scispace - formally typeset
Search or ask a question

Showing papers by "SRM University published in 2007"


Journal ArticleDOI
TL;DR: CERK1 is a plasma membrane protein containing three LysM motifs in the extracellular domain and an intracellular Ser/Thr kinase domain with autophosphorylation/myelin basic protein kinase activity, suggesting that CERK 1 plays a critical role in fungal MAMP perception in plants.
Abstract: Chitin is a major component of fungal cell walls and serves as a microbe-associated molecular pattern (MAMP) for the detection of various potential pathogens in innate immune systems of both plants and animals. We recently showed that chitin elicitor-binding protein (CEBiP), plasma membrane glycoprotein with LysM motifs, functions as a cell surface receptor for chitin elicitor in rice. The predicted structure of CEBiP does not contain any intracellular domains, suggesting that an additional component(s) is required for signaling through the plasma membrane into the cytoplasm. Here, we identified a receptor-like kinase, designated CERK1, which is essential for chitin elicitor signaling in Arabidopsis. The KO mutants for CERK1 completely lost the ability to respond to the chitin elicitor, including MAPK activation, reactive oxygen species generation, and gene expression. Disease resistance of the KO mutant against an incompatible fungus, Alternaria brassicicola, was partly impaired. Complementation with the WT CERK1 gene showed cerk1 mutations were responsible for the mutant phenotypes. CERK1 is a plasma membrane protein containing three LysM motifs in the extracellular domain and an intracellular Ser/Thr kinase domain with autophosphorylation/myelin basic protein kinase activity, suggesting that CERK1 plays a critical role in fungal MAMP perception in plants.

1,222 citations


Journal ArticleDOI
TL;DR: In this paper, an experimental investigation on the performance of an industrial refrigeration system integrated with encapsulated phase change material (PCM)-based thermal energy storage (CTES) is carried out.
Abstract: Cool thermal energy storage (CTES) is an advanced energy technology that has recently attracted increasing interest for industrial refrigeration applications such as process cooling, food preservation and building air conditioning systems. An experimental investigation on the performance of an industrial refrigeration system integrated with encapsulated phase change material (PCM)-based CTES system is carried out in the present work. In the experimental set-up a vertical storage tank is integrated with the evaporator of the vapour compression refrigeration system. Effect of the inlet temperature of heat transfer fluid (HTF) on the temperature variation of the PCM and the HTF in the storage tank and the performance parameters namely average rate of charging, energy stored, specific energy consumption (SEC) of the chiller with and without storage system are studied in detail. The effect of porosity variation in the storage tank is also studied. A 1°C decrease in evaporator temperature results in about 3–4% increase in SEC and 1°C decrease in condensing temperature leads to 2.25–3.25% decrease in SEC. The range of HTF inlet temperature and porosity values for optimum performance is reported. Copyright © 2007 John Wiley & Sons, Ltd.

84 citations


Journal ArticleDOI
TL;DR: In this paper, the authors analyzed the couette dusty flow between two horizontal parallel porous flat plates with transverse sinusoidal injection of the dusty fluid at the stationary plate and its corresponding removal by constant suction through the plate in uniform motion.
Abstract: The couette dusty flow between two horizontal parallel porous flat plates with transverse sinusoidal injection of the dusty fluid at the stationary plate and its corresponding removal by constant suction through the plate in uniform motion was analyzed. Due to this type of injection velocity the dusty flow becomes 3D. Perturbation method is used to obtain the expressions for the velocity and temperature fields of both the fluid and dust. It was found that the velocity profiles of both the fluid and dust in the main flow direction decrease with the increase of the mass concentration of the dust particles, and those in cross flow direction increase with an increase in the mass concentration of the dust particles up to the middle of the channel and thereafter decrease with increase in mass concentration of the dust particles. The skin friction components T x and T z in the main flow and transverse directions respectively increase with an increase in the mass concentration of the dust particles (or) injection parameter. The heat transfer coefficient decreases with the increase of the injection parameter and increases with the increase in the mass concentration of the dust particles.

