Just Submited Papers List


List for IPASJ International Journal of Computer Science (IIJCS) ISSN 2321-5992
S.No.: 1
Title : Optimization and Implementation of Parallel Squarer
Authors Name: Mr. SHARATH D., Mr. DEVARAJU G., Mrs.KAVITHA DEVI C.S.
Authors Affilation: Dr.Ambedkar Institute of Technology,Bangalore
Volume & Issue No.: Volume2Issue7
Abstract: This paper describes the low power architecture design which is implemented in digital systems. It focuses on the design and implementation of Parallel Squarer and its optimization at the gate level netlist. The efficient parallel squarer design is optimized at the gate level and the results are obtained. It’s much efficient than the existing system. Parallel squarer architecture is implemented based on Binary squarer algorithm to provide low, power, area and delay with the trade-offs constraints. Simulation, synthesis is done in the Modelsim 6.5 and Xilinx 13.1 v. The gate level netlist simulation and synthesis are done in Cadence Encounter RTL compiler and the results are compared with Xilinx and cadence tool.
S.No.: 2
Title : STUDY OF SPECTRUM SENSING TECHNIQUES FOR OFDM BASED COGNITIVE RADIO
Authors Name: Monika Tripathi
Authors Affilation: Department of Electronics, Madhav Institute of Technology and Science Gwalior, India
Volume & Issue No.: Volume2Issue7
Abstract: Nowadays OFDM (Orthogonal Frequency Division Multiplexing) techniques are adopted by many existing or progressing wireless communication standards.OFDM’s sensing and spectrum shaping capabilities together with its flexibility and adaptivity make it the best transmission technology for CR system. Spectrum sensing helps to detect the spectrum holes (unutilized bands of the spectrum) providing high spectral resolution capability.Thus, a robust spectrum sensing algorithm for OFDM modulated signals is highly decide to implement CR when the primary signal uses OFDM modulation. Motivated by this demand,a Time-Domain Symbol Cross-correlation based spectrum sensing algorithm (TDSC method) is presented in this paper.The algorithm makes use of the property that the mean of the TDSC of two OFDM symbols is not zero if they have embedded the same frequency-domain pilot tones. We propse a new decision statistic for the signal detection based on the special feature –Cyclic Prefix embedded in OFDM signal. Further, in this paper we used to control the Transmit Power for cognitive radio.Different spectrum sensing techniques for OFDM based cognitive radio are discussed in this paper.
S.No.: 3
Title : Secure Data Transmission Using DNA ENCRYPTION
Authors Name: Anupriya Aggarwal and Praveen Kanth
Authors Affilation: BRCM College of Engineering ,Bahal,Haryana
Volume & Issue No.: Volume2Issue7
Abstract: DNA Encryption is preferable biological technique for securing text/image because of its parallelism, vast storage and fast computing quality. The process involve biological molecule present in human body called DNA abbreviated as Deoxyribose Nucleic Acid .The DNA molecule is synthesized and protein component part is extracted and then converted to nitrogen base . This nitrogen base is used in Encryption/Decryption and formulated as A (Adenine), C (Cytosine), T (Thymine) and G (Guanine) characters. DNA Cryptography components are ACTG characters only and how the message gets merged and located is known as DNA Cryptography. This ACTG characters create DNA Sequence S and merged with message M to produce new sequence S’ and send to receiver where Sequence S’ back converted to S. The paper will introduce traditional methods of DNA cryptography in which there is need of key and proposed methods ,in which introduction to key is not required ,hence removing the tension of securing the key. The proposed method involves Complementary pair method.
S.No.: 4
Title : Induction Machine Rotor Faults Diagnostics through Stator Current Using Artificial Neural Network
Authors Name: KANIKA GUPTA
Authors Affilation: BADDI UNIVERSITY
Volume & Issue No.: Volume2Issue7
Abstract: Industrial motors are subject to incipient faults which, if undetected, can lead to motor failure. The necessity of incipient fault detection can be justified by safety and economic reasons. The technology of artificial neural networks has been successfully used to solve the motor incipient fault detection problem. This paper develops inexpensive, reliable, and non- invasive NN based incipient fault detection scheme for small and medium sized induction motors. Faults and failures of induction machines can lead to excessive downtimes and generate large losses in terms of maintenance and lost revenues. This motivates motor monitoring, incipient fault detection and diagnosis. Non-invasive, inexpensive, and reliable fault detection techniques are often preferred by many engineers. In this paper, a feed forward neural network based fault detection system is developed for performing induction motors rotor faults detection and severity evaluation using stator current. From the motor current spectrum analysis and the broken rotor bar specific frequency components knowledge, the rotor fault signature is extracted and monitored by neural network for fault detection and classification. The proposed methodology has been experimentally tested on a 5 HP/1750 rpm induction motor. The obtained results provide a satisfactory level of accuracy.
S.No.: 5
Title : Performance Evaluation Of Fuzzy Based DWT Approach To Enhance CT Image Using Image Fusion
Authors Name: Sarabdeep singh, Shikha khera
Authors Affilation: SPGOI , MDU, Rohtak HR (INDIA)
Volume & Issue No.: Volume2Issue7
Abstract: Image fusion is about to combine the features of two or more partial occluded or damaged images to generate a new effective image. The proposed algorithm is about to improve the quality of CT image by using the concept of image fusion. In this work, an effective image analysis model is been presented under multiple parameters. The parameters that will be considered in this work are contrast analysis, entropy analysis and frequency analysis. The proposed algorithm begin, with the decomposition of images using DWT. These decomposed image parts will be analyzed using multiple parameters defined above. To perform the effective pixel area selection, the fuzzy logic will be applied. In this work, a two layered analysis is been performed for image fusion. The first level fusion will be done using DWT and second level fusion will be done using parametric fuzzy logic approach. As the presented work is defined on the basis of multiple parameters so that more effective results are expected from the defined approach. The work will be implemented in matlab environment. The obtained results shows the effective generation of fusion image. The analysis of work is done under different parameter that shows the work has improved the visibility of medical image.
S.No.: 6
Title : Most Popular Webpages as a Basis for Website Re-Structuring for Reducing Web Navigation Efforts
Authors Name: Manpreet Singh Sidhu and Parminder Kaur
Authors Affilation: 1Guru Nanak Dev University, Amritsar
Volume & Issue No.: Volume2Issue7
Abstract: Millions of Webpages are accessed every minute by people from different locations all over the world. Very often users have to un-necessarily visit surplus pages in order to reach the desired page.Users’ activities in a web site are encouraged by the need to reach specific content. Web analytics tools and web mining techniques help visitors to Web sites in a faster way to reach the desired content, while decreasing the probability of leaving the system, or wandering. In exercise, the most commonly used methods for the time being are direct connecting of documents with their potential target documents. There is a scope for an approach that considers the possibility that the documents contained within the path carry useful information and that they may affect the determination of access to a specific target document. This paper puts forward a simple procedure for determining the most popular and the most visited pages which are often accessed by users. Placing most visited webpages higher above in the Website tree structure will decrease the user Navigation Efforts. In addition to it, it will also reduce network traffic as well as load on the server on which the website is hosted. PivotPage Documents– the most often visited documents from user’s path have also been discussed.
S.No.: 7
Title : DESIGN AND ANALYSIS OF ULTRA-PRECISION AEROSTATIC BEARING SPINDLE
Authors Name: Gopal Kharvi, Prasanna Medar
Authors Affilation: SIET TUKUR
Volume & Issue No.: Volume2Issue7
Abstract: The demand for higher level machine tools is increasing year by year. Accompanying this, further high precision is demanded for spindles and spindle supporting bearings that are elements of machine tools. Ultra-precision machines require spindles with nanometer accuracy in rotation, moderate axial and radial stiffness, and moderate load carrying capacity. Aerostatic bearings have been adapted to develop this type of spindles called ultra precision aerostatic spindles. Since most of the ultra precision machines require precision class spindle with higher running accuracy, stiffness and good thermal stability, aerostatic bearings are in greater demand. Aerostatic bearing gives high rotational accuracy, thermal stability, stiffness and high operating speeds, compared to other types of bearings. Presently anti-friction bearings were used for the development of precision machine tools. As problems like wear, thermal errors, lubrication problems, bearing failure, etc, were encountered in anti-friction bearings there was a serious research in the field of precision engineering. Then the concept of using air bearings or gas bearings was developed and it received a huge response from all organizations and research centers. Later various concepts like active air bearings and passive air bearings and others were developed. In the present work an attempt has been made to develop an aerostatic spindle for ultra-precision machine tool which overcomes the drawbacks present in anti-friction bearing spindle which were used in precision machine tools. Different types of aerostatic bearings are analyzed and the best one is selected for design and further development. Detailed design of axial grooved journal bearings is done and groove parameters are studied and optimized.
S.No.: 8
Title : Image Segmentation and Shape Analysis for Road-Sign Recognition
Authors Name: Miss Ragini N.Chaudhari, Dr P. R. Deshmukh
Authors Affilation: SIPNA COET Amravati, Maharashtra
Volume & Issue No.: Volume2Issue7
Abstract: Road sign detection is important for regulating the traffic. The traffic signs enhance traffic safety by informing the driver of speed limits or possible dangers such as icy roads, imminent road works or pedestrian crossings. This paper proposes an automatic road-sign recognition method based on image segmentation and joint transform correlation (JTC) with the integration of shape analysis. The presented system is universal, which is able to detect traffic signs of any countries with any colour and any of the existing shapes (e.g., circular, rectangular, triangular, pentagonal, and octagonal) and is invariant to transformation. There are three main stages in the proposed algorithm: 1) segmentation by clustering the pixels based on the color features to find the regions of interest (ROIs); 2) traffic-sign detection by using two shape classifications Criteria, i.e., the relationship between area and perimeter and the number of sides of a given shape; and 3) recognition of the road sign using FJTC to match the unknown signs with the known reference road signs stored in the database. Experimental results on real-life images show a high success rate and a very low false hit rate.
S.No.: 9
Title : Aggregation Protocols in Wireless Sensor Network- A Survey
Authors Name: Nanthini.D, R.A.Roseline
Authors Affilation: Government Arts College,Coimbatore-18
Volume & Issue No.: Volume2Issue7
Abstract: Abstract--In this paper we provide a review of existing approaches, techniques and protocols for aggregation in Wireless Sensor Networks. Throughout this paper we discuss some of the various types of aggregation in Wireless Sensor Networking field. Various protocols have been proposed to routing packets for facilitating data aggregation. Generally the users require only efficient aggregate functions. A sensor network may consist of hundreds or thousands of low-cost sensors. Each acts as an information source, sensing and collecting data from the environment for a given task.
S.No.: 10
Title : What has driven remittance activity of the Indonesian migrant worker in Hong Kong; a study to formulate a proper business strategy To capture the business opportunity
Authors Name: Yunisyaaf Yunizal Arief
Authors Affilation: University of Padjadjaran
Volume & Issue No.: Volume2Issue7
Abstract: This research was conducted to study the things that encourage remittances by Indonesian workers in Hong Kong. The results can be used as a basis for preparing a felicitous strategy to increase remittance activity of Indonesian workers in Hong Kong to Indonesia. The results showed that 61% of motivation to perform a money transfer is influenced by agent variables (X2), the fees and the exchange rate of the Hong Kong dollar to rupiah, which is still perceived to be a burden, meanwhile the remittance processing speed is not very influential. Furthermore, remittances from workers seems to be reinforced by activities to offshore savings and to conduct money transfers to family needs.
S.No.: 11
Title : SOFTWARE VALIDATION SYSTEM USING BOUNDED SOFTWARE REPLICA RECOGNITION FOR LARGE SCALE SOFTWARE PROJECTS
Authors Name: R.Saranya
Authors Affilation: Research Scholar Madurai Kamaraj University Madurai-21
Volume & Issue No.: Volume2Issue7
Abstract: Requirement Validation engineering is an important part in the software development processes.To provide the exact required software products to the end users, in requirement validation phase, elicitation and specification are gathered from the users to improve the efficiency of the system.Works conducted using item prioritization applied Equality of Cumulative Votes (ECV)to improve the software compositional analysis. ECV prioritized much larger number of software requirements but the software requirement did not yield high quality software validation ratio.Two Product Derivation (TPD) approach verified the key activities of software product lines but the validation of quality was not performed with effective scalability outcome.In this paper, an effective Software Validation system using Bounded Software Replica Recognition (SV-BSRR) is presented for large scale software projects. The SV-BSRR method detects the software programming errors in order to achieve the quality on the users software elicitation and specification needs.The three steps involved in SV-BSRR method are Elicitation-Specification Main Domain Verification, Software Replica Checking and Bounded Software Replica Recognition. Elicitation-Specification Main Domain Verification analyzes the behavior of the software for larger projects using Mathematical monotone iterative functionwithout executing which increases the scalability. Software Replica Checking validates the instruction of the programsand effectiveness of software on larger projects to increase the software validation ratio. Finally, Bounded Software Replica Recognition checks (i.e.,) verify only the bounded software states in the projects to reduce the verification time by minimizing the verification step.SV-BSRR method experiment the parametric result measures of verification time, requirement-specification understandability rate and scalability and software validation ratio.
S.No.: 12
Title : Ontology development from Text Document For Search Engine
Authors Name: Trupti Hake , Vaishali Deshmukh
Authors Affilation: skncoe Pune.
Volume & Issue No.: Volume2Issue7
Abstract: In today’s world we can get any type of information from Internet. Many web applications use Semantic webs. Ontology are elementary part of semantic webs. Also maintain static database for different e learning system is a challenging task. In case unstructured databases which contains the text files , it becomes difficult to retrieving of information and hence it leads failure in acquire accuracy of knowledge. Today’s era is all about maximum knowledge gain in less effort. So the search system has to more prominent. so changing the structure of storing the data. Need and concept of semantic web has given birth to Ontology. Here we are representing a semi-automatic structure to build ontology from text document. And to retrieve information from ontology database Apache Lucene search engine which is developed.
