Pub Date : 2011-12-01DOI: 10.1109/NUICONE.2011.6153275
Subodh Wairya, Garima Singh, Vishant, R. Nagaria, S. Tiwari
This paper presents a comparative study of highspeed, low-power and low voltage full adder circuits. Our approach is based on XOR-XNOR (4T) design full adder circuits combined in a single unit. This technique helps in reducing the power consumption and the propagation delay while maintaining low complexity of logic design. Simulation results illustrate the superiority of the designed adder circuits against the conventional CMOS, TG and Hybrid adder circuits in terms of power, delay and power delay product (PDP) at low voltage. Noise analysis shows designed full adder circuit's work at high frequency and high temperature satisfactorily. Simulation results reveal that the designed circuits exhibit lower PDP, more power efficiency and faster when compared to the available full adder circuits at low voltage. The design is implemented on UMC 0.18µm process models in Cadence Virtuoso Schematic Composer at 1.8 V single ended supply voltage and simulations are carried out on Spectre S.
{"title":"Design analysis of XOR (4T) based low voltage CMOS full adder circuit","authors":"Subodh Wairya, Garima Singh, Vishant, R. Nagaria, S. Tiwari","doi":"10.1109/NUICONE.2011.6153275","DOIUrl":"https://doi.org/10.1109/NUICONE.2011.6153275","url":null,"abstract":"This paper presents a comparative study of highspeed, low-power and low voltage full adder circuits. Our approach is based on XOR-XNOR (4T) design full adder circuits combined in a single unit. This technique helps in reducing the power consumption and the propagation delay while maintaining low complexity of logic design. Simulation results illustrate the superiority of the designed adder circuits against the conventional CMOS, TG and Hybrid adder circuits in terms of power, delay and power delay product (PDP) at low voltage. Noise analysis shows designed full adder circuit's work at high frequency and high temperature satisfactorily. Simulation results reveal that the designed circuits exhibit lower PDP, more power efficiency and faster when compared to the available full adder circuits at low voltage. The design is implemented on UMC 0.18µm process models in Cadence Virtuoso Schematic Composer at 1.8 V single ended supply voltage and simulations are carried out on Spectre S.","PeriodicalId":206392,"journal":{"name":"2011 Nirma University International Conference on Engineering","volume":"616 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134428557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/NUICONE.2011.6153261
Shobhit K. Patel, Y. Kosta
The area of micro strip antennas has seen some inventive work in recent years and is currently one of the most dynamic fields of antenna theory. In this research, E-shape microstrip patch antenna has been designed for GPS application (GPS L2 1227.5 MHz band) and covering the 1200 to 1280 MHz frequency band. Simulated results for main parameters such as return loss, impedance bandwidth, radiation patterns and gains are also discussed herein. The study shows that modeling of such antennas, with simplicity in designing and feeding, can well meet GPS application. A designed antenna for the GPS application at the civilian GPS frequency (1227.5 MHz) has been simulated. Two parallel slots are incorporated to perturb the surface current path, introducing local inductive effect. This antenna is fed by a coaxial probe feeding.
{"title":"E-shape microstrip patch antenna design for GPS application","authors":"Shobhit K. Patel, Y. Kosta","doi":"10.1109/NUICONE.2011.6153261","DOIUrl":"https://doi.org/10.1109/NUICONE.2011.6153261","url":null,"abstract":"The area of micro strip antennas has seen some inventive work in recent years and is currently one of the most dynamic fields of antenna theory. In this research, E-shape microstrip patch antenna has been designed for GPS application (GPS L2 1227.5 MHz band) and covering the 1200 to 1280 MHz frequency band. Simulated results for main parameters such as return loss, impedance bandwidth, radiation patterns and gains are also discussed herein. The study shows that modeling of such antennas, with simplicity in designing and feeding, can well meet GPS application. A designed antenna for the GPS application at the civilian GPS frequency (1227.5 MHz) has been simulated. Two parallel slots are incorporated to perturb the surface current path, introducing local inductive effect. This antenna is fed by a coaxial probe feeding.","PeriodicalId":206392,"journal":{"name":"2011 Nirma University International Conference on Engineering","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132712273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/NUICONE.2011.6153271
Akash I. Mecwan, Nagendra P. Gajjar
The next generation of communication will be driven by the technology called Cognitive Radio that can adapt the environment around it. It adjusts to the changes in the communication medium, modulation schemes, coding method etc. Design of the radio on the reconfigurable platform makes it more flexible in adapting the demand of communication system. The paper covers the design of transmitter and receiver on the reconfigurable platform like FPGA, so that the modulation scheme can be dynamically adapted depending on the noise in the communication medium. The FPGAs can be configured partially when in use. This advantage makes it more useful in the SDR applications. Paper discusses the design and development of SDR on virtex 5 FPGA. The results are obtained and compare at simulation level.
