JNTUCEH

Hyderabad, India
Hyderabad, India
SEARCH FILTERS
Time filter
Source Type

Rajesh,JNTUCEH | Raju B.L.,ACE Engg College | Reddy K.C.K.,JNTUCEH
2016 IEEE International Conference on Recent Trends in Electronics, Information and Communication Technology, RTEICT 2016 - Proceedings | Year: 2016

As Design Complexity is growing and Size of the individual components i.e mosfets shrinks, it led to the need for increased clock speeds, to do faster computation and propagate the clock to different subsystems of the chip. The clock to be routed must be free from clock skew and jitter. The alternate method for reducing power requirement is use of multi-Vdd i.e more than one supply voltage depending on the requirement ,without reducing the speed in an system on chip. For this, Level Converters are required. Level converters based on Multi-Vdd are proposed in this paper. The proposed level converters are compared with the existing standard level converters. Compared to the Existing Level Converters, the proposed level converters offers significant power saving and increased speed. In this paper ,180nm MOSFETs are used. For high performance and Low power design, different types of level converters are analyzed using Cadence Tools. © 2016 IEEE.


Rajesh,JNTUCEH | Raju B.L.,ACE Engg College | Reddy K.C.K.,JNTUCEH
2016 IEEE International Conference on Recent Trends in Electronics, Information and Communication Technology, RTEICT 2016 - Proceedings | Year: 2016

As Integrated Circuits are more complex, the need of supplying accurate and synchronized clocks to all the circuits becomes increasingly difficult. In some cases, more than one clock cycle is required to perform a predictable action. Clock Circuits are responsible for proportionate fraction of the power dissipation of a chip and are important in terms of performance. In integrated circuit, multiple supply voltages are utilized for reducing the power consumption by a sub- circuit. A sub circuit supply voltage is used to generate an output signal at a Lower Supply Voltage for another sub circuit and is generated from a higher supply voltage, and this achieves reduction of the power consumption by the sub circuit. Since an output signal generated by the sub circuit is a lower voltage signal, at the front stage of an output circuit, a level conversion circuit transform the level of this signal into a signal for the higher external supply voltage and Vice versa . In this paper for high performance and Low power design, two different types of level converters are proposed and the effect of temperature on process parameters is analyzed using Cadence Tools. © 2016 IEEE.


Rama Devi R.S.,JNTUCEH | Poshal G.,NTUCEH | Eshwara Prasad K.,RIET | Raman Goud R.,RIET
Materials Today: Proceedings | Year: 2017

The effect of Mechanical Properties on rolling direction in nickel free nitrogen austenite stainless steel with 0.467% nitrogen content are investigated. The tensile deformation in rolling direction and perpendicular to the rolling directionswere performed at room temperature and their flow behaviour is modelled by three equations like Holloman, ludwik and ludwigson. The microstructure and fractography were analyzed with SEM. © 2017 Elsevier Ltd.


Prashanth Reddy K.,GRIET | Panitapu B.,JNTUCEH
Materials Today: Proceedings | Year: 2017

Decreasing the time of cooling phase in injection Moulding is of paramount importance in shortening the cycle time. Cooling phase takes more time when compared to other phases and is only stage which has scope of reducing cycle time and increasing production rate further. The given amount of heat energy that should be removed from melt is almost same in every cycle. The time taken to remove that heat energy is purely dependent on properties of materials across which the heat is being transferred from melt to coolant. This heat transfer generally occurs in convection-conduction-convection mode. In this paper Mould inserts across which heat is being dissipated, made of different materials are implemented and investigated in an injection Mould for a cosmetic product cap manufacture. Quality parameters like volumetric shrinkage and warpage are also observed along with time taken to reach ejection temperature. MoldFlow analysis tool is used to carry out the simulations with different Mould insert materials,The simulated results are found to be in good agreement with experimental values.The experimental work has been carried out at vasantha tool crafts pvt limited. However manufacturing of Mould inserts with desired materials may be expensive, implementing this for mass (large quantity) production orders in multi cavity Moulds turn out to be economical or profitable as the production rate increases without compromising in quality. © 2017 Elsevier Ltd. All rights reserved.


Padmaja Rani B.,JNTUCEH
Advances in Intelligent Systems and Computing | Year: 2017

Cloud computing technology present days fulfills the infrastructural needs of small and medium enterprises without creating additional load of initial setup cost. Industrial infrastructural needs like storage, computing has became like utilities that uses cloud. Features like availability, scalability, pay per use makes cloud as a dependable choice for enterprises. The growth of cloud computing depends on vital technologies like distributed computing, parallel processing, Internet, virtualization technologies, etc. Virtualization enables resources utilization in efficient way. It offers multi-tenancy which is sharing same physical space by many virtual machines. Co-residency of virtual machine on the other side brings more security bumps. As co-residents share common channels like memory bus, storage controllers, cache these channels can become sources of data leakage for malicious VMs. Malicious attacker VMs use covert channel for accessing sensible data from target VM. This paper presents a novel model Encryption First Split Next (EFSN) model for covert channel protection. This model targets about two key issues like isolating conflict of interest files from attacker using split share model. Other is applying encryption for making attacker difficult even if he gains the data from covert channels. This suggested model gave positive reliable results. This can be a choice for lazy or immature cloud users to rely on for their data storage security needs from co-tenant covert channel protection. © Springer Nature Singapore Pte Ltd. 2017.


