{"title":"Design and implementation of an automatic beverages vending machine and its performance evaluation using Xilinx ISE and Cadence","authors":"V. Krishna, A. Monisha, S. Sadulla, J. Prathiba","doi":"10.1109/ICCCNT.2013.6726639","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726639","url":null,"abstract":"This paper describes the design and implementation of an automatic beverages vending machine using FSM as this technique has more advantages compared to previous ones used in vending machine design. The whole design is functionally verified using Xilinx ISE simulator 13.1 and the generated bit stream file has implemented in Virtex 5 XC5VLX50T FPGA board and its physical design has performed using Cadence Encounter and evaluated its optimized parameters.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"1 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90261617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"OFDM transceiver design using C","authors":"Indira Bahaddur, C. L. Triveni, P. Srikanth","doi":"10.1109/ICCCNT.2013.6726661","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726661","url":null,"abstract":"The aim of this paper is to design a baseband orthogonal frequency division multiplexing (OFDM) [1]–[2] transceiver including 8 point Fast Fourier Transform (FFT), 8 point Inverse Fast Fourier Transform (IFFT) [3] core processor, DPSK modulator[4], demodulator serial to parallel and parallel to serial converter blocks in C language. The main challenge is to derive the algorithm for Fast Fourier Transform (FFT) and Inverse Fast Fourier Transform (IFFT). There are many algorithms available that can implement FFT and IFFT.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"66 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72867900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy efficient LEACH by enhancing the data update procedure of cluster head","authors":"P. Rajan, V. Geetha","doi":"10.1109/ICCCNT.2013.6726767","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726767","url":null,"abstract":"There are several modification has been happened in LEACH protocol. Most of modifications are in cluster organization. This paper studies modified LEACH protocol using data update procedure of cluster head. In LEACH protocol frequency of sending data to the base station by smaller cluster is higher than bigger cluster due to that energy dissipation in smaller cluster is more than bigger cluster. This paper studies modified LEACH protocol in which frequency of sending data to the base station by each cluster is same. Simulation has been done in NS2 and simulation result shows that modified LEACH protocol is more energy efficient than LEACH protocol.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"6 1","pages":"1-3"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75164266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"User-centric trust based identity as a service for federated cloud environment","authors":"E. Samlinson, M. Usha","doi":"10.1109/ICCCNT.2013.6726636","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726636","url":null,"abstract":"Cloud computing is the promising model of delivering IT resources on demand. Identity and Access Management (IAM) stands as the hurdle for enterprises to adopt to cloud. This paper discusses IAM component of Security as a Service (SecaaS) in the context of cloud computing with a Trust Agent. We have proposed user-centric trust agent identity service which is aimed to create trust among the Cloud Service Providers (CSPs) in the federated environment. Relevant standards such as SAML, SPML, XACML, and OAuth are discussed to enable trusted and secure access to cloud services.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"6 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74254086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Real-time implementation and performance analysis of state estimation based model predictive controller for CSTR plant","authors":"M. Geetha, R. Naveen, J. Jerome, V. Kumar","doi":"10.1109/ICCCNT.2013.6726731","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726731","url":null,"abstract":"Model Predictive Control (MPC) schemes are now widely used in process industries for the control of key unit operations. Linear model predictive control schemes which make use of linear dynamic model for prediction, limit their applicability to systems which exhibit mildly nonlinear dynamics. In this paper, a state estimation based model predictive controller for nonlinear system has been proposed. The model predictive controller is designed by considering a state space model and an extended Kalman filter to predict the future behavior of the system. The efficacy of the proposed MPC scheme has been demonstrated by conducting simulation studies on the level process of a Continuously Stirred Tank Reactor (CSTR) - a MIMO system, and the real time implementation has been done in the CSTR plant to illustrate the online optimization constraint and also the advantage of MPC over conventional controller by comparison of servo-regulatory responses through ISE values.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"5 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74204586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of free space optical communication link with Mach-Zehnder optical modulator for long distance","authors":"Nitin Garg, Sanjeev Kumar","doi":"10.1109/ICCCNT.2013.6726688","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726688","url":null,"abstract":"Free Space Optical Communication become more and more popular due to its advantage over Radio Frequency Communication. In this paper BER and Q-factor is observed at different parameters. It is observed that BER is increased with increase in distance and Q-factor is decreased with increase in distance. BER and Q-factor is also affected by Bit Rate and Divergence. If Bit rate and Divergence is increase BER will increased and Q-factor is decreased. It is observed that with Mach-Zehnder optical modulator we get a BER of 10-20 at a distance of 1.8 km with bit rate 2.5 Gbps and Q-factor 30 is achieved at a distance of 1.6 km with 2.5 Gbps bit rate.