Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99


Any time

2020 ( 10 )

2019 ( 813 )

2018 ( 961 )

2017 ( 948 )

Custom range...

Search Results: 1 - 10 of 548878 matches for " Vijaya Kumar M. P. "
All listed articles are free for downloading (OA Articles)
Page 1 /548878
Display every page Item
In reply
Rao Srinivas,Baskaran M,Ramana Kumar P,Vijaya L
Indian Journal of Ophthalmology , 2004,
Pragmatic Aspect of C-Reactive Protein Alone and in Combination with Lipid Profile in Patients with Coronary Artery Disease
A. Vijaya Anand,S. Kalavathy,M. Chenniappan,P. Sampath Kumar
Journal of Medical Sciences , 2008,
Abstract: The present study was designed to evaluate the association of inflammatory marker C-reactive protein (CRP) alone and in combination with lipid profile in the prognosis of coronary artery disease (CAD) since the cardio vascular disease (CVD) is considered to be a multifactorial disease driven by inflammatory reactions. One hundred and fifty patients were recruited for the study, of which, 75 belongs to control and 75 were test group. For the entire study population CRP and lipid profile were measured. Among the patients with complication (test group), there was a significant elevation in the levels of CRP and lipid profile than the control. It was also found that a combination of measurement of CRP with total cholesterol (TC) or low-density lipoprotein (LDL) cholesterol testing may proven to be even a better marker of risk response in patients with CAD.
Fire-LEACH: A Novel Clustering Protocol For Wireless Sensor Networks Based On Firefly Algorithm
Sandeep Kumar E, Kusuma S.M., Vijaya Kumar B.P.
International Journal of Computer Science: Theory and Application , 2014,
Abstract: Clustering protocols have proven to increase the network throughput, reduce delay in packet transfer and save energy. Hence, in this work, we propose a novel clustering protocol that uses firefly algorithm inspired approach towards improving the existing basic LEACH protocol for reduction in steady-state energy consumption, aiming to enhance the network lifetime. The simulated results prove that implanting these kinds of computational intelligence into the pre-existing protocols considerably improves its performance.
Electromechanical and Dynamic Characterization of In-House-Fabricated Amplified Piezo Actuator
P. K. Panda,B. Sahoo,S. Raja,Vijaya Kumar M. P.,V. Shankar
Smart Materials Research , 2012, DOI: 10.1155/2012/203625
Abstract: A diamond-shaped amplified piezo actuator (APA) fabricated using six multilayered piezo stacks with maximum displacement of 173?μm at 175?V and the amplification factor of 4.3. The dynamic characterization of the actuator was carried out at different frequencies (100?Hz–1?kHz) and at different AC voltages (20?V–40?V). The actuator response over this frequency range was found neat, without attenuation of the signal. Numerical modeling of multilayered stack actuator was carried out using empirical equations, and the electromechanical analysis was carried out using ABAQUS software. The block force of the APA was 81?N, calculated by electromechanical analysis. This is similar to that calculated by dynamic characterization method. 1. Introduction Lead zirconate titanate (PZT) is a well-known piezo material that produces electric charges on application of mechanical stress (as sensor) or undergoes dimensional change when subjected to an electric field (as actuator) [1–5]. One major drawback of the piezo materials is the low displacement of the order of 0.1–0.15% of the total length; therefore, thick piezo stacks are required even for the moderate-strain requirements. For high-strain requirements wherein the requirement of the strain is in few millimeters, simple multilayer stacks are not suitable. This leads to the development of the various types of high-strain amplified actuators such as hydraulic actuator [6–13], Moonie [14] and Cymbal [15], diamond-shaped actuator, and bow-shaped actuator. In this study, the details of the fabrication and characterization of a diamond-shaped amplified actuators rare presented. Numerical modeling of multilayered stack actuator and amplified actuator is carried out using empirical equations and the electromechanical analysis using ABAQUS software. The values are correlated to the experimental results. 2. Experimental Procedure 2.1. Preparation of PZT Slurry PZT stacks were fabricated by tape-casting method using in-house-prepared PZT powders [16]. A well-dispersed PZT slurry was prepared using required amount of PZT powder, organic solvents (methyl ethyl ketone and ethanol), dispersant (Triton), binder, plasticizers, and so forth, by ball milling for 72?hr. An optimized PZT slurry composition is presented in Table 1. The slurry was then filtered and cast on a silicon-coated Mylar sheet using a laboratory tape caster. The thickness of the green tapes is varied between 20?μm and 200?μm by changing the parameters such as the clearance of doctor blade, the casting speed, and the viscosity of the slurry. Table 1: Typical PZT
A Novel Microcontroller Based Power Factor Correction (PFC) Boost Converter with EMI Filter
P. Ram Mohan,M. Vijaya Kumar,S. Rama Reddy,O.V. Raghava Reddy
International Journal of Electrical and Power Engineering , 2012,
Abstract: This study deals with the simulation and implementation of Power Factor Correction (PFC) boost converter along with Electro Magnetic Interference (EMI) filter. The boost converter of PFC Circuit is analyzed, designed and then simulated for resistive load. Near unity power factor is obtained by using PFC Boost Converter with EMI Filter. The laboratory model is implemented and the experimental results are obtained. These experimental results are correlated with the simulation results.
Novel Zero Voltage Transition (ZVT) Technique Based Closed Loop Control of Boost Power Factor Correction (PFC) Converter with EMI Filter
P. Ram Mohan,M. Vijaya Kumar,S. Rama Reddy,O.V. Raghava Reddy
International Journal of Electrical and Power Engineering , 2012,
