MSRIT

Lal Bahadur Nagar, India
Lal Bahadur Nagar, India
SEARCH FILTERS
Time filter
Source Type

Singh M.S.,MSRIT | Talasila V.,MSRIT
2015 International Conference on Smart Sensors and Systems, IC-SSS 2015 | Year: 2017

Over the past few years, connections between the end devices or stations have been increasingly wireless. In 1997, 802.11 subcommittee had first approved its Wireless Local Area Network (WLAN) standard. Since then, many wireless networking standards have taken extra efforts in developing mesh architectures in which data is forwarded between multiple wireless hops to reach the desired destination. The main advantage of Wireless Mesh Network over the traditional WLAN is the fact that Wireless Mesh Networks are easy to deploy, flexible, have capability of self-forming, self-healing, and self-organization. In this Project, an implementation and development of wireless mesh network test bed is carried out on the layer 2 routing using Better Approach to Mobile Adhoc Network-advanced (BATMAN-adv) and Hybrid Wireless Mesh Network (HWMN) protocols. The main reason for the use of layer 2 protocol over layer 3 is the less processing overhead that helps in maximizing the throughput. Also, a protocol that runs on layer 2 is capable of supporting any protocol above layer 2. The major aspects of this project will cover setting up a real time wireless mesh test bed and performance analysis of BATMAN-adv and HWMN and their comparisons. © 2015 IEEE.


Singh A.,MSRIT | Ram Prabhu T.,CEMILAC | Sanjay A.R.,MSRIT | Koti V.,MSRIT
Materials Today: Proceedings | Year: 2017

Carbon nanotubes (CNTs) are known for their extraordinary mechanical, electrical and thermal properties. These properties make them ideal reinforcements in the metal matrix. Particularly, the combination of Cu/CNT is interesting in view of excellent thermal, electrical and physical properties of copper. In this overview, the reports on Cu/CNT composites are critically analyzed with respect to the process techniques, mechanical and tribological properties. Powder metallurgy coupled with spark plasma sintering is found to be a most widely used process to fabricate Cu/CNT composites. Comparatively, a small amount of CNTs is sufficient to improve the properties of composites as against the conventional micron size particle reinforced composites. The strength, wear resistance and corrosion resistance of the composites increase significantly with an increase of volume fraction of CNTs. The density and thermal conductivity reduce with an increase of CNTs. There exists a critical volume fraction above that both the mechanical properties and the thermal conductivity are drastically reduced due to the problems of CNTs agglomeration and the increase of process related defects such as porosity, delamination and so on. Fracture surface features of Cu/CNT composites show that the fracture mode transits from ductile to brittle fracture with an addition of CNTs. © 2017 Elsevier Ltd. All rights reserved.


Shivaprakash G.,MSRIT | Suresh D.S.,Electronics and Communication Engg.
2015 International Conference on Smart Sensors and Systems, IC-SSS 2015 | Year: 2017

in this paper, 9T bit cell is designed and simulated to verify the design. The design and simulation study results are presented here. 9T SRAM bit cell is designed with 65nm CMOS technology, obtaining optimum transistor geometries for the bit cell. Leakage current for the designed bit cell is estimated for variations in transistor geometries, VDD and temperature. © 2015 IEEE.


Meghana D.K.,MSRIT | Reddy J.G.,MSRIT
Proceedings of the 2016 2nd International Conference on Applied and Theoretical Computing and Communication Technology, iCATccT 2016 | Year: 2017

A developer after developing the software transfer the binary to customers. When the program crashes and core dumps, the program needs to be debugged. For debugging using the debugger like GDB, requires the binary to have debug information in it. There are methods to embed the debug information to the binary. But this will increase the size of the binary. Sometimes the size of the debug information is more than the size of the binary. So we are separating the debug information from the binary and storing it in the separate debug file. And debug file name is added to the binary. But this debug file needs to be stored in the safer and easily accessible place to the debugger. So we are using the cloud as a storage space and providing the authorization to the debuggers. By making some modifications to the linker and debugger GDB we can make debuggers to easily access the debug file and debug the file. By separating the debug information from the binary, the size of the executable is reduced, thereby increasing the performance of program execution. © 2016 IEEE.


Manasa C.,M.S.R.I.T | Sunagr P.,M.S.R.I.T
Proceedings of the 2016 2nd International Conference on Applied and Theoretical Computing and Communication Technology, iCATccT 2016 | Year: 2017

This paper presents a hybrid approach to encode and decode the data received from the video using H.264 encoder/decoder and to derive the compressed data for the given image using the compression algorithm such as DCT. The encoded data derived from the output of the Encoder part, while the decoded data reconstructed from the encoded video output. The watermarking was also done on the input video in order to increase the robustness of the overall system. The watermark is an image and it was embedded into the frames of the input video which results as the watermarked video. The watermark is embedded in to the frames using DWT algorithm. From the watermarked video, the watermark (image) is decrypted and the input video is reconstructed. Experimental results demonstrate the superiority of the proposed system compared to the former existing schemes in encoding and watermarking tasks. The H.264 Encoder/Decoder method compresses the frames of the video efficiently, and at the same time, the actual input frames of the video can be reconstructed from the corresponding compressed data stream. © 2016 IEEE.


