409 research outputs found

    IMPLEMENTATION OF PIPELINED DES USING VERILOG

    Get PDF
    An implementation of the Data Encryption Standard (DES) algorithm is described. Protection of data during transmission or while in storage may be necessary to maintain the confidentiality and integrity of the information represented by the data. The algorithms uniquely define the mathematical steps required to transform data into a cryptographic cipher and also to transform the cipher back to the original form. The proposed pipeline method is for improving the speed of execution when compare with the non-pipeline method

    A Study on Strengthening the Operational Efficiency of Dairy Supply Chain in Tamilnadu, India

    Get PDF
    AbstractThe main objective of this paper is to study the issues in improving the operational efficiency of the dairy supply chain in Tamil Nadu, India. Dairy Farming is a major occupation of the people of Tamil Nadu, India and it contributes a significant amount to the growth of our country. In this paper, Tamil Nadu dairy development department's objectives and its three-tier structure were studied. Through SWOT analysis its strengths, weaknesses, opportunities and threats were analyzed. In our study Tamil Nadu Cooperative Milk Producers Federation is compared with Gujarat Cooperative Milk Producers Federation (AMUL). The major issues influencing the dairy farming are studied through literature survey, field study and researchers experience. They are presented in this paper. There were three major important field studies conducted at various time periods. The data has been collected through a questionnaire method and these interactions were recorded by a video camera. Based on the research work carried out on dairy supply chain in Tamil Nadu, India, some key recommendations are made for the attention of policy makers to strengthen the operational efficiency. There are five areas of focus. They are, creation of special dairy zone, implementing dynamic milk procurement method, strengthening cooperative societies, creation of feed bank and increasing fodder productivity, integrated animal health plan and information technology

    Reconfiguration with Simultaneous DG installation to Improve the Voltage Profile in Distribution Network using Harmony Search Algorithm

    Get PDF
    Due to dynamic nature of loads, total system load is more than its generation capacity that makes relieving of load on the feeders not possible and hence voltage profile of the system will not be improved to the required level. In order to meet required level of load demand, Reconfiguration & DG units are integrated in distribution network to improve voltage profile, to provide reliable and uninterrupted power supply and also to achieve economic benefits such as minimum power loss, energy efficiency and load leveling. This work proposes minimization of real power losses and improvement of voltage profile using network reconfiguration in the presence of distributed generation. Generally distributed generations (DG) are preferred with objective of minimizing real power loss and improving voltage profile in distribution system. In this work A meta heuristic Harmony Search Algorithm (HSA) is used to simultaneously reconfigure and identify the optimal locations for installation of DG units in a distribution network. Sensitivity analysis is used to identify optimal locations for installation of DG units. The proposed method has tested in MATLAB for 33-bus and 69- Bus radial distribution systems at three different load levels and the analysis is presented for loss minimization

    Combined effects of internal heat generation and viscous dissipation for double diffusive with Forchheimer fluid model

    Get PDF
    In this paper, a numerical study using shooting technique is applied for a double diffusive flow for the combined effects of internal heat generation and viscous dissipation over a vertical heated plate under the influence of variable fluid properties is carried out. The governing equations of the physical problem are non-linear and coupled partial differential equations for velocity, temperature and concentration distributions. Using a suitable similarity transformation, the governing equations are transformed to ordinary differential equations involving the various non-dimensional parameters of the problem. Please download the full abstract below

    A SECURITY ASPECT IN EMERGENCY DRIVING

    Get PDF
    The general structure is dependent on the AT89S52 microcontroller. Even the key role of DTMF continues to be implied by the aid of which appropriate user can control the safety options of car if it's thievery. The GPS navigation module offers the place to GSM that will further sent towards the user through message. To be able to retrieve the place of car by hand, the consumer will be sending message particularly format on GSM, that will further allows GPS navigation. It's embedded the idea of wireless communication i.e. zigbee and GSM and lots of other sensors by the aid of which immediate help could be shipped to the one who has met by having an accident. Research content uses we've got the technology of signee for that transmission of message to another vehicle within the duration of necessity of their help and for serving the mark of secure driving the functions like motorists alcohol recognition, vehicle speed slowing down and automatic vehicle lock with collision recognition can be used. These studies is essentially with a digital camera that you can use during the time of emergency while worries. The GPS navigation may also be used for locating the exact vehicle location in order that it is available if lost

    DBC based Face Recognition using DWT

    Full text link
    The applications using face biometric has proved its reliability in last decade. In this paper, we propose DBC based Face Recognition using DWT (DBC- FR) model. The Poly-U Near Infra Red (NIR) database images are scanned and cropped to get only the face part in pre-processing. The face part is resized to 100*100 and DWT is applied to derive LL, LH, HL and HH subbands. The LL subband of size 50*50 is converted into 100 cells with 5*5 dimention of each cell. The Directional Binary Code (DBC) is applied on each 5*5 cell to derive 100 features. The Euclidian distance measure is used to compare the features of test image and database images. The proposed algorithm render better percentage recognition rate compared to the existing algorithm.Comment: 15 pages,9 figures, 4 table

    A Study on Sanctuary and Seclusion Issues in Internet-of-Things

    Get PDF
    Internet-of-Things (IoT) are everywhere in our daily life. They are used in our homes, in hospitals, deployed outside to control and report the changes in environment, prevent fires, and many more beneficial functionality. However, all those benefits can come of huge risks of seclusion loss and sanctuary issues. To secure the IoT devices, many research works have been con-ducted to countermeasure those problems and find a better way to eliminate those risks, or at least minimize their effects on the user�s seclusion and sanctuary requirements. The study consists of four segments. The first segment will explore the most relevant limitations of IoT devices and their solutions. The second one will present the classification of IoT attacks. The next segment will focus on the mechanisms and architectures for authentication and access control. The last segment will analyze the sanctuary issues in different layers
    • …
    corecore