Refine your search
Collections
Co-Authors
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Kaur, Mandeep
- A Review: FIR Filteroptimization Using MCM and CSE Method
Abstract Views :133 |
PDF Views:0
Authors
Pankaj Gupta
1,
Mandeep Kaur
1
Affiliations
1 Department of Electronics and Communication Engineering, Punjabi University, Patiala, IN
1 Department of Electronics and Communication Engineering, Punjabi University, Patiala, IN
Source
Research Cell: An International Journal of Engineering Sciences, Vol 17, No 1 (2016), Pagination: 247-250Abstract
Complexity of many digital signal processing (DSP) systems reduced by a Multiple Constant Multiplication (MCM) operation. For the better performance of digital signal processing systems, Multiple Constant Multiplication (MCM) operation is not sufficient. To get better results some other operations are used with MCM. Thus, this paper introduces a Common Sub expression Elimination (CSE) operation with MCM operation. With the help of these techniques problems in the optimization of finite impulse response(FIR) filter design can be solved by decreasing the number of operators. Using These Techniques show the efficiency by reducing area when compared to previously used algorithms designed.Keywords
FIR, MCM, CSE, CSD, BSD.- A Novel Security Approach for Data Flow And Data Pattern Analysis To Mitigate DDOS Attacks In VANETs
Abstract Views :119 |
PDF Views:0
Authors
Source
Research Cell: An International Journal of Engineering Sciences, Vol 17, No 1 (2016), Pagination: 562-568Abstract
The VANET security is an important issue with the rise of the automatically driven vehicle based technologies. The automatically driven vehicle based clusters are programmed for each vehicle to run individually by coordinating with all of the other nodes in the VANET cluster. The proposed model has been designed to detect and mitigate the DoS and DDoS attacks in the VANET clusters to avoid any of the misbehavior or mis-happening in the form of VANET node failure, collision or in any other form. The DDoS attack prevention algorithm works as the real time attack detection and overhead data filtering algorithm in order to protect against the DoS and DDoS attacks. The proposed model result has been obtained on the basis of network load, throughput, packet delivery ratio, etc. The experimental results have proved the efficiency of the proposed model in comparison with the existing models.Keywords
VANET Security, Denial of Service, Distributed Denial of Service, Resource Unavailability Attacks.- Protection Against DDOS Using Secure Code Propagation in the VANETs
Abstract Views :114 |
PDF Views:0
Authors
Source
Research Cell: An International Journal of Engineering Sciences, Vol 17, No 1 (2016), Pagination: 573-577Abstract
VANETs are the vehicular networks used to connect the vehicles together to share their information with each other in the cluster. The hackers are used to attack VANETs with various means of attacks. Many security techniques are used to mitigate the risks caused by the attacks to cause ill-effects to the traffic movement on the roads. VANETs are also being used for the automatically driven vehicles in the controlled environments. Whereas the human vehicles use the VANETs for extra facility, the automatically driven vehicles completely depend upon the VANETs. Any incursion in the VANETs by hackers can cause major accidents or traffic chaos. A popular technique known as prankster attack is used by militants to plot attacks to cause more damage as possible or by selfish drivers to make their way clear. In this paper, we have proposed a strong security framework to mitigate threats caused by DDoS attack by using road side traffic management unit (RTMU). The RTMU is using various mathematical computations for traffic pattern analysis to detect the abnormality in data traffic between the cluster nodes. All of the nodes in the scenario are GPS location aware nodes and sharing their location actively with RTMU. Also all of the VANET nodes communicate with each other through RTMU. The results have shown the effectiveness of the proposed model to mitigate the DDoS attack and facilitate smooth traffic movement.Keywords
VANET Security, DDoS, Road Side Unit, Network Traffic Analysis, and VANET Resource Unavailability Attacks.- Gender Based Emotion Recognition Using Speech Signals:A Review
Abstract Views :147 |
PDF Views:0
Authors
Affiliations
1 Department of Electronics and Communication Engineering, Punjabi University, Patiala, IN
1 Department of Electronics and Communication Engineering, Punjabi University, Patiala, IN
Source
Research Cell: An International Journal of Engineering Sciences, Vol 20 (2016), Pagination: 50-54Abstract
