SlideShare a Scribd company logo
1 of 1
Download to read offline
International Conference on Systems, Science, Control, Communication, Engineering and Technology 29
International Conference on Systems, Science, Control, Communication, Engineering and
Technology 2017 [ICSSCCET 2017]
ISBN 978-81-933235-0-2 VOL 01
Website icssccet.org eMail icssccet@asdf.res.in
Received 10 – January – 2017 Accepted 28 - January – 2017
Article ID ICSSCCET057 eAID ICSSCCET.2017.057
Computer Networks Salvations and Defilements on WSN,
Exasperate Contentions
B Sushmitha1
, A Vijetha2
, E Aruna3
1.2
Assistant Professor, 3,4
Associate Professor, Department of ECE, TKR Engineering College, Hyderabad, India
Abstract: In the last decade, the amelioration of internet automation has led to the eloquent escalation in salvation and concealment contention for
customers. This is the deliberation to how to impregnable computer network. In the network security, cybercrime automations have consort many good
things by means of the internet: e-commerce, easy admittance to colossal stores of advertence perspective collaborative computing, e-mail and new
approaches for broadcasting and enlightens dispensation to name a seldom. As with most automating advances, there is also another side: criminal
hackers. Everyone around the world are anxious to be a part of this revolution, but they are afraid that some hacker will break into their web server and
replace their logo with erotica scrutinize their e-mail purloin their credit card number from an on-line shopping site or lodge software that will secretly
transmit their organizations enigma to the open internet. With these concerns and others, the ethical hacker can help. This paper describes conscientious
computer jock: their adeptness, their persuasions and how they go about advocating their industries find and spigot up security holes. “Hacking” is the
word that trembles everyone whenever it is said or heard by someone. Everyone born in this world with persuasions wants to be a hacker. But it is not a
job of an infant or a matured person. A hacker needs an accomplished mind to hack contrivance. There are many rules that a person should learn to
become a conscientious computer jock which is also called as insinuate testing. These rules comprehend acquaintance of HTML, Java Scripts, Computer
equivocation, cleaving and crumbling, etc. In this paper we explain about the hacking capabilities and the operations of how it takes place in the check
board and the disposition to be deciphered.
ISBN 978-81-933235-0-2 VOL 01
Website icssccet.org eMail icssccet@asdf.res.in
Received 10 – January – 2017 Accepted 28 - January – 2017
Article ID ICSSCCET058 eAID ICSSCCET.2017.058
Design of High Speed Pipelined ADC with Digital Error
Correction
D Ramadevi1
, V Roopa Reddy2
, K Swetha Reddy3
, CH Nishanthi4
1,2
Associate Professor, 3,4
Assistant Professor, Department of ECE, TKR Engineering College, Hyderabad, India
Abstract: Analogue-to-digital converters (ADCs) are key design blocks in modern microelectronic digital communication systems. The increasing
digitalization in all spheres of electronics applications, from telecommunications systems to consumer electronics appliances, requires analogue-to-
digital converters (ADCs) with a higher sampling rate, higher resolution, and lower power consumption. Some of the important specifications of the
ADCs include resolution and speed. There appears to be a need for designing an ADC with specifications of 10-bit resolution and 100M-Hz sampling
rate. The pipeline ADC is a popular architecture for data conversion schemes which require a compromise between speed and accuracy. So the pipeline
ADC with 2.5-bits/stage has been chosen as the architecture that meets the desired specifications. This paper deals with the design of the complete
pipeline ADC with digital error correction. To obtain 10-bit output the circuit has been divided into 5 stages of each 2.5 bit stage except the last stage.
Digital error correction circuit is used to relax the accuracy requirements on the later stages of a pipeline ADC. Specifications for every block used in the
design are drawn from the overall specifications. The central block of the ADC is the gain stage used at the end of each 2.5-bit stage. To implement the
gain stage we need an OTA. It implies the OTA must work at the required speed within the given accuracy. The gain boosted telescopic OTA with
auxiliary amplifier as folded cascade architecture has been chosen, as it meets the desired specifications. Dynamic latched type comparators have been
used in sub-ADC to decrease the power dissipation.
This paper is prepared exclusively for International Conference on Systems, Science, Control, Communication, Engineering and Technology 2017 [ICSSCCET
2017] which is published by ASDF International, Registered in London, United Kingdom under the directions of the Editor-in-Chief Dr JBV Subrahmanyam and
Editors Dr. Daniel James, Dr. Kokula Krishna Hari Kunasekaran and Dr. Saikishore Elangovan. Permission to make digital or hard copies of part or all of this work
for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage, and that copies bear this
notice and the full citation on the first page. Copyrights for third-party components of this work must be honoured. For all other uses, contact the
owner/author(s). Copyright Holder can be reached at copy@asdf.international for distribution.
2017 © Reserved by Association of Scientists, Developers and Faculties [www.ASDF.international]

