An Efficient and Reliable Image Retrieval Scheme Using STSIM
[View]
T.Ammulu, G.V.Satya kumar
The main objective of this paper is to develop a structural texture similarity metric for image analysis and retrieval. The interest in metrics that deviate from point-by-point similarity was stimulated by the introduction of the structural similarity metrics (SSIM), a class of metrics that attempt to incorporate “structural” information in image comparisons. The proposed metric allow substantial point-by-point deviations between textures that according to human judgment are essentially identical. The proposed metric is computed globally or in sliding windows and implemented using steerable filter decomposition. The performance of the proposed metric is evaluated in the context of “known-item-search”. Experimental results shows that the proposed metric outperform existing metrics PSNR, SSIM. Further the performance of the metric is enhanced by using compression technique with more reliable designs.
T.Ammulu, G.V.Satya kumar
The main objective of this paper is to develop a structural texture similarity metric for image analysis and retrieval. The interest in metrics that deviate from point-by-point similarity was stimulated by the introduction of the structural similarity metrics (SSIM), a class of metrics that attempt to incorporate “structural” information in image comparisons. The proposed metric allow substantial point-by-point deviations between textures that according to human judgment are essentially identical. The proposed metric is computed globally or in sliding windows and implemented using steerable filter decomposition. The performance of the proposed metric is evaluated in the context of “known-item-search”. Experimental results shows that the proposed metric outperform existing metrics PSNR, SSIM. Further the performance of the metric is enhanced by using compression technique with more reliable designs.
An Advanced Fuzzy Design of Active and Reactive Power Control for Large-Scale Grid-Connected Photovoltaic Systems Using Multilevel Converters
[View]
R.R.MANISRI, N.P.V.L.R.C.SEKHAR
Abstract— Solar Cells supplemented with energy storage system are considered as the promising source of alternative energy for portable, transportation and distributed generation applications. High power density of the super capacitor and high energy storage capability of the battery make them ideal choice as the energy storage system. The integration of these three power sources however, poses several difficulties for control system designers. In this paper, it is shown that a supervisory fuzzy logic based control system can well handle the situation associated with the integration. The higher multi level supervisory controller monitors the load demand, power availability of the solar cell and state of the charge of the battery/super capacitor and decides the operating condition of the system. The operating parameters are sent to the lower level power electronics controllers. A unidirectional DC/DC converter and two bidirectional DC/DC converters are designed for the power electronics interface. All the simulations are carried out in the matlab/simulink environment. The supervisory controller is implemented using state flow and fuzzy logic toolbox of matlab.
R.R.MANISRI, N.P.V.L.R.C.SEKHAR
Abstract— Solar Cells supplemented with energy storage system are considered as the promising source of alternative energy for portable, transportation and distributed generation applications. High power density of the super capacitor and high energy storage capability of the battery make them ideal choice as the energy storage system. The integration of these three power sources however, poses several difficulties for control system designers. In this paper, it is shown that a supervisory fuzzy logic based control system can well handle the situation associated with the integration. The higher multi level supervisory controller monitors the load demand, power availability of the solar cell and state of the charge of the battery/super capacitor and decides the operating condition of the system. The operating parameters are sent to the lower level power electronics controllers. A unidirectional DC/DC converter and two bidirectional DC/DC converters are designed for the power electronics interface. All the simulations are carried out in the matlab/simulink environment. The supervisory controller is implemented using state flow and fuzzy logic toolbox of matlab.
An efficient and secured accessing system with surveillance
[View]
Mannam Madhu Babu, Ch.Suneel Kumar
ABSTRACT: This project presents the design and implementation of a technique to transmit information through a capacitive touch screen. Our method triggers transmitted events in to the touch screen device by injecting an RF electric signal that affects the capacitance measurements of the screen. This concept exploits the capacitive touch screens, which are now used in laptops, phones, and tablets, as a signal receiver. The signal that identifies the user can be generated by a small transmitter like RF transmitter. Advanced wireless touch screen authentication activation is provided with more security in valuable devices with RF. RF wireless communication is provided for authentication purpose. Touch screen will be activated, if wireless communication is establishes along with correct password. User defined data can be sent to mobile using keypad through RF. .
Mannam Madhu Babu, Ch.Suneel Kumar
ABSTRACT: This project presents the design and implementation of a technique to transmit information through a capacitive touch screen. Our method triggers transmitted events in to the touch screen device by injecting an RF electric signal that affects the capacitance measurements of the screen. This concept exploits the capacitive touch screens, which are now used in laptops, phones, and tablets, as a signal receiver. The signal that identifies the user can be generated by a small transmitter like RF transmitter. Advanced wireless touch screen authentication activation is provided with more security in valuable devices with RF. RF wireless communication is provided for authentication purpose. Touch screen will be activated, if wireless communication is establishes along with correct password. User defined data can be sent to mobile using keypad through RF. .