S.No.: 13
Title : A hybrid approach for the mapping of ontologies
Authors Name: Guefrouchi Ryma, Kholladi Mohamed-Khireddine
Authors Affilation: Constantine 2 University, MISC Laboratory
Volume & Issue No.: Volume2Issue7
Abstract: Nowadays, ontologies are a strategic stake in the representation, processing and knowledge management. Several ontologies in different but related fields have been developed, thus a great evolution of knowledge-based systems in distributed environments appeared. To take advantage of structured data in heterogeneous ontologies, and according to different standards, it is essential to develop a method that ensures the interoperability of different ontolo-gies. In this paper we focus on the mapping of ontologies based on the different entities having close semantic contents, to the reuse of ontologies in different application areas such as the Se-mantic Web and Web Services , e-commerce, industrial, etc.
S.No.: 14
Title : Constructing Constraint Principal Curves Algorithms Using Local Optimization and Adaptive Radius
Authors Name: Dewang Chen1, Shiying Yang2, Peter Pudney3, Xin Liu4
Authors Affilation: 1State Key Laboratory of Rail Traffic Control and Safety, Beijing Jiaotong University, Beijing, China dwchen@bjtu.edu.cn 2State Key Laboratory of Rail Traffic Control and Safety, Beijing Jiaotong University, Beijing, China 12120291@bjtu.edu.cn 3Barbara Hardy Institute, University of South Australia, Mawson Lakes, Australia Peter.Pudney@unisa.edu.au 4Computational Mathematics, Academy of Mathematics and System, Chinese Academy of Science, Beijing, China liuxin@lsec.cc.ac.cn
Volume & Issue No.: Volume2Issue7
Abstract: Principal curves are curves that pass through the middle of a data set, which can learn high-accuracy data from multiple low-accuracy data; find the hidden pattern behind large amount of data with noise cloud and save lots of memory space for big data. An important example is a curve that defines a fixed path, such as a road or a rail line. We wish to construct a curve describing a path from noisy GPS measurements taken while traveling along the path. However, current principal curve algorithms are mainly based on global optimization, which are time consuming with low accuracy and narrow application scope in practice. To address these problems, we put forward the idea of CLPC (constraint Local Principal Curve), which uses local optimization methods and restricts the principal curve with two fixed endpoints to reduce the computational complexity. Based on this, we propose three CLPC algorithms, named as CLPCg (CLPC using greedy thinking), CLPCs (CLPC using one dimensional search) and CLPCc (CLPC combining the greedy thinking and one dimensional search) respectively, combining local optimization and adaptive radius to expand the range of applications and increase the solution quality. Then, six performance indices are defined to evaluate the effectiveness and efficiency of the proposed algorithms. Three simulation data sets and one GPS measured data set are used in the numerical experiments. The numerical results demonstrate that all of the three proposed algorithms can learn high-accuracy data from multiple low-accuracy data efficiently. Compared with the existing KPC algorithms, they have a lot of advantages in accuracy, computational speed and the range of applications. Moreover, CLPCc is the best of the three proposed algorithms according to the comprehensive experiments, CLPCg run much faster than other ones and meanwhile CLPCs sits on the hedge.
S.No.: 15
Title : Routing in MANET using CBHRP
Authors Name: Rakhi Vasake , Prof. S .B . Takale, Dr. S. D. Lokhande
Authors Affilation: Sinhgad College of Engg, Vadgaon, Pune
Volume & Issue No.: Volume2Issue7
Abstract: This paper introduces the concept of Cluster Based Hybrid Routing protocol(CBHRP) in Mobile Ad-hoc Networks (MANET). Energy conservation is the main parameter to be considered in MANET. In our proposed work, attempt is made to achieve energy efficiency by clustering and hybrid routing. The MANET is first divided into clusters and then cluster head is elected such that its energy level and signal strength is maintained above some pre defined threshold value. The head selection and its maintenance is done using the Signal and Energy Efficient Clustering(SEEC) algorithm. Once head is selected, routing is carried out such that inter cluster routing is done using reactive protocol, where as intra cluster communication takes place using pro active protocol. Hence the name cluster based hybrid routing protocol. Considerable energy efficiency can be achieved using clustering and hybrid routing.
S.No.: 16
Title : A Multi-Stage Cryptographic Approach Using Mod-Encoder Algorithm
Authors Name: Balajee Maram, P Srihari, K Lakshmana Rao
Authors Affilation: P.hD (CS) Scholar, Research and Development Centre, Bharathiar University, Coimbatore
Volume & Issue No.: Volume2Issue7
Abstract: Our life is bound with digital technology. In Information Technology, everything is available in digital form only. In the field of data communication, there is a need to send and receive data. Really we don’t know how the data will reach the destination successfully and securely. Security and privacy plays an important role in digital and data communication. In the field of secure data communication, cryptography is very important technique. Till now, we have seen many algorithms that are related to symmetric and asymmetric encryption and decryption. Most of the algorithms are related to text/data only. In this technique, there is a need to maintain one shared secret key or a pair of private-public keys. This proposed method tells us how to implement cryptography using mathematical method “Double-Reflecting Data Perturbation Method”, set of sharedsecret- files and Mod-Encoder Mechanism over a language L, which provides encryption and decryption.
S.No.: 17
Title : Hadoop: A Big Data Management Framework for Storage, Scalability, Complexity, Distributed Files and Processing of Massive Datasets
Authors Name: Manoj Kumar Singh, Dr. Parveen Kumar
Authors Affilation: 1Research Scholar, Computer Science & Engineering, Faculty of Engineering & Technology, Shri Venkateshwara University, Gajraula, U.P, India
Volume & Issue No.: Volume2Issue7
Abstract: Every day people make 2.5 quintillion bytes of information. In the most recent two years alone in excess of 90% of the information on the planet has been made and there is no sign that this will change, truth be told, information creation is expanding. The purpose behind the enormous blast in information is that there are such a variety of sources, for example, sensors used to gather barometrical information, information from posts on social networking locales, advanced and movie information, information created from every day transaction records and cell and GPS information, simply to name a couple. The greater part of this information is called Big Data and it incorporates three measurements: Volume, Velocity, Variety. To infer esteem from Big Data, associations need to rebuild their reasoning. With information developing so quickly and the ascent of unstructured information representing 90% of the information today, associations need to look past the legacy and select schemas that place extreme restrictions on overseeing Big Data productively and gainfully. In this paper we give an in-profundity theoretical review of the modules identified with Hadoop, a Big Data administration schema.
S.No.: 18
Title : modified retina verification system based on biometric graph matching
Authors Name: Jyothilekshmi M,Hema S
Authors Affilation: LBSITW,Poojappura,thiruvanthapuram,kerala,india
Volume & Issue No.: Volume2Issue8
Abstract: Biometric identification systems become a real demand for improving the security issues in different organizations. Commonly used biometric features include face, fingerprint, voice, facial thermogram, iris, retina, gait, palm print, hand geometry, and so on. Among these features, retina may provide higher level of security due to its inherent robustness against imposture. This paper presents an automatic retina verification framework based on the biometric graph matching (BGM) algorithm. The retinal vasculature is extracted using morphological operators. Then, retinal templates are defined as formal spatial graphs derived from the retinal vasculature. BGM algorithm uses graph topology to define distance measures between a pair of graphs. Kernel density estimation (KDE) of the genuine and imposter score distributions of the training set are used to measure performance of the BGM algorithm.
S.No.: 19
Title : DETECTION OF FOVEA REGION IN FUNDUS RETINAL IMAGE FOR DIAGNOSIS
Authors Name: Meenu Ram .C, James Thomas
Authors Affilation: LBSITW Trivandrum
Volume & Issue No.: Volume2Issue8
Abstract: Retinal image analysis is one of the crucial topics in medical image processing. During the last three decades, people are trying to extract the different features (like blood vessels, optic disk, macula, fovea etc.) automatically from retinal image. Fovea is one of the important feature of a fundus retinal image. This project presents a simple and fast algorithm using Mathematical Morphology to find the fovea region. Here blood vessel detection provides vessel extraction of a normal eye. If blood vessels are having inflammation or any thick formations it is an indication of any other eye disease. Using this algorithm planning to get an actual image of a patient which can be analyzed to detect the category of other diseases if any. Developing automatic fundus image analyzing and diagnosis. The color fundus images are used to keep track of the eye diseases. Extraction of the normal and abnormal features in color fundus images is fundamental and useful to automatic understanding of fundus images. The normal features of fundus images includes optic disk, blood vessels, and fovea. Abnormal features include exudates, hemorrhages , microneurysms etc.
S.No.: 20
Title : Multimodal Biometrics For Human Identification
Authors Name: VANDANA J, JAMES THOMAS
Authors Affilation: LBSITW TRIVANDRUM
Volume & Issue No.: Volume2Issue8
Abstract: Biometrics is the use of physical, biological, and behavioral traits to identify and verify a person’s identity automatically. There are many different traits that can be used as biometrics, including fingerprint, face, iris, retina, gait, and voice. The sclera is the white and opaque outer protective covering of the eye. The blood vessel structure of the sclera is unique to each person, and it can be remotely obtained non intrusively in the visible wavelengths. Therefore, the vessel patterns in the sclera can be used for human identification in a distance under visible wavelength illuminations. Therefore, it is well suited for human identification (ID). So here we use a new approach for human ID: sclera recognition. For that a new method for sclera segmentation is developed which works for both color and grayscale images. Then design a Gabor wavelet-based sclera pattern enhancement method to emphasize and binarize the sclera vessel patterns. Finally, use a line-descriptor based feature extraction, registration, and matching method that is illumination, scale, orientation, and deformation invariant and can mitigate the multilayered deformation effects and tolerate segmentation error. no biometric is perfect or can be applied universally. In order to increase population coverage, extend the range of environmental conditions, improve resilience to spoofing, and achieve higher recognition accuracy, multimodal biometrics has been used to combine the advantages of multiple biometrics. Therefore here sclera recognition method is combined with other biometrics, such as iris recognition or fingerprint recognition to get an accurate human identification method.
S.No.: 21
Title : A Study on Various Features of Multicast Routing Protocols in Mobile Ad hoc Networks
Authors Name: S.Dinakar, Dr.J.Shanthini
Authors Affilation: PG Scholar, Department of Information Technology, SNS College of Technology, Coimbatore, TamilNadu, India.
Volume & Issue No.: Volume2Issue8
Abstract: In mobile ad hoc networks the routing is performed using multi-hop routing from a source to a destination node (or) nodes. Here, the dynamic routing must be focused since they are infrastructureless networks involving a collection of mobile devices communicating over a wireless link. So, it requires a proper route for forwarding the data packets. The study focuses on some of the widely used multicast routing protocols designed to perform its task in accordance with its design criteria.
S.No.: 22
Title : Remote Patient Monitoring in Telemedicine using computer communication network through Bluetooth, Wi-Fi, Internet Android Mobile
Authors Name: S.Saravanan
Authors Affilation: Research scholar in Annamalai university CSE department, South India
Volume & Issue No.: Volume2Issue8
Abstract: Mobile telemedicine is to provide a medical monitoring for the user at any time, if there is any abnormal change of his/her pulse rate/temperature data. It provides sustained communication for data transmission. Mobile telemedicine brings the convenience and reduced cost, it also reduce the bandwidth problems in communicating reduced data transmission, and unexpected bandwidth congestion. The main purpose is to maintain record of patient data and to give emergency alert if required. We developed android Bluetooth API is to construct a simple peer-to-peer messaging system that works between two paired Bluetooth. At monitoring center android phone receives the data through Bluetooth module. This application is mainly used to send data to doctor, so that user can able to send and receive information[1][2][3].
S.No.: 23
Title : Design and performance evaluation of a healthcare network router enhanced with P-H-T sensing
Authors Name: Fangmin Sun, Zhan Zhao, Zhen Fang, Lidong Du, Shulei Chu, Diliang Chen
Authors Affilation: State Key Laboratory of Transducer Technology Institute of Electronics, Chinese Academy of Sciences Graduate University of Chinese Academy of Sciences
Volume & Issue No.: Volume2Issue8
Abstract: Nowadays, wireless health monitoring network is being widely studied and has gained large advancement. While, most of the existing health monitoring systems are homogenous network, that is, the health monitoring nodes not only sample the physiological data but also relay data from other nodes, which will decrease the network performance such as network throughput, packet loss rate as the power and computation ability of the health monitoring nodes are limited. In this paper, we designed and developed a router node to specially relay different kinds of physiological signals for healthcare networks. The division of functionality between acquiring and relaying data enables the health monitoring nodes to achieve consistent, predictable behavior and low energy consumption, while allowing us to engineer the system to provide superior data transmission performance. Moreover, the atmospheric Pressure, Humidity and Temperature (P-H-T) sensors are integrated in the router which could base the physiological data on a environmental context. The advantages of using these routers can be summarized as the following: 1).The system was featured with a high network throughput rate, with quantified 73.6Kbytes/s when the data were transmitted through three jumps. 2).The system was shown to have low packet loss rates where the packet loss rate was just 0.4% when date were transmitted 50 meters through three jumps. 3). Provides the environment information to the medical supervisor for correctly diagnosing the disease and to the people being monitored to do appropriate health nursing. A high throughput and reliability multi-hop wireless health monitoring system-HTRMH was built with the designed routers forming fixed network architecture, experiments on the network performance of the routers were described and the health and environment monitoring functions were evaluated.
