SRM University

Displaying 1-14 of 14 results

  • White Papers // Aug 2012

    Feature Extraction Based Face Recognition Using Extreme Learning Machine (ELM)

    In recent years, Face recognition becomes one of the popular biometric identification systems used in identifying or verifying individuals and matching it against library of known faces. Biometric identification is an actively growing area of research and used in electronic commerce, electronic banking, electronic passports, electronic licenses and security applications....

    Provided By SRM University

  • White Papers // Apr 2012

    A Comparitive Analysis on Nanowire Based MEMS Pressure Sensor

    This paper compares a MEMS Piezoresistive pressure sensor which utilizes a circular and square shaped polysilicon diaphragm with a nanowire to enhance the sensitivity of the pressure sensor. The nanowires for both the sensors form the bridge between the diaphragm assembly. The high Piezoresistive effect of polysilicon nanowires is used...

    Provided By SRM University

  • White Papers // Jan 2012

    An Interactive and Efficient Voice Processing for Home Automation System

    Home networking has evolved from linked personal computers to a more complex system that encompasses advanced security and automation applications. Once just reserved for high-end luxury homes, home networks are now a regular feature in residences. These networks allow users to consolidate heating, air conditioning, lighting, appliances, entertainment, intercom, telecommunication,...

    Provided By SRM University

  • White Papers // Jul 2011

    Problem Analysis of Routing Protocols in MANET in Constrained Situation

    A Mobile Ad-hoc NETwork (MANET) consists of a number of mobile wireless nodes, among which the communication is carried out without having any centralized control. MANET is a self organized, self configurable network having no infrastructure, and in which the mobile nodes move arbitrarily. The mobile nodes can receive and...

    Provided By SRM University

  • White Papers // Jul 2011

    An Effective Symmetric Key Recovery Scheme for Secure Onboard Satellite Applications

    Reconfigurable FPGAs promise high density, performance and good schedulable options with their wide range of SRAM target devices that can be hosted for any applications. The SRAM FPGAs are widely used due to their vast resources and ease to design, but critically suffers due to radiation errors called Single Event...

    Provided By SRM University

  • White Papers // Jul 2011

    Telemedicine Using Computer Communication Network

    Most of the Telemedicine Centers maintenance cost is very high. Mostly the Telemedicine centers have hierarchical structure of Network Model. Telemedicine Nodes are maintenance from VSAT to TM Foundation, TM division to TM Nodes. This hierarchical structure of maintenance cost is very high. The author's research work proposed Telemedicine using...

    Provided By SRM University

  • White Papers // Jun 2011

    Confronts and Issues in M-Commerce [a Business on Mobile and Net Approach]

    There has been a tremendous growth in wireless technology in the last decade. This advancement has changed how people do business in Mobile Commerce (M-Commerce) environment. For creating a more secure and exible m-commerce infrastructure so as to meet the new demands, one needs to leverage new technologies like 3G/UMTS,...

    Provided By SRM University

  • White Papers // May 2011

    Scalable Performance Enhancement in Coexistent Heterogeneous Wireless Packet Networks

    In today's scenario as the usage of ISM band is increasing rapidly there are many scenarios where the authors need communication systems like Wireless Local Area Networks (WLANs) based on IEEE 802.11b specifications and Wireless Personal Area Networks (WPANs) based on IEEE 802.15.4 specifications coexisting in the same place. In...

    Provided By SRM University

  • White Papers // Jan 2011

    Genetic Algorithm for Solving Optimal Power Flow Problem With UPFC

    This paper concerns the Optimal Power Flow [OPF] in multi machine Power System with UPFC using Genetic Algorithm [GA]. The objective is to minimize the cost of the power system, to enhance the power flow in transmission lines and to maintain the voltages at the buses using UPFC. Using the...

    Provided By SRM University

  • White Papers // Oct 2010

    A Novel QoS Frame Work for MDSRAODV Routing Protocol in MANET

    Mobile Ad hoc NETwork (MANET) is a multi-hop temporary autonomous system of mobile nodes with wireless transmitters and receivers without the aid of pre-established network infrastructure. With the development of network and demand of users, QoS has become one of the focus issues. Some of the routing protocols provide QoS...

    Provided By SRM University

  • White Papers // Feb 2010

    A Propose Architecture of MANET for Disaster Area Architecture

    Wireless ad hoc networks have become an important area of research in wireless communications systems. Unlike some existing networking technologies such as Internet Protocol (IP) networks or cellular systems, wireless ad hoc networks have the advantage that deployment of networks does not require preexisting infrastructures. Ad hoc networks have neither...

    Provided By SRM University

  • White Papers // Jan 2010

    Integrating Generative and Aspect-Oriented Technologies for Framework Instantiation

    Application frameworks have been successfully used as valuable tools to improve software quality while reducing development efforts. Nevertheless, frameworks still face important challenges in order to be widely adopted. In particular, framework instantiation is still a painful task requiring application developers to understand the intricate details surrounding the framework design....

    Provided By SRM University

  • White Papers // Jun 2009

    Online Multi-Parameter 3D Signature Verification Through Curve Fitting

    Biometric based personal identification is a reliable and widely accepted method for authentication. Human 3D signature is distinct from other biometric authentication methods due to the presence of third dimensional hidden information. In this paper, a new model for on-line 3D signature verification using multiple parameters is proposed. The parameters...

    Provided By SRM University

  • White Papers // Nov 2008

    Direct Trust Estimated on Demand Protocol for Secured Routing in Mobile Adhoc Networks

    Adhoc network is a collection of wireless nodes communicating among themselves over multihop paths, without the help of any infrastructure such as base stations or access points. Although many previous techniques have been proposed for the secure routing, in this paper the authors propose a more reasonable and unambiguous equation...

