Special Issue No. – 2, August, 2019

National Conference on Advancement in Engineering, Science & Technology

Bharath Institute of Higher Education and Research, Chennai, Tamil Nadu, India

High Performance Matrix Multiplication based on Xilinx Virtex FPGA

Authors:

S. Arulselvi,B. Karthik,M. Jasmin,Balaji S,

DOI:

https://doi.org/10.26782/jmcms.spl.2019.08.00051

Abstract:

Concurrent data processing is used is used to rise the computational speed of computer system in parallel processing. This is implemented by pipeline processing. In this article we offered design of a Pipelined Matrix Multiplier and its results is stored in matrix. We present design and stimulate a functional Pipelined Matrix Multiplier Unit. By which we can learn about the working of Pipelined Matrix Multiplier and how pipelining works. We also get the knowledge of clock timing and learn to make a timing critical design. In this Pipelined Matrix Multiplier Unit design we use design compiler, which is a module of Synopsys tools that uses lsi_10k library and BCCOM method to synthesis the design and simulate the design through VCS compiler.

Keywords:

Parallel processing,Pipelining,Matrix multiplier,Clock timing,design area,

Refference:

I. AlmasharyB., S. M. Qasim, S. A. Alshebeili, and W. Almasry,
“Realization of Linear Back-Projection Algorithm for Capacitance
Tomography Using FPGA”, Proc. of 4th World Congress on Industrial
Process Tomography, Aizu, Japan, pp. 87-93, Sept. 2005.
II. Fisher J.A. “Trace scheduling:a technique for global Micro code Compation.
”IEEE Trans.on Computers,C(30)7:478,August,2005.
III. FoleyJ. D., A. van Dam, S. K. Feiner, and J. F. Hughes, “Computer Graphics,
Principles and Practice”, AddisonWesley, second edition, 1996.
IV. JangJ., S. Choi, and V. K. Prasanna, “Area and Time Efficient
Implementation of MatrixMultiplication OnFPGA”, InProceedings of the
IEEE International Conference on Field-Programmable Technology, 2002.
V. Jianwen L.and J.C.Chuen,“Partially Reconfiguarble Matrix for Area and
Time Efficiency on FPGAs”, In proc. of EuromicroSymp on Digital System
Design, pp. 244-248,2004

VI. Kittitornkun S. and Y. H. Hu, “Mapping Deep Nested Do-loop DSP
Algorithms to Large Scale FPGA Array Structures,” IEEE Trans. on
VLSI Systems, Vol. 11, No. 2, pp. 208–217, April 2003.
VII. Mak W. K. and L. Hao, “Placement for modern FPGAs,” in Proc. of
Emerging Information Technology Conference, pp. 1-4, 2005.
VIII. ManohararajahV., S. D. Brown, and Z. G. Vranesic, “Heuristics for area
minimization in LUT-based FPGA technology mapping,” IEEE Trans. on
Computer Aided Design of Integrated Circuits and Systems, Vol. 25, No. 11,
pp. 2331-2340, 2006
IX. McCanny J. V. and J. C. White, “VLSI Technology and Design”, Academic
Press, 1987.
X. ScrofanoR., J.-W. Jang, and V. K. Prasanna, “Energy-Efficient discrete
cosine transform on FPGAs,” in Proc. Engineering of Reconfigurable
Systems and Algorithms (ERSA), 2003, pp. 215–221
XI. SrivastavaN., J. L. Trahan, R. Vaidyanathan, and S. Rai, “Adaptive image
filtering using run-time reconfiguration,” in Proc. Reconfigurable
Architectures Workshop (RAW), 2003.

View | Download

Generation Of Electricity Using Bladeless Wind Turbine

Authors:

B. Hemalatha,Balaji. S,S.Saravana,M. Prudhvi Bharadwaja Reddy,

DOI:

https://doi.org/10.26782/jmcms.spl.2019.08.00052

Abstract:

Wind power is considered one of the most reliable and sustainable alternatives. By the combination of improved technology and diminishing prices, its usage has increased in recent years. However, before wind can become the most viable form of alternative energy, certain barriers need to be overcome. For example, there are some indications that large-scale wind farms can cause high levels of bird and bat mortality, large turbines and wind blades have been known to have a negative impact on local aesthetics. The importance for switching to hasslefree and easier convenient streams within wind energy, for example, like adopting various principles, have affected to larger scale in the society.

