C. Ramesh, V. Krishnan, H. Ravikumar, A. Manjunatha
{"title":"Design of dual gate driver for IGBT by using pulse transformers without saturation effect","authors":"C. Ramesh, V. Krishnan, H. Ravikumar, A. Manjunatha","doi":"10.1109/ERECT.2015.7498999","DOIUrl":"https://doi.org/10.1109/ERECT.2015.7498999","url":null,"abstract":"In this paper a dual gate driver for IGBT capable of driving top and bottom switches of an inverter leg is proposed. This dual gate driver uses forward converter topology to provide necessary gate current to charge IGBT gate capacitance CGE along with isolation between control circuitry and power circuit. This gate driver will operate from 10% to 90% of duty cycle. The driver output is a two level signal which is positive during on period and negative during off period of the IGBT. To reduce the size of pulse transformer a gated oscillator of 1 MHz pulses of fixed duty cycle 50% and gated by PWM pulses of duty cycle range is used, this paper presents a new topology of two pulse transformers working at 1MHz with 50% duty cycle which complement each other and whose output pulses are added together to get the required pulses to drive IGBT's.","PeriodicalId":140556,"journal":{"name":"2015 International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115053440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Congestion control for optimizing data transfer rate in mobile Ad-hoc networks using HSTCP","authors":"Gururaj H L, B. Ramesh","doi":"10.1109/ERECT.2015.7498977","DOIUrl":"https://doi.org/10.1109/ERECT.2015.7498977","url":null,"abstract":"In the communication era congestion is the bottleneck which degrades the performance. In Ad hoc networks due to infrastructure less character there is no guaranteed bandwidth and node mobility. The traditional TCP variants were good for wired environment, whereas in Ad-hoc networks there are lots of other factors to be considered. We are comparing the traditional TCP Reno and its new variant HSTCP for congestion handling. The congestion window is one of the factors that determine the number of bytes that can be outstanding at any time. The congestion window indicates the maximum amount of data that can be sent out on a connection without being acknowledged. HSTCP comes into picture only if the congestion window size increases abruptly. To improve the retransmission time and to avoid congestion in completely dynamic conditions where node mobility is completely random is the main concern of our research work. HSTCP outperforms when compared to TCP Reno for different network parameters.","PeriodicalId":140556,"journal":{"name":"2015 International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115564567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A comparative analysis of Secret Sharing Schemes with special reference to e-commerce applications","authors":"I. S. Shalini, R. Mohan Naik, S. Sathyanarayana","doi":"10.1109/ERECT.2015.7498980","DOIUrl":"https://doi.org/10.1109/ERECT.2015.7498980","url":null,"abstract":"The term cryptography which means “secret writing” has become the foundation primitive in providing security for many communication applications. In many applications, particularly in Group Communication, there is a need to hide secret data like passwords, encryption key, recipes etc. Here, efficient key management protocols are required to provide security for group's secret data, because it is very challenging to provide security especially when group of more members and those members are present in different locations with diverse mechanisms of protection. One among them is Secret Sharing Schemes (SSS) which allow to split and share the group's secret among group members. The secret can be retrived once, when some threshold member combines their share value in a defined way. Across the years, several schemes on Secret Sharing have been presented. In this view, this paper mainly focuses on three different Secret Sharing schemes, such as Shamir's Secret Sharing based on Polynomial Interpolation, Asmuth-Bloom Secret Sharing Scheme based on Chinese Remainder Theorem and Verifiable Secret Sharing Scheme based on Elliptic Curves. All these three schemes have been studied, algorithms are programmed using MATLAB 7.0 tool and executed. It has been observed that all the three schemes works satisfactorily according to the properties defined by the inventors of the schemes.","PeriodicalId":140556,"journal":{"name":"2015 International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124696244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Traffic signal time analysis and voice - based app for visually impaired pedestrians","authors":"R. Basavaraju, Chetana Hegde","doi":"10.1109/ERECT.2015.7499062","DOIUrl":"https://doi.org/10.1109/ERECT.2015.7499062","url":null,"abstract":"Analysis of traffic signal and ensure the safety of visually impaired people is a major challenge in helping disabled people. In this paper, we propose development of an application software which can be easily installed on a mobile device equipped with a camera. This application opens a camera and captures the traffic timer display upon tapping the app-icon. The timer image is then processed to segment the digits in them to identify the actual time in the numeric form. The detected time is then converted as a voice message and played using the app. Thus, the visually impaired person can hear the message about the time left to turn on the pedestrian signal. Getting this alert message, he/she can safely cross the road. The accuracy of the proposed algorithm is found to be 100% as it detected all the digits in every instance of the timer display image.","PeriodicalId":140556,"journal":{"name":"2015 International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125863903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of the dynamic behaviour of a single Hodgkin-Huxley neuron model","authors":"E. Dhanya, N. Pradhan, R. Sunitha, A. Sreedevi","doi":"10.1109/ERECT.2015.7499056","DOIUrl":"https://doi.org/10.1109/ERECT.2015.7499056","url":null,"abstract":"Brain is a major organ for processing thought, feelings, learning and memory. Neurons being the basic building unit of the brain, mathematical modeling of a neuron can give a great insight into the functioning of the central nervous system. This paper describes the most biologically realistic neuron model and its implementation in Simulink to understand the behavior of a neuron in a real-time environment. Hodgkin-Huxley neuron model is the first successful mathematical model which describes the initiation and propagation of action potentials in neurons. The dynamic behavior of a single HH neuron is examined for varying external stimulus and studied to help develop an interactive biological neural network by coupling a large number of neurons