    Provided By SRM University

  • White Papers // Jan 2011

    Genetic Algorithm for Solving Optimal Power Flow Problem With UPFC

    This paper concerns the Optimal Power Flow [OPF] in multi machine Power System with UPFC using Genetic Algorithm [GA]. The objective is to minimize the cost of the power system, to enhance the power flow in transmission lines and to maintain the voltages at the buses using UPFC. Using the...

    Provided By SRM University

  • White Papers // Apr 2012

    A Comparitive Analysis on Nanowire Based MEMS Pressure Sensor

    This paper compares a MEMS Piezoresistive pressure sensor which utilizes a circular and square shaped polysilicon diaphragm with a nanowire to enhance the sensitivity of the pressure sensor. The nanowires for both the sensors form the bridge between the diaphragm assembly. The high Piezoresistive effect of polysilicon nanowires is used...

    Provided By SRM University

  • White Papers // Jan 2012

    An Interactive and Efficient Voice Processing for Home Automation System

    Home networking has evolved from linked personal computers to a more complex system that encompasses advanced security and automation applications. Once just reserved for high-end luxury homes, home networks are now a regular feature in residences. These networks allow users to consolidate heating, air conditioning, lighting, appliances, entertainment, intercom, telecommunication,...

    Provided By SRM University

  • White Papers // Aug 2012

    Feature Extraction Based Face Recognition Using Extreme Learning Machine (ELM)

    In recent years, Face recognition becomes one of the popular biometric identification systems used in identifying or verifying individuals and matching it against library of known faces. Biometric identification is an actively growing area of research and used in electronic commerce, electronic banking, electronic passports, electronic licenses and security applications....

    Provided By SRM University

  • White Papers // Jun 2009

    Online Multi-Parameter 3D Signature Verification Through Curve Fitting

    Biometric based personal identification is a reliable and widely accepted method for authentication. Human 3D signature is distinct from other biometric authentication methods due to the presence of third dimensional hidden information. In this paper, a new model for on-line 3D signature verification using multiple parameters is proposed. The parameters...

    Provided By SRM University

  • White Papers // Oct 2010

    A Novel QoS Frame Work for MDSRAODV Routing Protocol in MANET

    Mobile Ad hoc NETwork (MANET) is a multi-hop temporary autonomous system of mobile nodes with wireless transmitters and receivers without the aid of pre-established network infrastructure. With the development of network and demand of users, QoS has become one of the focus issues. Some of the routing protocols provide QoS...

    Provided By SRM University

  • White Papers // Jun 2011

    Confronts and Issues in M-Commerce [a Business on Mobile and Net Approach]

    There has been a tremendous growth in wireless technology in the last decade. This advancement has changed how people do business in Mobile Commerce (M-Commerce) environment. For creating a more secure and exible m-commerce infrastructure so as to meet the new demands, one needs to leverage new technologies like 3G/UMTS,...

    Provided By SRM University

  • White Papers // Nov 2008

    Direct Trust Estimated on Demand Protocol for Secured Routing in Mobile Adhoc Networks

    Adhoc network is a collection of wireless nodes communicating among themselves over multihop paths, without the help of any infrastructure such as base stations or access points. Although many previous techniques have been proposed for the secure routing, in this paper the authors propose a more reasonable and unambiguous equation...

    Provided By SRM University

  • White Papers // Jan 2010

    Integrating Generative and Aspect-Oriented Technologies for Framework Instantiation

    Application frameworks have been successfully used as valuable tools to improve software quality while reducing development efforts. Nevertheless, frameworks still face important challenges in order to be widely adopted. In particular, framework instantiation is still a painful task requiring application developers to understand the intricate details surrounding the framework design....

    Provided By SRM University

  • White Papers // Feb 2010

    A Propose Architecture of MANET for Disaster Area Architecture

    Wireless ad hoc networks have become an important area of research in wireless communications systems. Unlike some existing networking technologies such as Internet Protocol (IP) networks or cellular systems, wireless ad hoc networks have the advantage that deployment of networks does not require preexisting infrastructures. Ad hoc networks have neither...

    Provided By SRM University

  • White Papers // Jul 2011

    Problem Analysis of Routing Protocols in MANET in Constrained Situation

    A Mobile Ad-hoc NETwork (MANET) consists of a number of mobile wireless nodes, among which the communication is carried out without having any centralized control. MANET is a self organized, self configurable network having no infrastructure, and in which the mobile nodes move arbitrarily. The mobile nodes can receive and...

    Provided By SRM University

  • White Papers // May 2011

    Scalable Performance Enhancement in Coexistent Heterogeneous Wireless Packet Networks

    In today's scenario as the usage of ISM band is increasing rapidly there are many scenarios where the authors need communication systems like Wireless Local Area Networks (WLANs) based on IEEE 802.11b specifications and Wireless Personal Area Networks (WPANs) based on IEEE 802.15.4 specifications coexisting in the same place. In...

    Provided By SRM University

  • White Papers // Jul 2011

    An Effective Symmetric Key Recovery Scheme for Secure Onboard Satellite Applications

    Reconfigurable FPGAs promise high density, performance and good schedulable options with their wide range of SRAM target devices that can be hosted for any applications. The SRAM FPGAs are widely used due to their vast resources and ease to design, but critically suffers due to radiation errors called Single Event...

    Provided By SRM University

  • White Papers // Jul 2011

    Telemedicine Using Computer Communication Network

    Most of the Telemedicine Centers maintenance cost is very high. Mostly the Telemedicine centers have hierarchical structure of Network Model. Telemedicine Nodes are maintenance from VSAT to TM Foundation, TM division to TM Nodes. This hierarchical structure of maintenance cost is very high. The author's research work proposed Telemedicine using...

    Provided By SRM University