{"title":"Implementation of Software Defined Radio on FPGA","authors":"Akash I. Mecwan, Nagendra P. Gajjar","doi":"10.1109/NUICONE.2011.6153271","DOIUrl":"https://doi.org/10.1109/NUICONE.2011.6153271","url":null,"abstract":"The next generation of communication will be driven by the technology called Cognitive Radio that can adapt the environment around it. It adjusts to the changes in the communication medium, modulation schemes, coding method etc. Design of the radio on the reconfigurable platform makes it more flexible in adapting the demand of communication system. The paper covers the design of transmitter and receiver on the reconfigurable platform like FPGA, so that the modulation scheme can be dynamically adapted depending on the noise in the communication medium. The FPGAs can be configured partially when in use. This advantage makes it more useful in the SDR applications. Paper discusses the design and development of SDR on virtex 5 FPGA. The results are obtained and compare at simulation level.","PeriodicalId":206392,"journal":{"name":"2011 Nirma University International Conference on Engineering","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132624579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/NUICONE.2011.6153311
H. Kagra, P. Sonare
The manufacturing process of Metal to Carbon relays used in railway signaling systems for configuring various circuits of signals / points / track circuits etc. consists of seven phases from raw material to finished goods. To ensure in-process quality, the physical, electrical and various other parameters are measured manually with non-automated equipment, after each stage. Manual measurements are tedious, error prone and involve lot of time, effort and manpower. Besides, they are susceptible to manipulation and may lead to inferior quality products being passed, either due to deliberation or due to malefic intentions. Due to erroneous measurement of electrical parameters, the functional reliability of relays is adversely affected. To enhance the trustworthiness of measurement of electrical parameters & to make the process faster, an automated measurement system having proprietary application software and a testing jig attachment has been developed. When the relay was fixed on the testing jig, the software scanned all the relay contacts and measured all the electrical parameters viz. operating voltage / current, contact resistance, release voltage / current, coil resistance etc. The result was stored in a database file and ported on an internet website. Thus, the test results of individual relays were available on-line, with date & time tags and could be easily monitored.
{"title":"Process automation of metal to Carbon relays: On — Line measurement of electrical parameters","authors":"H. Kagra, P. Sonare","doi":"10.1109/NUICONE.2011.6153311","DOIUrl":"https://doi.org/10.1109/NUICONE.2011.6153311","url":null,"abstract":"The manufacturing process of Metal to Carbon relays used in railway signaling systems for configuring various circuits of signals / points / track circuits etc. consists of seven phases from raw material to finished goods. To ensure in-process quality, the physical, electrical and various other parameters are measured manually with non-automated equipment, after each stage. Manual measurements are tedious, error prone and involve lot of time, effort and manpower. Besides, they are susceptible to manipulation and may lead to inferior quality products being passed, either due to deliberation or due to malefic intentions. Due to erroneous measurement of electrical parameters, the functional reliability of relays is adversely affected. To enhance the trustworthiness of measurement of electrical parameters & to make the process faster, an automated measurement system having proprietary application software and a testing jig attachment has been developed. When the relay was fixed on the testing jig, the software scanned all the relay contacts and measured all the electrical parameters viz. operating voltage / current, contact resistance, release voltage / current, coil resistance etc. The result was stored in a database file and ported on an internet website. Thus, the test results of individual relays were available on-line, with date & time tags and could be easily monitored.","PeriodicalId":206392,"journal":{"name":"2011 Nirma University International Conference on Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130182046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/NUICONE.2011.6153235
H. Diwanji, J. S. Shah
For transferring sensitive data as in military applications it is necessary to achieve integrity, confidentiality and authenticity. In this paper, the scheme to generate encryption key with unimodal biometric fingerprint is discussed. As mobile ad hoc network does not have heavy computational power, multimodal biometric approach is not feasible. From receiver's fingerprint feature sets are generated with the help of regression model using binomial distribution. Crossover is performed on these feature sets. The encryption key generated is of 48 bits for DES algorithm. To achieve authentication digital signature is used. The proposed scheme is evaluated for cryptanalysis, brute force attack and found out that this scheme withstands against all attacks. It is also found that false accept rate is zero and false reject rate is higher.
