Pub Date : 2014-12-01DOI: 10.1109/ICCCT2.2014.7066752
A. K. Vishwakarma, K. Suresh, Uneet Kumar Singh
The use of a Real-Time Operating System (RTOS) is now quite common in embedded systems because of the requirement for multi-tasking. We present the details of our port of the popular MicroC/OS-II RTOS to an avionics platform based on a PowerPC 7410 processor with multiple peripherals including RS422, MIL1553, digital IO and timers. Also, the systematic testing that we have carried out to validate the port is also presented. Further, detailed performance measurements have been carried out, and we also compare the performance of our MicroC/OS-II port with that of RT-Linux on the same platform.
{"title":"Porting and systematic testing of an embedded RTOS","authors":"A. K. Vishwakarma, K. Suresh, Uneet Kumar Singh","doi":"10.1109/ICCCT2.2014.7066752","DOIUrl":"https://doi.org/10.1109/ICCCT2.2014.7066752","url":null,"abstract":"The use of a Real-Time Operating System (RTOS) is now quite common in embedded systems because of the requirement for multi-tasking. We present the details of our port of the popular MicroC/OS-II RTOS to an avionics platform based on a PowerPC 7410 processor with multiple peripherals including RS422, MIL1553, digital IO and timers. Also, the systematic testing that we have carried out to validate the port is also presented. Further, detailed performance measurements have been carried out, and we also compare the performance of our MicroC/OS-II port with that of RT-Linux on the same platform.","PeriodicalId":6860,"journal":{"name":"2021 RIVF International Conference on Computing and Communication Technologies (RIVF)","volume":"41 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80933082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/ICCCT2.2014.7066738
Srikanth Immareddy, Sravan Kumar Talusani
The present paper focuses on the compression system using Huffman compression algorithm for data compression. The rate of data decompression is more time consuming during the decoding of these compressed data. Various works have proposed for the enhancement of compressed data decoding. In this paper the realization and implementation of a High speed decoding Huffman coding system is proposed and the proposed architecture shows an improvement with respect to the speed of decoding operation based on multiple scan method and multi level decoder partitioning concept. As a apart of the above work the existing Huffman coding system is also implemented and its performance in terms of speed and area are compared with the proposed work.
{"title":"Multi level huffman test data compression with multiple scan chain method","authors":"Srikanth Immareddy, Sravan Kumar Talusani","doi":"10.1109/ICCCT2.2014.7066738","DOIUrl":"https://doi.org/10.1109/ICCCT2.2014.7066738","url":null,"abstract":"The present paper focuses on the compression system using Huffman compression algorithm for data compression. The rate of data decompression is more time consuming during the decoding of these compressed data. Various works have proposed for the enhancement of compressed data decoding. In this paper the realization and implementation of a High speed decoding Huffman coding system is proposed and the proposed architecture shows an improvement with respect to the speed of decoding operation based on multiple scan method and multi level decoder partitioning concept. As a apart of the above work the existing Huffman coding system is also implemented and its performance in terms of speed and area are compared with the proposed work.","PeriodicalId":6860,"journal":{"name":"2021 RIVF International Conference on Computing and Communication Technologies (RIVF)","volume":"3 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72867653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/ICCCT2.2014.7066727
A. Srinivasulu, C. SubbaRao, K. Y. Jeevan
Summary only from given. High dimensional data concerns large-volume, complex, growing data sets with multiple, and autonomous sources. As the Data increasing very drastically day-to-day, it is a major issue to manage and organize the data very efficiently. This emerged the necessity of machine learning techniques. With the Fast development of Networking, data storage and the data collection capacity, Machine learning cluster algorithms are now rapidly expanding in all science and engineering domains such as Pattern recognition, data mining, bioinformatics, and recommendation systems. So as to support the scalable machine learning framework with MapReduce and Hadoop support, we are using Apache Mahout to manage the High Voluminous data. Various Cluster problems such as Cluster Tendency, Partitioning, Cluster Validity, and Cluster Performance can be easily overcome by Mahout clustering algorithms. Mahout manages data in four steps i.e., fetching data, text mining, clustering, classification and collaborative filtering. In the proposed approach, various datatypes such as Numeric, Characters and Image datasets are classified in the several categories i.e., Collaborative Filtering, Clustering, Classification or Frequent Item set Mining. Some of the Pre-clustering techniques are also implemented such as EDBE, ECCE, and Extended Co-VAT. A non-Hadoop Clusternamed Taste recommendation Frame work is also implemented.