Emotion recognition using speech signals has been a rising area in the recent years. The emotion recognition system discussed is gender based which is capable of recognizing six emotions (happiness, anger, surprise, disgust, sadness and fear) and neutral state. The above said system has two sub systems: 1) gender recognition 2) emotion recognition. If the gender of the speaker is known before finding the emotions of the speaker then it gives higher accuracy as mentioned in one of the papers. It also improves the humancomputer interaction (HCI) which can be useful in giving feedback in real time applications. In this paper literature on emotion recognition through speech using different databases and different features is presented. Different models of classifiers are discussed here for their accuracy with respect to emotion recognition.Keywords
Gender Recognition, Emotion Recognition, Pitch, Support Vector Machine.- Study of FinFET Based SRAM Cells
Abstract Views :132 |
PDF Views:0
Authors
Sundeep Kaur
1,
Mandeep Kaur
1
Affiliations
1 Department of Electronics and Communication Engineering, Punjabi University, Patiala, IN
1 Department of Electronics and Communication Engineering, Punjabi University, Patiala, IN
Source
Research Cell: An International Journal of Engineering Sciences, Vol 20 (2016), Pagination: 72-75Abstract
This presents the transistors have been shrinking exponentially size and therefore the transistors in a single microelectronic chip have been rising exponentially. In the current generation of transistors, the exponential reduce in transistor size can continue. This generation is multi gate transistors. Fin FETs are the most appealing option due to their better scalability and options for advance SRAM performance. Fin FET based 6T SRAM cells manufactured with pass gate feedback attain significant developments in the cell read stability without area penalty. The write ability can be improved on the use of pull up writing gating with a separate write word line. In 9T SRAM cell, an appropriate read operation is given by overpowering the drain induced barrier lowering effect and controlling the body source voltage change.Keywords
FinFET, FinFET Structure, SRAM, Multi Gate Transistor, 6T SRAM Cell, SRAM Read/Write Margin, 9T SRAM Cell, Performance Enhancement Techniques.- Study of Data Flow Graph of Finite Impulse Response Digital Filter
Abstract Views :117 |
PDF Views:0
Authors
Affiliations
1 Department of Electronics and Communication Engineering, Punjabi University, Patiala, IN
2 SLIET, Longowal, Punjab, IN
1 Department of Electronics and Communication Engineering, Punjabi University, Patiala, IN
2 SLIET, Longowal, Punjab, IN
Source
Research Cell: An International Journal of Engineering Sciences, Vol 20 (2016), Pagination: 99-102Abstract
Processing of signals requires designing and implementation of systems called Filters. Filter design depend on its type, structure and the method to which it comes in practice. This paper discussed the various realization of Digital Finite-Duration Impulse Response (FIR) filters with its graphical representation. The purpose of using the realization and the graphical representation is to find the critical and shortest path using different algorithm. The realization can be done using FDA tool or coding in MATLAB. The graphical representation way is done in form of Data Flow Graph in term of nodes and edges.- Conversion of Energy using Footstep:A Review
Abstract Views :109 |
PDF Views:0
Authors
Dipti Bansal
1,
Mandeep Kaur
1
Affiliations
1 Department of Electronics and Communication Engineering, Punjabi University, Patiala, IN
1 Department of Electronics and Communication Engineering, Punjabi University, Patiala, IN
Source
Research Cell: An International Journal of Engineering Sciences, Vol 20 (2016), Pagination: 126-128Abstract
Energy saving and power saving are the basic requirement in this world. Power sources such as non-renewable&renewable sources are available but still energy and power disaster cannot be overcome. In this paper, one of the non conventional methods has been discussed known as walking or running on the footstep. Non-conventional method that is from foot step, kinetic energy from foot step is converted into the electrical energy. This can be possible with the help of piezoelectric transducer which convert the kinetic energy into the electrical energy [1]. The power generated floor intends to translate the kinetic energy to the electrical power. This power generating floor can produce 100W on just 10 steps, then for 100 steps, it produces 1000W and for 100 floors within the system, it will produce 1MW.- Deadwood Detection and Elimination in Text Summarization for Punjabi Language
Abstract Views :128 |
PDF Views:0
Authors
Mandeep Kaur
1,
Jagroop Kaur
2
Affiliations
1 Baba Farid College of Engineering and Technology, Bathinda, Punjab, Pin Code-151001, IN
2 University College of Engineering, Punjabi University, Patiala, Punjab, Pin Code-147002, IN
1 Baba Farid College of Engineering and Technology, Bathinda, Punjab, Pin Code-151001, IN
2 University College of Engineering, Punjabi University, Patiala, Punjab, Pin Code-147002, IN
Source
Research Cell: An International Journal of Engineering Sciences, Vol 8 (2013), Pagination: 51-59Abstract