More Related Content

What's hot

Bd ca m big data for context-aware monitoring - a personalized knowledge disc...
Bd ca m big data for context-aware monitoring - a personalized knowledge disc...Bd ca m big data for context-aware monitoring - a personalized knowledge disc...
Bd ca m big data for context-aware monitoring - a personalized knowledge disc...LeMeniz Infotech
 
Top Cited Papers - International Journal of Network Security & Its Applicatio...
Top Cited Papers - International Journal of Network Security & Its Applicatio...Top Cited Papers - International Journal of Network Security & Its Applicatio...
Top Cited Papers - International Journal of Network Security & Its Applicatio...IJNSA Journal
 
Robust Image Transmission Technique on Data Hiding and Secure Transmission Us...
Robust Image Transmission Technique on Data Hiding and Secure Transmission Us...Robust Image Transmission Technique on Data Hiding and Secure Transmission Us...
Robust Image Transmission Technique on Data Hiding and Secure Transmission Us...Shanmuga Priyan Thiagarajan
 
ITEE_Cairns_July_2014
ITEE_Cairns_July_2014ITEE_Cairns_July_2014
ITEE_Cairns_July_2014Kurt Pudniks
 
CFP Special Session on Machine Learning on Edge for Smart Health in ICCAN 2019
CFP Special Session on Machine Learning on Edge for Smart Health in ICCAN 2019CFP Special Session on Machine Learning on Edge for Smart Health in ICCAN 2019
CFP Special Session on Machine Learning on Edge for Smart Health in ICCAN 2019Harish-Chandra Dubey
 
Cluster based certificate revocation with vindication capability for mobile a...
Cluster based certificate revocation with vindication capability for mobile a...Cluster based certificate revocation with vindication capability for mobile a...
Cluster based certificate revocation with vindication capability for mobile a...Ecway Technologies
 

What's hot (12)

Vedansh thakkar resume
Vedansh thakkar resumeVedansh thakkar resume
Vedansh thakkar resume
 
Smarthome Presentation
Smarthome PresentationSmarthome Presentation
Smarthome Presentation
 
Vedansh thakkar resume
Vedansh thakkar resumeVedansh thakkar resume
Vedansh thakkar resume
 
Asynchronous Power Management Using Grid Deployment Method for Wireless Senso...
Asynchronous Power Management Using Grid Deployment Method for Wireless Senso...Asynchronous Power Management Using Grid Deployment Method for Wireless Senso...
Asynchronous Power Management Using Grid Deployment Method for Wireless Senso...
 
Bd ca m big data for context-aware monitoring - a personalized knowledge disc...
Bd ca m big data for context-aware monitoring - a personalized knowledge disc...Bd ca m big data for context-aware monitoring - a personalized knowledge disc...
Bd ca m big data for context-aware monitoring - a personalized knowledge disc...
 
Top Cited Papers - International Journal of Network Security & Its Applicatio...
Top Cited Papers - International Journal of Network Security & Its Applicatio...Top Cited Papers - International Journal of Network Security & Its Applicatio...
Top Cited Papers - International Journal of Network Security & Its Applicatio...
 
Robust Image Transmission Technique on Data Hiding and Secure Transmission Us...
Robust Image Transmission Technique on Data Hiding and Secure Transmission Us...Robust Image Transmission Technique on Data Hiding and Secure Transmission Us...
Robust Image Transmission Technique on Data Hiding and Secure Transmission Us...
 
Data Intensive Using Mobile Relay Nodes in Wireless Sensor Networks for Energ...
Data Intensive Using Mobile Relay Nodes in Wireless Sensor Networks for Energ...Data Intensive Using Mobile Relay Nodes in Wireless Sensor Networks for Energ...
Data Intensive Using Mobile Relay Nodes in Wireless Sensor Networks for Energ...
 