S.No.: 24
Title : Text Classification Mining Support on Categorize Support Vector Machine Based on GA
Authors Name: Geetanjali kukade, Dharmendra Sharma
Authors Affilation:
Volume & Issue No.: Volume2Issue8
Abstract: In this paper proposed Text classification (also identified as text group or topic spotting) is the assignment of automatically categorization a set of text into a predefined set. The SVM network formation that used for web text in sequence categorization is recognized, and we exploit the genetic algorithm to optimize SVM parameters, thus enhancing the congregation rate and the classification accuracy, even when the data is noisy or partially labeled. Our work includes a proportional revision on classification of the same data set with added machine learning algorithms such as support vector machines, genetic algorithm parameters. In our proposed algorithm that combines genetic algorithm and support vectors machine and obtain web pages as an illustration to be appropriate to text classification problem
S.No.: 25
Title : NOVEL APPROACH FOR FACE RECOGNITION USING EIGEN VALUES
Authors Name: T.Syed Akheel ,Dr. V. Usha shree
Authors Affilation: P.V.K.K INSTITUTE OF TECHNOLOGY Anantapur / JB INSTITUTE OF TECHNOLOGY HYDERABAD
Volume & Issue No.: Volume2Issue8
Abstract: Face recognition is interesting to study because it is an application area where computer vision research is being utilized in both military and commercial products. The main purpose of this paper is to develop new algorithms which is insensitive to large variation in lighting direction in image identification. In this we use eigen values for pattern classification each pixel in an image as a coordinate in a high dimensional space. We take advantage of the observation that the Images of a particular image, under varying illumination, Image recognition under variation in lighting and different orientations,
S.No.: 26
Title : Enhancement of Power System Security through Margin Sensitivity Methods In Indian Power System
Authors Name: imran khan
Authors Affilation: AZAD IET , LUCKNOW
Volume & Issue No.: Volume2Issue8
Abstract: For a particular operating point, the amount of additional load in a specific pattern of load increase that would cause a voltage collapse is called the loading margin. This paper describes computing and exploiting the sensitivity of the loading margin to voltage collapse with respect to various parameters. The main idea is that after the loading margin has been computed for nominal parameters, the effect on the loading margin of altering the parameters can be predicted by Taylor series estimates. The linear Taylor series estimates are extremely quick and easy and allow many variations on the nominal case to be quickly explored. Exhaustively recomputing the point of voltage collapse instability for each parameter change is avoided.
S.No.: 27
Title : Retrieving Frequent Itemsets from Distributed Data Base
Authors Name: Hamideh Hajiabadi, SaeidehKabiri Rad
Authors Affilation: Birjand University of Technology
Volume & Issue No.: Volume2Issue8
Abstract: With fast growing of the network and the data storage, large scale data are rapidly expanded and collected on the physically distributed storage, consequently traditional data mining approaches are not appropriate for information retrieval purpose. Distributed data mining techniques are developed in order to examine distributed data by parallel algorithms. Distributed data mining algorithms based on finding frequent itemsets are widely used for this purpose. The itemsets retrieved are numerous. In this paper proposed a tree based mining approachcontributing to user such that reducing number of retrieved itremsets. The algorithm is implemented and the results are demonstrated.
S.No.: 28
Title : Cloud Information Accountability Framework based on the Notion of Information Accountability
Authors Name: N V Sruthi, R Kumaran, Vikram Neerugatti
Authors Affilation: M Tech II Year, CSE, Sri Venkateshwara College of Engineering and Technology, Chittoor, Andhra Pradesh, India
Volume & Issue No.: Volume2Issue8
Abstract: The Motivation of this paper is to present Accountability for the cloud, based on cloud Information Accountability Framework. Main feature of the cloud services is used to processes the user data remotely in the unknown machines. This important feature leads to cause the fear of losing the own data of the user. To overcome this problem we propose the novel highly information Accountability to keep track of the actual usage of the users data in the cloud.To keep track of the usage of the users data we using the Third pary, the method which is used to complete the Accountability work quickly with accuracy. When we compared with the traditional approaches our protocol is better compared with the loss of data, security and privacy.
S.No.: 29
Title : Privacy Preserving Two Layer Encryption Access control in public Clouds
Authors Name: A Reddy Prasad, Gudivada Lokesh, N Vikram
Authors Affilation: II MTech, CSE, Vemu College of Engineering and Technology, Chittoor, Andhra Pradesh, India
Volume & Issue No.: Volume2Issue8
Abstract: The motivation of this paper is to propose a secure Access control scheme, for public clouds. We proposed a Privacy Preserving Two layer Encryption Access control in public clouds, which provides more privacy and security compared to the traditional approaches. Current approaches to enforce ACPs on outsourced data using selective encryption require organizations to manage all keys and encryptions and upload the encrypted data to the remote storage. Such approachesincur high communication and computation cost to manage keys and encryptions whenever user credentials change. In this paper, we proposed a two layer encryption based approach to solve this problem by delegating as much of the access control enforcement responsibilities as possible to the Cloud while minimizing the information exposure risks due to colluding Users and Cloud.
S.No.: 30
Title : Current Control Solutions For DC Machines
Authors Name: Farhan A. Salem
Authors Affilation: Mechatronics Engineering Sec. Dept. of Mechanical Engineering, Faculty of Engineering, Taif University,
Volume & Issue No.: Volume2Issue9
Abstract: To minimize the negative current characteristics, solve the high current drawn, maintain generated motor torque, result in more smooth response and saving in power consumption, this paper proposes current control solutions in DC machines, where the load torque is related to the required current, used to generate DC machine’s torque to overcome the load torque and meet output motion requirements.
S.No.: 31
Title : Binary Phase Shift Keying Demodulation Using Digital Signal Processor
Authors Name: Roopa.V
Authors Affilation: Sree Siddaganga College of Arts, Science and Commerce for Women, Tumkur.
Volume & Issue No.: Volume2Issue9
Abstract: This paper describes about BPSK demodulation using costas loop and implementing on a DSP kit. The demodulation process can be divided into three major subsections. First, since the incoming waveform is suppressed carrier in nature, coherent detection is required. The methods by which a phase-coherent carrier is derived from the incoming signal are termed carrier recovery. Next, the raw data are obtained by coherent multiplication, and used to derive clock-synchronization information. The raw data are then passed through the filter, which shapes the pulse train so as to minimize inter symbol-interference distortion effects. This shaped pulse train is then routed, along with the derived clock, to the data sampler which outputs the demodulated data. The codes for the PLL and the Costas loop are written in C language and implemented on the DSP kit ADSP 21060.[1,2] The various input and output plots are observed on the SHARC (Super Harward Architecture) simulator and also on the Emulator.
S.No.: 32
Title : exploring the possibility of using carbon and boron fibers for leaf spring
Authors Name: k.balaji
Authors Affilation: svcet
Volume & Issue No.: Volume2Issue9
Abstract: ABSTRACT:- For the better suspension system in automobile vehicles parts used are leaf springs and shock absorbers. Leaf springs are effectively utilized which absorbs the maximum shock loads for the vehicle. The main function of leaf spring is not only to support vertical load but also to isolate road induced vibrations. It is subjected to millions of load cycles leading to fatigue failure. The spring consists of a number of leaves of equal width but varying length, placed in laminations and loaded as a beam. The objective of this project is to present modeling and analysis of semielliptical leaf spring assembly and comparison of deformation and stress, load carrying capacity, stiffness and weight savings results between steel leaf spring and composite leaf spring under same conditions. This study gives information about the replacement of steel leaf spring with composite leaf spring assembly made of carbon fiber and boron fiber. The semielliptical leaf spring is to be modeled in solid works and analysis is to be carried out by using ANSYS workbench14 for effective comparison. KEYWORDS:-Leaf spring, steel, carbon & boron fibers.
S.No.: 33
Title : A COMPARATIVE STUDY OF K NEAREST NEIGHBOR AND SUPPORT VECTOR MACHINE USING MICROARRAY DATA
Authors Name: M.SOFIA, Dr.D. RAMYACHITRA
Authors Affilation: M.Phil Research Scholar Department of Computer Science Bharathiar University Coimbatore
Volume & Issue No.: Volume2Issue9
Abstract: Microarray technology allows simultaneous measurement of the expression levels of thousands of genes within a biological tissue sample. This paper effectively uses the art of supervised machine learning methods such as support vector machine and k nearest neighbors for cancer classification problem using microarray data. In this work we compare the performance analysis of support vector machine and k nearest neighbor by using acute myeloid leukemia (AML) and acute lymphoblastic leukemia (ALL) datasets. We observed that the performance metrics such as accuracy, true positive, false positive rate, precision, and recall for k nearest neighbor algorithm are better than support vector machine.
S.No.: 34
Title : UNRAVELING THE BEHAVIOUR OF PARASITIC WAVES IN SUPERPOSITION OF WAVES
Authors Name: JOHNNY A. FRANCIS, 1NELSON MAXWELL, 1ALAGBE S. AND 2BOKOLO ABOVIE1Isaac Jasper B
Authors Affilation: 1Isaac Jasper Boro College of Education Sagbama, 2Bayelsa State college of Arts and Science, Yenagoa, Bayelsa State
Volume & Issue No.: Volume2Issue9
Abstract: Abstract This paper present the qualitative effects of superposing a ‘parasitic wave’ on a ‘host wave’. The attenuation mechanism of the carrier wave produced by the two interfering waves is studied. We used the known characteristics of the ‘host wave’ in the carrier wave to determine the basic characteristics of the interfering ‘parasitic wave’ which were initially not known. This study reveals that when a carrier wave is undergoing attenuation under any circumstance, it does not consistently come to rest; rather it shows some resistance at some point during the decay process, before it is finally brought to rest. Keywords: ‘Host wave’, ‘parasitic wave’ carrier wave.
S.No.: 35
Title : A novel approach for secure transmission for improving vertical handover in Heterogeneous Network using MIH
Authors Name: Haidarali K Ansari
Authors Affilation: S V Institute of Computer Studies
Volume & Issue No.: Volume2Issue9
Abstract: The demand for the global service is increasing due to the speedily growing demand for mobile internet, increased data rates and the multiplicity of wireless communication technologies. Also due to the challenges to communicate heterogeneous network technologies and to offer ubiquitous services, telecommunications operators look after the best way to provide continuity of service during handover and how to give the mobile client the possibility to get the best connection anywhere and anytime. Customer needs guarantees the continuity of service during a communication while moving between heterogeneous access network technologies. Vertical Handover take place when a wireless node switches from one network to another. One of the main requirements of our proposed work is to make it secure by using reliable security mechanisms, but it can decrease performance as well. So it is very essential to maintain balance between security and performance during vertical handover. Various handover security schemes that can provide reliable security as well as performance to a certain level will be discuss in this paper.
S.No.: 36
Title : Multiple Granularity Locking Model With Colourd Petri Net
Authors Name: Behnam Kiani
Authors Affilation: Tabriz university-IRAN
Volume & Issue No.: Volume2Issue9
Abstract: One of the methods of serializability in transaction commands is lock-based protocol[9]. Although locking ensures mutual exclusion, it brings about starvation or deprivation in executing transactions.Locking on a tree structure through using multiple aggregation method is one of the locking methods for nodes of a tree that allows each node to have various sizes[6,9]. At the same time, it creates a hierarchy of data in which smaller particles are located within the larger ones[6,8,9]. This article fully explains the colored Petri Net model of the protocol along with shapes of places, transitions, functions and commands.
S.No.: 37
Title : METHODS TO REDUCE PIXEL EXPANSION WITHOUT CHANGING THE IMAGE QUALITY
Authors Name: D.V SATISH KALADHAR REDDY, CH.PRAVEEN KUMAR, D.SWAROOP
Authors Affilation: AUDISANKARA COLLEGE OF ENGINEERING AND TECHNOLOGY GUDUR
Volume & Issue No.: Volume2Issue9
Abstract: Abstract: Visual cryptography scheme (VCS) is one of the techniques for secret sharing and encoding the image into n shares distributed to n participants. Only a set of qualified participants recover the secret image without any cryptographic knowledge. Extended visual cryptography scheme (EVCS) a type of VCS which consists of shares stacked together based on their associations (meaningful) as against random shares in Traditional VCS. Embedded EVCS has provided the better competitive visual quality than with the other EVCS’s. In Embedded EVCS, there exists two trade-offs between the large share pixel expansion and visual quality of shares and between the secret pixel expansion and visual quality of the shares. We propose a solution in Embedded EVCS with reduced pixel expansion and improved quality by introducing a Step construction to construct VCSOR and VCSXOR [5] which have optimal pixel expansion and contrast.
S.No.: 38
Title : Design and Analysis of Leaf spring for Tanker Trailer Suspension System
Authors Name: Mr. Sagar Gharate, Prof. S.H. Deshmukh
Authors Affilation: Sinhgad college of Engineering, Pune
Volume & Issue No.: Volume2Issue9
Abstract: A leaf spring is a simple form of spring, commonly used for the suspension in wheeled vehicles. Leaf Springs are long and narrow plates attached to the frame of trailer that rest above or below the trailer’s axle. For safe and comfortable riding to prevent the road shocks for being transmitted to the vehicle component and to safeguard the occupants from road shocks it is necessary to determine maximum safe stress and deflection. In the pursuit of design and analysis of leaf spring for tanker trailer suspension system an attempt is made to obtain the values of safe stress and deformation by carrying out finite element analysis software tools. The objective was to find safe stress and deflection of leaf spring by applying safe load. The model of leaf spring is created in Catia V5 and analysis id done by using Ansys 14.5 workbench. After carrying out the analysis and experimental work, safe design stress and deformation were in close agreement with analytical and experimentation results.
S.No.: 39
Title : Design and Performance Analysis of Microstrip Patch Antenna Using Different Dielectric Substrates
Authors Name: venkatrao kolli
Authors Affilation: S R K R engineering college Bhimavaram
Volume & Issue No.: Volume2Issue9
Abstract: Abstract: In recent years, the demand for compact handheld communication devices has grown significantly. Devices having internal antennas have appeared to fill this need. Antenna size is a major factor that limits device miniaturization. In the past few years, new designs based on the Microstrip patch antennas (MSPA) are being used for handheld wireless devices because these antennas have low-profile geometry and can be embedded into the devices. New wireless applications requiring operation in more than one frequency band are emerging. Dual-band and tri-band phones have gained popularity because of the multiple frequency bands used for wireless applications. Reducing antenna size generally degrades antenna performance. It is therefore important to also examine the fundamental limits and parameter tradeoffs involved in size reduction. In the handheld environment, antennas are mounted on a small ground plane. This paper presents the performance analysis of Different shapes Microstrip Patch antenna i.e. Z shape, H shape , E shape by using different dielectric substrate materials, to operate in the frequency range of 0.6 GHz to 2 GHz. The aim of this paper is to broaden the impedance bandwidth and to maximize the gain, thereby improving the performance of antenna. By comparing different substrates of dielectric material, an appropriate substrate was chosen to design Microstrip antenna. After simulation the antenna performance characteristics such as antenna input impedance, VSWR, Return loss and current density are obtained. Key Words: E –Shaped patch, H-Shaped patch, Z-patched patch, Microstrip antennas, Ansoft HFSS 13, wide band.
