Gwalior, India


Gwalior, India
Time filter
Source Type

Pandey S.N.,Indian Institute of Information Technology and Management Gwalior | Pandey N.K.,IPS CTM Gwalior | Tapaswi S.,ABV IIITM | Srivastava L.,Madhav Institute of Technology and Science
IEEE Transactions on Power Systems | Year: 2010

In the competitive electric power market allowing open access transmission environment, the knowledge of available transfer capability (ATC) is very important for optimum utilization of existing transmission facility. ATC information conveys how much power can be transmitted through the power network over and above already committed usage without violation of system security limits. This paper presents a Levenberg-Marquardt algorithm neural network (LMANN)-based approach for fast and accurate estimation of system ATC. System ATC has been estimated for both varying load condition as well as for single line outage contingency condition by employing distributed computing. Principal component analysis (PCA) has been applied for effective input feature selection. Contingency clusters are formed such that each cluster contains almost similar ATC values. For each contingency clusters separate LMANNs have been developed. All the proposed LMANNs have been trained and tested under distributed computing environment and a considerable speed up in the training is obtained. The proposed approach has been examined on 75-bus Indian power system and IEEE 300-bus system and found significantly efficient. © 2010 IEEE.

Agariya A.K.,BITS | Singh D.,ABV IIITM
Journal of Health Management | Year: 2013

The aim of this paper is to develop a reliable and valid CRM (Customer relationship management) scale specifically catering to Indian public hospitals. An exhaustive review of literature on CRM was followed by depth interview and questionnaire survey. Exploratory factor analysis was followed by confirmatory factor analysis which was presented in three forms; the single factor model, covariance model and the structural model. The covariance model shows CRM in Indian public hospitals as a multidimensional construct comprising of factors namely tangibles, service quality, trust, availability and accessibility which is validated through the structural model. The findings of this study validate the long held belief that CRM is a multidimensional construct and serves as a critical success factor for performance enhancement. The proposed scale will help in identifying issues that contribute to CRM in Indian public hospitals and thereby formulating strategies accordingly, resulting in efficient (cost) and effective (outcomes) CRM practices. A fair amount of literature on Indian public hospitals dealt with identifying factors explaining the constructs of quality, value or satisfaction. But there is paucity of research pertaining to industry-specific CRM scale development and validation. This study is an attempt to bridge this gap in the existing literature. © 2013 Indian Institute of Health Management Research.

Vasnik D.,ABV IIITM | Pattanaik M.,ABV IIITM
International Conference on Microelectronics, Computing and Communication, MicroCom 2016 | Year: 2016

A double gated structure of Gate-Stack Doping-Less Tunnel Field Effect Transistor (GS-DLTFET) is proposed in this paper. Source and Drain regions of the FET are not doped using the charge plasma concept, which makes the device free from the random dopant fluctuation issue. A multi-layer structure is formed on the gate by imposing the layers of dielectrics. The device thus formed is analyzed by various parameters i.e., performing the AC and DC simulations on the device and studying the drain current characteristics of the device. One of the important factor i.e., effect of temperature variations are also seen on the various parameters of the device. The analyzed results are compared with the Doping-Less Tunnel Field Effect Transistor (DLTFET) and found to be better in performance. SILVACO ATLAS device simulator software has been used to carry out the simulations of the proposed device for analyzing the device performance. © 2016 IEEE.

Patel A.,ABV IIITM | Trivedi A.,ABV IIITM
Proceedings - 2010 International Conference on Computational Intelligence and Communication Networks, CICN 2010 | Year: 2010

Multi-carrier code division multiple access (MCCDMA) mobile communication systems targets to overcome the multi-path fading influences and to increase system capacity. In this paper, we present a modified version of evolutionary algorithm, called as Particle swarm optimization (PSO) which quickly converges to global optimal solution. This algorithm is used to develop a suboptimal multi-user detection (MUD) strategy for MC-CDMA systems. More specifically, after getting the initial population from the front-end frequency domain maximal ratio combining (MRC) or minimum mean-square error (MMSE) equalizer, simplified PSO optimization is applied. Simulation results show that the proposed PSO algorithm remarkably improves the performance of both, MRC and MMSE detector. Results of proposed MMSE-PSO scheme are better than the MMSE detector and it also outperforms MRC-PSO scheme. © 2010 IEEE.

Sharma P.,ABV IIITM | Trivedi A.,ABV IIITM
2011 IEEE 3rd International Conference on Communication Software and Networks, ICCSN 2011 | Year: 2011

Ad hoc networks are vulnerable due to their structure less property. A Mobile Ad-Hoc Network (MANET) is an infrastructure less collection of mobile nodes that can arbitrarily change their geographic locations such that these networks have dynamic topologies and random mobility with constrained resources. They also have capability of network partition. The Wormhole attack is the most attention seeking attack in ad hoc networks; it consists of two malicious nodes and a tunnel between malicious nodes. In wormhole attack, attacker records the packets at one location and tunnels them in another location in same network or in different network. In this paper, we present a mechanism which is helpful in prevention of wormhole attack in ad hoc network is verification of digital signatures of sending nodes by receiving node because each legitimate node in the network contains the digital signature of every other legitimate nodes of same network. In proposed solution, if sender wants to send the data to destination, firstly it creates a secure path between sender and receiver with the help of verification of digital signature. If there is presence of any malicious node in between the path then it is identified because malicious node does not have its own legal digital signature. © 2011 IEEE.