{"title":"High dimensional datasets using hadoop mahout machine learning algorithms","authors":"A. Srinivasulu, C. SubbaRao, K. Y. Jeevan","doi":"10.1109/ICCCT2.2014.7066727","DOIUrl":"https://doi.org/10.1109/ICCCT2.2014.7066727","url":null,"abstract":"Summary only from given. High dimensional data concerns large-volume, complex, growing data sets with multiple, and autonomous sources. As the Data increasing very drastically day-to-day, it is a major issue to manage and organize the data very efficiently. This emerged the necessity of machine learning techniques. With the Fast development of Networking, data storage and the data collection capacity, Machine learning cluster algorithms are now rapidly expanding in all science and engineering domains such as Pattern recognition, data mining, bioinformatics, and recommendation systems. So as to support the scalable machine learning framework with MapReduce and Hadoop support, we are using Apache Mahout to manage the High Voluminous data. Various Cluster problems such as Cluster Tendency, Partitioning, Cluster Validity, and Cluster Performance can be easily overcome by Mahout clustering algorithms. Mahout manages data in four steps i.e., fetching data, text mining, clustering, classification and collaborative filtering. In the proposed approach, various datatypes such as Numeric, Characters and Image datasets are classified in the several categories i.e., Collaborative Filtering, Clustering, Classification or Frequent Item set Mining. Some of the Pre-clustering techniques are also implemented such as EDBE, ECCE, and Extended Co-VAT. A non-Hadoop Clusternamed Taste recommendation Frame work is also implemented.","PeriodicalId":6860,"journal":{"name":"2021 RIVF International Conference on Computing and Communication Technologies (RIVF)","volume":"15 1","pages":"1-1"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87059294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/ICCCT2.2014.7066713
R. Zaman, K. Khan, A. Venugopal Reddy
Integrated Internet-MANET (IIM) architecture is a hybrid network which is an interconnection of the wired Internet and wireless MANET. This interconnection is facilitated through gateways. Some of the important issues in this integration are gateway discovery and gateway load balancing. So far, these issues have been addressed separately in the literature. The issues of gateway load balancing and gateway discovery are inherently interrelated. In this paper, the issues of gateway load balancing and gateway discovery are addressed together. The proposed mechanism uses the WLB-AODV routing protocol for gateway load balancing and treats the problem of finding efficient values to gateway discovery parameters as a control system and uses the Mamdani Architecture for Fuzzy Control. The proposed protocol has been simulated in ns-2 network simulator. Simulation results show that the proposed protocol gives better performance than the existing solution in terms of packet delivery ratio, end-to-end delay and normalized routing load.
{"title":"Load balanced fuzzy control based adaptive gateway discovery in Integrated Internet MANET","authors":"R. Zaman, K. Khan, A. Venugopal Reddy","doi":"10.1109/ICCCT2.2014.7066713","DOIUrl":"https://doi.org/10.1109/ICCCT2.2014.7066713","url":null,"abstract":"Integrated Internet-MANET (IIM) architecture is a hybrid network which is an interconnection of the wired Internet and wireless MANET. This interconnection is facilitated through gateways. Some of the important issues in this integration are gateway discovery and gateway load balancing. So far, these issues have been addressed separately in the literature. The issues of gateway load balancing and gateway discovery are inherently interrelated. In this paper, the issues of gateway load balancing and gateway discovery are addressed together. The proposed mechanism uses the WLB-AODV routing protocol for gateway load balancing and treats the problem of finding efficient values to gateway discovery parameters as a control system and uses the Mamdani Architecture for Fuzzy Control. The proposed protocol has been simulated in ns-2 network simulator. Simulation results show that the proposed protocol gives better performance than the existing solution in terms of packet delivery ratio, end-to-end delay and normalized routing load.","PeriodicalId":6860,"journal":{"name":"2021 RIVF International Conference on Computing and Communication Technologies (RIVF)","volume":"1 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88336842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/ICCCT2.2014.7066702
N. K. Murthy, Thogaru Abhishek Reddy, C. Paidimarry
In this paper, A Conformal finite-difference time domain (CFDTD) method using a conformal overlapping grid concept is explained. A circular micro-strip patch antenna is used as object to explain the CFDTD concept. The code is developed using MATLAB and corresponding results are explained and corresponding results compared with results produced from ADS Momentum tool. In this grid overlapping case Perfect Matched Layers are used at boundaries to truncate the unusable field components.