{"title":"Enhancing security in MANET through unimodal biometric encryption key","authors":"H. Diwanji, J. S. Shah","doi":"10.1109/NUICONE.2011.6153235","DOIUrl":"https://doi.org/10.1109/NUICONE.2011.6153235","url":null,"abstract":"For transferring sensitive data as in military applications it is necessary to achieve integrity, confidentiality and authenticity. In this paper, the scheme to generate encryption key with unimodal biometric fingerprint is discussed. As mobile ad hoc network does not have heavy computational power, multimodal biometric approach is not feasible. From receiver's fingerprint feature sets are generated with the help of regression model using binomial distribution. Crossover is performed on these feature sets. The encryption key generated is of 48 bits for DES algorithm. To achieve authentication digital signature is used. The proposed scheme is evaluated for cryptanalysis, brute force attack and found out that this scheme withstands against all attacks. It is also found that false accept rate is zero and false reject rate is higher.","PeriodicalId":206392,"journal":{"name":"2011 Nirma University International Conference on Engineering","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133642450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/NUICONE.2011.6153285
M. Patwardhan
Energy plays an indispensable role in modern society. India with 17% of the world population and just 0.8% of the world's known oil and natural resources is going to face serious challenges in the coming decades. Hence energy conservation has a prime importance. Besides energy independence the devasting impact of climate change has become an issue of critical consideration. Energy production using fossil fuel is the major contributor to green house gas emissions. Hence, transition towards a low carbon energy economy is the real solution for the mitigating the impact of climate change. The project at MPKV, Rahuri undertakes to highlight the constructive development of the solar energy resources and is an attempt to resource this unused energy source to drive our daily activities of the office efficiently. It was estimated that about 2332 kwh/day electricity generation is possible by using parabolic dish installation scheme at roof top of site.
{"title":"Use of solar energy for electrical energy conservation: A case study","authors":"M. Patwardhan","doi":"10.1109/NUICONE.2011.6153285","DOIUrl":"https://doi.org/10.1109/NUICONE.2011.6153285","url":null,"abstract":"Energy plays an indispensable role in modern society. India with 17% of the world population and just 0.8% of the world's known oil and natural resources is going to face serious challenges in the coming decades. Hence energy conservation has a prime importance. Besides energy independence the devasting impact of climate change has become an issue of critical consideration. Energy production using fossil fuel is the major contributor to green house gas emissions. Hence, transition towards a low carbon energy economy is the real solution for the mitigating the impact of climate change. The project at MPKV, Rahuri undertakes to highlight the constructive development of the solar energy resources and is an attempt to resource this unused energy source to drive our daily activities of the office efficiently. It was estimated that about 2332 kwh/day electricity generation is possible by using parabolic dish installation scheme at roof top of site.","PeriodicalId":206392,"journal":{"name":"2011 Nirma University International Conference on Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129528930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/NUICONE.2011.6153284
Alpa Gopiyani, V. Patel
This paper presents a new closed-loop control strategy applied to half-bridge high power LLC Resonant Converter applicable in DC-DC applications and can be applied for other applications also. A new control circuit is designed and implemented for the high power LLC converter. A closed-loop variable frequency control through VCO is analyzed through PI Controller. Due to Zero Voltage Switching (ZVS) technique the turn-on losses of both the switches (IGBTs) in half-bridge are reduced and ZVS can be achieved for the entire control range in close-loop. Validity of PI controller and control circuit in closed-loop are verified with software simulation results for wide input and load range. A hardware prototype rated at 2.1 kW has been built with DSP TMS320F2811 and hardware results are presented to verify the control strategy. Practical results with DC-DC converter match with the simulated results and performance of control circuit is verified and tested practically with input voltage variations and load changes at different references.
