International Journal of Innovative Trends in Engineering
Approved By International Serial Standard(ISSN), National Science Library(NSL) and National Institute of Science Communication and Information Resources(NISCAIR)
ISSN: 2395-2946 (Online)

News Updates: IJITE October 2017 Volume 34 Edition Published Sucessfully.                Call for Papers: IJITE Inviting Research Papers For Volume 35 (November 2017) Edition.

IJITE - Issue 32, Volume 19, Number 02

Published On : July 2016
SNo. Paper Title & Authors Page Download
11
Analysis and Performance Evaluation for Low Pass Filter Design Using Artificial Neural Network
Suchi Sharma, Anjana Goen
Abstract: This paper presents design of low pass FIR Filter of order 10 by using different algorithm of artificial neural network. In this paper comparison is done between different algorithm of nn tool and window used for designing filter and find which one is best. Here, we use two tools for designing filter FDA Tool and NN Tool and compare the results. Bartlett and Blackman windows are used to calculate filter coefficients by FDA tool then train the network in NN tool and find the results.
Keywords: Neural network, FDA Tool
54-58
Full Text
12
Facial Authentication Using Viola-Jones
Kuldeep Singh, Sunil Singh Bisht
Abstract: A facial Authentication system is a computer application for automatically recognizing or verifying a human face from a digital image from a source. This paper gives an overview of face and introduction of face recognition and the various methods of the system. To achieve this goal system uses three steps : face identification, feature extraction and comparison. Viola-jones algorithm is used to identify face from digital image. Human face has so many features and face recognition system extract those features of face from the image source or digital image. The person recognized based on these extracted features and then the system generate result in terms of non-identified and identified.
Keywords: Face identification, Feature extraction, comparison, Facial authentication
59-64
Full Text
13
A Review On Experimental and Comparative Analysis of Different Cooling Media In Evaporating Cooling System
Sarita Barmaiya, Suresh Singh Bhadoliya
Abstract: This review paper on evaporating cooling system and also know the various benefits of ECS its classification, working principal and also its compare to air condition and formulation of cooling efficiency, When water evaporates from the surface of something, that surface becomes much cooler because it requires heat to change the liquid into a vapor. A nice breeze on a hot day cools us because the current of air makes perspiration evaporate quickly. The heat needed for this evaporation is taken from our own bodies.
Keywords: ECS, cellulose pad, cooling efficiency, air velocity, jute khus
65-69
Full Text
14
A Proficient And Protected Node Validation In Wireless Sensor Network
Vipin Kumar, Kuldeep Singh, Sunil Bisht
Abstract: Wireless sensor networks are about the field of networks that consists of small, large number of sensing nodes which is having the sensing, computational and transmission power but sensing nodes also suffer from many limitation such as low power (usually operated by battery), low processing ability, communication and storage limitations. Key management is the fundamental security mechanism in wireless sensor network. To achieve security in WSN it is important to be able to encrypt the messages sent among the sensor nodes. In our paper, we present an enhanced heterogeneous tree based symmetric key cryptography scheme for security of wireless sensor networks. Here, we design the networks into the node matrix arrangement (nodes addressing) due to its tree based scheme for link establishment then we generate the key for each session which provides an authenticity using deterministic symmetric key cryptography. This proposed crypto system is session based and the session key is changed after expire of each session. This combination of scheme provides the good performances and efficiency in terms of network connectivity, key storage overhead as well as in terms of attack of node capture. In the end we compared our scheme with EG schemes and our scheme gives better security and performances.
Keywords: Deterministic Key, Broadcast Authentication, key generation, wireless sensor network.
70-73
Full Text
15
Review on Multichannel AMBA AHB with Multiple Arbitration Technique
Mukesh Kumar Sen
Abstract: Multiprocessor SOC designs have more than one processor and huge memory on chip. Soc uses both hardware and software processor. Multiple component like DSP, application based components, logics CPU etc. The components are integrated to form heterogeneous circuit .To perform efficiently it need system bus with high bandwidth which can process multiple signal in parallel. So system bus plays key role for data transfer and efficient communication. High performance buses available currently are from silicore, IBM, ARM. Advanced microcontroller bus architecture (AMBA) is protocol that is used as open standard on chip interconnection and management of functional blocks in system on chip. With combination of high performance on chip buses such as AMBA bus, we can solve bandwidth related problems. ARM uses ARB bus matrix and due to simple design and more flexibility in design uses mostly in SOC designs. AMBA bus having excellent architecture, at the same time power consumption is very less. Here we want to use four variables to develop multiple option, we will use round robin and fixed priority by multiple arbitration technique. In that way we can increase speed of processor for efficient working.
Keywords: AMBA bus, Multiprocessor SOC, AHB, ARB.
74-75
Full Text
16
An Analysis of Digital Modulation Technique for Image Transmission over Wireless Channel
Raghavendra Singh Chadhar & Prof. Avinash Rai
Abstract: Reliable and efficient image transmission over wireless channel at low SNR has been a challenge for engineers. To solve this problem study of image processing and digital communication system is carried out. The objective of this study is to provide a sense of perspective on the beginning of image processing in digital communication system and significance on current and forth coming areas of the application of image processing. The input image of origin is applied on the modulation/demodulation techniques such as QPSK, 16-QAM and 64-QAM in the communication system. The advantage of the currently designed system is that, when the channel is under a condition of high noise, the system generates a quality of image worse rather than completely lose the transmitted image. The simulation is performed, when SNR value is 5 dB, 10 dB and 50 dB. By using 64-QAM modulation technique, which carries higher data rates, this is essential for image transmission. Modulation techniques such as 64-QAM provide better results than the other modulation techniques such as QPSK and 16-QAM under condition of higher channel noise with Signal to Noise Ratio is 10 dB.
Keywords: SNR, QPSK, 16-QAM and QPSK.
76-82
Full Text
17
Analysis and Implementation of Multistandard Transform Core for MPEG/H.264/VC-1 Video Codecs using Reconfigurable Hardware Structure
Prof. Mrs. P. U. Chati, Ragini A. Jibhakate
Abstract: In this projеct our main objectivе is to proposе high throughput multi-standard transform core, which supports MPEG 1/2/4 (8 × 8), H.264 (8 × 8 & 4 × 4), and Vidеo Codеcs VC-1 (8 × 8, 8 × 4, 4×8 & 4×4) transforms. Common sharing distributеd arithmеtic (CSDA) consists of factor sharing(FS) and distributеd arithmеtic(DA) sharing techniquеs, efficiеntly rеducing the numbеr of hardwarе(addеrs) resourcеs for high hardwarе resourcе-sharing capability in ordеr to еxploit the availablе resourcеs on FPGAs. This incorporatеs parallеl procеssing and pipеlining of the input samplеs. This architecturе hеlps to increasе the throughput ratе of the dеsign. CSDA algorithm reducеs nonzеro elemеnts. In the proposеd MST the rеduction in addеrs is achievеd up to 44.5%, as comparеd with the dirеct implemеntation mеthod. This MST corе has an еightfold opеration frequеncy throughput ratе with еight parallеl computation paths. Measuremеnt shows that designеd MST corе has throughput ratе of 1.3 G-pels/s.
Keywords: Factor sharing and distributеd arithmеtic (FS & DA), multi-standard transform (MST), discretе cosinе transform (DCT), FPGA.
83-87
Full Text