Arya K.V.,ABV IIITM | Vadlamudi B.R.,ABV IIITM
Proceedings of the 2012 3rd International Conference on Computer and Communication Technology, ICCCT 2012 | Year: 2012

Due to the large volume of the Web information and relatively high speed of information update, the coverage and quality of the retrieved pages by modern search engines is comparatively small. Given the volume of the Web and its frequency of content change, the coverage and quality of pages retrieved by modern search engines is relatively small since they crawl only hypertext links ignoring the search forms which are the entry points for accessing deep web content where two-thirds of information is resides. In this paper an algorithm has been designed to enable topical crawlers to access hidden web content by using domain based ontology to determine the forms' relevance to the domain. In this work scientific research publications domain has been considered. Experimental results show that proposed approach is better as compared to keyword based crawlers in terms of both relevancy and completeness. © 2012 IEEE.

Trivedi A.,ABV IIITM
Souvenir of the 2014 IEEE International Advance Computing Conference, IACC 2014 | Year: 2014

Orthogonal Frequency Division Multiplexing (OFDM) is recognized as high data rate transmission technique. Further, application of space-time block coding (STBC) to the OFDM system may help in combating severe affects of fading. In this paper, space time block encoded time frequency training OFDM (TFT-OFDM) system is proposed. The TFT-OFDM signal is trained in both time and frequency domain by appending the training sequence and by inserting the grouped pilots, respectively. Such structure of signal helps in providing better spectral efficiency and reliability. The performance of proposed system is analyzed over fast fading channel and compared with various STBC based OFDM transmission schemes. These various STBC-based OFDM transmission techniques are STBC-based cyclic prefix OFDM (CP-OFDM), STBC-based zero padding OFDM (ZP-OFDM), and STBC-based time domain synchronous OFDM (TDS-OFDM). Simulation results indicate that the STBC-based TFT-OFDM is better than other STBC-based OFDM transmission techniques in BER performance. © 2014 IEEE.

Acharya P.,ABV IIITM | Mahanty B.,Indian Institute of Technology Kharagpur
International Journal of Industrial and Systems Engineering | Year: 2010

Software reuse, despite being relatively new to the Indian software industry, generates a lot of interest amongst the cross-section of people in the industry. The reuse philosophy as well as its practice evokes varied response across sections even in the same organisation, from top management to project managers to developers. This article reviews the present status of software reuse practices in the Indian information technology firms on the basis of a questionnaire survey, field visits, and a number of interviews with industry participants and researchers. Adequate review of literature, supported by expert opinion survey and questionnaire survey, helped develop the conceptual model for software reuse. The structural equation model was tested with the data obtained from the questionnaire responses. The output model throws light on the causes of reuse and its consequences and also confirms the findings from the statistical analysis of the questionnaire data. © 2010 Inderscience Enterprises Ltd.

Prakash A.,Indian Institute of Technology Delhi | Deshmukh S.G.,ABV IIITM | Deshmukh S.G.,Indian Institute of Technology Delhi
International Journal of Industrial and Systems Engineering | Year: 2011

In this paper, an artificial immune system-(AIS-) based fuzzy expert system is developed for a flexible manufacturing system (FMS) to make the real-time decision in the randomly changing marketing and production environments. In FMS context, any direct mathematical relationship between system attributes and performance measures and their effect on controlling policy is not available. The novelty of the paper is that it makes a unique attempt to map an abstract relationship of system attributes with various performance measures. It also provides the estimation of the change required in the self-configured control policy of an FMS. The evolutionary algorithm AIS is used for searching the suboptimal rule base. The efficacy of the proposed system has been shown by an illustrative example. © 2011 Inderscience Enterprises Ltd.

Jaiswal A.,ABV IIITM
Proceedings of the 2013 3rd IEEE International Advance Computing Conference, IACC 2013 | Year: 2013

In This Paper I propose that, in future all corporate office and shopping mall will have their own money transaction machine for their customer and their employee and they will provide their own unique identity card with money transaction facility to their regular customer and employ this Easy Money Transaction [EMT] is like an Automated Teller Machine [ATM] but it has some different feature like call security of that organization at the time of some critical problem. The concept to design that architecture is only to make easy life of the user. The purposed architecture is realized using HDL language. © 2013 IEEE.

Loading ABV IIITM collaborators
Loading ABV IIITM collaborators