34 citations


Journal ArticleDOI
TL;DR: In this paper, a simple reverse phase HPLC method for the determination of omeprazole and domperidone from tablet formulations was described. But the method was reproducible, and the detector response was linear.
Abstract: The present work describes a simple reverse phase HPLC method for the determination of omeprazole and domperidone from tablet formulations. The determination was carried out on a Hypersil, ODS, C-18 (150×4.6 mm, 5 micron) column using a mobile phase of methanol:0.1 M ammonium acetate (pH 4.9) (60:40). The flow rate and runtime were 1 ml/min and 10 min, respectively. The eluent was monitored at 280 nm. The method was reproducible, with good resolution between omeprazole and domperidone. The detector response was found to be linear in the concentration range of 10-60 µg/ml for omeprazole and 5-30 µg/ml for domperidone.

33 citations


Proceedings ArticleDOI
11 Jul 2007
TL;DR: A new solution to block cross site scripting (XSS) attacks that is independent of the languages in which the web applications are developed and addresses XSS vulnerabilities arise from other interfaces is presented.
Abstract: Research data shows that, about 80% of the web applications are vulnerable to cross site scripting attacks. This is because of the fact that the users are allowed to enter tags in the input control for increasing the flexibility in handling web applications input. This increases the threat to the web application by allowing the hackers to plant worms in the web applications through the features like tags. Further, there are billions of web pages that are developed in different languages like PHP, ASP, JSP, HTML, CGI- PERL, .Net etc. There is no single solution available that can be applied for the web application to prevent XSS that are developed in different languages and deployed in different platforms. This paper presents a new solution to block cross site scripting (XSS) attacks that is independent of the languages in which the web applications are developed and addresses XSS vulnerabilities arise from other interfaces. The solution is modularized, configured, and developed in .Net, XML and XSD. This approach is evaluated in a web application developed in JSP/Servlets deployed in JBOSS application server and is found effective as it provides the flexibility to be used across languages with a very minimal configuration to prevent XSS.

29 citations


Journal ArticleDOI
TL;DR: In this article, the free vibration of symmetric and anti-symmetric cross-ply plates under shear deformation theory is derived using YNS theory, and a system of coupled differential equations in terms of displacement and rotational functions are obtained by assuming the solution in separable form.

28 citations


Proceedings ArticleDOI
01 Jan 2007
TL;DR: Considering the practical application of the STATCOM and UPFC in power systems, it is of importance and interest to investigate the benefits as well as model these devices for power system steady state operation.
Abstract: In recent years, energy, environment, deregulation of power utilities have delayed the construction of both generation facilities and new transmission lines. These problems have necessitated a change in traditional concepts and practices of power systems. There are emerging technologies available, which can help electric companies to deal with above problems. One of such technologies is flexible AC transmission systems (FACTS). Among the converter based FACTS devices static synchronous compensator (STATCOM) and unified power flow controller (UPFC) are the popular FACTS devices. Considering the practical application of the STATCOM and UPFC in power systems, it is of importance and interest to investigate the benefits as well as model these devices for power system steady state operation. We have performed the power flow study of a five bus study system without any FACTS devices and further analyzed it with the converter based FACTS controllers. Programming of the power flow studies stated above is implemented with MATLAB.

22 citations


Journal ArticleDOI
TL;DR: A finite-state Markov channel model is formulates to represent received signal-to-noise (SNR) ratios having lognormal, K-distribution, chi-square (central) and chi- square (non-central) distributions in a slow fading channel.
Abstract: This paper formulates a finite-state Markov channel model to represent received signal-to-noise (SNR) ratios having lognormal, K-distribution, chi-square (central) and chi-square (non-central) distributions in a slow fading channel. The range of the SNRs is partitioned into a finite number of states following earlier works in literature. Performance measures like level crossing rates, steady-state probabilities, transition probabilities, and state-time durations are derived, and numerical results are plotted and discussed for the FSMC models for all the distributions.