S.No.: 40
Title : A Nyquist Filter Based Technique to Reduce PAPR in MIMO based OFDM Communication System
Authors Name: pooja chauhan and prashant upadhyay
Authors Affilation: Maharishi Markandeshwar University Solan (himachal pradesh)
Volume & Issue No.: Volume2Issue9
Abstract: This paper describes the nyquist filter based technique to reduce the peak to average power ratio (PAPR) in multiple input multiple output Orthogonal Frequency Division Multiplication (MIMO-OFDM) systems. Wideband multi-carrier systems which use orthogonal frequency division multiplexing (OFDM) or multiple input multiple output (MIMO) faces one of the main problems regarding (PAPR) of a transmitted signal. In present paper a nyquist filter along with conventional selected mapping (SLM) and alternative multiseqence (AMS) techniques are used for reducing the PAPR. The nyquist filter reduces the peak power of the transmitted signal and this may cause the reduction in PAPR. The simulated results are compared with conventional SLM and AMS techniques. Proposed nyquist filter based technique shows the lesser PAPR than the conventional SLM and AMS techniques. Coding and simulation has been done in Matlab 7.12.0.
S.No.: 41
Title : Remote Monitoring of Patients Health using Wireless Sensor Networks
Authors Name: Alumona T.L, Idigo V.E, Nnoli K.P, Class Of 2014 Communication Option (Even
Authors Affilation: NNAMDI AZIKIWE UNIVERSITY, AWKA ANAMBRA STATE, NIGERIA
Volume & Issue No.: Volume2Issue9
Abstract: Recent technological advances in wireless communications and wireless sensor networks have enabled the design of low-cost, intelligent, tiny, and lightweight medical sensor nodes that can be strategically placed on human body, create a wireless body area network (WBAN) to monitor various physiological vital signs for a long period of time and providing real-time feedback to the user and medical staff via SMS/E-mail. Remote patient monitoring is an alternative to regular home check-ups of patients with certain special medical conditions or the elderly who are unable to regularly visit a healthcare facility. In this paper, wireless technologies are used to reduce the number of home visits which are now only required when special attention is needed. In this paper, sensors were used to collect physiological data from patients and transmit it to Intelligent Personal digital Assistant (IPDA) using ZigBee/IEEE802.15.4 standard and to medical server using 3G communications. The main advantage of this system is to speed up and extend the communication coverage to improve convenience. Priority scheduling and data compression is introduced into the system to increase transmission rate of physiological critical signals which improve bandwidth utilization. This paper discusses remote monitoring of patients health using wireless sensor networks (WSNs). Keywords: Wireless sensors, Wireless body Area Networks (WBAN), ZigBee/IEEE802.15.4, Patient, Healthcare, PDA
S.No.: 42
Title : SELF POWERED MIXER FOR WATER AERATION.
Authors Name: Ammar A. T. Alkhalidi, Patrick Bryar, Ryoichi S. Amano
Authors Affilation: German Jordanian University University of Wisconsin-Milwaukee
Volume & Issue No.: Volume2Issue9
Abstract: The primary objective of this paper is to examine ways to increase the efficiency of the water aeration process. This was achieved by adding blades that have aerofoil profile to the regular fine bubble aeration diffuser to provide enough power generated from the moving water current to mix the water within the tank. Even more, some power was extracted to generate electrical power. A support structure, mounted above the air diffuser, was added to connect the blade and the electrical generator. Attention was applied to increase saturated oxygen transfer efficiency (SOTE) and power reclamation at the same time. SOTE was tested though the use of three dissolved oxygen probes affixed within a cylindrical testing tank to measure. Power reclamation was tested through the use of a DC stepper motor. Mixing, powered by the water current, will result in pulling less oxygenated water into the center of the tank, without utilizing additional energy, leading to better a more efficient distribution of oxygen within the tank. This in turn will result in lower total power consumption by the system.
S.No.: 43
Title : UBIQUITOUS LEARNING ENVIRONMENT
Authors Name: Mr.Swapnil Desai and Mr. Praful Chougale
Authors Affilation: PVPPs Manohar Phalke Polytechnic
Volume & Issue No.: Volume2Issue9
Abstract: Traditional E-Learning systems developed for laptop and desktop computers were based on stand-alone software application or through websites and lack the ability to provide a comprehensive ubiquitous learning environment. The ability to provide a comprehensive ubiquitous learning environment on mobile device will offer Opportunities to enhance learning by exploring the edge are presenting themselves as well.
S.No.: 44
Title : ROBUST IMAGE NORMALIZATION USING H-CONNECTION TECHNIQUE FOR FACE RECOGNITION
Authors Name: K.M.Ponnmoli, Dr. S. Selvamuthukumaran
Authors Affilation: Research Scholar, PRIST University
Volume & Issue No.: Volume2Issue9
Abstract: Normalization process for face recognition process is a vital one that can be done by perform the H-connection of pixel coordinates from badly degraded face images are very confronting tasks because of high variation between the image background and the foreground layers of different document images. In this proposed system the novel image normalization using the H-CON (Hierarchical Connection) technique handle these issues with the adaptive image contrast. Combination of the local image contrast and the local image gradient constitutes the adaptive image contrast. It is adaptive to the variation of text and background with the image degradation. In the proposed system the map is first developed for the degradation of the image. The contrast map is then binarize and it is integrated with the Canny’s edge map to recognize the pixel edges. The feature of the image is divided by a threshold and it is determined with the intensities in the pixel edges. In the proposed system the method is clear and strong and includes minimum boundary tuning. The experiments on the test bed has a several challenging tasks and documents .Estimated with other techniques shows the PSNR,FAR and noise level of the output image.
S.No.: 45
Title : Ambient Intelligence–Basic Concept, Intelligent Environment Scenarios, Implementation
Authors Name: Manish Gangwani, Nitin jotwani, Manisha Galani, Anjali Yeole
Authors Affilation: 1B.E. Computer Engg. VES Institute of Technology, Mumbai -400074, Maharashtra, India.
Volume & Issue No.: Volume2Issue9
Abstract: In this paper, we present an integrated, automated and wireless system concept for the human intelligence environment domain based on the technique called ambient intelligence (AmI). We also discuss the resulting challenges in the technology which can bring smooth functioning in human life. Ambient Intelligence system is that which is embedded in an environment, enhancing complex and manual life to simple and automatic life. This technology in an environment is challenging to various algorithm that are being used with respect to human behavior and human life. Development of such intelligent and smart environment is whole and sole depended on the adaptive nature, flexibility, robust and the results parameters of this intelligence system are forecasted on parameters that are reasoning, decision making and acting. The details of new emerging technology, ambient intelligence, its working, architecture and various technologies used to build this system as well as real time scenario and examples are outlined in this paper.
S.No.: 46
Title : Artificial Intelligence and Cognitive Analytics approaches towards efficientpredictions for Business Intelligence
Authors Name: Salil Kanetkar, Neha Chanchlani
Authors Affilation: B.E. Computer Engineering Computer Engineering Department, VES Institute of Technology, Mumbai
Volume & Issue No.: Volume2Issue9
Abstract: Business Intelligence techniques no longer just evolve around traditional databases and warehouses, but have leaped into the era of big data. The aim is now to extract as much hidden knowledge from this rich data. The data is highly varying and evolves from various sources. Business improvement strategies usually revolved just around board room discussions, however these discussions are now more often aided with mining strategies. Machine learning, Artificial Intelligence techniques are of great advantage in predicting efficient strategies and business patterns. Apart from this, cognitive analytics and natural language processing are such techniques which could drastically change how business intelligence has been perceived. They try to emulate the human mind and train the computer to think accordingly. In this paper, we highlight the above listed methods in detail.
S.No.: 47
Title : To analyze the wear resistance of compact faced valve seat influenced by TIG welding process
Authors Name: Harvinder Singh, Manga Singh, Ramandeep Singh
Authors Affilation: Chandigarh Group of Colleges Landran Mohali
Volume & Issue No.: Volume2Issue9
Abstract: In the presented work, wear resistance was studied for compact faced material by TIG welding process. Wear resistance is basic property that is needed in valve seats of globe valves. Satellite 6 filler rods were used as a compact facing material. The variation of parameters like welding current, filler rod diameter and welding speed were observed on wear resistance and compactness. The two factorial method were used for design of experiment. The model developed and was checked for its adequacy and significance, by using F-test and t-test, respectively. Welding current has remarkable effect on wear resistance. Welding speed and Filler rod diameter has less effect on wear resistance.
S.No.: 48
Title : A Review of Watermarking Algorithms for Digital Image
Authors Name: Jaishri guru, Hemant damecha
Authors Affilation: Student of M.E. Software Systems (Computer science and Engineering department), Shri ram Institute of Technology, Jabalpur (R.G.P.V University Bhopal)
Volume & Issue No.: Volume2Issue9
Abstract: The growth of the Internet along with the increasing availability of multimedia applications has spawned a number of copyright issues. One of the areas that this growth has fueled is that of digital watermarking. Digital watermarking is the general technique of embedding a blob of information in the original file, such that an altered file is obtained. The blob of information, thus included, serves one of different uses, such as, identifying piracy, sensing tampering, or reassuring integrity. The approaches to watermarking are diverse and can be broadly classified based on their visibility, robustness, or fragility. Their uses are also versatile, as they can be applied to text, images, audio, or video. In this paper, we will go through various algorithms of watermarking for digital image.
S.No.: 49
Title : ADVANCED ROUTING ALGORITHMS IN DYNAMIC NETWORKS
Authors Name: K.Manigopinath, HraishMalepati, K.Rangaswamy
Authors Affilation: Assistant professor, Department of CSE, CBIT, Proddatur, Y.S.R (dist), A.P
Volume & Issue No.: Volume2Issue10
Abstract: To improve the performance of the network by implementing the best routing protocols. The purpose of routing algorithms is to make decisions for the router concerning the best path for data. Routing algorithms are to compute its decision’s depends on routing protocol information. Routing protocols collects certain information about a variety of networks and routers from the surrounding environments. Every router has memory to store the information about the networks. In the paper we focus on to provide an efficient path, the routing scheme we propose that the combination of “Traditional link state routing algorithm” (LSA) and routing protocols. Its main objective is by using special packet we reduce the delay and bandwidth in between the neighboring routers.
S.No.: 50
Title : Combustion and Emissions Characteristics for DI Diesel Engine Run by Partially-Premixed (PPCI) Low Temperature Combustion (LTC) Mode
Authors Name: Miqdam Tariq Chaichan
Authors Affilation: University of Technology-Baghdad-Iraq
Volume & Issue No.: Volume2Issue10
Abstract: ABSTRACT This study discusses the partially-premixed combustion (PPC) concept. PPC is a combustion concept by which it is possible to get low PM and NOx concentrations simultaneously. Gasoline/diesel fuel blends as an alternative fuel with high cooled EGR levels accompanied with injection timings sufficiently early to extend the ignition delay. The air and fuel will be mixed extensively prior to combustion. These factors were used to determine the PCC mode operation effects on the performance and emissions characteristics of a DI four-cylinder diesel engine. Gasoline/diesel fuel blends containing 50% gasoline in volume basis were prepared and tested. Experiments were carried out at a constant speed (1500 rpm) and variable engine load. EGR was cooled using a heat exchanger system designed to reduce the EGR temperature. Three EGR rates (30, 40 and 50%) were used with gasoline-diesel blend. The results indicate that fueling the test engine with gasoline/diesel blends caused a reduction in the brake thermal efficiency, while the brake specific fuel consumption increased with proportion to EGR rates. The gasoline/diesel fuel blend properties affected the combustion and emission characteristics in addition to PPC operation used. They caused reductions in NOx and PM concentrations. However, unburned HC and CO concentrations were obviously increased.
S.No.: 51
Title : Design and Analysis of Quad Arrow shaped Patch antennas to enhance the Performance
Authors Name: deepika patil, Abhishek mishra
Authors Affilation: Oriental institute of science & Technology
Volume & Issue No.: Volume2Issue10
Abstract: In this paper we are concentrating on Quad Arrow patch antenna for UWB applications. The proposed geometry will be implemented on a micro strip quad arrow monopole antenna. The iterated quad arrow fractal patch and modified ground plane were in use to achieve the desired wideband characteristics. In this we try to resound the frequency to be reduced radically by cutting slots which are the combinations of four triangular and two rectangular slots at the patch antenna.
S.No.: 52
Title : Extended Range soft switched, Transformer-coupled multiport Resonant switch Converter (ZVS) for Fuel Cell Application
Authors Name: MUDAMALA CHANDANA
Authors Affilation: GEETANJALI INSTITUTE OF SCIENCE AND TECHNOLOGY
Volume & Issue No.: Volume2Issue10
Abstract: This paper presents Extended Range soft switched, Transformer-coupled multiport Resonant switch Converter (ZVS) for Fuel Cell Application. The designed converter sustains ZVS of all switches commencing full-load down toward very light load condition in excess of extensive variations in the input voltage. Complete analysis, operation, design, simulation and experimental results for the design are presented. The turn-off voltage spikes are absorbed by the additional auxiliary active clamping circuit and allowing the circuit to operate at high voltages and at high frequency range. In addition, it assists in achieving ZVS of semiconductor devices. To sustain ZVS, the transformer magnetizing inductance aided by the energy stored in the transformer leakage inductance, it is utilized by the converter. ZVS range depends upon the design, in particular the ratio of leakage and magnetizing inductances of the transformer. Rectifier diodes operate with zero-current switching. The analysis, design and performance for extensive variations in input voltage and load have presented.
