Search PPTs

Saturday, July 20, 2013

PPT On Fast and Secure Handover of Intra ASN IEEE802.16e Network by Proposed Certificate based Pre-Authentication



Download

Fast and Secure Handover of Intra ASN IEEE802.16e Network by Proposed Certificate based Pre-Authentication Presentation Transcript:
1.Fast and Secure Handover of Intra ASN IEEE802.16e Network by Proposed Certificate based Pre-Authentication

2.AGENDA
Introduction
Related Work
Objective
Pre-Authentication Before Handover
Pre-Authentication and Distribution of PAC
Handover
Algorithm for proposed Work
Results
References

3.INTRODUCTION
WiMAX is an acronym of Worldwide Interoperability for Microwave Access.

It is an IP based, wireless broadband access technology.

It is used in Metropolitan Area Networks.

It supports both fixed and mobile applications.

It  is used in both 3G and also 4G technology.

4.RELATED WORK

5.OBJECTIVE
Main motive of the mobile technologies is to provide seamless cost effective mobility.

But this is affected by Authentication cost and handover delay.

Proposed Pre-Authentication method is intended to reduce the authentication delay by getting pre-authentication Certificate(PAC) by central authority called Pre Authentication Authority (PAA).

MS having time bound PAC can skip the authentication process when recognized by target BS during handoff.

6.HANDOVER PROCESS

7.Handover process normally has 9 steps. From this 9 steps, 4steps is utilized for authentication. So it has more time during this process.

Authentication is the initial step of the Handover Process. It enhances the delay during handover. It can be reduced by using Pre-authentication process.

8.TERMINOLOGIES

9.Pre-Authentication Before Handover

10.Pre-Authentication is performed before the Handover process.

First PAA (Pre Authentication Authority) verifies the identity of MS.

If verification succeeds means, PAC(Pre-Authentication Certificate) and CET (Certificate Expiry Time) is distributed from PAA to MS and also to the Neighboring BSs (Base Stations).

After PAC distribution, The Handover process  begins between MS and BS.

Presentation On Face Recognition Techniques

PPT On Face Recognition Techniques
Download

Face Recognition Techniques Presentation Transcript:
1.A Review On Face Recognition Techniques

2.Contents
Introduction
Review on the topic
Related Issues
Face Recognition Techniques
Comparison
Discussion
Databases
Conclusion
References

3.Introduction
Face recognition is a biometric technique for automatic identification.

It makes use the most usual human identifier, face and unique facial characteristics.

Emergence has been fuelled due to wide range of law and commercial enforcement.

Widely used in commercial systems to perform real-time face detection, image registration and image matching.

4.Technologies in face recognition have been evolving through years. Its importance has recently grown in a significant manner due to:
Increased civilian and commercial research projects.
Need for surveillance in trafficking.
Increased terrorist activities.
Enhanced real time computation and exploration of real time hardware.

5. Review
Before the middle 90’s, the research attention was only focused on single-face recognition. The approaches included:
Kirby and Sirovich [1] were among the first to apply principal component analysis (PCA) to face images.
Turk and Pentland popularized PCA for face recognition [4] via eigen faces.
Neural networks have been widely applied in pattern recognition as achieve better performance than the simple minimum distance classifiers [16].
Using skin color etc.

6.During the past ten years, considerable progress has been made in multi-face recognition area, includes: RBF neural networks process implemented in helps in structure determination of the radial basis function (RBF) neural networks.
Discrete cosine transform (DCT) [3, 14].
Support vector machine (SVM) by Osuna et al. (1997).
Hidden Markov Model [19, 39].
Multilinear PCA [31, 32].
Face Recognition using Texture and Depth Information[38].

7.Technical approaches to face recognition
Feature based approach : based on shape and geometrical relationships of key facial features including eyes, mouth, nose, chin and curvature based face components [18]. These are more robust against rotation, scale, and illumination variations
Holistic approach (Template matching approach) : takes the input face images globally and extract important facial features based on the high-dimensional intensity values of face images automatically. They greatly rely on the accuracy of facial feature detection
Hybrid approach : uses both the face images together with the local features for face recognition.

8.Issues faced by face recognition techniques
Image intensity and orientation
Pose
Structural components  
Occlusion
Image quality
Facial expression
Illumination  

9.Face Recognition Techniques
The incredible human intelligence can be demonstrated by its ability to recognize human faces.

Over the last three decades researches have been going on to study this outstanding visual perception of human beings in machine recognition of faces.

While coping up with the challenges in face recognition numerous techniques have been implemented and few are as follows

10.Principal component analysis (PCA) is a statistical dimensionality reduction method.
This subspace projection technique has found application in fields such as face recognition, pattern recognition and image compression.
It is computationally efficient to compare images in subspaces with significantly reduced dimensions.
PCA helps to reduce image vectors with 65,536 pixels (256x256) might be projected into a subspace with only 100 to 300 dimensions.
PCA reveals the most effective low dimensional structure of facial patterns by decomposing the face structure into orthogonal (uncorrelated) components known as eigenvectors and eigenvalues [20].
 

PowerPoint Presentation On Low-Dropout Regulator

Low-Dropout Regulator with modest ripple and rugged performance in 180nm
Download

Low-Dropout Regulator with modest ripple and rugged performance in 180nm Presentation Transcript:
1.Low-Dropout Regulator with
 modest ripple and  rugged performance  in 180nm


2.Presentation Outline
INTRODUCTION
LINEAR REGULATOR CONCEPTS
CIRCUIT IMPLEMENTATION
PERFORMANCE ANALYSIS
CONCLUSION

3.INTRODUCTION
Supplying and conditioning power are the most fundamental functions of an electrical system.

A loading application cannot sustain itself without energy, and cannot fully perform its functions without a stable supply

Transformers, generators, batteries, and other off-line supplies  incur substantial voltage and current variations across time and over a wide range of operating conditions

High frequency switching circuits  CPU and DSP circuits utilized in an application usually load it.

Solution for above mentioned problems is to use a power converter

4.LINEAR REGULATOR
CONCEPT OF LINEAR REGULATOR

5.LINEAR REGULATOR
Transient response of LDO
LDO provide power to low-voltage digital circuits operating under different modes of operation --voltage transients-cannot be handled by digital circuits

Factors affecting transient response of an LDO
The internal compensation of the LDO
The amount of output capacitance
The parasitics of the output capacitor
The faster local feedback n/w responds quicker to load changes than more complicated regulator loop
The additional loop has negligible effects on dc accuracy as its low frequency gain is kept well below that of the regulator
The additional loop also demand little to no current to have less impact  on operational life of battery

6.LINEAR REGULATOR
REGULATING PERFORMANCE
LOAD REGULATION
Steady-state (dc) voltage variations in the output (?VOUT) resulting from dc changes in load current (?ILOAD) define load regulation(LDR) performance

Systematic input-offset voltages, which result from asymmetric currents and volt-ages in the feedback error amplifier, further degrade load-regulation performance

Even if the LDO were symmetric, its widely variable load would cause considerable voltage swings at internal nodes, subjecting some of the devices to asymmetric conditions
LINE REGULATION
Line regulation(LNR) performance is  a dc parameter and it refers to output voltage variations arising from dc changes in the input supply

Power-supply variations affect the regulator in two ways
Directly through its own supply

Indirectly via supply-induced variations in reference  VREF

7.LINEAR REGULATOR
PROCESS AND TEMPERATURE INDEPENDENT BIASING
The transconductance of MOSFETs determine performance parameters: small signal gain, speed and noise.
It is desirable to bias the transistors such that their transconductance is independent of process, supply voltage and temperature

8.Circuit Implementation

9.Conclusion
LDO regulator targeted for SOC applications
    (optimized design for performance, board area, and cost)

LDO is stable for output current in the complete range from 0 to 100 mA

LDO with high regulation accuracy and fast transient response

10.LDO regulator targeted for SOC applications
    (optimized design for performance, board area, and cost)

LDO is stable for output current in the complete range from 0 to 100 mA

LDO with high regulation accuracy and fast transient response

Presentation On Cooperative Spectrum Sensing in Cognitive Radio Networks

PPT On Cooperative Spectrum Sensing in Cognitive Radio Networks
Download

Cooperative Spectrum Sensing in Cognitive Radio Networks Presentation Transcript:
1.A study analysis of Cooperative spectrum sensing in Cognitive Radio Networks

2.Outline of Presentation
Motivation
Objectives
Introduction
Functions
Spectrum Sensing Techniques
Cooperative Spectrum Sensing
Cluster Based
Simulation Results
Conclusion
Future Work
References

3.Motivation
Recent measurement by the FCC in the US show 70% of the allocated spectrum is not utilized

4.Objectives
To Maximize Probability of Detection
To Minimize the probability of False alarm
To Minimize sensing time
To Maximize throughput

5.Spectrum Holes

6.Cognitive Radio
“A cognitive radio (CR) is a radio that can change its operating parameters dynamically based on interaction with the environment in which it operates”.
They are designed to provide highly reliable communication for all the users of the network, wherever and whenever needed.