Sudharani
SudharaniSudharani
Sudharani
 
ITEE_Cairns_July_2014
ITEE_Cairns_July_2014ITEE_Cairns_July_2014
ITEE_Cairns_July_2014
 
CFP Special Session on Machine Learning on Edge for Smart Health in ICCAN 2019
CFP Special Session on Machine Learning on Edge for Smart Health in ICCAN 2019CFP Special Session on Machine Learning on Edge for Smart Health in ICCAN 2019
CFP Special Session on Machine Learning on Edge for Smart Health in ICCAN 2019
 
Cluster based certificate revocation with vindication capability for mobile a...
Cluster based certificate revocation with vindication capability for mobile a...Cluster based certificate revocation with vindication capability for mobile a...
Cluster based certificate revocation with vindication capability for mobile a...
 

Similar to Computer Networks Salvations and Defilements on WSN, Exasperate Contentions

Preprint-ICCSAI2022,Galgotias University,23-24 December 2022.pdf
Preprint-ICCSAI2022,Galgotias University,23-24 December 2022.pdfPreprint-ICCSAI2022,Galgotias University,23-24 December 2022.pdf
Preprint-ICCSAI2022,Galgotias University,23-24 December 2022.pdfChristo Ananth
 
Preprint-ICTACS2022 - 10-12 Oct 2022.pdf
Preprint-ICTACS2022 - 10-12 Oct 2022.pdfPreprint-ICTACS2022 - 10-12 Oct 2022.pdf
Preprint-ICTACS2022 - 10-12 Oct 2022.pdfChristo Ananth
 
Optimized Algorithm for Hiding Digital Text in a Colour Image Using FPGA
Optimized Algorithm for Hiding Digital Text in a Colour Image Using FPGAOptimized Algorithm for Hiding Digital Text in a Colour Image Using FPGA
Optimized Algorithm for Hiding Digital Text in a Colour Image Using FPGAShanmuga Priyan Thiagarajan
 
35 9142 it s-execution evaluation of end-to-end edit septian
35 9142  it  s-execution evaluation of end-to-end edit septian35 9142  it  s-execution evaluation of end-to-end edit septian
35 9142 it s-execution evaluation of end-to-end edit septianIAESIJEECS
 
4.report (cryptography & computer network)
4.report (cryptography & computer network)4.report (cryptography & computer network)
4.report (cryptography & computer network)JIEMS Akkalkuwa
 
A Modern Technique for Unauthorized Human Detection and Intimation
A Modern Technique for Unauthorized Human Detection and IntimationA Modern Technique for Unauthorized Human Detection and Intimation
A Modern Technique for Unauthorized Human Detection and Intimationijtsrd
 
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKSA SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKSIAEME Publication
 
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKSA SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKSIAEME Publication
 
Design of Tele command SOC-IP by AES Cryptographic Method Using VHDL
Design of Tele command SOC-IP by AES Cryptographic Method Using VHDLDesign of Tele command SOC-IP by AES Cryptographic Method Using VHDL
Design of Tele command SOC-IP by AES Cryptographic Method Using VHDLdbpublications
 
Visual Cryptography Industrial Training Report
Visual Cryptography Industrial Training ReportVisual Cryptography Industrial Training Report
Visual Cryptography Industrial Training ReportMohit Kumar
 
EFFECTIVE EMBEDDED SYSTEMS SOFTWARE DESIGN METHODOLOGIES
EFFECTIVE EMBEDDED SYSTEMS SOFTWARE DESIGN METHODOLOGIESEFFECTIVE EMBEDDED SYSTEMS SOFTWARE DESIGN METHODOLOGIES
EFFECTIVE EMBEDDED SYSTEMS SOFTWARE DESIGN METHODOLOGIEScscpconf
 
Design & Implementation Of Fault Identification In Underground Cables Using IOT
Design & Implementation Of Fault Identification In Underground Cables Using IOTDesign & Implementation Of Fault Identification In Underground Cables Using IOT
Design & Implementation Of Fault Identification In Underground Cables Using IOTIRJET Journal
 
A Review on System-on-Chip (SoC) Designs for Real-Time Industrial Application
A Review on System-on-Chip (SoC) Designs for Real-Time Industrial ApplicationA Review on System-on-Chip (SoC) Designs for Real-Time Industrial Application
A Review on System-on-Chip (SoC) Designs for Real-Time Industrial Applicationijtsrd
 
