GNITS

Hyderabad andhra pradesh, India
Hyderabad andhra pradesh, India
SEARCH FILTERS
Time filter
Source Type

Swamy S.M.,GNITS | Panndurangadu V.,JNTUA | Shamkumar J.M.,Airframe Aerospace Designs Pvt. Ltd.
International Journal of Mechanical Engineering and Technology | Year: 2017

Tip clearance effects on flow field of a low speed centrifugal compressor without and with partial shroud (PS) attached to the rotor blade tip at three values of tip clearance, viz. φ =2.2%, 5.1% and 7.9% of rotor blade height at the exit at three flow coefficients, namely, φ=0.12,0.18 (below design flow coefficient), φ=0.28 (design flow coefficient) and φ=0.34 (above design flow coefficient), is analysed computationally using structured multi block grid with fine grid in the tip clearance region. The paper aims to study several flow characteristics between blade channels using commercial flow solver ANSYS CFX 15.0 based on finite volume techniques. The centrifugal compressor in aerodynamic requirement is that edge velocities along the impeller channel passage surfaces like hub, shroud, pressure and suction surfaces vary smoothly without sudden decelerations, which cause flow separation leading to losses. Using the periodic boundaries and defined flow conditions at inflow / exit flow and blade rotations, the turbulent viscous flow between blade channels are computed. The efficiency related parameters using average quantities, besides flow pattern in terms of velocities, streamlines and pressure distribution on blade surfaces are graphically interpreted. An attempt is also made to study the influence of pressure loads on structural deformations in the chosen blade profile. This paper highlights aero-mechanical features of centrifugal impeller obtained from several numerical simulations, which are expected to provide a sound basis for further investigations. © IAEME Publication.


Sreesudha P.,GNITS
Proceedings - 7th IEEE International Advanced Computing Conference, IACC 2017 | Year: 2017

Code Division Multiple Access (CDMA) is one of the channelization protocol. CDMA provides some sort of privacy and only intended receiver can able to receive data. Multi-Carrier CDMA (MC-CDMA) is one of the promising technologies in present and future wireless communications and one of the 4G component. The performance of CDMA system depends on the characteristics of spreading sequence. The spreading sequences must be unique and have better auto correlation and cross correlation values. Otherwise Multiple Access Interference (MAI) arises that limits the system capacity. In this paper MC-CDMA system is implemented with maximal-length, gold and ZCZ (Zero Correlation Zone) sequences [4]. Multiple input-multiple output (MIMO) technology provides high transmission rate, reliability and diversity for communication systems. In this paper MC-CDMA system is implemented with 4 transmitting and 4 receiving antennas (4x4). BER (Bit Error Rate) performance is measured with three sequences in AWGN, Rayleigh fading channel. And simulated results are shown. © 2017 IEEE.


Naveena A.,GNITS | Reddy K.R.L.,HOD
Proceedings - 7th IEEE International Advanced Computing Conference, IACC 2017 | Year: 2017

Low-power Ad Hoc systems are the most challenging aspect for secured Ad Hoc systems. The resource constrained devices were easily tampered due to the limited operated environment. Over the past decade, the usage rate of Ad Hoc systems are rapidly increased in modern communication systems. However, the security is still a research factor for Lowpower Ad Hoc systems. Offering Security and Anonymity is an important research issue in Low-power Mobile Ad Hoc Networks (LPMANET). Various anonymous routing protocols presented to maintain anonymity in adverse environment, these protocols proven significant results in Ad Hoc systems but failure to improved the anonymity efficiency in Low-power Ad hoc networks. In this paper, a Lightweight Energy Efficient Anonymous Routing (LEEAR) protocol is proposed to offer energy efficient anonymity and security in an adverse environment by combining modified zero knowledge proof, bloom filter and cryptography techniques. We designed the LEEAR protocol to determine the efficiency in-Terms security and energy against routing level and traffic level attacks. We simulated the experiment in NS2 simulator the determine the results and ensure importance of the proposed LEEAR protocol in accomplishing energy efficiency and anonymity. © 2017 IEEE.


Vippalapalli V.,GNITS | Ananthula S.,GNITS
International Conference on Signal Processing, Communication, Power and Embedded System, SCOPES 2016 - Proceedings | Year: 2017

A BSN (Body Sensor Network) is a network designed to operate autonomously to connect the various medical sensors and implants located inside and/or outside of the human body; which offers flexible operation and cost saving options to both healthcare professionals and patients. This work illustrates the design and implementation of a smart health monitoring system. Here, a patient can be monitored using a collection of lightweight wearable sensor nodes for real time sensing and analysis of various vital parameters of patients. The devices seamlessly gather and share the information with each other and also store the information, making it possible to collect record and analyze data. Therefore, patients will have high quality services because the system supports medical staff by providing the real-time data gathering, by eliminating the manual data collection and by enabling the monitoring of huge numbers of patients. © 2016 IEEE.


