822 research outputs found

    Performance Enhancement of Cisc Microcontroller

    Get PDF
    Increase in the speed of the system always demands for a major alteration on the existing system, which result in overall cost of the implementation of a system. Generally, CISC controllers are used for control operations, which have large number of instruction sets and take a large amount for processing due to its multiple sizes. For very high speed of controlling these controllers may fail to operate properly. The alternate solution is the RISC controllers, which are considerably faster than the normal CISC controllers. But these controllers have got various limitations as less instruction operations, complex register operation, costlier than the CISC controller etc. The only solution to this problem is the enhancement to the operational speed of a CISC controller, by enhancing the overall controller operation. Additionally, today�s controller doesn�t support the floating-point operation for signal processing. The enhancement of existing CISC controller by pipelining the overall operational flow of a CISC microcontroller and it includes the enhancement of UART. This research work is to be implemented using VHDL language and simulated using Active-HDL tool for functional verification

    A NOVEL TECHNIQUE FOR SECURE ENCRYPTED MESSAGES IN MOBILE AND PERVASIVE APPLICATIONS

    Get PDF
    More than applications rely on the existence of small devices that can exchange information and form communication networks. In a significant portion of such applications, the confidentiality and integrity of the communicated messages are of particular interest. In this work, to propose two novel techniques for authenticating short encrypted messages that are directed to meet the requirements of mobile and pervasive applications. By taking advantage of the fact that the message to be authenticated must also be encrypted, to propose provably secure authentication codes that are more efficient than any message authentication code in the literature. The key idea behind the proposed techniques is to utilize the security that the encryption algorithm can provide to design more efficient authentication mechanisms, as opposed to using standalone authentication primitives

    AN EMPIRICAL RESEARCH ON THE SOFTWARE ENGINEERING PROCESS MODELS

    Get PDF
    Technology is increasing day by day and as per the needs of consumers so many applications are developing regularly. To achieve the success of all these applications one should follow the software process in implementing the system. Without following the software engineering process also we can develop the application but we can’t assure the client that the end product will attain the quality and the satisfaction of the customers. To implement the applications in a systematic way, there are different software process models are there. Let us review some of the models along with their advantages and dis-advantages. By going through with this review one can easily estimate which model will be best suitable for their development environment

    Face Recognition Based Attendance System Using Histogram of Oriented Gradients and Linear Support Vector Machine

    Get PDF
    In the 21st century, modern technology is playing an important role in providing innovative on traditional challenges across various domains or sectors. One such challenging task is of daily attendance marking and tracking. Manual attendance requires efforts and it is time-consuming. Sometimes attendance cannot be mark due to human errors. Relying on voice, iris, or fingerprint recognition, increases the complexity and the hardware infrastructure of the system and also increases the cost. To effectively address such issues, we have developed a “Camera based Attendance System”. This system encompasses several crucial stages, including data entry, dataset of multiple people. It is an image-based face recognition system for marking attendance on the SQL database. It excels in detecting and recognizing multiple individuals faces from image and comparing it with the dataset for accurately marking the attendance. This makes the attendance marking process fully automatic. Remarkably, our proposed system attains an impressive recognition and provides the accuracy of approximately 95%. With this solution, daily attendance marking and recording becomes effortless and the stored attendance record can be also used in future if require, eliminating the risk of attendance not getting marked due to human error.&nbsp

    Two Dimensional CFD Analysis on Different Rocket Nozzles

    Get PDF
    The reduction of Earth-to-orbit launch costs in conjunction with an increase in launcher reliability and operational Efficiency is the key demands on future space transportation systems, like single-stage-to-orbit vehicles (SSTO). The realization of these vehicles strongly depends on the performance of the engines, which should deliver high performance with low system complexity. Performance data for rocket engines are practically always lower than the theoretically attainable values because of imperfections in the mixing, combustion, and expansion of the propellants. The main part of the project addresses different nozzle concepts with improvements in performance as compared to conventional nozzles achieved by Different Mach numbers, thus, by minimizing losses caused by over- or under expansion. The design of different nozzle shapes and flow simulation is done in gambit and fluent software’s respectively for various parameter

    Contrasting seed biology of two ornamental palms: Pygmy Date Palm (Phoenix roebelenii O’Brien) and Fishtail Palm (Caryota urens L.) and implications for their long-term conservation