Software Defined Network Based Internet on thing Eco System for Shopfloor
Software Defined Network Based Internet on thing Eco System for ShopfloorSoftware Defined Network Based Internet on thing Eco System for Shopfloor
Software Defined Network Based Internet on thing Eco System for ShopfloorIRJET Journal
 
Lecture_IIITD.pptx
Lecture_IIITD.pptxLecture_IIITD.pptx
Lecture_IIITD.pptxachakracu
 
IJSRED-V1I1P5
IJSRED-V1I1P5IJSRED-V1I1P5
IJSRED-V1I1P5IJSRED
 

Similar to Computer Networks Salvations and Defilements on WSN, Exasperate Contentions (20)

Securing Voice by Sip with Offset Codebook
Securing Voice by Sip with Offset CodebookSecuring Voice by Sip with Offset Codebook
Securing Voice by Sip with Offset Codebook
 
Preprint-ICCSAI2022,Galgotias University,23-24 December 2022.pdf
Preprint-ICCSAI2022,Galgotias University,23-24 December 2022.pdfPreprint-ICCSAI2022,Galgotias University,23-24 December 2022.pdf
Preprint-ICCSAI2022,Galgotias University,23-24 December 2022.pdf
 
MIMO Wireless based Cryptosystem using Electronic Key Generation Unit
MIMO Wireless based Cryptosystem using Electronic Key Generation UnitMIMO Wireless based Cryptosystem using Electronic Key Generation Unit
MIMO Wireless based Cryptosystem using Electronic Key Generation Unit
 
Preprint-ICTACS2022 - 10-12 Oct 2022.pdf
Preprint-ICTACS2022 - 10-12 Oct 2022.pdfPreprint-ICTACS2022 - 10-12 Oct 2022.pdf
Preprint-ICTACS2022 - 10-12 Oct 2022.pdf
 
Optimized Algorithm for Hiding Digital Text in a Colour Image Using FPGA
Optimized Algorithm for Hiding Digital Text in a Colour Image Using FPGAOptimized Algorithm for Hiding Digital Text in a Colour Image Using FPGA
Optimized Algorithm for Hiding Digital Text in a Colour Image Using FPGA
 
35 9142 it s-execution evaluation of end-to-end edit septian
35 9142  it  s-execution evaluation of end-to-end edit septian35 9142  it  s-execution evaluation of end-to-end edit septian
35 9142 it s-execution evaluation of end-to-end edit septian
 
4.report (cryptography & computer network)
4.report (cryptography & computer network)4.report (cryptography & computer network)
4.report (cryptography & computer network)
 
Survey on IOT Using Big Data
Survey on IOT Using Big DataSurvey on IOT Using Big Data
Survey on IOT Using Big Data
 
A Modern Technique for Unauthorized Human Detection and Intimation
A Modern Technique for Unauthorized Human Detection and IntimationA Modern Technique for Unauthorized Human Detection and Intimation
A Modern Technique for Unauthorized Human Detection and Intimation
 
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKSA SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
 
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKSA SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
 
Design of Tele command SOC-IP by AES Cryptographic Method Using VHDL
Design of Tele command SOC-IP by AES Cryptographic Method Using VHDLDesign of Tele command SOC-IP by AES Cryptographic Method Using VHDL
Design of Tele command SOC-IP by AES Cryptographic Method Using VHDL
 
Visual Cryptography Industrial Training Report
Visual Cryptography Industrial Training ReportVisual Cryptography Industrial Training Report
Visual Cryptography Industrial Training Report
 
EFFECTIVE EMBEDDED SYSTEMS SOFTWARE DESIGN METHODOLOGIES
EFFECTIVE EMBEDDED SYSTEMS SOFTWARE DESIGN METHODOLOGIESEFFECTIVE EMBEDDED SYSTEMS SOFTWARE DESIGN METHODOLOGIES
EFFECTIVE EMBEDDED SYSTEMS SOFTWARE DESIGN METHODOLOGIES
 
Design & Implementation Of Fault Identification In Underground Cables Using IOT
Design & Implementation Of Fault Identification In Underground Cables Using IOTDesign & Implementation Of Fault Identification In Underground Cables Using IOT
Design & Implementation Of Fault Identification In Underground Cables Using IOT
 
A Security Mechanism for MANET with Efficient Certificate Revocation Mechanism
A Security Mechanism for MANET with Efficient Certificate Revocation MechanismA Security Mechanism for MANET with Efficient Certificate Revocation Mechanism
A Security Mechanism for MANET with Efficient Certificate Revocation Mechanism
 