As the internet is growing rapidly, this has resulted in large amount of information. Text summarization provides shorthand version for such information, which is no longer than half of the original text. This paper proposes a system for detection and removal of Deadwood in summaries for Punjabi language. Deadwood means word or phrase that can be omitted without loss in meaning. Removing it shortens and clarifies the summary. The first step in this process is preprocessing which consists of sentence segmentation and removal of Punjabi stop words and then in the second step weight is assigned to the sentences in the source text .We used five different features for the assignment of weight to the sentences. In the next step the highest scoring sentences are selected to form the summary. In the last step the Deadwood is eliminated and removed from the summary.Keywords
Deadwood, Phrase, Summary.- Evaluating TCP Variants Performance According to Scenarios
Abstract Views :109 |
PDF Views:1
Authors
Affiliations
1 Department of Computer Engineering, Punjabi University, Patiala, Punjab, IN
1 Department of Computer Engineering, Punjabi University, Patiala, Punjab, IN
Source
Research Cell: An International Journal of Engineering Sciences, Vol 22 (2016), Pagination: 456-462Abstract
In today's modern era of high-speed multimedia transmissions congestion on the network is eminent. By the need of time a lot of variants have been proposed by the researchers to cope with the problem of congestion. Every variant being proposed have their pros and corns for one or the other scenario. In our study we have considered the three scenarios that are Access-link, Dial-up and Geo satellite Scenario. We have taken up some parameters of TCP Variants to be compared for these scenarios in order to provide a comparison for the use of a particular variant in a specified scenario. The purpose of this paper is to analyze and compare the performance parameters of TCP variants for three different scenarios.- Review of Retiming based Digital Filter for Low Power Consumption
Abstract Views :112 |
PDF Views:0
Authors
Mandeep Kaur
1,
Ranjit Kaur
1
Affiliations
1 Deptt. of ECE, Punjabi University, Patiala, IN
1 Deptt. of ECE, Punjabi University, Patiala, IN
Source
Research Cell: An International Journal of Engineering Sciences, Vol 22 (2016), Pagination: 769-775Abstract
The power dissipation is the limiting factor in the digital signal processing. This paper provides the review of the low power techniques such as voltage scaling, positioning of the flip flop, reduce the switching activity along with the transformation techniques such as retiming, pipelining, and folding. Digital filters are the most common block in the signal processing applications. They are represented by data flow graph. Applying the retiming techniques, low power and high speed digital filter can be achieved. Retiming can be done through pipelining and cut set retiming. Low power filters can be achieved with the supply voltage scaling and the high speed can be controlled by minimization of register and clock period.- Comprehensive Analysis of Effort Estimation In Software Development
Abstract Views :114 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science and Engineering ,G.I.M.E.T, Amritsar, IN
2 Department of Computer Science and Engineering, G.I.M.E.T, Amritsar, IN
1 Department of Computer Science and Engineering ,G.I.M.E.T, Amritsar, IN
2 Department of Computer Science and Engineering, G.I.M.E.T, Amritsar, IN
Source
Research Cell: An International Journal of Engineering Sciences, Vol 27, No 1 (2018), Pagination: 152-161Abstract
Software exertion estimation is an indispensable factor in any software industry. As software created in size and unusualness, it is to a great degree hard to decisively expect the cost of software progression. This was the trouble in past years. The best ensnarement of software industry was the speedy changing nature of software change which has made it difficult to make parametric models that yield high exactness for software improvement in all regions. This paper packs a couple of classes of software cost estimation models and systems. No single system is best for all conditions, and that an attentive relationship of the results of a couple of approaches is well while in transit to make functional assessments. The usage of workforce is measure as exertion and described as total time taken by headway partners to play out a given task. It is regularly imparted in units, for instance, man-day, man-month, and man-year. This regard is essential as it serves in as explanation behind evaluating diverse regards vital for software wanders, like cost or total time required to make a software thing. This paper reviews an analysis of changed estimation procedures and represents the models utilizing line of code(LOC) and function point as a gauge of framework measure.Keywords
Software Effort Estimation, Units, LOC, Cost.References
- M. Jørgensen, “A review of studies on expert estimation of software development effort,” IEEE Access , vol. 70, pp. 37–60, 2004.
- R. Kishore and D. L. Gupta, “Comparative Study of Software Effort Estimation using Different Algorithms : A Review Paper,” IEEE Transactions, vol. 7, no. 5, pp. 11769–11772, 2017.