INPUT VECTOR MONITORING CONCURRENT BIST ARCHITETURE USING SRAM CELLS
[View]
Mantrala Praneetha, M.Mytri
ABSTRACT - From all these years of VLSI design, it has been identified that the power consumed during the test mode operation is generally high compared to the normal mode operation. The switching activity in the nodes of the circuit under test (CUT) explains this high power dissipation in the test mode. This project presents test vector generation by proposing a Bit swapping LFSR that is based upon some new observations concerning the number of transitions produced at the output of an LFSR. The BS-LFSR reduces the number of transitions occurring at the scan-chain input during scan shift operation by 25%, compared to the normal LFSR, specially for the case of scan-based built-in self-tests. Thus the overall switching activity and hence the power dissipated in the circuit under test is reduced. The BS-LFSR is further combined with a Scan-chain Re-ordering algorithm that orders the cells in such a way so as to reduce the average and peak power (scan and capture) while scanning out a response to a signature analyzer. These techniques have a remarkable effect on the average- and peak-power reductions with negligible effect on the fault coverage or test application time.
Mantrala Praneetha, M.Mytri
ABSTRACT - From all these years of VLSI design, it has been identified that the power consumed during the test mode operation is generally high compared to the normal mode operation. The switching activity in the nodes of the circuit under test (CUT) explains this high power dissipation in the test mode. This project presents test vector generation by proposing a Bit swapping LFSR that is based upon some new observations concerning the number of transitions produced at the output of an LFSR. The BS-LFSR reduces the number of transitions occurring at the scan-chain input during scan shift operation by 25%, compared to the normal LFSR, specially for the case of scan-based built-in self-tests. Thus the overall switching activity and hence the power dissipated in the circuit under test is reduced. The BS-LFSR is further combined with a Scan-chain Re-ordering algorithm that orders the cells in such a way so as to reduce the average and peak power (scan and capture) while scanning out a response to a signature analyzer. These techniques have a remarkable effect on the average- and peak-power reductions with negligible effect on the fault coverage or test application time.
Isolated Operation of PMSG Based Wind Power Generating System with Hybrid Energy Storage and Fuzzy Controlled Converters
[View]
GV Apparao, M.Rama Prasad Reddy
Abstract: Over the past 25 years the electrical power generation through renewable energy resources especially with wind energy is increasing due to the limited conventional resources and increased environmental pollution. In India, about 13.32% of power is contributed by wind energy and with the technological advances there is a good scope of increasing the power contributed by this wind energy. But in case of a Remote Area Power Supply (RAPS) system it is very difficult to operate a wind turbine generating system due to the fluctuating wind and variable load conditions.A Proposed RAPS system consisting of Permanent Magnet Synchronous Generator (PMSG), Fuzzy controlled Rectifier-Inverter arrangement, Hybrid Energy Storage (HES) system, Main load and Dump load is considered in this paper. HES system consists of a Battery storage and a Super capacitor, both are connected to the DC bus of the RAPS system. An Energy Management Algorithm (EMA) is considered for the HES system to improve the performance of battery storage. A Synchronous condenser is also considered for Reactive power support. A coordinated control approach is developed to manage both Active and Reactive power flows, and individual controllers for each RAPS component are also developedfor better performance.This Proposed system is capable of achieving the following objectives: 1) Robust voltage and frequency regulation, b) Effective management of HES system, 3) reactive power support. This entire system is implemented in MATLAB simulink software.
GV Apparao, M.Rama Prasad Reddy
Abstract: Over the past 25 years the electrical power generation through renewable energy resources especially with wind energy is increasing due to the limited conventional resources and increased environmental pollution. In India, about 13.32% of power is contributed by wind energy and with the technological advances there is a good scope of increasing the power contributed by this wind energy. But in case of a Remote Area Power Supply (RAPS) system it is very difficult to operate a wind turbine generating system due to the fluctuating wind and variable load conditions.A Proposed RAPS system consisting of Permanent Magnet Synchronous Generator (PMSG), Fuzzy controlled Rectifier-Inverter arrangement, Hybrid Energy Storage (HES) system, Main load and Dump load is considered in this paper. HES system consists of a Battery storage and a Super capacitor, both are connected to the DC bus of the RAPS system. An Energy Management Algorithm (EMA) is considered for the HES system to improve the performance of battery storage. A Synchronous condenser is also considered for Reactive power support. A coordinated control approach is developed to manage both Active and Reactive power flows, and individual controllers for each RAPS component are also developedfor better performance.This Proposed system is capable of achieving the following objectives: 1) Robust voltage and frequency regulation, b) Effective management of HES system, 3) reactive power support. This entire system is implemented in MATLAB simulink software.