S.No.: 53
Title : A SECURE SMART CARD BASED ON REMOTE USER AUTHENTICATION PROTOCOL
Authors Name: K.Vijay Kumar, Dr. N. Chandra Sekhar Reddy, Gaddam Geetha
Authors Affilation: Student, M.Tech CSE Dept, Institute of Aeronautical Engineering, Hyderabad-500043, Andhra Pradesh, India
Volume & Issue No.: Volume2Issue10
Abstract: In the real world, common storage devices, for example, universal serial bus (USB) thumb drives, portable HDDs, mobile phones, Laptop or Desktop PCs are generally utilized, and they are much less expensive or more advantageous for Storing client validation data. However, since these devices dont give alter safety; it is a test to outline to design a secure authentication scheme utilizing these sorts of memory devices. In this paper, password authentication schemes with smart cards are proposed and upgraded framework to eliminate the vulnerabilities and in the meantime to build the security qualities. We show the mapping of a mimic assault against their plan if the smart card gets stolen. We demonstrate that it is simple for an attacker to register password of a client by utilizing data removed from the stolen smart card. We additionally propose a straightforward and simple answer for fix this issue. There are various remote client validation plans proposed in composing for keeping unapproved gatherings from getting to assets in an unreliable environment According to our examination, the proposed scheme ensures common validation furthermore opposes logged off word reference, replay, fraud, and mimic assaults. Subsequently, our scheme is suitable actually for applications in restricted force figuring situations.
S.No.: 54
Title : KERBEROS AS A SERVICE IN CLOUD COMPUTING SECURITY ISSUES
Authors Name: Y. Shashank Rao , Dr. N. Chandra Sekhar Reddy, B. Srinivas Reddy
Authors Affilation: 1Student, M.Tech CSE Dept, Institute of Aeronautical Engineering, Hyderabad-500043, Telangana, India,
Volume & Issue No.: Volume2Issue10
Abstract: Cloud computing is present trendy expression in the IT business sector. It is paradigm in which assets can be leveraged on for every utilization premise accordingly decreasing the expense and intricacy of administration suppliers. Cloud computing guarantees to cut operational and capital expenses and all the more essentially let IT divisions concentrate on vital tasks as opposed to keeping datacenters running. It is significantly more than basic web. It is a build that permits client to get to applications that really dwell at area other than client machine or other Web associated gadgets. There are various profits of this develop. For example other organization has client application. This suggests that they handle expense of servers, they oversee programming redesigns and relying upon the agreement client pays less i.e. for the administration just. Secrecy, Trustworthiness, Accessibility, Validness, and Security are fundamental attentiveness toward both Cloud suppliers and purchasers also. KERBEROS serves as security apparatus in cloud computing administrations and the establishment layer for the other convenience models and an absence of security in this layer will absolutely influence the other conveyance models. Here this paper shows an esteemed investigation of a few security parts and trustworthiness levels which decides vulnerabilities and countermeasures. Administration Level Ascension ought to be viewed as a whole lot essentialness. Here it can possibly turn into a leader in pushing a safe, monetarily feasible IT arrangement in future.
S.No.: 55
Title : Effective Engine Cooling System for an Air Cooled Engine in Formula Prototype Cars
Authors Name: Akash Sen Gupta, Apurba Sharma, Amritabha Chakraborty
Authors Affilation: MCKV INSTITUTE OF ENGINEERING (Former Students) (1&2) MCKV INSTITUTE OF ENGINEERING (3)
Volume & Issue No.: Volume2Issue10
Abstract: The Paper aims to show an effective cooling of a Royal Enfield 500cc engine in a formula style racecar by designing and manufacturing an effective air guiding system should be provided. The air guiding system was first developed using the CATIA V5 R20. The flow lines were then simulated using ANSYS FLUENT 14.0.
S.No.: 56
Title : Study of mining of outliers for uncertain data
Authors Name: Ms. Aditi C. Dighavkar, Prof. N. M. Shahane
Authors Affilation: M.E. Student, K. K. Wagh Institute of Engineering Education and Research, Savitribai Phule Pune University, Maharashtra, India
Volume & Issue No.: Volume2Issue10
Abstract: Outlier detection is a important problem that has been studied within recognizable research areas. Many existing solutions are based on the assumption that an example can be classified as either a normal or abnormal class. However, data are uncertain in nature in many real life applications because of varied errors or fractional completeness. This data ambiguity introduces difficulty in outlier detection. The principal challenge of supervising uncertain data in outlier detection is to scale down the impact of uncertain data on the learned distinctive classifier. The proposed approach uses single likelihood and bi-likelihood value for each input data signifying degree of membership towards normal and abnormal class. Kernel K-means and Kernel LOF- based methods are used to compute the confidence score/likelihood values. The generated confidence score and limited abnormal examples are incorporated into soft-SVDD and bi-soft-SVDD based learning framework to build superior classifier for outlier disclosure. The proposed system adopts improved mechanism to generate confidence score based on the data characteristics in a given application domain.
S.No.: 57
Title : Web Technologies and Academic Libraries: Applications and Implications
Authors Name: Dr. P. Venkateshwar Rao
Authors Affilation: Osmania University
Volume & Issue No.: Volume2Issue10
Abstract: Paper gives a definition and theory for "Web Technologies and Academic libraries". It suggests that recent thinking describing the changing Web as "Web 2.0" and academic libraries as “library 2.0”will have substantial implications for academic libraries, and recognizes that while these implications keep very close to the history and mission of academic librariesthey still necessitate a new paradigm for librarianship. The paper applies the theory and definition to the practice of librarianship, specifically addressing how Web 2.0 technologies such as synchronous messaging and streaming media, blogs, wikis, social networks, tagging, RSS feedss might intimate changes in how libraries provide access to their collections and user support for that access.
S.No.: 58
Title : Designing Parallel and Distributed Architecture for Data Mining and Unification of Association Rule
Authors Name: Imran Qureshi,Mohammed ali shaik,kanchy suresh
Authors Affilation: Guru nanak Institute of technology
Volume & Issue No.: Volume2Issue10
Abstract: With the continually-increasing accessibility of information many methods have been evolved for encoding and storing the information that simul-taneously grows all the time. Many available information sources includes traditional databases such as relational database , flat file system, parallel or distributed knowledge bases, simple or complex programs, object-oriented or object-based, text documents with distinct proprietary formats that are some variant of a traditional format. We are proposing four extensible architectures that provide flexibility to various data sources for handling data mining operations by creating or mining association rules.
S.No.: 59
Title : Text Dependent Speaker Identification Using A Bayesian network and Mel Frequency Cepstrum Coefficient
Authors Name: Mohd. Manjur Alam, Md. Salah Uddin Chowdury and Niaz Uddin Mahmud
Authors Affilation: Lecturer Dept. of CSE BGC Trust University Bangladesh
Volume & Issue No.: Volume2Issue10
Abstract: Speaker identification is a biometric method. The objective of automatic speaker recognition is to extract, characterize and recognize the information about speaker identity. Speaker Recognition technology has recently been used in large number of commercial areas successfully such as in voice based biometrics; voice controlled appliances, security control for confidential information, remote access to computers and many more interesting areas. A speaker identification system has two phases which are the training phase and the testing phase. Feature extraction is the first step for each phase in speaker recognition. Many algorithms are suggested by the researchers for feature extraction. In this work, the Mel Frequency Cepstrum Coefficient (MFCC) feature has been used for designing a text dependent speaker identification system. While, in the identification phase, the existing reference templates are compared with the unknown voice input. In this thesis, a Bayesian network is used as the training/recognition algorithm which makes the final decision about the specification of the speaker by comparing unknown features to all models in the database and selecting the best matching model. i, e. the highest scored model. The speaker who obtains the highest score is selected as the target speaker.
S.No.: 60
Title : Implementation of 100BASE-T4 Network Repeater Using FPGA
Authors Name: Sudarshan M. Dighade, Pranav P. Kulkarni
Authors Affilation: Bhivrabai Sawant Collage of Engineering Research and technology,Narhe,Pune
Volume & Issue No.: Volume2Issue10
Abstract: Abstract— This paper presents the idea of 100BASE-T4 fast Ethernet repeater design targeting its FPGA implementation is proposed which supports 100Mb/s over low grade category 3 UTP. Although several speed up techniques exist, we present the architecture whose performance is improved based on detail analysis of vhdl programmable logic. A multiplexer based coding style is adapted to utilize the resources optimally. The total estimated power consumption for proposed design have 335mW after the post placement and routing on Xilinx xc3s400 device.. FPGA implementation has the advantage of altering the functionality of the platform to perform several tasks. The implementation results show the minimum power consumption which reduce drastically compared to that of reported design.
S.No.: 61
Title : Java Applets vs Java Servlets
Authors Name: Anjali Rajput, Dipti Bhardwaj, Sakshi Ahuja
Authors Affilation: Department of Computer Science Dronacharya College of Engineering
Volume & Issue No.: Volume2Issue10
Abstract: An applet is a Java program that can be included in an HTML page and executed by a Java Technology-enabled browser. It can be used in web-page enhancement and on enterprise intranets for sharing resource and data. Applets allow local validation of data entered by the user, can Using database to perform list of values lookups and data validation, and have Complex GUI widgets. Servlets are protocol- and platform-independent server side components, which runs as part of a network service and dynamically extend Java-enabled servers. With applets, servlets can provide interactivity/dynamic Web content generation. Servlets can accept form input and generate HTML Web pages dynamically like CGI, support Collaborativeapplicationsbysynchronizingrequest,partition a single logical service between several servers, act as active agents sharing data. Servlets support different protocol, can be part of middle tiers in enterprise networks. Servlet are more appropriated when involves loading large pieces of code over a slow communication channel; when a large part of the computation for generating the Web page can be done on the server side or when processing involvesoperationsthatappletscannotperformduetosecurityrestrictions. If a sophisticated user interface is desired, applets are appropriate. Applets and servlets can share data and communicate, so the processing can be split between them. Client-side Java is a glorious vision that does and will not change the way most people use the Internet anytime soon. Sun has taken some dramatic steps to insure that Java remains ubiquitous by creating a newset of APIs that allow developers to use Javaasaserver-side development tool.
S.No.: 62
Title : Design and Testing of Lightweight Sandwich T- Joint of Composite Material Using FEA And Experimental Techniques for static bending, tensile and compression test
Authors Name: Prof. S.T. Jagtap , Prof. S. M. Rajmane, Mr. K.V.Mahindrakar
Authors Affilation: NBN Sighgad College of Engineering, Solapur Bharat Ratna Indira Gandhi College of Engineering, Solapur Bharat Ratna Indira Gandhi College of Engineering, Solapur
Volume & Issue No.: Volume2Issue10
Abstract: Naval superstructure need to be designed with confidence on the basis of modeling and failure prediction. Fig shows a typical T-joint used in naval ships. It gives an illustration of a T-joint. It consists of a horizontal base panel, a vertical leg panel and fillet and over laminates. The purpose of the fillet is to provide the continuity of the load transfer between the base panel and the leg. The over laminate is used to enhance the capacity of the T-joint. Reduction of weight and increasing strength of the T-joint is one of the objectives. Now a days a large amount of research is going on with the objective to strengthen the technological basis for the large scale application of fiber reinforced composite materials for naval vessels and structures. Fiber reinforced composites are widely used in naval ships and aerospace, ground transport, civil infrastructure because of their high strength and stiffness, low mass, excellent durability and ability to be formed into complex shape. Performance testing of composite sandwich T-joints subjected to both static and dynamic loading commonly used in large panels for naval applications becomes very important. Adhesively bonded T-joints have been extensively used in assembling sandwich structures made from glass fiber reinforced plastic skins and a balsa wood core in naval vessels. The objective of this project is to analysis the behavior of composite T-joints used in marine applications due to variation of many parameters. The advantage of adhesive bonded joints over bolted or riveted joints is that the use of fastener holes in mechanical joints inherently results in micro and local damages to the composite laminate during their fabrication.
S.No.: 63
Title : AN ANALYSIS OF COST OF PRODUCTION OF WATERMELON AND PROFITABILITY AT GOPALGONJ DISTRICT IN BANGLADESH
Authors Name: Faijul Islam
Authors Affilation: SHER-E-BANGLA AGRICULTURAL UNIVERSITY [SAU]
Volume & Issue No.: Volume2Issue10
Abstract: Study was based on data collected from 100 farmers from one district namely Gopalgonj of Bangladesh. Results of the study revealed that, per ha production cost of watermelon as maximum, minimum and mean were tk.150000, tk.117000 and tk.129500 respectively. The gross returns obtained as maximum, minimum and mean were tk.255000, tk.175000 and tk.202500 respectively. The net returns as maximum, minimum and mean were tk.114000, tk.47500 and tk.72500 respectively .The study shown that gross marketing margin of Aratdar, wholesaler, Petty trader, Retailer was tk.5000, tk.7000, tk.4500 and tk.11000 respectively per thousand watermelon .The net marketing margin of Aratdar, wholesaler, Petty trader, Retailer was tk.4000, tk.6300, tk.4100 and tk.10800 respectively per thousand watermelon. Marketing cost of the Aratdar, wholesaler, Petty trader, Retailer was tk.15.92, tk.11.47, tk.12.50 and tk.10.40 respectively per thousand watermelon. Most of farmer faced problems of lack of fertilizer, high price of pesticide and lack of subsidy. The objectives of the study were to estimate the cost of production, returns of banana and to identify the marketing channels of banana.