Kumar G.A.,M.S.R.I.T. | Kusagur A.,U.B.D.T.
International Conference on Signal Processing, Communication, Power and Embedded System, SCOPES 2016 - Proceedings | Year: 2017

An attempt is made to develop and carry out the performance evaluation of the different Image Denoising Techniques on the images. This paper discusses the improvement of the recent image denoising techniques from the traditional techniques. The improved denoising filters, succeeded by the median filter are taken into consideration and the improvement of the median filter and its performance parameter is checked for any improvements from the traditional filtering techniques. Matlab based implementation is carried out and the results are tabulated for different noise conditions. The performance parameters MSE and PSNR, are used for comparison of the test image applied with different noises, Salt and Pepper, Gaussian and Speckle noise. This paper can be considered as the tradeoff analysis of the different filtering techniques on the different noises. © 2016 IEEE.


Sathyanarayana S.V.,JNNCE | Kumar M.A.,MSRIT | Bhat K.N.H.,NCET
International Journal of Network Security | Year: 2011

In this paper, cyclic elliptic curves of the form y2 + xy = x3 + ax2 + b, a, b ∈ GF(2m) with order M is considered in the design of a Symmetric Key Image Encryption Scheme with Key Sequence derived from random sequence of cyclic elliptic Curve points. P with coordinates (xP; yP) which satisfy the elliptic curve equation is called a point on elliptic curve. The order M is the total number of points (x,y) along with x =∞; y =∞ which satisfy the elliptic curve equation. Least integer N for which NP is equal to point at infinity O is called order of point P. Then P, 2P,. .. (N-1)P are distinct points on elliptic curve. In case of cyclic elliptic Curve there exists a point P having the same order N as elliptic curve order M. A finite field GF(p) (p ̧ N) is considered. Random sequence {ki} of integers is generated using Linear Feedback Shift Register (LFSR) over GF(p) for maximum period. Such sequences are called maximal length sequences and their properties are well established. Every element in sequence {ki} is mapped to kiP which is a point on cyclic elliptic Curve with coordinates say (xi; yi). The sequence {kiP} is a random sequence of elliptic curve points. From the sequence (xi; yi) several binary and non-binary sequences are derived. These sequences find applications in Stream Cipher Systems. Two encryption algorithms - Additive Cipher and Affine Cipher are considered. Results of Image Encryption for a medical image is discussed in this paper. Here, cyclic elliptic Curve over GF(28) is chosen for analysis.


Srilatha N.,Indian Institute of Science | Madhavi Latha G.,Indian Institute of Science | Puttappa C.G.,MSRIT
Geotextiles and Geomembranes | Year: 2013

This paper studies the effect of frequency of base shaking on the dynamic response of unreinforced and reinforced soil slopes through a series of shaking table tests. Slopes were constructed using clayey sand and geogrids were used for reinforcing the slopes. Two different slope angles 45° and 60° were used in tests and the quantity and location of reinforcement is varied in different tests. Acceleration of shaking is kept constant as 0.3 g in all the tests to maximize the response and the frequency of shaking was 2 Hz, 5 Hz and 7 Hz in different tests. The slope is instrumented with ultrasonic displacement sensors and accelerometers at different elevations. The response of different slopes is compared in terms of the deformation of the slope and acceleration amplifications measured at different elevations. It is observed that the displacements at all elevations increased with increase in frequency for all slopes, whereas the effect of frequency on acceleration amplifications is not significant for reinforced slopes. Results showed that the acceleration and displacement response is not increasing proportionately with the increase in the frequency, suggesting that the role of frequency in the seismic response is very important. Reinforced slopes showed lesser displacements compared to unreinforced slopes at all frequency levels. © 2012 Elsevier Ltd.


Kamali C.,National Aerospace Laboratories, Bangalore | Pashilkar A.A.,National Aerospace Laboratories, Bangalore | Raol J.R.,MSRIT
Aerospace Science and Technology | Year: 2011

This paper presents results of evaluation of Recursive Least Squares (RLS) algorithm for real time applications in flight control and testing. The RLS proposed here is based on the equation error principle and can start with zero values of the unknown parameters. The technique makes use of only forgetting factor and a stabilizing parameter to achieve better convergence characteristics. In the present study, the RLS technique is applied for parameter estimation in the context of (i) reconfigurable/restructurable control, (ii) estimation of aircraft short period and Dutch roll characteristics in the absence of calibrated air data, and (iii) online stability (gain and phase) margin estimation. © 2010 Elsevier Masson SAS.


Sathyabhama A.,MSRIT
Heat and Mass Transfer/Waerme- und Stoffuebertragung | Year: 2012

Nucleate pool boiling heat transfer coefficients were determined experimentally for NH 3-H 2O, NH 3-H 2O-LiNO 3 and NH 3-H 2O-LiBr mixtures. Both the salts were effective in increasing the heat transfer coefficient of NH 3- H 2O mixture. A concentration of 10 mass% of the salts in water, produced the greatest enhancement in heat transfer coefficient at all the range of pressure, heat flux and ammonia concentration studied in this investigation. The experiments indicated that ammonia concentration also has the impact on the augmentation of heat transfer coefficient in NH 3-H 2O binary mixture by the addition of salts. For the solution of ammonia mass fraction 0.30, high concentration of LiBr gives the highest heat transfer coefficient, for ammonia mass fraction of 0.25, high concentration of LiNO 3 gives the maximum heat transfer coefficient, for ammonia mass fraction of 0.15, both the salts are equally effective in increasing the heat transfer coefficient. © Springer-Verlag 2011.

Loading MSRIT collaborators
Loading MSRIT collaborators