Hyderabad, India

CVR College of Engineering

www.cvr.ac.in
Hyderabad, India

The CVR College of Engineering was established in 2001. It is approved by the All India Council for Technical Education and accredited by the National Board of Accreditation, India.CVR College of Engineering is affiliated with the Jawaharlal Nehru Technological University, Hyderabad. The college is located in Mangalpalli, Ibrahimpatan, Ranga Reddy, 20 km from the centre of Hyderabad, India. The college is supported by the Cherabuddi Educational Society.It was ranked 23rd among the engineering colleges of Telangana in a survey conducted by the Sakshi newspaper. CVR has become the youngest college to get the JNTU Hyderabad "Autonomous" status for 3 years. No other college in the JNTUH system got the autonomous status for three years at the age of ten years. Wikipedia.

SEARCH FILTERS
Time filter
Source Type

Reddy G.R.S.,CVR College of Engineering | Rao R.,Jawaharlal Nehru Technological University
Journal of Electronic Science and Technology | Year: 2017

We presented a novel Fourier-Bessel (FB) series and Wigner-Hough transform (WHT) method for the analysis of multi-component non-stationary signals. The FB series decomposed multi-component non-stationary signals into mono-component signals. The Wigner-Ville distribution (WVD) was applied to each mono-component signal to analyze its time-frequency distribution (TFD). Summing up the WVDs of the individual components resulted in TFDs of the multi-component signals, where the cross terms and noise were significantly reduced. The Hough transform (HT) was applied on the TFD of the multi-component signal (obtained from FB-WVD). The HT provides an important tool for mapping the signals onto a parameter space where the detection and estimation problems are made easier. This mapping can be used in the detection and parameter estimation of signals which are unknown and embedded in noise.


Akshay N.,CVR College of Engineering | Kumar M.P.,CVR College of Engineering | Harish B.,CVR College of Engineering | Dhanorkar S.,Auroras Technological and Research Institute
International Conference on "Emerging Trends in Robotics and Communication Technologies", INTERACT-2010 | Year: 2010

In wireless sensor networks, the number of sensor nodes has direct relation to the cost of total wireless sensor networks, and at the same time, the problem is closely connected to wireless sensor networks' performance, such as robust, faulttolerance, and furthermore, it is considered at first as wireless sensor networks are designed. Therefore, the research on the number of sensor nodes has significant meanings of theory and practice to design of wireless sensor networks. By computation and analysis, the sensor deployments in the form of equilateral triangle, as a rule, are better than those in the form of square, and the efficient coverage area ratios decrease with increasing number of sensor nodes.Sometime information is incompletely monitored or undetected. This is coverage and connectivity problems. The coverage problem is also one of basic problem in wireless sensor networks. The paper analyzes several sensor deployments and computes their efficient coverage areas and their efficient coverage area ratios. In addition, the relation between the number of sensors and efficient coverage area ratio is discussed. © 2010 IEEE.


Mahapatra R.,CVR College of Engineering
2016 IEEE Annual India Conference, INDICON 2016 | Year: 2016

Cognitive radio (CR) technologies provide the required infrastructure to achieve dynamic spectrum access (DSA) which is a promising approach to increase spectral utilization in next generation (xG) wireless network. DSA allows CR to operate on the best available channel. This paper focuses on spectrum management in next generation wireless networks that employ DSA. In particular, this paper presents the framework for spectrum management in xG network which is composed of xG components, i.e., xG base station, CR enable xG user and a spectrum broker. In our model, spectrum broker has been considered as a central entity, which controls and provides time-bounded access to a un-utilized spectrum band to xG user and helps to implement the spectrum management, billing and policing. In this paper, we also present the signaling information exchanges between spectrum broker and various other entities of xG network. © 2016 IEEE.


Kumar T.P.,Sreenidhi Institute of Science and Technology | Venkateshwarlu S.,CVR College of Engineering
Proceedings of 2017 11th International Conference on Intelligent Systems and Control, ISCO 2017 | Year: 2017

Advancement in technology and rapid industrialization towards extensive use of power electronic controlled devices and enormous growth towards agriculture sector in rural areas of electrical distribution system resulted in substantial increase of power quality issues as well as reactive power requirement. Voltage drop in the system due to huge active and reactive power requirements of the loads can be minimized by distributed generation. Towards this end renewable energy source Viz., Solar Photovoltaic power generation and mitigating the power quality issues at load end can be resolved by using shunt connected custom power device DSTATCOM. In this paper the performance of PV interfaced Power Balance Theory (PBT) based DSTATCOM (Distribution Static Compensator) using Adaptive Fuzzy logic PI controller and conventional PI controller for real and reactive power control is investigated using Simpowersystem block set of MATLAB. The simulation results proves that adaptive fuzzy logic PI controller provides better system response, control of real and reactive power and improvement in THD of source current over PI controller. © 2017 IEEE.


