Vijayawāda, India
Vijayawāda, India

Time filter

Source Type

Sridevi K.,Gandhi Institute of Technology and Management | Rani A.J.,VRSEC
International Conference on Electrical, Electronics, Signals, Communication and Optimization, EESCO 2015 | Year: 2015

This paper focuses on comparison of Particle Swarm Optimization (PSO) and Genetic Algorithms (GA) that are applied to obtain beam forming of an adaptive Uniform Circular Array (UCA). UCA geometry is targeted because of its symmetry in configuration which enables the adaptive array to scan azimuthally with minimum changes in its beam width and side lobe levels. PSO and GA are used to calculate the complex weights of the antenna elements in order to adapt the antenna to the changing environment. Comparisons are made in the context of performance of PSO and GA algorithms.PSO is less complex and has a very fast convergence over GA. The Particle Swarm Optimizer shares the ability of GA to handle arbitrary cost functions but with much simple implementation it clearly demonstrates better possibilities for its wide use in electromagnetic optimization. © 2015 IEEE.

Tulasidasu M.,DIET | Sirisha B.L.,VRSEC | Reddy K.R.,MRITS
Proceedings - 2015 International Conference on Computational Intelligence and Communication Networks, CICN 2015 | Year: 2015

Steganography is a manifestation of strategy through "indistinct quality". The science and speciality of concealing the presence of a message in the middle of sender and planned beneficiary. Steganography has been utilized to shroud mystery pictures in different sorts of documents, including computerized pictures, sound and feature. The three most essential parameters for Steganography are indistinctness, payload and heartiness. This paper presents a best approach for Least Significant Bit focused around picture Steganography that upgrades the current LSB substitution systems to enhance the security level of concealed data. All current strategies for Steganography concentrate on implanting technique with less concern to the pre-processing, for example, encryption of secret picture. In this work shrouded data is stored into distinctive position of LSB of picture utilizing block division procedure relying upon the secret key. Therefore it is hard to concentrate the concealed data knowing the recovery systems. We have used peak signal to noise ratio (PSNR) to measure the quality of stego pictures. The estimation of PSNR gives better come about in light of the fact that our proposed strategy changes little number of bits of the picture. © 2015 IEEE.

Padmavathi K.,GRIET | Sri Ramakrishna K.,VRSEC
International Journal of Electrical and Computer Engineering | Year: 2015

Atrial fibrillation (AF) is the common arrhythmia that causes death in the adults. We measured AR coefficients using Burgs method for each 15 second segment of ECG. These features are classified using the different statistical classifiers: kernel SVM and KNN classifier. The performance of the algorithm was evaluated on signals from MIT-BIH Atrial Fibrillation Database. The effect of AR model order and data length was tested on the classification results. This method shows better results can be used for practical use in the clinics. Copyright © 2015 Institute of Advanced Engineering and Science. All rights reserved.

Padmavathi K.,GRIET | Ramakrishna K.S.,VRSEC
International Journal of Systems, Control and Communications | Year: 2015

Atrial fibrillation (AF) is a type of heart ailment that occurs when atria beats quicker than normal to move blood from atria to the ventricles. Our present study proposes a technique to detect AF ECG patterns with the use of continuous wavelet transform (CWT), wavelet coherence (WTC) is presented. The wavelet coherence function finds common frequencies between two signals and evaluates similarity of the two signals. The mother wavelet used is db4. The ECG variation of atrial fibrillation (AF) is observed in lead II of ECG. For the detection of normal and AF beats, WTC output values are given as the input features for the Levenberg-Marquardt neural network (LMNN) classifier. The data was collected from MIT/BIH AF database. Copyright © 2015 Inderscience Enterprises Ltd.

Sirajuddin M.D.,S.M.C.E | Rupa C.H.,VRSEC | Prasad A.,Vikrama Simhapuri University
Advances in Intelligent Systems and Computing | Year: 2015

TCP is a connection-oriented and reliable transport layer protocol. Currently, it is most widely used protocol in the Internet. All the reliable Internet applications make use of this protocol. This protocol works well in the wired network, but it does not produce satisfactory results if it is used in the wireless networks. Usage of TCP in wireless networks leads to performance degradation, because it considers all the packets losses as due to congestion and reduces the packet sending rate, and at the same time, it diminishes the network throughput. This feature is suitable for wired networks in which packet loss mainly occurs due to congestion. However, this is inappropriate in wireless networks where packet loss occurs due to signals fading, high bit error rate, hand-off, etc. It misinterprets all packet losses as due to congestion and reduces its congestion window. This misinterpretation of packet loss mainly decreases the throughput. This paper depicts the performance of all the efficient mechanisms which have been developed to improve the performance of TCP. © Springer India 2015.