22 citations


Proceedings ArticleDOI
01 Oct 2007
TL;DR: In this paper, the authors presented the basic operating principle of a single phase matrix converter, two phase to single phase converter, three Phase to single-phase converter, and three phase to three-phase matrix converter.
Abstract: Matrix Converter, a direct AC/AC Converter replaces the multiple conversion stages and the intermediate energy storage element of the indirect converters by a single power conversion stage, thus being a single stage converter. Matrix Converters employ an array of controlled bidirectional switches as the main power elements to create a variable output voltage system with unrestricted frequency. This paper attempts to give an overview of Matrix Converters and examines the types, features, merits and limitations of such Converters. It presents the basic operating principle of a Single Phase Matrix Converter, Two Phase to Single Phase Matrix Converter, Three Phase to Single Phase Matrix Converter and Three Phase to Three Phase Matrix Converter. The paper also introduces a topology of a Single Phase Matrix Converter, Two Phase to Single Phase Matrix Converter, Three Phase to Single Phase Matrix Converter and Three Phase to Three Phase Matrix Converter in PSIM software environment and analyses the output of the converter for different frequencies. Further, it examines the output voltage of a Single Phase Matrix Converter synthesized using the Sinusoidal Pulse Width Modulation (SPWM) technique. All simulations have been carried out in POWERSIM.

22 citations


Proceedings ArticleDOI
R. Kavitha1, A. Murugan1
13 Dec 2007
TL;DR: The system propose to increase the strength of the key by using UTF-32 encoding in the swapping algorithm and lossless stegano technique in the AVI file to achieve security against detection by an unauthorized person.
Abstract: Steganography is the art of communicating a message by embedding into multimedia data. The purpose is to send maximum hidden information while preserving security against detection by an unauthorized person. A steganographic system is perfectly secure when the statistics of the 'cover data' (multimedia file) and 'stegodata' (encrypted message) are identical. Experimental results with existing technology gave small video distortions after hiding some information. The proposed system is aimed without losing quality and size. In order to achieve this goal, in the proposed system we are using swapping algorithm and UTF-32 coding scheme for encryption. This paper explains the comparative analysis between Picture (JPEG) stegano and Video (AVI) stegano by quality and size. The system propose to increase the strength of the key by using UTF-32 encoding in the swapping algorithm and lossless stegano technique in the AVI file.

20 citations


Journal ArticleDOI
TL;DR: The spectral reflectance measurements in tissue reveal physiological meaning and can act together to reveal disease by non‐invasive near‐infrared (NIR) spectroscopy, as it influence its optical properties.
Abstract: The spectral reflectance measurements in tissue reveal physiological meaning. Normally, functional changes like, increase in total hemoglobin concentration, decrease in oxygen saturation, etc., are observed when there is an abnormality creeping in the normal tissue. These functional changes can act together to reveal disease by non-invasive near-infrared (NIR) spectroscopy, as it influence its optical properties. In the present study, a simple two dimensional, four layer model of breast is proposed. The four layers are (i) skin (ii) adipose layer (iii) glandular tissue and (iv) muscle. Each layer is modeled with appropriate biological chromophores like hemoglobin, water, lipid and melanin. From the literature, the concentrations and molar extinction coefficients of the chromophores in various layers of the model are obtained. These values are used to calculate the wavelength dependent absorption characteristics of a particular layer. Monte Carlo simulation of diffuse reflectance (percentage of back reflected photons after multiple scattering with the broad variety of angles) are simulated for the modeled breast tissue with and without diseased condition. Near-infrared wavelengths are chosen, as the depth of penetration in tissue is more compared to UV and visible region. Simulations are carried out on the modeled breast tissue for different races (skin colors) at different NIR wavelengths. Results show significant changes in diffuse reflectance and relative absorbance for normal and diseased breast tissues for differently pigmented model. This model can be used to study the photo dynamical therapy, drug delivery and prognosis of cancer.

Journal ArticleDOI
TL;DR: Closed-form expressions for the capacities per unit bandwidth for Generalized Rayleigh fading channels are derived for optimal power adaptation, constant transmit power, channel inversion with fixed rate, and truncated channel inversions adaptation policies.
Abstract: In this paper, closed-form expressions for the capacities per unit bandwidth for Generalized Rayleigh fading channels are derived for optimal power adaptation, constant transmit power, channel inversion with fixed rate, and truncated channel inversion adaptation policies. The closed-form solutions are derived for the single antenna reception (without diversity combining) and MRC diversity reception cases. Optimal power adaptation policy provides the highest capacity over the other adaptation policies both with and without diversity combining. Truncated channel inversion policy suffers a large capacity penalty relative to the optimal power adaptation policy as the number of degrees of freedom is increased. However, with increase in diversity, the capacity penalty for the truncated channel inversion policy decreases. Capacity gains are more prominent for channel inversion with fixed rate policy as compared to the other adaptation policies.