    Get PDF
    477-484The Arecaceae family includes palm trees of economic importance both as a source of agricultural produce and as ornamental components in landscaping projects. Pygmy date palm (Phoenix roebelenii) and solitary fishtail palm (Caryota urens) are well known landscaping plants today. Both species have their origin in Southeast Asia and, especially C. urens is widespread in peninsular India and Sri Lanka. They are multipurpose species with a variety of applications and thus very heavily utilized. Knowledge of palm seed storage biology will improve their conservation prospects. In present studies, fresh seed moisture content in P. roebelenii was recorded to be 30% with germinability of 98%. After desiccation to 8% moisture germinability was reduced to 90% and the seeds survived cryo-exposure. Fresh seeds of C. urens, with initial moisture content of 34% and 95% germinability could be desiccated to lowest level of only 29% moisture content, with complete loss of germinability. Fresh as well as desiccated seeds of this species did not survive cryo-exposure. While the seeds of C. urens stored at room temperature lost their germinability by 110 days, seeds of P. roebelenii could germinate even after 9 months of storage. P. roebelenii is proven to exhibit orthodox seed storage behaviour while C. urens is found to exhibit recalcitrant seed storage behaviour. Long-term ex situ cryo-conservation in the form of seed gene banks would be suitable for seed propagated orthodox palm species and a few germplasm centres may be established for recalcitrant Indian palms in suitable bio-geographic regions as a complimentary ex situ conservation

    A Study on Concepts De-Laval Nozzle using CFD Tool

    Get PDF
    A device that is used to control the characteristics of fluid is known as a nozzle. Its primary function is to increase the fluid\u27s rate of motion. A traditional De-Laval nozzle will have three distinct parts: a throat, a converging section, and a diverging part. This paper will attempt to detail the bulk of the nozzle concepts developed by De Laval. This paper provides a comprehensive analysis of the nozzle\u27s operational philosophy. In addition, theoretical flow analysis is carried out at a number of locations along the length of the nozzle. The dynamic changes in flow parameters such as pressure, temperature, velocity, and density may be seen with the use of computational fluid dynamics (CFD). The use of CFD is also employed in the simulation of shockwaves

    Transient activation of human cytomegalovirus lytic gene expression during latency allows cytotoxic T cell killing of latently infected cells.

    Get PDF
    Human cytomegalovirus (HCMV) latency in the myeloid lineage is maintained by repressive histone modifications around the major immediate early promoter (MIEP), which results in inhibition of the lytic viral life cycle. We now show that pharmacological inhibition of histone deacetylases (HDACs) relieves this repression of the MIEP and induces transient expression of the viral lytic immediate early (IE) antigens but, importantly, not full virus reactivation. In turn, these latently infected cells now become targets for IE-specific cytotoxic T cells (CTLs) which are present at high frequency in all normal healthy HCMV positive carriers but would normally be unable to target latent (lytic antigen-negative) cells. This approach of transiently inducing viral lytic gene expression by HDAC inhibition, in otherwise latently infected cells, offers a window of opportunity to target and purge the latent myeloid cell reservoir by making these normally immunologically undetectable cells visible to pre-existing host immune responses to viral lytic antigens.This work was funded by a British Medical Research programme grant, grant number G0701279 and Wellcome Research Grant, grant number RG68483. This research was supported by the Cambridge NIHR BRC Cell Phenotyping Hub.This is the final version of the article. It first appeared from Nature Publishing Group via http://dx.doi.org/10.1038/srep2467

    CFD ANALYSIS NANOFLUIDS TURBULENT CONVECTIVE HEAT TRANSFER

    Get PDF
    Rating improve heat transfer due to the use of nanofluids has recently become of interest to many researchers center. This category newly introduced liquid containing ultrafine nanoparticles has to offer (1-100 nm) cooling fantastic behavior during testing, including higher thermal conductivity and heat transfer coefficient improved compared to the pure liquid. This review article summarizes the numerical studies in this area. And it will perform a theoretical study of a single phase through a tube coming out. And it will not be considered in the CFD simulation of heat transfer characteristics of Nanofluid in a circular tube under constant temperature camouflage using the CFX solver (version 13.0) in a turbulent flow. Will Fe3O4nanoparticles in water with a concentration of 0.02%, 0.1%, 0.3% and 0.6% used in this simulation. It is assumed that all thermal and physical properties of nanofluids to be independent of temperature. the average particle size of 36 nm in this search is used. The goal is to know the change in the heat transfer coefficient with the change of the Reynolds number and concentration coefficient Convective heat transfer nanoparticles.Themaximum will be held with a change in the concentration of nanoparticles in water. It will be solved the equations of the model computational fluid dynamics (CFD) to predict the behavior of the hydrodynamic and thermal tube. It will be engineering problem and the complexity of it in ANSYS Workbench. ByANSYS models will have a 13.0 CFX solver solution
    • …
    corecore