Nagasudha D.,JNTUCEH | Latha Y.M.,MRECW
International Conference on Signal Processing, Communication, Power and Embedded System, SCOPES 2016 - Proceedings | Year: 2017

With the increase of multi media technology and internet there is a rapid growth in storing and retrieving of documents. Government has taken several methods for documents to scan and stored digitally for future use. Even though the documents are available in the digital format, but it is very difficult to search for a single word or phrase. Traditional optical character recognition techniques (OCR) and other text retrieval methods fail on these document images due to various types of noises. Word spotting will help the users to automatically search for a particular word/phrase in millions of such document images. In this paper we have proposed a word spotting technique for printed Telugu documents. Based on the word spotting technology, a collection of document images is converted into a collection of word images by word segmentation, and a number of profile based features are extracted to represent word images. Correlation and HMM model are applied for comparison of word images. Image to image matching is done by calculating similarities between a query word image and each word image in the collection. © 2016 IEEE.


Veeraiah D.,JNTUK | Vasumathi D.,JNTUCEH
International Journal of Applied Engineering Research | Year: 2015

A link analysis procedure is the one of the suitable technique for extracting relational models from relational data bases based on random walk model through the database defining Markov chain having as many states as elements related to database. One of the fundamental limitation of the link analysis is that relational data base could contain too many turned off elements, in which situation link analysis strategy is almost ineffective. Moreover, it is clearly not always simple to draw out a graph from a relational data source, especially when the database is large. So we propose develop Fuzzy Link based Analysis for extracting relationships in cluster database. The objective of our proposed approach is to recover not only the elements strictly submission with the restrictions of the SQL question, but also the components that almost adhere to these constraints and are therefore near to the focus on components. We will also assess the suggested technique on real cluster data sources. Our experimental results show efficient clustered documents from predefined datasets using Extended Boolean retrieval design in Fuzzy Link Based Analysis. © Research India Publications.


Veeraiah D.,JNTUK | Vasumathi D.,JNTUCEH
International Journal of Applied Engineering Research | Year: 2015

Although efforts have been made to fix the issue of clustering particular details via group outfits, with the results being aggressive to traditional methods, it is noticed that these methods unfortunately produce any details partition based on imperfect details. The actual ensemble-information matrix provides only cluster-data point interaction, with many entries being left unidentified. The paper provides an research that indicates this issue degrades the quality of the clustering outcome, and it provides a new link-based approach, which enhances the traditional matrix by finding unidentified records through similarity between groups in an collection. In particular, an efficient link-based criterion is suggested for the actual likeness evaluation. Afterward, to obtain the ultimate clustering outcome, a chart dividing technique is used to a calculated bipartite chart that is formulated from the enhanced matrix. Trial outcomes on several real details sets recommend that the suggested link-based method almost always outperforms both traditional clustering methods for particular details and well-known group collection techniques. © Research India Publications.


Shafee S.,NSAKCET | Naik B.B.,JNTUCEH | Sammaiah K.,AEC
Materials Today: Proceedings | Year: 2015

Resistance spot welding process parameters are optimized to improve spot weld quality. The experimental studies are conducted under varying force of electrode, welding current flow and its time duration. The spot weld quality characteristics are shear tensile strength and direct tensile strength has been considered. Signal to noise ratio was used to establish optimal process parameters. To authenticate the contribution percentage of experimental results against specified confidence level ANOVA was used. Verification trials show that it is feasible to improve the quality characteristics considerably. The investigational repercussions proved the effectiveness of the applied Taguchi method for improving spot weld quality. © 2015 Elsevier Ltd.


Kireet M.,JNTUCEH | Rao M.S.,JNTUSIT
Procedia Computer Science | Year: 2016

The instantaneous growth of mobile apps in mobile markets elevating the concerns on the protection of user's sensitive data in Smartphone's. The Majority of apps in all mobile markets are gathering the data which is insignificant to the app functionality. The mobile app collects the data of the user either users' sensitive data or device data by using orthodox permission control policy. This Permission policy in apps takes acceptance of user for installing an app and user has only one option to accept all permissions to continue the installation of app. In this work we proposed a framework PLANT which is Permission Leakage AvoidaNce Through Filteration for identifying data leakage done by mobile apps by using permissions. Finally framework gives the knowledge to the user to deny if there are any irrelevant permissions required by the app based on its functionality. © 2016 The Authors.

Loading JNTUCEH collaborators
Loading JNTUCEH collaborators