Bangalore, India
Bangalore, India
Time filter
Source Type

Anandkumar C.P.,DSCE | Prasad A.M.,DSCE | Suma V.,RIIC
Advances in Intelligent Systems and Computing | Year: 2017

Existing multipath routing methods in a Wireless Sensor Networks (WSNs) have presented the effective distribution of traffic over multipath to accomplish required quality of service (QOS). But, failure of the any link in WSN affects the data transmission performance, security of data, scalability and reliability of WSN. Hence, by considering the reliability, scalability, security and congestion for the multipath in a wireless sensor network, it is necessary to design and develop a service focused multi path routing scheme which should provide high failure tolerance and effective routing scheme. This paper put forth a Secure Multipath AODV (SMAODV) protocol in which RSA algorithm is used for secure data transmission and path vacant ratio is calculated to discover the link disjoint path to destination sensor node from source sensor node from all presented paths in a network. Load balancing metrics and technique like detection of congestion, congestion notification and congestion control is used to fine tune and balance the load over multi paths. Split the data packets into multiple fragments and sent it to the destination node through multipath based on the path vacant ratio. © Springer Nature Singapore Pte Ltd. 2017.

Rashinkar P.,MECS | Krushnasamy V.S.,DSCE
IEEE International Conference on Innovative Mechanisms for Industry Applications, ICIMIA 2017 - Proceedings | Year: 2017

Multi sensor data fusion is a tool used to combine the data from various sensors and gives a more reliable and accurate output. It is the integration of data and knowledge from several sources. This paper has reviewed the various technologies, the advantages and the classification of the data fusion. © 2017 IEEE.

Joshi V.,DSCE | Manikandan S.,Science D | Srinivasaiah H.C.,DSCE
IEEE International Conference on Innovative Mechanisms for Industry Applications, ICIMIA 2017 - Proceedings | Year: 2017

Synthetic Aperture RADAR (SAR) is a type of imaging radar in which the relative motion of the antenna and target is the key. SAR is a well established imaging technology that has become critical for remote sensing and observation applications. SAR exploits the motion of a moving platform, such as a plane or a satellite, to create a 'synthetic' aperture much larger than the real aperture of the antenna carried by the moving platform. This allows SAR systems to image very large land swaths with extremely high precision. All standard SAR raw data processing techniques assume a uniform linear motion of the aircraft and a fixed antenna beam pointing. © 2017 IEEE.

Kumari A.,DSCE | Deepshikha,DSCE | Satish B.A.,DSCE
IEEE International Conference on Innovative Mechanisms for Industry Applications, ICIMIA 2017 - Proceedings | Year: 2017

The number of vehicles as well as the population of pedestrians have both increased considerably over the years. The traffic signals which are meant to regulate the traffic are often configured with only the traffic flow as the main point of design, but the number of pedestrians crossing at given a point of time is not considered, which often leads to accidents in turn causing loss of life and infrastructure. The paper proposes a system which aims to achieve optimal control of traffic signals benefiting both the pedestrians and the traffic flow, by ensuring that the traffic is stopped only in the presence of pedestrians and is made to stop optimally just for the period of time as required for the number of pedestrians. The system will help in a smooth flow of traffic as well as create safe crossing periods for the pedestrians. © 2017 IEEE.

Vijayalaxmi S.W.,DSCE | Sreenivasan A.,DSCE
IEEE International Conference on Innovative Mechanisms for Industry Applications, ICIMIA 2017 - Proceedings | Year: 2017

A simple microstrip patch antenna consists of metallic patch and ground between a dielectric medium called the substrate. Microstrip patch antennas are widely used in communication, especially in military and civil applications. The printed antennas have played a major role in development of antenna at different frequency. The proposed antenna is done on fr4 (frame sensitive) substrate with dielectric permittivity £ o and the thickness 'h' will provide with good omnidirectional radiation pattern. It has a advantages in simple design, Compact in size and easy in fabrication. Design and simulation of patch antenna using HFSS Software. Design of a circular micro-strip patch antenna for 2.4 GHz application and study s-parameter, Gain and field animations. © 2017 IEEE.

Santhosh B.,DSCE | Meghana N.M.,DSCE
Advances in Intelligent Systems and Computing | Year: 2016

With tremendously increasing demand for multimedia communication, it is essential to safeguard the video data from various attacks during its transmission over internet. Video encryption ensures privacy and security of the video content. For the purpose of authentication or to identify tampering if any, secret information is concealed in these encrypted videos. This paper puts forward an efficient and robust methodology for embedding the secret information directly into encrypted videos, which guarantees the confidentiality of the video content. The input video is first compressed using the popular H.264/AVC compression technique and by analyzing the properties of H.264 encoding technique, the three portions containing the sensitive data are encrypted. A standard RC4 stream cipher has been employed for encrypting the codewords of Motion vector differences, Intra prediction modes and Residual coefficients. The secret data can then be hidden by the data hider using a unique Codeword substitution technique without being aware of the video contents. Thus the technique ensures confidentiality of the video content. The hidden data can then be directly extracted by the intended authenticated receiver even without decrypting the video sequence. To validate the feasibility and the performance of the proposed work, the result metrics PSNR, SSIM and VQM have been estimated. © Springer India 2016.

