Papers by IJETM Publishers
Induction Heating (IH) provides contactless, fast, and efficient heating of conductive materials.... more Induction Heating (IH) provides contactless, fast, and efficient heating of conductive materials. It is becoming one of the preferred heating technologies in industrial and medical applications among other applications, due to its advantages when compared with other classical heating techniques. Commercial Induction Heating (IH) systems are based on a dc-link resonant converter which supplies high frequency currents (20-49 kHz) to an inductor, which heats up the induction cooktops. Different topologies have been developed on the basis of current source and voltage source inverter. Recent developments in switching schemes and control methods have made the voltage-source resonant inverters widely used in several applications that require output power control. In resonant converters, maximum output power and efficiency occurs at the resonant frequency, and the switching frequency is increased to reduce the output power. A high frequency soft-switching PWM inverter with PFC (Power Factor Correction) function suitable for consumer IH cooking appliance is presented in this paper. The proposed system is composed of a soft switching chopper based boost PFC converter with passive snubber and phase shifted PWM controlled full bridge ZVS high frequency inverter. In order to meet the utility AC grid current harmonic regulation, a simple PFC control technique with discontinuous current method is introduced. Index Terms: Induction Heating (IH), resonant converter, PWM, ZVS, & PFC.
The basic factors which affect any VLSI circuit design are area, speed and power consumption. Ful... more The basic factors which affect any VLSI circuit design are area, speed and power consumption. Full adder is a basic element used in multiplexers, processor designs. Full adders can be implemented using CMOS technology. The CMOS technology plays a major role on the performance of microprocessors on very large scale integrated circuits chips. In this paper Full adder circuit is designed based on conventional domino logic using "Footed Diode" technique. This technique helps to achieve high speed, low noise than conventional CMOS. The full adder circuit design using "Footed Diode" gives superior performance compared to Full adder circuits designed using other techniques. In this finally implement 1 bit full adder by using Full adder circuit is designed based on conventional domino logic with "Footed Diode" technique. On mentor graphics tool 130 nm technology. Key Words: CMOS, Domino logic, Footed Diode technique, scaling technology
Over the recent years of research in Cloud Computing, different approaches are adopted for securi... more Over the recent years of research in Cloud Computing, different approaches are adopted for securing hosts of Cloud. These approaches give successful results in identifying the authentic request. Sensitive organizations communicate with each other through legitimate request. For establishing a security and privacy a PKI based authentication model is needed. This paper signifies the new approach in implementing a Cloud Based PKI Authentication inside the existing infrastructure of Sensitive organizations. As security is the prime concern for every organization and the requirement to implement it varies from organization to organization, therefore each and every organization embrace their own policies to implement it. The problem of understanding each other security policies is a big barrier and challenging for existing IT infrastructure for implementation purposes. Different techniques and approaches have been suggested so far but couldn’t cater the result. Requirement to Secure Cloud host machines Authentication is made possible through this PKI based model which ensures all 5 security services. This PKI model is a multi-domain atmosphere between organization and their data centers for the facilitation and resource provisioning inside the cloud platform. In this model, a Certification Authority (CA) is implemented in the Cloud infrastructure and all users will communicated through this mechanism having different authentication approaches for legitimate access.This article not only presents an architecture but also the implementation of PKI model in multi domain to facilitate data and resource sharing in a secure way. Key Words: Public key infrastructure (PKI), certification authority (CA), X.509, certificate services.
