Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99


Any time

2019 ( 222 )

2018 ( 325 )

2017 ( 328 )

2016 ( 566 )

Custom range...

Search Results: 1 - 10 of 219836 matches for " P. Ganesh Kumar "
All listed articles are free for downloading (OA Articles)
Page 1 /219836
Display every page Item
Elegant and Practical Method of Fir Decimation Using Comb Filters in the Field of Digital Signal Processing  [PDF]
S. Arun Kumar, P. Ganesh Kumar
Circuits and Systems (CS) , 2016, DOI: 10.4236/cs.2016.79214
Abstract: This paper deals with the technology of using comb filters for FIR Decimation in Digital Signal Processing. The process of decreasing the sampling frequency of a sampled signal is called decimation. In the usage of decimating filters, only a portion of the out-of-pass band frequencies turns into the pass band, in systems wherein different parts operate at different sample rates. A filter design, tuned to the aliasing frequencies all of which can otherwise steal into the pass band, not only provides multiple stop bands but also exhibits computational efficiency and performance superiority over the single stop band design. These filters are referred to as multiband designs in the family of FIR filters. The other two special versions of FIR filter designs are Halfband and Comb filter designs, both of which are particularly useful for reducing the computational requirements in multirate designs. The proposed method of using Comb FIR decimation procedure is not only efficient but also opens up a new vista of simplicity and elegancy to compute Multiplications per Second (MPS) and Additions per Second (APS) for the desired filter over and above the half band designs.
A Framework for Upgradation of Network Link Bandwidth to Network Service Provider
P. Ganesh Kumar,K. Thyagarajah
Asian Journal of Information Technology , 2012,
Abstract: The network size is evolving rapidly now-a-days and there is a need to provide high degree of Quality of Service (QOS) to the users.In this study, the technique of optimal routing is used to determine the best business decision for link capacity upgradation . Business decision is used to find out the time beyond which the existing network link capacity will not provide the required level of QOS to users and the time by which capacity of link should be upgraded. This helps to increase the revenue and also to maintain the optimal QOS that the users trust on the network. Before admitting a flow of data its flow specification must be checked and it must be optimally routed. Delay is an element which has to be reduced to provide better QOS. To reduce this delay, the link utilization has to be decreased. Link utilization is defined as the ratio between total flow demand and link capacity. This can be achieved by limiting the flow of data in the corresponding link, through increase in cost of the link. We propose a new methodology to identify the optimal time period for deploying network devices for link bandwidth upgradation. This is achieved through optimal routing technique by identification and cycle deduction.
Spray and Wait Routing With Agents in Intermittently Connected MANETs
S. Ramesh,P. Ganesh Kumar
Journal of Artificial Intelligence , 2013,
Abstract: Mobile Ad Hoc Network (MANET), a self-configuring infrastructure less network of mobile devices connected by wireless superimposes a way for the partially connected MANET called the Intermittently Connected Mobile Ad Hoc Network (ICMANET). Routing in MANET is done by traditional network routing schemes and these are not applicable to ICMANET. ICMANET is a form of Delay Tolerant Network (DTN), where there never exists a complete end-to-end path between two nodes that intends to communicate. Routing in such a spasmodic environ is achieved by many techniques and one of the optimal technique is the spray and wait routing. The routing involves a spraying phase, in which certain copies are sprayed into the network and it involves waiting phase, in which a node waits until it finds the destination to deliver the message copy. Even though routing is proved to be possible in ICMANET, secure communication in such networks still remains an issue. In this study, the technique of secure routing in ICMANET using spray and wait routing protocol by setting agents at each node is explored. Setting Agents ensures a higher probability of security in ICMANET.
Assessment of Underground Water Contamination and Effect of Textile Effluents on Noyyal River Basin In and Around Tiruppur Town, Tamilnadu
A. Geetha,P. N. Palanisamy,P. Sivakumar,P. Ganesh Kumar
Journal of Chemistry , 2008, DOI: 10.1155/2008/394052
Pattern classification of Myo-Electrical signal during different Maximum Voluntary Contractions: A study using BSS techniques
Ganesh R. Naik, Dinesh K. Kumar, Sridhar P. Arjunan
Measurement Science Review , 2010, DOI: 10.2478/v10048-010-0001-y
Abstract: The presence of noise and cross-talk from closely located and simultaneously active muscles is exaggerated when the level of muscle contraction is very low. Due to this the current applications of surface electromyogram (sEMG) are infeasible and unreliable in pattern classification. This research reports a new technique of sEMG using Independent Component Analysis (ICA). The technique uses blind source separation (BSS) methods to classify the patterns of Myo-electrical signals during different Maximum Voluntary Contraction (MVCs) at different low level finger movements. The results of the experiments indicate that patterns using ICA of sEMG is a reliable (p<0.001) measure of strength of muscle contraction even when muscle activity is only 20% MVC. The authors propose that ICA is a useful indicator of muscle properties and is a useful indicator of the level of muscle activity.
Design of High Speed CODEC for On Chip Cross Talk Avoidance
B.Ganesh Kumar,,R.P.Das
International Journal of Innovative Technology and Exploring Engineering , 2012,