Keywords:

Bladeless Wind Turbine,vortex Induced Vibration,Linear Alternator Method,

Refference:

I. Ahyan Demirbas ., “Waste energy for life cycle assessment ” Vol. 1, ISBN:
978331940551
II. Blayan.k Santhosh Fernandes Shreerama P, R Thilak Raj “Wind Power
Generation.”Harshith. Paper No. (IJSRD 2321-0613 Vol.4.Issue 03, 2016)
III. Gaurao Ghoate, Saurabh Bobde “Study of Vortex Induced Vibrations for
harvesting energy”IJIRST –International Journal for Innovative Research in
Science & Technology| Volume 2 | Issue 11 | April 2016 ISSN (online): 2349-
6010.
IV. Harshith K, Blayan Santhosh Fernandes. “Bladeless wind power generation”
Prof. IJSRD – International Journal for Scientific Research & Development|
Vol. 4, Issue 03, 2016 | ISSN (online): 2321-0613.
V. Manwell JF, McGowan JG, Rogers AL. Introduction: Modern Wind Energy and
its Origins. Wind Energy Explained: John Wiley & Sons, Ltd; 2009. p. 1-22.
VI. Patel, “Impact of Wind Turbine Generators on Network Resonance and
Harmonic Distortion,” Electrical and Computer Engineering (CCECE), 2010
23rd Canadian Conference on, pp. 1, 2010.
VII. Sohail Shafii, Herald Obermaier ., “Design And Fabrication analysis of Vertical
Blade Axis Wind Turbine and a Simple Alternator” (The 9th International
Forum on Strategic Technology (IFOST), October 21-23, 2014, Bangladesh)
VIII. https://indiegogo.com/project/vortex-bladeless-a-wind-generator-withoutblades–
3#/
IX. https://www.researchgate.net/publication/220690236_Vortex_methods_-
_theory_and_practice.
X. www.vortexbladeless.com/technology.php

View | Download

Runtime adaptive Dynamic Voltage Frequency Scaling technique for reducing the power consumption in Multi Processor System On Chip

Authors:

M. Jasmin,S. Philomina,

DOI:

https://doi.org/10.26782/jmcms.spl.2019.08.00053

Abstract:

In VLSI due to recent advancements , there is a need for integration of multiple processors into a single chip. System on chip (Soc) and MPSoc consist of many processors on a single dye. In Soc power dissipation is the most critical factor, which has to be given more importance.Hence power optimization techniques have been proposed.To have an effective analysis on Power optimization ,surveys on various power optimization techniques have been presented. Power dissipation that occurs in digital circuits is mainly due to the logic elements, clocks, memories and other components. To minimize the power dissipation various techniques are analysed to achieve an effective integration of all types of SOCs with increased bandwidth and frequencies Network on chip (NoC) has been later evolved .But NoC consumes more power due to high operating frequencies.So there is a need to reduce power during compilation to increase the performance of the system. Power optimization during run time compilation is alsoexplained.In NOC power is mainly utilized during the data communication between various processing elements. Hence power utilization due to the communication links in the digital circuits is discussed. The methodologies to implement dynamic voltage and frequency scaling (DVFS) in digital design have been discussed. This paper mainly focuses on Various power optimization techniques for reducing the power utilization in network .

Keywords:

DVFS,MPSoC,SoC,NoC,

Refference:

I. E.Beigne, F.Clermidey, H.Lhermet,S.Miermont , Y.Thonnart, X.Tran,
A.Valentin, D.Varreau , P.Vivet, X.Popon, and H.Lebreton, “An
asynchronous power aware and adaptive NOC based circuit,” IEEE Journal
of solid-state Circuits, Vol 44 , pp. 1167 – 1177, Apr2009.
II. S.Beulah Hemalatha,T.Vigneshwaran,M.Jasmin “Survey on Energy
efficient Methodologies and architectures of Network-on-Chip”Indian
Journal of Science and Technology,Vol 9(12), pp 1-8,2016.
III. K.Choi, M.Soma, and M. Pedram , “Fine-grained dynamic voltage and
frequency scaling for precise energy and performance tradeoff based
on the ratio of off-chip access to on-chip computation times,” IEEE
Transactions on Computer-Aided Design of Integrated Circuits and
Systems, Vol 24, pp.18-28,Nov2006.
IV. E.Y. Chung, L.Benini,and G.D.Micheli, “Contents provider-assisted
dynamic voltage scaling for low energy multimedia applications,”
Proceedings of the 2002 International Symposium On Low Power Electronics and
Design, ISLPED ’02, Aug.2002,pp. 42-47.
V. X.Chen , Z. Xu, H. Kim, P.Gratz, J.Hu, M.Kishinevsky, and U.Ogras, “Innetwork
monitoring and control policy for DVFS of cmp networks-on-chip
and last level caches”. In Journal ACM Transactions on Design
Automation of Electronic Systems (TODAES) ,Vol 18, pp.43-50, July
2012.
VI. T.R.DaRosa, “ Power Consumption Reduction in MPSoCs through DFS”in
Integrated Circuits and System Design (SBCCI), pp 1-6,Sep 2012
VII. S.Das, C.Tokunaga, S.Pant , W.H.Ma,S.Kalaiselvan, K.Lai, D.M. Bull,
D.T.Blaauw, and Razorii “In situ error detection and correction for PVT and SER tolerance”, IEEE Journal of Solid State Circuits, JSSC,Vol
44,pp.32-48,Jan 2009.
VIII. K.Goossens, D.She, A.Milutinovic, and A.Molnos, “Composable Dynamic
Voltage and Frequency Scaling and Power Management for Data flow
Applications”, 13th Euromicro Conference on Digital System
Architecture, Methods and tools,Lille, Sep.2010,pp.107-114 .
IX. C.H.Hsu and W.C. Feng, “Effective dynamic voltage scaling through CPU –
boundedness detection,” inPower-AwareComputer Systems, pp. 135–
149,Dec2004.
X. C.L.Hsu, W.T.Wang, andY.F.Hong, “Frequency-scaling approach for
managing power consumption in NoCs”, EICE Transaction Fundamentals
Electronics Communications and Computer Science, Vol 12, pp. 3580–3583
, Dec2005.
XI. J.Howard,S.Dighe, S.R.Vangal,P.Aserson, S.Kumar, T.Jacob,
K.A.Bowman, J.Howard , J.Tschanz ,V. Erraguntla, N.Borkar ,
V.K.De,and S.Borkor , “A 48-core ia-32 processor in 45 nm CMOS using
on-diemessage-passing and DVFS for performance and power
scaling,” IEEE Journal of Solid-State Circuits, Vol 46,pp. 173-183,
Jan2011
XII. E.J. Kim, K.H.Yum, andG.M.Link, N.Vijaykrishnan, M.Kandemir, M.J.Irwin,
M.Yousif, and C.R.Das, “Energy optimization techniques in cluster
interconnects”, in: ISLPED ’03:Proceedings of the 2003 International
Symposium on Low Power Electronics and Design, ACM, NY, USA, IEEE
Published, , Aug 2003,pp. 459–464.
XII1 J.Kimand M.A.Horowitz, “Adaptive supply serial links with sub-1v operation
and per-pin clock recovery”, IEEE Journal Of Solid-State Circuits, Vol
37,pp.1403–1413,Nov2002.
XIV. J.Luo, J.K.Jha, and L.S.Peh, “Simultaneous dynamic voltage scaling of
processors and communication links inreal-time distributed embedded
systems” IEEE transactions on VLSI Systems,Very Large Scale Integration,
Vol15,pp.427–437,Apr 2007.
XV. F.Li, G.Chen, and M.Kandemir, “Compiler-directed voltage scaling on
communication links for reducing power consumption” in: ICCAD ’05:
Proceedings of the 2005 IEEE/ACM International Conference on Computer-
Aided Design, IEEE Computer Society,IEEE Published,May.2005,pp. 456–
460.
XVI. J. Lee, B.G. Nam,and H.G.Yoo, “Dynamic Voltage and Frequency Scaling DVFS) Scheme for Multi-Domains Power Management” in Solid State
Circuits Conference, ASSCC’07,IEEE Published ,Jeju, , Nov.2007,pp.360-
363.
.
XVII. G. Liang, and A.Jantsch “Adaptive power management for the on-chip
communication network” in Proc. 9th Euromicro Conference on Digital
System Design: Architectures, Methods and tools,DSD’06 ,IEEE
Published,Aug.2006.
XVIII. S.M.Martin, K.Flautner, T.Mudge, and D.Blaauw, “Combined dynamic
voltage scaling and adaptive body biasing for lower power microprocessors
under dynamic workloads,” in Proceedings of the International Conference ,
Computer-Aided Design,ICCAD’02IEEE Published, Nov.2002,pp. 721–725.
XIX. A.K.Mishra, R.Das, S.Eachempati, and R.Iyer,“A case for dynamic
frequency tuning in on-chip networks”. In 42nd Annual IEEE/ACM
International Symposium on Microarchitecture, Micro-42,IEEE
Published, Dec2009 , pp. 292–303
XX. L.Shang, L.Peh,and N.K.Jha, “Power-efficient interconnection networks:
dynamic voltage scaling with links” IEEE Computer Architecture Letters, Vol
1, pp.6 ,Dec2002.
XXI. V.Soteriou, N.Eisley,and L.S.Peh, “Software-directed power-aware
interconnection networks”, ACM Transactions architecture Code
Optimization, Vol 4, pp.5,Mar 2007.
XXII L.Shang, L.S.Peh, and N.K. Jha, “ Dynamic voltage scaling with links for
power optimization of interconnection networks” in Proceedings of the 9th
International Symposium on High-Performance Computer Architecture,
HPCA’03, IEEE Published, pp. 91–102,Feb 2003.
XXIII D.Shin andJ.Kim, “Power-aware communication optimization for networkson-
chips with voltage scalable links” in:CODES ISSS ’04: Proceedings of the
International Conference on Hardware/Software Code sign and
System Synthesis, IEEE Computer Society, Washington DC, USA, IEEE
Published,Sep 2004,pp. 170–175.
XXIV S.W.Son, K.Malkowski, G.Chen, and M.Kandemir , “Integrated link/CPU
voltage scaling for reducing energyconsumption of parallel sparse matrix
applications”. In 20th International Parallel and DistributingSymposium
IPDPS’06, Apr2006,pp. 339.
XXV V. Soteriou and L.S.Peh, “Dynamic Power Management for Power
Optimization of Interconnection Networks Using On/Off Links”. In Proceedings 11th Symposium on High Performance Interconnects,
Aug.2003,pp.15–20
XXVI G.Wei, J.Kim, D.Liu, S.Sidiropoulos, and M.A.Horowitz, “A variablefrequency
parallel I/O interface with adaptivepower-supply regulation”,
IEEE Journal of Solid State Circuits,,Vol 35, pp.1600–1610,Nov2000.
[XXVII] Quintin Fettes, Mark Clark, Razvan Bunescu, Avinash Karanth, “Dynamic
Voltage and Frequency Scaling in NoCs with Supervised and
Reinforcement Learning Techniques” in IEEE Transactions on
Computers,January 2018
[XXVIII] A.W.Yin, L.Guang, E. Nigussie, and P. Liljeberg “Architectural
Exploration of Per-Core DVFS for Energy-Constrained On-Chip
Networks” 12th Euromicro Conference on Digital System
Architecture,Methods and tools , DSD’09 IEEE Published, Dubrovnik ,
Aug.2009,pp 141-146.

