[8] The Network Simulator NS-2 homepage, https://www.isi.edu/nsnam/ns/
[9] Bharat Raj Pandey ‗‘ Performance Evolution of MAC Protocols for MANET Networks‘‘ International Journal of Emerging Technology and Advanced Engineering Website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 3, Issue 7, July 2013)
Bharat Raj Pandey, Umesh Barhadiya, Devendra Singh Gour "Comparative Analysis of Proactive and Reactive Protocols using 802.16 Network in MANET " International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 7, pp.73-76 2013
Current scenario of research shows that testing is a valuable area for every project to guarantee its quality and performance at actual behaviour. Before starting to test a system we first known literature about the remaining problem in project, due to this problem the performance and quality of project may not capture its planned area. So we first search out few of common error in the project. For that we need to clarify the concept of defect, error, fault, failure and other relevant to affect the system performance. In this paper we proposed simple and valuable stages for testing to capture common error and increase the performance of system. The paradigm of actual defect helps to classify the fault type. At last we summarize the paper and concluded with features scope.
- Page(s): 77-83
- Date of Publication: July 2013
- Prakash Kawar AsawatArya Institute of Engineering and technology , Jaipur, Rajasthan, India
- Krishan Kant LavaniaArya Institute of Engineering and technology , Jaipur, Rajasthan, India
- Deepak DemblaArya Institute of Engineering and technology , Jaipur, Rajasthan, India
References
[1] Arpita Mittal, Sanjay kumar Dubey, ― Defect Handling In Software Metrics‖, International Journal of Advanced Research in Computer and Communication Engineering Vol. 1, Issue 3, May 2012.
[2] Ghazia Zaineb and Dr. Irfan Anjum Manarvi, ―IDENTIFICATION AND ANALYSIS OF CAUSES FOR SOFTWARE BUG REJECTION WITH THEIR IMPACT OVER TESTING EFFICIENCY‖, International Journal of Software Engineering & Applications (IJSEA), Vol.2, No.4, October 2011.
[3] Sakthi Kumaresh and Baskaran Ramachandran,―DEFECT PREVENTION BASED ON 5 DIMENSIONS OF DEFECT ORIGIN‖, International Journal of Software Engineering & Applications (IJSEA), Vol.3, No.4, July 2012.
[4] Ruihua Chang, Xiaodong Mu and Li Zhang, ―Software Defect Prediction Using Non-Negative Matrix Factorization‖,JOURNAL OF SOFTWARE, VOL. 6, NO. 11, NOVEMBER 2011.
[5] Sannella Change Bursts as Defect Predictors Nachiappan Nagappan_ Andreas Zellery Thomas Zimmermannz Kim Herzigx Brendan Murphy.
[6] Forman, ―Cross-project Defect Prediction: A Large Scale Experiment on Data vs. Domain vs. Process‖, Thomas Zimmermann, Nachiappan Nagappan, Harald Gall, Emanuel Giger & Brendan Murphy, ESEC/FSE’09, August 24–28, 2009, Amsterdam, The Netherlands. Copyright 2009 ACM 978-1-60558-001-2/09/08...$10.00.
Prakash Kawar Asawat, Krishan Kant Lavania , Deepak Dembla "Novel Testing Rules : The Operation Of Defects" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 7, pp.77-83 2013
In any geographical area, survey of pravalance of intestinal helminthes are necessary to suggest appropriate control measures. The aim of this study was to determine the prevalence of intestinal helminthes parasite infection in school going children. A cross sectional study was conducted among school going children to determine the current status of intestinal parasitic infection in a rural area. The study was drawn from school in and around the Nandurbar District of Maharashtra stool sample were collected and examined by field workers. Microscopic examination of the stool sample for cysts and ova of intestinal parasite by direct wet smear and iodine solution method. The present study showed the prevalence of 30% intestinal parasitic infection in children the most common parasite was giardia lamblia (7.6%) followed by Hymenolepis nana (5.7%).