Journal ArticleDOI
TL;DR: In this article, single crystals of nonlinear optical sodium substituted lithium p-nitrophenolate trihydrate (NPNaLi·3H2O) have been grown successfully by slow solvent evaporation technique.
Abstract: Single crystals of nonlinear optical sodium substituted lithium p-nitrophenolate trihydrate (NPNaLi·3H2O) have been grown successfully by slow solvent evaporation technique. The grown crystals are subjected to powder X-ray diffraction, microhardness, dielectric and photoconductivity studies. NLO activity of the crystal is found to be increased in the presence of sodium ions. Microhardness on (1 1 0) and (1 0 1) planes reveal the anisotropic behaviour in Vicker's hardness number. Dielectric constant is found to be less and independent at higher frequencies. Electrical conductivity and photoconductivity are found to be increasing in the presence of sodium in the lattice of NPLi. The results of SEM analysis also have been revealed.

Proceedings ArticleDOI
01 Jan 2007
TL;DR: The effectiveness of the proposed CPNN based approach for solving power flow is demonstrated by computation of bus voltage magnitudes and voltage angles for different loading conditions and single line-outage contingencies in IEEE 14-bus system.
Abstract: Power flow study is performed to determine the power system static states at each bus to find the steady state operating condition of a system. Power flow study is the most frequently carried out study performed by power utilities and it is required to be performed at almost all the stages of power system planning, operation and control. In this paper, two supervised learning networks namely counter propagation neural networks (CPNN) and multilayer feedforward network with back propagation algorithms are proposed to solve power flow problem under different loading/contingency conditions for computing bus voltage magnitudes and angles of the power system. The artiflcail neural networks implement a pattern mapping task. The CPNN is a network which can obtain a mapping from inputs to outputs by competitive learning and supervised learning. Extensive studies have been made by varying the network parameters of both the networks. The hidden neurons are also varied to fix the optimum architecture for the problem to be solved. Due to its fast training, the proposed CPNN will be particularly useful for power system planning studies, as a number of combinations can be tried within a small time frame. The mathematical model of power flow comprises a set of non-linear algebraic equations conventionally solved with the Newton-Raphson method. The effectiveness of the proposed CPNN based approach for solving power flow is demonstrated by computation of bus voltage magnitudes and voltage angles for different loading conditions and single line-outage contingencies in IEEE 14-bus system. Results of the both the ANN closely agrees with that obtained by fast decoupled load flow. The computation time of both the ANN is much smaller than that by fast decoupled load-flow. However, comparing the training time and suitability for online application in power systems, CPNN is best suited due to its fast learning based on Euclidean distance calculations.

Proceedings ArticleDOI
30 Jul 2007
TL;DR: A thread based solution for efficient process utilization of the Web server and to prevent XSS threats is presented and is found to be effective compared to the earlier research works.
Abstract: There has been considerable increase in application layer attacks. Research surveys show that the cross site scripting (XSS) attack is most common among all the application layer attacks. Ajax Web technology, by design makes number of calls to the Web server to process a user request. This increases the bandwidth usage and response time due increase in the number of calls to the Web server. If security mechanisms are implemented to protect the application, then the server performance will suffer due to the additional processing required thereby resulting in increased response time. If security mechanisms are implemented to protect the application, then the server performance will suffer due to the increased response time because of the increase in number of requests. This problem demands an efficient approach to protect the Web application from XSS attacks and to block the malicious attempts from reaching the Web application. This paper presents a thread based solution for efficient process utilization of the Web server and to prevent XSS threats. The proposed solution has been tested using Java/JSP on JBOSS server on around 2000 vulnerable XSS input collected from various research sites, white hat and black hat sites. The model is also tested with the combination of non vulnerable input and vulnerable input to assess the performance. The approach is found to be effective compared to the earlier research works.

