M.K Soni

Work place: Department of Electronics and Communication Engineering, FET, MRIU Faridabad, Haryana, India

E-mail: ed.fet@mriu.edu.in


Research Interests: Operating Systems, Digital Library, Process Control System


Dr. M. K Soni did his B.Sc (Engg.) in 1972 and M.Sc (Engg.) in 1975 from REC Kurukshetra (Now NIT Kurukshetra) and thereafter completed hid Ph.D from REC Kurukshetra (in collaboration with IIT Delhi) in 1988. He has a total 39 years of rich experience into Academics. His area of interest is microprocessor based control systems and digital system design. He has more than 100 research papers in the International and National Journals to his credit. Presently he is Executive Director & Dean, Faculty of Engineering and Technology, MRIU, Faridabad.

Author Articles
A Review of NBTI Degradation and its Impact on the Performance of SRAM

By Umesh Dutta M.K Soni Manisha Pattanaik

DOI: https://doi.org/10.5815/ijmecs.2016.06.08, Pub. Date: 8 Jun. 2016

Temporal degradation of VLSI design is a major reliability concern for highly scaled silicon IC technology. Negative Bias Temperature Instability (NBTI) in particular is a serious threat affecting the performance of both digital and analog circuits with time. This paper presents a review of NBTI degradation, its mechanism and various factors that affect the degradation caused by NBTI. Reaction Diffusion (RD) model based analytical expressions developed by various researchers are also discussed along with their features and underlying assumptions. Degradation in the Static RAM (SRAM) performance caused by NBTI is also discussed in detail along with the strategies that are employed to combat the effect of NBTI degradation in SRAM. Results of the review done for SRAM cell under NBTI degradation suggests that these design strategies are effective in improving the SRAM cell performance.

[...] Read more.
Comparison of OFDM System in Terms of BER using Different Transform and Channel Coding

By Pratima Manhas M.K Soni

DOI: https://doi.org/10.5815/ijem.2016.01.03, Pub. Date: 8 Jan. 2016

Orthogonal frequency division multiplexing is a type of multicarrier modulation technique which is used in wireless communication. OFDM can be used in various wireless and wired application such Digital audio broadcasting, digital video broadcasting & wireless LAN. The Performance of OFDM system depends on various parameters such as using different transform, different modulation and by putting various channel coding. In this paper OFDM system is modeled by using different transform (DWT/FFT), different modulation (BPSK, QPSK, QAM) and different channel coding (Linear / Cyclic block codes) for AWGN channel. The performance parameter is calculated as Bit error rate (BER) for various transform/modulation/channel coding based OFDM systems. MATLAB Simulink tool is used to calculate the bit error rate (BER).

[...] Read more.
Monitoring of Wide Area Power System Network with Phasor Data Concentrator (PDC)

By Surender Kumar Grewal M.K Soni D. K. Jain

DOI: https://doi.org/10.5815/ijieeb.2015.05.04, Pub. Date: 8 Sep. 2015

This paper presents the fault detection technique in wide area power system network using Phasor Data Concentrator (PDC). Single line to ground (SLG) fault data of transmission line is processed using the WAMS technology. Phasor Data Concentrator (PDC) is primarily data collecting centres located at the control centre processing unit and is responsible for collecting all the PMUs data that is transmitted over the communication link, which will detect fault in transmission line. This will help the operators in control centre to monitor the health of wide area power system network, and can initiate corrective actions when time is the critical issue. In this paper, the voltage and current phasor information, and other transmission line parameters from 14 IEEE bus system is processed and detects the fault in transmission lines. The proposed fault detection technique in transmission line of wide area power system network is very useful for improving power system reliability and power quality.

[...] Read more.
A Novel Crypt-Biometric Perception Algorithm to Protract Security in MANET

By Sherin Zafar M.K Soni

DOI: https://doi.org/10.5815/ijcnis.2014.12.08, Pub. Date: 8 Nov. 2014

Mobile ad-hoc networks are networks that have properties of self configuration and multi hopping. These networks do not have any fixed infrastructure and need to be dynamic in nature. The specification of dynamism leads to various security breaches that a MANET suffers from such as impersonation, data modification etc. which results in degradation of performance and hence QOS is strongly affected. Hence this paper focuses on improving security performance of MANET by employing biometric technique in combination with cryptography, since biometric perception is specified as the most neoteric technological advancement which enhance security specifications of various networks by specifying exclusive human identification features. Cryptography is designed on computational hardness assumptions making various algorithms hard to break by an adversary. Simulation and experimental results specify that the proposed crypto-metric perception technique leads in achieving better QOS parameters by avoiding security intrusions hence better performance of mobile ad-hoc networks.

