• ijmece issn number
  • open access journal
  • impact factor
  • Home
    Current Issues
    Previous Issues

    Volume-5 Issue-3

    Title: Performance Analysis of Energy Aware Sleep Scheduling Clustered based Routing Protocol using NS2

    Authors: Rajiv Thapa, Harsukhpreet Singh and Dr. Vishal Sharma

    Abstract: In wireless sensor networks, deployed sensor nodes for detection an event and transmit the data from nodes to base station. Stability period and network lifetime is a big issue in WSN. For this purpose, a number of routing algorithms are invented. In this paper, we introduced energy aware sleep scheduling clustering based routing (EASSCR) protocol is based on clustering and cluster head (CH) selection. Hence it reduces the energy consumption and increase the stability period of network. The comparative analysis of EASSCR with LEACH and SEP on the basis of delay, packet loss, throughput and residual energy is done and it has been found that EASSCR is better.

    Download file

    Title: Design and Implementation of Bluetooth Enabled Pen Drive for Transferring Data

    Authors: Priyanka Verma and Dr. Rinkesh Mittal

    Abstract: All around us, there is data that could be gathered and processed. The problem is to gather it. Bluetooth low energy USB flash drive is a standard that promises cheap battery driven wireless system with low power consumption capable of operating for months on small batteries. For many cases, such a device seems like a perfect fit. Bluetooth low energy has been around for a few years and now it is available in many new smartphones. The purpose of this research is to evaluate the BLE standard find a way of handling BLE 4.0 is work with USB flash drive. This is done by implementing a standard system efficient of using Bluetooth low energy 4.0 with USB drive for transferring data from one to another [1].

    Download file

    Title: Advance Digital Notice Board Using Raspberry-Pi

    Authors: Prof. M. P. Gajare, Prof. D. A. Itole, Ishwar Vyavahare, Shubham Age and Vikrant tandale

    Abstract: This Notice Board is an important thing to get any information or notification in any institution or public utility places like bus stops, railway stations, colleges, malls, and other public places. But sticking various notices day to day is a difficult process. A separate person is required to take care of the notices to be displayed everywhere. This paper is about advanced wireless notice board. The project is built around ARM controller raspberry-pi which is heart of the system. An Ethernet is used for Data transmission. At any time, we can add or remove or alter the text, documents according to our requirement. At transmitter, authorized PC is used for sending notices. At receiving end Ethernet is connected to raspberry pi. When an authorized user sends a notice from his system, it is received by receiver and displayed on the screen. The data is received from user. Then it received by ARM 7 that is raspberry pi.

    Download file

    Title: A Comparison of Adaptive Equalization Techniques for MIMO-OFDM System

    Authors: Bashar Ahmed Mohammed and Siddeeq Y. Ameen

    Abstract: The paper investigates the performance enhancement of MIMO-OFDM system by using four proposed adaptive algorithms AtanLMS, LogLMS, LnLMS and ExpLMS used to adjust the taps weight of an equalizer. The paper compares the performance of these proposed algorithms with the conventional LMS and VSSLMS adaptive algorithms taking into account the least consuming of EbNo, convergence speed of weights and complexity. Computer simulation using MATLAB/SIMULINK has been used to conduct the investigation. The results of the investigation show the enhancement of these types of equalizers on the MIMO-OFDM system performance together with comparison between these six types of algorithms. The results also show that the ExpLMS is the most preferable among the other types from the complexity and convergence point of view.

    Download file

    Title: ATM Security Using Eye and Facial Recognition System: A Review

    Authors: Sakshi shrimal, Nishant shrimal and Avni jangid

    Abstract: With the support of ATM, though banking becomes easier but the chances of fraud are on rampant. There has been countless number of mishap and misrepresentations which usually occurs of in banking transactions. Thus, there is a dire need for development of such system which would serve to protect the consumers from fraud and other breaches of security. This paper proposes the alliance of Face Recognition System for verification process and enhancing the security in the banking region.

    Download file

    Title: Performance Comparison of Channel Estimation in MIMO-OFDM System using OMP and AS-SAMP algorithms

    Authors: V. Adinarayana, K.Geetha Kalpana, K. Murali Krishana and P. Rajesh Kumar

    Abstract: In communication systems, efficient use of the spectrum is an important concern. The utilization of compressed sensing for recovering multipath sparse channels in orthogonal frequency division multiplexing (OFDM) has been proposed recently to reduce the transmitted overhead within the kind of much required pilot subcarriers that are very important for channel estimation. In this, the problem of deterministic pilot assignments explored the pilot allocation in OFDM systems. The technique is concentrated mainly on minimizing the coherence of the sub matrix of the unitary discrete Fourier remodel (DFT) matrix that is related with the pilot subcarriers. In contrast with the usual case of uniform pilot subcarriers, we show that non-uniform pilot patterns based on cyclic difference sets that are optimum. We tend to anticipate an adaptive Step-size algorithm so as to reduce the number of pilots required without compromising on the output parameters. We are aiming to compare the performance of the various channel estimation methods like Orthogonal Matching Pursuit (OMP), sparsity adaptive Matching Pursuit (SAMP) and adaptive Step-Size sparsity adaptive Matching Pursuit (AS-SAMP) by applying the various conditions and inputs.