- Page(s): 84-87
- Date of Publication: July 2013
- Vasave Madhukar VasantJ.J.T. University, Jhunjhunu (Raj.) India
References
1. Albinico M., Crompton D.W. & savioli L. (1999). Control strategies for human intestinal nematode infection. Adv porasitol, Vol. 42, 277 – 341
2. Atul aher, sanjeev Kulkarni (2011), Prevalence of intestinal parasite in school going children in a rural community, international journal of Biomedical research, Vol : 2[12]:605-607
3. Bansal D, Sehgal R. Bhatti H.S., ShriVastava S.K. Khurana S., Mahajan R.C., & Malla N (2004) intestinal parasite and intra familial incidence in a low socio-economic area of Chandigarh (North India) Nepal Med Coll J, 6, 28-31.
4. Bora D,Meena V.R., Bhagath Dhariwal A.C., Shivla (2006) soil – transmitted helminthes, Pravalence in school children of pauri Grarhwal district Uttaranchal State J.C. Commun Dis 2006; 38: (12-4)
5. Dongre A.R., Deshmukh P.R., Boratane A.V., (2007), An approach going children http//www.ajhas.org/issue24/2007-4-2 htm.
6. Jiraamonnit C, wongkomchai S., Santabutr W., (2006). The prevalence of intestinal parasitic infection among school children with annual anthelmin- thic treatment in narathiwat provience, Thailand, J. trop med parasito vol : 45-50.
7. Khurana S., Aggrawal A., & Malla N. (2005) comparative analysis of intestinal parasitic infection in slum rural and urban population in and around union territory, Chandigarh J. Commun Dis. 37, 239-243.
8. Quihui L., Valencia M.E., Cromption, D.W., Phillips S., Hagan P., Morales G., & Diazecamacho S.P., (2006), Role of employment status and education of mother in the prevalence of intestinal parasitic infection in Mexican rural school children. BMC Public Health, 6:225.
9. Rodriguez Morales, A.J. Barbella, R.A. Case C., Arria M., Ravela M., Maldonado A., Aguilera Y., Viloria A., Blanco J.J. Colina. My Hernandez E., Arawjo, Cabiniel. G., Benite Z. J. and Rafakis P. (2006) intestinal parasitic infections among pregnant women in venezuala. Infect Dis obset Gynecol, 2006, 23125.
10. Sackey M.E., Weigel, M. W, & Armijos R. X. (2003) Predictors and national consequences of intestinal parasitic infections in rural Ecuadorian children J. Trop Pediatr 49:17-23
11. Saksirisampant W., Prowneborn, J., Kanmarnee P. (2004) Prevalence of parasitism among students of Karen hill tribe in Mac chame district, chiang Mai province, Thailand, J. Med. Assoc Thai Vol : 87:278-83.
12. Savioli L., Bunddy D., & Tomkins A. (1992) intestinal parasitic infection : a soluble public health problem trans R soc Trop Med Hyg, 86 : 353-354.
13. Wani S.A., Ahmad F., Zargar S.A., Dar P.A. Dar, P.A., & Jan T.R. (2008) intestinal helminthes in a population of children from the Kasmir valley India, J Helminthol, 82:313-317.
Vasave Madhukar Vasant "Prevalence of intestinal parasite among school going children in rural area, Nandurbar district, Maharashtra." International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 7, pp.84-87 2013
Employee retention refers to the ability of an organization to retain its employees. Employee retention can be represented by a simple statistic (for example, a retention rate of 80% usually indicates that an organization kept 80% of its employees in a given period). However, many consider employee retention as relating to the efforts by which employers attempt to retain employees in their workforce. In this sense, retention becomes the strategies rather than the outcome. In a business setting, the goal of employers is usually to decrease employee turnover, thereby decreasing training costs, recruitment costs and loss of talent and organisational knowledge. By implementing lessons learned from key organizational behavior concepts employers can improve retention rates and decrease the associated costs of high turnover. However, this isn't always the case. Employers can seek "positive turnover" whereby they aim to maintain only those employees who they consider to be high performers. One of the greatest challenges facing employers today is finding and keeping good employees. This article describes some effective employee retention strategies that will help you retain good staff and develop a stable workforce. Many executives still cling to the outdated notion that people "go for the gold", that salary dictates all their employment decisions. But for the most part, people want opportunities to grow and learn, to advance in their careers and to work on challenging and interesting projects. They want to be recognized and appreciated for their efforts. They want to feel a part of something that adds value to their community.
