CMRIT

Hyderabad, India
Hyderabad, India
SEARCH FILTERS
Time filter
Source Type

Sharmila K.P.,CMRIT | Anjali,CMRIT | Pattar S.,Network Solutions
2016 IEEE International Conference on Recent Trends in Electronics, Information and Communication Technology, RTEICT 2016 - Proceedings | Year: 2016

Device-To-Device (D2D) communication is one of the most popular topic in the upcoming device communication. D2D provides access to services through direct or indirect connection path with neighboring devices with or/and without ENodeB (eNB) assistance. Some of the problems faced in this case are discovering process of neighbor user equipment (UE) and services, as well as designing suitable and secure protocols for D2D communication. In this paper, we propose a sidelink based D2D communication, wherein a separate unlicensed band apart from uplink and downlink is considered to be allocated for sidelink and is functional without the presence of eNB. In this paper we present a detailed study of operational procedures at Radio Resource Control (RRC) and Media Access Control (MAC) layers for sidelink based D2D communication along with this various messages handled for D2D communication for both scenarios using sidelink has been discussed. Two scenarios of D2D communications have been considered - for both UE's in-coverage and both UE's out-of-coverage. The client side architecture of D2D communication with respect to RRC and MAC layers is also presented. © 2016 IEEE.


Geetha S.,CMRIT | Deepalakshmi P.,Kalasalingam UniversityTamil Nadu | Madhu G.,CMRIT
2016 International Conference on Electrical, Electronics, Communication, Computer and Optimization Techniques, ICEECCOT 2016 | Year: 2017

Sensors are wonderful to get more lively applications. Undoubtedly homogeneous activities with network are erased with heterogeneous sensor network. But the network performance may be slowly degraded at the point of boundary of the network. Sensor Network domain issues are raised from the energy of the battery. In this paper, we are addressing the energy consumption by tackling sensors usage. A node which is not transferring the packet is referred as Void. These voids are expected to be at the boundary of the clusters. Here the mobile node which has more energy is moved near to the boundary void node and replace the Relay void node. In the boundary, a node which is near to the base station is highly responsible and loaded with more tasks. The task is aggregating data from different nodes deployed in the network and transfer the messages to the base station. A node which is not transferring the packets to the base station at boundary can be replaced by other mobile node. The replacement is done using the algorithm Mobile Node Movement to Boundary. The intension for mobile relay scheme is to support a complete transfer of messages and lifetime for sensor networks. © 2016 IEEE.


Jadhav P.,CMRIT
International Journal of Mechanical Engineering and Technology | Year: 2017

This paper describes the application of vibration modal analysis for detecting, monitoring and locating damage inside a wooden wall structure, by evaluating damage-sensitive parameters such as resonant frequencies and operating deflection shapes (ODS). Artificial damage was created in one of the walls of a specially constructed room. The wall was excited using an impact hammer and its frequency response was measured with a laser vibrometer. Damage-sensitive parameters were extracted from the frequency response and utilized for assessing damage, both qualitatively and quantitatively. Resonant frequency shifts and changes in ODS were used for detecting and monitoring the progression of damage, qualitatively. These methods make direct use of FRF data and mode shapes for damage assessment, which will help a lot in identifying damaged walls. © IAEME Publication.


Routray S.K.,CMRIT | Sharmila K.P.,CMRIT
Proceedings of the 3rd IEEE International Conference on Advances in Electrical and Electronics, Information, Communication and Bio-Informatics, AEEICB 2017 | Year: 2017

Routing in dynamically changing node location scenarios is quite challenging and time consuming. The emerging wireless communication networks such as LTE advanced and 5G, device-to-device communications present such dynamically changing node locations. In mobile ad hoc networks, very often we come across such dynamically changing node location scenarios. In the Internet of things (IoTs), we will come across many such cases where the main communicating node locations will change very much dynamically. These dynamically changing node locations bring a lot of complexities in the traffic management in the networks. In this work, we present a routing scheme based on reinforcement learning algorithm that is able to provide near optimal results under the high traffic conditions, and compare it with the shortest path algorithm in terms of the average delivery time. © 2017 IEEE.


Shivareddy D.M.,C.M.R.I.T | Ksheerasagar R.L.,C.M.R.I.T
Research Journal of Pharmaceutical, Biological and Chemical Sciences | Year: 2010

Lipases are class of Enzymes which are having wide range of Application and is having lot of commercial applications. Bacillus and pseudomonas species were isolated and isolation of these were confirmed using confirmatory test including Tributent agar test, staining and various biochemical tests. Lipase production was estimated using Lowry's method and various tests were carried out for optimization of temperature, pH, Sources for Carbon, Nitrogen and metal salts. Optimal concentration of elution buffer for separation using Ion exchange chromatography was determined and insilico analysis of enzyme was carried out using Bioinformatics tools.


