Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99


Any time

2020 ( 21 )

2019 ( 255 )

2018 ( 307 )

2017 ( 349 )

Custom range...

Search Results: 1 - 10 of 146965 matches for " Dr. K ASHOK BABU "
All listed articles are free for downloading (OA Articles)
Page 1 /146965
Display every page Item
An Efficient Architecture for 3-D lifting based Discrete Wavelet Transform
M.Janardan,Dr. K ASHOK BABU
International Journal of Computer Technology and Applications , 2011,
Abstract: This paper proposes an improved version of lifting based 3D Discrete Wavelet Transform (DWT) VLSI architecture which uses bi-orthogonal 9/7 filter processing. The whole architecture was optimized in efficient pipeline and parallel design way to speed up and achieve higher hardware utilization. The Discrete Wavelet Transform (DWT) was based on time-scale representation, which provides efficient multi-resolution. The lifting based DWT architecture has the advantage of lower computational complexities transforming signals with extension and regular data flow. This is suitable for VLSI implementation. It uses a cascade combination of three 1-D wavelet transform along with a set of in-chip memory buffers between the stages. The discrete wavelet transform (DWT) is being increasingly used for image coding. This is due to the fact that DWT supports features like progressive image transmission (by quality, by resolution), ease of compressed image manipulation, region of interest coding, etc. DWT has traditionally been implemented by convolution. Such an implementation demands both a large number of computations and a large storage features that are not desirable for either high-speed or low-power applications. Recently, a lifting-based scheme that often requires far fewer computations has been proposed for the DWT. The main feature of the lifting based DWT scheme is to break up the high pass and low pass filters into a sequence of upper and lower triangular matrices and convert the filter implementation into banded matrix multiplications. Such a scheme has several advantages, including “in-place” computation of the DWT, integer-to-integer wavelet transform (IWT), symmetric forward and inverse transform, etc. Therefore, it comes as no surprise that lifting has been chosen in the upcoming.
International Journal of Engineering Science and Technology , 2010,
Abstract: Content-based image retrieval (CBIR) is an important research area for manipulating large amount of image databases and archives. Extraction of invariant features is the basis of CBIR. This paper focuses on the problem of texture, color& shape feature extractions. Using just one feature information for comparing images may cause inaccuracy than compared with using more than one features. Therefore many image retrieval system use many feature information like color, shape and other features. We use HSI color information especially Huevalue and CSS (Curvature Scale Space) as shape information. From a large image data base, an automatic shape & color Based retrivel technique can Significantly retrival task Using Just two feature information for comparing image May cause inaccuracy than compared with using more than two features Accuracy high .We are Using three features for image Retrieval like color, shape & texture Feature ,We use HIS color information especially HUE Value and CSS(curvature scale space) as shape information. As a Result Three Features combine fulfill the aspect of Retrieval in Image.
International Journal of Engineering Science and Technology , 2011,
Abstract: Traditionally, memory cells were the only circuitry susceptible to transient faults The supporting circuitries around the memory were assumed to be fault-free. Due to the increase in soft error rate in logic circuits, the encoder and decoder circuitry around the memory blocks have become susceptible to soft errors as well and must be protected. Memory cells have been protected from soft errors for more than a decade; due to the increase in soft error rate in logic circuits, the encoder and decoder circuitry around the memory blocks have become susceptible to soft errors as well and must also be protected. In this paper a new approach to design fault-secure encoder and decoder circuitry for memory designs. The key novel contribution of this paper is identifying and defining a new class of error-correcting codes whose redundancy makes the design of faultsecure detectors (FSD) particularly simple. We further quantify the importance of protecting encoder and decoder circuitry against transient errors, illustrating a scenario where the system failure rate (FIT) is dominated by the failure rate of the encoder and decoder. We prove that Euclidean Geometry Low-Density Parity-Check (EG-LDPC) codes have the faultsecure detector capability.
International Journal of Engineering Science and Technology , 2010,
Abstract: Mobile Ad hoc wireless Networks (MANETs) that do not need any fixed infrastructure. They are characterized by dynamic topology due to node mobility, limited channel bandwidth, and limited battery power of nodes. The key challenge in the design of ad hoc networks is the development of dynamic routing protocols that can efficiently findroutes between two communicating nodes. Thus, many ad hoc routing protocols have been proposed in recent years. All these routing protocols attempt to provide a high data packet delivery ratio and low routing control traffic at the same time. These routing protocols can be classified into three categories: proactive, reactive and hybrid routing protocols.
International Journal of Engineering Science and Technology , 2010,
Abstract: Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity. The advantage of steganography, over cryptography alone, is that messages do not attract attention to themselves. Cryptography protects the contents of a message, steganography can be said to protect both messages and communicating parties. Wide ranges of algorithms have been introduced using text, audio, video and imagesfiles as covering media. This paper presents a new approach for steganography in Telugu texts. Taking the typical structure of Telugu alphabets into consideration, in this approach, by shifting inherent vowel signs either left or right, we hide the secret message. The approach shows good result on the sample collected from differentTelugu newspaper.
International Journal of Engineering Science and Technology , 2011,
