sara vanan - Academia.edu (original) (raw)
Papers by sara vanan
2017 International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT), 2017
The technique of using renewable resources as the source of generating electrical energy leads to... more The technique of using renewable resources as the source of generating electrical energy leads to the development of sustainable ecosystem. Hybridizing, (combining more than two renewable energy sources) these resources for the efficient generation of energy in power system is rapidly increasing in the present scenario. For this generation of electrical energy, there are certain factors are to be maintained in particular levels. Finding the factors are by going through some predefined algorithms. This paper leads to summarization of Hybrid renewable energy sources (HRES) usage and co-relative study of optimization techniques.
International Journal of Innovative Research in Science, Engineering and Technology, 2014
The data like username, password, and others will be hacked by the hackers and they can abuse the... more The data like username, password, and others will be hacked by the hackers and they can abuse the same. This issue can be comprehended typically by utilizing encryption and decryption algorithms. Encryption is a procedure of changing over clear secret data into indiscernible structure (Cipher Text). Decryption is a methodology of changing over the mixed up cipher text into decipherable structure. Both sender of the data and the beneficiary of the data utilizes same key for encrypting and decrypting. Yet the encryption and decryption algorithms have not given 100% security. The reason is that the hackers effortlessly will discover the key by catching the packets and breaking down the jaunty text utilizing different software and fittings. So we need an alternate way like steganography for hiding sensitive information. Even though both cryptography and steganography has its own advantages and disadvantages, we can combine both the techniques together. This paper presents a comparative study of both cryptography and steganography.
International Journal of Innovative Research in Science, Engineering and Technology, 2014
Cloud computing allows business customers to scale up and down their resource usage based on need... more Cloud computing allows business customers to scale up and down their resource usage based on needs. Many of the gains in the cloud model come from resource multiplexing through virtualization technology. In this work, present a system that uses virtualization technology to allocate data center resources dynamically based on application demands and support green computing by optimizing the number of servers in use. We introduce the concept of "skewness" to measure the unevenness in the multi-dimensional resource utilization of a server. By minimizing skewness, we can combine different types of workloads nicely and improve the overall utilization of server resources. We develop a set of heuristics that prevent overload in the system effectively while saving energy used. Trace driven simulation and experiment results demonstrate that our algorithm achieves good performance.
International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, Oct 20, 2014
In many modern energy conversion systems, a dc voltage, which is provided from a sustainable ener... more In many modern energy conversion systems, a dc voltage, which is provided from a sustainable energy source or energy storage device, must be boosted and converted to an Ac voltage with a fixed amplitude and frequency. The single-stage inverter circuit provides boost inversion ability which can eliminate the limitations of conventional voltage source inverter. By regulating the shoot-through zero state and the parameters of coupled inductor, the proposed inverter can boost the bus voltage and output desired output voltage even when input dc voltage is low. By controlling the shoot-through zero state when the coupled inductor is present, the fuel cell output voltage is controlled. When a very high boost gain is demanded, the duty cycle may come to its extreme and large duty cycles causes serious reverse-recovery problems. The single-stage operation of the converter may lead to improved reliability and higher efficiency .The results are obtained using MATLAB/SIMULINK software.
European Journal of Scientific Research
The article describes the architectural design of a two-dimensional (2-D) discrete cosine transfo... more The article describes the architectural design of a two-dimensional (2-D) discrete cosine transform (DCT) targeting the H.264/AVC compression standard. A new algorithm was created to minimize the complexity of operations as much as possible while maintaining low delays and high throughput speed. The results of the field-programmable gate array (FPGA) implementation of efficient architecture for computing the 2-D DCT with parallel distributed arithmetic are discussed.
Video coding is a principal technology for applications such as digital television, digital video... more Video coding is a principal technology for applications such as digital television, digital video authoring, video telephony, DVD and Blu-Ray disks, mobile TV, videoconferencing and internet video streaming. Compared to MPEG-2 and H.263, the H.264 is an advanced video coding method to provide maximum compression of video signals with low and high bit rates from 3G to HD. It was developed by ITU-T Video Coding Experts Group (VCEG) and the ISO/IEC Moving Pictures Experts Group (MPEG). It is also called as MPEG-4 part 10.The H.264 has Video Coding Layer (VCL) and Network Abstraction Layer (NAL) to represent video encoding process and handles the VCL data. The H.264 gives remarkable reduction in bit rates hence cost of bandwidth and storage is reduced. The key features of H.264 are enhanced motion compensation, transform and entropy coding and improved deblocking filter. It has seven profiles each strive to specific areas of applications. This paper provides the overview of video coding...
Video coding is a principal technology for applications such as digital television, digital video... more Video coding is a principal technology for applications such as digital television, digital video authoring, video telephony, DVD and Blu-Ray disks, mobile TV, videoconferencing and internet video streaming. Compared to MPEG-2 and H.263, the H.264 is an advanced video coding method to provide maximum compression of video signals with low and high bit rates from 3G to HD. It was developed by ITU-T Video Coding Experts Group (VCEG) and the ISO/IEC Moving Pictures Experts Group (MPEG). It is also called as MPEG-4 part 10.The H.264 has Video Coding Layer (VCL) and Network Abstraction Layer (NAL) to represent video encoding process and handles the VCL data. The H.264 gives remarkable reduction in bit rates hence cost of bandwidth and storage is reduced. The key features of H.264 are enhanced motion compensation, transform and entropy coding and improved deblocking filter. It has seven profiles each strive to specific areas of applications. This paper provides the overview of video coding...