7.Maximizes throughput
Mitigates interference
Facilitates interoperability
Access secondary markets

8.Cognitive radio cycle
Cognitive Cycle
Spectrum sensing
Spectrum analysis
Spectrum decision

9.Design Issues
Spectrum sensing
Spectrum management
Spectrum sharing
Spectrum mobility

10.Spectrum Sensing Techniques
The most efficient way of spectrum sensing techniques are divided into :
Local Spectrum Sensing
Energy detection
Matched Filter detection
Cyclostationary detection
Cooperative  Spectrum Sensing  
Distributive Cooperative detection
Centralized  Cooperative  detection
External Cooperative detection
 

Presentation On ANT COLONY OPTIMIZATION

PPT On ANT COLONY OPTIMIZATION
Download

ANT COLONY OPTIMIZATION Presentation Transcript:
1.ANT COLONY OPTIMIZATION

2.Basic Definitions

3.Pheromone
A pheromone is a secreted or excreted chemical factor that triggers a social response in members of the same species. Pheromones are chemicals capable of acting outside the body of the secreting individual to impact the behavior of the receiving individual.
Types
Aggregation
function in defense against predators, mate selection, and overcoming host resistance by mass attack.
Alarm
Some species release a volatile substance when attacked by a predator that can trigger aggression (in ants, bees, termites) in members of the same species.

4.Signal
cause short-term changes, such as the neurotransmitter release that activates a response.
Territorial
Laid down in the environment, territorial pheromones mark the boundaries of an organism's territory.
Trail
Trail pheromones are common in social insects. For example, ants mark their paths with these pheromones, which are volatile hydrocarbons.
Information
There is two kind of information:
Heuristic Information
Pheromone trail  information

5.Heuristic Information
It related to general strategies or methods for solving problems.
That solve a problem more quickly but is not certain to arrive at an optimal solution.
A heuristic is a word from the Greek meaning "to discover." It is an approach to problem solving that takes one's personal experience into account.
Heuristic techniques involving or serving as an aid to learning, discovery, or problem-solving by experimental and especially trial and error methods.
refers to experience-based techniques for problem solving, learning, and discovery. Where the exhaustive search is impractical, heuristic methods are used to speed up the process of finding a satisfactory solution.
Examples of this method include using a rule of thumb, an educated guess, an intuitive judgment, or common sense.

6.Metaheuristics
A metaheuristic is a set of concepts that can be used to define heuristic methods that can be applied to a wide set of different problems.
“A metaheuristics refers to a master strategy that guides and modifies other heuristics to produce solutions beyond those that are normally generated in a quest for local optimality” – Fred Glover and Manuel Laguna
A metaheuristic can be seen as a general algorithmic framework which can be applied to different optimization problems with relatively few modifications to make them adapted to a specific problem.
 Examples of metaheuristics include ant colony optimization (ACO), tabu search (TS), iterated local search (ILS), and simulated annealing (SA)

7.There are properties that characterize most metaheuristics:
Metaheuristics are strategies that guide the search  process.
The goal is to efficiently explore the search space in order to find near optimal  solutions.
Techniques which constitute metaheuristic algorithms range from simple local  search procedures to complex learning processes.
Metaheuristic algorithms are approximate and usually non deterministic.
Metaheuristics are not problem-specific.

8.Swarm Intelligence
Swarm intelligence takes inspiration from the social behaviors of insects and of other animals.
In particular, ants have inspired a number of methods and techniques among which the most studied and the most successful is the general purpose optimization technique known as ant colony optimization.

9.Ant colony optimization
The ACO is the probability algorithm used for searching optimization paths. It was proposed by Marco Dorigo in his doctoral dissertation in 1992, and the idea was from the activities that ants explore ways when they are looking for food.

10.Ant colony optimization (ACO) takes inspiration from the foraging behavior of some ant species. These ants deposit pheromone on the ground in order to mark some favorable path that should be followed by other members of the colony.
In ACO, a number of artificial ants build solutions to an optimization problem and exchange information on their quality via a communication scheme that is reminiscent of the one adopted by real ants.
The first ant colony optimization algorithm is known as Ant System and was proposed in the early nineties. Since then, several other ACO algorithms have been proposed.
 

Presentation On ALCOHOL AS AN ALTERNATIVE FUEL IN I.C ENGINES

PPT On ALCOHOL AS AN ALTERNATIVE FUEL IN I.C ENGINES
Download

ALCOHOL AS AN ALTERNATIVE FUEL IN I.C ENGINES Presentation Transcript:

1.ALCOHOL AS AN ALTERNATIVE FUEL IN I.C ENGINES

2.INTRODUCTION
In this century, it is believed that crude oil and petroleum products will become very scarce and costly.
 Day-to-day, fuel economy of engines is getting improved and will continue to improve. However, enormous increase in number of vehicles has started dictating the demand for fuel.
 With increased use and depletion of fossil fuels, alternative fuel technology will become more common in the coming decades.
Because of the high cost of petroleum products,  energy security , emission problems some developing countries are trying to use alternate fuels for their vehicles.

3.LIQUID FUELS
Liquid fuels are preferred for IC engines because they are easy to store and have reasonably good calorific value. The main alternative is the alcohol
ALCOHOL
Alcohols are attractive alternate fuels because they can be obtained from both natural and manufactured sources. Methanol and ethanol are two kinds of alcohols that seem most promising.

4.What about Using Ethanol and/or Biodiesel for Fuel?

5.Structure of ethanol molecule.

6.Ethanol
HOW IS IT MADE NOW?
HISTORICALLY MADE FROM CORN AND OTHER STARCH SOURCES OR FROM NATURAL SUGARS BY FERMENTATION

COMMON SOURCES INCLUDE RICE, POTATO, CASSAVA – PLUS CORN AND OTHER GRAINS

MANUFACTURING PROCESS WAS VERY ENERGY-INTENSIVE, BUT IS NOW LESS SO IN MOST MODERN PLANTS, DUE TO ADVANCES IN DISTILLATION TECHNOLOGY

7.Ethanol

8.Michael Wang – Argonne National Laboratory, Aug. 2005

9.Some Properties of Methanol, Gasoline and Diesel Fuel

10.BIOMASS TO ETHANOL
AN INTEGRATED, FULL-SCALE COMMERCIAL BIOPROCESS PLANT CONSISTS OF FIVE BASIC UNIT OPERATIONS
1.  FEEDSTOCK PREPARATION;
2.  DECRYSTALLIZATION/HYDROLYSIS REACTION VESSEL;
3.  SOLIDS/LIQUID FILTRATION;
4.  SEPARATION OF THE ACID AND SUGARS;
5.  FERMENTATION OF THE SUGARS; AND,
6.  PRODUCT PURIFICATION.

Presentation On Genetic Algorithms

PPT On Genetic Algorithms

Download

Genetic Algorithms Presentation Transcript:
1.Genetic Algorithms

2.Introduction to Genetic Algorithms
A class of probabilistic optimization algorithms
Inspired by the biological evolution process
Uses concepts of “Natural Selection” and “Genetic Inheritance” (Darwin 1859)
Originally developed by John Holland (1975)
Particularly well suited for hard problems where little is known about the underlying search space
Widely-used in business, science and engineering

3.Applications of GA
Parameter and System Identification
Control
Robotics
Pattern Recognition
Speech Recognition
Engineering Designs
Planning and Scheduling
Classifier System

4.Simple Genetic Algorithm
produce an initial population of individuals
evaluate the fitness of all individuals
while termination condition not met do
    select fitter individuals for reproduction
    recombine between individuals
    mutate individuals
    evaluate the fitness of the modified individuals
    generate a new population
End while

5.It is an iterative optimization procedure.
GA works with no. of solutions in each iteration, known as population.