Jamuna S.,DSCE | Agrawal V.K.,CORI
2012 International Conference on Devices, Circuits and Systems, ICDCS 2012 | Year: 2012

Today Field Programmable Gate Arrays (FPGAs) are widely used in many applications. These FPGAs are prone to different types of faults similar to other complicated integrated circuit chips. Faults may occur due to many reasons like environmental conditions or aging of the device. The rate of occurrence of permanent faults can be quite high in emerging technologies, and hence there is a need for periodic testing of such FPGAs. The Configurable Logic Blocks (CLBs) are the main logic resources for implementing sequential as well as combinatorial circuits. Built-in self-test (BIST) is a design technique that allows a circuit to test itself. It is a set of structured-test techniques for combinational and sequential logic, memories, multipliers and other embedded logic blocks. BIST controller coordinates the operations of different blocks of the BIST. BIST controller is designed to work in different modes. Here, we introduce a new approach for FPGA testing that exploits the reprogramability of an FPGA to create the BIST logic by configuring it only during off-line testing. In this way, testability is achieved without any overhead, since the BIST logic "disappears" when the circuit is reconfigured for its normal system operation. We are implementing a restartable logic BIST controller for the configurable logic blocks in Virtex-5 FPGAs by using the resources of FPGA itself. We have used XILINX ISE12.1 for simulation and synthesis. © 2012 IEEE.

Siddappaji,BMS College of Engineering | Sudha K.L.,DSCE
Proceedings - 2015 International Conference on Communication, Information and Computing Technology, ICCICT 2015 | Year: 2015

This paper compares the performance analysis of our proposed New Time Varying LMS (NTVLMS) algorithm with other well-known adaptive algorithms such as LMS, NLMS, RVSSLMS, NVSSLMS and TVLMS algorithm. These algorithms have been tested for their adaptive noise cancellation capabilities in the context of stationary signal corrupted by additive white Gaussian noise. The parameters Convergence rate, output SNR are used to analyse the performance. The computer simulation results show that the performance of proposed NTVLMS algorithm is better compared to the other algorithms. © 2015 IEEE.

Savitha S.K.,Visvesvaraya Technological University | Naveen N.C.,DSCE
Proceedings of the 2016 IEEE International Conference on Wireless Communications, Signal Processing and Networking, WiSPNET 2016 | Year: 2016

Accuracy in diagnostics of life-threatening disease based on chest x-ray images is an atmost importance in healthcare sector, where medical image processing has already played a contributory role from more than a decade. In this regards, image enhancement plays a critical role in exposing more information to the foreground image of clinical importance. We have reviewed the most existing system pertaining to chest image enhancement and found that more enhancements could be done to enhance the signal quality. Therefore, we present a sophisticated algorithm that performs multiple operations for enhancing the chest x-rays. The proposed paper introduces techniques for enhancing chest x-rays using non-linear enhancement, primary enhancement, secondary enhancement algorithms on JSRT database. The proposed system shows better quality of enhanced region in comparison to the most frequently adopted techniques for medical image enhancement. © 2016 IEEE.

Christa S.,DSCE | Suma V.,DSCE
ACM International Conference Proceeding Series | Year: 2016

Software even though intangible should undergo evolution to fit into the ever changing real world scenarios. In this context software maintenance is an inevitable activity; further optimizing the activities related to maintenance is not possible due to the lacuna in various aspects of the pre-production phases. Since 1969, the issues raised by Lehman related to software maintenance remain the same. Each issue faced by the maintenance team directly reflects in the quality of the software product. According to the related work, very few research is going on in the field of software maintenance and still scarce when it comes to research on incident and associated ticket; a part of corrective maintenance. In depth research on incident tickets should be viewed as critical since, it provides information related to the kind of maintenance activities that is performed in any timestamp. Therefore classifying and analyzing tickets becomes a critical task in managing the operations of the service since each incident will be having a service level agreement associated with it. Further, incident analysis is essential to identify the patterns associated. Due to the existence of huge population of software in each organization and millions of incidents get reported per software product every year, it is practically impossible to manually analyze all the tickets. This paper focuses on projecting the importance of ticket analytics to maintain the quality of software products and also identifying the incidents and related tickets based on various factors which are supported by a case study from the data collected from various organizations. © 2016 ACM.

Loading DSCE collaborators
Loading DSCE collaborators