A Review on System-on-Chip (SoC) Designs for Real-Time Industrial Application
A Review on System-on-Chip (SoC) Designs for Real-Time Industrial ApplicationA Review on System-on-Chip (SoC) Designs for Real-Time Industrial Application
A Review on System-on-Chip (SoC) Designs for Real-Time Industrial Application
 
Software Defined Network Based Internet on thing Eco System for Shopfloor
Software Defined Network Based Internet on thing Eco System for ShopfloorSoftware Defined Network Based Internet on thing Eco System for Shopfloor
Software Defined Network Based Internet on thing Eco System for Shopfloor
 
Lecture_IIITD.pptx
Lecture_IIITD.pptxLecture_IIITD.pptx
Lecture_IIITD.pptx
 
IJSRED-V1I1P5
IJSRED-V1I1P5IJSRED-V1I1P5
IJSRED-V1I1P5
 

More from Shanmuga Priyan Thiagarajan

Structural Behaviour of Self Compacting Reinforced Concrete Beams Based on Va...
Structural Behaviour of Self Compacting Reinforced Concrete Beams Based on Va...Structural Behaviour of Self Compacting Reinforced Concrete Beams Based on Va...
Structural Behaviour of Self Compacting Reinforced Concrete Beams Based on Va...Shanmuga Priyan Thiagarajan
 
Experimental Investigation on Recon Fibre Reinforced Concrete in addition wit...
Experimental Investigation on Recon Fibre Reinforced Concrete in addition wit...Experimental Investigation on Recon Fibre Reinforced Concrete in addition wit...
Experimental Investigation on Recon Fibre Reinforced Concrete in addition wit...Shanmuga Priyan Thiagarajan
 
Big Data Analytics in Cloud Computing Environment
Big Data Analytics in Cloud Computing EnvironmentBig Data Analytics in Cloud Computing Environment
Big Data Analytics in Cloud Computing EnvironmentShanmuga Priyan Thiagarajan
 
A Study on Bituminous Mix Properties Using Waste Polyethylene
A Study on Bituminous Mix Properties Using Waste PolyethyleneA Study on Bituminous Mix Properties Using Waste Polyethylene
A Study on Bituminous Mix Properties Using Waste PolyethyleneShanmuga Priyan Thiagarajan
 
Calculation and Comparison of Circuit Breaker Parameters for 132kv Bus Model ...
Calculation and Comparison of Circuit Breaker Parameters for 132kv Bus Model ...Calculation and Comparison of Circuit Breaker Parameters for 132kv Bus Model ...
Calculation and Comparison of Circuit Breaker Parameters for 132kv Bus Model ...Shanmuga Priyan Thiagarajan
 
Multi Frequency Method of Fault Diagnosis Technique in Ana log Circuit to Avo...
Multi Frequency Method of Fault Diagnosis Technique in Ana log Circuit to Avo...Multi Frequency Method of Fault Diagnosis Technique in Ana log Circuit to Avo...
Multi Frequency Method of Fault Diagnosis Technique in Ana log Circuit to Avo...Shanmuga Priyan Thiagarajan
 
Power Quality Improvement of Electrified Transportation by Using Fuzzy Control
Power Quality Improvement of Electrified Transportation by Using Fuzzy ControlPower Quality Improvement of Electrified Transportation by Using Fuzzy Control
Power Quality Improvement of Electrified Transportation by Using Fuzzy ControlShanmuga Priyan Thiagarajan
 
Power Transfer Improvement without Any Alteration in Existing EHV AC Line wit...
Power Transfer Improvement without Any Alteration in Existing EHV AC Line wit...Power Transfer Improvement without Any Alteration in Existing EHV AC Line wit...
Power Transfer Improvement without Any Alteration in Existing EHV AC Line wit...Shanmuga Priyan Thiagarajan
 
Transient Lightning and Switching over Voltages Mitigation in Indian Gas Insu...
Transient Lightning and Switching over Voltages Mitigation in Indian Gas Insu...Transient Lightning and Switching over Voltages Mitigation in Indian Gas Insu...
Transient Lightning and Switching over Voltages Mitigation in Indian Gas Insu...Shanmuga Priyan Thiagarajan
 