6.GA: Flowchart for working principle

7.Representation
All x(i)’s are string structure coded.
Strings could be real, binary, alphabetical etc.

8.Representation

9.Reproduction
It selects good set of strings and found the mating pool.
Probability of selection of string in mating pool is directly proportional to fitness of string

10.Crossover & Mutation
After applying reproduction with all included steps, crossover & mutation are applied on the string.
And then the average fitness of finally mutated string is compared with string in last iteration.
If F2 > F1, then the solution is considered to improved.
Likewise problem is solved for user defined no. of iterations.

Presentation On Ion Track Based Tunable Devices

Ion track based tunable devices (TEMPOS) as humidity sensor: A Neural Network approach

Download

Ion Track Based Tunable Devices Presentation Transcript:
1.Ion track based tunable devices (TEMPOS) as humidity sensor: A Neural Network approach

2.Plan of Talk
1.Tunable Electronic Materials with Pores in Oxide on Silicon (TEMPOS) as HUMIDITY Sensor

2. TEMPOS and ARTIFICIAL NEURAL NETWORK

3.Introduction
What are Ion Tracks?

Track Formation/Track Etching

Latent Ion Track Applications

Etched Ion Track Applications

Silicon Electronics with Ion Tracks

      The TEMPOS (Tunable Electronic Materials with Pores in Oxide on Silicon) concept, its applications

4.Interaction of radiation with matter: energy loss

5.Ion track formation

6.Track etching
It removes preferentially the dangling/loose bonds in latent ion tracks
Transformation of latent ion tracks into a hollow channel
Size and shape of track can be tailored
   Depends on the
energy deposition of ion
radiation sensitivity of material
storage conditions of ion-irradiated material before etching
COMMON ETCHANTS-----HF, KOH, NaOH, HCl.

7.Latent track applications

8.Etched track applications
Filters
Intelligent pores
Medicine
Ecology
Micro and nano structures-e.g.”TEMPOS”

9.TEMPOS (Tunable Electronic Materials with Pores in Oxide on Silicon) Structure

10.Preparation of TEMPOS structures
Dielectric (SiO2) layers formed on Si wafers irradiated with Swift Heavy Ions
     (Au26+, 350 MeV) at fluence 109 ions/cm2.
Subsequent immersion etching (HF as etchant)  leads to continuous pores with diameter 20-100 nm.
Pores filled with conducting/semiconducting material
Metallic contacts made
ELECTRICAL CHARACTERIZATION of TEMPOS devices by Combined ac-dc technique
Properties of TEMPOS depend on:
Etched track diameter and length
Material embedded in tracks
Underlying Silicon
Oxide layer

Presentation On Design and Analysis of Dual-resonant Filters in Visible and Infra-red Region Based on Polymer LPWG

PPT On Long-period Waveguide Gratings Based Filters
Download

Long-period Waveguide Gratings Based Filters  Presentation Transcript:
1.Design and Analysis of Dual-resonant Filters in Visible and Infra-red Region Based on Polymer LPWG

2.Outline of Presentation
Abstract

Structure and Principle of Long-period Waveguide Gratings (LPWGs)  Based Filters

Why Polymer Based LPWG !

Design and Simulation results
Dual Resonance of Polymer LPWGs

Conclusion

3.Abstract
                  Long-period waveguide gratings (LPWGs), by using a SU-8 polymer-based channel waveguide along with NOA61 optical epoxy coated upper- and lower-cladding, are designed and theoretical analyzed. Grating period of ~ 68µm is considered with optimized grating tooth-heights, so that the transmission spectra of the gratings show strong rejection bands both at visible (450 – 460 nm) and infrared (1530 – 1540 nm) wavelength regions. Phase-matching graphs are studied in order to observe the change in resonance wavelength of the grating with the variation of waveguide parameters. LPWG-based band pass filter are also designed and analyzed by considering the same set of polymer materials. Further, temperature sensitivity of these LPWGs is analyzed theoretically. These types of waveguide grating-based filters can widely be used for visible and infrared wavelength sensing applications.

4.Design Structures & Principle of LPWG Filters

5.Why Polymer Based LPWG !
Inexpensive, less process intensive
 Low fabrication costs
 Substrate independent
 Ease of tailoring physical properties
 Higher Thermo-optic coefficient than SiO2, LNB
 Electro-optic coefficients can be made higher
 Wider Tuning Capability
Polymers under consideration:
SU-8 photodefinable polymer (Microchem, Inc.)
NOA 61 Optical epoxy (Norland Products,Inc.)

6.Phase Matching Graphs

7.Simulation Results

8.Dual Resonance of Polymer LPWGs

9.Effect of the Grating Tooth Height

10.Transmission Spectra for LPWG Band Pass Filter


Presentation On Image Fusion

Image Fusion in Discrete Cosine Transform Domain using Masking Techniques
Download

Image Fusion Presentation Transcript:
1.Image Fusion in Discrete Cosine Transform Domain using Masking Techniques

2.CONTENTS
Image fusion
Fusion techniques
Literature survey
Proposed techniques
Mask
Rectangular mask
Triangular mask
Fan shaped mask
Strip mask
Image fusion in transform domain using masking
Performance evaluation of image fusion techniques.
Signal to noise ratio error
Root mean square
Result of existing technique
Comparison of image fusion using different mask.
Conclusion
References

3.What is “IMAGE FUSION”……….??
Image fusion combines multiple images of the same scene into a single image which is suitable for human perception and practical applications.
Image fusion is applicable for numerous fields including: defence systems, remote sensing and geosciences, robotics and industrial engineering, and medical imaging.

4.Fusion Techniques
The most important issue concerning image fusion is to determine how to combine the sensor images.
Fusion techniques are commonly divided into two categories:

Spatial Domain Techniques:

Transform Domain Techniques :

5.Literature survey
Many  fusion rules have been proposed in the existing literature, which are categorized, as follows:

Fuse by averaging the corresponding coefficients in each image (‘mean’ rule).

Fuse by selecting the greatest in absolute value of the corresponding  coefficients in each image (‘max-abs’ rule).

6.In existing literature Several transforms have already been used such as DCT, DST, DFT, DWT in fusion application.

The steps of algorithm based on transform domain technique are summarised as follow :

(i) Given images, take the transform of these images.
(ii) Obtain the transform coefficients of the images.
(iii) Fuse the images by proper selection rule.
(iv)Take the inverse transform.
(v) Obtain the fused image.

7.Proposed technique:
This paper investigates the effect of use of different types of masks in discrete cosine transform (DCT) domain for image fusion applications.

 Here we have used different types of masks such as rectangular, triangular, strip and fan shaped mask.

8.Mask
Masking is used to retain some portion of one image and some of other image.
Here, I have studied four type of mask, which are given below........

Rectangular mask
Triangular mask
Fan shaped mask
Strip mask

9.Rectangular Mask

10.Triangular Mask

Presentation On Image Encryption Algorithm

Image Encryption Algorithm based on Wavelet Packet Decomposition and Discrete Linear Canonical Transform

Download

Image Encryption Algorithm based on Wavelet Packet Decomposition and Discrete Linear Canonical Transform Presentation Transcript: 
1.Image Encryption Algorithm based on Wavelet Packet Decomposition and Discrete Linear Canonical Transform

2.Outline
Introduction
Wavelet Packet Decomposition
Discrete Fractional Fourier Transform
Discrete Linear Canonical  Transform
Image Encryption Algorithm
Simulation Results
Security Analysis
Conclusion
References

3.Introduction(1/3)

4.Encryption is the process of transforming the information to ensure its security.

With the growth of internet and computer networks, a huge amount of digital data is being exchanged over various types of networks.

The security of digital data including images has attracted more attention, and many different image encryption methods have been proposed to enhance the security of these images .  

5.Introduction(2/3)
One of the techniques existing in the literature for image encryption is based on wavelet packet decomposition (WPD) and bit plane decomposition [2].

The use of WPD for digital watermarking purpose has also been proposed in [3-5].

Recently Discrete Linear Canonical Transform has also attracted lots of attention in research community and has been used in number of diverse areas[6].

6.Introduction(3/3)
In this paper we propose an image encryption technique combining
            I. Wavelet Packet Decomposition &
           II. Discrete Linear Canonical Transform (DLCT).

