Tirumala Engineering College

Hyderabad, India

Tirumala Engineering College

Hyderabad, India
Time filter
Source Type

Haritha P.,Yogi Vemana University | Martin I.R.,University of La Laguna | Dwaraka Viswanath C.S.,Sri Venkateswara University | Vijaya N.,Tirumala Engineering College | And 4 more authors.
Optical Materials | Year: 2017

The barium yttrium fluoride BaYF5 nanocrystalline powders doped with different concentrations of Dy3+ ions have been synthesized via a hydrothermal method and studied their structural, morphological, thermal, vibrational, and optical properties. These nanopowders have been crystallized in a single phase of the tetragonal structure with the average size of around 30 nm having spherical shape in morphology. Upon excitations at 350 and 387 nm, Dy3+ -doped BaYF5 nanocrystals exhibit strong blue and yellow emissions ascribed to the 4F9/2 → 6H15/2 and 4F9/2 → 6H13/2 transitions, respectively. Decay curves of the 4F9/2 level of Dy3+ ion in BaYF5 nanocrystals exhibit non-exponential nature due to the dipole-dipole interaction between Dy3+ ions, confirmed by Inokuti-Hirayama model. The quantum yield for these nanocrystals have been found to be increased from 4.64% to 11.61% as the concentration of Dy3+ ions increases from 1.0 mol% to 2.0 mol% and then decreased to 10.68% as the dopant concentration increased to 5.0 mol%. Moreover, color coordinates and correlated color temperatures have been evaluated as a function of concentration and excitation wavelength and found to be in the warm white light region for all Dy3+ concentrations. © 2017 Elsevier B.V.

Naik R.L.,Tirumala Engineering College
Quantum Information Processing | Year: 2015

The primary goals of security such as authentication, confidentiality, integrity and non-repudiation in communication networks can be achieved with secure key distribution. Quantum mechanisms are highly secure means of distributing secret keys as they are unconditionally secure. Quantum key distribution protocols can effectively prevent various attacks in the quantum channel, while classical cryptography is efficient in authentication and verification of secret keys. By combining both quantum cryptography and classical cryptography, security of communications over networks can be leveraged. Hwang, Lee and Li exploited the merits of both cryptographic paradigms for provably secure communications to prevent replay, man-in-the-middle, and passive attacks. In this paper, we propose a new scheme with the combination of quantum cryptography and classical cryptography for 802.11i wireless LANs. Since quantum cryptography is premature in wireless networks, our work is a significant step forward toward securing communications in wireless networks. Our scheme is known as hybrid quantum key distribution protocol. Our analytical results revealed that the proposed scheme is provably secure for wireless networks. © 2015, Springer Science+Business Media New York.

Kondaiah V.V.,Tirumala Engineering College | Rao J.S.,RGUKT | Subba Rao V.V.,JNTUK
Lecture Notes in Electrical Engineering | Year: 2016

The electro-magnetic actuator presents a solution for most of the technical problems of the traditional mechanical bearings since it ensures the total levitation of a body in space eliminating any mechanical contact between the stator and the levitated body. In practice there is lot of difference between theoretical force and actual force developed between the stator and rotor of an actuator and it varies with air gap and current. This difference is mainly due to different losses in the system. In the present work a correction factor is introduced to account for different losses. A radial basis function neural network (RBFNN) has been implemented to estimate the correction factor and validated with experimental values. The RBF network has been used to estimate the actuator parameters namely force, position stiffness and current stiffness. The RBF predicted values have been validated with the experimental values. © Springer India 2016.