{"title":"Conformal finite difference time domain technique using efficient overlapping grid method to analyze curved structures","authors":"N. K. Murthy, Thogaru Abhishek Reddy, C. Paidimarry","doi":"10.1109/ICCCT2.2014.7066702","DOIUrl":"https://doi.org/10.1109/ICCCT2.2014.7066702","url":null,"abstract":"In this paper, A Conformal finite-difference time domain (CFDTD) method using a conformal overlapping grid concept is explained. A circular micro-strip patch antenna is used as object to explain the CFDTD concept. The code is developed using MATLAB and corresponding results are explained and corresponding results compared with results produced from ADS Momentum tool. In this grid overlapping case Perfect Matched Layers are used at boundaries to truncate the unusable field components.","PeriodicalId":6860,"journal":{"name":"2021 RIVF International Conference on Computing and Communication Technologies (RIVF)","volume":"37 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89343203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/ICCCT2.2014.7066700
T. Srinivas, G. Vivek
Information and Data security is of high concern for almost all organizations. Intrusion though can be dealt with use of firewalls, better and much improved ways of detecting intrusions are through advanced software, but some non technical issues may also lead to unauthorized access, if ignored. This paper attempts to discuss these issues. A survey was conducted and responses regarding cyber security were collected. The survey aims to study the awareness of cyber security among public sector employees in India. The survey further aims to study different sources through which intrusion is taking place in present scenario.
{"title":"Cyber security: The state of the practice in public sector companies in India","authors":"T. Srinivas, G. Vivek","doi":"10.1109/ICCCT2.2014.7066700","DOIUrl":"https://doi.org/10.1109/ICCCT2.2014.7066700","url":null,"abstract":"Information and Data security is of high concern for almost all organizations. Intrusion though can be dealt with use of firewalls, better and much improved ways of detecting intrusions are through advanced software, but some non technical issues may also lead to unauthorized access, if ignored. This paper attempts to discuss these issues. A survey was conducted and responses regarding cyber security were collected. The survey aims to study the awareness of cyber security among public sector employees in India. The survey further aims to study different sources through which intrusion is taking place in present scenario.","PeriodicalId":6860,"journal":{"name":"2021 RIVF International Conference on Computing and Communication Technologies (RIVF)","volume":"1 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91335544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/ICCCT2.2014.7066753
B. Sujatha, G. Srinivasa Rao, S. Nagaprasad
Nuclear Weapons are subtle Weapons with State-of-art Technology that usually utilized in warfare. These are high level explosives with huge heat and radiation they emit. just in case of Fusion Energy discharged is associate quantity of 14Mev. Currently considering these aspects .... Quantum cryptography that uses quantum physics to create a secured manner of communication protocol can have a sway on this. This is often little effort to concentrate on the following situations just in case of nuclear weapons are utilized in a district what may well be things.
{"title":"The life of quantum cryptography in view of an nuclear weapon used in a region","authors":"B. Sujatha, G. Srinivasa Rao, S. Nagaprasad","doi":"10.1109/ICCCT2.2014.7066753","DOIUrl":"https://doi.org/10.1109/ICCCT2.2014.7066753","url":null,"abstract":"Nuclear Weapons are subtle Weapons with State-of-art Technology that usually utilized in warfare. These are high level explosives with huge heat and radiation they emit. just in case of Fusion Energy discharged is associate quantity of 14Mev. Currently considering these aspects .... Quantum cryptography that uses quantum physics to create a secured manner of communication protocol can have a sway on this. This is often little effort to concentrate on the following situations just in case of nuclear weapons are utilized in a district what may well be things.","PeriodicalId":6860,"journal":{"name":"2021 RIVF International Conference on Computing and Communication Technologies (RIVF)","volume":"139 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78404668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/ICCCT2.2014.7066729
M Ram Reddy, S Alivelu Mangamma, P. Laxminarayana, A V Ramana, P. Gangadhar
In this paper, the performance of Automatic Speech Recognition (ASR) and Mean Opinion Score (MOS) are evaluated under different channel conditions over GSM Network using standard narrow band Full Rate speech and channel coding algorithms. CMU SPHINX toolkit and TIMIT speech database (8 kHz raw files) are used to evaluate the ASR accuracy. MOS values are estimated, using PESQ P.862, as recommended by ITU-T (International Telecommunication Union). In this evaluation, Rayleigh distribution for generation of channel noise is used to simulate the channel conditions. The results obtained in the experiments are reported and analyzed.