The article points to the influence of parameter values of the difficultness and parameter charac... more The article points to the influence of parameter values of the difficultness and parameter characterizing discriminatory function of the item in Birnbaum’s model of statistical theory of IRM (item response theory) to the information gained from the respondent´s answer. Key Words: IRT, Birnbaum´s logistic model, Estimation, Questionnaire, Response, Semantic Information
It is essential to transmit important data like banking and military information in secure manner... more It is essential to transmit important data like banking and military information in secure manner. Currently, internet and digital media are getting more and more popularity. So, requirement of secure transmission of Data also increased.For this reason various good techniques are proposed and already taken into practice. So we use the steganography process for the secure data transmission from the sender to receiver through the internet. Steganography is the process of secretly embedding information inside a data source without changing its perceptual quality.Steganography comes from the Greek word steganos which literally means “covered” and graphia which means “writing”, i.e. covered writing. The most common use of steganography is to hide a file inside another file. Video stegnography is the process of hiding some secret information inside a video. The addition of this information to the video is not recognizable by the human eye as the change of pixel colour is negligible. Keywords: Video stegnography,video frame, index, FZDH, data hiding, encrypt process, decrypt process, superiority
Mobile wireless technology has become popular as it has simplified the communication. The ability... more Mobile wireless technology has become popular as it has simplified the communication. The ability to connect install and anywhere has made the mobile wireless technology successfully. It provides high speed service to the users. A wireless technology helps in transferring the information over a distance without the use of wires. This technology is fast evolution in mobile computing change our day to day life that is the way we work, interact, learn etc. The Fifth generation network provides affordable broadband wireless connectivity. Currently 5G technology is not used in officially. Fifth generation research is being made on development of World Wide Wireless Web (WWWW), Dynamic adhoc wireless networks (DAWN), Read wireless world. The key technology includes MIMO integration of emerging technologies like device to device support, heterogeneous network, base centric architecture for a millimeter wave range for developing future generation 5G standards for wireless cellular. The New technology is always the main motive of the leading cell phone giants to out innovate their competitors. Apple has produced shivers all around the electronic world by launching its iPhone, new handset.
A new composite material for roofs of three types is theoretically analyzed for thermal outputs a... more A new composite material for roofs of three types is theoretically analyzed for thermal outputs and cooling of space below roof. The adoptive comfort temperature of 27 ºC in composite zone can be achieved. It is important, that a designer be able to calculate the temperatures and heat transfer rate for any combination of materials exposed to any inside and outside conditions as well as comfort. The new innovative composite roof helps make building envelope cool in summer and warm in winters and save energy in respective seasons by 70% that radiates from roof. The composite materials, innovated are concrete (M20) plus Polyurethane foam, concrete plus polystyrene (thermocol) concrete (M20) plus XPS insulation material. This composite material sandwich between reflective coating, water proofing compound layer and are further analyzed for techno-economical feasibility. It is reviewed and analyzed that, the composite material concrete with Polyurethane foam is better suited for low cost and comfort as durable roof in passive designs of building applications. These composite materials properties are good for comfort in building conditions.
The development of high speed internet access, there is increases require of cloud computing. The... more The development of high speed internet access, there is increases require of cloud computing. There are several reasons for using cloud computing. It is based on other several computing. Cloud computing is concern on sharing of resource. It is allocate resource at user demand. Virtualization technique is main supporting factor for cloud computing. Online business application, online file storage, social networking, web mail are the example of cloud computing services. Cloud computing offer three main service modal. The privacy and security of personal information is vital important. It is important to ensure that confidential information should be safe. Perlman proposed the concept of ephemerizer. Ephemerizer concept is using for assured data deletion. Ephemerizer is concern about that data will be deleted after use it from storage device. This paper is about how we can maintain integrity of that data which is stored in storage device.
The paper begins with the introduction to mobile computing and its different applicative areas li... more The paper begins with the introduction to mobile computing and its different applicative areas like virtual home environment and fare collection system in detail with diagram. Mobile Computing technology is the ability to send and receive data across these cellular networks .The purpose of this paper is to show the importance of wireless mobile data communication with effective result on internet. This paper gives us information about introduction to Cellular Digital Packet Data (CDPD) technology, its architecture, key characteristic and working, advantages and applications of CDPD technology. CDPD networks allow fixed or mobile users to connect to the network across a fixed link and a packet switched system respectively. Mobile computing is human-computer interaction by which a computer is expected to be transported during normal usage. Communication properties, protocols, data formats and concrete technologies. Hardware includes mobile devices or device components. Mobile computing system permits the user to perform a task from a distant place from the device. In a CDPD network, once the mobile user is registered, it becomes an active node on the network. This paper concludes that Data sent using CDPD is received in a quick, secure, and accurate fashion. In CDPD technology by using idle time in voice signals, the cost of data transmission is kept attractively.
Uploads
Papers by IJETM Publishers