MSRIT

Lal Bahadur Nagar, India
Lal Bahadur Nagar, India

Time filter

Source Type

Jayashree S.,MSRIT | Sharanya N.K.,MSRIT
2016 IEEE International Conference on Recent Trends in Electronics, Information and Communication Technology, RTEICT 2016 - Proceedings | Year: 2016

Forward Error8Correction codes are required to remove8errors such as noise,8crosstalk etc that transpire in8communication channel. In this paper, we propose a concatenated8(Single Parity8Check, BCH and Low8Density Parity Check) coding8method to remove the errors and improve the efficiency of the system. Simulation results8shows that Single8Parity Check method8along with BCH8and Low Density8Parity Check gives8better results. Performance8of these coding methods in different channels such as8AWGN, Rayleigh and8Rician channels are also simulated. SPC8method having simple8encoding and decoding8mechanism does not give good BER. LDPC in contrast to BCH8achieves higher8performance and better error8correction capability. © 2016 IEEE.


Mali S.K.,MSRIT | Lakkannavar M.C.,MSRIT
2016 IEEE International Conference on Recent Trends in Electronics, Information and Communication Technology, RTEICT 2016 - Proceedings | Year: 2016

The pipelined architecture has gained popularity due to its ability to achieve high throughput and low hardware complexity, low power consumption. Thus, these architectures are widely used in many applications, mainly for the real-Time applications. The fast Fourier transform (FFT) offers optimized design for the complex samples, i.e., complex valued FFT (CFFT) but not for the real input samples, i.e., real-valued FFT (RFFT). This paper presents the four parallel pipelined architecture (PPA) for the RFFT by using a canonical-signed-digit multiplier (CSDM) to optimize the area. The obtained results are compared with the pipelined architecture of author Salehi et al. [1] and is examined that the proposed architecture is efficient in area optimization. © 2016 IEEE.


Ajmal S.A.,MSRIT | Gangadharaiah S.L.,MSRIT
2016 IEEE International Conference on Recent Trends in Electronics, Information and Communication Technology, RTEICT 2016 - Proceedings | Year: 2016

The design of pipelined Fast Fourier transform (PFFT) in modern communication systems provides an efficient way for computation of FFT with better area utilizing hardware architecture. Previously, the radix-22 had been used only for single path delay feedback architectures. Later with many types of research works the radix 22 was extended to multi-path delay commutator (MDC) architectures. This paper presents area optimization of parallel pipelined radix-22 feed forward Fast Fourier transform (PPFFT) architecture. This architecture is provided for parallelism value 4 and 16 sample points and the area of proposed PFFT is compared with other PFFT (feed forward) architectures using the same synthesis tool and FPGA. The comparison shows that the proposed architecture exhibits better area optimization. © 2016 IEEE.


Shreedarshan K.,MSRIT | Bulla A.,MSRIT
2016 IEEE International Conference on Recent Trends in Electronics, Information and Communication Technology, RTEICT 2016 - Proceedings | Year: 2016

Shadows cast by the moving objects may lead to several errors in the process of moving object detection and tracking. Since the shadows are connected to the object and move along with it, false object detection may occur in addition to the problem of false connectivity and loss of background texture. Hence shadow detection is an important preprocessing step for a robust visual surveillance system. However, the conventional methods which usually use a static threshold over the color and/or intensity channels for shadow detection may fail when some object regions have properties identical to the cast shadow (fake shadow). In this paper, we present a novel shadow detection and removal scheme which can effectively deal with the problem of fake shadows using the HOG (histogram-of-oriented gradients) features. In the initial stage of moving object detection we make use of GMM (Gaussian mixture model) to properly segment the foreground regions. Since HSV color space gives a better separation of chromaticity and intensity, it helps to detect the shadows in the segmented foreground but at the same time may also misclassify some object regions as shadow regions. We exploit the fact that these object regions (misclassified regions/fake shadows) change the entire background information as compared to the cast shadows which mostly cause intensity variations over the background and perform a local feature matching process to properly identify the real shadow and fake shadow regions. Once the regions are identified it becomes easy to remove the shadows without any loss of information in the object regions. Experimental results indicate that the proposed method achieves good results in outdoor scenarios. © 2016 IEEE.


Sathyanarayana S.V.,JNNCE | Kumar M.A.,MSRIT | Bhat K.N.H.,NCET
International Journal of Network Security | Year: 2011

In this paper, cyclic elliptic curves of the form y2 + xy = x3 + ax2 + b, a, b ∈ GF(2m) with order M is considered in the design of a Symmetric Key Image Encryption Scheme with Key Sequence derived from random sequence of cyclic elliptic Curve points. P with coordinates (xP; yP) which satisfy the elliptic curve equation is called a point on elliptic curve. The order M is the total number of points (x,y) along with x =∞; y =∞ which satisfy the elliptic curve equation. Least integer N for which NP is equal to point at infinity O is called order of point P. Then P, 2P,. .. (N-1)P are distinct points on elliptic curve. In case of cyclic elliptic Curve there exists a point P having the same order N as elliptic curve order M. A finite field GF(p) (p ̧ N) is considered. Random sequence {ki} of integers is generated using Linear Feedback Shift Register (LFSR) over GF(p) for maximum period. Such sequences are called maximal length sequences and their properties are well established. Every element in sequence {ki} is mapped to kiP which is a point on cyclic elliptic Curve with coordinates say (xi; yi). The sequence {kiP} is a random sequence of elliptic curve points. From the sequence (xi; yi) several binary and non-binary sequences are derived. These sequences find applications in Stream Cipher Systems. Two encryption algorithms - Additive Cipher and Affine Cipher are considered. Results of Image Encryption for a medical image is discussed in this paper. Here, cyclic elliptic Curve over GF(28) is chosen for analysis.


