oalib

Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99

Submit

Search Results: 1 - 10 of 615 matches for " Archana Balyan "
All listed articles are free for downloading (OA Articles)
Page 1 /615
Display every page Item
Resources for Development of Hindi Speech Synthesis System: An Overview  [PDF]
Archana Balyan
Open Journal of Applied Sciences (OJAppS) , 2017, DOI: 10.4236/ojapps.2017.76020
Abstract: Most of the information in digital world is accessible to few who can read or understand a particular language. The speech corpus acquisition is an essential part of all spoken technology systems. The quality and the volume of speech data in corpus directly affect the accuracy of the system. However, there are a lot of scopes to develop speech technology system using Hindi language which is spoken primarily in India. To achieve such an ambitious goal, the collection of standard database is a prerequisite. This paper summarizes the Hindi corpus and lexical resources being developed by various organizations across the country.
Matrix Based Energy Efficient Scheduling With S-MAC Protocol in Wireless Sensor Network
Ram Kumar Singh,Akanksha Balyan
International Journal of Modern Education and Computer Science , 2012,
Abstract: Communication is the main motive in any Networks whether it is Wireless Sensor Network, Ad-Hoc networks, Mobile Networks, Wired Networks, Local Area Network, Metropolitan Area Network, Wireless Area Network etc, hence it must be energy efficient. The main parameters for energy efficient communication are maximizing network lifetime, saving energy at the different nodes, sending the packets in minimum time delay, higher throughput etc. This paper focuses mainly on the energy efficient communication with the help of Adjacency Matrix in the Wireless Sensor Networks. The energy efficient scheduling can be done by putting the idle node in to sleep node so energy at the idle node can be saved. The proposed model in this paper first forms the adjacency matrix and broadcasts the information about the total number of existing nodes with depths to the other nodes in the same cluster from controller node. When every node receives the node information about the other nodes for same cluster they communicate based on the shortest depths and schedules the idle node in to sleep mode for a specific time threshold so energy at the idle nodes can be saved.
Approach to Software Maintainability Prediction Versus Performance
Ram Kumar Singh,Akanksha Balyan
International Journal of Soft Computing & Engineering , 2012,
Abstract: The software maintainability is one of the most significant aspects in software evolution for the software product. Due to the complexity of chase maintenance demeanor, it is difficult to accurately anticipate the price and risk of maintenance afterward delivery of the software products. The value of a software system results from the interaction between its functionality and quality attribute (performance, reliability and security) and the market-place. The software maintainability is viewed considered as an inevitable evolution procedure driven through maintenance demeanor. Traditional product cost model have focused on the short term development cost of the software product. A HMM (Hidden Markov Model) is applied to simulate the maintenance demeanor demonstrated as their potential occurrence probabilities. The software metric function is the measurement of the software quality products and its measurements results of a software product existence delivered combined to from health index of the software product. When the occurrence probabilities of maintenance demeanor reach certain number which is calculate as the denotation of worsening position of software product, the software product can be considered as obsolete. The longer time, more beneficial the maintainability would be. We believe on the architectural approach to price-modeling will be able to capture these concerns so that the software can reason about the risk I the system and price of mitigating them.
An Optimized Parametric Approach for Improving Handover in WiMax
Naveen Kumar,Parmender Balyan,Poonam Yadav
International Journal of Soft Computing & Engineering , 2012,
Abstract: WiMAX network is one of the high speed networks that provide the high level security and reliability over the network. One of the common problems in WiMax network is the handover mechanism. Most of the chances of data loss and intrusion are during the handover process. To get the better efficiency and throughput an efficient handover mechanism is required. This paper proposes an optimized handover scheme for mobile WiMAX networks that tries to minimize packet loss during handover. With the help of simulation we will show that this scheme is more efficient then traditional handover. The proposed approach is the parametric approach where some parameters are used as the decision factor to elect the nearby base station.
Comparative Evaluation of Semi Fragile Watermarking Algorithms for Image Authentication  [PDF]
Archana Tiwari, Manisha Sharma
Journal of Information Security (JIS) , 2012, DOI: 10.4236/jis.2012.33023
Abstract: Technology has no limits today; we have lots of software available in the market by which we can alter any image. People usually copies image from the internet and after some changes they claim that these are their own properties. Insuring digital image integrity has therefore become a major issue. Over the past few years, watermarking has emerged as the leading candidate to solve problems of ownership and content authentications for digital multimedia documents. To protect authenticity of images semi fragile watermarking is very concerned by researchers because of its important function in multimedia content authentication. The aim of this paper is to present a survey and a comparison of emerging techniques for image authentication using semifragile watermarking. In present paper comprehensive overview of insertion and extraction methods used in different semi fragile water marking algorithm are studied using image parameters, potential application, different algorithms are described and focus is on their comparison according to the properties cited above and future directions for developing a better image authentication algorithm are suggested.
Artificial Neural Networks for Event Based Rainfall-Runoff Modeling  [PDF]
Archana Sarkar, Rakesh Kumar