S.No.: 64
Title : An event Oriented Approach To Digital Forensics For Tracking Criminal
Authors Name: Onyemauche, U.C., Okonkwo, O.R., Nwosu, Q,N
Authors Affilation: Nnamdi Azikiwe University Awka, Anambra State, Nigeria and University of Nigeria Nssukka
Volume & Issue No.: Volume2Issue10
Abstract: In this paper, we present a framework for digital forensics that includes an investigation process model based on physical crime scene procedures. In this model, each digital device is considered a digital crime scene, which is included in the physical crime scene where it is located. The investigation includes the preservation of the system, the search for digital evidence, and the reconstruction of digital events. The focus of the investigation is on the reconstruction of events using evidence so that hypotheses can be developed and tested. This paper also includes definitions and descriptions of the basic and core concepts that the framework uses. Key words: Reconstruction, Computer Forensics, heuristics rule.
S.No.: 65
Title : Smart card: turning point of technology
Authors Name: Abhishek Mahajan, Akash Verma, Dhruv Pahuja
Authors Affilation: CSE Department, Dronacharya College of Engg.
Volume & Issue No.: Volume2Issue11
Abstract: A smart card, chip card, or integrated circuit card (icc) is any pocket-sized card with embedded integrated circuits.Smart Cards are secure portable storage devices used for several applications especially security related ones involving access to system’s database either online or offline. Smart cards are made of plastic, generally polyvinyl chloride, but sometimes polyethylene terephthalate based polyesters, acrylonitrile butadiene styrene orpolycarbonate. This research is chiefly to study the security principals of smart card and assess the security aspects’ affect on smart card technology adoption.
S.No.: 66
Title : Students and Educators Variability that determine Smart Phone Adoption for Self- Directed Learning in Universities in Kenya
Authors Name: ANSELEMO IKOHA PETERS
Authors Affilation: KIBABII University College- Kenya
Volume & Issue No.: Volume2Issue11
Abstract: Smart phone devices are very popular among people primarily because they are wireless and portable. Their functionalities enable users to communicate while on the move. Educators and students need to employ the technologies for learning and particularly for self-directed learning. This paper seeks to describe mobile learning and how students and educators vary in the use of smart phones for self-directed learning.
S.No.: 67
Title : Features Extraction from NIRS data using Extreme Decomposition
Authors Name: Jiang Yan, Li Xin, Fu Jiangwei
Authors Affilation: College of Information Science and Engineering, Shenyang University of Technology
Volume & Issue No.: Volume2Issue11
Abstract: The main aim of BCI builds a communicating bridge between brain and peripheral devices. If we want to achieve the control of external devices with HbO and HbR, the change of these data must be analyzed, and be extracted. In this paper, we present a new method to achieve in the analysis of the data, and design a new compensated interpolation algorithm achieve completely new feature points to replace the original feature points to represent the data .The interpolated data curves response the change of original data, and realize the removal of high frequency to smooth the output curve.
S.No.: 68
Title : managing password authentication scheme for secure cloud storage
Authors Name: swathi u
Authors Affilation: Institute of Aeronautical Engineering,
Volume & Issue No.: Volume2Issue11
Abstract: Cloud computing is the future of the next generation architecture of IT solutions. Cloud provides computing resources on subscription basis over the internet. The Cloud data storage network includes a Third Party Auditor which has the power and capabilities that a client does not have. It is a trusted entity that has the access to, other than cloud and check on the exposed risk involved in cloud storage data on behalf of the client. In this paper, the problem of data security and integrity has been presented. Also, a scheme to provide maximum data integrity. In proposed scheme, existing fully homomorphic encryption is integrated with TPA auditing system is proposed. This scheme can audit data integrity without decrypting it. In cloud computing we can share our data and application at common place. This uses internet and share resources to provide services. Security is important issue because cloud having many benefits so, it have many users. This paper focuses towards security to cloud. It is based on distributed storage on 3 machines. It uses homomorphic token for checking integrity of data. This helps user low cost communication and computational cost. The auditing result ensures strong cloud storage correctness as well as simultaneously achieves fast data error localization, i.e., the identification of misbehaving server. It allows client to perform secure and efficient dynamic operations on outsourced data, including block modification, deletion, and append [1]. Data privacy is one of the biggest challenges in Cloud Computing. By the introduction of the OTP password protection schemes, the privacy of the user will now be assured to a great extent. The OTP provides a user new password each time.
S.No.: 69
Title : Research on Sorting Algorithm for Web Contents
Authors Name: Zhenfang ZHU, Peipei WANG , Guangyuan ZHANG
Authors Affilation: School of Information Science and Electric Engineering,ShandongJiaotong University, 250357,Jinan,China
Volume & Issue No.: Volume2Issue11
Abstract: Text classification is a basic issue in web information processing. The text sorting algorithm is the basic theory for designing and developing classifier in the text classification. In the field of the text sorting algorithm, the most typical sorting algorithms at present include decision tree calculation, Bayes calculation and KNN calculation, etc. This paper discusses the theoretical basis of the above mentioned typical classification algorithms and introduces the applications of those algorithms through analyzing the advantages and disadvantages of each algorithm. At last, the paper presents a kind of realization process for the webpage classifier on the basis of C4.5 algorithm.
S.No.: 70
Title : REAL-TIME SYSTEM USING THE BEHAVIORAL PATTERNS ANALYSIS (BPA)Approach:The Train Traffic Management System (TTMS)
Authors Name: Dr. Assem El-Ansary, CEO Ass.Prof. M.M.Elgazzar
Authors Affilation: 1- CEO Emergent Technologies USA, Inc. 2- Faculty of Computing & Information, Egypt
Volume & Issue No.: Volume2Issue11
Abstract: This paper illustrates the event-oriented Behavioral Pattern Analysis (BPA) modeling approach using the Train Traffic Management System. In BPA, events are considered the primary objects of the world model. Events are more effective alternatives to use cases in modeling and understanding the functional requirements. The Event defined in BPA is a real-life conceptual entity that is unrelated to any implementation. The BPA Behavioral Patterns are temporally ordered according to the sequence of the real world events. The major contributions of this research are:  The Behavioral Pattern Analysis (BPA) modeling methodology.  Validation of the hypothesis that the Behavioral Pattern Analysis (BPA) modeling methodology is a more effective alternative to Use Case Analysis (UCA) in modeling the functional requirements of Human-Machine Safety-Critical Real-time Systems.  The development of an interactive software tool (DECISION), which is based on a combination of the Analytic Hierarchy Process (AHP) and the ELECTRE Multi-Criteria Decision Making (MCDM) methods. The DECISION software tool was used to process the assessment results of the case studies.
S.No.: 71
Title : PERFORMANCE EVALUATION OF THE DEEC, TEEN & EDCS PROTOCOLS FOR HETROGENIOUS WSNs
Authors Name: Bhawana Sharma, Dr. Rajiv Mahajan
Authors Affilation: Department: Computer Science & Engineering College: Global Institute of Technology & Management
Volume & Issue No.: Volume2Issue11
Abstract: Wireless Sensor Networks (WSNs) have many sensor nodes having restricted battery, which transmit sensed data to the Base Station that requires high energy consumption. Numerous routing protocols have now been proposed in this regard getting energy efficiency in heterogeneous situations. Though, each protocol is inappropriate for heterogeneous WSNs. Efficiency of WSNs declines as varying the heterogeneity of sensor nodes. This paper has evaluated the performance of varied Distributed Energy- Efficient Clustering based protocols like DEEC, TEEN and EDCS under numerous scenarios; comprising various amount of heterogeneity. MATLAB tool is used for experimental purpose. The comparison has shown that the EDCS has very effective results over other DEEC and TEEN variants because special feature of T-absolute i.e. it treats all heterogeneous sensor nodes with same election probability when each node has lesser energy than T-absolute. The comparative analysis has shown that the EDCS outperforms over the available protocols.
S.No.: 72
Title : LZW-BHCDA: LZW COMPRESSIVE SENGING BASED BANDWIDTH EFFICIENT HETEROGENEITY AWARE CLUSTER BASED DATA AGGREGATION PROTOCOL
Authors Name: GURBINDER KAUR, ER.VARINDERJIT KAUR
Authors Affilation: CSE RIET,PHAGWARA
Volume & Issue No.: Volume2Issue11
Abstract: In the application based WSNs situation, energy and bandwidth of the sensors are valued resources and essential to consume proficiently. Data aggregation at the base station by individual nodes causes flooding of the data which consequences in maximum power utilization. To diminish this problem a BHCDA has been proposed which has improved the performance of the LEACH protocol by using the inter-cluster based data aggregation. In BHCDA grouping of nodes has been done on the basis of the available clustering techniques and grouping of cluster heads is also done to utilize the features to inter cluster data aggregation. But BHCDA has neglected the use of compressive sensing to enhance the data communication between cluster heads and sink. To enhance the BHCDA further a LZW-BHCDA protocol has been proposed in this work that helps to reduce the energy consumption problem and also aggregates and transmit the data in efficient manner. In addition, the additive and divisible data aggregation function has been used by the proposed technique at cluster heads to minimize the power consumption and also controls flooding at base station. The performance evaluation has shown the effective improvement of the LZW-BHCDA over the BHCDA.
S.No.: 73
Title : Fractal image compression in transform domain
Authors Name: A. selim*, M. M. Hadhoud$,, M. I. Dessouky# and F. E. Abd El-Samie#, *ERTU,Egy
Authors Affilation: Fac. of Electronic Eng., Menoufia Univ., 32952, Menouf
Volume & Issue No.: Volume2Issue11
Abstract: Abstract— In this paper we propose the affect of using the fractal image compression algorithms in transform domain. The image is transferred firstly to the transform domain. In this paper we used the Discrete Cosine Transform (DCT) and Wavelet Transform (DWT). After transformation takes place the fractal algorithms is applied. Comparisons between three fractal algorithms; conventional square, spiral, and a simplified fractal compression are proposed. The comparisons are repeated in the two cases of transformation. We found from our results that the decoded images in case of using the wavelet transform are the best. And the in case of using DCT the decoded images has bad qualities.
S.No.: 74
Title : IDWDEEC: IMPROVED DISTANCE & WAITING NODES BASED ENHANCED ENERGY EFFICIENT CLUSTERING PROTOCOL
Authors Name: RAJNI SHARMA, ER VARINDERJIT KAUR
Authors Affilation: COMPUTER SCIENCE & ENGINEERING RAMGHRIA INSTITUTE OF ENGINEERING & TECHNOLOGY, PHAGWARA
Volume & Issue No.: Volume2Issue11
Abstract: Heterogeneous Wireless sensor networks (HWSNs) are getting very popular in real time applications because of their synthetic intelligence. An sensor node could be quickly became the intelligent product by applying the embedding programming. HWSNs contain many sensor nodes having limited battery power, which transfer sensed data to the sink that really needs high power consumption. So consuming the energy in efficient manner become more crucial area of research in wireless sensor networks. Numerous energy efficient methods have been planned in this respect of getting power efficiency in heterogeneous sensor environment. However, each method has its own limitations. Performance of WSNs declines when the cluster size become high or too low. Although EDDEEC has shown very significant results over present WSNs methods but it has neglected the use of waiting time of sensor node to become CHs. So might some nodes will not become CHs for a long time even they have more potenitial to become CHs. So to overcome this we have applied a waiting time based parameter named as W_r (i). W_r (i) is then total number of waiting rounds for a given node to become cluster head. It will produce a an positive value which will continually increase the T (n) value for a given node to become CH thus increase the chances to become CH. So it will produce more optimized cluster heads. To improve the results further the use of distance between two cluster heads has also been considered. The experimental results has shown the significant improvement of the proposed technique further.
S.No.: 75
Title : Android Based Intelligent Mobile Home Automation Security System
Authors Name: Niraj R Chauhan, Prof. Pranjali P. Deshmukh
Authors Affilation: Dept. of Computer science & engineering Head Of Department P.R.PoteEngg& management College, Amravati
Volume & Issue No.: Volume2Issue11
Abstract: The security of one's belongings once someone leaves his/her home is continually a priority with increasing variety of incidents of larceny, theft etc. several machine-controlled systems has been developed that informs the owner in an exceedingly remote location concerning any intrusion or commit to intrude within the house. 8051 has been extensively utilized in past comes. However, we have a tendency to area unit appearance into the event of AN golem application that interprets the message a mobile device receives on attainable intrusion ANd after a reply (Short Message Service) SMS that triggers an alarm/buzzer within the remote house creating others conscious of the attainable intrusion. dominant home appliances remotely with mobile applications have started changing into quite common attributable to the exponential rise in use of mobile devices. Mobile handsets nowadays area unit primarily hand-held computers with integrated mobile radio communication capabilities. With increasing usage of GSM, network services area unit expanded on the far side spoken language to include several alternative custom applications, machine automation and machine to machine communication. This application will be incorporated with mobile phones is bound to profit each those who continually have a doubt of their belongings being secure within the house in their absence. Most of the mobile devices that area unit factory-made today within the market area unit golem OS based mostly. Taking this into interest the appliance will be developed in golem and created user friendly, thereby creating the applications extremely strong across totally different mobile devices and type of users.
S.No.: 76
Title : Designing a Simulator For Skin Colour Segmentation
Authors Name: Pankaj Mor, Surender Punia
Authors Affilation: M. Tech Scholar, CSE Deptt. Om Institute of Technology &Management, Guru Jambheshwar University, Hisar (Haryana), India
Volume & Issue No.: Volume2Issue11
Abstract: In this era of various technologies we used the concept of skin color segmentation. The main emphasis of this work is on understanding the skin color segmentation which supports to design YCbCr and CIELab algorithm for skin color segmentation which use in various applications such as face detection, human computer interaction, medical x-rays scan, agriculture etc. In present research work YCbCr and CIELab algorithms which has proven to be a useful and sturdy cue for face detection, localization and tracking, hand detection etc.