Rao L.B.,Gokaraju Rangaraju Institute of Engineering and Technology | Rao C.K.,Tirumala Engineering College
Mechanics Based Design of Structures and Machines | Year: 2010

This paper is concerned with the elastic buckling of circular plates with internal elastic ring support and elastically restrained edge against rotation and translation. The classical plate theory is used to derive the governing differential equation for circular plate with internal elastic ring support and elastically restrained edges. This work presents the existence of buckling mode switching with respect to the radius of internal elastic ring support. The buckling mode may not be axisymmetric as previously assumed. In general, the plate may buckle in an axisymmetric mode but when the radius of the ring support becomes small, the plate may buckle in an asymmetric mode. The optimum radius of the internal elastic ring support for maximum buckling load is also determined. The percentage of increase in buckling load capacity by introducing concentric elastic ring support is determined for the first time. Extensive data are tabulated so that pertinent conclusions can be arrived at on the influence of rotational and translational restraints, Poisson's ratio, and other boundary conditions on the buckling of uniform isotropic circular plates. The numerical results obtained are in good agreement with the previously published data. Copyright © Taylor & Francis Group, LLC.

Rao L.B.,Gokaraju Rangaraju Institute of Engineering and Technology | Rao C.K.,Tirumala Engineering College
Mechanics Based Design of Structures and Machines | Year: 2011

This study deals with the exact buckling solutions of annular plates with an elastically restrained guided edge against translation. The classical plate theory is used to derive the governing differential equation for annular plate with elastically restrained guided edge against translation. The buckling mode may not be axisymmetric as previously assumed. In certain cases, an asymmetric mode would yield a lower buckling load. This is due to switching of mode. This work presents the critical buckling load parameters for axisymmetric and asymmetric buckling modes. Extensive data is tabulated so that pertinent conclusions can be arrived at on the influence of translational restraints, Poisson's ratio and other boundary conditions on the buckling of uniform isotropic annular plates. The numerical results obtained, are in good agreement with the previously published data. In this paper the characteristic equations are exact, therefore the results can be calculated to any accuracy. Comparison of studies demonstrates the accuracy and stability of this work. Copyright © Taylor & Francis Group, LLC.

Rao Y.S.,Gudlavalleru Engineering College | Kamaraju M.,Gudlavalleru Engineering College | Ramanjaneyulu D.V.S.,Tirumala Engineering College
2015 Conference on Power, Control, Communication and Computational Technologies for Sustainable Growth, PCCCTSG 2015 | Year: 2015

Floating-point arithmetic is ever-present in computer systems. All most all computer languages has supports a floating-point number types. Most of the computer compilers called upon floating-point algorithms from time to time for execution of the floating-point arithmetic operations and every operating system must be react virtually for floating-point exceptions like underflow and overflow. The double-precision floating arithmetic is mainly used in the digital signal processing (filters, FFTs) applications, numerical applications and scientic applications. The double-precision floating arithmetic operations are the addition, the subtraction, the multiplication, and the division. Among the all arithmetic operations, multiplication is widely used and most complex arithmetic operation. The double-precision (64-bit) floating point number is divide into three fields, Sign field, Exponent field and Mantissa field. The most significant bit of the number is a sign field and it is a 1-bit length, next 11-bits represents the exponent field of the number and remaining 52-bits are represents the mantissa field of the number. The double-precision floating-point multiplier requires a large 52×52 mantissa multiplications. The performance of the double-precision floating number multiplication mainly depends on the area and speed. The proposed work presents a novel approach to decrease this huge multiplication of mantissa. The Urdhva Tiryagbhyam technique permits to using a smaller number of multiplication hardware compared to the conventional method. In traditional method adding of the partial products are separately done and it takes more time in comparison with the proposed method. In proposed method the partial products are concurrently added with the multiplication operaton and it can reduce the time delay. The double-precision floating multiplier is implemented using Verilog HDL with Xilinx ISE tools on Virtex-5 FPGA. © 2015 IEEE.