Journal of Water Resource and Protection (JWARP) , 2012, DOI: 10.4236/jwarp.2012.410105
Abstract: The Artificial Neural Network (ANN) approach has been successfully used in many hydrological studies especially the rainfall-runoff modeling using continuous data. The present study examines its applicability to model the event-based rainfall-runoff process. A case study has been done for Ajay river basin to develop event-based rainfall-runoff model for the basin to simulate the hourly runoff at Sarath gauging site. The results demonstrate that ANN models are able to provide a good representation of an event-based rainfall-runoff process. The two important parameters, when predicting a flood hydrograph, are the magnitude of the peak discharge and the time to peak discharge. The developed ANN models have been able to predict this information with great accuracy. This shows that ANNs can be very efficient in modeling an event-based rainfall-runoff process for determining the peak discharge and time to the peak discharge very accurately. This is important in water resources design and management applications, where peak discharge and time to peak discharge are important input variables
Improving Voltage Stability of Power System by Optimal Location of FACTS Devices Using Bio-Inspired Algorithms  [PDF]
Archana Naganathan, Vidhyapriya Ranganathan
Circuits and Systems (CS) , 2016, DOI: 10.4236/cs.2016.76069
Abstract: Power system operations can be optimized using power electronics based FACTS devices. The location of these devices at appropriate transmission line plays a major role in their performance. In this paper, two bio-inspired algorithms are used to optimally locate two FACTS devices: UPFC and STATCOM, so as to reduce the voltage collapse and real power losses. Particle swarm optimization and BAT algorithms are chosen as their behaviour is similar. VCPI index is used as a metric to calculate the voltage collapse scenario of the power system. The algorithm is tested on two benchmark power systems: IEEE 118 and the Indian UPSEB 75 bus system. Performance metrics are compared with the system without FACTS devices. Application of PSO and BAT algorithms to optimally locate the FACTS devices reduces the VCPI index and real power losses in the system.
Orthology between genomes of Brachypodium, wheat and rice
Sachin Kumar, Amita Mohan, Harindra S Balyan, Pushpendra K Gupta
BMC Research Notes , 2009, DOI: 10.1186/1756-0500-2-93
Abstract: Comparative sequence analysis of 3,818 Brachypodium EST (bEST) contigs and 3,792 physically mapped wheat EST (wEST) contigs revealed that as many as 449 bEST contigs were orthologous to 1,154 wEST loci that were bin-mapped on all the 21 wheat chromosomes. Similarly 743 bEST contigs were orthologous to specific rice genome sequences distributed on all the 12 rice chromosomes. As many as 183 bEST contigs were orthologous to both wheat and rice genome sequences, which harbored as many as 17 SSRs conserved across the three species. Primers developed for 12 of these 17 conserved SSRs were used for a wet-lab experiment, which resolved relatively high level of conservation among the genomes of Brachypodium, wheat and rice.The present study confirmed that Brachypodium is a better model than rice for analysis of the genomes of temperate cereals like wheat and barley. The whole genome sequence of Brachypodium, which should become available in the near future, will further facilitate greatly the studies involving comparative genomics of cereals.Cereals constitute the most important group of cultivated plants, and are known to have diverged from a common paleopolyploid ancestor ~45–47 million years ago (Mya) [1]. Despite this, a remarkable overall structural and functional similarity exists among different cereal genomes [2,3], although the size of these genomes differs greatly, ranging from 430 Mb in rice (Oryza sativa) to 16,000 Mb in hexaploid wheat (Triticum aestivum). Due to its small size and availability of whole genome sequence, rice has been used as a model system for a variety of experimental studies including map-based cloning [4]. However, recent studies resolved further the dynamic changes in rice genome sequences, thus questioning the utility of rice as a model crop [5], and necessitating the need for search of a more efficient model system.Brachypodium distachyon, a small temperate grass (sub-family Pooideae) has recently emerged as a better model system for the
Soft Computing Based TVertical Handoffs in Fourth Generation Wireless Networksexture Classification with MATLAB Tool
Ram Kumar Singh,Akanksha Balyan,Shyam Ji Gupta,Pradeep Kumar
International Journal of Soft Computing & Engineering , 2012,
Abstract: This book chapter presents a tutorial on vertical handoff methods in the evolving 4G wireless communication networks. Integration architectures for various wireless access networks are described. Then handoff classification, desirable handoff features, the handoff process, and multimode mobile terminals are discussed. A section is devoted to some recently proposed vertical handoff techniques. We propose a vertical handoff decision algorithm that determines whether a vertical handoff should be initiated and dynamically selects the optimum network connection from the available access network technologies to continue with an existing service or begin another service.
Mathematical Modeling and Analysis of Tumor Therapy with Oncolytic Virus  [PDF]
Manju Agarwal, Archana S. Bhadauria
Applied Mathematics (AM) , 2011, DOI: 10.4236/am.2011.21015
Abstract: In this paper, we have proposed and analyzed a nonlinear mathematical model for the study of interaction between tumor cells and oncolytic viruses. The model is analyzed using stability theory of differential equa- tions. Positive equilibrium points of the system are investigated and their stability analysis is carried out. Moreover, the numerical simulation of the proposed model is also performed by using fourth order Runge- Kutta method which supports the theoretical findings. It is found that both infected and uninfected tumor cells and hence tumor load can be eliminated with time, and complete recovery is possible because of virus therapy, if certain conditions are satisfied. It is further found that the system appears to exhibit periodic limit cycles and chaotic attractors for some ranges of the system parameters.
Page 1 /615
Display every page Item


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.