{"title":"Analysis of read functioning in STT-RAM using adiabatic technique","authors":"R. Monicacellus, P. Gomathi, S. Saravanan","doi":"10.1109/ICONSTEM.2016.7560970","DOIUrl":"https://doi.org/10.1109/ICONSTEM.2016.7560970","url":null,"abstract":"Spin Torque Transfer RAM (STT-RAM), a assuring possible choice of Static RAM for diminishing leakage power utilization. STT-RAM has the resistance of the MTJ (Magnetic Tunnel Junction) that changes based on stored data. By using differential sensing with reconfigurable cache cell, the STT-RAM performance can be improved. This scheme largely reduces the read disturbance error and average power dissipation with small reading current. Furthermore reducing the power dissipation of STT-RAM, we introduce one new approach as Adiabatic (Energy recovery) Technique. Adiabatic Technique main motive is to reduce the average power dissipation with no performance degradation. The Adiabatic logic and memory are attractive solution for low power application.","PeriodicalId":256750,"journal":{"name":"2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125736843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Sakthi, D. Purusothaman, P. Rajarajeswari, V. Sridevi, M. S. Kumar
{"title":"SMC based power oscillation damping controller for SSSC connected network","authors":"S. Sakthi, D. Purusothaman, P. Rajarajeswari, V. Sridevi, M. S. Kumar","doi":"10.1109/ICONSTEM.2016.7560981","DOIUrl":"https://doi.org/10.1109/ICONSTEM.2016.7560981","url":null,"abstract":"This paper presents the algorithm for interfacing Voltage Sourced Inverter (VSI) based Static Synclironous Source Series Compensator (SSSC) with power system for enhancement of transient stability. The differential equations are solved by implicit integration method which is numerically stable. A standard 9 bus system is considered for analysis. The effectiveness of the sliding mode controller (SMC) over the conventional PI controller for SSSC in improving transient stability is illustrated.","PeriodicalId":256750,"journal":{"name":"2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129221452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Human health control monitor system using smart mobiles: Context changes dependent human behavior","authors":"Ashok Senthil Kumar, Subash Chandar, PG Students","doi":"10.1109/ICONSTEM.2016.7560928","DOIUrl":"https://doi.org/10.1109/ICONSTEM.2016.7560928","url":null,"abstract":"A Human health control monitor system (HHCMSes) is a mobile medical application is used to detect continuous monitoring and manage the human body blood glucoses levels. HHCMS promises to give to extend the life period of human being. HHCMSes is a testing device very efficient to monitor the glucoses levels. Sensor can wear anywhere in our human body as like as wrist watches. A sensor connects to smart phones using HHCMSes software. Once connected this software continuously to monitor the blood glucoses levels in our body. In our body, when change the glucose levels is to intimate through smart mobile phones. HHCMS is easily to monitor the indoor and outdoor physical movement of blood levels changing often in our body. Existing approaches uses moment generate function (MGF) is support only statistical method of gathering the value, reviewing the value, survey the value, and give an interpreting the variable of numerical data, cannot identifying the transfer function between sensor and mobiles. In this paper, we can propose robust compatible, so we can uses Mason's gain formula (MGF) is a process to detect the transfer function by using linear signal-flow graph (SFG) and cyebyshev's theorem and Markov theorem uses to find out the desired result of HHCMSes.","PeriodicalId":256750,"journal":{"name":"2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124043477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An efficient maximum utility pattern mining with lossless representation of data sets — A review","authors":"R. Dhanalakshmi, B. Muthukumar","doi":"10.1109/ICONSTEM.2016.7560943","DOIUrl":"https://doi.org/10.1109/ICONSTEM.2016.7560943","url":null,"abstract":"The fundamental reason for information mining in learning disclosure is to remove helpful examples or tenets from information sets. Because of the thought of the co-event relationship of things in datasets, affiliation standard mining has broadly been connected to different functional applications, for example, general store advancements, biomedical information applications, versatile information applications, et cetera. Be that as it may, the time consistency of things in databases can't be found by utilizing the customary affiliation standard mining approaches. For revelation of consistency information, consecutive example mining, which considered not just of the recurrence relationship of things in the example additionally the request relationship of the things as indicated by the time stamps of the things, In this paper we examined the distinctive sorts of example mining calculation.","PeriodicalId":256750,"journal":{"name":"2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115149975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A study analysis of cooperative spectrum sensing in cognitive radio network","authors":"M. Siranjeevi, K. Karthikeyan","doi":"10.1109/ICONSTEM.2016.7560954","DOIUrl":"https://doi.org/10.1109/ICONSTEM.2016.7560954","url":null,"abstract":"Spectrum sensing is one of the most mandatory mechanisms of Cognitive Radio (CR) to find the unused Spectrum. Spectrum sensing has renewed on a very active scrutiny area over recent years. As it is one of the most important tasks performed using cognitive radio and the implementation of the other functions of the cognitive radio is based on the spectrum sensing. So it is mandatory for cognitive radio to perform this task very decisively. This paper presents an overview of spectrum sensing, CR architecture, techniques on the basis of research, discusses the characteristics and challenges related to its different aspects of a CR. Multipath routing based spectrum sensing has been proposed and used widely since it doesn't require dispatched signal properties, channel information, or even the type of modulation.","PeriodicalId":256750,"journal":{"name":"2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM)","volume":"132 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122736314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Suitability of Gabor filter for denoising and contrast enhancement of digital mammograms","authors":"V. Vedanarayanan, N. Nandhitha","doi":"10.1109/ICONSTEM.2016.7560957","DOIUrl":"https://doi.org/10.1109/ICONSTEM.2016.7560957","url":null,"abstract":"Breast cancer is the major cause for higher