S.No.: 77
Title : Location Estimation of GSM user Using Enhanced Tringularisation Method with Implementation of RF Fingure Printing
Authors Name: JYOTI KUSHWAHA PROF P.K.CHOPRA
Authors Affilation: AJAY KUMAR GARG ENGINEERING COLLEGE GHAZIABAD
Volume & Issue No.: Volume2Issue11
Abstract: Positioning a Mobile Subscriber in a Cellular Network System remain challenge for law enforcing agencies and cellular operators as many users do not use GPS. According to an estimate, a precise GSM based position system incurs a high cost (approx. U.S. $ 10,000) per base station. This paper suggests an idea to estimate location of cellular user by triangulation method along with use of RF figure prints. As each mobile device monitors signal strength, this helps in assisting the network to take timely handoff decisions. These signal strength information is transferred to network via NMR (Network Measurement Report). Tringularisation method uses NMR to locate a user under the coverage area of a BTS used in a cellular network. Collection of RF parameters such as received signal strength, speech quality, C/I, neighbour signal strength, handover pattern etc in wide area and preparation of data base for the estimation of location of user enhance the accuracy of method.
S.No.: 78
Title : The Performance Comparison of Edge Detection Techniques on MR Images
Authors Name: D. Ratna Bhusan, A. Ramaswamy Reddy
Authors Affilation: Asst.Professor, Professor of CSE, GEC,Guntur,
Volume & Issue No.: Volume2Issue11
Abstract: In this paper, we have presented various edge detection techniques on brain MR images. Generally, edges play very crucial role in processing of medical images, because MR images are complex and its nature is inhomogeneous. The detection of boundaries is very difficult. Here, the performance can be tested by using t-test among various edge detection techniques. Canny edge detection gives good results than Sobel, Roberts and prewitt operators.
S.No.: 79
Title : A Novel Histogram Technique for Detection of Tumor from MR images
Authors Name: G.Mahendra, T.Lakshmi Priya
Authors Affilation: Asst.Professor, Professor of CSE, GEC,Guntur,
Volume & Issue No.: Volume2Issue11
Abstract: In this paper, we have proposed a new technique for segmentation of tumor in brain MRI using Histogram thresholding. Generally, brain images are complex its nature is inhomogenous. Manual segmentation is a challenging task to find out exact location of the tumor from Brain MR Images. The proposed method can be fruitfully applied to notice the contour of the tumor and its geometrical dimension. This technique is very helpful to the experts at the time of surgery.
S.No.: 80
Title : Diabetes Disease Prediction Using Data Mining Techniques
Authors Name: Ravneet Jyot Singh, Williamjeet Singh
Authors Affilation: Research Scholar,Dept. Of Computer Engg. PunjabiUniversity,Patiala,India
Volume & Issue No.: Volume2Issue11
Abstract: The aim of this study is to investigate the performance of different techniques using WEKA and TANAGRA tool on Diabetes Dataset. A major problem in bioinformatics analysis or medical science is to attain the correct diagnosis of certain important information. For the ultimate diagnosis, generally many tests are done that involve clustering or classification of large scale data. All of these test procedures are said to be necessary in order to reach the ultimate diagnosis. However, on the other hand, too many tests could complicate the main diagnosis process and lead to the difficulty in obtaining the end results, particularly in the case where many tests are per- formed. This kind of difficulty could be resolved with the aid of machine learning which could be used directly to obtain the end result with the aid of several artificial intelligence techniques. Machine learning covers such a broad range of processes that it is difficult to define it precisely. The extraction of important information from a large pile of data and its correlations is often the advantage of using machine learning. New knowledge about tasks is constantly being discovered by humans. There is a constant stream of new events in the world and continuing redesign of Artificial Intelligent systems to conform to new knowledge is impractical but machine learning methods might be able to track much of it.
S.No.: 81
Title : The expected economic effects of the new Suez Canal project in Egypt
Authors Name: Dr. Ezzat Molouk Kenawy
Authors Affilation: Faculty of Commerce- Department of Economics- Kafr El-Sheikh University- Egypt
Volume & Issue No.: Volume2Issue11
Abstract: The current Suez Canal is considered as of the most important navigation lanes in the world as the world one tenth trade goes through it. However, its annual revenues do not exceed $ US 5 billion dollars. The Current Suez Canal is narrow and not deep. It depends on one direction navigation alternatively; which leads to a long waiting period. In spite of expansion and deepening attempts, most of giant ships cannot go through the canal and are forced to turn around the Cape of the Good Hope. The current Suez Canal is not optimally exploited despite of its economic importance as there are no adjunct ports services, logistic and industrial centers, ship maintenance and repair workshops, stores and transit trade, etc as existed in other states .The Suez Canal is facing as well important challenges due to the world competition and the attempt of some states particularly Israel to compete against the Suez Canal through several projects that threaten the Suez Canal. Thus, the Suez Canal cannot cope with such challenges except through its contribution to provide attractive privileges for the world trade transition such as efficient and least cost services that can be provided within the shortest time, competitive prices, adoption of world standard technical and management systems and flexible reaction with the technological and economic changes through creating logistic zones and economic fields around the canal to attract further investments in the fields of technology, trade and industry. Therefore, the new Suez Canal project and the project developing current Suez Canal and its surrounding area has posed since its effect on 5th August 2014 domestic, regional and international interest as being one of the national strategic projects that has several economic, development, political, social and regional dichotomies. The study aims to identify the development of the new Suez Canal concept. The study has adopted the descriptive analytical technique.
S.No.: 82
Title : Comparative analysis of PCA and LDA
Authors Name: K.Raju1, Dr.Y.Srinivasa Rao2, Dr.M.Narsing Yadav3
Authors Affilation: KKR & KSR Institute of Technology and Science, Guntur, AP
Volume & Issue No.: Volume2Issue11
Abstract: The problem of face recognition is a composite task that involves the detection and location of faces in a cluttered background, normalization, recognition and verification. Depending on the nature of the application like the sizes of the training and testing databases, clutter and visibility of the background, noise, occlusion and speed requirements, some of these tasks could be very challenging. There have been several methods proposed for face recognition. And one of the key components of any methods is facial feature extraction. There are two major approaches to facial feature extraction for recognition, holistic template matching based systems and geometrical local feature based systems. In this paper we present the methods of PCA and LDA which are based on the holistic approach. The paper first focuses the major aspects of the implementation of both PCA and LDA and finally compare the performance analysis of both the techniques on the standard Image data base of AT&T
S.No.: 83
Title : Prediction and analysis of injury severity in traffic system using data mining techniques
Authors Name: Dheeraj Khera, Williamjeet Singh
Authors Affilation: Punjabi University, Patiala
Volume & Issue No.: Volume2Issue11
Abstract: Road Traffic Accidents (RTAs) are a major public health concern, resulting in an estimated 1.2 million deaths and 50 million injuries worldwide each year. Road traffic is an indispensable important part to life, but the frequent road accidents bring serious bodily harm and loss of property. The aim of this study is to investigate the performance of different classification methods using WEKA and TANAGRA tool on Traffic Injury Severity Dataset. This paper presents results comparison of three supervised data mining algorithms using various performance criteria. The performance is evaluated by the algorithms Naive bayes, ID3 and Random tree. Comparison of Performance of data mining algorithm based on Error rate, Computing time, precision value and accuracy. The comparison of the model using WEKA experimenter showed that Naive Bayes outperforms Random tree and ID3 algorithms with an accuracy of 50.7%, 45.07 and 25.35% respectively and comparison of the model using TANAGRA experimenter showed that Random tree outperforms Naive Bayes and ID3 algorithms with an accuracy of 92.95%, 67.6% and 57.74% respectively. In the end, we have to conclude that TANAGRA tool is the best data mining tools as compare to the WEKA.
S.No.: 84
Title : Review of Image Enhancement in Spatial Domain
Authors Name: Vimal Bibhu, Bhanu P.Lohani, MeghaVaid, Anjana Swanny, Komal Verma
Authors Affilation: Amity University, Greater Noida
Volume & Issue No.: Volume2Issue11
Abstract: Digital Image Processing is a area where digital images are processed for enhancements of the image for various applications. Its main application is to improve the pictorial information for human interpretation. Almost all of the digital images contain noise. To improve a digital image, a number of enhancement techniques are available. Filtering is one of the common techniques used to remove unwanted information (noise) from the image. Image enhancement plays a vital role in every field particularly where images need to be closely examined and understood. Different images like satellite images, medical images, aerial images, microscopy images and even the real life photographs contain noise and a difference in lightness, brightness and/or hue between two colors that makes them more or less distinguishable. It is also used for image sharpening and smoothening. The problem is considered as a quality improvement. Digital images contain various types of noises which reduce the quality of images. Noises can be removed by various enhancement techniques. Digital images can be either spatial domain or frequency domain. This paper analyses various techniques used in spatial domain image processing.
S.No.: 85
Title : security attacks on different Wi-Fi protocols
Authors Name: Nachiket S. Ketkar
Authors Affilation: Sinhagad College of Engineering, Vadgaon
Volume & Issue No.: Volume2Issue12
Abstract: The security in Wi-Fi networks is a very important subject, because nowadays Wi-Fi networks are extensively used. Although there are numerous protocols suggested for Wi-Fi security, they fail to protect against various attacks due to lack of upgradation. So to secure the wi-fi that is deployed, first it has to be checked for the vulnerability of it to the various types of attacks that are popular and are subjected to happen at present. Also the owner of Wi-Fi need to know what type of security measures he is currently provided with and what type of security measures he needs to incorporate in his Wi-Fi settings to ensure that the deployed Wi-Fi is secure against various attacks that may happen in the current scenario. For this Attacks on Wi-Fi networks are important to be deeply studied. The necessity of audit tool is to test the Wi-Fi for vulnerabilities. If such vulnerabilities are found then we can make the settings such that Wi-Fi is more secure. Thus the tool is extremely useful for creation of secure Wi-Fi network. Such tools are available in market but they perform a single attack at a time and are required to be executed from terminal. Also they are manual tools so user have to give each and every command. Thus need of automated tool is there which is satisfied by this tool.
S.No.: 86
Title : Brain Tumor Detection using New Region Growing Method from MR Images
Authors Name: P. Raga Deepthi, V. Nagi Reddy
Authors Affilation: Asst. Professor, Asst.Professor, NIET, Guntur,
Volume & Issue No.: Volume2Issue12
Abstract: In this paper, we have proposed a novel region growing method for brain MR images. Initially, the seed point is calculated based on standard normal variate method. This method consisting of two steps, one is calculate ROI and locate the seed point at the centroid of region. And second one is region is growing from initial seed point up to meet the convergence of criteria. We have to obtain optimum results using MR images.
S.No.: 87
Title : Preemptive scheduling algorithm based object tracking system by using ARM processor
Authors Name: Sukumar.P, Sreenath.M,
Authors Affilation: 12Asst. Professors, Dept.Of E.C.E., A.I.T.S., Rajampet, Kadapa, A.P., India.
Volume & Issue No.: Volume2Issue12
Abstract: RTOS is an operating system that supports real-time applications and embedded systems by providing logically correct result within the deadline. In this, dealing with the effect of gain time on soft task scheduling in RTOS based application. In Multitasking gain time is a key factor which explicit the difference between the actual time and maximum time for completion of a process. In some real time applications, delay in a particular process may lead to severe effects. In this, delay in a task execution is avoided by using an effective preemptive scheduling and giving importance to high priority interrupts even though if there is any pending low priority interrupts on semaphore. As a prototype demonstration implementing the hardware using ARM Processor for an automobile application. An object tracking system will be fixed in the vehicle with vehicle-object distance measurement facility. If an object approaches the vehicle beyond the minimum distance limit, then preemptive scheduler will assign the object interference as a high priority interrupt. As an immediate response the speed of the vehicle will be changed by using a control method PWM. The Pulse width modulating technique will be initiated automatically by the Processor without any manual braking system and a heavy alert will be given to the person to bring concentration in driving.
S.No.: 88
Title : DATA WAREHOUSING AND MINING (“DISCOVERY MOBILE SERVICE PROTOCOL USING CLUSTERING ALGORITHM WITHOUT OVERHEAD”)
Authors Name: R.Kayalvizhi M.Sc.,B.Ed.,M.Phil
Authors Affilation: VMKV UNIVERSITY , SALEM
Volume & Issue No.: Volume2Issue12
Abstract: In this Thesis we propose a peer-to-peer service discovery protocol specially designed for Mobile Ad-hoc NET work (MANET) environment. The proposed Mobile Service Discovery Protocol (MSDP) uses a dynamic clustering algorithm to group nodes in a MANET, and utilizes Distributed Hash Tables (DHTs) to efficiently cache service information in a peer-to-peer manner. Simulation results under different scenarios show that MSDP has steady performance and is able to reduce message overhead efficiently. Unlike a fixed wireless network, wireless ad-hoc or on-the-fly networks are characterized by the lack of infrastructure. Nodes in a mobile ad-hoc network are free to move and organize themselves in an arbitrary fashion. Each user is free to roam about while communicating with others. The path between each pair of the users may have multiple links, and the radio between them can be heterogeneous. This allows an association of various links to be a part of the same network. Mobile ad-hoc networks can operate in a stand-alone fashion or could possibly be connected to a larger network such as the Internet.
S.No.: 89
Title : Vibration Analysis of an Automotive Silencer for Reduced Incidence of Failure
Authors Name: Krishnal Bhangale
Authors Affilation: NRI institute of technology, Bhopal
Volume & Issue No.: Volume2Issue12
Abstract: The Engine exhaust is the major source for contributing noise in automobile. There are many challenges in designing the muffler system as size, engine back pressure, noise level, emission norms and also cost. Sufficient insertion loss at engine frequency and first few harmonics are important. Recent efficient muffler systems are designed considering linear plane wave theory using transfer matrix method. Development of fibrous material strands that is used in hot exhaust system without binders has led to use of combination of muffler and exhaust system. Particulate matter filters and air cleaners also modified acoustically. For all these to happen exhaust muffler designers need simple and fast modeling tool, especially at the initial stages. FEM and Boundary element methods are time consuming. This paper is about plane wave based models such as transfer matrix method that has advantage of building fast prototype for muffler design, find out transmission loss and compared with experimental setup.