Raghu R.,MSRIT | Shobha K.R.,MSRIT
Communications in Computer and Information Science | Year: 2012

This paper presents the concept of JavaScript Application Framework (JSAF) which is a Platform Independent Model (PIM). This Paper aims at developing an application framework using web developing languages which supports the usage on all platforms making it easy for the developers to use the application framework to develop applications. JSAF is used for creating applications for Mobile Devices which supports a Browser which can render advanced web developing languages such as JavaScript, HTML5 and CSS3. The JSAF provides all the basic User-Interface (UI) widgets required for the Application Development to the Application developer. The JSAF Application is rendered on a Browser which will load JSAF framework prior to the Application. JavaScript Application Framework has the Multitasking feature and Cross Application Communication feature. JavaScript Application Framework is developed at Samsung India Software Operations and proprietary. © 2012 Springer-Verlag.


Srilatha N.,Indian Institute of Science | Madhavi Latha G.,Indian Institute of Science | Puttappa C.G.,MSRIT
Geotextiles and Geomembranes | Year: 2013

This paper studies the effect of frequency of base shaking on the dynamic response of unreinforced and reinforced soil slopes through a series of shaking table tests. Slopes were constructed using clayey sand and geogrids were used for reinforcing the slopes. Two different slope angles 45° and 60° were used in tests and the quantity and location of reinforcement is varied in different tests. Acceleration of shaking is kept constant as 0.3 g in all the tests to maximize the response and the frequency of shaking was 2 Hz, 5 Hz and 7 Hz in different tests. The slope is instrumented with ultrasonic displacement sensors and accelerometers at different elevations. The response of different slopes is compared in terms of the deformation of the slope and acceleration amplifications measured at different elevations. It is observed that the displacements at all elevations increased with increase in frequency for all slopes, whereas the effect of frequency on acceleration amplifications is not significant for reinforced slopes. Results showed that the acceleration and displacement response is not increasing proportionately with the increase in the frequency, suggesting that the role of frequency in the seismic response is very important. Reinforced slopes showed lesser displacements compared to unreinforced slopes at all frequency levels. © 2012 Elsevier Ltd.


Kamali C.,National Aerospace Laboratories, Bangalore | Pashilkar A.A.,National Aerospace Laboratories, Bangalore | Raol J.R.,MSRIT
Aerospace Science and Technology | Year: 2011

This paper presents results of evaluation of Recursive Least Squares (RLS) algorithm for real time applications in flight control and testing. The RLS proposed here is based on the equation error principle and can start with zero values of the unknown parameters. The technique makes use of only forgetting factor and a stabilizing parameter to achieve better convergence characteristics. In the present study, the RLS technique is applied for parameter estimation in the context of (i) reconfigurable/restructurable control, (ii) estimation of aircraft short period and Dutch roll characteristics in the absence of calibrated air data, and (iii) online stability (gain and phase) margin estimation. © 2010 Elsevier Masson SAS.


Sathyabhama A.,MSRIT
Heat and Mass Transfer/Waerme- und Stoffuebertragung | Year: 2012

Nucleate pool boiling heat transfer coefficients were determined experimentally for NH 3-H 2O, NH 3-H 2O-LiNO 3 and NH 3-H 2O-LiBr mixtures. Both the salts were effective in increasing the heat transfer coefficient of NH 3- H 2O mixture. A concentration of 10 mass% of the salts in water, produced the greatest enhancement in heat transfer coefficient at all the range of pressure, heat flux and ammonia concentration studied in this investigation. The experiments indicated that ammonia concentration also has the impact on the augmentation of heat transfer coefficient in NH 3-H 2O binary mixture by the addition of salts. For the solution of ammonia mass fraction 0.30, high concentration of LiBr gives the highest heat transfer coefficient, for ammonia mass fraction of 0.25, high concentration of LiNO 3 gives the maximum heat transfer coefficient, for ammonia mass fraction of 0.15, both the salts are equally effective in increasing the heat transfer coefficient. © Springer-Verlag 2011.


Rajeshwari C.N.,Bangalore University | Srinivasa K.G.,MSRIT
Proceedings - 2015 IEEE International Conference on Cloud Computing in Emerging Markets, CCEM 2015 | Year: 2015

Scheduling tasks in the cloud computing environment, particularly for data intensive applications is of great importance and interest. In this paper, we propose a new workflow model presented in a rigorous graph-Theoretic setting. In this new model, we would like to incorporate possible similarities between requisite files which are needed to complete the given set of tasks. We show that it is NP-Complete to compute the make span in this model even with oracle access to the cost of retrieving a file. © 2015 IEEE.

Loading MSRIT collaborators
Loading MSRIT collaborators