Kakulapati V.,Guru Nanak Institutions | Bigul S.D.,CMRIT
Advances in Intelligent Systems and Computing | Year: 2016

Various search services quality on the Internet can be improved by personalized web search. Users face sort of dissatisfaction when the results fetched by search engines are not related to the query they have asked for. This irrelevance result is retrieved huge based on the enormous variety of consumers’ perspective and backgrounds, as well as the ambiguity of the contents. However, evidences show that the user’s private information which they search has become public due to the proliferation of Personalized Web Search. The proposed framework RPS implement re-ranking technique, which adaptively make simpler user profiles by queries while respecting the consumer particular constraints of privacy. The great challenge in personalized web search is Privacy protection. To increase the efficiency and accuracy of web search privacy we use Greedy IL algorithm, i.e. GreedyDP and GreedyIL, for runtime generalization. Experiment assessment results show that the privacy-preserving personalized framework and re-ranking approach is highly effective and accurate enough for user profiling privacy personalization on the web search. © Springer India 2016.


Desai A.,PESIT | Nagegowda K.S.,PESIT | Ninikrishna T.,CMRIT
Proceedings of IEEE International Conference on Circuit, Power and Computing Technologies, ICCPCT 2016 | Year: 2016

The world today is becoming smart in-terms of technology. Internet of Things is an enabler for smart world. However the problem with internet of Things is that they are devices which support heterogeneous methods of communication. Another problem is that the existing network is already loaded and the surge of data increase once more and more devices are connected will be enormous. In this paper we propose a framework to easily imbibe Internet of Things devices into the network with better control than the existing scenario. Also we proposed a device to solve the challenge of heterogeneous communication methods used in IoT. We also gave the sequence of steps which is the flow of data from the IoT to the remote processing device. Our future work is to provide the implementation details of the proposed device. © 2016 IEEE.


Desai A.,PESIT | Nagegowda K.S.,PESIT | Ninikrishna T.,CMRIT
Proceedings of IEEE International Conference on Circuit, Power and Computing Technologies, ICCPCT 2016 | Year: 2016

The internet is vast and growing continuously. There is a need to control the characteristics and to provide security to the network. Software defined networking (SDN) is an approach where we divide the network into control and data plane. Using SDN and Hadoop in this paper we show a method to control characteristics and provide security to the network which is helpful in capacity planning and attack detection and prevention and several ways. We discuss few clustering algorithms to increase the efficiency of the proposed system. We also show how scheduling mechanisms can be used in open flow switches. In the end we discuss the results and the effectiveness of the proposed system. © 2016 IEEE.


Mahalakshmi L.K.,CMRIT | Amarnadh Y.,Sai Adventium | Vijayalakshmi T.,Jawaharlal Nehru Technological University
Oriental Journal of Chemistry | Year: 2011

Many number of Bulk drug, and pharmaceutical, fertilizer, electroplating industries have opened since 1970's in the Patancheru Industrial Development Area of Medak District, A.P., India. Fe industries are releasing treated and few industries are releasing untreated effluents in to the nearby Nakkavagu river, which is flowing nearer to this Area. In this paper we found nearly 60 varieties of Aromatic Compounds from the samples of effluents and various ground waters etc., Water samples from Nakkavagu are also tested and found various toxic Aromatic compounds.


Shruthi M.L.J.,CMRIT | Harsha B.K.,CMRIT
2013 IEEE International Conference on Computational Intelligence and Computing Research, IEEE ICCIC 2013 | Year: 2013

Digital Image Processing is a rapidly evolving field with increasing applications in science and engineering. Image Processing has the capability of developing the ultimate device that can perform visual functions of all living beings. An application of Image processing is skin detection. Skin detection is the process of finding skin colored pixels and regions in an image. Skin color arises due to melanin and hemoglobin, but there are many other objects in the world which are easily confused with skin, certain types of wood, copper, sand as well as clothes often have skin like colors. Therefore there is a need to properly formulate the skin detector, overcoming all the difficulties that arise in detecting skin in an image. This paper presents a technique for skin detection. © 2013 IEEE.

Loading CMRIT collaborators
Loading CMRIT collaborators