Venkatarao J.,Koneru Lakshmaiah College of Engineering | Ramyasri C.H.,Koneru Lakshmaiah College of Engineering | Krishnareddy V.,Koneru Lakshmaiah College of Engineering | Srikanth M.,Tirumala Engineering College
International Journal of Applied Engineering Research | Year: 2014

Now a day's data mining is the most efficient process technique taking relevant data aspects from different sites and other data ware housing processes. In that top-k process generation is the main focus term in present days for retrieving top related products efficiently. Due to this apart unity of the top-k results traditionally more number of techniques were developed for efficient processing. An compelling problem, finding top-k profitable products, which have not been studied before. Given a set of products in the existing market, we want to find a set of k "top" possible products such that these new products are not dominated by the products in the existing market. Dynamic programming approach is one of the technique for extracting top-k results from different aspect terms. This technique have been faced a problem on string comparison in related data sources. In this paper we propose to develop Cronbach's alpha technique, Cronbach's alpha is a test reliability technique that requires only a single test administration to provide a unique estimate of the reliability for a given test. Cronbach's alpha is the average value of the reliability coefficients one would acquire for all possible combinations of items when split into two half-tests. Our experimental results show efficient top-k preferable products present in preferred datasets. © Research India Publications.

Raju G.J.,Tirumala Engineering College | Gopikrishna K.,Tirumala Engineering College
Journal of Electrical Engineering | Year: 2014

The power transformer protection plays vital role in power systems. Any power transformer protective scheme has to take into account the effect of magnetising inrush currents. Since during the energization of the transformer, sometimes results in 10 times full load currents and can cause maloperation of the relays. The ratio of the second harmonic to the fundamental harmonic of the inrush current is greater than that of the fault current. To avoid this we go for conventional protection scheme by sensing the large second harmonic. The second harmonic in these situations might be greater than the second harmonic in inrush currents. The differential power method has the disadvantage that the need to use voltage transforms and increased protection algorithm calculation cost. Neural networks have the disadvantage that it requires a large of learning patterns produced by simulation of various cases. This paper describes the discrimination between internal faults and inrush currents in power transformers using the wavelet transform based feature extraction technique. It is shown that the features extracted by the wavelet transform have a more distinctive property than those extracted by the fast Fourier transform due to the good time and frequency localization characteristics of the wavelet transform. The performance of this is demonstrated by simulation of different faults and switching conditions on a power transformer using MATLAB software.

Kilaru S.,Tirumala Engineering College | Narayana Y.V.,Tirumala Engineering College | Gandhiraja R.,Tirumala Engineering College
Lecture Notes in Electrical Engineering | Year: 2016

Energy efficiency of mobile network is always a challenging task. From the past decade, it is observable that the users who are using multimedia services are increasing in a rapid way. These multimedia applications require higher data rates. High data rates will consume more energy of mobile network, which results poor energy efficiency. To meet higher data rates and to achieve energy efficiency, Cognitive Mobile Network with small cell model was explained in this paper. Dynamics of the power grid also have significant impact on mobile networks, hence smart grid implementation was proposed instead of traditional power grid. Most of the existed studies on cognitive mobile network focused on spectrum sensing only. This paper focused on the cognitive radio network implementation by considering spectrum sensing and smart grid environment. An iterative algorithm was proposed to attain equilibrium condition to the problem. Interference management and energy efficient power allocation were achieved with the introduction of smart grid. Simulation results proved that optimum power allocation and energy efficiency are possible with the introduction of smart grid in the cognitive network. © Springer India 2016.

Kiran Babu Y.,Tirumala Engineering College | Narendra Babu T.,Tirumala Engineering College | Ramesh B.,Tirumala Engineering College
Proceedings - 2011 International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2011 | Year: 2011

Breadth First Search Channel Assignment(BFSCA) is a hybrid channel assignment algorithm that utilize multiple radio interfaces to improve the throughput and minimize the interference within the wireless mesh network and between the mesh network and co-located wireless mesh networks. This new channel assignment scheme allows different nodes in the same network to communicate with each other without causing too much interference to their neighbors. It is introducing Multiradio Conflict Graph(MCG) to model interference in the wireless mesh network. Breadth First Search Channel Assignment considers both the fixed channels (static) and the dynamic channels to reduce interference of the network. BFSCA will increase the network throughput greatly. © 2011 IEEE.

Loading Tirumala Engineering College collaborators
Loading Tirumala Engineering College collaborators