The use of wavelet packet decomposition and DLCT increases the key size significantly making the encryption more robust.

7.In this paper we propose an image encryption technique combining
            I. Wavelet Packet Decomposition &
           II. Discrete Linear Canonical Transform (DLCT).

The use of wavelet packet decomposition and DLCT increases the key size significantly making the encryption more robust.

8.Wavelet Packet Decomposition
WPD is a method of image decomposition which is closely related with the wavelet decomposition. For a given image, the frequency band has been limited by high frequency and low-frequency part. In Wavelet Decomposition scheme we successively decompose the low-frequency part of the image whereas in WPD both the low-frequency and high frequency parts are successively decomposed. It provide more flexible decomposition at any node.

9. Analysis Structure of Wavelet Packets

10.Commonly Used Wavelets
Haar Wavelets
Biorthogonal Wavelets
Coiflets
Symmlets
Bathlets
Dmeyer
Daubechies
 

Presentation On AES based secure LEACH for WSN’s

PPT On AES based secure LEACH for WSN’s
Download

AES based secure LEACH for WSN’s  Presentation Transcript:
1.AES based secure LEACH for WSN’s

2.Obstacles of WSN Security
Limited resources-Limited memory, code space and energy.
Unreliable Communication-Densely deployed, so congestion and errors in transmission
Unattended operation- Deployed in environment open to adversaries

3.Security Requirements
Data Confidentiality
Data Integrity
Data Freshness
Authentication
Availability
Self -Organization

4.Security Primitives
Symmetric Key Algorithms
Encryption methods in which both the sender and receiver share the same key.
Block ciphers e.g., DES, AES.
Stream ciphers e.g., RC4.

5.High Level Description-AES

6.Low Energy Adaptive Clustering Hierarchy (LEACH)
Nodes organize themselves into local clusters with one of node acting as cluster head
Cluster head performs Data Integration
Randomized rotation of ‘Cluster head’ role among nodes
LEACH operation is divided into rounds
Set-up phase
Steady state phase

7.S-LEACH- The Scheme
Consists of two phases
Set-up phase
Steady state phase
Cryptographic tools used
AES-  for encryption and Decryption
AES-CMAC-  AES based to Message Authentication Code(MAC)
AES-PRF- AES based Pseudo random function to generate keys

8.Cluster formation Algorithm
After cluster head election, cluster head sends an Advertisement message(ADV)
Non-Cluster head node determines its Cluster head based on the received signal strength of ADV
Each node after deciding the cluster head sends a join-Request(Join-REQ) to cluster head
Cluster head sets up TDMA Schedule and transmits this schedule to the nodes

9.Steady-State Phase
Steady State phase broken into frames, nodes send data once per frame
Frame duration depends on number of nodes in the cluster.
Node turns of the radio in the other frames in steady state.
Cluster head awake all the time and performs data aggregation

10.Secure-LEACH
Four types of keys
Group key
Key shared by all nodes.
Used to distribute session key
Session key
This key operates for only round
Cluster key
Generated by Cluster head
Used for exchange of data between cluster base station
Pair wise key
Derived from Cluster key
For exchange of data between Cluster head and nodes

PPT On Design and Performance of a Broadband Circularly Polarized Modified Semi-elliptical Microstrip Patch Antenna

Design and Performance of a Broadband Circularly Polarized Modified Semi-elliptical Microstrip Patch Antenna

Download

Design and Performance of a Broadband Circularly Polarized Modified Semi-elliptical Microstrip Patch Antenna Presentation Transcript:
1.Design and Performance of a Broadband Circularly Polarized Modified Semi-elliptical Microstrip Patch Antenna

2.The presentation is divided in the following sections:

Introduction

(ii)     Design and Analysis of Semi Elliptical patch antenna

(iii)     Design and Analysis of Modified Semi Elliptical patch antenna

(iv)     Conclusions

3.Introduction
Microstrip antenna is a sandwich of two parallel conducting layers separated by a single thin dielectric substrate, the lower conductor  functions  as a ground plane and the upper conductor may be simple patch  of any desired shape.
Usually made on PCB
Low profile, conformable to various surfaces, inexpensive, durable, but narrow-band
Modify the shape to broaden the bandwidth

4.Advantages/ Disadvantages of Microstrip Antenna:

5.Techniques for overcoming Disadvantages:

6.Recent applications of microstrip
antennas in  communication electronics

Military Applications
Space Applications
Mobile communication systems
Application in modern wireless systems
Integration with electronic circuitry for different
applications

7.Design and Analysis of Semi Elliptical patch antenna
The semi-elliptical patch in its original shape has radius of semi major axis and semi minor axis equal to 23.1 mm and 13.9 mm respectively.

For designing this antenna, glass epoxy FR-4 substrate (permittivity ?r = 4.4, loss tangent tand = 0.025 and substrate height h = 1.59 mm) is applied.

The antenna is fed through SMA connector associated with 50 ohm feed line by selecting proper inset feed location on the patch geometry.

8.Variation of Return Loss with Frequency for Semi Elliptical Patch Antenna

9.The variation in input impedances of antenna with frequency is shown in figure, which also provided the excellent matching between antenna and 50 ohm impedance of feed network.

10.The minimum value of axial ratio achieved with this  geometry  is 8.92dB which is  obtained  at  3.02 GHz. The variation of axial ratio with frequency indicates  that  the radiations are linearly polarized as the axial ratio presented by antenna in the selected frequency range is always higher than 3db.

Presentation On Energy Efficient Wireless Sensor Networks using Asymmetric Distributed Source Coding

PPT On Energy Efficient Wireless Sensor Networks using Asymmetric Distributed Source Coding
Download

Energy Efficient Wireless Sensor Networks using Asymmetric Distributed Source Coding Presentation Transcript:
1.Energy Efficient Wireless Sensor Networks using Asymmetric Distributed Source Coding

2.OBJECTIVE    Model WSN
Use Distributed Source Coding  - Remove spatial redundancy
Reduce bandwidth, energy consumption

3.MOTIVATION  
The MIT Technology Review - number one emerging technology
set of unique constraints and  requirements. 
Limited power – runs on battery

4.BACKGROUND 

5.Background
Liveris - LDPC, near Slepian limit

DSC with WSN
Suggested - Xiong
Applied for analog data
– Chou et al
“Tracking and exploiting correlations in dense  sensor networks,”

6.Our Solution
For binary Data
Use DSC for source coding
Use asymmetric chanel codes
move the complexity receiver
 Govinda et al [1]
Simulation

7.Simulation Approach  
Model Sources
spatial correlation
BSC between sources
Model WSN using Simulink
Apply DSC using Matlab
We have chosen BPSK  as the modulation with RS(331,21) –[1]
Decode Jointly

8.DSC
Estimating Y with the knowledge of X
 Algorithm
Create random binary X, create Y from passing X through BSC.
Encode X, Y with [n,k] code.
Send encoded X (n bits)and syndrome of Y  (n-k) bits
Decode X
Decoded Y = decode(X+ syndrome(Y))
Calculate BER of Y

9.Mathematical Modelling

10.Energy Calculation
Energy saving ratio proportional to the no of bits saved
 

Presentation On Intelligent Space based new trends in human-robot communication

Intelligent Space based new trends in human-robot communication PPT
Download

Intelligent Space based new trends in human-robot communication Presentation Transcript:
1.Intelligent Space based new trends in human-robot communication

2.Hungary

3.IEEE
Largest international scientific organization in the field: The Institute of Electrical and Electronics Engineers (Center in USA, national Sections, e.g. IEEE India Council coordinating the 11 geographical Sections within India)
Thematic chapters: e.g. Joint IEEE Chapter of Aerospace & Electronic Systems Society, Communications Society and Lasers & Electrooptics Society (Mumbai); IEEE Microwave Theory & Techniques Society Chapter (Jaipur)
Professional membership/Student branches
Special programs for students, developing areas, women, etc.
Benefits: conferences, seminars, trainee programs, supports, knowledge transfer, access to publications/data bases, life career, and many other possibilities
Distinguished Lecturer Program

4.Contents
Spreading of machine intelligence
Smart environments, intelligent robots
Human-robot cooperation: requirements - store, retrieve, update information, interpret and execute commands, understand non-classical communication forms, offer existing and gain new services, …
communication + knowledge representation
new graph based knowledge representation related to Conceptual Graphs =
Knowledge base + Hypothesis storage + Dictionaries
Non-verbal communication by hand signs
Application in Intelligent Space (iSpace)
Conclusions