- Page(s): 90-93
- Date of Publication: July 2013
- Pawan KumarResearch Scholar, SJJT University, Jhunjhunu, Rajasthan, India
- Dr. Shiv Ram Singh JhajhariaLecturer Selection Scale N.D.B. Government College Nohar HMH Rajasthan, India
References
1. Mondaq.com/x/155322/Five+Top+Employee+Retention+Strategies.
2. Blog.softwareadvice.com/articles/hr/5-retention-strategies-for-a-high-performance-environment-1062112
3. Breaugh, James A., and Mary Starke. "Research on Employee Recruitment: So Many Studies, So Many Remaining Questions." Journal of Management (2000): 305-434. Web. 12 Mar. 2011.
Pawan Kumar, Dr. Shiv Ram Singh Jhajharia "Employee Retention Policies in Private Sector Firms: An Assessment" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 7, pp.90-93 2013
The popularity of learning on the internet, the construction of perfect web-based learning environment has become one of the hot points on researching remote education.It is envisioned that, in the near future, cloud computing will have a significant impact on the educational and learning environment,enabling their own users(i.e.,learners, instructors, and administrators) to perform their tasks effectively with less cost by utilizing the available cloud-based applications offered by the cloud service providers. This paper discusses the use of cloud computing in the educational and learning arena, to be called ‟Education and Learning as a Service” (ELaaS), emphasizing its possible benefits and offerings. It is essential for an educational and learning organization, with its budget restrictions and sustainability challenges, to use the cloud formation best suited for a particular IT activity. In this paper, web-based learning environment and the concept of cloud computing are discussed. The lastest development of cloud computing.
- Page(s): 94-99
- Date of Publication: July 2013
- Dr.Gaurav Kumar Jain
- Dr. Akash Saxena
- Mr. Vikas Madan
- Mr. Vishwas Verma
References
[1]https://cloud.csdn.net/a/20110129/291148. html.AllanE.Alter,Yali Peng,Lin Runhua and Jeanne G.Harris, “China’s
[2] W.M. Zheng. Opportunities and Challenges to Cloud Computing. https://www.wsncs.zjut.edu.cn/download/201 01204153234194.pdf, 2010.10.19
[3]M.V. Luis, R. M. Luis, C. Juan, L. Maik. A Break in the Clouds: Towards a Cloud Definition. Computer Communication Review, vol.39, pp.50-55, 2009
[4] https://en.wikipedia.org/wiki/E-learning
[5]https://www.vmware.com/company/news/ releases/virtual_datacenter_os_vmworld08.h tml
[6] https://en.wikipedia.org/wiki/Data_center [7]C Li, Z. H. Deng. On the Value of Cloud Computing. Library and Information,No4,pp,42- 46,2009
[8] Li Jiahou. Cloud computing service in educational technology. Journal ofDistance Education
[9]Yizeng Chen, Xingui Li, Fangning Chen Overview and Analysis of Cloud Computing research and application
[10]Hall Mark Everett . “SaaS Surprises”Computer World 2009,12:p19-22
Dr.Gaurav Kumar Jain, Dr. Akash Saxena, Mr. Vikas Madan, Mr. Vishwas Verma "Web-Based Learning Environment with Cloud Computing" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 7, pp.94-99 2013
India is the seventh spacious country in the world, and the second biggest in Asia. Before the coming of Muslims, the country was shred into small previseing states and there was no concept of Indian nationalism. The Muslim rulers, especially the Mughals, unified the land and gave it a central administration. They called the land Hind and Hindustan, i.e. a country of the Hindus. The name 'India', a Deformation of Hind, was given to her by the British governors. It’s before the emplacement of Muslim rule, there was no history of India. People of particular locality recorded some occasion of certain rulers vaguely. The Muslims took exclusive care to record historical movements and appointed historiographers to do that job. The British administration reconstructed their charts and gave the Hindus a history of the distinct past not barring their self interest to play one society against the other.