Vikranth B.,CVR College of Engineering | Wankar R.,University of Hyderabad
Procedia Computer Science | Year: 2013

"The On Chip NUMA Architectures (OCNA) introduce a new challenge namely memory-latency to the scheduling methods. The language run-times and libraries try to explore the processing power of these multiple cores by mapping the user-created tasks on to these cores by using suitable scheduling algorithms with load balancing support to improve throughput. The popular load balancing techniques used are work-sharing and work-stealing and many run-time systems such as Cilk, TBB and wool implement task stealing algorithm to schedule the tasks on to the cores by multiplexing the program generated tasks on to the native worker threads supported by the operating system. But the task stealing strategy applied in present run-time systems assumes the sharing the last level cache (LLC) and common shared bus among all cores on Chip Multi Processor. It tries to optimize the utilization without considering the presence of multiple On Die DRAM controllers and their topological arrangements. Current task stealing technique also suffers from problem of randomly choosing the victim worker queue. In this paper we address these issues and propose a solution for these problems by suggesting few optimizations. Our proposed task stealing strategy dynamically analyzes the topology of the underlying hardware connections and models the group of cores and connections as a logical topology tree. This logical tree is translated into multiple worker pools called stealing domains. By restricting the task stealing within these domains, this strategy is implemented and shows an average of 1.24 times better performance on NAS Parallel Benchmark programs compared to popular runtimes Cilk and OpenMP. © 2013 The Authors. Published by Elsevier B.V.


Rao P.V.B.,CVR College of Engineering | Sankaram T.B.,Osmania University
Journal of Electroceramics | Year: 2010

Lead free Potassium bismuth Titanate K0.5Bi 0.5TiO3 (KBT) was prepared by high temperature solid state reaction method in a closed crucible with excess KBT powder around the samples. A room temperature study of XRD confirms, single phase formation with tetragonal structure .Grain and grain boundary conduction is observed from complex impedance spectrum at high temperatures (425°C) by the appearance of two semicircular arcs. The Cole-Cole plots of impedance spectrum consisted of a Circular arc followed by a semicircular spur indicate that the dielectric phenomenon of KBT is due to conductive grain boundaries. The temperature variation of grain resistance and grain boundary resistance is observed with the activation energies. The presence of non-Debye type multiple relaxations has been confirmed by complex modulus analysis. The dielectric data obtained from impedance measurements, indicates broad dielectric peaks around 380°C. The ferroelectric nature confirmed from hysteresis plot. The DC Conductivity results indicate activation energy 0.54 eV below 400°C and 0.85 eV above 400°C. The AC conductivity values and electric modulus values are computed from the impedance data. The activation energies of AC conductivity have observed to decrease with decrease in frequencies. © 2009 Springer Science+Business Media, LLC.


Rao N.V.,CVR College of Engineering | Kumari V.M.,Defense Metallurgical Research Laboratory
Information Security Journal | Year: 2011

Medical image watermarking has been widely recognized as a relevant technique for enhancing data security, image fidelity, authenticity and content verification in the current e-health environment where medical images are stored, retrieved and transmitted over networks. Medical image watermarking preserves image quality that is mandatory for medical diagnosis and treatment. The present paper highlights essential needs of medical image watermarking with a review of developments since 2000 and simulated experiments to demonstrate the significance of watermarking in medical information management. © Taylor & Francis Group, LLC.


Ramisetti S.,CVR College of Engineering | Wankar R.,University of Hyderabad
Proceedings - 2011 2nd International Conference on Intelligent Systems, Modelling and Simulation, ISMS 2011 | Year: 2011

This paper discusses the Design and Implementation of Hierarchical Thread Pool Executor (HTPE) using the non blocking queues. This work enhances the performances of the Distributed Shared Memory (DSM) Programming. Few Java based DSMs make use of the concurrent utilities of Java that support the thread pool executor with blocking queues (i.e. Jackal). The study of the new proposed algorithm is done in a simulated environment which demonstrates that if the non-blocking queues are used, their performance improve significantly. The Hierarchical Thread Pool Executor using the non blocking queue has been simulated on the cluster environment using MinHeap tree data structure. © 2011 IEEE.


Vathsala A.V.,CVR College of Engineering
2012 1st International Conference on Recent Advances in Information Technology, RAIT-2012 | Year: 2012

Web Services are built on service-oriented architecture which is based on the notion of building applications by discovering and orchestrating services available on the web. In order to make an orchestrated web service, which is a composition of two or more services, resilient to transient faults, we investigate in this paper the idea of applying checkpointing to web services. We propose a checkpointing policy for generating global checkpoints in an orchestrated web service so that even in case of failure, the composite service can be recovered back to its latest global checkpoint reducing the delay in giving response. We also propose a method for specifying valid set of global checkpoints against which the actual set of global checkpoints generated at run time can be verified for correctness. © 2012 IEEE.


Jayasingh B.B.,CVR College of Engineering
Proceedings - 6th International Advanced Computing Conference, IACC 2016 | Year: 2016

Inquiry based Inductive learning methodology is one of the best technique especially for the engineering students who are expected to solve real world problems. But it is very difficult to standardize a particular learning methodology for an institution with diverse attitude, diverse characteristics, diverse languages, diverse financial back grounds, and diverse cultural scenario with variable educational standard of the students. As the teaching methodology depends on the content and time as well as learners' varied style of learning, the same learner may prefer inductive teaching for one topic and deductive approach for the other topic. This paper initiates a sample study that is taken for a particular institution, in the particular environment, for the particular batch and particular set of students. The sample data are collected from a classroom by distributing the questionnaire attempted by two different batches of student having questions pertaining to Inquiry based and deductive learning. The system is developed and tested twice after teaching the content using inductive method and implemented using attribute relevance, discriminant rules of class discrimination mining. The results are visualized through bar charts and shows that the two batches of learners of different years have different learning characteristics. © 2016 IEEE.

Loading CVR College of Engineering collaborators
Loading CVR College of Engineering collaborators