{"title":"Design and Research the Control Technology of Blade Life Hydraulic Test Bench Based on an Accumulator","authors":"Zhang Yakui, Ruixiang Zhou, Zhang Jin, Lvlong He","doi":"10.1109/CSNT.2015.213","DOIUrl":"https://doi.org/10.1109/CSNT.2015.213","url":null,"abstract":"In order to study high and low cycle fatigue experiment bench control technology of a certain type of aircraft engine fan blade, we can reach the purpose of reducing the pressure pulsation of system and improving the stability of the test loading force. By means of simulation, we first designed the experiment bench model of high-low cycle fatigue based on MATLAB/Sim Hydraulics. Then on the basis of the system model, we completed the simulation according to the following steps: changing the position and loading ways of the accumulator in the hydraulic test bench, matching the system with different parameters. From the study can we find that the simulation of high-low cycle fatigue test rig has reached the expected purpose. At the same time, we got the effective parameter selection. In the process of simulation, we also found that the introduction of the accumulator can give great buffer effect to pressure pulsation which produced by the sudden closing of valves. At the mean time, the accumulator can bring more stable loading force. In conclusion, this study can provide necessary guidance to the design and production of experiment bench, so that we can get better experiment results.","PeriodicalId":334733,"journal":{"name":"2015 Fifth International Conference on Communication Systems and Network Technologies","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121556564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Overview of Behavioral Analaysis Using Social Web Site Data","authors":"S. S. Husain, S. Dhopte","doi":"10.1109/CSNT.2015.67","DOIUrl":"https://doi.org/10.1109/CSNT.2015.67","url":null,"abstract":"Everyday millions of users can share or exchange their opinion through messages on social web sites. In various domains behavior analysis is critical for decision making. The behavioral data on social website can provide an economical and effective way to expose public opinion timely. The public behavior in messages can be used to obtain user feedback towards different company products, it can be utilized for marketing of different products or to track the popularity of different things. So there must be some methodologies to analyze user behavioral variations on social web sites and extract possible reasons behind such variations. This paper gives an overview of overall process for behavioral analysis. Earlier research work in the field of behavioral analysis is presented in this paper.","PeriodicalId":334733,"journal":{"name":"2015 Fifth International Conference on Communication Systems and Network Technologies","volume":"18 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116865517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Hybrid Approach for Network Intrusion Detection","authors":"G. P. Rout, S. Mohanty","doi":"10.1109/CSNT.2015.76","DOIUrl":"https://doi.org/10.1109/CSNT.2015.76","url":null,"abstract":"An Intrusion detection system (IDS) monitors network traffic and system activities and report to administrator. In some cases the intrusion detection may also respond to anomalous or malicious traffic by taking action such as blocking of user or source address from accessing the network. IDS comes in variety of flavor but its goals to detecting suspicious traffic in different ways. There are network based and host based intrusion detection system. The IDS is detecting based looking for specific signature of known threats as it antivirus and firewall. The anomaly detection is used to comparing traffics against the baseline. The detection is described briefly in this paper using fuzzy and genetic algorithm.","PeriodicalId":334733,"journal":{"name":"2015 Fifth International Conference on Communication Systems and Network Technologies","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117150559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Effect of Selfish Behavior on Network Performance in VANET","authors":"Pratibha Pandey","doi":"10.1109/CSNT.2015.63","DOIUrl":"https://doi.org/10.1109/CSNT.2015.63","url":null,"abstract":"A multi hop vehicular ad hoc network is a peer to peer network of wireless nodes where nodes are required to perform routing activity to provide end to end connectivity among nodes. As vehicles are constrained by bandwidth, some vehicles may behave selfishly and deny forwarding packets for other nodes, even though they expect other nodes to forward packets to keep network connected. We simulate forwarding node selfish behavior on top of ad hoc on demand distance vector routing protocol (AODV). In forwarding node selfish behavior, selfish nodes do not forward data or control packets (routing packets) for