- Page(s): 100-106
- Date of Publication: July 2013
- AlisherSJJT University, Jhunjhunu, Rajasthan, India
- Dr. Sunil Kumar JangirSJJT University, Jhunjhunu, Rajasthan, India
References
Abbasi, M. Y., The Genesis of Muslim fundamentalism in British India (Delhi, 1987).
Ahmed, A., Islamic Modernism in India and Pakistan, 1857-1964.
Ahmed, Jamil-ud-udin, Muslim Political Movement-Early Phase (Karachi, 1963).
Badshah Khan, My Life and Struggle (Delhi, 1969).
Baig, M. R. A., The Muslim Dilemna in India (Delhi, 1974).
Chandre, Kailash, Tragedy of Jinnah (Lahore, 1941).
Dalwai, Hamid, Muslim Politics in India (Bombay, 1968).
Dixit, Prabha, Communalism in India: A struggle for Power (Delhi, 1974).
Faruqi, Z. H., The Deoband and School and the Demand for Pakistan (Bombay, 1963)
Gallagher, Johnson, Seal, (eds.), Locality, Province and Nation Essays on Indian Politics, 1870-1940 (Cambridge, 1973).
Gopal, R., Indian Muslims: A Political History, 1859-1947, reprint (Bombay, 1964).
Gopal, S., The Viceroyalty of Lord Irwin, 1926-31 (Oxford, 1957).
Gordon, L. A., The Nationalist Movement, 1876-1940 (New York, 1974).
Hardy, P., The Muslims of British India (Cambridge, 1972).
Haq, Gushirul, Muslim Politics in Hodern India, 1857-1947 (Meerut, 1970).
Hodson, H. V., The Great Divide (London, 1969).
Husain, S. A., The Destiny of Indian Muslims (Bombay, 1965).
Jain, A. P. Rafi Ahmed Kidwal: A Memoir of His Life and Times (Bombay, 1965).
Kabir, Humayun, Muslim Politics, 1906-1942 (Calcutta, 1943).
Krishna, K. B., The Problem of Minorities (London, 1939).
Kumar, R. (ed.) Essays on Gandhian Politics: The Rowlatt Satyagraha of 1919 (Oxford, 1971).
Manglori, T. A., Musalmanon ka Raushan Mustaqbil (Delhi, 1945). (M.K. Gandhi, 1991 Hindu Dharma, Bombay publishing house, 1991)
Mathur, Y. R., Muslims and the Changing India (New Delhi, 1972).
Qureshi Shaheen Sultana 2011 Interlink Research Analysis ISSN 0976-0377 Vol. I, Issue : IV, July. to Dec., 2011R
Alisher, Dr. Sunil Kumar Jangir "The Role of Muslims in the Pre-Independence Politics in India- A Historical Study" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 7, pp.100-106 2013
INTRODUCTION Peer to peer networks provide a paradigm shift from the traditional client server model of most networking applications by allowing all users to act as both clients and servers. The primary use of such networks so far, has been to swap media les within a local network or over the Internet These networks have grown in their popularity in the recent past and the fraction of network trap c originating from these networks has consistently increased .The growing popularity and high penetration of P2P clients such as KaZaa, Gnutella and BitTorrent have provided virus writers with a potent means of compromising hosts on a large scale.
- Page(s): 107-111
- Date of Publication: July 2013
- Dr.Gaurav Kumar Jain
- Dr. Akash Saxena Mr. Ajay Sharma
- Mr. Indra Kishor
References
[1] O.Diekmann, J. A. P. Heeterbeek, “Mathematical Epidemiology of Infectious Diseases: Model Builind, Analysis and 1999 Interpretation,” Wiley,
[2] Celery Search Engine, https://site.n.ml.org/info/ celery/
[3] “Napster Protocol Specification,” March 12 2001, https://opennap.sourceforge.net/napster.txt
[4] Characterization of Internet traf c loads, segregated by application, https://www.caida.org/analysis/workload/ byapplication/ .