Abstract: A novel Zero Voltage Transition (ZVT) technique based closed loop control of Boost Power Factor Correction (PFC) converter with Electro Magnetic Interference (EMI) Filter is presented in this paper. It operates at a fixed frequency while achieving zero voltage turn-on of the main switch and zero current turn-off of the boost diode. This is accomplished by employing resonant operation only during switch transitions. During the rest of the cycle, the resonant network is essentially removed from the circuit and converter operation is identical to its non-resonant counterpart. A prototype of 500W is built to test the proposed topology. The input voltage is from 170 to 230 Vrms. The output voltage is 400V. The operation frequency is 100 KHz. This technique increases the efficiency to 95% and power factor to 0.99.
A novel topology of EMI filter to suppress common mode and differential mode noises of electro magnetic interference in switching power supplies
P. Ram Mohan,M. Vijaya Kumar,O.V. Raghava Reddy
Journal of Engineering and Applied Sciences , 2007,
Abstract: This paper deals with Electro Magnetic Interference (EMI) in switching power supplies. The EMI consists of mainly common mode and differential mode noises. Due to interference, the efficiency of the equipment reduces and some times the equipment may be damaged. A procedure to design a novel topology of EMI filter to suppress these two noises is presented in this paper.
Mobile Node for Wireless Sensor Network to Detect Landmines
P.Vijaya Kumar,M.Saravana Guru,R.Saparnaa,D.Saravanan
International Journal of Computer Science Issues , 2012,
Abstract: Individual sensor nodes are low power devices which integrate computing, wireless communication and sensing capabilities to detect land mine. Such multiple nodes collectively form wireless sensor network. To detect landmine in ground surface, sensor node that able to sense the mine and to process the information locally are mounted on a mobile robot to scan the ground surface in the organized pattern resulting in detection of all the mines present in the proposed area which is synchronized by Infrared pills; the node can communicate to the data collection point (Sink) typically through wireless communication. The aggregation of such multitude of mobile nodes and a mobile sink forms a versatile mine detection unit. When the mine is detected the node routes it information to the hand held device (Base) through sink and stays in it position to help the Deming crew to identify the position where the mine is present. When the Deming crew presses a button the node continues in its pattern.
Spatial Statistical Analysis of burglary Crime in Chennai City Promoters Apartments: A CASE STUDY
M.Vijaya Kumar
International Journal of Engineering Trends and Technology , 2011,
Abstract: With increasing availability of public interactive mapping tools comes the likelihood of knowledge to be misunderstand or misused. This study makes use of the Chennai city Promoter Apartments as a case study to evaluate various spatial statistic analysis & mapping techniques with a focus on crime. Knowledge is integrated from a few sources, including Chennai City Police Service statistical reports, community statistics and a recently developed webbased interactive crime mapping interface with a objective of demonstrating various visualization approaches to the same dataset and crime variables
Cryptography – A solution for information security Threats
M.Vijaya Kumar
Golden Research Thoughts , 2013, DOI: 10.9780/22315063
Abstract: Providing Information security is a fast moving technology in the field of computer science. The success and growth of the Internet has become fertile ground for malicious attackers and abusers, unauthorized users. With the increasing number of security devices and protocols in the information, the complexity of detecting and tracing the information security become a very challenging task. Information security and cryptography is a branch of knowledge too varied to coverage almost how to protect data in digital form and to allow protection avails. Cryptography is the science of writing in cipher code. Cryptography is where security engineering meets mathematics. It provides us with the tools that underlie most modern security protocols. The basic terminology is that cryptography refers to the science and art of designing ciphers; cryptanalysis to the science and art of breaking them; while cryptology, often shortened to just crypto, is the study of both. The input to an encryption process is commonly called the plaintext, and the output the cipher text. As applied to computer information security, cryptography protects data from theft or alteration and can also be used for user authentication. Rapidly rising cyber crimes and the growing prospect of the Internet being used as a medium for terrorist attacks pose a major challenge for Information security. Cryptography is a solution to this challenge, since it underpins privacy, confidentiality, and identity, which together provide the fundamentals for trusted e-commerce and secured data communications. Three general types of cryptographic schemes typically used: secret key (or symmetric) cryptography, public-key (or asymmetric) cryptography, and hash functions.These schemes are used to create encrypted data known as cipher text that is usually much more secure than non-encrypted information. The security mechanisms are primarily based on cryptographic algorithms like symmetric-DES, asymmetric-RSA. The logical conclusion is to use both kind of algorithms and their combinations to achieve optimal speed and security levels. For the purposes of computer and information security, cryptography and data encryption must satisfy the following requirements: Authentication, Privacy, Integrity, and Nonrepudiation. It is shown by experimental results that this system of secret codes provides a valuable model and algorithms to help to find the security rules, adjust the security measure and improves the security performance.
Page 1 /548878
Display every page Item

Copyright © 2008-2017 Open Access Library. All rights reserved.