Abstract: The cross talk is dependent on the data transition patterns on the bus, patterns can be classified based on the severity of the crosstalk they impose on the bus. The general idea behind techniques that improve on-chip bus speed is to remove undesirable patterns that are associated with certain classes of crosstalk. Different schemes incur different area overheads since they requires additional wires, spacing between wires or both. We analyze the properties of the FPF-CAC and show that mathematically, a mapping scheme exists between the data wordsand code words. Our proposed CODEC design offers a near-optimal area overhead performance. An improved version of the CODEC is then presented, which achieves theoretical optimal performance. We also investigate the implementation details of the CODECs, including design complexity and the speed. Optimization schemes are provided to reduce the size of the CODEC and improve its speed. The design was implemented on Xilinx Xc3S200 fpga and the total power consumed by the device was estimated as 0.041W.
Optimal Quantum Measurement Design on Speech Signal: Blind Minimax Estimator Improving MSE Over LS Estimators
S.Karthikeyan,P.Ganesh Kumar,S.Sasikumar
International Journal of Electronics Communication and Computer Technology , 2012,
Abstract: We consider the problem of estimating an unknown, deterministic speech signal parameters based on quantum measurements corrupted by white Gaussian noise. We design and analyze blind minimax estimator (BME), which consist of a bounded parameter set. Using minimax estimator, the parameter set is itself estimated from quantum measurements. Thus, our approach does not require any prior knowledge of bounded parameters, and the designed estimator can be applied to any linear regression problem. We demonstrate analytically that the BMEs strictly dominate the least-square (LS) estimator, i.e., they achieve lower mean-squared error (MSE) for any speech signal. Our approach can be readily compared with wide class of non-linear estimators like James Stein’s estimator, which is defined for white noise. The result suggest that over a wide range of samples and signal to noise ratio the mean square error for Ellipsoidal Blind Minimax Estimator(EBME) is lower when compared with linear and non-linear estimators.
Do ICMP Security Attacks Have Same Impact on Servers?  [PDF]
Ganesh Reddy Gunnam, Sanjeev Kumar
Journal of Information Security (JIS) , 2017, DOI: 10.4236/jis.2017.83018
Abstract: There are different types of Cyber Security Attacks that are based on ICMP protocols. Many ICMP protocols are very similar, which may lead security managers to think they may have same impact on victim computer systems or servers. In this paper, we investigate impact of different ICMP based security attacks on two popular server systems namely Microsoft’s Windows Server and Apple’s Mac Server OS running on same hardware platform, and compare their performance under different types of ICMP based security attacks.
Design of Low Power Level Shifter Circuit with Sleep Transistor Using MultiSupply Voltage Scheme  [PDF]
Raveendran Arun Prasath, Parasuraman Ganesh Kumar
Circuits and Systems (CS) , 2016, DOI: 10.4236/cs.2016.77097
Abstract: New low-power Level Shifter (LS) circuit is designed by using sleep transistor with Multi Threshold CMOS (MTCMOS) technique for robust logic voltage shifting from sub-threshold to above- threshold domain. MultiSupply Voltage Design (MSVD) technique is mainly used for energy and speed in modern system-on-chip. In MSVD, level shifters are required to allow different voltage supply to shift from the lower power supply voltage to the higher power supply voltage. This new low-power level shifter circuit is also used for fast response and low leakage power consumption. This low leakage power consumption can be achieved through insertion of sleep transistor and proper transistors sizing. The proposed design efficiently converts 100 mv input signal into 1 v output signal and achieves the power of 2.56 nW by using 90 nm technology.
Noise Propagation in Two-Step Series MAPK Cascade
Venkata Dhananjaneyulu, Vidya Nanda Sagar P, Gopalakrishnan Kumar, Ganesh A. Viswanathan
PLOS ONE , 2012, DOI: 10.1371/journal.pone.0035958
Abstract: Series MAPK enzymatic cascades, ubiquitously found in signaling networks, act as signal amplifiers and play a key role in processing information during signal transduction in cells. In activated cascades, cell-to-cell variability or noise is bound to occur and thereby strongly affects the cellular response. Commonly used linearization method (LM) applied to Langevin type stochastic model of the MAPK cascade fails to accurately predict intrinsic noise propagation in the cascade. We prove this by using extensive stochastic simulations for various ranges of biochemical parameters. This failure is due to the fact that the LM ignores the nonlinear effects on the noise. However, LM provides a good estimate of the extrinsic noise propagation. We show that the correct estimate of intrinsic noise propagation in signaling networks that contain at least one enzymatic step can be obtained only through stochastic simulations. Noise propagation in the cascade depends on the underlying biochemical parameters which are often unavailable. Based on a combination of global sensitivity analysis (GSA) and stochastic simulations, we developed a systematic methodology to characterize noise propagation in the cascade. GSA predicts that noise propagation in MAPK cascade is sensitive to the total number of upstream enzyme molecules and the total number of molecules of the two substrates involved in the cascade. We argue that the general systematic approach proposed and demonstrated on MAPK cascade must accompany noise propagation studies in biological networks.
Page 1 /219836
Display every page Item

Copyright © 2008-2017 Open Access Library. All rights reserved.