{"title":"Effects of channel conditions on the performance of ASR over GSM networks using full rate speech codec","authors":"M Ram Reddy, S Alivelu Mangamma, P. Laxminarayana, A V Ramana, P. Gangadhar","doi":"10.1109/ICCCT2.2014.7066729","DOIUrl":"https://doi.org/10.1109/ICCCT2.2014.7066729","url":null,"abstract":"In this paper, the performance of Automatic Speech Recognition (ASR) and Mean Opinion Score (MOS) are evaluated under different channel conditions over GSM Network using standard narrow band Full Rate speech and channel coding algorithms. CMU SPHINX toolkit and TIMIT speech database (8 kHz raw files) are used to evaluate the ASR accuracy. MOS values are estimated, using PESQ P.862, as recommended by ITU-T (International Telecommunication Union). In this evaluation, Rayleigh distribution for generation of channel noise is used to simulate the channel conditions. The results obtained in the experiments are reported and analyzed.","PeriodicalId":6860,"journal":{"name":"2021 RIVF International Conference on Computing and Communication Technologies (RIVF)","volume":"33 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80730379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/ICCCT2.2014.7066750
Narasimha Raju, Bhadri K Raju, V. Satyanarayana, Engg College, S. R. K. R. Engg, College
Cross-Language Information Retrieval (CLIR) is a sub field of Information Retrieval (IR). Like IR, in CLIR for a particular information need, we have to find relevant information or documents containing such information. In CLIR multiple tools must be developed to match terms containing same meaning in different languages. The usual solution is to translate the query and/or the documents before performing the search. So translation is pivotal activity in CLIR. In CLIR a wide range of techniques were proposed in the literature for translation. This paper presents a detailed insight of these techniques, with a special emphasis on recent developments.
{"title":"Translation approaches in Cross Language Information Retrieval","authors":"Narasimha Raju, Bhadri K Raju, V. Satyanarayana, Engg College, S. R. K. R. Engg, College","doi":"10.1109/ICCCT2.2014.7066750","DOIUrl":"https://doi.org/10.1109/ICCCT2.2014.7066750","url":null,"abstract":"Cross-Language Information Retrieval (CLIR) is a sub field of Information Retrieval (IR). Like IR, in CLIR for a particular information need, we have to find relevant information or documents containing such information. In CLIR multiple tools must be developed to match terms containing same meaning in different languages. The usual solution is to translate the query and/or the documents before performing the search. So translation is pivotal activity in CLIR. In CLIR a wide range of techniques were proposed in the literature for translation. This paper presents a detailed insight of these techniques, with a special emphasis on recent developments.","PeriodicalId":6860,"journal":{"name":"2021 RIVF International Conference on Computing and Communication Technologies (RIVF)","volume":"11 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87779178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/ICCCT2.2014.7066737
R. Prasad, G. Shanmukh, Rajesh Karvande
One of the ubiquitous challenges in the usage of GPS/GNSS signals in various applications is Interference. We are mindful that GNSS navigation signals are very weak signals. These signals are very sensitive to interference that disturbs the satellite navigation signals causing reduced accuracy, or sometimes even failure of the receiver to fix the user position. As the usage of GNSS based services are growing rapidly in numerous applications, there is a need to develop a cost effective method to detect and confine various interference signals. This paper describes various types of interference that occur to GNSS signals, the effect on the operation of GPS receiver which is a part of reference while designing a GPS receiver. The overall objective of this paper is to analyse various interference signals that effect GPS L1 C/A Code using an off the shelf GPS receiver in tracking mode. Detail results and conclusion explained at the end.
{"title":"Analysis of various RF-interference effects in GPS L1 C/A code receiver in tracking mode","authors":"R. Prasad, G. Shanmukh, Rajesh Karvande","doi":"10.1109/ICCCT2.2014.7066737","DOIUrl":"https://doi.org/10.1109/ICCCT2.2014.7066737","url":null,"abstract":"One of the ubiquitous challenges in the usage of GPS/GNSS signals in various applications is Interference. We are mindful that GNSS navigation signals are very weak signals. These signals are very sensitive to interference that disturbs the satellite navigation signals causing reduced accuracy, or sometimes even failure of the receiver to fix the user position. As the usage of GNSS based services are growing rapidly in numerous applications, there is a need to develop a cost effective method to detect and confine various interference signals. This paper describes various types of interference that occur to GNSS signals, the effect on the operation of GPS receiver which is a part of reference while designing a GPS receiver. The overall objective of this paper is to analyse various interference signals that effect GPS L1 C/A Code using an off the shelf GPS receiver in tracking mode. Detail results and conclusion explained at the end.","PeriodicalId":6860,"journal":{"name":"2021 RIVF International Conference on Computing and Communication Technologies (RIVF)","volume":"12 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87791235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}