Time filter

Source Type

Manu S.,Sri Siddhartha Institute of Technology | Chandrashekar T.K.,Mangalore Institute of Technology and Engineering
International Journal of Ambient Energy | Year: 2017

The study attempts to optimise the parameters of a lithium bromide–water (LiBr–H2O) miniature absorption refrigeration system using Taguchi approach for electronic cooling working at ambient conditions. Thermodynamic optimisation was performed to obtain the optimum coefficient of performance (COP) for heat removal of 100 W by using the Taguchi approach. Three factors were considered: generator temperature (Tg), condenser temperature (Tc) and absorber temperature (Ta), at three different levels. The result showed that the percentage contribution of generator temperature is more on COP. Optimisation of three significant heat exchangers: evaporator, condenser and absorber, was performed by using the Taguchi approach. The study was carried out individually for all the components by varying the hydraulic diameter and aspect ratio at three different levels. The results showed that the hydraulic diameter contributes more than the aspect ratio. © 2017 Informa UK Limited, trading as Taylor & Francis Group


Kandagal A.P.,Sri Siddhartha Institute of Technology
Proceedings of 2014 International Conference on Contemporary Computing and Informatics, IC3I 2014 | Year: 2014

Human computer interaction (HCI) is very crucial in our day-to-day activity. Speech is one of the essential and intuitive ways to interact with machines such as Smartphone, which has multiple sensors as microphone, camera, etc. An efficient performance speech recognition system improves interaction between man and machines by making latter more receptive to user needs. Such system has Automatic speech recognition (ASR) engine, which is facing a unique challenge of accuracy in recognition rate. By integrating acoustic signal feature vectors with the visual features, a more robust audiovisual speech recognition engine (AVSR) could be developed for real environmental scenarios. This paper presents past research and development in the field of ASR and AVSR technologies. It describes key technological perspective and admiration of the fundamental progress in ASR and AVSR. The objective of this review is to summarize and compare some of the well-known methods experimented by previous researchers, and to conclude with direction on future research proficiency in HCI system using ASR and AVSR engine. © 2014 IEEE.


Ramesh D.,Sri Siddhartha Institute of Technology | Swamy R.P.,Davangere University | Chandrashekar T.K.,Sri Siddhartha Institute of Technology
Journal of Engineering and Applied Sciences | Year: 2010

Frit-Al6061 alloy composites having 2 wt%, 4 wt%, 6 wt%, 8 wt% and10 wt% of frit particles were fabricated by liquid metallurgy (stir cast) method. The casted ingots were subjected to T6 heat treatment to optimize the properties. The composite specimens were machined as per test standards. The specimens were tested to know the common casting defects using ultra-sonic flaw detector testing system. Some of the mechanical properties have been evaluated and compared with Al6061 alloy. Significant improvement in tensile properties, compressive strength and hardness are noticeable as the wt % of the frit particles increases. The microstructures of the composites were studied to know the dispersion of the frit particles in matrix. It has been observed that addition of frit particles significantly improves ultimate tensile strength along with compressive strength and hardness properties as compared with that of unreinforced matrix. © 2006-2010 Asian Research Publishing Network (ARPN).


Annapurna H.S.,Sri Siddhartha Academy of Higher Education | Siddappa M.,Sri Siddhartha Institute of Technology
International Journal of Applied Engineering Research | Year: 2015

In Wireless Sensor Network (WSN), sensor nodes must utilize energy efficiently to increase the life time of a sensor node. Existing protocols for achieving data privacy and integrity in WSN introduce high communication and computational overhead which causes high energy and bandwidth consumption. Using data aggregation in WSN reduces the energy consumption at a sensor node. Existing privacy preserving data aggregation protocols do not provide efficient solutions for energy constrained and security required WSNs due to the overhead of power consuming operations at aggregator nodes. This paper proposes a new scheme called Secure Energy Efficient Homomorphism based Privacy and Integrity Preserving Data Aggregation for WSNs (SEEHPIP) that uses additive homomorphism to achieve confidentiality during data aggregation. It achieves non-delayed data aggregation by performing aggregation on encrypted data. The proposed scheme is best suited for time critical, secure applications since it achieves privacy, integrity, accuracy, end to end confidentiality, data freshness and energy efficiency during data aggregation without introducing a significant overhead on the battery limited sensor nodes. © Research India Publications.


Renukalatha S.,Sri Siddhartha Institute of Technology | Suresh K.V.,Siddaganga Institute of Technology
Proceedings of 2014 International Conference on Contemporary Computing and Informatics, IC3I 2014 | Year: 2015

Accurate and robust image segmentation is identified as one of the most challenging issues in Positron Emission Tomography (PET). The low spatial resolution, signal dependant noise levels and complex nature of anatomical structures have negative impact on qualitative and quantitative image segmentation analysis. Several unsupervised methods such as, Fuzzy C-Means (FCM) clustering, active contour modeling are usually used in segmenting medical images. However, these methods are sensitive to both noise and intensity inhomogeniety, as they ignore the spatial information. In this paper, we propose a methodology which segments noisy PET images incorporating an efficient denoising technique using transform domain filters to remove the noise followed by an active contour method to segment the Region Of Interest (ROI). Finally, the segmented output is fine tuned using Bayesian matting approach. Experimental results show that the proposed approach improves the overall segmentation accuracy. © 2014 IEEE.