mortality rate in women. One in every eight women is diagnosed with breast cancer. Abnormal growth of tissues in the breast region causes cancer. Detection of breast cancer in the early stage increases the recovery rate. Detecting the breast lesions is done by filming the region by passing low dose x-ray on the specified region. This film is known as mammogram. Detecting the lesion from mammograms is a complex process which involves imaging analysis. Mammogram images are low contrast and may contain noise due to the sensitivity of scanning machine and motion artifacts. To denoise and enhance the mammogram, filtering methods can be applied. In this paper a Gabor filter bank based Denoising algorithm has been proposed.","PeriodicalId":256750,"journal":{"name":"2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131209969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enabling top-n file retrieval in cloud storage using hadoop distributed file system","authors":"J. Jeya, E. Kannan","doi":"10.1109/ICONSTEM.2016.7560944","DOIUrl":"https://doi.org/10.1109/ICONSTEM.2016.7560944","url":null,"abstract":"A storage system in cloud is well thought-out as a very big scale storage system that has independent storage servers. The service that cloud storage provides is, that can store user's data from remote through network and other authenticated users can access the data easily. Hadoop distributed file system is used to store large files consistently and to retrieve those files at very high bandwidth to user applications. Hadoop splits the files into large blocks and distributes them amongst the nodes in the cluster. When we retrieve data from the cloud, it is very important that the computation and communication overhead should be reduced. To reduce the communication overhead the server should send only the top-n files based on the keyword when the user asks for the data files. Since the owner need not maintain the copy of the files, it is all the more necessary to make check on the files available and also check the originality of the files stored in the server periodically. In HDFS the computation is done in parallel so that the execution time is drastically reduced. In the proposed system for retrieving top-n files we use Hadoop Distributed File System, so that the search time and the communication overhead is greatly reduced.","PeriodicalId":256750,"journal":{"name":"2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126515001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A survey of channel allocation and attacks in multichannel multi radio wireless networks","authors":"S. Latha, R. Sabitha","doi":"10.1109/ICONSTEM.2016.7560945","DOIUrl":"https://doi.org/10.1109/ICONSTEM.2016.7560945","url":null,"abstract":"In this paper, we discover the channel allocation in obliging multichannel multiradio wireless webs and nonobliging networks. In that every single node is fixed and set alongside one or extra radios. Additionally we focus on static channel allocation, vibrant channel allocation and hybrid channel allocation in multichannel multiradio wireless networks. And it deals alongside jamming attacks and its assorted attack models. Whereas jamming attack is an entity someone is resolutely trying to inhibit alongside the physical transmission as well as reception of wireless communications.","PeriodicalId":256750,"journal":{"name":"2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133371949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An approach of hybrid modulation in fusion seven-level cascaded multilevel inverter accomplishment to IM drive system","authors":"S. S. Kumar, M. Sasikumar","doi":"10.1109/ICONSTEM.2016.7560980","DOIUrl":"https://doi.org/10.1109/ICONSTEM.2016.7560980","url":null,"abstract":"A new modulation topology of seven level cascaded multilevel inverter fed with induction motor drive system with considerable reduction of semiconductors switches and DC voltage sources has been developed. In recent day's Multilevel inverter (MLI) technologies become an incredible main choice in the area of high power medium voltage control. There is hindrance in the vein of higher levels because of using more number of semiconductor switches. It may lead to huge size and increases the cost of the inverter. So the proposed method is well suited for a high power application and it is built with one DC source and six semiconductor switches. This paper is a simple and flexible technique to reduce common-mode voltage for a seven level hybrid cascaded inverter. The MCHBMLI is established based on five levels H-bridge cascaded inverter. This method also reduces the switching losses and is simple to be implemented in a common processor. This topology has only one dc source, and diverse voltage levels are generated by using this voltage source along with floating capacitors charged to voltage levels. Total Harmonic Distortion obtained from the above HPWM techniques. The Seven level MCHBMLI circuit is simulated and verified by using MATLAB/Simulink.","PeriodicalId":256750,"journal":{"name":"2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115467799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Literature review of congestion avoidance system in wireless sensor network","authors":"A. A. Kadam, P. Chatur","doi":"10.1109/ICONSTEM.2016.7560935","DOIUrl":"https://doi.org/10.1109/ICONSTEM.2016.7560935","url":null,"abstract":"Wireless sensor network are used for many application such as medical data transmission, military application and so on, having various characteristics and requirements. Due to this it is very difficult to decide hardware and software requirements of the Wireless Sensor Network. In WSN there are two types of nodes as source node and sink node which are used for the transmission of the data. While transmitting these signal to the destination there are different problems as transmission rate, required bandwidth, tolerable packet loss, delay demands, etc. Energy requirements also includes things in terms of computational power, energy supply, storage capacity and lifetime of the network. There are different problems occurs in the transmission of WSN data major problem as congestion. Congestion is the state of buffer overloading and causes the loss of data packet and delay of transmission. Congestion may lead to problems as wrong diagnosis in medical application also lack of signal may result in death of patient. In this paper, different techniques studied for congestion avoidance in wireless sensor network.","PeriodicalId":256750,"journal":{"name":"2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM)","volume":"301 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121463627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}