Air pollution detection
This project aims at detecting and alerting the user about the carbon di-oxide and the carbon monoxide levels in the surrounding. This is a programmed project so that the threshold levels can be changed according to the surroundings. For example: house, storage facility, chemical laboratory, etc.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Remote Microcontroller Based Monitoring of Substation and Control System Through GSM Modem
As complexity of distribution network has grown [7], automation of substation has become a need of every utility company to increase its efficiency and to improve quality of power being delivered [5]. The proposed project which is GSM cellular network based controlling of substation [5][12] will help the utility companies, by ensuring that their local-substation faults [8][9][10] are immediately realized and reported to their concerned departments via GSM, to ensure that duration of power interruption is decreased. The measured parameters will be sending in the form of SMS messages. The microcontroller will interact with the sensors installed at the local substation and perform task as commanded [3]. Electrical parameters like current, voltage will be compared continuously to its rated value [13] will help protect the distribution and power transformer from burning due to overload, short circuit fault, over voltages and surges. Under such conditions, entire unit is shut down via the control section comprising of relays sensing it, and immediately turning the circuit breaker off. SMS alerts can also be generated to indicate this. The use of GSM makes the substation intelligent [4] in the sense that it is able to transmit alerts and information and receive commands. This enables to reduce labor cost at substation and saves time. Thus the monitoring and working efficiency of the sub-station will drastically increase.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
An Appraisal of Integrated Ecosystem
Integrated ecosystem provides the use of biodiversity and ecosystem services into an overall strategy for helping people adapt to climate change. To date, insights into these approaches have often been based on reports from isolated anecdotal case studies. Though, these are informative, and provide evidence that people are using ecosystems to adapt, they provide rather limited insight in terms of measuring and evaluating the effectiveness of integrated ecosystem, especially when compared with technical or structural adaptation interventions. The body of scientific evidence indicating how effective such approaches are is lacking in some aspects. Where evidence does exist, it is often dispersed across a range of related fields, such as natural resource management, disaster risk reduction and agroecology. To date, there has been little attempt to systematically assemble and analyze this evidence. Therefore, evidence in respect of the merits or otherwise of integrated ecosystem is unknown and it has not been possible to identify prevailing knowledge gaps to inform further research and analysis, which will enable policymakers to compare integrated ecosystem with other adaptation options. Hence, this paper is emphasizing the identified gaps for further research purposes.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Triangle Wave Averaging Multiplier – A Review
The triangle wave averaging multiplier is reformed and designed using operational amplifiers. The input voltages V1 and V2 are added with a reference triangle wave of peak value VT, to get a voltage VX. The triangle wave is added with one input voltage V1 and subtracted with another input voltage V2, to get a voltage VY. The voltage VX is positive rectified and its average voltage VA is obtained though a low pass filter. The voltage VY is negative rectified and its average voltage VB is obtained through another low pass filter. A summing amplifier is used to get VA-VB-V1. The output voltage of this summing amplifier is the output voltage VO which is proportional to the product of the two input voltages. The peak value VT of the triangular wave is the proportional constant and it should be stable and precession. Verification of feasibility of circuit configuration is established by way of test results on a proto type.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
A Combined DCT-DWT based Watermarking Technique for Avoiding Illicit Reproduction using GUI
Now in a days, there is a vast use of images in many applications. Today duplication of any digital items or multimedia have become very easy task. So digital image watermarking technique becomes the best solution for the protection of illicit operation. In this technique some kind of secret data is embedded to the cover image and this information is used for the authentication purpose. In this paper a combined DCT-DWT based watermarking algorithm is proposed in which the secret data is hidden to the lower frequency band of the cover image.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Application of Artificial Immune System for Power Generation Optimization
This paper presents application of artificial immune system for economic dispatch problem of thermal plants. Numerical results of various test systems have been presented to demonstrate the performance of the proposed algorithm. In human body the immune system finds virus or bacteria and destroys it. Similarly this technique works. The results achieved from the proposed algorithm are compared with those obtained from differential evolution, particle swarm optimization, PSO Crazy, and GA technique. An artificial immune system is a search technique used in computing to find true or approximate solution to optimization and search problems.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Optical computing: an overview
Moore's Law has been greatly depended upon for the development of Electronic computers as they have also been regarded as traditional computers which cannot meet the high speed and bandwidth demands of the future. This led to the emergence of researchers in the field of computer engineering that began to work towards optical computing systems. Therefore, this paper seeks to examine optical computing as one of the major trends in Information Technology (IT) industry in the perspectives of its pros and cons towards recommendations that will further improve IT industry.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Optimum Bit Error Rate for Linear Multiuser Detection in Wireless Communications
Direct sequence code division multiple access (DS-CDMA) is a popular wireless technology. This system suffers from Multiple Access Interference (MAI) caused by Direct Sequence users and Near –far effect. Multi-User Detection schemes are used to detect the users’ data in presence of MAI and Near- far problem. In this dissertation, we present comparative study between linear multiuser detectors and conventional single user matched filter in DS-CDMA system. Analysis and simulations are conducted in synchronous AWGN channel, and Gold sequence and Kasami sequence are used as the spreading codes. Simulation results depict the performance of three detectors, conventional detector, Decorrelating detector and MMSE (Minimum Mean Square Error) detector. It shows that the performance of these detectors depends on the length of PN code used and Number of users. Linear multiuser detectors perform better than the conventional matched filter in terms of BER performance. All the simulations have been performed on MATLAB 7.0.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
A Critical Survey of Personal Cloud
From time to time, there is the need for a survey of different forms of computer services delivery. Personal Cloud computing is a technology which satisfies customers dynamic resource demands and makes the job easier to work on all platforms for the user. Cloud computing is the delivery of computing services over the Internet. Security is the main criteria when working on cloud, as the third party involvement will always be there. It is therefore recommended in this paper that secure architecture should be used to provide services through the cloud. The extensive use of virtualization in implementing cloud infrastructure brings unique security concerns for customers or tenants of a personal cloud service. It is observed that virtualization alters the relationship between the OS and underlying hardware -be it computing, storage or even networking. Hence, identified methods show how to overcome the security issues of the cloud.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Multiuser detection using BPSK modulation with Adaptive filters
To attain large information rates, multi user detection (MUD) is a well-built aspirant for the downlink of cell phone communications. However, while transmitting any signal over fading channel, the performance of any system is highly affected. For that reason, Multiuser detection (MUD) and channel estimation play a significant function for overcoming the interference and characterizing the channel. In previous cases, this is developed by using many kinds of algorithms. But in this Paper BPSK modulation technique was introduced for multiuser detection due to the drawbacks of those algorithm. The objective of this BPSK modulation is used to minimize the error rate of the user transmitting signal. In this, the user detection complexity and the interference of user transmitting signal are resolved. Since the detection complication and the required time are concentrated. In general, we make use of many types of filters namely, linear filters, nonlinear filters etc. here we are going to implement with adaptive filters. By using nonlinear filters we get narrow bandwidth responses and by using linear filters we get interference and BER is also high. So by using adaptive filters we overcome these drawbacks. The goal of adaptive filters is to improve synchronization and capacity by reducing interference between users. Adaptive algorithms improve the feasibility of multi user receivers.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]