[5] Kazaa. https://www.kazaa.com
[6] Clip2, “The Gnutella Protocol Speci cation v0.4,” March 2001, https://www.clip2.com/GnutellaProtocol04.pdf.
[7]Clip2 Company, Gnutella. https://www.clip2.com/gnutella.html
[8]B. Cohen, “Incentives Build Trust in BitTorrent,” May 2003, http: //bitconjurer.org/BitTorrent/bittorrentecon.pdf
[9] P. van den Driessche and J. Watmough,“Reproduction numbers and sub-threshold endemic equilibria for compartmental models of disease transmission,” Mathematical Biosciences, vol. 180, pp. 29-48, 2002.
[10] J. Arnio, J. Davis, D. Hartley, R. Jordan, J. Miller and P. van den Driessche, “A multi-species epidemic model with spatial dynamics,” Mathematical Medicine and Biology, March 2005.
[11] L. Zhou, L. Zhang, F. McSherry, N. Immorlica, M.Costa and S. Chien, “A First Look at Peer-to-Peer 2005.
[12] A. J. Ganesh, L. Massoulie and D. Towsley, “The Effect of Network Topology on the Spread of Epidemics,” Proceedings of IEEE INFOCOM,Miami, USA, March 2005
[13]Y. Wang, D. Chakrabarti, C. Wang and C. Faloutsos, “Epidemic spread-ing in real networks: An eigenvalue viewpoint,” SRDS 2003, (pages 25- 34), Florence, Italy
[14]M.E.J Newman, S.H. Strogatz, and D.J. Watts, “Random graphs with arbitrary degree distribution and their applications,” Physical Review E, vol. 64, no. 026118, 2001
[15] D. Qiu and R. Srikant, “Modeling and performance analysis of BitTorrent-like peer-to-peer networks,” Proceedings of ACM SIGCOMM, Portland, OR, August 2004.
[16] X. Yang and G. de Veciana, “Service capacity in peer-to-peer networks,” Proceedings of IEEE INFOCOM, pp. 1-11, Hong Kong, China, March 2004.
[17] M. Costa, J. Crowcroft, M. Castro and A. Rowstron, “Can we contain Internet worms ?,” HotNets-III: Third Workshop on Hot Topics in Net-works, San Diego, USA, 2003
[18]J. Mundinger and R. R. Weber, “Ef cient File Dissemination using Peer-to-Peer Technology,” Technical Report, Statistical Laboratory Research Reports 2004-01, 2004.
[19]https://www.infoworld.com/articles/hn/xml/01/02/ 27/010227hnp2pvirus.html?0227alert
[20]R.W. Thommes and M.J. Coates, “Epidemiological Models of Peer-to-Peer Viruses and Pollution,” Technical Report, Department of Electrical and Computer Engineering, McGill University, June, 2005.
[21] R.W. Thommes and M.J. Coates, “Modeling Virus Propagation in Peer-to-Peer Networks,” Technical Report, Department of Electrical and Computer Engineering, McGill University, June, 2005.
Dr.Gaurav Kumar Jain, Dr. Akash Saxena, Mr. Ajay Sharma, Mr. Indra Kishor "Modeling Malware Propagation With Peer-to-Peer Networks" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 7, pp.107-111 2013
The important control characteristics of DC motor have contributed in the extensive use of DC motor in the industry. With the increasing use of power semi conductor units, the speed control of DC motor is increasingly getting sophisticated and precise. Speed of the DC motor is controlled by controlling the armature voltage. Armature voltage is controlled using different single phase AC/DC converter. Half converter, semi converter, full converter and dual converter are some of the thyristor based circuits which are used for speed control of DC motor. This paper studies different speed control techniques of DC motor and makes a comparative study of different converter based speed controller techniques.