Papanna N.,Sri Venkateswara University | Seetha M.,GNITS
Advances in Intelligent Systems and Computing | Year: 2017

The networks formed by the self-energized nodes that loosely coupled with no or fewer infrastructure and without a central monitoring system is said to be ad hoc networks and if mobility is the property of these nodes then that networks are referred as mobile ad hoc networks. The nodes in these networks are having limited range to couple with other nodes. Hence in order to transmit data, they establish a route between source and destination nodes through hop level nodes. The critical point of the route establishment is selection of optimal neighbor nodes in the context of Quality of Service. This is much critical if data to be transferred to multiple destinations, which can be referred as multicast routing. In order to optimize the process of neighbor node selection in multicast route establishment, here in this article we proposed an energy efficient multicast routing topology, which is based on Exploratory Assessment based Child Nodes Selection (EACNS). EACNS is a Tree-based multicast routing topology for mobile ad hoc networks distinguishing from others in its class by the defining an exploratory scale to assess the optimal child nodes towards minimal energy usage and maximal network life. The objective the model is to be loosely coupled route selection strategy to any of the benchmarking tree based multicast routing protocols explored in literature. The strategy that used to select tree based multicast route is an explorative scale that defined based on three metrics coined in this paper, which are called energy consumption ratio, reserve battery life and multicast scope. The experimental results concluding that the proposed topology is the best of in its class to minimize the energy usage and maximize the network life. © Springer Nature Singapore Pte Ltd. 2017.


Kashappa N.,GND Engineering College | Ramesh Reddy K.,GNITS
Research Journal of Applied Sciences, Engineering and Technology | Year: 2011

This study deals with comparison of 3-level inverter- fed induction motor drive with 9-level inverterfed induction motor drive. A conventional Voltage Source Inverter (VSI) fed induction motor drive is modelled and simulated using matlab simulink and the results are presented. 9-level inverter is also simulated and the corresponding results are presented. The FFT spectrums for the outputs are analyzed to study the reduction in the harmonics. © Maxwell Scientific Organization, 2011.


Sindhuja G.,GNITS | Renuka Devi S.M.,GNITS
2015 Conference on Power, Control, Communication and Computational Technologies for Sustainable Growth, PCCCTSG 2015 | Year: 2015

Object tracking is a exploring field having a broad collection of applications in actual world. The major steps for tracking a target object include detection of interested moving objects and tracking of such objects from frame to frame in a video. Mean shift based object tracking has received much importance because of its assets such as real time, robust and easy to implement. Advanced versions of this algorithm are developed which differ in template updating for representing target objects in different video sequence. This paper performs comparative analysis of basic mean shift algorithm with two enhanced versions of mean shift i.e., BWH and CBWH. The experimental results on bench mark databases show that CBWH target representation leads to faster convergence and more proper localization than other target representations. © 2015 IEEE.


Saraswathi T.,GNITS | Ragini K.,GNITS | Ganapathy Reddy Ch.,GNITS
ICECT 2011 - 2011 3rd International Conference on Electronics Computer Technology | Year: 2011

A new low transition test pattern generator using a linear feedback shift register (LFSR) called LT-LFSR reduce the average and peak power of a circuit during test by generating three intermediate patterns between the random patterns. The goal of having intermediate patterns is to reduce the transitional activities of Primary Inputs (PI) which eventually reduces the switching activities inside the Circuit under Test (CUT) and hence, power consumption. The random nature of the test patterns is kept intact. The area overhead of the additional components to the LFSR is negligible compared to the large circuit sizes. The experimental results for ISCAS'85 and '89 benchmarks, confirm up to 77% and 49% reduction in average and peak power, respectively. © 2011 IEEE.


Bhargavi V.S.,GNITS | Raju S.V.,Jawaharlal Nehru Technological University Anantapur
Proceedings of the 2016 IEEE International Conference on Wireless Communications, Signal Processing and Networking, WiSPNET 2016 | Year: 2016

A Mobile ad Hoc Network is a collection of nodes which is an infrastructure less network and hence can be easily established and deployed instantly. In addition to their normal operation, all the nodes in this kind of network act as routers as well. Because of the mobility and dynamic nature of the network, all the nodes are free to move randomly and hence topology of a MANET changes very frequently. This invites the complexity of routing the packets from source to destination. Also, as a MANET is a multi-hop network, the packets should pass through intermediate nodes which always need not be genuine all the time which poses many security issues in MANET's. Our paper discusses a secure routing protocol which is a trust based secure routing scheme that considers information collected from neighbouring nodes. Based on the trust information received about a node from its neighbouring nodes and its past history of transactions, we assign a trust value for every node in the network. If this value is less than a specific threshold set by the coordinator nodes, that specific node can be considered as a malicious node and hence routing paths should not involve such nodes, which guarantees secure path routing. This protocol has been implemented on NS-2 and results show that this protocol achieved better performance in terms of the packet delivery ratio and throughput when compared to existing routing schemes in literature. © 2016 IEEE.


Hegde G.P.,SDMIT | Seetha M.,GNITS
Advances in Intelligent Systems and Computing | Year: 2015

Face recognition is one of the widely used research topic in biometric fields and it is rigorously studied. Recognizing faces under varying facial expressions is still a very challenging task because adjoining of real time expression in a person face causes a wide range of difficulties in recognition systems. Moreover facial expression is a way of nonverbal communication. Facial expression will reveal the sensation or passion of a person and also it can be used to reveal someone’s mental views and psychosomatic aspects. Subspace analysis are the most vital techniques which are used to find the basis vectors that optimally cluster the projected data according to their class labels. Subspace is a subset of a larger space, which contains the properties of the larger space. The key contribution of this article is, we have developed and analyzed the 2 state of the art subspace approaches for recognizing faces under varying facial expressions using a common set of train and test images. This evaluation gives us the exact face recognition rates of the 2 systems under varying facial expressions. This exhaustive analysis would be a great asset for researchers working world-wide on face recognition under varying facial expressions. The train and test images are considered from standard public face databases ATT, and JAFFE. © Springer International Publishing Switzerland 2015.

Loading GNITS collaborators
Loading GNITS collaborators