5.Introduction: Status Report/Problems
Nonlinearity, never unseen spatial and temporal complexity of systems and tasks
Imprecise, uncertain, insufficient, ambiguous, contradictory information, lack of knowledge
Finite resources ? Strict time requirements (real-time processing)
Need for optimization
    +
 Need for user’s comfort

New challenges/more complex tasks to be solved ? more sophisticated solutions needed

6.Outcome: We need something ”non-classical” - Intentions
We would like to build MACHINES to be able to do the same as humans do (e.g. autonomous cars driving in heavy traffic).
We always would like to find an algorithm leading to an OPTIMUM solution  (even when facing too much uncertainty and lack of knowledge)
We would like to ensure MAXIMUM performance (usually impossible from every points of view, i.e. some kind of trade-off e.g. between performance and costs)
We prefer environmental COMFORT (user friendly machines, easy communication)

7.Need for optimization
Traditionally:
optimization = precision
New definition (L.A. Zadeh):
optimization = cost optimization
But what is cost!?
precision and certainty also carry a cost
L.A. Zadeh, Fuzzy Sets [1965]:
“In traditional – hard – computing, the prime desiderata are precision, certainty, and rigor. By contrast, the point of departure of soft computing is the thesis that precision and certainty carry a cost and that computation, reasoning, and decision making should exploit – whenever possible – the tolerance for imprecision and uncertainty.”

8.User’s comfort

9.Communication with machines
human-computer communication (HCC) ˜ the efficient transfer of
information between humans and machines via various human-
like sensors and motors, and with structures that reflect human
conceptualizations. (Denning, P.J. et al., ”Computing as a
Discipline,” Communication of the ACM 31(1) (1988))

10.Communication with machines 

Presentation On Properties of Zinc Oxide

Synthesis and Optical Properties of Zinc Oxide Nanoparticles grown on Sn-coated Silicon Substrate by Thermal Evaporation Method
Download

Properties of Zinc Oxide Presentation Transcript: 
1.Synthesis and Optical Properties of Zinc Oxide Nanoparticles grown on  Sn-coated Silicon Substrate by Thermal Evaporation Method

2.Outline
Introduction
ZnO  Vs. GaN
Experimental details
Results and discussion
Surface morphology
Crystalline structure
Optical properties
Photoluminescence spectrum
Raman spectrum
Conclusion
Future work
Applications

3.Introduction
Semiconductor nanostructures are ideal system for exploring a large number of novel phenomena at the nanoscale

Nanostructure represents a system or object with at least one dimension in the order of one-hundred nanometer or less

Among all the semiconductors, Zinc oxide (ZnO) is a unique material that exhibits semiconducting, piezoelectric, and pyroelectric multiple properties

Using different processing techniques, various nanostructures of ZnO such as Nanowires, Nanorods, Nanocombs, Nanorings, Nanobows, Nanoparticles,    Nanobelts, and Nanocages have been synthesized under specific growth conditions

These unique nanostructures unambiguously demonstrate that ZnO is probably the richest family of nanostructures among all known materials, both in structures and properties

4.Different  types of ZnO Nanostructure

5. ZnO vs. GaN

6.Experimental Details

7.Experimental

8.Initially, n-Si substrate have been cleaned by using standard cleaning procedure.
Cleaned  Si substrate immediately put in the vacuum coating unit (model 12A4D of HINDVAC, India) for deposition of  thin film of Sn metal (thickness = 50 nm ) which is working as seed layer on the substrate surface
The seed layer of Sn metal provides  excellent nucleation sites for growth of ZnO nanostructures on n-Si substrate
Finally, ZnO film of thickness ~ 300 nm  deposited on Sn coated Si substrate by thermal evaporation method
To improve crystallinity of ZnO thin film,  annealing treatment is performed  in N2 gas atmosphere at 550 °C for duration of 30 minutes respectively.
Another film of ZnO on bare n-Si substrate also deposited to analyze the effect of seed layer on morphology of ZnO thin film
Further, samples cool down to room temperature for further characterization purpose

9.Schematic representation

10.Results and Discussions

PowerPoint Presentation On COGNITIVE RADIO

PPT On COGNITIVE RADIO
Download

COGNITIVE RADIO Presentation Transcript: 
 1.PERFORMANCE COMPARISON OF MODULATION TECHNIQUES FOR UNDERLAY /OVERLAY IN COGNITIVE RADIO

2. OUTLINE
Cognitive Radio
Underlay/Overlay
Modulation Techniques
NC-OFDM
MC-CDMA
SC-FDMA
Results And Discussion
Conclusions
References

3.COGNITIVE RADIO
A cognitive radio is a transceiver which automatically detects available channels in wireless spectrum and accordingly changes its transmission or reception parameters so more wireless communications may run concurrently in a given spectrum band at a place. This process is also known as dynamic spectrum management.

The principle of cognitive radio is temporal, spatial and geographical re-use of licensed spectrum.

4. UNDERLAY/OVERLAY
Overlay communication exploits that part of spectrum which is currently not being used by primary user.

Underlay  communication is done in that part of spectrum in which primary user is already present,  under some power threshold to reduce the interference to primary users.
5.OVERLAY COGNITIVE RADIO
Cognitive radios use flexible spectrum access techniques for identifying under-utilized spectrum and to avoid harmful interference to other radios using the same spectrum.

Such an opportunistic spectrum access to under-utilized spectrum, when the frequency is assigned to licensed primary services, is referred as overlay spectrum sharing.

Overlay sharing requires new protocols and algorithms for spectrum sharing.

6.UNDERLAY COGNITIVE RADIO
Open access to most of the radio spectrum, even if the spectrum is licensed for a dedicated technology, is permitted by radio regulation authorities only for radio systems with minimal transmission powers in an underlay cognitive radio.

Spread spectrum, Multi-Band Orthogonal Frequency Division Multiplexing (MB-OFDM) or Ultra-Wide Band (UWB) techniques are used to spread the emitted signal over a large band of spectrum so that the undesired signal power seen by the incumbent licensed radio devices is below a designated threshold.
The transmission power is strictly limited in underlay spectrum sharing to reduce the possibility for a potential interference.

7.OVERLAY COGNITIVE RADIO
Secondary/unlicensed user always senses the spectrum
If idle channel is found, then transmission starts
Transmission continues until primary user again uses that channel

8.UNDERLAY TRANSMISSION
In Underlay scenario, secondary transmission is made in the presence of primary user under power constraint so that it will not interfere with primary transmission.

9. CONCEPT OF NC-OFDM
Non-contiguous OFDM Carriers are deactivated according to the spectrum condition.Deactivation of subcarriers protect primary user interference. Parameters needed for deactivation of subcarriers is determined by the spectrum sensing.

10.Transmitter of NC-OFDM

Presentation On CMOS voltage controlled ring oscillator for low power radio transceiver applications

PPT On CMOS voltage controlled ring oscillator for low power radio transceiver applications
Download

CMOS voltage controlled ring oscillator for low power radio transceiver applications Presentation Transcript:
1.A new CMOS voltage controlled ring oscillator for low power radio transceiver applications

2.Outline
Motivation of works
Existing VCO architecture based ring oscillator
Proposed architecture
 Performance
Comparison with existing system
Conclusion

3.Application of VCO in  Transmitter

4.VCO CLASSIFICATION
Resonant based oscillator
      ( example : LC oscillator)
Wave form based oscillator
     ( example: Ring oscillator)

5.VCO in RF region
Target frequency: 0.9 GHz -2 GHz
Control voltage range: 1.2 -2 V

6.Motivation for choosing ring oscillator for VCO
Less power consumption
    (use of inverter made up of CMOS)
Less area requirement
    ( high packing density of CMOS)
Highly suitable for large scale integration

7.Ring oscillator

8.Proposed architecture

9.Conclusion
oscillation frequency ranging from 0.7- 1.75GHz
 control voltage ranging from 1.2--2V
phase noise ~ -88dBc/Hz at an offset frequency of 1MHz  

Presentation On Microwave absorption properties of Graphite flakes-Phenolic Resin Composite

PPT On Microwave absorption properties of Graphite flakes-Phenolic Resin Composite
Download

Microwave absorption properties of Graphite flakes-Phenolic Resin Composite Presentation Transcript:
1.Microwave absorption properties of Graphite flakes-Phenolic Resin Composite

2.The work focused on…
The compatibility of electronic devices with various electromagnetic environments has become an important issue in recent years with increasing use of gigahertz electromagnetic waves in wireless communications, satellite communications, radar systems, and military applications. This in turn increases the demands on electromagnetic interference shielding and electromagnetic wave absorbing materials in the GHz range.