    Download file

    Title: Implementation of 8x8 SRAM Array with Reset using Gate Level Body Biasing

    Authors: Priyanka D.M, G. Sujatha, P. Jaya Rami Reddy and Pullareddy .A

    Abstract: The main objective of the paper is to improve the performance of SRAM memory with reset using the gate level body biasing technique and reduction in power consumption. As microprocessors and other electronics applications get faster and faster, the need for large quantities of data at very high speeds increases. Static Random Access Memory (SRAM) is an important memory device which stores data on a chip. Due to improved integration, operating speeds and power dissipation have become important factors to consider in designing. In this paper for the traditional 6TSRAM circuit, extra transistors are added to reset operation. The system performance in terms of delay will be decreased by adopting Gate Level Body Biasing (GLBB).This circuit biasing technique is applied for both PMOS and NMOS devices. Initially SRAM will be developed for 1 bit case later it is extended to size of 4x4. Upon verification of the designed memory, it will be further extended to size of 8x8 SRAM. By applying the biasing the speed will be increased at the cost of power. The power is reduced by changing the widths of the transistors of PMOS and NMOS. The proposed system is designed using gpdk180 technology in Cadence. The functionality of the design will be verified using the Cadence Spectre tool along with transient.

    Download file

    Title: Use Case and Misuse Case in Eliciting Security Requirements: MCOQR Metrics Framework Perspective

    Authors: Chitresh Banerjee, Arpita Banerjee and S. K. Sharma

    Abstract: One of the prerequisite of security implementation during the software development process is its identification. For identification of security, two factors are important, i.e., the phase of software development in which it is to be identified and the technique through which it is to be identified. Researchers and academicians are of the view that security should be implemented from the requirements engineering phase of software development process and for its implementation, the identification should being from the requirements elicitation sub phase. There are numerous techniques which are available for the identification of security needs during the requirements elicitation sub phase. Of them, the Unified Modelling Language (UML) technique which focuses on the use of use cases and misuse cases seems ideal as per the available statistics. The research paper provides a brief introduction of the use cases and misuse cases and explores their role in identification of security needs during the requirements elicitation sub phase. Further the paper established concrete connection between Misuse Case Oriented Quality Requirements (MCOQR) metrics framework and misuse cases and how the misuse cases in the proposed framework may help the security team for identification of security needs during the requirements elicitation sub phase with the help of its implementation mechanism with the results and validation.

    Download file

    Title: Feature Extraction and analysis of ECG signals for detection of heart arrhythmias

    Authors: Sreedevi Gandham and Anuradha Bhuma

    Abstract: ECG is an important and routine tool used in the primary diagnosis, prognosis and survival analysis of cardiac ailments. In the present work, Discrete Wavelet Transform (DWT) was used for feature extraction and analysis of ECG signals. A total of nineteen long length ECG signals were taken from MIT-BIH database and tested to check the performance of proposed method. Arrhythmias detected were Bradycardia, Tachycardia, Ventricular Tachycardia, First degree heart block, Asystole and Second degree heart block. The MATLAB tool used, in addition to detecting arrhythmias, helps in analysing ECG through different parameters of ECG like sampling frequency, PR, RR interval and QRS width.

    Download file

    Title: Reducing Delays in Congestion Control Algorithm using Enhanced Network Boarder Patrol (ENBP)

    Authors: B. Suresh kumar and Sameer Saxena

    Abstract: In today's networking scenario data transmission on time is very much needed but some time congestion occurs and packets are delayed. Due to congestion an organization can go in to huge losses, mainly congestion will occur when we are approaching the outside of the network i.e., boarder to boarder. To prevent the congestion in network there are so many techniques were proposed by so many researchers which is to compare data and transfer the data in multi casting mode. If the packets are undelivered when network resources send the packets then the congestion will be collapsed. According to the NBP the sending rates and data flow will be monitored and adjusted by traffic towards the edge routers. In this research we have studied the working operation of Network Border Patrol (NBP) and proposed some of the views of Enhanced Network Border Patrol (NBP).

    Download file