oalib

OALib Journal期刊

ISSN: 2333-9721

费用:99美元

投稿

匹配条件: “Suganya” ,找到相关结果约47条。
列表显示的所有文章,均可免费获取
第1页/共47条
每页显示
Elimination of Silent Data Corruption by Improved Error Detection using Difference Set Codes for Memories
Vaishnavi,Karthika,Suganya
International Journal of Engineering and Advanced Technology , 2013,
Abstract: Now-a-days, the memory devices are susceptible to Single Event Upsets (SEU) which is one of the soft errors due to radiation effects. Though several error correcting codes (ECC) are available, the simplest and effective ECC for memory application is Difference Set Cyclic Codes (DSCC). These codes are Majority logic decodable codes. This method of error correction will lead to Silent Data Corruption (SDC) in which the additional errors beyond the code’s correction capability are not detected. This SDC will provide faulty word after decoding which actually looks like error free corrected word. This is because the existing method assumes that the input word contains error which is less than the error correction capability and it tends to correct the additional errors, resulting in wrong output. The proposed algorithm will eliminate the SDC and detect the any number of additional errors. The proposed algorithm is coded in VHDL and simulated using Modelsim and Xilinx ISE simulator
Simulated Annealing based Optimization Model for the Gossamer Protocol
Rama N.,Suganya R.
International Journal of Engineering Science and Technology , 2010,
Abstract: The use of low cost passive RFID tags has become very prevalent. Lightweight cryptography has evolved to address the security issues in these tags. The Gossamer protocol is a lightweight mutualauthentication protocol which has guaranteed considerable security in these passive tags. As power is a major constraint in these tags, a detailed analysis of the power consumed by the Gossamer protocol was undertaken and results presented. It was determined that optimizing the power consumed by the protocol can result in substantial power savings and hence significantly enhance the performance of the RFID system. This paper proposes a new optimization model based on the simulated annealing method, that ensures the bounding of the number of power-crunching operations carried out in each run of the Gossamer protocol. The validity of the model is also established by the presentation and discussion of an experimental instance.
SSL-MAP: A More Secure Gossamer-based Mutual Authentication Protocol for Passive RFID Tags
Rama N,Suganya R.
International Journal on Computer Science and Engineering , 2010,
Abstract: RFID systems that employ passive RFID tags, are run using lightweight protocols. The Gossamer protocol is a case in point. However, it is found that the Gossamer protocol uses rather simple operations, in order to ensure that the protocol is lightweight. This raises security concerns. A protocol based on the Sign/Logarithm number system to make it power-efficient, and the efficient use of one-dimensional convolution to secure the transmission of the tag’s ID value, is proposed. Thus, a protocol that is power-efficient and more secure than the Gossamer protocol is proposed. Further, this protocol may be used even in the basic passive tag, which has minimal processing capability and no power source of its own.
SCALABLE PARALLEL COUNTER ARCHITECTURE BASED ON STATE LOOK-AHEAD LOGIC
Kumari Arati,Suganya. S
International Journal of Advances in Engineering and Technology , 2012,
Abstract: This paper presents a high- speed and wide-range parallel counter that achieves high operating frequencies through a pipeline partitioning methodology (a counting path and state look-ahead path), using only three simple repeated module types: an initial module generates anticipated counting states for higher significant bit modules through the state look-ahead path , simple D-type flip-flops, and 2-bit counters. The state look-ahead path prepares the counting path’s next counter state prior to the clock edge such that clock edge triggers all modules simultaneously, thus concurrently updating the count state with a uniform delay at all counting path modules/stages with respect to the clock edge. The structure is scalable to arbitrary N-bit counter widths using only the three modules types and no fan-in or fan-out increase. The proposed architecture is verified by verilog HDL in ModelSim.
A Detailed Study on Energy Efficient Techniques for Mobile Adhoc Networks
S. Suganya,S. Palaniammal
International Journal of Computer Science Issues , 2011,
Abstract: The performance of wireless networks in the applications like transferring video files is subjected to dual constraints. Both minimization of power and other QoS requirements like delay, throughputs are have to be take care properly. Mobile Ad Hoc Networks are more perceptive to these issues where each mobile device is active like a router and consequently, routing delay adds considerably to overall end-to-end delay. This paper presents a survey on power efficient routing protocols for Mobile Ad-Hoc Networks. This survey centered on recent progress on power saving algorithms. In addition we suggest one energy efficient technique which will reduce energy consumption as well as increase the lifetime of node and network.
Design of Multiple Master ASIC Interconnect
G. Suganya,R. Muthaiah
Journal of Artificial Intelligence , 2013,
Abstract: System on Chip is composed of many Intellectual Property (IP) blocks which communicate with each other using different bus protocols. Each IP may have different native protocol. So establishing communication between these bus protocols which vary from one IP to another is of much significance. The protocols used may be either proprietary or non-proprietary. AXI 1.0 and OCP 2.0 protocols and are used to build our ASIC interconnect system. Here we establish communication between these two protocols using an AXI to OCP converter. This converter acts as a bridge between the two protocols clearing the incompatibilities for communication. We also use a clock bridge to enhance communication between IP blocks that operate at different frequencies. The numbers of masters, slaves, address and data widths are also configurable depending on the requirement. The AXI master, AXI to OCP converter, Clock Bridge, OCP master, OCP slaves, arbiter and address decoder are designed using VHDL and synthesized.