3.Applications of microwave absorber

4.Challenges  in developing radar absorbing material (RAM)

Consistent absorption over a range of frequencies (broad banding).

 The reduction of dimension (as absorption is thickness dependent).

 Durability, corrosion resistant and thermal stability.

Cost effective

5.Material Parameter influencing microwave absorption…
Parameter influencing materials behavior to microwaves:

6.Theory for microwave absorption…..

7.Experimental
Material selection:

Graphite Flakes(GF) as inclusions & Novolac Phenolic resin (NPR) as polymer matrix.

GF has light weight, low cost, good corrosion resistance and high thermal conductivity and stability.

NPR has good heat resistance, dimensional stability, flame  & chemical resistance and cost effective.

8.Experimental
Composite sample of size 10.38 mm × 22.94mm × 3.7  mm is prepared by compression molding technique with varying the ratio of resin and fillers (7 and10 wt. %).

9.Microstructural characterization
X-Ray Diffraction and Scanning Electron Micrographs

10.Microwave characterization of GF-NPR composites
using Agilent 85071E  material measurement software

Presentation On An Adaptive Calibration Circuit for Level Measurement Using Optimized ANN

PPT On An Adaptive Calibration Circuit for Level Measurement Using Optimized ANN
Download

An Adaptive Calibration Circuit for Level Measurement Using Optimized ANN Presentation Transcript:
1.An Adaptive Calibration Circuit for Level Measurement Using Optimized ANN

2.Outline
Capacitance Level Sensor
  Present scenario of level measurement
  Limitation on present techniques
  Objective of proposed work
  A solution using Optimized ANN
  Results & Conclusion
  Further improvement
  Any questions ???

3.Capacitance Level sensor
Liquid level in a storage vessel is one of the important variable to be measured.

Capacitance level sensor is the most commonly used level sensor.

Capacitance level sensor is nonlinear.

Capacitance level sensor output depends on permittivity of liquid under measure.

4.Expressions used

5.Present scenario of level measurement using CLS

6.Characteristic of the present technique

7.Limitation on range
Datasheet suggests that only 10% to 60% of the full scale of input range is considered for practical measurement.

8.Can level be measured with the same set-up if liquid is changed ???

9.System output i.e. level measurement with different liquid yields inaccurate results.

10.Can level be measured with the same set-up if the liquid temperature is varied???

Presentation On Electromagnetic Interference

PPT On Electromagnetic Interference
Download

Electromagnetic Interference Presentation Transcript: 
1.Effect of annealing temperature of nano-sized BaFe12O19 in Novolac Phenolic Resin on microwave properties for use as EMI shielding material in X-band

2.Outline
Introduction
Theory of microwave absorption
Preparation of ferrite nanoparticles and magnetodilectric composite
Results and discussion
Conclussions   

3.Introduction
Leakages of electromagnetic wave in various communication systems lead to electromagnetic interference (EMI). Shielding materials minimize the external electromagnetic waves from interfering in functioning of electronic devices.

 A good absorber should have two essential characteristics, low impedance mismatch at the air-absorber interface to get low reflection and extent of the microwave entering into the materials and secondly, should sufficiently attenuate and absorb the wave passing through it.

Microwave absorption characteristic of the absorbing material in a frequency range depends on complex permittivity, (er= er?- jer?) and complex permeability (µr =µr?- jµr" ).

Ferrite is a metal oxide, which contains magnetic ions arranged in such a manner that it produces spontaneous magnetization while maintaining good dielectric properties. Saturation magnetization and permeability depend strongly on the particle size, morphology, and microstructure of the materials.
In the present investigation barium ferrite particles are annealed with varying temprature and used as the magnetic inclusions in the Novolac Phenolic Resin (NPR) matrix for microwave absorption study.

4.Electromagnetic Interference and its origin
Vast use of this spectra leads to electromagnetic pollution in the environment affecting proper functioning of electronic devices.
This interference leads to problems such as jamming of signal, inaccuracy in target detection in warfare and also less camouflaging etc. Due to electromagnetic interference, electromagnetic compatibility becomes a prime concern.

5.How to minimize the electromagnetic interference (EMI)
Shields are used to isolate a region, to prevent interference from outside sources and to avoid the leakage of unwanted radiation due to internal sources.
Shielding can be done by placing the device in an enclosure which will reflect all the electromagnetic wave thus protecting the device from external electromagnetic interference or it could be done by placing material on the device which will absorb the electromagnetic wave incident on it.

6.Theory of microwave absorption
Microwave absorption mechanism require two conditions:
    Low reflection at the air-absorber interface and
    High attenuation within the bulk of the material.

7.Material

8.Synthesis of  nano-sized barium ferrite (BaFe12O19) particles and BaFe12O19/NPR composites

9.X-Ray Diffraction Pattern

10.Transmission Electron Micrograph results
With increasing temperature, the ferrite particles showing an elongated, rod shaped structure:
The nanoparticle growth occurs at unit cell level along preferential directions.

 The surface energy of barium ferrite is different along different directions of the unit cell, particle growth would not occur in all directions equally.

 The growth of the nanoparticles along [0001] direction i.e. the c-axis, as it is energetically favourable due to minimum surface energy at higher temperature and hence, the formation of elongated nanostructure is observed  at 9000C.
 

Presentation On Multisensor Data Fusion and Applications

PPT On Multisensor Data Fusion and Applications
Download

Multisensor Data Fusion and Applications Presentation Transcript: 
1.Multisensor Data Fusion and Applications

2.Outline
Overview of Multisensor Data Fusion
Distributed Detection and Decision Fusion
Applications
Integrated Vehicle Health Management
Monitoring and Control of Built Environments
Image Fusion
Some Current Research Activities
Concluding Remarks

3.Information Fusion
Theory, techniques, and tools for exploiting the synergy in the information acquired from multiple sources: sensors, databases, intelligence sources, humans, etc.

4.Goals:
To obtain a better understanding of some phenomenon
To introduce or enhance intelligence and system control functions

5.Human Brain

6.Advantages of Multisensor Data Fusion
Improved system performance
Improved detection, tracking, and identification
Improved situation assessment and awareness
Improved robustness
Sensor redundancy
Graceful degradation
Extended spatial and temporal coverage
Shorter response time
Reduced communication and computing

7.Applications - Military
Detection, location , tracking and identification of military entities.
Sensors: radar, sonar, infrared, synthetic aperture radar (SAR), electro-optic imaging sensors etc.
Complex problem
Large number and types of sensors and targets
Size of the surveillance volume
Real-time operational requirements
Signal propagation difficulties

8.Applications - Non-military
Air traffic control
Law enforcement and homeland security
Medical diagnosis
Smart homes, buildings and bridges
Critical infrastructures
Highways
Water distribution networks
Robotics
Manufacturing
Hazardous workplace
Remote sensing
Crops
Weather patterns
Environment
Mineral resources
Buried hazardous waste

9.A Conceptual Framework for Data Fusion (The JDL Model)

10.A Conceptual Framework for Data Fusion

Presentation On Mobility Based Multicast Routing in Wireless Mesh Networks

PPT On Mobility Based Multicast Routing in Wireless Mesh Networks
Download

Mobility Based Multicast Routing in Wireless Mesh Networks Presentation Transcript:
1.Mobility Based Multicast Routing in Wireless Mesh Networks

2.Presentation Outline
Introduction to WMN
Proposed  Work
Related Work
Simulation Results
References

3.Wireless Mesh  Network (WMN)

4.WMN are dynamically self organized and self configured, with the nodes in the network establishing an ad hoc network and maintaining the mesh connectivity.
WMNs are comprised of two types of nodes : mesh routers and mesh clients.
Every user  becomes a relay point or router for network traffic
Extend the range and link robustness of existing Wi-Fi’s by  allowing mesh-style multi-hopping

5.Topologies in WMNs

6.Nodes in WMNs
Mesh routers:
Its forward data packets to each other within the mesh network, and have the capability to provide gateway/bridge functions, so that subnets (clients) can access the mesh network.
Mesh clients:
It do not have the capability of mesh routers, such as gateway /bridge functions. They are connected to the router either through a single wireless interface, or by wire through the Ethernet.