Proceedings ArticleDOI
13 Aug 2007
TL;DR: The proposed Signature based misuse detection approach introduces a security layer on top of the web application, so that the existing web application remain unchanged whenever a new threat is introduced that demands new security mechanisms.
Abstract: Researchers and industry experts state that the Cross-site Scripting (XSS) is the top most vulnerability in the web applications. Attacks on web applications are increasing with the implementation of newer technologies, new html tags and new JavaScript functions. This demands an efficient approach on the server side to protect the users of the application. The proposed Signature based misuse detection approach introduces a security layer on top of the web application, so that the existing web application remain unchanged whenever a new threat is introduced that demands new security mechanisms. The web pages that are newly introduced in the web application need not be changed to incorporate the security mechanisms as the solution is implemented on top of the web application. To test the effectiveness of this approach, the vulnerable web inputs listed in research sites, black-hat hacker sites and in the black hat hacker sites are considered. The proposed security system was run on JBoss server and tested on those vulnerable inputs collected from the above sites. There are around 100 variants of XSS attacks found during the testing. It has been found that the approach is very effective as it addresses the vulnerabilities at a granular level of tags and attributes, in addition to addressing the XSS vulnerabilities.

Proceedings ArticleDOI
29 Oct 2007
TL;DR: The proposed behavior based anomaly detection approach introduces a security layer on top of the Web application, so that the existing Web application remain unchanged whenever a new threat is introduced that demands new security mechanisms.
Abstract: Cross-site scripting (XSS) is the top most vulnerability in the Web applications as mentioned by research groups. Every day new evasion mechanisms are found by the hackers due to new technology, new HTML tags and script functionalities introduced. Zero-day attacks exploit the vulnerability before the fix could be issued to protect the Web application users. This demands an efficient approach on the server side to protect the users of the application. The proposed behavior based anomaly detection approach introduces a security layer on top of the Web application, so that the existing Web application remain unchanged whenever a new threat is introduced that demands new security mechanisms. Further application level parameters are introduced to reduce the processing time.

Journal ArticleDOI
TL;DR: In this article, the authors used time domain reflectometry (TDR) to study the dielectric relaxation of binary mixtures of amides (NMF) and N, N -dimethylformamide (DMF) with alcohols (1-butanol, 1-pentanol and 1-hexanol), for various concentrations over the frequency range from 10 MHz to 10 GHz at 303 K.
Abstract: Using time domain reflectometry (TDR), dielectric relaxation studies were carried out on binary mixtures of amides ( N -methylformamide (NMF) and N , N -dimethylformamide (DMF)) with alcohols (1-butanol, 1-pentanol, 1-hexanol, 1-heptanol, 1-octanol, and 1-decanol) for various concentrations over the frequency range from 10 MHz to 10 GHz at 303 K. The Kirkwood correlation factor and excess dielectric constant properties were determined and discussed to yield information on the molecular interactions of the systems. The relaxation time varied with the chain length of alcohols and substituted amides were noticed. The Bruggeman plot shows a deviation from linearity. This deviation was attributed to some sort of molecular interaction which may take place between the alcohols and substituted amides. The excess static permittivity and excess inverse relaxation time values varied from negative to positive for all the systems indicating that the solute-solvent interaction existed between alcohols and substituted amides for all the dynamics of the mixture.

Journal ArticleDOI
07 Aug 2007-Ionics
TL;DR: The 8-mol percentage Y2O3-stabilized Porous Zirconia was prepared using sol-gel method as mentioned in this paper by adding appropriate amount of oxalic acid solution into the 1M aqueous solution of zirconium-oxy chloride.
Abstract: The 8-mol percentage Y2O3-stabilized Porous Zirconia was prepared using sol–gel method. Zirconium oxalate gel was prepared by the addition of appropriate amount of oxalic acid solution into the 1 M aqueous solution of zirconium-oxy chloride. A cubic phase zirconia powder was obtained by calcination and milling of the zirconium oxalate gel. Crystallization temperature was found about 450 °C from the Differential thermal analysis. The phase analysis by X-ray diffraction shows the presence of cubic phase. Pellets sintered at 1,350 °C were highly porous, and the electrical conductivity was found with lower value due to the porosity, and the hardness was about 8.0 GPa.