{"title":"A closed-loop control of high power LLC Resonant Converter for DC-DC applications","authors":"Alpa Gopiyani, V. Patel","doi":"10.1109/NUICONE.2011.6153284","DOIUrl":"https://doi.org/10.1109/NUICONE.2011.6153284","url":null,"abstract":"This paper presents a new closed-loop control strategy applied to half-bridge high power LLC Resonant Converter applicable in DC-DC applications and can be applied for other applications also. A new control circuit is designed and implemented for the high power LLC converter. A closed-loop variable frequency control through VCO is analyzed through PI Controller. Due to Zero Voltage Switching (ZVS) technique the turn-on losses of both the switches (IGBTs) in half-bridge are reduced and ZVS can be achieved for the entire control range in close-loop. Validity of PI controller and control circuit in closed-loop are verified with software simulation results for wide input and load range. A hardware prototype rated at 2.1 kW has been built with DSP TMS320F2811 and hardware results are presented to verify the control strategy. Practical results with DC-DC converter match with the simulated results and performance of control circuit is verified and tested practically with input voltage variations and load changes at different references.","PeriodicalId":206392,"journal":{"name":"2011 Nirma University International Conference on Engineering","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126451568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/NUICONE.2011.6153253
M. Shah, Samir B. Patel
Watermarking is defined as the technique of embedding information in some cover. It takes one piece of information and embeds it within another. Mostly digital data is used for embedding. In this paper, we present a way to embed this digital information into the data packet. TCP/IP packets are transmitted over a network in large quantity. Within TCP/IP header there are number of fields that are not used for normal transmission or are "optional" to be set as needed by the sender of the packet. An analysis of the areas of a typical IP header fields that are either unused or optional reveals many possibilities where data can be stored and transmitted and this gives the intuition for finding free space within such packets. By embedding information in the options field of IP packet, we can make use of unused space of the IP header and can transmit our digital data within TCP/IP packets from sender to the receiver. One advantage of transmitting data in the header is that intruders will not have any idea that data is transmitted in the header, intruders will concentrate only on the payload of the packet. Encryption and compression however are optional in performing watermarking, but by making use of such techniques the security in the design can be incorporated. Challenges like loss of packets and many others are also handled in the design.
{"title":"Network based packet watermarking using TCP/IP protocol suite","authors":"M. Shah, Samir B. Patel","doi":"10.1109/NUICONE.2011.6153253","DOIUrl":"https://doi.org/10.1109/NUICONE.2011.6153253","url":null,"abstract":"Watermarking is defined as the technique of embedding information in some cover. It takes one piece of information and embeds it within another. Mostly digital data is used for embedding. In this paper, we present a way to embed this digital information into the data packet. TCP/IP packets are transmitted over a network in large quantity. Within TCP/IP header there are number of fields that are not used for normal transmission or are \"optional\" to be set as needed by the sender of the packet. An analysis of the areas of a typical IP header fields that are either unused or optional reveals many possibilities where data can be stored and transmitted and this gives the intuition for finding free space within such packets. By embedding information in the options field of IP packet, we can make use of unused space of the IP header and can transmit our digital data within TCP/IP packets from sender to the receiver. One advantage of transmitting data in the header is that intruders will not have any idea that data is transmitted in the header, intruders will concentrate only on the payload of the packet. Encryption and compression however are optional in performing watermarking, but by making use of such techniques the security in the design can be incorporated. Challenges like loss of packets and many others are also handled in the design.","PeriodicalId":206392,"journal":{"name":"2011 Nirma University International Conference on Engineering","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115556034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/NUICONE.2011.6153236
Jitendra Bhatia, Ankit Patel, Z. Narmawala
Network coding is a technique in which node is allowed to combine and encode one or more input packets into encoded packets instead of directly forwarding them. It increases throughput and delivery ratio. In this paper, we review basic linear network coding variants with their performance benefits and theoretical results. In practical setting, linear network coding requires central authority to control generation of meaningful encoding coefficients and for coordination between the nodes of network. In wireless network, due to dynamic nature of nodes and heterogeneity of network, centralized approach is not suitable. So, distributed approach should be used. We reviewed distributed linear network coding technique named as Random Linear Network Coding (RLNC). We also reviewed RLNC variants called Generation-by-Generation RLNC and RLNC with Multi Generation Mixing (MGM). We also reviewed the options to recover the lost encoded packets in networks where losses prevent efficient propagation of sender packets. MGM increases the decodable rate of encoded packets. We compared the performance of Generation-by-Generation Network Coding and Network coding with MGM.