Kora P.,GRIET | Sri Ramakrishna K.,VRSEC
ARPN Journal of Engineering and Applied Sciences | Year: 2015

This paper conveys a technique for the detection of Bundle Branch Block (BBB) ECG patterns using Magnitude Squared Coherence (MSC) function. The MSC function finds common frequencies between two signals and evaluate the similarity of the two signals. The ECG variation in BBB can observed through the changes in the ECG signal. MSC technique uses Welch method for calculating t h e PSD. For the detection of Normal and BBB beats, MSC output values are given as the input features for the LMNN classifier. Overall accuracy of LMNN classifier is 98.5 percent. The data was collected from MIT/BIH arrhythmia database. © 2006-2015 Asian Research Publishing Network (ARPN).

Kora P.,GRIET | Sri Rama Krishna K.,VRSEC
Smart Innovation, Systems and Technologies | Year: 2016

Abnormal Cardiac beat identification is a key process in the detection of heart ailments. This work proposes a technique for the detection of Bundle Branch Block (BBB) using Bat Algorithm (BA) technique in combination with Levenberg Marquardt Neural Network (LMNN) classifier. BBB is developed when there is a block along the electrical impulses travel to make heart to beat. The Bat algorithm can be effectively used to find changes in the ECG by identifying best features (optimized features). For the detection of normal and Bundle block beats, these Bat feature values are given as the input for the LMNN classifier. © Springer International Publishing Switzerland 2016.

Paik H.,VRSEC | Sastry N.N.,RandD Wing | Santiprabha I.,Jawaharlal Nehru Technological University Anantapur
Proceedings of 2015 IEEE International Conference on Electrical, Computer and Communication Technologies, ICECCT 2015 | Year: 2015

In this paper, the break-lock phenomenon of phase locked loop (PLL) in missile borne monopulse radar receiver is presented. The continuous wave (CW) frequency modulated (FM) signal is used as jamming signal which is injected into the PLL along with the desired radar echo signal. The effects of key parameters in the FM CW jammer platform such as frequency sensitivity (kf), modulating signal amplitude (vm) and modulation frequency (fm) on break-lock are reported. The value of kf at which the PLL loses the frequency lock to the radar echo signal as a function of modulating signal amplitude and modulation frequency is presented. It is shown that break-lock is achieved at 3.511×109 Hz/V for a typical modulating signal amplitude of 5 mV and modulation frequency of 200 kHz, when the radar echo amplitude at the PLL input is 1 volt. The break-lock is also studied by injecting radar echo signal with different amplitude at the PLL input and the value of kf required for break-lock is reported. From these results, the frequency deviation and modulation index required for break-lock are computed and conclusions are demonstrated. The PLL with a third order passive loop filter is designed by exact method and simulation is carried out using visual system simulator (VSS) AWR software for performance evaluation. © 2015 IEEE.

Prasad R.S.,Acharya Nagarjuna University | Sangeetha Y.,VRSEC
2014 International Conference on Circuits, Power and Computing Technologies, ICCPCT 2014 | Year: 2014

To assess the software reliability by statistical means yields efficient results. In this paper, for an effective monitoring of failure process we have opted Sequential Probability Ratio Test (SPRT) over the time between every rth failure (r is a natural number >=2) instead of inter-failure times. This paper projects a controlling framework based on order statistics of the cumulative quantity between observations of time domain failure data using mean value function of Inflection S-Shaped Model. The two unknown parameters can be estimated using the Maximum Likelihood Estimation (MLE). © 2014 IEEE.

Manne S.,VRSEC | Kotha S.K.,VRSEC | Sameen Fatima S.,Osmania University
Advances in Intelligent and Soft Computing | Year: 2012

World Wide Web is the store house of abundant information available in various electronic forms. In the past two decades, the increase in the performance of computers in handling large quantity of text data led researchers to focus on reliable and optimal retrieval of information already exist in the huge resources. Though the existing search engines, answering machines has succeeded in retrieving the data relative to the user query, the relevancy of the text data is not appreciable of the huge set. It is hence binding the range of resultant text data for a given user query with appreciable ranking to each document stand as a major challenge. In this paper, we propose a Query based k-Nearest Neighbor method to access relevant documents for a given query finding the most appropriate boundary to related documents available on web and rank the document on the basis of query rather than customary Content based classification. The experimental results will elucidate the categorization with reference to closeness of the given query to the document. © 2012 Springer-Verlag GmbH Berlin Heidelberg.

Loading VRSEC collaborators
Loading VRSEC collaborators