- J. Zhou, Y. Zhang, and W.-F. Wong, “Fault Tolerant Stencil Computation on Cloud-based GPU Spot Instances,” IEEE Trans. Cloud Comput., vol. 7161, no. c, pp. 1–1, 2017.
- A. Zhou, S. Wang, B. Cheng, Z. Zheng, F. Yang, R. Chang, M. Lyu, and R. Buyya, “Cloud Service Reliability Enhancement via Virtual Machine Placement Optimization,” IEEE Trans. Serv. Comput., vol. XX, no. XX, pp. 1–1, 2016.
- P. Stahl, J. Broberg, and B. Landfeldt, “Dynamic Fault-Tolerance and Mobility Provisioning for Services on Mobile Cloud Platforms,” 2017 5th IEEE Int. Conf. Mob. Cloud Comput. Serv. Eng., pp. 131–138, 2017.
- J. Shen, T. Zhou, D. He, Y. Zhang, X. Sun, and Y. Xiang, “Block Design-based Key Agreement for Group Data Sharing in Cloud Computing,” IEEE Trans. Dependable Secur. Comput., vol. 5971, no. c, pp. 1–15, 2017.
- S. Prathiba and S. Sowvarnica, “Survey of failures and fault tolerance in cloud,” Proc. 2017 2nd Int. Conf. Comput. Commun. Technol. ICCCT 2017, pp. 169–172, 2017.
- S. Lazarova-Molnar and N. Mohamed, “A framework for collaborative cloud-based fault detection and diagnosis in smart buildings,” 2017 7th Int. Conf. Model. Simulation, Appl. Optim., pp. 1–6, 2017.
- C. Jayalath, J. Stephen, and P. Eugster, “Universal Cross-Cloud Communication,” ACM Journal on software engg. vol. 2, no. 2, pp. 103–116, 2014.
- Y. Hua, X. Liu, and D. Feng, “Cost-Efficient Remote Backup Services for Enterprise Clouds,” IEEE Trans. Ind. Informatics, vol. 12, no. 5, pp. 1650–1657, 2016.
- M. K. Gokhroo, M. C. Govil, and E. S. Pilli, “Detecting and mitigating faults in cloud computing environment,” 3rd IEEE Int. Conf. , 2017.
- S. W. Munialo and G. M. Muketha, “A Review of Agile Software Effort Estimation Methods,”,IEEE transaction, vol. 5, no. 9, pp. 612–618, 2016.
- A. F. Sheta and S. Aljahdali, “Software Effort Estimation Inspired by COCOMO and FP Models : A Fuzzy Logic Approach,” ACM Journal,vol. 4, no. 11, 2013.
- K. Usharani, “A Survey on Software Effort Estimation,” ACM Journal on software engg. pp. 505–509, 2016.
- H. Velarde, C. Santiesteban, A. García, and J. Casillas, “Analyzing the Effect of Variables in the Software Development Effort Estimation,” IEEE transacion, vol. 14, no. 8, pp. 3797–3803, 2016.
- K. Dejaeger, W. Verbeke, D. Martens, and B. Baesens, “Data Mining Techniques for Software Effort Estimation : A Comparative Study,” ACM Computing surveys,vol. 38, no. 2, pp. 375–397, 2012.
- E. Kocaguneli, S. Member, T. Menzies, J. Keung, D. Cok, and R. Madachy, “Active Learning and Effort Estimation : Finding the Essential Content of Software Effort Estimation Data,” IEEE transaction, pp. 1–14, 2012.
- T. W. R. L. K. C. Kang, “Effort estimation of component-based software development – a survey,”ACM computing journal, vol. 5, no. June 2009, pp. 216–228, 2011.
- S. Roberto and D. P. Pinto-roa, “Design of Software Effort Estimation Models An approach based on Linear Genetic Programming,”IEEE transaction, pp.201-209,May 2017.
- F. Sarro, A. Petrozziello, and M. Harman, “Multi-objective Software Effort Estimation,” IEEE, pp. 198-200,2016.
- A. Sharma, “A Metric Suite for Early Estimation of Software Testing Effort using Requirement Engineering Document and its validation,” IEEE transaction,pp. 1–6, 2011.
- R. Britto and E. Mendes, “A Specialized Global Software Engineering Taxonomy for Effort Estimation,”, ACM, pp.90-100, 2016.
- M. C. Ohlsson and C. Wohlin, “An Empirical Study of Effort Estimation during Project Execution.”IEEE transaction, pp.89-95,2016