International Journal of LNCT

ISSN (Online):2456-9895

 

 

Volume-2 Issue-4 February-2018

[1]  Analyze the performance of feature based image fusion techniques with optimization methods



Usha Thakur , Sonal Rai and Shiv K. Sahu


Image Fusion is a process of combining the relevant information from a set of images of the same scene into a single image and the resultant fused image will be more informative and complete than any of the input images. Input images could be multi sensor, multimodal, Multi-focus or multi temporal [4]. The proposed methods is shows better results compare than other existing techniques. The value of image quality are measured in the terms of like Information Entropy, and Standard Deviation.

[2]  Recent survey on fuzzy mapping based image contrast enhancement techniques



Sarla Gautam, Tripti Saxena and Vijay Trivedi


The principal objective of enhancement techniques is to process an image so that the result is more suitable than the original image for a specific application. So, the definition of image enhancement is a fairly broad concept that can encompass many applications such as forest mapping classification techniques, Project scope definition, scope verification, scope change control, Global and Indian Geoinformatics Market. In recent years, many researches have been done to enhancement on low contrast image by using the fuzzy image processing method. The main focus of this paper is to provide survey on image enhancement using fuzzy image processing techniques.

[3]  Enhancement of adaptive fuzzy inference-system for variable speed control of


-wind power generation systems



Amit Singh Sengar, Rohit Kumar Gupta and Amol Kumar Barve


In this paper, a new approach of optimal Economical sizing of a Hybrid PV-Wind energy system is presented in order to assist the designers to take into consideration both the economic and ecological aspects. This thesis presents the various optimization techniques to design the hybrid PV-wind system. The hybrid system consists of photovoltaic panels and wind turbines. Fuzzy logic Based Optimization techniques are utilized to minimize the formulated objective function, i.e. total cost which includes initial costs, yearly replacement cost, yearly operating costs and maintenance costs and salvage value of the proposed hybrid system. It also presents the application and performance comparison system with fuzzy and without fuzzy techniques for optimal sizing of Hybrid PV/Wind energy system. One computer program and one matlab model are designed, using MATLAB code to formulate the optimization problem by computing the coefficients of the objective function. Finally, the optimal solution is achieved by fuzzy logic optimization method.

[4]  Modeling and analysis of fuzzy pi controllers using multiple fuzzy sets



Juveriya Anwer, Amol Barve and Sujeet Soni


Using multiple symmetric fuzzy sets (N1>= 3 for the input e, N2>= 3 for the input ?e, and N3>=5 for the output) on the inputs of different universes of discourse mathematical conception of contrasting fuzzy PI/PD controllers is done. It is possible to attain 8 antithetic models of controllers. The elemental units of these controller configurations includes components like Rule Base, Fuzzifier and Defuzzifier, Fuzzy Inference Engine and most significantly a rule base containing Bounded Sum / Maximum t-conorm (OR operator), Mamdani Minimum/Larsen Product inference, linear rules, Algebraic Product / Minimum t- norm (AND operator), and Cos defuzzification method. Based on both instinctive and adept knowledge, structure parameters can be designed as linguistic variables and which resulted in design of their respective membership functions. In the form of IF-THEN rules, Fuzzy logic control aims to incorporate intuition, which directs towards conclusions from these rules. Thus, nonlinear system with extreme complication and unstability can be efficiently regulated based on fuzzy rules without trading with error-prone mathematical models. It is depicted that the aggregation of a 2-D multigrade relay and a general nonlinear PI controller is the production of fuzzy controller that governs the control action obtained by the multilevel relay.

[5]  Haze removal foggy images with denoising algorithm



Anjali Soni, Ratnesh Dubey and Vijay Trivedi


Fog removal is highly desired in both computational photography and computer vision applications. Proposed technique uses a Dark Channel Prior method. Using this method we can directly conclude the thickness of the haze and recover a high quality haze free image, since the foggy images suffer from low contrast and resolution due to scattering of light and poor visibility conditions. Histogram Equalization is applied in the resulted image of dark channel prior method. the noise that affect foggy image can also be reduced by using the Gaussian low pass filter, it is a frequency filtering method compared to other filtering techniques, it corrects variable lighting and removes the high frequency components from image like salt and paper noise etc. By this technique the visual ability and color of the foggy image can be corrected .Experiments are conducted on PSNR and AMBE parameters. Proposed Method has least average AMBE values and Higher PSNR values among other methods.