A Study On Death Anxiety Among The Aged Group
S. Suganya,P. Chandra Bose
Golden Research Thoughts , 2013, DOI: 10.9780/22315063
Abstract: Death anxiety is the state in which the individual experiences apprehension, worry or fear related to death or dying. The aim of the present research is to investigate about death anxiety among the aged. 50 samples (25 males and 25 females)of age group above 60 years were selected on the bases of stratified random sampling in and around Chidambaram town.TEMPLER DEATH ANXIETY SCALE was used to find their level of death anxiety. Independent “t” test was used to find the significant difference regarding death anxiety. The result showed that there is a significant difference between male and female in death anxiety.
Segmentation of Tumor In MRI Brain Images And Classification Using Neural NetworK
Suganya.R,Mohandas. R
International Journal of Advanced Electrical and Electronics Engineering , 2013,
Abstract: The aim of this paper is to introduce a novel semi supervised scheme for abnormality detection and segmentation in medical images. Semi supervised learning does not require pathology modeling and, thus, allows high degree of automation. In abnormality detection, a vector is characterized as anomalous if it does not comply with the probability distribution obtained from normal data. The estimation of the probability density function, however, is usually not feasible due to large data dimensionality. In order to overcome this challenge, we treat every image as a network of locally coherent image partitions (overlapping blocks).For each block, the parameters are estimated like energy, PCA, maximization and the dissimilarity criterion. Based on these parameters the abnormal block is estimated and the estimated block is segmented using EM algorithm. From the segmented tumor the statistical features such as energy, entropy, standard deviation, mean, variance etc are estimated and these features are trained using feed forward network back propogation algorithm and classified to what type the segment tumor belongs.
The production of guava juice fortified with dietary fiber
Woranong Thongsombat,Anchalee Sirichote,Suganya Chanthachum
Songklanakarin Journal of Science and Technology , 2007,
Abstract: The production of guava juice fortified with soluble dietary fiber as pectin extracted from guava cake (peel, pulp, seeds) was conducted. The waste guava cake from juice processing plant was used for pectin extraction using sodium hexametaphosphate method followed by pectin precipitation using acidified ethanol method. A yield of 30.50±0.34% crude pectin was achieved. Crude pectin also contained 4.71±0.18% moisture, 0.34±0.21% protein, 0.68±0.00% ash, 20.70±0.16 g (%dwb) soluble dietary fibers. pH of crude pectin was 3.06±0.02. The L* a*and b* values were 81.17±0.21, 4.76±0.04 and 15.43±0.07, respectively. Water holding capacity and bulk density were 0.90±0.01 g.water/g.solid and 0.96±0.05 g/ml, respectively. This study found that the optimum conditions for guava juice extraction using pectinase at 45oC were 0.10 % v/v pectinase concentration and 21 2 h incubation time. Under these optimum conditions, production of guava juice with different ratios of total soluble solids (oBrix) to acid as citric acid content (%) including, 24.0, 28.0, 32.0, 35.0 and 40.0 oBrix-acid ratio, and product sensory evaluation were also conducted. By the consideration from the greatest perceived scores of all sensory evaluation attributes including color, turbidity, odor, flavor and overall acceptability, the oBrix-acid ratio of 40.0 was selected for guava juice processing. The clarified guava juice was then fortified with pectin powder extracted from previous experiments using various pectin concentrations: 0, 0.25, 0.50 and 0.75% (w/w). It was found that the perceived scores of the overall acceptability attribute decreased (p<0.05) with increasing of pectin concentration. The greatest perceived score of the mouthfeel attribute was observed from the use of 0.25% pectin. Therefore, the optimum concentration of 0.25% soluble dietary fiber as pectin for guava juice fortification is selected for further guava juice processing.
Pharmacological and biomolecular investigations of a polyherbal formulation (AAF-6) for its antiasthmatic activity
Antony A,JayaSankar K,Roy Partha,Suganya
International Journal of Green Pharmacy , 2010,
Abstract: We investigated the antiasthmatic activity of a herbal preparation from a combination of six Indian medicinal plants. The current study was undertaken to assess the antiasthmatic activity of a polyherbal formulation (AAF-6) using ovalbumin-induced asthmatic rats. The animals were divided into five groups: solvent control, ova sensitised control, ova sensitised plus Ketotifen (KT), ova sensitised + parallel treatment with AAF-6 and ova sensitised + post-treatment with AAF-6. Total and differential white blood cell count, total protein content, nitrite level, myeloperoxidase (MPO) activity and mast cell stabilising activity were estimated. Intragastric administration of AAF-6 (100 mg/kg body weight) significantly reduced total and differential white blood cell count, normalised the increased protein level, and decreased the nitrite level and MPO activity, and increased mast cell stabilising activity, when compared with ova sensitised control. Statistical analyses were done by one-way analysis of variance (ANOVA) followed by Bonferroni post hoc test at a level of significance P<0.05. AAF-6 exhibited quite a competitive potential when compared with the standard drug KT, affording a possible alternative therapeutic agent in the treatment of asthma.
第1页/共47条
每页显示


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.