- Page(s): 112-118
- Date of Publication: July 2013
- Virendra Singh SolankiDepartment of Electrical and Electronics Engineering,RGPV University, Mandsaur, India
- Virendra JainDepartment of Electrical and Electronics Engineering,RGPV University, Mandsaur, India
- Anil Kumar ChaudharyDepartment of Electrical and Electronics Engineering,RGPV University, Mandsaur, India
References
[1] D. A. staton, M. I. McGilp and T. J. E. Miller, “DC machine teaching experiment,” in proceedings of the European Power Electronics Association EPE, Brighton, pp. 35 – 40, 1993
[2] S. J. Chapman, Electric Machinery Fundamentals, New York: WCB/McGraw-Hill,1998.
[3] W. M. Daniels and A. R. Shaffer, “Re-inventing the electrical machinescurriculum,” IEEE Transactions on Education, vol. 41, pp. 92-100, May1998.
[4] N. Mohan, Electric Drives: An integrative approach, University ofMinnesota Printing services, 2000.
[5] M. Nedeljkovic and Z. Stojiljkovic, “Fast current control for thyristor rectifiers,” IEE Proceedings- Electr. Power Appl., Vol. 150, No. 6, pp. 636-638, Nov. 2003.
[6] Alfio Consoli, Mario Cacciato, Antonio Testa and Francesco Gennaro, “Single Chip Integration for Motor Drive Converters With Power Factor Capability,” IEEE Transactions on Power Electronics, Vol. 19, No. 6, pp.1372-1379, Nov. 2004.
[7] S. Li and R. Challo, “Restructuring an electric machinery course with an integrative approach and computer-assisted teaching methodology,” IEEE Transactions on Education., vol. 49,pp. 16-28, Feb.2006.
[8] Manoj Daigavane, Hiralal Suryawanshi and Jawed Khan, “A Novel Three Phase Series-Parallel Resonant Converter Fed DC-Drive System,” Journal of Power Electronics, Vol. 7, No. 3, pp. 222-232, July 2007.
[9] Wai Phyo Anug, “Analysis on Modeling and Simulink of DC Motor and its Driving System Used for Wheeled Mobile Robot,” World Academy of Science, Engineering and Technology 32, pp. 299-306, 2007.
[10] A. Gelen and S. Ayasun, “Effects of PWM chopper drive on the torque- speed characteristic of DC motor” 43rd International Universities Power Engineering Conference, 2008.
[11] P. S. Bhimbhra, Power Electronic, Khanna publishers, 2010.
Virendra Singh Solanki, Virendra Jain, Anil Kumar Chaudhary "Different Speed Control Techniques of DC Motor: A Comparative Analysis" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 7, pp.112-118 2013
In this paper a fuzzy sliding mode control is proposed for speed control of indirect field-oriented induction motor drive. First a indirect field-oriented control introduced briefly. Then a sliding mode control is investigated. The proposed control design uses a fuzzy logic technique for implementing a fuzzy hitting control law to remove completely the chattering phenomenon on a conventional sliding mode control. Here to adjust the fuzzy parameter for further assuring robust and optimal control performance, an adaptive algorithm which is derived in the sense of Lyapunov stability theorem is utilized. The proposed fuzzy sliding-mode controller is compared with sliding mode controller with external load perturbation using periodic speed command. The simulation results shows that fuzzy sliding mode controller is robust for tracking the periodic command free from chattering.
- Page(s): 119-125
- Date of Publication: July 2013
- Barkha RajpurohitDepartment of Electrical Engineering Mandsaur Institute of Technology Madhya Pradesh, India
- Arti GosainDepartment of Electrical Engineering Mandsaur Institute of Technology Madhya Pradesh, India
- Anil Kumar ChaudharyAssistant Professor Mandsaur Institute of Technology Dept. of Electrical Engineering Madhya Pradesh, India
References
[1] B.K Bose “Modern power electronics and ac drives “Prentice-Hall OfIndia, New Delhi, 2008.