Sreedhar Acharya B.,Bharathiar University | Siddappa M.,Sri Siddhartha Institute of Technology
International Journal of Applied Engineering Research | Year: 2016

Cloud computing is evolving as the next generation architecture of IT Enterprise. Cloud Computing has emerged from the most promising business concept to new fast growing business trend. Cloud Computing provides the ability to utilize resources from distributed computing environments via Internet. Cloud Computing is the promising hosting platform that allows the resources and collection of applications usage in the shared infrastructure with pools of computers and storage resources. Enterprise customers are still reluctant to deploy cloud computing in business. The most threatening aspect of cloud computing is its security. Cloud computing moves its application and databases through data centers, while management of data and services are an important security challenges, which have not been fully understood. This paper focuses on security challenges in Data Transmission and Storage in cloud computing. © Research India Publications.


Hoskot M.J.,Sri Siddhartha Institute of Technology
IEEE Potentials | Year: 2013

While creating new industries and innovative technologies may be a long-term solution to systemic unemployment, they will take years to move from concept to development and finally deployment. The existing U.S. workforce is not prepared to undertake radical changes in the life skills needed to succeed in these new high-tech industries. The job mix in our current economy is weighted to the service sector by more than 80%. Within the call center sector alone, we have lost more than 7 million jobs to India and the Philippines and other low-cost markets. While these jobs are not the highest paying and are certainly not glamorous, they are jobs that are easily learned and can absorb large numbers of workers right now. Why can?t we act to protect these jobs and reverse the migration of call center work back to the United States? © 1988-2012 IEEE.


Eshwarappa M.N.,Sri Siddhartha Institute of Technology
International Journal of Applied Engineering Research | Year: 2014

Mathematics is the queen of sciences and for any scientific study mathematics is of great use. Its use and application is ever growing. It is interesting that some mathematical concepts and ideas are of so much of use and help in understanding matters not connected with mathematics. Mathematics has become more and more important to engineering science and it is certain that this trend will also continue in the future. Examples are the theory of matrices and linear algebra, the theory of differential equations, Laplace transforms, Complex analysis, Numerical analysis, Probability and Statistics and so on. Problems in modern engineering are so complex that most of them cannot be solved solely by using physical intuition and past experience. The empirical approach has been successful in many problems in the past, but fails as high speeds, large forces, high temperatures, or some abnormal conditions are involved and the situation becomes still more critical because of the that various modern materials have unusual physical properties. Experimental work has become complicated, time consuming, expensive and so on. Here mathematics offers aid in planning experiments, in evaluating experimental data, and in reducing the work and cost involved in finding solutions, which are much more exact and reliable. Another interesting fact is that some problems in engineering and other sciences lead to new developments in mathematical theory, so that there is a very close linkage between theoretical developments in mathematics and applications elsewhere. This paper gives an overview of the major mathematical models used in biometric system. The paper concludes with a discussion on issues and challenges of the models with experimental results of a biometric person authentication system. © Research India Publications.


Soumya S.,Bharathiar University | Siddappa M.,Sri Siddhartha Institute of Technology
International Journal of Applied Engineering Research | Year: 2015

The advent of mobile and hand – held devices is likely to popularize the use of Ad Hoc Networks. A Mobile Ad Hoc Network is a collection of Wireless Mobile nodes forming a Network without a wired infrastructure for the intercommunication. The wireless communication medium is unpredictable and variable in its nature. Thus, routing protocols are vital to set proficient routes among the nodes. Thus, lot of routing protocols have been propose, among them AODV and DSR are popular as it renders high performance compared to other protocols. This paper presents the results of performance comparison of energy, throughput and variations in values of the protocols. Simulation is obtained from widely used NS2 Simulation. © Research India Publications.


Vinutha C.B.,Sri Siddhartha Institute of Technology | Nalini N.,Nitte Meenakshi Institute of Technology
Proceedings of the 2016 IEEE International Conference on Wireless Communications, Signal Processing and Networking, WiSPNET 2016 | Year: 2016

Wireless sensor networks are constituted out of a large number of sensor nodes with limited energy resources. Severe shortage of onboard energy resource of WSN necessitates the combined solutions to its energy challenges. We propose an effective, method of clustering and reliable packet routing for the mobile nodes of sensor networks. Typically when nodes show some mobility in deployed network area, localization becomes complex which makes the clustering process even more complicated. In most of the existing works, Bayesian method [12] of predicting the future changes in nodes position is employed, wherein changes in states are based on prior probability distribution. However there is no influence of prior positions of sensor nodes on future states of its position. The node's movement to next location can be predicted using its current state of location and hence node's localization is being modeled as markov chains in our work. Normally the energy levels of sensor nodes can be configured to exhibit discrete dynamic energy values based on its different working modes like active, listen and sleep modes. We also focus an effective energy conservation by sending few number of energy abundant nodes to active states to support reliable data transmission. In this paper, we present an efficient reduction of energy consumption plus reliable packet delivery based on optimal cluster formation and markov model for mobile sensor networks. For implementing optimal clusters, we meticulously use k-medoids algorithm as a primary method and next based on node's communication cost, residual battery energy and its movements, transition probability matrix is obtained. This matrix is further utilized to forecast the reliable path for data transmission from source to destination. © 2016 IEEE.

Loading Sri Siddhartha Institute of Technology collaborators
Loading Sri Siddhartha Institute of Technology collaborators