[...] Read more.
Sustaining Security in MANET: Biometric Stationed Authentication Protocol (BSAP) Inculcating Meta-Heuristic Genetic Algorithm

By Sherin Zafar M.K Soni

DOI: https://doi.org/10.5815/ijmecs.2014.09.05, Pub. Date: 8 Sep. 2014

The paper comprehends an impending accost of intensifying biometric stationed authentication protocol(BSAP) bestowing meta-heuristic genetic algorithm for securing MANET. Biometric authentication using fingerprint, facial, iris scan, voice recognition etc. have gain a lot of importance in recent years to provide security in MANET. Biometrics are more advantageous and secure as compared to prevailing data security techniques like password or token mechanisms. A higher level of security is achieved in our impending approach using genetic algorithm to overcome the security and privacy concerns that exist in biometric technology. The foremost requirement of our protocol is to overcome various data attacks such as wormhole, cache poisoning, invisible node attack etc. that are confronted by MANET and make the network more secure.

[...] Read more.
Interval Type-2 Fuzzy Logic Controller to Control the Velocity and Angle of Inverted Pendulum

By Anita Khosla Leena G M.K Soni

DOI: https://doi.org/10.5815/ijisa.2014.07.06, Pub. Date: 8 Jun. 2014

Inverted Pendulum is a well established benchmark problem that produces many challenges to a control engineer. It is a nonlinear, unstable, non minimumphase and under actuated system.Itrequires a controller which canadapt in different disturbance conditions and work appreciably well when compared to conventional controllers. In this paper Interval type-2 Fuzzy logic controllerfor inverted pendulum isdesigned.The objective of the proposed control technique is to develop the stability position of the pendulum. The optimal membership functions and the interference system are developed using IT2FLS. Using the IT2FLS, the position of the inverted pendulum is maintained towards the reference position. The proposed control techniqueis implemented in MATLAB/Simulink working platform and the control performances are evaluated. Then, the performance of proposed controller is evaluated and compared with the PI controller, Fuzzy controller andABC- FLC.

[...] Read more.
ABC Algorithm Based Interval Type-2 Fuzzy Logic Controller for an Inverted Pendulum

By Anita Khosla Leena G M.K Soni

DOI: https://doi.org/10.5815/ijisa.2014.06.03, Pub. Date: 8 May 2014

In this paper, a hybrid control technique is proposed for managing the variation of angle and velocity of the inverted pendulum. The proposed hybrid technique is the combination of ABC algorithm and interval type-2 Fuzzy Logic System (IT2FLS). The objective of the proposed hybrid control technique is to achieve the stability position of the pendulum. Here, the ABC algorithm is used to optimize the change of angle and change of velocity of the pendulum. With the optimized value, the optimal membership functions and the interference system are developed using IT2FLS. Using the ABC based IT2FLS, the position of the inverted pendulum is maintained towards the reference position. The proposed hybrid control technique is implemented in MATLAB/Simulink working platform and the control performances are evaluated.

[...] Read more.
Real Time Speaker Recognition System for Hindi Words

By Geeta Nijhawan M.K Soni

DOI: https://doi.org/10.5815/ijieeb.2014.02.04, Pub. Date: 8 Apr. 2014

Real time speaker recognition is needed for various voice controlled applications. Background noise influences the overall efficiency of speaker recognition system and is still considered a challenge in Speaker Recognition System (SRS). In this paper MFCC feature is used along with VQLBG algorithm for designing SRS. A new approach for designing a Voice Activity Detector (VAD) has been proposed which can discriminate between silence and voice activity and this can significantly improve the performance of SRS under noisy conditions. MFCC feature is extracted from the input speech and then vector quantization of the extracted MFCC features is done using VQLBG algorithm. Speaker identification is done by comparing the features of a newly recorded voice with the database under a specific threshold using Euclidean distance approach. The entire processing is done using MATLAB tool.The experimental result shows that the proposed method gives good results.

[...] Read more.
A New Design Approach for Speaker Recognition Using MFCC and VAD

By Geeta Nijhawan M.K Soni

DOI: https://doi.org/10.5815/ijigsp.2013.09.07, Pub. Date: 8 Jul. 2013

This paper presents a new approach for designing a speaker recognition system based on mel frequency cepstral coefficients (MFCCs) and voice activity detector (VAD). VAD has been employed to suppress the background noise and distinguish between silence and voice activity. MFCCs were extracted from the detected voice sample and are compared with the database for recognition of the speaker. A new criteria for detection is proposed which gives very good performance in noisy environment.

[...] Read more.
Other Articles