JNTUACE

Anantapur, India
Anantapur, India
SEARCH FILTERS
Time filter
Source Type

Pradeep Raju B.,JNTUACE | Devanna N.,JNTUACE
International Journal of Research in Pharmaceutical Sciences | Year: 2016

An alpha Amyl Cinnamaldehyde Isonicotinoyl Hydrazone (ACINH) has been used as a newly synthesized analytical reagent for the selective spectrophotometric determination of Hg (II). In basic medium (pH-10) mercury (II) forms a yellow colored water soluble complex with Amyl Cinnamaldehyde Isonicotinoyl Hydrazone (ACINH). Maximum absorbance of complex show at λmax 391 nm. Hence, further analytical studies were carried out at λmax 391 nm. The molar absorptivity and Sandell’s sensitivity of Hg (II) was found to be 2.78x104 L.mol-1cm-1 and 0.0099 mg/cm2 respectively. The Beer’s law validity range 1.0029-10.029 mg/ml. Hg (II) forms metal ligand ratio as 1:1 complex with ACINH and complex show stability constant was 6.45x105 was obtained from job’s method. Tolerance limits of foreign ions on the determination were studied. Mercury (II) can be determined by using newly developed de-rivative spectrophotometric method. For the determination of Hg (II) in different environmental water samples the present method has been adequately employed. © JK Welfare & Pharmascope Foundation.


Bindu C.S.,JNTUACE
International Journal of Communication Networks and Information Security | Year: 2016

In mobile adhoc netwotk (MANET), a node's quality of service (QoS) trust represents how much it is reliable in quality. QoS trust of a node is computed based on its multiple quality parameters and it is an interesting and challenging area in MANETs. In this work, QoS trust is evaluated by taking into consideration quality parameters like node residual energy, bandwidth and mobility. The proposed method "Recommendations Based QoS Trust Aggregation and Routing in Mobile Adhoc Networks-QTAR" is a frame work. Where the trust is established through four phases like QoS trust computation, aggregation, propagation and routing. The Dempster Shafer Theory (DST) is used for aggregation of trust recommendations. In the network, trust information is propagated through HELLO packets. Each node stores the QoS trust information of other nodes in the form of trust matrices. We applied matrix algebra operations on trust matrices for route establishment from source to destination. The time and space complexity of proposed method is discussed theoretically. The simulation is conducted for the varying of node velocity and network size, where the proposed method shown considerable improvement over existing protocols.


Lakshmi Devi V.,JNTUA | Sujatha P.,JNTUACE | Anjaneyulu K.S.R.,JNTUACE
Souvenir of the 2015 IEEE International Advance Computing Conference, IACC 2015 | Year: 2015

The most economical operation of modern power systems is to provide the power generation optimally from different units with possible lowest cost by trying to meet all the system Constraints. This work necessitates an answer to security constrained unit commitment (SCUC) problem with an objective function incorporating equality and inequality constraints of the system. The objective of the problem will be solved using multiple optimization function. The constraints such as real power operating limits, power balance, minimum up and down time, emission, spinning reserve etc. will be subjected to project a solution to the problem by using BAT procedure. The performance of the proposed method is implemented in MATLAB working platform and the performance is evaluated with the testing system of 3-unit and 10-unit system. © 2015 IEEE.


Bindu C.,JNTUACE
International Journal of Applied Engineering Research | Year: 2015

Mobile ad-hoc network (MANET) is a decentralized and infrastructure less network where a node enter and leave a network at any moment. Quality of Service (QoS) is the level of assurance given to the user about the service provision offered by the network. Due to node mobility, limited resources of mobile nodes and broadcast nature of wireless channels, the QoS provision is not trivial in MANETs. In multicast protocols, there is considerable amount of energy loss and lack of bandwidth since group of nodes are involving in a session. While maintaining multiple QoS parameters in MANET applications, achieving balance among them is a critical issue. Some articles addressed this issue using static methods by assigning fixed weightage to each parameter. The proposed QoS trust model (Fuzzy Based QoS Trust Model for Multicast routing in MANETs-FQTM) focuses on this issue by applying fuzzy inference mechanism. QoS metrics like Energy, Bandwidth, link expiry time and reliability are considered as input variables in the fuzzy inference system to evaluate node trust value. At the time of multicast tree formation, proposed scheme ensures that each path from source to destination includes high trusted intermediate nodes. The proposed method performance is analyzed theoretically and experimentally. In simulation results, the proposed method FQTM outperforms the MAODV and PMRP multicast protocols. © Research India Publications.


Bindu C.S.,JNTUACE
Proceedings - 2014 IEEE Global Conference on Wireless Computing and Networking, GCWCN 2014 | Year: 2015

Security and Quality are the two major aspects in MANETs to be addressed. Many articles have addressed these aspects independently. Very few have concentrated on the trade off between security and quality of MANETs, but lost their performance. The proposed method WBTQ (Weightage Based Trusted QoS Protocol) focuses on both the issues in parallel, it is providing secure environment by evaluating each node's trustworthiness in the network instead of using high computational encryption algorithms without losing its performance. The WBTQ is the extension of OLSR protocol where node trust values and QoS metrics are propagated in the network through the HELLO packets. This protocol provides a flexible and feasible approach to the user in choosing a better route by giving weightage to Quality and Trust values. © 2014 IEEE.