 

View | Download

Design of Barcode Method for the Protection of Web Content

Authors:

G. Kanagavalli,Balaji. S,John Paul Praveen A,Mohanraj R,

DOI:

https://doi.org/10.26782/jmcms.spl.2019.08.00054

Abstract:

Dynamic Phishing assaults, in which offenders bait Internet clients to sites that farce real sites, are happening with expanding recurrence and are making extensive mischief unfortunate casualties. Essentially, an aggressor (phisher) fools individuals into unveiling touchy data by sending phony messages to countless clients at irregular. Clueless clients who adhere to the guidance in the messages are coordinated to well-fabricated satirize website pages and requested to give delicate data, which the phisher then takes. This kind of extortion has developed into over 70% of phishing exercises are intended to take clients' record names and passwords. With such data, an assailant can recover progressively important data from the traded off records. Measurements distributed by the counter phishing working gathering (APWG) demonstrate that, toward the finish of Q2 in 2008, the quantity of vindictive site pages intended to take clients' passwords had expanded by 258% over a similar period in 2007. Accordingly, shielding clients from phishing assaults is critical. In a general sense, clients ought to be confirmed utilizing data that they can't promptly uncover to malevolent gatherings. Putting less dependence on the client during the verification procedure will upgrade security and dispose of numerous types of extortion. Numerous enemy of phishing arrangements have been grown, for example, content investigation and HTML, to distinguish phony website pages. Be that as it may, these procedures have flopped, as phishers are presently making phishing pages with non-analyzable components, for example, pictures, formats and glimmer questions and URL's.

Keywords:

Phishing,Website page Protection,Triple DES,Barcode,

Refference:

I. APWG 2004. Phishing Attack Trends Report.
http://www.antiphishing.org/APWG_P hishing_Attack_Repor Jun2004.pdf
II. APWG,2006.Origins of the Word
III. Haijun Zhang, Gang Liu, Tommy W. S. Chow and WenyinLiu,Textual and
Visual Content Based Anti-Phishing: A Bayesian Approach.IEEE
TRANSACTIONS ON NEURAL NETWORKS, pages 1532-1546,
IV. Visual Similarity Assessment Based on Earth Mover’s Distance(EMD). IEEE
TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING,
pages 301-311 2006
V. Wenyin Liu, Xiao tie Deng, Guanglin Huang, and Anthony Y. Fu, An Anti
phishing Strategy Based on Visual Similarity Assessment. In IEEE Computer
Society, City University of Hong Kong.
VI. ‘Phishing’. http://www.anti*phishing.org/word_phish.htm

View | Download

Real Concern to High Speed VLSI Design for Interconnect Scaling

Authors:

B. Karthik,M. Jasmin,S. Arulselvi,M. Sriram,

DOI:

https://doi.org/10.26782/jmcms.spl.2019.08.00055

Abstract:

Scaling the MOS interconnection line widths, improves the layout density, but the intrinsic propagation delays along maximum length lines are becoming significant and that the coupling between adjacent lines due to ever shrinking separation is also increasing to a noticeable level. In this paper we show the effects of the classical scaling on the effective delay and the coupling capacitance.