[2] R.J.Wai, “Fuzzy sliding-mode control using adaptive tuning technique,”IEEE Trans.Ind.Elelctron.Vol.54,no.1,pp.586-594,feb2007.
[3] K.B.Mohanty, “Sensorless sliding mode control of induction motor drives,” IEEE Region10 conference, TENCON, Hyderabad, Nov 2008, pp.1-6.
[4] E.Cerruto,A.Consoli,A.Testa,“Fuzzy adaptive vector control of induction motor drives,” IEEE Transaction on Power Electronic, vol.12, no.6, pp.1028-1040, Nov.1997.
[5] K..B.Mohanty, “A fuzzy sliding mode controller for a field-oriented induction motor drive,” Journal of Institution of Engineers (India), vol.86, pp.160-165, Dec.2005.
[6] R. J. Wai, K.M. Lin, and C.Y. Lin “Total sliding-mode speed control of field-oriented induction motor servo drive,” Asian Control Conference,Jul.2004, vol. 2,pp.1354-1361.
[7] R.J. Wai, “Adaptive sliding- mode control design for induction servo motor drive system,” Proc. Inst. Elect. Eng. Electr. Power Appl.,2000, vol.147, no. 6, pp. 553-562.
[8] K.K. Shyu and H.J. Shieh, “A new switching surface sliding- mode speed control for induction motor drive systems,” IEEE Transaction on Power Electronics., vol.11, pp. 660-667, Jul.1996.
[9] M Nasir Udin,Tawfik S.Radwan and M.Azizur Rahman,“Performance of fuzzy-logic-based indirect vector control for induction motor drive,” IEEE Transaction on Industry Applications, vol.38, no. 5, Sept/Oct.2002.
[10] Gilberto C.D.Sousa, B. K.Bose and John G.Cleland “Fuzzy logic based on-Line efficiency optimization of an indirect vector-controlled induction motor drive,” IEEE Transaction on Industrial Electronics, vol.42, pp. 192-198, Apr.1995.
[11] V.I.Utkin, “Sliding mode control design principle and application to electric drives,” IEEE Transaction on Industrial Electronics, vol. 40, no.1, pp. 23-36, Feb. 1993.
[12] J.B Wang, and C.M. Liaw, “Performance improvement of a field- oriented induction motor drive via fuzzy control,” Electrical Machines and Power Systems, vol.27, no.1, 1999, pp. 93-105.
[13] T.G.Park and K.S.Lee, “SMC-Based adaptive input-output linearizing control of induction motors,” IEEE Proc. on Control Theory Applications, vol. 145, no. 1,Jan. 1998, pp. 55-62.
[14] F.J.Lin, H.M.Su. and H.P. Chen, “Induction motor servo drive with adaptive rotor time- constant estimation,” IEEE Transaction on Aerospace Electronic system, vol. 34, pp. 224-234, Jan. 1998.
[15] Brian Hebert, Longya Xu and Yifan Tang, “Fuzzy logic enhanced speed control of an indirect field-oriented induction machine drives,” IEEE Transaction on Power Electronics, vol.12, no.5, pp.772-778, Sept.1997.
Barkha Rajpurohit, Arti Gosain, Anil Kumar Chaudhary "Adaptive Fuzzy Sliding Mode Controller for Indirect Vector Control of Induction Motor Drive Vector Control of Induction Motor Drive" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 7, pp.119-125 2013
Low noise amplifiers are one of the basic building blocks of any communication system. The purpose of the LNA is to amplify the received signal to acceptable levels with minimum self generated additional noise. A Low Noise Amplifier (LNA) is placed at the front end of the radio receiver which poses a challenge in terms of meeting high gain, low noise figure, good linearity and low power consumption requirement. Using an LNA, the effect of noise from subsequent stages of the receive chain is reduced by the gain of the LNA, while the noise of the LNA itself is injected directly into the received signal. Thus, it is necessary for an LNA to boost the desired signal power while adding as little noise and distortion as possible, so that the retrieval of this signal is possible in the later stages in the system. In this paper, we introduce a systematic method to design a CMOS low noise amplifier (LNA) for a radio receiver.The developed LNA implemented in 0.18μm UMC technology using Cadence Virtuoso (R) Schematic editor XL tool by 1.8V supply.