Performance Analysis of Non- cooperative dispersed spectrum sensing in cognitive radio networks
[View]
Yadlapalli Sravanthi, Modali.S.S.S.Srinivas
ABSTRACT- Spectrum allocated Agency (FCC) is currently working on the concept of white space users “borrowing” spectrum from free license holders temporarily to improve the spectrum utilization, i.e known as dynamic spectrum access (DSA). CRN systems can utilize dispersed spectrum, and thus such approach is known as dispersed spectrum cognitive radio systems.This project provides a tradeoff between a false alarm probability (Pf) and the signal to noise ratio (SNR) value of any spectrum detector to have a certain performance. Moreover, the performance of the cyclostationary detector (CD) and the matched filter detector (MF) is better than the energy detector(ED) especially at low signal to noise ratio values. Unfortunately, the cyclostationary spectrum sensing method, performance is not satisfying when the wireless fading channels are employed. In this project we provide the comparisons between cooperative and Non cooperative spectrum.
Yadlapalli Sravanthi, Modali.S.S.S.Srinivas
ABSTRACT- Spectrum allocated Agency (FCC) is currently working on the concept of white space users “borrowing” spectrum from free license holders temporarily to improve the spectrum utilization, i.e known as dynamic spectrum access (DSA). CRN systems can utilize dispersed spectrum, and thus such approach is known as dispersed spectrum cognitive radio systems.This project provides a tradeoff between a false alarm probability (Pf) and the signal to noise ratio (SNR) value of any spectrum detector to have a certain performance. Moreover, the performance of the cyclostationary detector (CD) and the matched filter detector (MF) is better than the energy detector(ED) especially at low signal to noise ratio values. Unfortunately, the cyclostationary spectrum sensing method, performance is not satisfying when the wireless fading channels are employed. In this project we provide the comparisons between cooperative and Non cooperative spectrum.
RELIABLE AND ENHANCED USER DEFINED PERSONALIZED WEB SEARCH
[View]
Tadigadapa Aruna Kumari, . K. Naresh Babu
ABSTRACT- Personalized web search (PWS) has demonstrated its effectiveness in improving the quality of various search services on the Internet. However, evidences show that users’ reluctance to disclose their private information during search has become a major barrier for the wide proliferation of PWS. We propose a privacy-preserving personalized web search framework UPS, which can generalize profiles for each query according to user-specified privacy requirements. Relying on the definition of two conflicting metrics, namely personalization utility and privacy risk, for hierarchical user profile, we formulate the problem of privacy-preserving personalized search as #-Risk Profile Generalization, with its N P-hardness proved. We develop two simple but effective generalization algorithms, GreedyDP and GreedyIL, to support runtime profiling. While the former tries to maximize the discriminating power (DP), the latter attempts to minimize the information loss (IL). By exploiting a number of heuristics, GreedyIL out performs GreedyDP significantly. We provide an inexpensive mechanism for the client to decide whether to personalize a query in UPS. This decision can be made before each runtime profiling to enhance the stability of the search results while avoid the unnecessary exposure of the profile. Our extensive experiments demonstrate the efficiency and effectiveness of our UPS framework.
Tadigadapa Aruna Kumari, . K. Naresh Babu
ABSTRACT- Personalized web search (PWS) has demonstrated its effectiveness in improving the quality of various search services on the Internet. However, evidences show that users’ reluctance to disclose their private information during search has become a major barrier for the wide proliferation of PWS. We propose a privacy-preserving personalized web search framework UPS, which can generalize profiles for each query according to user-specified privacy requirements. Relying on the definition of two conflicting metrics, namely personalization utility and privacy risk, for hierarchical user profile, we formulate the problem of privacy-preserving personalized search as #-Risk Profile Generalization, with its N P-hardness proved. We develop two simple but effective generalization algorithms, GreedyDP and GreedyIL, to support runtime profiling. While the former tries to maximize the discriminating power (DP), the latter attempts to minimize the information loss (IL). By exploiting a number of heuristics, GreedyIL out performs GreedyDP significantly. We provide an inexpensive mechanism for the client to decide whether to personalize a query in UPS. This decision can be made before each runtime profiling to enhance the stability of the search results while avoid the unnecessary exposure of the profile. Our extensive experiments demonstrate the efficiency and effectiveness of our UPS framework.