Keywords:

MOS,High Speed VLSI,Interconnect Scaling,

Refference:

I. BaccaraniG., M. R. Wordeman, and R. H. Dennard, “Generalized scaling theory
and its application to a 1/4 micron MOSFET design,” IEEE Trans. Electron
Devices, vol. ED-3 1, pp. 452462, Apr. 1984
II. BohrM.T., Semiconductor International, Vol. 18, No.6. (1995) p.75
III. Cottrell P. E. and E. M. Burtula, “VLSI wiring capacitance,” IBM Journal of
Research and Development, vol. 29, pp. 277-287, May 1985.
IV. DennardR. H., F. H. Gaensslen, H. N. Yu, N. L. Rideout, E. Bassous, and A. R.
LeBlanc, “Design of ion-implanted MOSFET’s with very small physical
dimensions,” IEEE J. Solid State Circuits, vol. SC-9, pp. 256-268, October 1974.
V. DonathW. E., “Placement and average interconnect lengths of computer logic,”
IEEE Trans. Circuits and Systems, vol. CAS-26, pp. 272-277, April 1979.
VI. ElmoreW. C., “The transient response of damped linear networks with particular
regard to wide-band amplifiers,” Journal of Applied Physics, vol. 19, pp. 55-63,
January 1948.
VII. FerryD. K., “Interconnection lengths and VLSI,” IEEE Circuits and Devices
Magazine, vol. 1, pp. 39-42, July 1985
VIII. Steven Paul McCormick, “Modeling and Simulation of VLSI Interconnections
with Moments”. PhD thesis. Massachusetts Institute of Technology Cambridge,
MA 02139 USA.

View | Download

In Position Dampness Extent of Hydrogen Energy Chamber Car Using MEMS Feeler

Authors:

R. Mohanraj,Balaji. S,John Paul Praveen A,

DOI:

https://doi.org/10.26782/jmcms.spl.2019.08.00056

Abstract:

In today’s world, with increasing price of fuels, depletion of natural resources and pollution levels mounting up, an eco friendly and cheap alternative fuel in automobiles can be implemented. A hydrogen fuel cell makes it possible by converting the hydrogen to electricity that powers the vehicle. The proposed green fuel is hydrogen which is combined with oxygen inside the fuel cell. The byproduct is water which can be used for purposes like irrigation, domestic and industrial uses after treatment. The fuel cell efficiency is dependent on its moisture content and so a MEMS based humidity sensor is proposed for measuring the humidity.

Keywords:

Fuel cell,MEMS,humidity,COMSOL,

Refference:

I. B. Yuan; Y. Wang, “High-Accuracy FIR Filter Design Using Stochastic
Computing”, 2016 IEEE Computer Society Annual Symposium on VLSI
(ISVLSI)pp: 128 – 133, 2016.
II. Chin-Yen Lee, Gwo-Bin Lee, Micromachine- based humidity sensors with
integrated temperature sensor for signal drift compensation, J. Micromech.
Microeng. (2003) 620–627.
III. D. Zhang, G. Jullien, W. Miller, E. Swartzlander, “Arithmetic for digital neural
networks”, in Proc. IEEE 10th Symp. Comput. Arith., Jun. 1991, pp. 58-63.
IV. D. R. Lutz, D. N. Jayasimha,“Programmable modulo-K counters”, IEEE Trans.
Circuits Syst. I, Fundam. Theory Appl., Vol. 43, No. 11, pp. 939-941, Nov. 1996
V. D. C. Hendry,“Sequential lookahead method for digital counters”, IEEE Electron.
Lett., Vol. 32, No. 3, pp. 160-161, Feb. 1996.
VI. J. E. Vuillemin,“Constant time arbitrary length synchronous binary counters”, in
Proc. IEEE 10th Symp. Comput. Arith., 1991, pp.180-183.
VII. Popovici and D. Popovici, “Cellular automata in image processing” inProc. 15th Int.
Symp. Math. Theory Networks Syst., pp. 34–44.aug 2002.
VIII. Parasuraman. Technology Readiness Index (TRI) a multiple-item scale to measure
readiness to embrace new technologies, Journal of Service Research, vol. 2 no. 4,
pp.307-320,2000. https://doi.org/10.1177/109467050024001.
IX. R. Agarwal and J. Prasad. The antecedents and consequents of user perceptions in
information technology adoption, Decision Support Systems, vol. 22 no. 1, pp.15-
29,1998. https://doi.org/10.1016/S0167-9236(97)00006-7.
X. S. Poonguzhali, G.Ravindran “A Complete Automatic Region Growing Method for
Segmentation of Masses on Ultrasound Images”forCenter for Medical Electronics,
College of Engineering Guindy, Anna University, Chennai, India ,pp123-135,nov
2009.
XI. Sinop and L. Grady, “A seeded image segmentation framework unifying graph cuts
and random walker which yields a new algorithm,” in ICCV, pp. 1–8.march. 2007.
XII. The International Engineering Consortium, Speech-enabled interactive voice
response systems. 2005; Available from:
http://www.uky.edu/~jclark/mas355/SPEECH.PDF.