7. Sequence to achieve a Route to the Destination Node
Nodes within the network that receive the packet revise the information already stored by them, for use by the transmitting node or source node.
After updating the information, the nodes set up markers or pointers back to the source node through the route tables.
The wireless nodes also send back other active information such as IP address, the present sequence number for the request, and the identification number of the sources broadcast.
The other nodes within the mesh network will only answer the broadcast if they are either the destination or one of the nodes on the route to the destination. 

8.Introduction
There exist two fundamental approaches to multicast routing namely minimum cost trees and shortest path trees.
The (MCT’s) minimum cost tree is one which connects receiver and sources by providing a minimum number of transmissions (MNTs) the MNTs approach is generally used for energy constraint sensor and mobile ad hoc networks.
In this paper we have considered node mobility and try to find out simulation based comparison of the (SPT’s) shortest path tree, (MST’s) minimum steiner trees and minimum number of transmission trees in wireless mesh networks by using the performance metrics like as an end to end delay, average jitter, throughput and packet delivery ratio, average unicast packet delivery ratio, etc.
We have also evaluated multicast performance in the small and large wireless mesh networks.
In case of multicast performance in the small networks we have found that when the traffic load is moderate or high the SPTs outperform the MSTs and MNTs in all cases. The SPTs have lowest end to end delay and average jitter in almost all cases.

9.In case of multicast performance in the large network we have seen that the MSTs provide minimum total edge cost and minimum number of transmissions. We have also found that the one drawback of SPTs, when the group size is large and rate of multicast sending is high SPTs causes more packet losses to other flows as MCTs.

10.MULTICAST ROUTING PROTOCOLS IN WMNS
ODMRP (ON DEMAND MULTICAST ROUTING PROTOCOL)
It is a protocol for routing applicable to multicast and unicast traffic throughout for ad-hoc as well as wireless mesh networks (WMN).
ODMRP creates routes on demand, rather than proactively creating routes as OLSR does.
This suffers from a route acquisition delay, although it helps reduce network traffic in general.
To help reduce the problem of this delay, some implementations send the first data packet along with the route discovery packet.
Because some links may be asymmetric, the path from one node to another is not necessarily the same as the reverse path of these nodes [5, 10]
 

Presentation On Electromechanical Pulse Energy Conversion Systems

PPT On Electromechanical Pulse Energy Conversion Systems
Download

Electromechanical Pulse Energy Conversion Systems Presentation Transcript:
1.Experimental Dynamics of Electromechanical Pulse Energy Conversion Systems

2.CONTENTS
INTRODUCTION
DESCRIPTION OF EXPERIMENTAL PLANT
EXPERIMENTAL DYNAMICS
MATHEMATICAL MODELS
EXPERIMENT RESULTS
CONCLUSION

3.ELECTROMECHANICAL energy conversion systems with pulse width modulation (PWM) or other types of pulse control are widely used in human practice. The most important part of such systems is either concerned with conversion of large energy flows or used with responsible technological  processes. The complicated internal structures of such systems, together with the essential nonlinearities, stipulate the possibility of sub-harmonic and aperiodic oscillation to the PWM synchronizing impact stipulates substantial distortion of the quality of energy being converted and may even lead to emergencies . Appearance in the dynamics  (Fig. 1).The appearance of such undesirable oscillations that are sub-harmonic or aperiodic with respect  PWM synchronizing impact stipulates substantial distortion of the quality of energy being converted and may even lead to emergencies.

4. There are well-known papers dealing with both theoretic and experimental modelling of different aspects in the electromechanical pulse energy conversion system (PECS) dynamics . However, the experimental data in may only claim a qualitative correspondence to the theoretical results presented. Experimental plants used in probably are intended to be used with an oscilloscope to observe some PECS output variables with any fixed set of parameters and could not realize experimental parametric dynamics analysis, e.g., to monitor stationary-mode stability loss boundary (bifurcation boundary) in the parameter space, etc.

5.MATHEMATICAL MODELS
 

PowerPoint Presentation On CRUISE CONTROL

PPT On CRUISE CONTROL
Download

CRUISE CONTROL Presentation Transcript:
1. Predictive Cruise Control: Utilizing Upcoming Traffic Signal Information for Improving Fuel Economy and Reducing Trip Time

2.NEED OF CRUISE CONTROL
A big portion of our time is spent behind traffic lights.
 Fuel Consumption during  this time is very      high.
 Lack of information about future state of traffic signal increases trip time & engine wear & tear.
 Increases the CO2 emission.

3.CRUISE CONTROL
Utilizes the adaptive cruise control function in a predictive manner.
Improve fuel economy and reduce signal wait time.
 The predictive speed control mode maintains a safe gap between vehicles.

4.Decreases use of brakes, thus reducing brake wear and kinetic energy loss.
 Is applicable in stop and go traffic.
Receives a timing signal from an upcoming traffic light in advance to safely and smoothly speed up or down to a timely arrival at green light whenever possible, therefore reducing idling at red.

5.CO-OPERATIVE INFRASTRUCTURE

6.CVIS enables flexible, harmonized and open communication between vehicles, roadside equipment and management centers to improve existing services.

TLC create Green Window according to Priority of vehicle.
Loop detector on road is used to detect  the vehicle and transponder is used to transmit  the  information to TLC.

7.MODEL PREDICTIVE CONTROL
The objective is to find the optimal vehicle velocity that reduces idling at red lights giving the future state of traffic lights.

8.REFERENCE VELOCITY PLANNING

9.OPTIMAL TRACKING OF REFERENCE VELOCITY
A simple model of the vehicle is used at the supervisory level for calculating the vehicle acceleration based on effective traction force of the engine fengine or fbraking braking force and the road forces .

10.Evaluation of Fuel Savings Potential With a Detailed Power train Model

Presentation On Design and Simulation of Micro Cantilever Energy Harvester using MEMS switch

PPT On Design and Simulation of Micro Cantilever Energy Harvester using MEMS switch
Download

Design and Simulation of Micro Cantilever Energy Harvester using MEMS switch Presentation Transcript:
1.Design and Simulation of Micro Cantilever Energy Harvester using MEMS switch

2.Introduction
MEMS stands for Micro Electro Mechanical System.
Two types of switches are mainly used-
     1. DC contact switch
     2. Capacitive switch
Design tools for MEMS-
     1. COMSOL
     2. Coventor Ware
     3. Intellisuite
     4. Ansys

3.DC Contact switch using Coventor Ware

4.Parameters

5.Pull In Result

6.Transient Analysis

7.Capacitive switch design in COMSOL

8.Displacement Result

9.Surface Potential Result

10.Energy Harvester

PPT On A Transform (MRT) Naturally Suited to Directional Pattern Analysis

PPT On A Transform (MRT) Naturally Suited to Directional Pattern Analysis

Download

A Transform (MRT) Naturally Suited to Directional Pattern Analysis Presentation Transcript:
1.A Transform (MRT) Naturally Suited to Directional Pattern Analysis

2.Introduction
Digital Signal Processing
Process sequence of numbers
Signal Transforms
Fourier transform, wavelet transform
Discrete Fourier Transform (DFT)

3.Global Patterns used in fingerprint analysis

4.Experimental Result
The black strips indicate the dominant direction of each 16x16 block estimated by using the proposed method.

5.Experimental Result
The black strips indicate the dominant direction of each 16x16 block estimated by using the proposed method.

6.Conclusion
MRT is a simple, alternate method of signal representation. A few MRT coefficients represent highly directional patterns and these can be used to identify directional features in images.
In the Fourier domain, the power spectrum of a directional pattern clusters along a line through the origin, and the orientation of the pattern is perpendicular to this line. The orientation information is thus spread over different frequency indices. In contrast, the MRT method associates each frequency index directly with a specific orientation.
A highly-directional subset of the MRT coefficients of each block of a fingerprint image was used to obtain the orientation field estimate of fingerprint images. Experimental results show that this procedure provides a good estimate of the orientation field.
The directional feature of MRT and its pattern structure has potential applications in areas which require a simple tool to describe directionality of images.