Sreedevi Y.,JNTUACE | Reddy B.E.,JNTUACE
Advances in Intelligent Systems and Computing | Year: 2013

A Ship detection method was proposed in this paper by combining top-down recognition with bottom-up image segmentation, which will work on Synthetic Aperture Radar (SAR) images and Space-borne Optical (SO) images. There are two steps in this method: a hypothesis generation step and a verification step. In the top-down hypothesis generation step, we design an improved Shape Context feature, which is more robust to ship deformation and background clutter. The improved Shape Context is used to generate a set of hypotheses of ship locations and figure ground masks, which have high recall and low precision rate. In the verification step, we first compute a set of feasible segmentations that are consistent with top-down ship hypotheses, and then we propose a False Positive Pruning (FPP) procedure to prune out false positives. We exploit the fact that false positive regions typically do not align with any feasible image segmentation. Experiments show that this simple framework is capable of achieving both high recall and high precision with only a few positive training examples and that this method can be generalized to many ship classes. © 2013 Springer.


Prathyusha Reddi D.,PBR VITS | Giri Prasad M.N.,JNTUACE | Varadarajan S.,SVUCE
Contemporary Engineering Sciences | Year: 2013

The amount of information that is handled by computers has grown exponentially over the past decades. Hence, the storage and transmission of the digital image component of Multimedia systems is a major problem. The amount of data required to present images at an acceptable level of quality is extremely large. High quality image data requires large amounts of storage space and transmission bandwidth, something which the current technology is unable to handle technically and economically. The success of wavelet techniques in many fields of signal and image processing was proved to be highly influenced by the properties of wavelet transforms used, mainly the shift invariance and the directional selectivity. Unfortunately, the 2D discrete wavelet transform is shiftvariant and has a reduced directional selectivity. These disadvantages can be overcome if a complex wavelet transform is used. The Hyperanalytic Wavelet Transform (HWT) is quasi shift-invariant, it has a good directional selectivity, and a reduced degree of redundancy. The present work discusses the efficacy of HWT and how the properties of HWT are used for image compression. The results obtained are compared with DWT. Appreciable increase in PSNR along with compression ratio is obtained.


Bindu C.S.,JNTUACE
Proceedings - 2015 21st Annual International Conference on Advanced Computing and Communications, ADCOM 2015 | Year: 2015

In Mobile ad-hoc networks (MANET), QoS protocols includes the intermediate nodes which have sufficient resources along the route, from source to destination. Nodes may turn non cooperative when they are running with shortage of resources, which weakens the effectiveness of the protocol. The proposed model (Uncertain Rule-based Fuzzy Logic QoS Trust Model in MANETs -FQTM) selects the nodes which are capable and cooperative. Node capability is evaluated through the QoS parameters (like energy, bandwidth, link stability) and cooperativeness is measured in terms of reliability. Fuzzy logic is applied to compute the node trust value by considering its quality and reliability metrics. FQTM selects the nodes with higher trust values to construct route from source to destination. The performance of proposed method is presented theoretically (time and space complexities) and experimentally. © 2015 IEEE.


Ganesh V.,JNTUACE | Vasu K.,MITS
1st International Conference on Automation, Control, Energy and Systems - 2014, ACES 2014 | Year: 2014

In this paper, the impact of models of voltage dependent loads have been discussed for the analysis of URDS (Unbalanced Radial Distribution Systems) for the future expansion of electrical distribution network. Load growth need to consider for better operation of the distribution system. Minimum voltage, system real and reactive power losses, number of iterations and CPU time are calculated with different load models including the load growth. The load flow analysis has been carried out using forward/backward sweep method. The results are validated for IEEE 19 and 25 bus URDS. © 2014 IEEE.


This paper introduced on advancing the wire electrical discharge machine (WEDM) process parameters for the normal surface roughness (Ra) acquired in machining of VANADIS 4e (Powder metallurgical cold worked Tool steel). The Machining analyses were performed at WEDM machine utilizing 0.25 mm wire as electrode material on p/m cold worked tool steel. Taguchi L27orthogonal array (OA) was utilized to outline of trial. Ideal methodology parameters were resolved utilizing the signal-to-noice (S/N) proportion which was computed for Ra as per "the-smaller-the-better" approach. The methodology parameters of WEDM procedure were pulse on time (ON), pulse off time (OFF), servo voltage (SV), peak current (IP), wire tension (WT) and water pressure (WP). The impacts of the methodology parameters on surface roughness were assessed by the examination of change (ANOVA). The most essential associations, that impact surface roughness of machined surfaces, are between the pulse on time (ON) and pulse on time(ON), pulse off time(OFF) and Peak current(IP), and between pulse on time(on) and Peak current(IP). The ideal estimation of surface roughness is anticipated at the ideal levels of noteworthy as Pulse on time (A1), pulse off time (B3), peak current (C3) and spark gap set voltage (D1) and wire tension (E3). © 2014 The Authors.

Loading JNTUACE collaborators
Loading JNTUACE collaborators