SDM Institute of Technology

Ujire, India

SDM Institute of Technology

Ujire, India
Time filter
Source Type

Purushotham U.,Dayananda Sagar College of Engineering | Suresh K.,SDM Institute of Technology
India International Conference on Information Processing, IICIP 2016 - Proceedings | Year: 2017

Mobile phones are considered as smart phones if it has additional characteristics other than regular wireless voice transmission. Smartness does not mean compromising with quality of voice under noisy conditions. This paper discusses about the methodology for improving the quality of voice signal under adverse noise conditions. Voice signal affected by real time noise signals is passed through amplitude estimator and from there on, it is processed in cepstral and multiband domain to extract the features of speech signal. The extracted speech is used to reconstruct the original signal which is free from real noise. © 2016 IEEE.

Purushotham U.,Dayananda Sagar College of Engineering | Suresh K.,SDM Institute of Technology
International Conference on Computer, Communication, and Signal Processing: Special Focus on IoT, ICCCSP 2017 | Year: 2017

Design of Specific architecture for a given application is very much necessary to solve the present day complex problems. Low cost VLSI architectures are used to deal with these efforts. Since mobiles phones for used worldwide in large numbers, developing dedicated hardware on high volume products like these will benefit VLSI economically. Some VLSI approaches are economically feasible in architectural synthesis of digital signal processing systems. These approaches are very essential in low volume to medium volume DSP applications. Speech Processing is one of the complex DSP procedures in mobile phone since it involves; speech recognition, noise suppression, silence detection, pitch analysis and may more. VLSI programmable technologies, such as FPGA, which is recommended for low price VLSI, is used widely in market. In this paper we have developed one such application specific architecture for suppressing surrounding noise in the mobile communication. © 2017 IEEE.

Manjunatha R.,SDM Institute of Technology | Kumar G.,SDM Institute of Technology | Chandrashekaraiah T.M.,Kalpataru Institute of Technology | Jagannatha N.,SJM Institute of Technology
International Journal of Mechanical Engineering and Technology | Year: 2016

In the recent years the usage of cast Al-Si alloy components in automotive and marine industries has increased significantly. Such alloys are invariably treated for modification and grain refinement prior to casting to achieve improved properties and performance. Grain refinement plays a crucial role in improving characteristics and properties of aluminum silicon eutectic (Al- 12Si) alloy. In the present research work, modified and grain refined Aluminium-Silicon alloys are synthesized from commercially available base alloys using die casting method. An attempt has been made to machine the eutectic Al-12Si (LM 6) alloy using CNC at different conditions. Modified Taguchi robust design analysis is employed to determine optimal combination of Machining parameters. The Analysis of Variance (ANOVA) is also applied to identify the most significant factor. It is found that the Depth of cut is the most significant factor on Material Removal Rate (MRR) and Feed rate is for Roughness of machined surface (Ra). It has been observed that there is good agreement between the predicted and experimental values of optimization. The influence of depth of cut and feed rate on MRR and Ra have been discussed. The addition of modifier and grain refiner had a crucial role in improving the mechanical properties in eutectic LM 6 alloy. © IAEME Publication.

Shivananda M.K.,Tumkur University | Shivarama Holla B.,Sdm Institute Of Technology
Journal of Chemical and Pharmaceutical Research | Year: 2011

3-Aryl-2-methyl-quinazolin-4-ones 1 were treated with nitrofurfural diacetate 2 in presence of piperidine and drops of concentrated sulphuric acid to obtain 3-aryl-2-[(5-nitro-2- furfuryl)vinyl]quinazolin-4-ones 3 in fairly good yields. The structures of these compounds were confirmed on the basis of elemental analyses, IR, NMR and mass spectral data. These compounds were also tested for their antifungal activities.

Nagaraja H.N.,SDM Institute of Technology | Kastha D.,Indian Institute of Technology Kharagpur | Petra A.,Indian Institute of Technology Kharagpur
IEEE Transactions on Industrial Electronics | Year: 2011

The multiphase interleaved synchronous buck converters with coupled phase inductors are being preferred for voltage regulator modules requiring low output voltage, high output current, and fast transient response since they simultaneously offer better steady-state efficiency and faster dynamic response. In this paper, a novel magnetic core structure for symmetrical coupling of multiphase buck converter phase inductors is proposed, which overcomes several limitations of asymmetrical inductor coupling proposed so far. A new analytical technique to arrive at simple dynamic equivalent circuits of the converter, as well as design guidelines for the proposed inductor structure, is presented. Experimental results from a prototype four-phase synchronous buck converter with the proposed inductor demonstrate 2% to 6% improvement in the converter efficiency compared to a similarly rated converter with uncoupled inductors while retaining the same transient performance. © 2010 IEEE.