- Page(s): 126-132
- Date of Publication: July 2013
- Dwijendra parasharM. Tech. (Communication Engg.) Scholar, Deptt of Electronics and Communication Engineering, Shobhit University, Meerut (Uttar Pradesh)
- Nisha ChughAsstt. Prof. Department of Electronics and Communication Engineering, Shobhit University, Meerut (Uttar Pradesh)
References
[1] “The Design of CMOS Radio Frequency Integrated Circuits”, Thomas H. Lee. Cambridge University Press, 1998.
[2] Communications Receivers, Third Edition, Ulrich L. Rohde, Jerry Whitaker, McGraw Hill, New York, 2001, ISBN 0-07-136121-9.
[3] Buscar copias de Dr. Jimenez en Reproducciones ($1-$2) – “Digital circuits using MOS transistors”
[4]H. C. Lin and L.W. Linholm, “An optimized output stage for MOS integrated circuits,” IEEE Journal of Solid-State Circuits, vol. 10, pp. 106–109, April 1975.
[5]R. C. Jaeger, “Comments on An optimized output stage for MOS integrated circuits,” IEEE Journal of Solid-State Circuits, vol. 10, pp. 185–186, June 1975.
[6] B. Razavi, “Design of Analog CMOS Integrated Circuits”, McGraw-Hill, 2001.
[7] “Microwave Transistor Amplifiers”, Guillermo Gonzalez, Prentice Hall, 1984.
[8] LNA Design Using Spectra RF Application Note Product Version 5.0 December 2003 September by Cadence Design Systems.
[9] Reinhold Ludvig, Pavel Bretchko: RF Circuit Design - Theory and Applications, Prentice Hall 2000, ISBN 0-13-095323-7.
[10] R. Ramazan, Tutorial simulation of LNA, Linkoeping University, Sweden, 2009.
[11] T.H. Lee, the Design of Cmos Radio - Frequency Integrated Circuits, Cambridge University, 2004.
[12]Sungkyung Park and Wonchan Kim, “Design of a 1.8 GHz low-noise amplifier for RF front-end in a 0.8,”Consumer Electronics, IEEE Transactions on, vol. 47, no. 0098, 2001.
[13] D. K. Shaeffer, T. Lee, “A 1.5V, 1.5GHz CMOS Low Noise Amplifier,” IEEE Journal of Solid-State Circuits, vol. 32 no.5 May 1997.
[14] B. Razavi, “CMOS Technology Characterization for Analog and RF Design,” IEEE Journal of Solid-State Circuits, vol. 34, no. 3, March. 1999.
[15] Adel S. Sedra and Kenneth C. Smith, Microelectronic Circuits, 1987, Holt, Rinehart and Winston, Inc.
[16] Worcester Polytechnic Institute. “Cadence Design Tools Tutorial”.https://turquoise.wpi.edu/cds/examples/layout.4.html
[17] Ahmad Saghafi; Abdolreza Nabavi(2006):An Ultra-Wideband Low-Noise Amplifier for 3–5-GHz Wireless Systems” The 18th International Conference on Microelectronics (ICM) 2006.
[18] Pablo M. G.; Mohammad H.(2006): Design of a CMOS Low-Noise Amplifier ,Stanford University
[19] ZHANG H.; CHEN Gui;(2008):Design of a fully differential CMOS LNA for 3.1–10.6 GHz UWB communication systems.
[20] J.P.Silver: MOS Differential LNA design Tutorial.
[21] Reza Molavi (2005): On the design of Wideband CMOS Low-Noise Amplifiers.
Dwijendra parashar, Nisha Chugh "Design of Low Noise Amplifier at 8.72 GHz" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.2 issue 7, pp.126-132 2013