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"7 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77685428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation of voice based wheelchair for differently abled","authors":"M. B. Kumaran, A. Renold","doi":"10.1109/ICCCNT.2013.6726647","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726647","url":null,"abstract":"The main objective of this work is to process the voice signal and is implemented to control a wheelchair by the voice signal which is processed earlier. The adopted model is to combine PIC microcontroller and VRbot module with voice recognition system for identifying individual words and is speaker dependent. The command given by the user is taken into VRbot module by microphone which is built within speech recognition module. Once voice command is recognized, the signal is transferred to the controller where stepper motor module is connected. PIC microcontroller capture appropriate signals from speech recognition module and wait for the Ultrasonic Sensor, which is doing the process of obstacle detection in its path. Whenever the conditions, signal to move from VRbot and no obstacle detection from Ultrasonic Sensor is received, the motion of wheelchair is performed.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"74 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76665225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performace and energy efficient Greedy forwarding method for sensor networks","authors":"Shradha P. Dugam, S. Pingat","doi":"10.1109/ICCCNT.2013.6726624","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726624","url":null,"abstract":"The area of study and work presented in this paper is on a method of routing in sensor networks that is a part of Geographic Routing protocol known as Greedy Forwarding. This is an much more efficient version of methods that are applicable in GR. This works on the principle of progressing in the process of forwarding by selecting a peer that is nearer to the final node where the packets are destined. But with the benefits of reducing the total distance between two end points this method incurs limitations regarding collection of proper network topology information thus creating voids while sending packets. To avoid this an improvised version of previous works is presented over here that highlights mainly of increasing performance as well as energy efficiency of GF method in GR. A more enhanced method that will collect more accurate topological information and support the forwarding process with energy saving to increase networks lifetime is presented. Here the discussion about the work done by previous methods will be shown along with we introduce to you a newer version. The basic aim is to consider maximum energy paths and nodes with maximum energy remains.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"38 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78123147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hardware software co-simulation of dual image encryption using Latin square image","authors":"S. Kumar, H. Kumar, H. Panduranga","doi":"10.1109/ICCCNT.2013.6726681","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726681","url":null,"abstract":"Hardware Software co-simulation of a multiple image encryption technique has been described in the present study. Proposed multiple image encryption technique is based on Latin Square Image Cipher (LSIC). First, a carrier image based on Latin Square is generated by using 256 bits length key. XOR operation is applied between an input image and Latin Square Image to generate an encrypted image. Then XOR operation is applied between encrypted image and second input image to encrypt second image. This process is continues till nth input image. The proposed multiple image encryption technique is implemented Xilinx System Generator (XSG). This encryption technique is modeled using Simulink and XSG Block set and synthesized onto Virtex 2 pro FPGA device. Proposed technique is validated using hardware software co-simulation method.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"69 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77885580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Tumour detection in brain MRI using improved segmentation algorithm","authors":"E. Kumar, V. M. Kumar, M. Sumithra","doi":"10.1109/ICCCNT.2013.6726575","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726575","url":null,"abstract":"In the present days, for the human body anatomical study and for the treatment planning medical science very much depend on the medical imaging technology and medical images. Specifically for the human brain, MRI widely prefers and using for the imaging. But by nature medical images are complex and noisy. This leads to the necessity of processes that reduces difficulties in analysis and improves quality of output. This paper discuss about an improved segmentation algorithm for different defects detection in brain MRI (Tumour) and have compared the performance of this method with conventional method.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"43 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75898748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}