AN EFFICIENT SECURE KEY-AGGREGATION SCHEME FOR CLOUD DELEGATES
[View]
M.Lakshmi Durga, K.ChandraMouli
Abstract: Cloud Infra contains a collection of storage servers, providing an illusion of unlimited storage and accessing. Security is one of the critical components of such a system. Storing data at a remote third party’s cloud system is always causing serious concern over data confidentiality and survivability. Many encryption schemes protect data integrity, but they limit the functionality of the data owner especially with respect to revocation because a singular key based protection schemes are employed for encrypted data. So we propose a new cryptosystems that can produce a fixed-sized data protecting keys such that a data delegation event requires assigning a set of random keys to random clients as decryption rights for specific set of ciphered contents. An interesting feature is that one can aggregate many set of secret keys from single secret unity and simultaneously making them as compact as possible just like their parent single unity, but at same time packing the power of all the keys being aggregated that can uniquely assigned to a user. This sort of secured cloud storage system supports a robust data storage and retrievals, because it lets a cloud user forward their data in the storage servers to another cloud user without retrieving the data back and revoking the keys for each unique user. A formal security analytic cloud prototype of our proposed schemes in a standard cloud storage model validates its performance.
M.Lakshmi Durga, K.ChandraMouli
Abstract: Cloud Infra contains a collection of storage servers, providing an illusion of unlimited storage and accessing. Security is one of the critical components of such a system. Storing data at a remote third party’s cloud system is always causing serious concern over data confidentiality and survivability. Many encryption schemes protect data integrity, but they limit the functionality of the data owner especially with respect to revocation because a singular key based protection schemes are employed for encrypted data. So we propose a new cryptosystems that can produce a fixed-sized data protecting keys such that a data delegation event requires assigning a set of random keys to random clients as decryption rights for specific set of ciphered contents. An interesting feature is that one can aggregate many set of secret keys from single secret unity and simultaneously making them as compact as possible just like their parent single unity, but at same time packing the power of all the keys being aggregated that can uniquely assigned to a user. This sort of secured cloud storage system supports a robust data storage and retrievals, because it lets a cloud user forward their data in the storage servers to another cloud user without retrieving the data back and revoking the keys for each unique user. A formal security analytic cloud prototype of our proposed schemes in a standard cloud storage model validates its performance.
ENHANCED PRIVACY PROTECTION IN PERSONALIZED WEB SEARCH
[View]
V. MANIKYALA RAO., P. LAKSHMAN SWAMY
Abstract: Personalized web search (PWS) has demonstrated its effectiveness in improving the quality of various search services on the Internet. However, evidences show that users’ reluctance to disclose their private information during search has become a major barrier for the wide proliferation of PWS. We study privacy protection in PWS applications that model user preferences as hierarchical user profiles. We propose a PWS framework called UPS that can adaptively generalize profiles by queries while respecting user-specified privacy requirements. Our runtime generalization aims at striking a balance between two predictive metrics that evaluate the utility of personalization and the privacy risk of exposing the generalized profile. We present two greedy algorithms, namely GreedyDP and GreedyIL, for runtime generalization. We also provide an online prediction mechanism for deciding whether personalizing a query is beneficial. Extensive experiments demonstrate the effectiveness of our framework. The experimental results also reveal that GreedyIL significantly outperforms GreedyDP in terms of efficiency.
V. MANIKYALA RAO., P. LAKSHMAN SWAMY
Abstract: Personalized web search (PWS) has demonstrated its effectiveness in improving the quality of various search services on the Internet. However, evidences show that users’ reluctance to disclose their private information during search has become a major barrier for the wide proliferation of PWS. We study privacy protection in PWS applications that model user preferences as hierarchical user profiles. We propose a PWS framework called UPS that can adaptively generalize profiles by queries while respecting user-specified privacy requirements. Our runtime generalization aims at striking a balance between two predictive metrics that evaluate the utility of personalization and the privacy risk of exposing the generalized profile. We present two greedy algorithms, namely GreedyDP and GreedyIL, for runtime generalization. We also provide an online prediction mechanism for deciding whether personalizing a query is beneficial. Extensive experiments demonstrate the effectiveness of our framework. The experimental results also reveal that GreedyIL significantly outperforms GreedyDP in terms of efficiency.