Abstract: This paper presents high speed butterfly architecture for circular convolution based on FNT using partial product multipliers. FNT is ideally suited to digital computation requiring the order of N log N additions, subtractions and bit shifts, but no multiplications. In addition to being efficient, the FNT implementation is exact with no round off errors. Binary arithmetic permits the exact computation of FNT. This technique involves arithmetic in a binary code orresponding to the simplest one of a set of code translations from the normal binary representation of each integer in the ring of integer. In the first stage normal binary numbers are converted intotheir diminished-1 representation using code conversion (CC). Then butterfly operation (BO) is carried out to perform FNT and IFNT where the point wise multiplication is performed using modulo 2n+1 partial product multipliers. Thus modulo 2n+1 additions are avoided in the final stages of FNT and IFNT and hence execution delay is reduced compared to circular convolution done with FFT and DFT. This architecture has better throughput and involves less hardware complexity.
Design of Ultra-Low Power PMOS and NMOS for Nano Scale VLSI Circuits  [PDF]
Ashok Babu Ch, J. V. R. Ravindra, K. Lalkishore
Circuits and Systems (CS) , 2015, DOI: 10.4236/cs.2015.63007
Abstract: CMOS devices play a major role in most of the digital design, since CMOS devices have larger density and consume less power. The integrated circuit performance mostly depends on the basic devices and its scaling methods, but in conventional CMOS devices in ultra deep submicron technology, leakage power becomes the major portion apart of dynamic power. The demerits of the conventional CMOS is less speed and, more leakage, for any digital design PDP is the figure of merit which can be used to determine energy consumed per switching event, hence we designed a NOVEL NMOS and PMOS which has superior performance than conventional PMOS and NMOS, the design and performance checked at 90 nm, 180 nm and 45 nm technology and calculate the performance values.
From the Desk of Editor-in-Chief
Dr. Ashok K Rathoure
Octa Journal of Environmental Research , 2013,
Abstract: We have entered in the era of globalization where environmental pollution is manor concern due to industrial revolution. Globalization is the process of international integration arising from the interchange of world views, products, ideas, and other aspects of culture. Now days, number of industrial sector developed on and around the planet earth. Advances in transportation and telecommunications infrastructure, including the rise of the Internet are major factors in globalization, generating further interdependence of economic and cultural activities. Each Industrial development requires environmental clearance from Ministry of Environment and Forestry (MoEF) in India. Environmental Impact Assessment (EIA) is an important tool for integrating the objectives of environmental management into the decision making process to ensure environmentally sound and sustainable development. It is one of the most widely used tools for identifying and mitigating adverse ecological effects of development proposals. In 1987, UNEP adopted a set of goals and principles on EIAs. EIA is an exercise to be carried out before any project or major activity is undertaken to ensure that it will not in any way harm the environment on a short term or long term basis. Any developmental endeavor requires not only the analysis of the need of such a project, the monetary costs and benefits involved but most important, it requires a consideration and detailed assessment of the effect of a proposed development on the environment. The environment impact process was introduced with the purpose of identifying /evaluating the potential beneficial and adverse impacts of development projects on the environment, taking in to account environmental, social, cultural and aesthetic considerations. All of these considerations are critical to determine the viability of a project and to decide if a project should be granted environmental clearance. An EIA concentrate on problems, conflicts and natural resource constraints which might affect the viability of a project. It also predicts how the project could harm to people, their homeland, their livelihoods, and the other nearby developmental activities. After predicting potential impacts, the EIA identifies measures to minimize the impacts and suggests ways to improve the project viability.
Forest Fire Prevention using Wireless Sensor Networks
PRASHANTH,Prof K.Ashok Babu
International Journal of Computer Technology and Applications , 2012,
Abstract: Because of the rapid development of sensors, microprocessors, and network technology, a reliable technological condition has been provided for our automatic real-time monitoring of forest fires control. This paper presents a new type of early warning systems which use a wireless sensor network to collect the information of forest fire-prone sections for forest fire, wireless sensor nodes constitute a "smart" monitoring and control network through the self-organization and transmits the messages to the control center through the network, thus we can achieve the remote control of the forest fire.
High performance Ordering Scheme for MIMO Transmission
A. Sreekanth,Prof. K ASHOK BABU
International Journal of Computer Technology and Applications , 2011,
Abstract: The QR-OSIC receiver design for the transmitter-side power allocated MIMO system. Based on the properties of the function and ordering results, we develop the efficient ordering algorithms in combination with the PA scheme. From the convexity of the -function, we derive the ordering strategy that makes the channel gains converge to their geometric mean. Based on this approach, the fixed ordering algorithm is first designed, for which the geometric mean is used for a constant threshold. To further improve the performance, the modified scheme employing adaptive thresholds is developed using the correlation among ordering results. Theoretical analysis and simulation results show that proposed ordering schemes using QR-decomposition not only require a reduced computational complexity compared to the conventional scheme, but result in improved error performance.
Page 1 /146965
Display every page Item

Copyright © 2008-2017 Open Access Library. All rights reserved.