in the future.","PeriodicalId":140556,"journal":{"name":"2015 International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114819555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Scale-invariant object identification for jointly addressing issues in moving oject and background","authors":"D. Pushpa, H. Sheshadri","doi":"10.1109/ERECT.2015.7499007","DOIUrl":"https://doi.org/10.1109/ERECT.2015.7499007","url":null,"abstract":"The area of video process pertaining to analysis of the real-time object behaviour is increasing in its pace. However, such process is also accompanied by various critical challenges e.g. variation in illumination condition, complete or partial occlusion, and uncertain mobility of the object. Although, in the last decades there has been archives of research papers discussing about the object detection, but there are only few literatures pertaining to the precise moving object detection with moving background. Therefore, the core objective of this paper is to present a technique that efficiently performs moving object detection for the moving background using enhanced version of Scale-Invariant Feature Transform. The outcome of the study was compared with the most significant work to find it outperforms the existing system with respect to processing time and thereby it is quite found suitable for real-time processing of object detection.","PeriodicalId":140556,"journal":{"name":"2015 International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114402950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of rule based lemmatizer for Kannada inflectional words","authors":"R. Prathibha, M. Padma","doi":"10.1109/ERECT.2015.7499024","DOIUrl":"https://doi.org/10.1109/ERECT.2015.7499024","url":null,"abstract":"Lemmatizer and stemmer are the two basic modules in most of the natural language processing applications. Stemming is the process of stripping off the affixes that are present in the inflectional word to obtain stem. The extracted stem by the stemmer need not be a valid root or linguistically meaningful word. Lemmatizer removes the affixes that are present in the inflectional word by applying linguistic rules and returns the base-form or dictionary-form of the word, which is known as lemma. The split lemma is a valid root and linguistically meaningful word, hence the lemmatizer requires more linguistic knowledge than the stemmer. In linguistics, the objective of lemmatizer is to group together the different inflected forms of a word, such that these inflected words are analyzed as a common term. In this context, it is necessary to design a lemmatizer for Kannada inflectional words. In this paper we have proposed the design of rule based lemmatizer by adding set of linguistic rules to extract proper and meaningful root from Kannada inflectional word. The proposed module is tested on different types of data sets that are specifically created for this work and the accuracy obtained on these data is above 85%.","PeriodicalId":140556,"journal":{"name":"2015 International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114362044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Estimation and guidance for manoeuvring targets","authors":"M. Radhika, S. S. Parthasarathy, G. Kumar","doi":"10.1109/ERECT.2015.7499016","DOIUrl":"https://doi.org/10.1109/ERECT.2015.7499016","url":null,"abstract":"The rigorous development in the field of highly manoeuvrable threats gives a huge platform to find the efficient integrated estimation and guidance algorithms. In the present day technology, various kinds of threats are getting advanced day by day. For example ballistic missiles with time varying parameters or low flying cruise missile. Successful intercepting these kinds of highly manoeuvrable targets demands high performance at the end phase. Achieving zero miss distance is a challenge in case of highly manoeuvrable targets. In this paper one of the efficient estimation technique Kalman filtering and guidance algorithm, two dimensional Proportional Navigation law are discussed. Future work of this research is detailed.","PeriodicalId":140556,"journal":{"name":"2015 International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125674044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Elimination of energy and communication tradeoff to resist wormhole attack in MANET","authors":"S. Geetha, Venkanangouda C. Patil","doi":"10.1109/ERECT.2015.7499003","DOIUrl":"https://doi.org/10.1109/ERECT.2015.7499003","url":null,"abstract":"Challenges in meeting the best security standards is still an unsolved question in the area of mobile adhoc network especially pertaining to wormhole attack. Although there are many existing solutions, but majority of them suffers from various trade-off. This paper discusses about the significant issues of the existing techniques and presents a novel secure routing protocol that was found to have sufficient supportability of complex cryptographic algorithms as security measure along with enhancement of data transmission performances. The proposed routing strategy is designed by enhancing the multicast routing protocols by adding few simple entities e.g. Additional Supportive Beacons (ASR), Route-Discovery Beacons (RDB), and Auxiliary Nodes (AN). The outcome of the study shows that proposed technique excels better than existing multicast routing protocol in energy efficiency and packet delivery ratio.","PeriodicalId":140556,"journal":{"name":"2015 International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129264487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Identification and classification of diseases in carrot vegetable using Discrete Wavelet Transform","authors":"Gouri C. Khadabadi, Arun Kumar, V. Rajpurohit","doi":"10.1109/ERECT.2015.7498988","DOIUrl":"https://doi.org/10.1109/ERECT.2015.7498988","url":null,"abstract":"Image processing has been proved to be a powerful tool for analysis in numerous fields and applications. Timely recognition of diseases is the main challenge in agriculture science. The present method uses naked eye observation to detect diseases which is less accurate and expensive for large farms. In this paper the system is proposed to identify and classify the diseases in carrot vegetable using the image processing techniques starting from image acquisition, preprocessing, testing, and training. Feature extraction is achieved through Discrete Wavelet Transform (DWT). The features are retrieved making use of the coefficients and then they are stored. These retrieved features stored in the database help to categorize the carrot vegetable disease using Probabilistic Neural Network.","PeriodicalId":140556,"journal":{"name":"2015 International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129400746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}