IMPLEMENTING OPTIMIZED SHORTEST PATH COMPUTATION
[View]
P. PRAKASH., P. SAMBA SIVA RAO
ABSTRACT: The online shortest path problem aims at computing the shortest path based on live traffic circumstances. This is very important in modern car navigation systems as it helps drivers to make sensible decisions. To our best knowledge, there is no efficient system/solution that can offer affordable costs at both client and server sides for online shortest path computation. Unfortunately, the conventional client-server architecture scales poorly with the number of clients. A promising approach is to let the server collect live traffic information and then broadcast them over radio or wireless network. This approach has excellent scalability with the number of clients. Thus, we develop a new framework called live traffic index (LTI) which enables drivers to quickly and effectively collect the live traffic information on the broadcasting channel. An impressive result is that the driver can compute/update their shortest path result by receiving only a small fraction of the index. Our experimental study shows that LTI is robust to various parameters and it offers relatively short tune-in cost (at client side), fast query response time (at client side), small broadcast size (at server side), and light maintenance time (at server side) for online shortest path problem.
P. PRAKASH., P. SAMBA SIVA RAO
ABSTRACT: The online shortest path problem aims at computing the shortest path based on live traffic circumstances. This is very important in modern car navigation systems as it helps drivers to make sensible decisions. To our best knowledge, there is no efficient system/solution that can offer affordable costs at both client and server sides for online shortest path computation. Unfortunately, the conventional client-server architecture scales poorly with the number of clients. A promising approach is to let the server collect live traffic information and then broadcast them over radio or wireless network. This approach has excellent scalability with the number of clients. Thus, we develop a new framework called live traffic index (LTI) which enables drivers to quickly and effectively collect the live traffic information on the broadcasting channel. An impressive result is that the driver can compute/update their shortest path result by receiving only a small fraction of the index. Our experimental study shows that LTI is robust to various parameters and it offers relatively short tune-in cost (at client side), fast query response time (at client side), small broadcast size (at server side), and light maintenance time (at server side) for online shortest path problem.
Attribute-Based Encryption for Access Control of Outsourced Data in Cloud Computing
[View]
Malladi.GanaSatyaSrinivas, K.Johnpaul
ABSTRACT: Cloud computing is an emerging computing paradigm in which resources of the computing infrastructure are provided as services over the Internet. To keep sensitive user data confidential against un-trusted servers, existing solutions usually apply cryptographic methods by disclosing data decryption keys only to authorized users. These solutions inevitably introduce a heavy computation overhead on the data owner for key distribution and data management when fine grained data access control is desired. Open issue by defining and enforcing access policies based on data attributes and allowing the data owner to delegate most of the computation tasks involved in fine grained data access control to un-trusted cloud servers without disclosing the underlying data contents. Several schemes employing attribute-based encryption (ABE) have been proposed for access control of outsourced data in cloud computing. As Cloud Computing requires additional security which is provided using HASBE and this can emerge as a new security feature for various organizational platforms. It is implemented using cipher text policy by encrypting and decrypting the data in the cloud so that the cloud system becomes more scalable and flexible by enforcing data owners to share their data with data consumers controlled by the domain authority.
Malladi.GanaSatyaSrinivas, K.Johnpaul
ABSTRACT: Cloud computing is an emerging computing paradigm in which resources of the computing infrastructure are provided as services over the Internet. To keep sensitive user data confidential against un-trusted servers, existing solutions usually apply cryptographic methods by disclosing data decryption keys only to authorized users. These solutions inevitably introduce a heavy computation overhead on the data owner for key distribution and data management when fine grained data access control is desired. Open issue by defining and enforcing access policies based on data attributes and allowing the data owner to delegate most of the computation tasks involved in fine grained data access control to un-trusted cloud servers without disclosing the underlying data contents. Several schemes employing attribute-based encryption (ABE) have been proposed for access control of outsourced data in cloud computing. As Cloud Computing requires additional security which is provided using HASBE and this can emerge as a new security feature for various organizational platforms. It is implemented using cipher text policy by encrypting and decrypting the data in the cloud so that the cloud system becomes more scalable and flexible by enforcing data owners to share their data with data consumers controlled by the domain authority.
