Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99


Any time

2020 ( 10 )

2019 ( 433 )

2018 ( 519 )

2017 ( 535 )

Custom range...

Search Results: 1 - 10 of 325383 matches for " S. Nithya Bhama "
All listed articles are free for downloading (OA Articles)
Page 1 /325383
Display every page Item
Analysis of Three Phase Four Wire Inverter for UPS Fed Unbalanced Star Connected Load
R. Senthil Kumar,Jovitha Jerome,S. Nithya Bhama
International Journal of Electrical and Power Engineering , 2012, DOI: 10.3923/ijepe.2010.38.44
Abstract: A Three phase inverter with a neutral connection i.e., three phase four wire inverter is proposed. The UPS system is fed by three phase four wire inverter and the load neutral point voltage is low to meet the requirement of the system. The four leg inverters effectively provide the neutral connection in three phase four wire system. They are used in many applications to handle the neutral current caused by the unbalanced and non-linear load. The unbalanced load becomes non-linear where the neutral of the loads are accessible. The four leg inverter produces the three output voltages independently with one additional leg. The main feature of a three phase inverter with an additional neutral leg is its ability to deal with load unbalance in a system. The goal of the three phase four leg inverter is to maintain the desired sinusoidal output voltage waveform for all loading conditions and transients. The neutral connection is present to handle the ground current due to unbalanced loads. The feasibility of the proposed modulation technique is verified by Matlab/Simulink.
Effect of Agricultural Seasons on Energy Intake: Evidence from Two Agro-Ecologically Different Rural Districts of India  [PDF]
D. J. Nithya, S. Raju, Aliza Pradhan
Food and Nutrition Sciences (FNS) , 2018, DOI: 10.4236/fns.2018.95041
Abstract: Seasonality is recognised as a constraint to agricultural production and food and nutrition security of rural households. It alters the energy intake from different groups of foods based on the availability. These variations in energy intake affect the nutritional status of the population. Eight villages in Wardha district of Maharashtra state and eleven villages in Koraput district of Odisha state were purposefully selected for the study. Foods consumed by households were collected using a semi-quantitative questionnaire in three rounds in 2013-14 and 2014-15 to cover the lean (January-April), planting (May-August) and harvest (September-December) periods in agriculture. Cereals (wheat and rice), pulses, roots and tubers, fats and sugars were consumed daily in Wardha. In Koraput, the daily diet included cereals (rice and finger millet), other vegetables, fats and sugars. Cereals supplied majority of the total energy intake in both the study area (63% in Wardha and 85% in Koraput); the contribution is higher during lean period in Wardha and during planting in Koraput. Significant variation was found in the mean intake of food groups and the energy obtained from them between seasons except for few food groups. It was found to be positive during the planting season in Koraput and negative during lean period and harvest season when compared with the average energy intake across three seasons; in Wardha, energy intake was positive during harvest season followed by lean and was negative during planting season. It was also found that most small land holders (<2 ha) were affected by seasonality. The sourcing of foods and the energy contributed by them to the total energy intake also varied depending on seasons and majority of energy intake was sourced from public distribution system. Seasonality plays a crucial role in energy intake of individuals through fluctuation in availability and accessibility of food; this in turn will impact the nutritional status of the rural population. Energy requirement varies according to seasons as the type of agriculture activity differs. It is important to take seasonality into consideration while designing food-based approaches to combat the problem of undernutrition.
International Journal of Engineering Science and Technology , 2011,
Abstract: With the growing abundance of information on the web, it becomes the need of the hour to enrich data with semantics that can be understood and processed by machines. Currently, much of the effort in the area of semantics is focused on the representation of semantic data and its reasoning, which is the processing of semantic information associated with that data. This paper aims at realizing the need for similarity based reasoning of cloud service discovery. It forms a basic requirement of a cloud client to discover the most appropriate cloud service from the list of available services published by service providers. Cloud ontology provides a set of concepts, individuals and relationships among them. The similarity among cloud services can be determined from the semantic similarity of concepts and hence the relevant service can be retrieved.
BECAN: A Bandwidth Efficient Cooperative Authentication Scheme for Wireless SensorNetworks
Nithya Menon,,S.Praveena
International Journal of Innovative Technology and Exploring Engineering , 2013,
Abstract: This paper propose a bandwidth-efficient cooperative authentication (BECAN) scheme for filtering injected false data in Wireless sensor Networks. Sensor node could be easily compromised as the attacker can gain control obtain key values and change the properties of the node. This results in an false report to sink and energy waste in en-route nodes. The proposed BECAN scheme can save energy by early detecting and filtering the most of injected false data with less time and difficulty at the en-route nodes. In addition,only a very small amount of injected false data needs to be checked by the sink, thereby reduceing the burden on sink. To filter the false data, the BECAN scheme adopts cooperative neighbor router (CNR)-based filtering mechanism. Hence it achieves not only high filtering probability but also high reliability.