Pradeep Kumar K.G.,SDM Institute of Technology
IET Conference Publications | Year: 2013

This paper proposes combining the concepts of quantum computing and big data. The idea of using the concept of quantum computing for processing the big data is suggested. Quantum computing is the advanced computing technology where we think ahead of our conventional binary bits. This is based on the quantum physics which states that a material can be at more than one place at a time. This concept, when used in our conventional computing systems, will have the third bit called the superimposed bit that can be in two states at a time. The term big data is used to refer to the huge amounts of data collected. The data being collected is increasing exponentially. According to a study conducted by McKinsey Global Institute, the data volume is growing 40% every year; and with the increasing number of users and research areas, one can expect much more growth in the data volume. With this kind of growing data, the need arises for faster processing and analysis methods giving better performance to the end users and the analytics. In this paper, a new algorithm, named as PQ-Key, is proposed for processing the big data using quantum computing.

Hegde R.,SDM Institute of Technology | Jagadeesha S.,SDM Institute of Technology
Computer Standards and Interfaces | Year: 2016

In recent years, Information Security in the field of digital communication is a relevant part because the advancement hiked the fear of receiving the data snooped at the time of sending it from the sender to the receiver. So, a secure technique is designed by amalgamate both Cryptography and Steganography. Initially, user's confidential details are encrypted using the more secure Multi curve Elliptic Curve Cryptography (ECC) technique. Next, the encrypted cipher is embedded into the H.264 Video using a novel proposed Optimized Modified Matrix Encoding (OMME) steganography technique to embed the secret data. While embedding the encrypted confidential details into the video, pixels from the frames can be selected using an optimization algorithm called Artificial Bee Colony (ABC) in order to reduce distortion of stego video. Finally, the user's secret data embedded in the H.264 Video is extracted and it is de-ciphered. This proposed technique increases the level of security and robustness against attacks in terms of carrier capacity and embedding efficiency when compared to existing methodologies. The proposed work is implemented in the working platform of Matlab and provide data hiding in MPEG video files. © 2016 Elsevier B.V.

Hegde R.,SDM Institute of Technology
IET Conference Publications | Year: 2013

This review paper is concentrating on two data hiding approaches using compressed MPEG video files. The first approach by modulating the quantization scale[26] of a constant bitrate video, message bits are hided. A payload of one message bit per macroblock is achieved. Asecond order multivariate regression[26] is used to find an association between macroblocklevel feature variables and the values of a hidden message bit. The regression model is then used by the decoder to predict the values of the hidden message bits with very high prediction accuracy. The second approach uses the flexible macroblock ordering feature of H.264/AVC to hide message bits. Macroblocks are assigned to arbitrary slice groups according tothe content of the message bits to be hidden. A maximum payload of three message bits per macroblock is achieved. The experimental solutions are analyzed in terms of message extraction accuracy, message payload, excessive bitrate and quality distortion. And also we are reviewing the paper which presents an improved data hiding techniques based on BCH (n,k,t) coding.

Somashekar D.P.,Sdm Institute Of Technology
IET Conference Publications | Year: 2013

The continuous service for customers is complicated process in distribution system, when the system apparatus and customers are get affected by various large number of outages which caused by improper maintenance of system utilities and some environmental factors results block-out regions in the systems. The impact of distributed generation on distribution system, stability will be negligible when connected in small amounts. However, if it's penetration level become higher, distributed generation may start to influence the dynamic behavior of the system as a whole. So, the fuel cells (SOFC) are used as distributed generation system which is penetrates in distribution network to enhance the continuous service for customers. In this paper, we are analyzing the system stability by describing the dynamic modeling of fuel cell to the system utility grid by using MATLAB/SIMULINK.

Patil B.,Sdm Institute Of Technology | Biradar S.R.,Alagappa Chettiar College of Engineering And Technology
ACM International Conference Proceeding Series | Year: 2016

The major challenging issue is providing security for the multimedia data in Wireless Multimedia Sensor Networks (WMSNs) owing to their tough surroundings. The issue of securing the multimedia data in WMSN becomes even more composite in group or cluster communications. A new Cluster based authentication scheme is projected for secure, accurate and effective communication. The proposed method identifies the efficiency of a connection with the intention of reducing the overhead & assured scalability. A hash function is used for traffic monitoring within a cluster to validate the multimedia data. Proficient packet transmission protocols are considered for WMSNs based on the clusters known as SET. These protocols provide efficient data communication. The consequences prove that the projected/proposed technique has virtuous performance than the existing techniques for WMSNs. © 2016 ACM.

Loading SDM Institute of Technology collaborators
Loading SDM Institute of Technology collaborators