View | Download

Fault Diagnosis in Mixed-Mode Circuit by Using Artificial Neural Network Approach

Authors:

S. Ramya,Balaji . S,John Paul Praveen A,M.Meenakumari,

DOI:

https://doi.org/10.26782/jmcms.spl.2019.08.00057

Abstract:

In these work it is said that artificial systems are connected to finding of calamitous imperfections in the advanced piece of a nonlinear blended mode circuit. The methodology is exhibited on the case of a moderately mind boggling sigma-delta modulator. A lot of shortcomings are chosen first. At that point, issue lexicon is made, by reproduction, utilizing the reaction of the loop path to an info incline flag. This spoken to type of a carry-into table. Counterfeit neural system is then prepared for displaying (retaining) the look-into table. The conclusion is carried out so the artificial neural network is energized by broken reactions so as to introduce the deficiency codes at its yield. There were no blunders in recognizing the shortcomings amid conclusion.

Keywords:

Around 4 catchphrases or expressions in sequential request,isolated by commas,

Refference:

I. Baum, E. B., and Haussler, D., “What size net gives valid
generalization”, Neural Computing, Vol. 1, 1989, pp. 151-60.
II. Candy, J., Temes, G., “Oversampling methods for A/D and D/A
conversion”, in Oversampling Delta-Sigma Data Converters. New York:
IEEE Press, 1992, pp. 1-29.
III. Masters, T., “Practical Neural Network Recipes in C++”,Academic
Press, San Diego, 1993.
IV. Miona Andrejeviü, Milan Saviü, Miljan Nikoliü, “Fault effects in sigmadelta
modulator”, Proceedings of the ETRAN, Budva, Montenegro, June,
2005, pp. 86-89.
V. Mrþarica, Ž., Iliü, T., and Litovski, V.B., “Time domain analysis of
nonlinear switched networks with internally controlled switches”, IEEE
Trans. on Circuits and Systems – I Fundamental Theory and
Applications, Vol. 46, 1999, pp. 373-378.
VI. Vanþo Litovski, Miona Andrejeviü, Mark Zwolinski, “Analogue
Electronic Circuit Diagnosis Based on Artificial Neural Networks“,
Microelectronics Reliability, 2006, in printing.
VII. Xu, X., and Lucas, M. S. P., “Variable-Sampling-Rate Sigma-Delta
Modulator for Instrumentation and Measurement”, IEEE Transactions on
Instrumentation and Measurement, Vol. 44, No. 5, October 1995, pp.
929-932.

View | Download

Rain and Snow Detection Removal ina Real Time Video

Authors:

Sidharth Raj. R.S,B. Karthik,M. Sundararajan,S. P. Vijayaragavan,

DOI:

https://doi.org/10.26782/jmcms.spl.2019.08.00058

Abstract:

Downpour streaks disable permeability of partner degree video and present unwanted obstruction that may seriously affect presentation picture investigation. Rain streak expulsion calculations attempt and recuperate a downpour Rain streak scene. we will in general location drawback {the matter} of downpour streak expulsion from one video by defining it as a layer deterioration issue, with a downpour streak layer too mandatory on a foundation layer containing fact scene content. Existing deterioration systems utilize either slim dictionary learning methodologies or force an incidental position structure on the vibes of the downpour streaks. Though these systems will improve the general permeability, their presentation partner degree more often than not be unsatisfactory, for they tend to either over-smooth the foundation pictures or create pictures that likewise contain perceptible downpour streaks. To manage the issues, we keep an eye on the proposition approach that forces priors for each the foundation and downpour streak layers. These priors zone unit upheld mathematician blend models learned on little fixes that may oblige a spread of foundation looks comparable because the presence of the downpour streaks.

Keywords:

Rain streak,downpour streak,blend models,

Refference:

I. BarnumP. C., S. Narasimhan, and T. Kanade.Analysis of rain and snow in
frequency space. International Journal of Computer Vision, 86(2-3):256–274,
2010.
II. BossuJ., N. Hauti`ere, and J.-P. Tarel. Rain or snow detection in image
sequences through use of a histogram of orientation of streaks.International
journal of computer vision, 93(3):348 367, 2011.
III. Brewer N. and N. Liu. Using the shape characteristics of rain to identify and
remove rain from video. In Structural, Syntactic, and Statistical Pattern
Recognition, pages 451–458. Springer, 2008.
IV. Cand`esE. J., X. Li, Y. Ma, and J. Wright.Robust principal component
analysis? Journal of the ACM, 58(3):11, 2011.
V. ChandrasekaranV., S. Sanghavi, P. Parrilo, and A. Willsky.Ranksparsity
incoherence for matrix decomposition. SIAM Journal on Optimization,
21(2):572–596, 2011.
VI. CharetteR., R. Tamburo, P. C. Barnum, A. Rowe, T. Kanade, and S. G.
Narasimhan.Fast reactive control for illumination through rain and snow. In
International Conference on Computational Photography (ICCP), pages 1–10.
IEEE, 2012.
VII. ChenD., C. Chen, and L. Kang. Visual depth guided color image rain streaks
removal using sparse coding. Circuits and Systems for Video Technology,
IEEE Transactions on, 24(8):1430 – 1455, 2012.
VIII. Elad M. and M. Aharon. Image denoising via sparse and redundant
representations over learned dictionaries. Image Processing, IEEE
Transactions on, 15(12):3736–3745, 2006.
IX. FedorovR., A. Camerada, P. Fraternali, and M. Tagliasacchi.Estimating snow
cover from publicly available images. Multimedia, IEEE Transactions on,
18(6):1187–1200, 2016.
X. Garg K. and S. K. Nayar.Detection and removal of rain from videos. In
Computer Vision and Pattern Recognition (CVPR), volume 1, pages 528–
535. IEEE, 2004.

View | Download

IMPLEMENTATION OF LANGUAGE RECOGNITION SYSTEMS USING RASPBERRY PI

Authors:

K. Subbulakshmi,Balaji S,John Paul Praveen A,G. Angelo Virgin,

DOI:

https://doi.org/10.26782/jmcms.spl.2019.08.00059

Abstract:

Two top tier and flexible voice-based affirmation and language affirmation systems are portrayed in this paper. While the confirmation systems engage secure access to the media focus at home and the language affirmation structure can be utilized as a past development to normally unravel and saw substance is deciphered from its one of a kind language into another. The essential ideal position of the made system is that they can continue running on a simplicity embedded contraption, for instance, a Raspberry Pi (RPi) and using simply opensource adventures, which makes it conceivable to mimic (or) consolidate into various structures. to plan English language affirmation is predominantly engaged.

Keywords:

Speaker acknowledgment,Language acknowledgment,I-vectors,installed gadgets,open-source devices,

Refference:

I. Daniel V., Puglia P.A., and M. Puglia (2007). “RFID-A Guide to Radio
Frequency Identification”, Technology Research Corporation.
II. Eck, M.; Lane, I.; Zhang, Y., Waibel, A. 2010. “Jib-bigo: speech-tospeech
translation on mobile de-vices” IEEE Spoken Language Technology Workshop
(SLT), pp. 165 – 166.
III. G.Senthilkumar, K.Gopalakrishnan, V. Sathish Kumar “Embedded Image
Capturing System Using Raspberry Pi System”, International Journal of
Emerging Trends & Technology in Computer Science ( Vol. 3, No. 2, pp. 213-
215, April 2014
IV. Jurafsky, D., Martin, J. Speech and Language Processing. Pearson Education
Limited, 2nd ed, 944 pp. ISBN-10: 1292025433
V. Mayuri Dahake., N. N. Mandaogade. “Face Recognition System Using
Embedded System”. Journal of Chemical and Pharmaceutical Sciences, June
2016, Volume 9, Issue 2, pp 297-300.
VI. Mikhal John, “COMPARATIVE STUDY ON VARIOUS SYSTEM BASED
ON RASPBERRY-PI TECHNOLOGY”, International Research Journal of
Engineering and Technology (Vol. 5, No. 1, pp. 1486-1488, Jan. 2018.
VII. Neha Dumpati, “Implementation Aspects Of Speaker Recognition Using
Python Language And Raspberry Pi Platform”, International journal of
Professional Engineering Studies, Vol. VIII, No. 5, pp. 281-287, Aug. 2017.
VIII. Sonal Agrawal, S.Krithiga “Implementation of Speech Recognition System on
Raspberry Pi”, International Journal of Innovative Research in Computer
Science & Technology ( Vol. 3, No. 2, pp. 52-54, March 2015
IX. Surinder Kaur, Sanchit Sharma, Utkarsh Jain “Voice Command System Using
Raspberry PI “, Advanced Computational Intelligence: An International
Journal ( Vol. 3, No. 3, pp. 43-49, July 2016.
X. Sudhakar.M, Vandana Khare, D Vijay Krishna Kanth “Speech to text
conversion & display using Raspberry Pi: IOSR Journal of Computer
Engineering ( Vol. 19, No. 4, pp. 14-18, July 2017.