other nodes. We show that selfish behavior reduces routing overhead of network which intern decrease collision and increase throughput of dense network. Secondly, with our simulation study we find that in dense vehicular ad hoc networks where route breakages are frequent, routing control packets consume significant fraction of network bandwidth (also refer as broadcast storm problem) and selfish behavior by certain number of vehicles reduce the overall routing overhead in network which in turn result in increment of network throughput.","PeriodicalId":334733,"journal":{"name":"2015 Fifth International Conference on Communication Systems and Network Technologies","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121210945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"HDL Design for 20 Tbps Multichannel 64:1 LVDS Data Serializer & De-serializer ASIC Array Card Design","authors":"P. Sastry, D. Rao","doi":"10.1109/CSNT.2015.108","DOIUrl":"https://doi.org/10.1109/CSNT.2015.108","url":null,"abstract":"The Aim is to HDL Design & Implementation for 20 Tbps Multichannel 64:1 LVDS Data Serializer & De-Serializer ASIC Array Card for Ultra High Speed Wireless Communication Products like Network On Chip Routers, Data Bus Communication Interface Applications, Cloud Computing Networks, Terabit Ethernet at 20 Tbps Rate Of Data Transfer Speed. Basically This Serializer Array Converts 64 bit parallel Data Array in to Serial Array Form on Transmitter Side and Transmission Done through High Speed Wireless Serial Communication Link and also Converts this Same Serial Array Data into Parallel Data Array on the Receiver Side by De-Serializer Array ASIC without any noise, also measure Very High Compressed Jitter Tolerance & Eye Diagram, Bit Error Rate through Analyzer. This LVDS Data SER-De-SER mainly used in High Speed Bus Communication Protocol Transceivers, Interface FPGA Add On Cards. The Process Of Design is Implemented through Verilog HDL / VHDL, Programming & Debugging Done Latest FPGA Board.","PeriodicalId":334733,"journal":{"name":"2015 Fifth International Conference on Communication Systems and Network Technologies","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127149026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Comparison Study on Route Stability of On-Demand Routing Protocols in CRAHNs","authors":"A. Dhawan, Sandhya Aneja, Shikha Jain, C. K. Jha","doi":"10.1109/CSNT.2015.218","DOIUrl":"https://doi.org/10.1109/CSNT.2015.218","url":null,"abstract":"Cognitive radio technology has been proposed as a solution to problem of spectrum scarcity which aims to improve the spectrum resource utilization. Furthermore, cognitive radio ad hoc network (CRA HN) is proposed as an ad hoc network of cognitive radio enabled mobile devices. Cognitive radio senses all available channels and on the selection basis, tunes transmitter and receiver for communication. However, due to time varying availability of channel s and primary user interference in used channel, routing in CRAHNs is a challenging and interesting problem. In this paper, we present a comparison study on on - demand routing protocols for CRAHNs in terms of route stability of routes established by the on - demand protocols.","PeriodicalId":334733,"journal":{"name":"2015 Fifth International Conference on Communication Systems and Network Technologies","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126183176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Transliteration of Digital Gujarati Text Into Printable Braille","authors":"Nikisha B. Jariwala, Bankim Patel","doi":"10.1109/CSNT.2015.82","DOIUrl":"https://doi.org/10.1109/CSNT.2015.82","url":null,"abstract":"In the era of technological development, the enhancement is witnessed in the way Braille is produced, stored and retrieved, which makes it easier to use at different places. But it is still difficult to produce an error-free Braille for multifaceted scripts. In this paper, the deliberation is done on the development of translation tool that converts Gujarati text along with English and Hindi text into Braille and store it into a data file that can be directly printed on the Embosser. The technique is explicated by keeping in wits the perspective of the standard Braille system and the table for transformation is also specified. The system gives satisfactory results. As very limited amount of literature is available for visually impaired people of Gujarat, so the proposed system will increase literature in Braille which can be used by them. This paper also forwards the new thought for the assistance to the visually impaired people and Braille learners.","PeriodicalId":334733,"journal":{"name":"2015 Fifth International Conference on Communication Systems and Network Technologies","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116382424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ashlesha P. Kshirsagar, Sandeep Kakde, M. Chawhan, Y. Suryawanshi