Performance Analysis of Probabilistic Rebroadcasting in Grid FSR for MANET
S. Nithya Rekha,C. Chandrasekar
International Journal of Computer Science Issues , 2012,
Abstract: Mobile Ad-hoc Network (MANET) is the self organizing collection of mobile nodes. The communication in MANET is done via a wireless media. Ad hoc wireless networks have massive commercial and military potential because of their mobility support. Due to demanding real time multimedia applications, Quality of Services (QoS) support in such infrastructure less networks have become essential. QoS routing in mobile Ad-Hoc networks is challenging due to rapid change in network topology. In this paper, we focused to reduce flooding performance of the Fisheye State Routing (FSR) protocol in Grid using ns-2 network simulator under different performance metrics scenario in respect to number of Nodes. For example, the connection establishment is costly in terms of time and resource where the network is mostly affected by connection request flooding. The proposed approach presents a way to reduce flooding in MANETs. Flooding is dictated by the propagation of connection-request packets from the source to its neighborhood nodes. The proposed architecture embarks on the concept of sharing neighborhood information. The proposed approach focuses on exposing its neighborhood peer to another node that is referred to as its friend-node, which had requested/forwarded connection request. If there is a high probability for the friend node to communicate through the exposed routes, this could improve the efficacy of bandwidth utilization by reducing flooding, as the routes have been acquired, without any broadcasts. Friendship between nodes is quantized based on empirical computations and heuristic algorithms. The nodes store the neighborhood information in their cache that is periodically verified for consistency. Simulation results show the performance of this proposed method.
Modular Representations, Old and New
Bhama Srinivasan
Mathematics , 2011,
Abstract: The modular representation theory of finite groups has its origins in the work of Richard Brauer. In this survey article we first discuss the work being done on some outstanding conjectures in the theory. We then describe work done in the eighties and nineties on modular representations in non-defining characteristic of finite reductive groups. In the second part of the paper we discuss some recent developments in the theory for symmetric groups and Hecke algebras, where remarkable connections with Lie theory and graded representation theory have been made.
Quadratic unipotent blocks in general linear, unitary and symplectic groups
Bhama Srinivasan
Mathematics , 2013,
Abstract: An irreducible ordinary character of a finite reductive group is called quadratic unipotent if it corresponds under Jordan decomposition to a semisimple element $s$ in a dual group such that $s^2=1$. We prove that there is a bijection between, on the one hand the set of quadratic unipotent characters of $GL(n,q)$ or $U(n,q)$ for all $n \geq 0$ and on the other hand, the set of quadratic unipotent characters of $Sp(2n,q)$ for all $n \geq 0$. We then extend this correspondence to $\ell$-blocks for certain $\ell$ not dividing $q$.
On CRDAHA and finite general linear and unitary groups
Bhama Srinivasan
Mathematics , 2014,
Abstract: We show a connection between Lusztig induction operators in finite general linear and unitary groups and parabolic induction in cyclotomic rational double affine Hecke algebras. Two applications are given: an explanation of a bijection result of Brou\'e, Malle and Michel, and some results on modular decomposition numbers of finite general groups.
Automatic Campus Network Management using GPS
International Journal of Computer Science Issues , 2012,
Abstract: The Organization Network is the place where large number of attacks is happening. The attackers are using different methodologies to capture the information from the end user without the knowledge of the end-user. This paper introduces the concepts of Campus Management and Emergency log by using Medium Access Control (MAC) and Global Positioning System (GPS). By using the IP address of an attacker, the MAC address can be found and the attackers machine can be blocked access with the help of firewall. Using the GPS we can be able to navigate the attackers position with the help of the position log. The log keeps updating for each and every 10 seconds. The attacker can be identified as if he used his own system or victim (3rd party) system. An emergency response log has been created to record each emergency incident response process. The role of the log is more important with an increasing accumulation of information with the log; Network Engineer/Administrator can determine the type of inevitable emergency incidents grouped into evitable events, in order to improve the system reliability of emergency response.
Reporting ethical processes: Survey of ′instructions to authors′ provided by Indian journals
Bavdekar S,Gogtay Nithya,Chavan Ranjeet
Indian Journal of Medical Sciences , 2009,
Page 1 /325383
Display every page Item

Copyright © 2008-2017 Open Access Library. All rights reserved.