Cloud Data Deduplication Using Advanced HMAC Solutions
[View]
Abburi Ram Kumar., M.Revati
Abstract: Cloud Data Storages reduces tremendous load on users with respect to their local storages but introduces new issues with respect to data duplicates in the cloud. Although some earlier approaches dealt with the problem of implementing an approach to handle cloud security and performance with respect to de-duplication by properly defining the concerned parties in the cloud and invoking file signature identification process using traditional hash message authentication code(HMAC). Due to these hash code algorithms like SHA-1 and MD5 the file integrity values are huge leading to latency factor at the de-duplication estimation. Due to this above problem the storage array accommodates prior integrity hash codes leading to performance issues. So we propose a better Data Signature Algorithm know as ALDER32 in place of SHA that can be used as a statistical study of chains of chunks that would enable multiple possibilities in both the chunk order which is very less compared to SHA and the corresponding predictions and a developed prototype validates our claim.
Abburi Ram Kumar., M.Revati
Abstract: Cloud Data Storages reduces tremendous load on users with respect to their local storages but introduces new issues with respect to data duplicates in the cloud. Although some earlier approaches dealt with the problem of implementing an approach to handle cloud security and performance with respect to de-duplication by properly defining the concerned parties in the cloud and invoking file signature identification process using traditional hash message authentication code(HMAC). Due to these hash code algorithms like SHA-1 and MD5 the file integrity values are huge leading to latency factor at the de-duplication estimation. Due to this above problem the storage array accommodates prior integrity hash codes leading to performance issues. So we propose a better Data Signature Algorithm know as ALDER32 in place of SHA that can be used as a statistical study of chains of chunks that would enable multiple possibilities in both the chunk order which is very less compared to SHA and the corresponding predictions and a developed prototype validates our claim.
Predicate Encryption Procedure to Detect Illegal Distribution in HMS (Hospital Management System)
[View]
Praneetha Madasu, Ch.Nagamani
Abstract: Vital details leak existing in wellness details of patients existing in SaaS Health Storage space Atmosphere leads to many harmful functions such as finding details for corporate espionage — like results in drug tests. Discovering figures that could be used to make scams. With wellness figures, it’s complex, but once an outsider haves them, the amounts of money they can scams out of companies like Medical health insurance, State health programs, Blue Cross,‖ are sub spatial. In that aspect prior system’s ability to use secure listing along with Feature Based Security delicate details helps in thwarting reasoning storage details leaking, it doesn’t address if risk occurs from within. A harmful inner scorned worker but neglect their rights and access then posts delicate wellness details all resulting in same problem again. So we recommend a powerful decrypting meta details embedding criteria that could somehow helpful in catching the harmful inner user although not immediately, but definitely some time in future when researchers get a hold of released delicate wellness details resulting in apprehending of the real criminal. Metadata may be located anywhere in the details file. Except in linearized files (those enhanced for ―fast web view‖), things in a PDF details file can appear in any order. Furthermore, meta-data sources can be connected at the details file level or to any self-contained subassembly item in the details file, such as a page.
Praneetha Madasu, Ch.Nagamani
Abstract: Vital details leak existing in wellness details of patients existing in SaaS Health Storage space Atmosphere leads to many harmful functions such as finding details for corporate espionage — like results in drug tests. Discovering figures that could be used to make scams. With wellness figures, it’s complex, but once an outsider haves them, the amounts of money they can scams out of companies like Medical health insurance, State health programs, Blue Cross,‖ are sub spatial. In that aspect prior system’s ability to use secure listing along with Feature Based Security delicate details helps in thwarting reasoning storage details leaking, it doesn’t address if risk occurs from within. A harmful inner scorned worker but neglect their rights and access then posts delicate wellness details all resulting in same problem again. So we recommend a powerful decrypting meta details embedding criteria that could somehow helpful in catching the harmful inner user although not immediately, but definitely some time in future when researchers get a hold of released delicate wellness details resulting in apprehending of the real criminal. Metadata may be located anywhere in the details file. Except in linearized files (those enhanced for ―fast web view‖), things in a PDF details file can appear in any order. Furthermore, meta-data sources can be connected at the details file level or to any self-contained subassembly item in the details file, such as a page.
Reduced Bottleneck TV Streaming in Mobile Social Networking
[View]
J.Raja Srikanth., Ch.RajaJacob
Abstract: Affordable prices brought the power of high end personal mobile devices (tablets, smart phones, etc.) with much richer contents and dynamic social interactions to users on the move. Although limited battery lifetime, unstable wireless connectivity are some performance constraints, prior approaches suggested cloud computing based solutions to overcome them especially in the area of mobile based social networking. With the advent of cloud computing paradigm that supports low-cost, agile, scalable resource supply, to support power-efficient mobile data communication. With virtually infinite hardware and software resources, the cloud can offload the computations, caching and other tasks involved in a mobile application and may significantly reduce battery consumption at the mobile devices. An architecture that support simultaneous mobile social texting and TV transmissions is requires and the IAAS/PAAS cloud approach improves the performance of Social TV services in terms of resource usage, video latencies. and spontaneous social interactivity based streaming parameters. Video Streaming Start up delays can be experienced due to in-efficient burst up requests processing. Considering high computational time of prior transcoding steps we propose to use eager allocation algorithm combined with Stochastic estimations for reducing the start up delays utilizing the multi-core nature of the systems. Simulation results on multi core processors will validate our claim of its efficiency in implementing parallel processing.