2017 International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT), 2017
The technique of using renewable resources as the source of generating electrical energy leads to... more The technique of using renewable resources as the source of generating electrical energy leads to the development of sustainable ecosystem. Hybridizing, (combining more than two renewable energy sources) these resources for the efficient generation of energy in power system is rapidly increasing in the present scenario. For this generation of electrical energy, there are certain factors are to be maintained in particular levels. Finding the factors are by going through some predefined algorithms. This paper leads to summarization of Hybrid renewable energy sources (HRES) usage and co-relative study of optimization techniques.
International Journal of Innovative Research in Science, Engineering and Technology, 2014
The data like username, password, and others will be hacked by the hackers and they can abuse the... more The data like username, password, and others will be hacked by the hackers and they can abuse the same. This issue can be comprehended typically by utilizing encryption and decryption algorithms. Encryption is a procedure of changing over clear secret data into indiscernible structure (Cipher Text). Decryption is a methodology of changing over the mixed up cipher text into decipherable structure. Both sender of the data and the beneficiary of the data utilizes same key for encrypting and decrypting. Yet the encryption and decryption algorithms have not given 100% security. The reason is that the hackers effortlessly will discover the key by catching the packets and breaking down the jaunty text utilizing different software and fittings. So we need an alternate way like steganography for hiding sensitive information. Even though both cryptography and steganography has its own advantages and disadvantages, we can combine both the techniques together. This paper presents a comparative study of both cryptography and steganography.
International Journal of Innovative Research in Science, Engineering and Technology, 2014
Cloud computing allows business customers to scale up and down their resource usage based on need... more Cloud computing allows business customers to scale up and down their resource usage based on needs. Many of the gains in the cloud model come from resource multiplexing through virtualization technology. In this work, present a system that uses virtualization technology to allocate data center resources dynamically based on application demands and support green computing by optimizing the number of servers in use. We introduce the concept of "skewness" to measure the unevenness in the multi-dimensional resource utilization of a server. By minimizing skewness, we can combine different types of workloads nicely and improve the overall utilization of server resources. We develop a set of heuristics that prevent overload in the system effectively while saving energy used. Trace driven simulation and experiment results demonstrate that our algorithm achieves good performance.
International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, Oct 20, 2014
In many modern energy conversion systems, a dc voltage, which is provided from a sustainable ener... more In many modern energy conversion systems, a dc voltage, which is provided from a sustainable energy source or energy storage device, must be boosted and converted to an Ac voltage with a fixed amplitude and frequency. The single-stage inverter circuit provides boost inversion ability which can eliminate the limitations of conventional voltage source inverter. By regulating the shoot-through zero state and the parameters of coupled inductor, the proposed inverter can boost the bus voltage and output desired output voltage even when input dc voltage is low. By controlling the shoot-through zero state when the coupled inductor is present, the fuel cell output voltage is controlled. When a very high boost gain is demanded, the duty cycle may come to its extreme and large duty cycles causes serious reverse-recovery problems. The single-stage operation of the converter may lead to improved reliability and higher efficiency .The results are obtained using MATLAB/SIMULINK software.
European Journal of Scientific Research
The article describes the architectural design of a two-dimensional (2-D) discrete cosine transfo... more The article describes the architectural design of a two-dimensional (2-D) discrete cosine transform (DCT) targeting the H.264/AVC compression standard. A new algorithm was created to minimize the complexity of operations as much as possible while maintaining low delays and high throughput speed. The results of the field-programmable gate array (FPGA) implementation of efficient architecture for computing the 2-D DCT with parallel distributed arithmetic are discussed.
Video coding is a principal technology for applications such as digital television, digital video... more Video coding is a principal technology for applications such as digital television, digital video authoring, video telephony, DVD and Blu-Ray disks, mobile TV, videoconferencing and internet video streaming. Compared to MPEG-2 and H.263, the H.264 is an advanced video coding method to provide maximum compression of video signals with low and high bit rates from 3G to HD. It was developed by ITU-T Video Coding Experts Group (VCEG) and the ISO/IEC Moving Pictures Experts Group (MPEG). It is also called as MPEG-4 part 10.The H.264 has Video Coding Layer (VCL) and Network Abstraction Layer (NAL) to represent video encoding process and handles the VCL data. The H.264 gives remarkable reduction in bit rates hence cost of bandwidth and storage is reduced. The key features of H.264 are enhanced motion compensation, transform and entropy coding and improved deblocking filter. It has seven profiles each strive to specific areas of applications. This paper provides the overview of video coding...
Video coding is a principal technology for applications such as digital television, digital video... more Video coding is a principal technology for applications such as digital television, digital video authoring, video telephony, DVD and Blu-Ray disks, mobile TV, videoconferencing and internet video streaming. Compared to MPEG-2 and H.263, the H.264 is an advanced video coding method to provide maximum compression of video signals with low and high bit rates from 3G to HD. It was developed by ITU-T Video Coding Experts Group (VCEG) and the ISO/IEC Moving Pictures Experts Group (MPEG). It is also called as MPEG-4 part 10.The H.264 has Video Coding Layer (VCL) and Network Abstraction Layer (NAL) to represent video encoding process and handles the VCL data. The H.264 gives remarkable reduction in bit rates hence cost of bandwidth and storage is reduced. The key features of H.264 are enhanced motion compensation, transform and entropy coding and improved deblocking filter. It has seven profiles each strive to specific areas of applications. This paper provides the overview of video coding...