[6]  Economic load dispatch with the help of simulated annealing



Puja Bhatt, Manvendra Singh Kaurav and Rohit Kumar Verma


This paper gives an effective simulated annealing (SA) algorithm with a single determination variable to solve the economic load dispatch (ELD) problems. The philosophy involves the introduction of a new decision variable through a discreet mathematical transformation of the relation between the decision variable and the optimal generations. The objectives of ELD problems in electric power generation is to programmed the devoted generating unit outputs so as to meet the compulsory load demand at lowest amount operating cost while satisfying all units and system equality and inequality constraints. Global optimization approaches is inspired by annealing process of thermodynamics. The proposed SA algorithm presented here is applied to two case studies, which analyze power systems having 6 and 10 generating units. The results determined by the proposed approach are compared to those found by MPSO.

[7]  Harmonics reduction in micro grid application using both PI controller and APF technique



Akashdeep Soni and Vikash kumar


Suddenly increased or decreased in the distribution systems. These loads can be shown as non-sinusoidal currents from the AC mains and causes the load harmonics and reactive power, and excessive neutral currents. These Harmonics gives pollution in the power systems. Hence these non-linear loads created many pollution problems in the power systems. These type of problem prevents fast switching for power electronic devices. Here we use Shunt active filter which is based on current controlled PWM converters are seen as a most viable solution. The reactive power compensation and harmonics presents in this paper by IP controlled shunt active from 3P4W micro- grid Distribution system. By using this technique we generate desired compensation current extraction based on offset command instantaneous currents distorted or voltage signals in the time domain because compensation time domain response is quick, easy implementation and lower computational load compared to the frequency domain.

[8]  Analysis of low power (SRAM) static random access memory design



Vineet Singh and Mukul Shrivastava


In electronics embedded memories requires for a large scale of the overall silicon area and power consumption in modern SoC(s). Current trends on transistor scaling combined with the low-power applications in electronics devices. It increases the chance of susceptibility of VLSI circuits for soft-errors detection, especially exposed to extreme environmental conditions, for space applications. The most exdesignent part of these circuits is memory it covers large areas of the silicon die data storage. Radiation hardening of embedded memory blocks commonly gained for use of extremely large bit designs and for a relatively high operating voltage; however, in additional resulting area overhead, this limits operating voltage of the entire system for significant power consumption. In this paper, we propose the static random access memory (SRAM) bit design uses the low-voltage supply. It proposed 13T dual-driven separated-feedback mechanism to charge deposits as high as 500 fC at a scaled 500-mV supply voltage. The article is achieved with a design layout that is only 2 times larger than 6T SRAM design with standard design rules.

[9]  Energy conservation approach to enhance the lifetime of wireless

sensor network in different layers of communication protocols

 



Ankit Kumar Shukla and Dhanpratap Singh


Wireless sensor networks(WSN), are similar to wireless ad hoc network in the sense that they rely on wireless connectivity and spontaneous formation of networks so that sensor data can be transported wirelessly. The unique network characteristics present several challenges in the design of sensor networks that involve limited battery capacity, limited hardware resources, massive and random deployment, dynamic and unreliable environment. Out of these, one of the challenging issues is to conserve the energy of nodes as much as possible to increase the lifetime of the node. Recent advances in WSNs have led to many new protocols where energy awareness is an essential consideration. Attention has been given to the network layer protocols to find ways for energy efficient and reliable route a setup to maximize network lifetime. Energy efficiency and lifetime of a network are challenging issues in WSNs. Number of protocols based on energy conservation have been proposed in literature but only few consider Quality of Service (QoS) parameters along with energy efficiency. Additionally two protocols, Improved Breadth First Search (IBFS) and Enhanced BFS (EBFS) on stable and optimal route formation based on graph theory have been proposed. Along with this, a pre deployment non-uniform node distribution strategy for enhancing the lifetime of the network for sector based network is proposed. Results have been evaluated theoretically as well as through simulations. It has been analyzed that the proposed hierarchical protocols achieve significant improvement in terms of delay, energy consumption, stability and network lifetime over other popular existing protocols like LEACH, PEGASIS, WCA and IWCA etc.