J.Raja Srikanth., Ch.RajaJacob
Abstract: Affordable prices brought the power of high end personal mobile devices (tablets, smart phones, etc.) with much richer contents and dynamic social interactions to users on the move. Although limited battery lifetime, unstable wireless connectivity are some performance constraints, prior approaches suggested cloud computing based solutions to overcome them especially in the area of mobile based social networking. With the advent of cloud computing paradigm that supports low-cost, agile, scalable resource supply, to support power-efficient mobile data communication. With virtually infinite hardware and software resources, the cloud can offload the computations, caching and other tasks involved in a mobile application and may significantly reduce battery consumption at the mobile devices. An architecture that support simultaneous mobile social texting and TV transmissions is requires and the IAAS/PAAS cloud approach improves the performance of Social TV services in terms of resource usage, video latencies. and spontaneous social interactivity based streaming parameters. Video Streaming Start up delays can be experienced due to in-efficient burst up requests processing. Considering high computational time of prior transcoding steps we propose to use eager allocation algorithm combined with Stochastic estimations for reducing the start up delays utilizing the multi-core nature of the systems. Simulation results on multi core processors will validate our claim of its efficiency in implementing parallel processing.
AN ENHANCED AND LOW POWER DOUBLE PRECISION FLOATING POINT MULTIPLIER DESIGN
[View]
K.RAVI VARMA, M.SANDYA
ABSTRACT: The main objective of this project is to design an efficient IEEE-754 floating point multiplier .This project focuses on double precision normalized binary floating point multiplication in IEEE754 format. The proposed design is compliant with IEEE-754 format and handles over flow, under flow, rounding and various exception conditions. FLOATING-POINT arithmetic provides a wide dynamic range, freeing special purpose processor designers from the scaling and overflow/underflow concerns that arise with fixed-point arithmetic. Further this project can be enhanced by replacing the general multiplier architecture with modified booth multiplication. This modification yields reduction of partial products to half. Partial products reduction changes system overall performance in an efficient manner. Xilinx tool is used to perform this task with the help of VHDL language.
K.RAVI VARMA, M.SANDYA
ABSTRACT: The main objective of this project is to design an efficient IEEE-754 floating point multiplier .This project focuses on double precision normalized binary floating point multiplication in IEEE754 format. The proposed design is compliant with IEEE-754 format and handles over flow, under flow, rounding and various exception conditions. FLOATING-POINT arithmetic provides a wide dynamic range, freeing special purpose processor designers from the scaling and overflow/underflow concerns that arise with fixed-point arithmetic. Further this project can be enhanced by replacing the general multiplier architecture with modified booth multiplication. This modification yields reduction of partial products to half. Partial products reduction changes system overall performance in an efficient manner. Xilinx tool is used to perform this task with the help of VHDL language.
DEVELOPMENT OF HYBRID ACTIVE POWER FILTER BASED ON THE ADAPTIVE FUZZY DIVIDING FREQUENCY-CONTROL METHOD IN GRID CONNECTED DG UNITS
[View]
Chinni Naganjali, N.P.V.L.R.C.Sekhar
ABSTRACT: This paper deals with a hybrid active power filter with injection circuit (IHAPF). It shows great promise in reducing harmonics and improving the power factor with a relatively low capacity active power filter. An adaptive fuzzy dividing frequency-control method composed of a generalized PI control unit and fuzzy adjustor unit was proposed. In the new control scheme, the generalized PI control unit is used to achieve dividing frequency control; the fuzzy adjustor unit is used to adjusted parameters of the PI control unit to produce better adaptive ability and dynamic response. At the same time, the control strategy is generally useful and applicable to other active filters. This paper concluded that the stability of the IHAPF based on detection supply current is superior to that of others. The increasing application of nonlinear loads may cause distribution system power quality issues. In order to utilize distributed generation (DG) unit interfacing converters to actively compensate harmonics, this paper proposes an enhanced current control approach, which seamlessly integrates system harmonic mitigation capabilities with the primary DG power generation function. As the proposed current controller has two well decoupled control branches to independently control fundamental and harmonic DG currents, local nonlinear load harmonic current detection and distribution system harmonic voltage detection are not necessary for the proposed harmonic compensation method. Moreover, a closed-loop power control scheme is employed to directly derive the fundamental current reference without using any phase-locked loops (PLL).
