An Appraisal of Integrated Ecosystem
Integrated ecosystem provides the use of biodiversity and ecosystem services into an overall strategy for helping people adapt to climate change. To date, insights into these approaches have often been based on reports from isolated anecdotal case studies. Though, these are informative, and provide evidence that people are using ecosystems to adapt, they provide rather limited insight in terms of measuring and evaluating the effectiveness of integrated ecosystem, especially when compared with technical or structural adaptation interventions. The body of scientific evidence indicating how effective such approaches are is lacking in some aspects. Where evidence does exist, it is often dispersed across a range of related fields, such as natural resource management, disaster risk reduction and agroecology. To date, there has been little attempt to systematically assemble and analyze this evidence. Therefore, evidence in respect of the merits or otherwise of integrated ecosystem is unknown and it has not been possible to identify prevailing knowledge gaps to inform further research and analysis, which will enable policymakers to compare integrated ecosystem with other adaptation options. Hence, this paper is emphasizing the identified gaps for further research purposes.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Triangle Wave Averaging Multiplier – A Review
The triangle wave averaging multiplier is reformed and designed using operational amplifiers. The input voltages V1 and V2 are added with a reference triangle wave of peak value VT, to get a voltage VX. The triangle wave is added with one input voltage V1 and subtracted with another input voltage V2, to get a voltage VY. The voltage VX is positive rectified and its average voltage VA is obtained though a low pass filter. The voltage VY is negative rectified and its average voltage VB is obtained through another low pass filter. A summing amplifier is used to get VA-VB-V1. The output voltage of this summing amplifier is the output voltage VO which is proportional to the product of the two input voltages. The peak value VT of the triangular wave is the proportional constant and it should be stable and precession. Verification of feasibility of circuit configuration is established by way of test results on a proto type.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
A Combined DCT-DWT based Watermarking Technique for Avoiding Illicit Reproduction using GUI
Now in a days, there is a vast use of images in many applications. Today duplication of any digital items or multimedia have become very easy task. So digital image watermarking technique becomes the best solution for the protection of illicit operation. In this technique some kind of secret data is embedded to the cover image and this information is used for the authentication purpose. In this paper a combined DCT-DWT based watermarking algorithm is proposed in which the secret data is hidden to the lower frequency band of the cover image.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Application of Artificial Immune System for Power Generation Optimization
This paper presents application of artificial immune system for economic dispatch problem of thermal plants. Numerical results of various test systems have been presented to demonstrate the performance of the proposed algorithm. In human body the immune system finds virus or bacteria and destroys it. Similarly this technique works. The results achieved from the proposed algorithm are compared with those obtained from differential evolution, particle swarm optimization, PSO Crazy, and GA technique. An artificial immune system is a search technique used in computing to find true or approximate solution to optimization and search problems.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Optical computing: an overview
Moore's Law has been greatly depended upon for the development of Electronic computers as they have also been regarded as traditional computers which cannot meet the high speed and bandwidth demands of the future. This led to the emergence of researchers in the field of computer engineering that began to work towards optical computing systems. Therefore, this paper seeks to examine optical computing as one of the major trends in Information Technology (IT) industry in the perspectives of its pros and cons towards recommendations that will further improve IT industry.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Optimum Bit Error Rate for Linear Multiuser Detection in Wireless Communications
Direct sequence code division multiple access (DS-CDMA) is a popular wireless technology. This system suffers from Multiple Access Interference (MAI) caused by Direct Sequence users and Near –far effect. Multi-User Detection schemes are used to detect the users’ data in presence of MAI and Near- far problem. In this dissertation, we present comparative study between linear multiuser detectors and conventional single user matched filter in DS-CDMA system. Analysis and simulations are conducted in synchronous AWGN channel, and Gold sequence and Kasami sequence are used as the spreading codes. Simulation results depict the performance of three detectors, conventional detector, Decorrelating detector and MMSE (Minimum Mean Square Error) detector. It shows that the performance of these detectors depends on the length of PN code used and Number of users. Linear multiuser detectors perform better than the conventional matched filter in terms of BER performance. All the simulations have been performed on MATLAB 7.0.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
A Critical Survey of Personal Cloud
From time to time, there is the need for a survey of different forms of computer services delivery. Personal Cloud computing is a technology which satisfies customers dynamic resource demands and makes the job easier to work on all platforms for the user. Cloud computing is the delivery of computing services over the Internet. Security is the main criteria when working on cloud, as the third party involvement will always be there. It is therefore recommended in this paper that secure architecture should be used to provide services through the cloud. The extensive use of virtualization in implementing cloud infrastructure brings unique security concerns for customers or tenants of a personal cloud service. It is observed that virtualization alters the relationship between the OS and underlying hardware -be it computing, storage or even networking. Hence, identified methods show how to overcome the security issues of the cloud.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Multiuser detection using BPSK modulation with Adaptive filters
To attain large information rates, multi user detection (MUD) is a well-built aspirant for the downlink of cell phone communications. However, while transmitting any signal over fading channel, the performance of any system is highly affected. For that reason, Multiuser detection (MUD) and channel estimation play a significant function for overcoming the interference and characterizing the channel. In previous cases, this is developed by using many kinds of algorithms. But in this Paper BPSK modulation technique was introduced for multiuser detection due to the drawbacks of those algorithm. The objective of this BPSK modulation is used to minimize the error rate of the user transmitting signal. In this, the user detection complexity and the interference of user transmitting signal are resolved. Since the detection complication and the required time are concentrated. In general, we make use of many types of filters namely, linear filters, nonlinear filters etc. here we are going to implement with adaptive filters. By using nonlinear filters we get narrow bandwidth responses and by using linear filters we get interference and BER is also high. So by using adaptive filters we overcome these drawbacks. The goal of adaptive filters is to improve synchronization and capacity by reducing interference between users. Adaptive algorithms improve the feasibility of multi user receivers.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Obstacle avoidance with anti theft mechanism system and cabin safety system for automobiles
Safety, along with security, plays a vital role in today’s society. The goal of this project is to design an embedded safety and security system for vehicle by integrating and modifying existing modules. This system endures mainly with three modules namely Gas sensing module, Obstacle detection module and Anti Theft Alert system, these are interfaced with atmel AT89S52 microcontroller. Ultrasonic sensors transmit ultrasonic waves from its sensor head and again receives the ultrasonic waves reflected from an obstacle and instructs the microcontroller which alerts the driver with an alarm and controls the vehicle by stopping it. The gas sensor here is mounted inside the vehicle such that it senses the presence of the gases inside the vehicle cabin if there is any increase in the level of the toxic gases it informs to the microcontroller which alerts the persons inside the vehicle with an alarm and also sends a SMS to the authorized user through GSM. When an unauthorized person opens the car door, the car anti theft system becomes active and gives indication by raising an alarm that the car is being under theft.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
PSO algorithm application in induction motor characteristics optimization
Parameters design and characteristics optimization of a split-phase single-phase induction motor are proposed in this paper using particle swarm optimization (PSO) algorithm. The PSO considers the motor efficiency as objective function and five performance related items as constraints. The main advantages of the proposed technique are; its simple structure and its straightforward verification of maximum efficiency of induction motor for a given output power. The PSO algorithm was implemented on a test motor and therefore, a code has been provided under MATLAB software. The results show that the PSO method gives more suitable design optimization against conventional methods.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]