[10]  A novel LSB based multi-level encryption image steganography:a review

 



Ganga Verma and Vikram Rajpoot


In today's world there is a lot of advancement in technology especially in communication which is leading us to live a happy life and on the other side it is also leading us to live an insecure life due to exploitation of advanced technology in communication. Now exploitation has become the major criteria which should be solved. To solve this issue various techniques such as Cryptography, Watermarking, Steganography and some other different techniques have been developed. The main goal of using the steganography is to avoid drawing attention to the transmission of hidden information. If suspicion is raised, then this goal that has been planned to achieve the security of the secret messages, because if the hackers noted any change in the sent message then this observer will try to know the hidden information inside the message. Steganography is the art and science of hiding important information in such a way that only the specific person can retrieve the hidden information. These review research highlighted on LSB based Steganography techniques.

[11]  Performance analysis of dual ring WDM network with outer/inner ring failure

 



Shabana Khan and Manish Shrivastava


In large WDM network, failure can disturb the functioning of multiple devices, so continuous working of WDM network is required. This problem is identified as survivability of WDM network. This paper presents the concept of survivable of WDM network by implementing the proposed Dual ring Dual connection topology. We proposed a dual ring dual connection topology for the availability of WDM network and analysis the different link failure. Routing and re-routing schemes will be analyzed for assigning routes.

[12]  Review of high speed integrated circuit of finite impulse response filter

 



Piyush Gour and Santosh Jha


This paper presents efficient modified distributed arithmetic (MDA)-based approaches for low delay reconfigurable implementation of finite impulse response (FIR) filters whose filter coefficients change during runtime. Conventionally, for reconfigurable DA-based implementation of FIR filter, the lookup tables (LUTs) are required to be implemented in ROM; and the ROM-based LUT is found to be costly for application specific integrated circuit (ASIC) implementation. Therefore, a shared-LUT design is proposed to realize the MDA computation. Instead of using separate registers to store the possible results of partial inner products for DA processing of different bit positions, registers are shared by the DA units for bit slices of different weightage. The all design implemented in Xilinx Virtex-5 FPGA device (XC5VSX95T-1FF1136).

[13]  Review paper on multi-level discrete wavelet transform using different technique

 



Nagma Mansooy and Sohed Munir


A relative report are diverse kinds of discrete wavelet change (DWT) engineering is exhibited in the paper. DWT is give great determination in both time and recurrence. Numerous kinds of procedure are planned into DWT design. In any case, 2's supplement based plan is the best outline of other plan. It is the fundamental issue of this outline in various full snake is more required. Defeat this issue is intended to canonic marked digit (CSD) has been connected DWT engineering to decrease the full viper. CSD based DWT engineering is appropriate for some advanced flag handling (DSP) applications. The diagram of CSD strategy displayed in this paper.

[14]  Survey paper on multiplier-less 1-D discrete wavelet transform based on NEDA technique

 



Nagma Mansooy and Sohed Munir


Traditional disseminated math (DA) is well known in field programmable entryway cluster (FPGA) plan, and it includes on-chip ROM to accomplish fast and normality. In this paper, we portray fast zone proficient 1-D discrete wavelet change (DWT) utilizing 9/7 channel based new effective dispersed number juggling (NEDA) Technique. Being region productive design free of ROM, increase, and subtraction, NEDA can likewise uncover the repetition existing in the snake exhibit comprising of sections of 0 and 1. This design underpins any size of picture pixel esteem and any level of decay. The parallel structure has 100% equipment usage effectiveness.

[15]  A review on real time text mining on web data

 



Dheeraj Motiyani, Ratnesh Kumar Dubey and Sadhna Mishra


Text mining is becoming an exciting field for research as it tries to discover new and valuable information from unstructured texts. The unstructured data in texts form contains large amount of complex raw data. In this paper, we perform text mining techniques on web data through which we can make a decision. For performing text mining techniques we are using R programming. One of the main reason of using R is an open source and its comes with millions of packages packages through which we can easily analyse the large datasets in a sufficient time. Because in most of the companies 80% of data is in unstructured form, while most types of analysis only work with structured data. In this paper, we will use R packages to analyze unstructured text.