View | Download

Micro Electro Mechanical Systems Tilt Sensor Based Convey Expression Identification

Authors:

M. Meenaakumari,Balaji.S,John Paul Praveen A,S. RAMYA,

DOI:

https://doi.org/10.26782/jmcms.spl.2019.08.00060

Abstract:

This paper demonstrates a micro electromechanical systems tilt sensor generally subject to explanation recognizing evidence. It includes machines is a triaxialmicro electro mechanical structures tilt sensor, microcontroller, and remote show correspondence system for watch and assembling expanding speeds of banner way. This hardware module will be utilized by the Customers to record numbers, starting in cutting edge kind by impacting 4 to pass on banner. The expanding paces of hand developments evaluated by the tilt sensor are transmitted remotely to a laptop for way recognizing verification. Along these lines, by changing the circumstance (littler scale electro mechanical systems) it is prepared to exhibit all hidden letters and data’s inside the Personal Computer.

Keywords:

Micro Electro Mechanical framework tilt sensor,flag,written by hand recognizable proof,signal, handwritten identification,path algorithm,

Refference:

I. Bao L. and S. S. Intille, “Activity recognition from user-annotated acceleration
data,” Pervasive, Lecture Notes in Computer Science, no. 3001,pp. 1–17, 2004.
II. Chen Y. P., J. Y. Yang, S. N. Liou, G. Y. Lee, and J. S. Wang, “Online classifier
construction algorithm for human activity detection using a triaxial tilt sensor,”
Appl. Math. Comput., pp. 849–860, Nov. 2008.
III. DongZ., U. C. Wejinya, and W. J. Li, “An optical-tracking calibration method for
MEMS-based digital writing instrument,” IEEE Sens. J.,vol. 10, no. 10, pp.
1543–1551, Oct. 2010.
IV. Dong Z., G. Zhang, Y. Luo, C. C. Tsang, G. Shi, S. Y. Kwok, W. J. Li,P. H. W.
Leong, and M. Y. Wong, “A calibration method for MEMS inertial sensors based
on optical tracking,” in Proc. IEEE Int. Conf.Nano/Micro Eng. Mol. Syst., 2007,
pp. 542–547.
V. LamA. H. F., W. J. Li, Y. Liu, and N. Xi, “MIDS: Micro input devices system
using MEMS sensors,” presented at the IEEE/RSJ Int. Conf.Intelligent Robots
and Systems (IROS), Oct. 2002.
VI. LuoY., C. C. Tsang, G. Zhang, Z. Dong, G. Shi, S. Y. Kwok, W. J. Li, P. H. W.
Leong, and M. Y. Wong, “An attitude compensation technique for a MEMS
motion sensor based digital writing instrument,” in Proc.IEEE Int. Conf.
Nano/Micro Eng. Mol. Syst., 2006, pp. 909–914.
VII. OhJ. K., S. J. Cho, and W. C. Bang et al., “Inertial sensor based recognition of 3-
D character gestures with an ensemble of classifiers,” presented at the 9th Int.
Workshop on Frontiers in Handwriting Recognition, 2004.
VIII. PreeceS. J., J. Y. Goulermas, L. P. J. Kenney, and D. Howard, “A comparison of
feature extraction methods for the classification of dynamic activities from tilt
sensor data,” IEEE Trans. Biomed. Eng., vol. 56,no. 3, pp. 871–879, Mar. 2009.
IX. WangL., “Feature selection with kernel class separability,” IEEE Trans.Pattern
Anal. Mach. Intell., vol. 30, no. 9, pp. 1534–1546, Sep. 2008.
X. WangJ. S., Y. L. Hsu, and J. N. Liu, “An inertial-measurement-unit-based pen
with a trajectory reconstruction algorithm and its applications,” IEEETrans. Ind.
Electron., vol. 57, no. 10, pp. 3508–3521, Oct. 2010.
XI. YangJ., W. Chang, W. C. Bang, E. S. Choi, K. H.Kang, S. J. Cho, and D. Y.
Kim, “Analysis and compensation of errors in the input device based on inertial
sensors,” in Proc. IEEE Int. L. Wang, “Feature selection with kernel class
separability,” IEEE Trans.Pattern Anal. Mach. Intell., vol. 30, no. 9, pp. 1534–
1546, Sep. 2008.

XII. ZhangS., C. Yuan, and V. Zhang, “Handwritten character recognition using
orientation quantization based on 3-D tilt sensor,” presented at the 5th Annu. Int.
Conf. Ubiquitous Systems, Jul. 25th, 2008.
XIII. ZhangG., G. Shi, Y. Luo, H. Wong, W. J. Li, P. H. W. Leong, and M. Y. Wong,
“Towards an ubiquitous wireless digital writing instrument using MEMS motion
sensing technology,” presented at the IEEE/ASME Int. Conf. Advanced
Intelligent Mechatronics (AIM), Monterey, CA, Jul. 2005.
XIV. ZhouS., Z. Dong, W. J. Li, and C. P. Kwong, “Hand-written character
recognition using MEMS motion sensing technology,” in Proc.IEEE/ASME Int.
Conf. Advanced Intelligent Mechatronics, 2008, pp.1418–1423.

View | Download