Proceedings ArticleDOI
01 Dec 2007
TL;DR: The quality of the routing in the Integrated approach with respect to link load, traffic distribution and link utilization is investigated and strikes a good balance between the conflicting objectives of link load and optimizing the QoS routing.
Abstract: Traffic engineering (TE) is concerned with performance optimization of operational networks The overlay approach allows service providers to build arbitrary virtual topology over the network's physical topology Instead of overlaying IP routing over the logical virtual network, the Integrated approach runs shortest path IP routing natively over the physical topology The new bin packing approach is proposed here for load balancing in MPLS The objective is to determine minimum number of bins needed to accommodate all 'n' objects Likewise all the traffic flow (considered as objects) should be distributed along the number of paths (considered as bins) evenly The bin-packing based partitioning algorithm (BPA) attempts to improve the load balance during the partitioning of the load, Unallocated traffic is first distributed using a "best-fit" approach If this fails, the "most-free" approach is adopted until all the traffic is allocated We investigate the quality of the routing in the Integrated approach with respect to link load, traffic distribution and link utilization This method strikes a good balance between the conflicting objectives of link load and optimizing the QoS routing

Proceedings ArticleDOI
01 Dec 2007
TL;DR: In this paper, the authors developed a single domain model for the MTJ and magnetostatically coupled interaction model for an array of MTJ elements using SPICE and solved the Landau Lifschitz Gilbert equation under the influence of exchange fields and spin torque effects.
Abstract: A magnetic tunnel junction, used as a memory element in a magnetic random access memory, can be switched by a spin polarized current flowing through the MTJ We developed a single domain model for the MTJ and magnetostatically coupled interaction model for an array of MTJs The simulations are performed using SPICE and we solve the Landau Lifschitz Gilbert equation under the influence of exchange fields, spin torque effects and magnetostatic fields from the pinned layer and neighboring MTJ elements The exchange interactions and the spin torque effects are estimated via a two current model It is observed that the neighboring elements in a MTJ array increase the maximum current for switching an MTJ by 176%

Proceedings ArticleDOI
R. Kumar1, S. Malarvizhi1
18 Dec 2007
TL;DR: Time domain windowing technique proposed in this paper, offers better carrier to interference ratio (CIR) and BER is reduced compared to the correlative coding method.
Abstract: Orthogonal frequency division multiplexing (OFDM) is a modern high data rate modulation technique for wireless communication systems. Due to loss of orthogonality of subcarriers intercarrier interference occurs. In this paper the performance of the proposed time-domain equalization technique is compared with the existing frequency domain equalization technique. In frequency domain equalization a correlative polynomial is used in the frequency domain to suppress the ICI. In time domain equalization technique, a window function is proposed in equivalent to the correlative polynomial used in the frequency domain. MATLAB simulation of the proposed technique shows that the time domain windowing scheme achieves better performance in ICI suppression compared to the correlative coding technique. Time domain windowing technique proposed in this paper, offers better carrier to interference ratio (CIR) and BER is reduced compared to the correlative coding method.

Proceedings ArticleDOI
13 Dec 2007
TL;DR: The effectiveness of the proposed CPNN based approach for solving power flow is demonstrated by computation of bus voltage magnitudes and voltage angles for different loading conditions and single line-outage contingencies in IEEE 14-bus systems.
Abstract: Power flow study is performed to determine the power systems static states at each bus to find the steady state operating conditions of the systems. Power flow study is the most frequently carried out study performed by power utilities and it is required in almost all the stages of power systems planning, operation and control. In this paper, two modules of counterpropagation neural networks (CPNN) are proposed to solve power flow problem under different loading/contingency conditions for computing bus voltage magnitudes and angles of the given power systems. It implements a pattern mapping task. Due to its fast training, the proposed CPNN will be particularly useful for power systems planning studies, as a number of combinations can be tried using it within a small time frame. The mathematical model of power flow comprises a set of non-linear algebraic equations conventionally solved with the Newton-Raphson method. The effectiveness of the proposed CPNN based approach for solving power flow is demonstrated by computation of bus voltage magnitudes and voltage angles for different loading conditions and single line-outage contingencies in IEEE 14-bus systems.

Journal ArticleDOI
TL;DR: In the title compound, C21H26N2O2S, one of the pyrrolidine rings adopts a twist conformation, while the other is in an envelope conformation.
Abstract: In the title compound, C21H26N2O2S, one of the pyrrolidine rings adopts a twist conformation, while the other is in an envelope conformation. Weak C—H⋯O inter­actions stabilize the crystal structure.