PowerPoint Presentation On OPTICAL NETWORK WITH GMPLS CONTROL PLANE

PPT On OPTICAL NETWORK WITH GMPLS CONTROL PLANE
Download

OPTICAL NETWORK WITH GMPLS CONTROL PLANE Presentation Transcript:
1.OPTICAL NETWORK WITH GMPLS CONTROL PLANE

2.CONTENTS:
Introduction About Optical Network
Control Plane Requirements
What Is GMPLS?
Future Work
Conclusion

3.Introduction About Optical Network
Control Plane Requirements
What Is GMPLS?
Future Work
Conclusion

4.OPTICAL NETWORK ARCHITECTURE

5.INTERNET SERVICES
MULTI SERVICES INTEGRATION
MULTIPLEXING/PROTECTION
CAPACITY

6.EVOLUTION OF OPTICAL NETWORKS TO TWO LAYER

7.OVERLAY MODEL

8.PEER MODEL

9.Introduction About Optical Network
Control Plane Requirements
What Is GMPLS?
Future Work
Conclusion

10.CONTROL PLANE FOR OPTICAL NETWORK
DYNAMIC ESTABLISHMENT OF LIGHTPATH
Neighbor recovery
Link state update
Route computation
Path Establishment
Traffic Engineering and Bandwidth Management
Restoration and Protection
GMPLS as a control plane for WR as well  as  IP routers

PowerPoint Presentation On WIND ENERGY SYSTEM

PPT On WIND ENERGY SYSTEM
Download

WIND ENERGY SYSTEM  Presentation Transcript:
1.ON WIND ENERGY SYSTEM & VARIOUS CONTRL  STRATEGIES

2.INTRODUCTION OF WECS
Fastest growing segment among other renewable energy sources .Wind energy is clean, geographically available, low cost, and useful in rural areas.

3.COMPONENTS OF WECS

4.CLASSIFICATION OF WECS

5.COMPARISION
Horizontal  axis wind turbine
Comprises Two Or More Blades That Are Designed To Best Aerodynamics
Includes A Yaw Mechanism That Turns The Rotor Blades To Face Wind Directions
Due To High Efficiency & easy maintenance, This Is Most Popular
Vertical axis wind turbine
Consists Blades Located Vertically
Able To Capture Wind Independently From Wind Directions.
Due To Less Efficiency, Complicated Maintenance, And Large Land Occupation, The Use Of This Converter Has Falling Down During Last Decades

6.OPERATING AND DESIGN PRINCIPLES OF WIND TURBINE
A wind turbine obtains its power input by converting the force of the wind into a torque (turning force) acting on the rotor blades.
The amount of energy which the wind transfers to the rotor depends on the density of the air, the rotor area, and the wind speed.
The kinetic energy of a moving body is proportional to its mass (or weight). The kinetic energy in the wind thus depends on the density of the air, i.e. its mass per unit of volume. In other words, the "heavier" the air, the more energy is received by the turbine.

7.The rotor area determines how much energy a wind turbine is able to harvest from the wind.
Since the rotor area increases with the square of the rotor diameter, a turbine which is twice as large will receive 22 = 2 x 2 = four times as much energy
To be considered a good location for wind energy, an area needs to have average annual wind speeds of at least 12 miles per hour.

8. DESIGN OF WECS
A WECS captures wind energy and then uses a generator to convert it to electrical energy
The design of a WECS is an integral part of how efficient it will be.
When designing a WECS, one must decide on the size of the turbine, and the size of the generator

9.Wind Turbines
LARGE TURBINES: Able to deliver electricity at lower cost than smaller turbines, because foundation costs, planning costs, etc. are independent of size.
In areas where it is difficult to find sites, one large turbine on a tall tower uses the wind extremely efficiently.

10.SMALL TURBINES:
 Local electrical grids may not be able to handle the large electrical output from a large turbine, so smaller turbines may be more suitable.
 High costs for foundations for large turbines may not be economical in some areas.
 Landscape considerations

PowerPoint Presentation On OFDM

OFDM Modulated Cooperative Multiple-Access Channel With Network-Channel Coding PPT
Download

OFDM Modulated Cooperative Multiple-Access Channel With Network-Channel Coding Presentation Transcript: 
1.OFDM Modulated Cooperative Multiple-Access Channel With Network-Channel Coding

2.TABLE OF CONTENTS
Introduction
OFDM
System model of  OFDM-CMAC
Diversity order of outage probability
Achievable Rates and Code Designs
Code Design methodology
Conclusion
References

3.INTRODUCTION   
consider the half-duplex cooperative multiple-access channel (CMAC) with frequency-selective block-fading.
Each link employs an orthogonal frequency division multiplexing (OFDM) system, where modulated symbols are drawn from a finite constellation set.
We first obtain the diversity order of the CMAC, as a function of the time sharing variables of the users and the rates of the code.

4.To achieve this rate diversity tradeoff, we use the principle of network coding where messages of the two sources are jointly encoded
Both separate and joint network-channel coding approaches are considered
Specifically, we design multiple turbo codes that minimize the outage probabilities of these approaches.
 We also give a code structure for the multiple turbo codes to achieve full diversity of the system.

 5.OFDM 
Basic idea
Frequency selective fading -In any radio transmission, the channel spectral response is not flat. It has  fades in the response due to reflections causing cancellation of certain frequencies at the receiver. Reflections off near-by objects (e.g. ground, buildings, trees, etc) can lead to multipath signals of similar signal power as the direct signal. This can result in deep nulls in the received signal power due to destructive interference. For narrow bandwidth transmissions if the null in the frequency response occurs at the transmission frequency then the entire signal can be lost . This problem overcome by using OFDM trensmission.
» Using a large number of parallel narrow-band subcarriers instead of a single wide-band carrier to transport information.
Advantage:
 » Very easy and efficient in dealing with multi-path.
» Robust again narrow-band interference

6.System model of OFDM-CMAC
In this paper,  focus on the decode and-forward(DF) protocol under the framework of coded cooperation for cooperative multiple access channel (CMAC).
 We consider a time-division based half-duplex CMAC. With one antenna each, two sources S1 and S2 cooperate to deliver their messages to a common destination D.

7.We assume a block-fading channel where the channel coefficients remain constant over the duration of one block consisting of ?? channel uses, but are independently generated for each block.
For each channel use, one modulated symbol is transmitted. For each link, we assume a frequency selective fading channel with ?? multipaths, and an OFDM symbol that consists of ???? subcarriers, where ?? = ????.
 The normalized channel coefficients in the frequency domain for link ???? (channel from node ?? to node ??) are denoted by
g(????) = [??(????) 1 , · · · , ??(????) ????]??
 where the subscript denotes the subcarrier index

8.. Let ??|??(????)?? |2 = 1, where ?? ? {1, 2} and?? ? {1, 2,}.
 We assume a reciprocal channel between S1 and S2, so g(12) = g(21).
We denote the instantaneous SNR vector for link ???? as ??(????) = ¯??(????)g(????) ° (g(????))*, where ° is the element wise multiplication, ¯??(????) denotes the average SNR on link ????.
The ??th element of ??(????) is the SNR for the ??th

9.B. Achievable Rates and Code Designs
       Let ???? (??), or  ??(??)=  the mutual information as a function of the instantaneous SNR ??, based on modulated symbols from the set ?? of finite size 2??.

Assume that the corresponding ??(??) satisfies the following two properties.

P1: ??(0) = 0 and ??(??) is a monotonically increasing function that approaches?? <8 .="" br="">
P2: ??(??1) + ??(??2) > ??(??1 + ??2), for sufficiently high ??1 and ??2
 
10.consider the cooperation mode, where we assume  ??1 = ??1??12 and ??2 = ??2??21. Each source therefore can decode the other message successfully and cooperate to transmit to D in the third time slot using STBC. By using independent codewords and joint  decoding, an achievable rate region for (??1,??2) can be obtained as
??1 = ??1??1?? + ??3??STBC, (1)
??2 = ??2??2?? + ??3??STBC, (2)
??1 + ??2 = ??1??1?? + ??2??2?? + ??3??STBC.
Here, ??STBC =S???? ??=1 ??(??(1??) ?? + ??(2??)?? )/???? is the mutual  information achieved by the STBC coding
 
Related Posts Plugin for WordPress, Blogger...

Blog Archive