Hybrid Wind Generator PS Coordination and Control
Hybrid Wind Generator PS Coordination and ControlHybrid Wind Generator PS Coordination and Control
Hybrid Wind Generator PS Coordination and ControlShanmuga Priyan Thiagarajan
 
Unit Commitment with Lagrange Relaxation Using Particle Swarm Optimization
Unit Commitment with Lagrange Relaxation Using Particle Swarm OptimizationUnit Commitment with Lagrange Relaxation Using Particle Swarm Optimization
Unit Commitment with Lagrange Relaxation Using Particle Swarm OptimizationShanmuga Priyan Thiagarajan
 
A New Approach to Video Compression using 3D-DCT
A New Approach to Video Compression using 3D-DCTA New Approach to Video Compression using 3D-DCT
A New Approach to Video Compression using 3D-DCTShanmuga Priyan Thiagarajan
 
QoS (Quality of Service) Analysis of On-Demand Routing Protocols under Multip...
QoS (Quality of Service) Analysis of On-Demand Routing Protocols under Multip...QoS (Quality of Service) Analysis of On-Demand Routing Protocols under Multip...
QoS (Quality of Service) Analysis of On-Demand Routing Protocols under Multip...Shanmuga Priyan Thiagarajan
 
A Novel Approach on Research challenges in Green Computing
A Novel Approach on Research challenges in Green ComputingA Novel Approach on Research challenges in Green Computing
A Novel Approach on Research challenges in Green ComputingShanmuga Priyan Thiagarajan
 
An Intelligent Threat Recognition for Electronic Warfare Counter Measures
An Intelligent Threat Recognition for Electronic Warfare Counter MeasuresAn Intelligent Threat Recognition for Electronic Warfare Counter Measures
An Intelligent Threat Recognition for Electronic Warfare Counter MeasuresShanmuga Priyan Thiagarajan
 
Skills Landscape of India: Initiatives and Issues
Skills Landscape of India: Initiatives and IssuesSkills Landscape of India: Initiatives and Issues
Skills Landscape of India: Initiatives and IssuesShanmuga Priyan Thiagarajan
 
A Novel Approach On Wide Range Soft Switching PWM Multi Level DC-DC Converter...
A Novel Approach On Wide Range Soft Switching PWM Multi Level DC-DC Converter...A Novel Approach On Wide Range Soft Switching PWM Multi Level DC-DC Converter...
A Novel Approach On Wide Range Soft Switching PWM Multi Level DC-DC Converter...Shanmuga Priyan Thiagarajan
 
Seismic Analysis of High-raised Building under Floating Foundation
Seismic Analysis of High-raised Building under Floating FoundationSeismic Analysis of High-raised Building under Floating Foundation
Seismic Analysis of High-raised Building under Floating FoundationShanmuga Priyan Thiagarajan
 

More from Shanmuga Priyan Thiagarajan (20)

Structural Behaviour of Self Compacting Reinforced Concrete Beams Based on Va...
Structural Behaviour of Self Compacting Reinforced Concrete Beams Based on Va...Structural Behaviour of Self Compacting Reinforced Concrete Beams Based on Va...
Structural Behaviour of Self Compacting Reinforced Concrete Beams Based on Va...
 
Experimental Investigation on Recon Fibre Reinforced Concrete in addition wit...
Experimental Investigation on Recon Fibre Reinforced Concrete in addition wit...Experimental Investigation on Recon Fibre Reinforced Concrete in addition wit...
Experimental Investigation on Recon Fibre Reinforced Concrete in addition wit...
 
Big Data Analytics in Cloud Computing Environment
Big Data Analytics in Cloud Computing EnvironmentBig Data Analytics in Cloud Computing Environment
Big Data Analytics in Cloud Computing Environment
 
A Study on Bituminous Mix Properties Using Waste Polyethylene
A Study on Bituminous Mix Properties Using Waste PolyethyleneA Study on Bituminous Mix Properties Using Waste Polyethylene
A Study on Bituminous Mix Properties Using Waste Polyethylene
 
Calculation and Comparison of Circuit Breaker Parameters for 132kv Bus Model ...
Calculation and Comparison of Circuit Breaker Parameters for 132kv Bus Model ...Calculation and Comparison of Circuit Breaker Parameters for 132kv Bus Model ...
Calculation and Comparison of Circuit Breaker Parameters for 132kv Bus Model ...
 