Proceedings ArticleDOI
01 Jan 2007
TL;DR: The ultimate focus of this paper is to design an efficient folded finite-impulse response (FIR) filters based on unique multiplier and the internal delays of the various multiplier array are fully exploited in order to reduce hardware complexity.
Abstract: The ultimate focus of this paper is to design an efficient folded finite-impulse response (FIR) filters based on unique multiplier. The design is considered at the bit-level and the internal delays of the various multiplier array are fully exploited in order to reduce hardware complexity. The direct FIR filter form is considered. The ripple-carry, carry- save, Braun-array and Wallace-tree multiplier arrays are studied for the filter implementations. Partially folded architectures are also proposed which are implemented by cascading a number of folded FIR filters. The proposed schemes are compared as to the aspect of hardware complexity with a straightforward implementation of a folded FIR filter based on the Wallace Tree multiplier. The comparison reveals that the proposed schemes require 10%-20% less hardware. Finally, efficient implementation of partially folded FIR filter circuits is presented when constraints in area, power consumption are given.

Journal ArticleDOI
TL;DR: It should be noted that in (23) and all equations in the rest of the paper that contain the term b′ 00, this term is the constant term of the polynomial B′(z1, z2), which is the stable version of the 2D PLSI polynometric B(z 1, z 2).
Abstract: It should be noted that in (23) and all equations in the rest of the paper that contain the term b′ 00, this term is the constant term of the polynomial B′(z1, z2), which is the stable version of the 2D PLSI polynomial B(z1, z2). Since we have assumed that bi j ’s are the coefficients of the 2D PLSI polynomial, the coefficients of the polynomial B′(z1, z2) are b′ i j ’s. Equation (46) in page number 920 is as follows:

Proceedings ArticleDOI
01 Jan 2007
TL;DR: In this article, a general conversion procedure based on a {2n-1,2n, 2n+1} moduli set is presented for improved table look up residue number system (RNS) and dynamic distributed arithmetic algorithm (DDAA) in modern telecommunication and multimedia applications.
Abstract: The use of the improved table look up residue number system (RNS) and dynamic distributed arithmetic algorithm (DDAA) in modern telecommunication and multimedia applications is becoming more and more important because it allows interesting advantages in terms of area, power consumption and speed.. This paper presents a general conversion procedure based on a {2n-1,2n, 2n+1} moduli set. Based on the improved table look up RNS and DAA algorithm, an architecture which efficiently implements the digital fir filter is synthesized using Xilinx VirtexE. lt is observed that up to 82.85% reduction in number of slices, up to 100% reduction in number of flip flops and up to 87.21% reduction in number of look up tables (LUT) is achieved. The speed of the filter is improved by 30.98%.

Journal ArticleDOI
TL;DR: In this article, the pyrrolidine rings adopt twist conformations and the crystal packing is stabilized by inter-molecular C-H⋯O hydrogen bonds and π-π inter-actions.
Abstract: In the title compound, C20H23BrN2O2S, both pyrrolidine rings adopt twist conformations. The crystal packing is stabilized by inter­molecular C—H⋯O hydrogen bonds and π–π inter­actions.

Book ChapterDOI
01 Jan 2007
TL;DR: An improved trust metrics and variance based authorization model in e-commerce is proposed that assess the deviation of the customers’ transactions to calculate the Standard Deviation and employs normal distribution to assess the transaction to authorize.
Abstract: The problem of Authentication and Authorization is studied with an aim to trust the customer’s transactions and to authorize the payment. Considering the limitation of the available methods and procedures, an improved trust metrics and variance based authorization model in e-commerce is proposed. The solutions proposed assess the deviation of the customers’ transactions to calculate the Standard Deviation and employs normal distribution to assess the transaction to authorize. The model was applied on the customers’ transactions and the results were studied that are promising to employ in e-commerce systems.

Journal ArticleDOI
TL;DR: In a rapidly changing society, training is an activity, which is a must for maintaining a viable and knowledgeable workforce as mentioned in this paper, in case the current job occupants are equipped enough to meet the challenge of change.
Abstract: Every organization needs to have experienced and well-trained employees to perform the activities for them. Rapid changes in the environment have not only made the job more complex but have also created increased pressure for the organizations to readapt the products and services offered to compete in this fast changing world. Therefore, in a rapidly changing society, training is an activity, which is a must for maintaining a viable and knowledgeable workforce. In case the current job occupants are equipped enough to meet the challenge of change, training is not required. Otherwise training is necessary to increase the versatility and adaptability of employees.