{"title":"Design and Implementation of Low Bit Error Rate of LDPC Decoder","authors":"Ashlesha P. Kshirsagar, Sandeep Kakde, M. Chawhan, Y. Suryawanshi","doi":"10.1109/CSNT.2015.161","DOIUrl":"https://doi.org/10.1109/CSNT.2015.161","url":null,"abstract":"Many classes of high-performance Low-density parity check codes are based on parity check matrices composed of permutation sub matrices. The emulation-simulation framework further allows the algorithm and implementation to be iteratively redefined to improve the error floor performance of message passing decoder. Log-Like hood-Ratio (LLR) based Belief-Propagation (BP) algorithm is presented for Low Density Parity Check codes. Numerically accurate representation of check node update computation used in LLR-BP decoding is described. The implementation of Sum-Product algorithm (SPA) within Low Density Parity Check Code (LDPC) decoder is described in this paper and the correction term is used to improve the decoding performance of min-sum algorithm (MSA). Quantization and log-tanh function approximation in sum-product decoder strongly affect which absorbing set dominates in error floor region. For LDPC decoder, bit error rate (BER) decreases with increase in the signal to noise ratio.","PeriodicalId":334733,"journal":{"name":"2015 Fifth International Conference on Communication Systems and Network Technologies","volume":"103 Suppl 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116520514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kuldeep Pande, A. Parkhi, S. Jaykar, A. Peshattiwar
{"title":"Design and Implementation of Floating Point Divide-Add Fused Architecture","authors":"Kuldeep Pande, A. Parkhi, S. Jaykar, A. Peshattiwar","doi":"10.1109/CSNT.2015.179","DOIUrl":"https://doi.org/10.1109/CSNT.2015.179","url":null,"abstract":"Many Floating Point operations have been acknowledged to be useful for many real time graphic and multimedia application as well as DSP processors. Many Digital Signal Processing algorithms use Floating point arithmetic, which requires millions of calculations per second to be performed. For such stringent requirements, design of fast, precise and efficient circuits is the goal. This brief presents a dedicated unit for the combined operation of floating-point (FP) division followed byaddition/subtraction -- the divide -- add fused (DAF). The goal of this unit is to increase the performance and the accuracy of applications where this combined operation is frequent, such as the interval Newton's method or the polynomial approximation. The proposed DAF unit presents a similar architecture to the FP multiply accumulateunits. The main difference is represented by the divider, which is implemented using digit-recurrence algorithms. An important design trade off regarding DAFis represented by the number of required quotient bits. We present the impact of the adopted number of quotient bits on accuracy, cost, and performance. We show that the proposed implementations have better accuracy with respect to the solution based on two distinct units: an FP divider and an FP adder. This implementation is suitable for lower latency, accuracy and best cost-performance trade off. The proposed unit is synthesized for4vfx60ff672-12 Xilinx Spartan-6 FPGA.","PeriodicalId":334733,"journal":{"name":"2015 Fifth International Conference on Communication Systems and Network Technologies","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114465322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of the Hand Motion Trajectories for Recognition of Air-Drawn Symbols","authors":"N. Ayachi, Piyush Kejriwal, Lalit Kane, P. Khanna","doi":"10.1109/CSNT.2015.95","DOIUrl":"https://doi.org/10.1109/CSNT.2015.95","url":null,"abstract":"This paper presents a framework to recognize the symbols drawn in air using bare hand motion. The work marks a step towards development of non-tactile interfaces requiring no physical means for writing or drawing. To overcome the limitations of traditional two dimensional camera based acquisition, a preliminary step in gesture recognition, depth based sensor is used to acquire trajectory signals. In place of DTW (Dynamic Time Warp) and HMM (Hidden Markov Model) a non-time-warping approach is adopted in this work to recognize trajectories. Start and end delimitation of character trajectory drawing is established through finger detection based control gestures. Three simple features are evaluated by rule based and distance based classification, and classifier votes determine the recognition decision. Recognition accuracy up to 96% is achieved.","PeriodicalId":334733,"journal":{"name":"2015 Fifth International Conference on Communication Systems and Network Technologies","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122122662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}