Multi Frequency Method of Fault Diagnosis Technique in Ana log Circuit to Avo...
Multi Frequency Method of Fault Diagnosis Technique in Ana log Circuit to Avo...Multi Frequency Method of Fault Diagnosis Technique in Ana log Circuit to Avo...
Multi Frequency Method of Fault Diagnosis Technique in Ana log Circuit to Avo...
 
Power Quality Improvement of Electrified Transportation by Using Fuzzy Control
Power Quality Improvement of Electrified Transportation by Using Fuzzy ControlPower Quality Improvement of Electrified Transportation by Using Fuzzy Control
Power Quality Improvement of Electrified Transportation by Using Fuzzy Control
 
Big Data and the Internet of Things
Big Data and the Internet of ThingsBig Data and the Internet of Things
Big Data and the Internet of Things
 
Power Transfer Improvement without Any Alteration in Existing EHV AC Line wit...
Power Transfer Improvement without Any Alteration in Existing EHV AC Line wit...Power Transfer Improvement without Any Alteration in Existing EHV AC Line wit...
Power Transfer Improvement without Any Alteration in Existing EHV AC Line wit...
 
Transient Lightning and Switching over Voltages Mitigation in Indian Gas Insu...
Transient Lightning and Switching over Voltages Mitigation in Indian Gas Insu...Transient Lightning and Switching over Voltages Mitigation in Indian Gas Insu...
Transient Lightning and Switching over Voltages Mitigation in Indian Gas Insu...
 
Hybrid Wind Generator PS Coordination and Control
Hybrid Wind Generator PS Coordination and ControlHybrid Wind Generator PS Coordination and Control
Hybrid Wind Generator PS Coordination and Control
 
Unit Commitment with Lagrange Relaxation Using Particle Swarm Optimization
Unit Commitment with Lagrange Relaxation Using Particle Swarm OptimizationUnit Commitment with Lagrange Relaxation Using Particle Swarm Optimization
Unit Commitment with Lagrange Relaxation Using Particle Swarm Optimization
 
A New Approach to Video Compression using 3D-DCT
A New Approach to Video Compression using 3D-DCTA New Approach to Video Compression using 3D-DCT
A New Approach to Video Compression using 3D-DCT
 
QoS (Quality of Service) Analysis of On-Demand Routing Protocols under Multip...
QoS (Quality of Service) Analysis of On-Demand Routing Protocols under Multip...QoS (Quality of Service) Analysis of On-Demand Routing Protocols under Multip...
QoS (Quality of Service) Analysis of On-Demand Routing Protocols under Multip...
 
A Novel Approach on Research challenges in Green Computing
A Novel Approach on Research challenges in Green ComputingA Novel Approach on Research challenges in Green Computing
A Novel Approach on Research challenges in Green Computing
 
An Intelligent Threat Recognition for Electronic Warfare Counter Measures
An Intelligent Threat Recognition for Electronic Warfare Counter MeasuresAn Intelligent Threat Recognition for Electronic Warfare Counter Measures
An Intelligent Threat Recognition for Electronic Warfare Counter Measures
 
Audio Water Marking Using DCT & EMD
Audio Water Marking Using DCT & EMDAudio Water Marking Using DCT & EMD
Audio Water Marking Using DCT & EMD
 
Skills Landscape of India: Initiatives and Issues
Skills Landscape of India: Initiatives and IssuesSkills Landscape of India: Initiatives and Issues
Skills Landscape of India: Initiatives and Issues
 
A Novel Approach On Wide Range Soft Switching PWM Multi Level DC-DC Converter...
A Novel Approach On Wide Range Soft Switching PWM Multi Level DC-DC Converter...A Novel Approach On Wide Range Soft Switching PWM Multi Level DC-DC Converter...
A Novel Approach On Wide Range Soft Switching PWM Multi Level DC-DC Converter...
 