{"title":"Review on variants of network coding in wireless ad-hoc networks","authors":"Jitendra Bhatia, Ankit Patel, Z. Narmawala","doi":"10.1109/NUICONE.2011.6153236","DOIUrl":"https://doi.org/10.1109/NUICONE.2011.6153236","url":null,"abstract":"Network coding is a technique in which node is allowed to combine and encode one or more input packets into encoded packets instead of directly forwarding them. It increases throughput and delivery ratio. In this paper, we review basic linear network coding variants with their performance benefits and theoretical results. In practical setting, linear network coding requires central authority to control generation of meaningful encoding coefficients and for coordination between the nodes of network. In wireless network, due to dynamic nature of nodes and heterogeneity of network, centralized approach is not suitable. So, distributed approach should be used. We reviewed distributed linear network coding technique named as Random Linear Network Coding (RLNC). We also reviewed RLNC variants called Generation-by-Generation RLNC and RLNC with Multi Generation Mixing (MGM). We also reviewed the options to recover the lost encoded packets in networks where losses prevent efficient propagation of sender packets. MGM increases the decodable rate of encoded packets. We compared the performance of Generation-by-Generation Network Coding and Network coding with MGM.","PeriodicalId":206392,"journal":{"name":"2011 Nirma University International Conference on Engineering","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115446035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/NUICONE.2011.6153241
Prajakta Rathod
This paper represents the technique for converting the text written in Hindi language into speech by using artificial neural network. Text to speech conversion software can have many applications in day to day life. It can be useful for blind people to read the document. It is useful in giving education to the students by listening what is written in books. If someone doesn't have time to read emails, he can listen the contents of email while doing other work. The document containing Hindi text is scanned and given as an input to the system, it is considered as an image. Then preprocessing is done for the document to obtained clear image. In this system neural network is used for character recognition, so the system can be enhanced to work with letters written in different style or fonts. After the letters in the document are successfully identified by neural network, the text in the document is converted into speech.
{"title":"Script to speech conversion for Hindi language by using artificial neural network","authors":"Prajakta Rathod","doi":"10.1109/NUICONE.2011.6153241","DOIUrl":"https://doi.org/10.1109/NUICONE.2011.6153241","url":null,"abstract":"This paper represents the technique for converting the text written in Hindi language into speech by using artificial neural network. Text to speech conversion software can have many applications in day to day life. It can be useful for blind people to read the document. It is useful in giving education to the students by listening what is written in books. If someone doesn't have time to read emails, he can listen the contents of email while doing other work. The document containing Hindi text is scanned and given as an input to the system, it is considered as an image. Then preprocessing is done for the document to obtained clear image. In this system neural network is used for character recognition, so the system can be enhanced to work with letters written in different style or fonts. After the letters in the document are successfully identified by neural network, the text in the document is converted into speech.","PeriodicalId":206392,"journal":{"name":"2011 Nirma University International Conference on Engineering","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116852884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}