Chinni Naganjali, N.P.V.L.R.C.Sekhar
ABSTRACT: This paper deals with a hybrid active power filter with injection circuit (IHAPF). It shows great promise in reducing harmonics and improving the power factor with a relatively low capacity active power filter. An adaptive fuzzy dividing frequency-control method composed of a generalized PI control unit and fuzzy adjustor unit was proposed. In the new control scheme, the generalized PI control unit is used to achieve dividing frequency control; the fuzzy adjustor unit is used to adjusted parameters of the PI control unit to produce better adaptive ability and dynamic response. At the same time, the control strategy is generally useful and applicable to other active filters. This paper concluded that the stability of the IHAPF based on detection supply current is superior to that of others. The increasing application of nonlinear loads may cause distribution system power quality issues. In order to utilize distributed generation (DG) unit interfacing converters to actively compensate harmonics, this paper proposes an enhanced current control approach, which seamlessly integrates system harmonic mitigation capabilities with the primary DG power generation function. As the proposed current controller has two well decoupled control branches to independently control fundamental and harmonic DG currents, local nonlinear load harmonic current detection and distribution system harmonic voltage detection are not necessary for the proposed harmonic compensation method. Moreover, a closed-loop power control scheme is employed to directly derive the fundamental current reference without using any phase-locked loops (PLL).
AN EFFICIENT APPROACH FOR IMAGE RE-RANKING AND SEMANTIC SIGNATURES WITH QUERIES ON WEB
[View]
S.K.AKBAR , MANDADAPU. PAVANI
ABSTRACT: Image re-ranking, is an effective way to improve the results of web-based image search and has been adopted by current commercial search engines such as Bing and Google. When a query keyword is given, a list of images are first retrieved based on textual information given by the user. By asking the user to select a query image from the pool of images, the remaining images are re-ranked based on their index with the query image. A major challenge is that sometimes semantic meanings may interpret user’s search intention. Many people recently proposed to match images in a semantic space which used attributes or reference classes closely related to the semantic meanings of images as basis. In this paper, we propose a novel image re-ranking framework, in which automatically offline learns different semantic spaces for different query keywords and displays with the image details in the form of augmented images. The images are projected into their related semantic spaces to get semantic signatures with the help of one click feedback from the user. At the online stage, images are re-ranked by comparing their semantic signatures obtained from the semantic space specified by the query keyword given by the user. The proposed query-specific semantic signatures significantly improve both the accuracy and efficiency of image re-ranking. Experimental results show that 25-40 percent relative improvement has been achieved on re-ranking precisions compared with the state-of-the-art methods.
S.K.AKBAR , MANDADAPU. PAVANI
ABSTRACT: Image re-ranking, is an effective way to improve the results of web-based image search and has been adopted by current commercial search engines such as Bing and Google. When a query keyword is given, a list of images are first retrieved based on textual information given by the user. By asking the user to select a query image from the pool of images, the remaining images are re-ranked based on their index with the query image. A major challenge is that sometimes semantic meanings may interpret user’s search intention. Many people recently proposed to match images in a semantic space which used attributes or reference classes closely related to the semantic meanings of images as basis. In this paper, we propose a novel image re-ranking framework, in which automatically offline learns different semantic spaces for different query keywords and displays with the image details in the form of augmented images. The images are projected into their related semantic spaces to get semantic signatures with the help of one click feedback from the user. At the online stage, images are re-ranked by comparing their semantic signatures obtained from the semantic space specified by the query keyword given by the user. The proposed query-specific semantic signatures significantly improve both the accuracy and efficiency of image re-ranking. Experimental results show that 25-40 percent relative improvement has been achieved on re-ranking precisions compared with the state-of-the-art methods.
Pages [1]

This work is licensed under a Creative Commons Attribution 3.0 License.
© 2011 - 2012 International Journal of Engineering In Advanced Research Science and Technology
Managed By IJEARST Foundation
International Journal of Engineering In Advanced Research Science and Technology ISSN : 2278-2566 (Online)
All rights reserved witheditor@IJEARST.COM.
To make sure that you can receive messages from us, please add the 'IJEARST.COM' domain to your e-mail 'safe list'. If you do not receive e-mail in your 'inbox', check your 'bulk mail' or 'junk mail' folders.
For any Technical Support contact @complaint@IJEARST.COM