Seismic Analysis of High-raised Building under Floating Foundation
Seismic Analysis of High-raised Building under Floating FoundationSeismic Analysis of High-raised Building under Floating Foundation
Seismic Analysis of High-raised Building under Floating Foundation
 

Recently uploaded

Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 

Recently uploaded (20)

Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 

Computer Networks Salvations and Defilements on WSN, Exasperate Contentions

  • 1. International Conference on Systems, Science, Control, Communication, Engineering and Technology 29 International Conference on Systems, Science, Control, Communication, Engineering and Technology 2017 [ICSSCCET 2017] ISBN 978-81-933235-0-2 VOL 01 Website icssccet.org eMail icssccet@asdf.res.in Received 10 – January – 2017 Accepted 28 - January – 2017 Article ID ICSSCCET057 eAID ICSSCCET.2017.057 Computer Networks Salvations and Defilements on WSN, Exasperate Contentions B Sushmitha1 , A Vijetha2 , E Aruna3 1.2 Assistant Professor, 3,4 Associate Professor, Department of ECE, TKR Engineering College, Hyderabad, India Abstract: In the last decade, the amelioration of internet automation has led to the eloquent escalation in salvation and concealment contention for customers. This is the deliberation to how to impregnable computer network. In the network security, cybercrime automations have consort many good things by means of the internet: e-commerce, easy admittance to colossal stores of advertence perspective collaborative computing, e-mail and new approaches for broadcasting and enlightens dispensation to name a seldom. As with most automating advances, there is also another side: criminal hackers. Everyone around the world are anxious to be a part of this revolution, but they are afraid that some hacker will break into their web server and replace their logo with erotica scrutinize their e-mail purloin their credit card number from an on-line shopping site or lodge software that will secretly transmit their organizations enigma to the open internet. With these concerns and others, the ethical hacker can help. This paper describes conscientious computer jock: their adeptness, their persuasions and how they go about advocating their industries find and spigot up security holes. “Hacking” is the word that trembles everyone whenever it is said or heard by someone. Everyone born in this world with persuasions wants to be a hacker. But it is not a job of an infant or a matured person. A hacker needs an accomplished mind to hack contrivance. There are many rules that a person should learn to become a conscientious computer jock which is also called as insinuate testing. These rules comprehend acquaintance of HTML, Java Scripts, Computer equivocation, cleaving and crumbling, etc. In this paper we explain about the hacking capabilities and the operations of how it takes place in the check board and the disposition to be deciphered. ISBN 978-81-933235-0-2 VOL 01 Website icssccet.org eMail icssccet@asdf.res.in Received 10 – January – 2017 Accepted 28 - January – 2017 Article ID ICSSCCET058 eAID ICSSCCET.2017.058 Design of High Speed Pipelined ADC with Digital Error Correction D Ramadevi1 , V Roopa Reddy2 , K Swetha Reddy3 , CH Nishanthi4 1,2 Associate Professor, 3,4 Assistant Professor, Department of ECE, TKR Engineering College, Hyderabad, India Abstract: Analogue-to-digital converters (ADCs) are key design blocks in modern microelectronic digital communication systems. The increasing digitalization in all spheres of electronics applications, from telecommunications systems to consumer electronics appliances, requires analogue-to- digital converters (ADCs) with a higher sampling rate, higher resolution, and lower power consumption. Some of the important specifications of the ADCs include resolution and speed. There appears to be a need for designing an ADC with specifications of 10-bit resolution and 100M-Hz sampling rate. The pipeline ADC is a popular architecture for data conversion schemes which require a compromise between speed and accuracy. So the pipeline ADC with 2.5-bits/stage has been chosen as the architecture that meets the desired specifications. This paper deals with the design of the complete pipeline ADC with digital error correction. To obtain 10-bit output the circuit has been divided into 5 stages of each 2.5 bit stage except the last stage. Digital error correction circuit is used to relax the accuracy requirements on the later stages of a pipeline ADC. Specifications for every block used in the design are drawn from the overall specifications. The central block of the ADC is the gain stage used at the end of each 2.5-bit stage. To implement the gain stage we need an OTA. It implies the OTA must work at the required speed within the given accuracy. The gain boosted telescopic OTA with auxiliary amplifier as folded cascade architecture has been chosen, as it meets the desired specifications. Dynamic latched type comparators have been used in sub-ADC to decrease the power dissipation. This paper is prepared exclusively for International Conference on Systems, Science, Control, Communication, Engineering and Technology 2017 [ICSSCCET 2017] which is published by ASDF International, Registered in London, United Kingdom under the directions of the Editor-in-Chief Dr JBV Subrahmanyam and Editors Dr. Daniel James, Dr. Kokula Krishna Hari Kunasekaran and Dr. Saikishore Elangovan. Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage, and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honoured. For all other uses, contact the owner/author(s). Copyright Holder can be reached at copy@asdf.international for distribution. 2017 © Reserved by Association of Scientists, Developers and Faculties [www.ASDF.international]