S.No.: 90
Title : Real-Time Algorithms and Architectures for several user Channel Detection in Wireless Base Station Receivers
Authors Name: Mr.Nitish meena ,Dr. Nilesh parihar
Authors Affilation: pratap university,jaipur (Rajasthan)
Volume & Issue No.: Volume2Issue12
Abstract: Abstract—This paper presents algorithms and architecture designs that can meet real-time requirements of for several user channel estimation and detection in code-division multipleaccess- based wireless base-station receivers. entangled algorithms proposed to implement several user channel assessment and demodulation make their real-time execution difficult on current digital signal processor-based receivers. A maximum-likelihood based several user channel assessment scheme requiring matrix conversion is draft again from an demodulation perspective for a reduced intricacy, repetitive scheme with a simple fixed-point very large scale integration (VLSI) architecture. A reduced-intricacy, bit-streaming several user demodulation algorithm that avoids the need for multishot demodulation is also developed for a simple, pipelined VLSI architecture. Thus, we develop real-time solutions for several user channel assessment and demodulation for third-generation wireless systems by: 1) designing the algorithms from a fixed-point execution perspective, without significant loss in error rate performance; 2) task partitioning; and 3) designing bit-streaming fixed-point VLSI architectures that explore pipelining, correspondence, and bit-level computations to achieve real-time with minimum area overhead. Terms - Digital signal processor, several user channel estimation, several user detection, realtime exe. ,very large scale integration, wideband code-division multiple-access.
S.No.: 91
Title : ADVANCED SEPIC CONVERTER WITH FUZZY LOGIC CONTROLLER BASED MPPT FOR STANDALONE SYSTEMS
Authors Name: C.INFANT VINOTH AND Dr.C.KATHIRVEL
Authors Affilation: SRI RAMAKRISHNA ENGINEERING COLLEGE COIMBATORE-641006.
Volume & Issue No.: Volume2Issue12
Abstract: ABSTRACT: — In this new era, the recent technological invasions have propelled the development of the entire world to its new heights. These development have to be transformed the world into its new dimensions through technology aspect & impact. This is the main reason for the increase in the power demand. The rate of the world development in geometric ratio catalyses the need of extracting power from renewable energy resources and another reason is that the availability of conventional energy resources is only up to 60-70 year. This causes a higher demand to electric power management system. Therefore, it has a great theoretical significance to study the Advanced SEPIC converter with fuzzy logic controller based MPPT for standalone systems. The design has to be simulated and verified using Matlab R2010a KEYWORDS: MPPT (Maximum Power Point Tracking)
S.No.: 92
Title : A Comparative Study on AES, Blowfish, Twofish and Serpent Cryptography algorithms
Authors Name: Debasish Roy, Saptarshi Paul, Sanju Das
Authors Affilation: Department of Computer Science Department of Computer Science (Assam University, Silchar)
Volume & Issue No.: Volume2Issue12
Abstract: This paper provides a performance comparison between four of the most common symmetric key cryptography algorithms: AES(Rijndael), Blowfish, Twofish and Serpent. The comparison has been conducted by running four encryption algorithms to process different sizes of data blocks with any extension of files to evaluate the algorithms encryption/decryption speed. Simulation has been conducted using java language.
S.No.: 93
Title : survey on multifocus image fusion
Authors Name: Drashti patel
Authors Affilation: SVIT
Volume & Issue No.: Volume2Issue12
Abstract: In the field of digital camera system image capture are blurred and may exhibit insufficient resolution. Due to this multifocus image fusion is used to obtain clear image that contain all object in focus. This paper represent a literature review on some of Multifocus image fusion technique like average, select maximum, select minimum, PCA, pyramid base method etc. Comparisons of all the technique conclude the batter approach for its future research.
S.No.: 94
Title : GAP ANALYSIS BETWEEN CUSTOMER EXPECTATION & EMPLOYEE PERCEPTION ON IMPACT OF VARIOUS SERVICE DIMENSIONS ON CUSTOMER SATISFACTION A STUDY ON INDIAN CALL CENTERS
Authors Name: Mr. Sumit Agarwal, Dr. K S Thakur,Dr Garima Bhardwaj
Authors Affilation: Amity University, Greater Noida
Volume & Issue No.: Volume2Issue12
Abstract: ABSTRACT In today’s world Service industry is playing a very important role in the economy of many countries. In case of India more than 50% of Indian GDP comes from services. In today’s competitive environment, delivering efficient service quality is necessary for the success of any organization. Service Quality is very well connected with increased profitability, customer satisfaction and also working as a tool for providing competitive advantages. It can be also linked with repeat sales, word of mouth feedback of customers and overall maximization of company profit. Betterment of services always results in increase in market share, reduction of cost and also in increase in profit and ROI. The aim of the study was to find out the gap exist between the customer expectations and employee perceptions on importance dimensions of services on quality of service and customer satisfaction in Indian call centre.
S.No.: 95
Title : Web Search by Inferring User Interest based on Personalized search andImplicit Indicators
Authors Name: A.sangeetha and C.nalini
Authors Affilation: Bharat university
Volume & Issue No.: Volume2Issue12
Abstract: Abstract—In the context of the personalized information retrieval, this paper for inferring the user’s interests based on personalizes web search .T his paper aims to collect implicitly the relevant documents, during the user’s search session by inference of the degree of interest based on a combination of some relevant implicit indicators. The main advantage of our approach is that it does not require any log file. Indeed, calculates the degree of interest in real time and decides if the web page is quite relevant to feed the search history dimension
S.No.: 96
Title : A Cryptographic Approach Based on Genetic Algorithm and Multilevel Fingerprint Authentication
Authors Name: Ayan Mukherjee, Sebanti Sengupta
Authors Affilation: Sabita Debi Education Trust, Brainware Group of Institutions, Kolkata
Volume & Issue No.: Volume2Issue12
Abstract: A fingerprint in its narrow sense is an impression left by the friction ridges of a human finger. In a wider use of the term,fingerprints are the traces of an impression from the friction ridges of any part of a human or other primate hand. Fingerprint recognition or fingerprint authentication refers to the automated method of verifying a match between two human fingerprints. Fingerprints are one of many forms of biometrics used to identify individuals and verify their identity. This article touches on two major classes of algorithms (minutia and pattern) and four sensor designs (optical, ultrasonic, passive capacitance, and active capacitance). The main objective of our project is to protect a file or an important document using a 2 layer encryption approach i.e. by biometric fingerprint and a strong password given by the person to encrypt the file. Firstly authentication is done by the fingerprint and then key for the encryption is generated with the composition of the fingerprint image and a password given by the user.
S.No.: 97
Title : Binary Matrix Approach For Mining Frequent Sequential Pattern in Large Databases
Authors Name: sowjanya pathi,Amarendra Kothalanka,Vasudevarao Addala
Authors Affilation: Dadi Institute of Engineering Technology
Volume & Issue No.: Volume2Issue12
Abstract: Data mining is the computational process of discovering patterns in large datasets involving methods at the intersection of artificial intelligence, machine learning, statistics, and systems. Mining sequential patterns from inaccurate or uncertain data, such as those data arising from sensor readings and GPS trajectories, is important for discovering hidden knowledge in such applications. The overall goal of the data mining process is to extract information from a data set and transform it into an understandable structure for further use. Here this paper was proposed to find the frequent sequential patterns in a large uncertain database. For the finding of frequent pattern it is using binary matrix approach. The binary matrix approach is efficient and more flexible for finding the frequent pattern. By using this approach the time complexity was reduced for finding frequent patterns.
S.No.: 98
Title : Binary Matrix Approach For Mining Frequent Sequential Pattern in Large Databases
Authors Name: sowjanya pathi,Amarendra Kothalanka,Vasudevarao Addala
Authors Affilation: Dadi Institute of Engineering & Technology
Volume & Issue No.: Volume2Issue12
Abstract: Data mining is the computational process of discovering patterns in large datasets involving methods at the intersection of artificial intelligence, machine learning, statistics, and systems. Mining sequential patterns from inaccurate or uncertain data, such as those data arising from sensor readings and GPS trajectories, is important for discovering hidden knowledge in such applications. The overall goal of the data mining process is to extract information from a data set and transform it into an understandable structure for further use. In this paper we are proposed to find the frequent sequential patterns in a large uncertain database. For the finding of frequent pattern we are using binary matrix approach. The binary matrix approach is efficient and more flexible for finding the frequent pattern. By using this approach we can reduce the time complexity for finding frequent patterns.
S.No.: 99
Title : A Described Feasibility Analysis on Web Document Clustering
Authors Name: Ganesh Kr Yadav, Harpal Sing Kushwaha
Authors Affilation: SITM, Lucknow
Volume & Issue No.: Volume2Issue12
Abstract: Abstract: The paper articulates the unique requirements of Web document clustering and reports on the first evaluation of clustering methods in this domain. A key requirement is that the methods create their clusters based on the short snippets returned by Web search engines. Surprisingly, we find that clusters based on snippets are almost as good as clusters created using the full text of Web documents. To satisfy the stringent requirements of the Web domain, we introduce an incremental, linear time (in the document collection size) algorithm called Suffix Tree Clustering (STC), which creates clusters based on phrases shared between documents. We show that STC is faster than standard clustering methods in this domain, and argue that Web document clustering via STC is both feasible and potentially beneficial.
S.No.: 100
Title : THE INFLUENCE OF INTERNAL AUDIT INDEPENDENCE ON THE FINANCIAL PERFORMANCE OF SMALL AND MEDIUM ENTERPRISES: A CASE STUDY OF THE CONSTRUCTION INDUSTRY IN MOMBASA COUNTY
Authors Name: Harrison Mwinzi Kiema
Authors Affilation: Technical University of Mombasa
Volume & Issue No.: Volume2Issue12
Abstract: Abstract 1.0 Introduction The auditor’s services are needed in organizations to measure the relationship between the management and the user on the information provided by the management and the user perception on the same. Internal audit independence applies when the auditor is free from any conditions that deter his ability of the internal audit event or the chief audit executive (CAE) that could lead to carrying out internal audit responsibilities in an unbiased manner. The main objective of this study was to examine the influence of internal audit independence on the financial performance of Small and Medium Enterprises in the construction industry in Mombasa County. The first part of the objective was to determine the effect of records accessibility on the financial performance of SMEs in the Construction companies in Mombasa County. Majority agreed that they accessed the records but others denied having access to records. The second part was to determine the effect of the reporting structure on the financial performance of SMEs. Majority of the respondents were satisfied with the internal audit reporting structure in the construction companies. However, some were not satisfied. The third analysis was to determine the effect of the internal auditors qualification on the financial performance of SMEs. A bigger percentage of respondents depict that internal audit qualifications were considered in the organizations, but a magnificent percentage of respondents disagreed. The fourth analysis was to determine the effect of internal audit roles on the financial performance of SMEs . Majority of the respondents agreed that there was unlimited access to information they were supposed to audit before. However, the rest of the respondents agreed that access to records was unlimited. The study focused on the construction companies in Mombasa County. The study was carried out in 65 Class National Construction Authority ( NCA 8) Construction Companies that represented the units of analysis for the study. Systematic sampling was used in getting the sample size of the construction companies. Purposive sampling technique was used to get respondents from different construction companies and expected sample derived from internal auditors, audit committee members and audit assistants of the sample population. The survey involved collecting information by administering questionnaires to the sample. Data collected was descriptively analyzed .Data was then summarized using tables and finally was presented in form of pie charts, graphs, and bar charts. The summarized responses were used for further analysis and facilitated comparison to ascertain if the objectives would be achieved from conducting the study. Data was analyzed using Microsoft Excel. From the research, it was evident that some construction companies within Mombasa County did not accord the internal auditors the independence they deserved to effectively give their opinion on the financial statements of the organizations. SMEs should be given Public education by the Minister for commerce and industry on the importance of internal audit independence. The government should establish an internal audit unit, which should be independent to ensure that all SMEs in Kenya comply with the laid down audit procedures and rules . The research study sought to evaluate the influence of internal audit independence on the financial performance of small and medium enterprises in Mombasa county. The study explored the objectives provided in chapter one of the research. The sample under the study comprised 32 respondents. The study used primary and secondary data that was collected using questionnaires which were served to the respondents and the findings presented using tables
S.No.: 101
Title : Protecting End-to-End Location Privacy in Cloud Computing Environment
Authors Name: Khushwant Virdi, Anil Kumar
Authors Affilation: Computer Science Guru Nanak Dev University, Amritsar (Pb.)
Volume & Issue No.: Volume2Issue12
Abstract: Cloud computing is a technology that provides the processing huge amount of data which depend on sharing computing resources like networks, servers, storage, applications, and services. The end-to-end location privacy has been neglecting in the field of cloud computing. Location privacy deals with the hide the location of source and sink from the hackers by providing them fake locations so that hackers can utilize their maximum time to search the fake location instead of original location of source and destination. This paper has focus on various end-to-end location privacy techniques that can be applied in cloud computing. The review has shown that the location privacy is required for cloud computing environment especially for public clouds network.
S.No.: 102
Title : Moving body/ object detection and tracking
Authors Name: Rohini Khanderay, D.S. Patil
Authors Affilation: S.S.V.P.S.C.O.E,Dhule-424002
Volume & Issue No.: Volume2Issue12
Abstract: This paper describes a method of exactly tracking a moving body in video capture from camera. It also overcoe problem of blurring and noise. innitially moving body is exactly detected by its motion and then track it for exactly getting moving body. Method used is background subtraction and for object tracking we used colour feature specification for differantiate between objects. this method is effective for both indoor and outdoor videos.
S.No.: 103
Title : PROCESSING OF ALUMINIUM METAL MATRIX COMPOSITES (AMMC) THROUGH STIR CASTING ROUTE
Authors Name: R.Kumar, J.Jegan, L.Initha
Authors Affilation: 1, 3-Assistant Professor, 2-P.G.Scholar, SNS College of Engineering, Coimbatore
Volume & Issue No.: Volume2Issue12
Abstract: Composite material is a combination of two or more materials having compositional variations and depicting properties distinctively different from those of the individual materials of the composite. During the past decade, considerable research effort has been directed towards the development of in situ Metal Matrix Composites (MMCs), in which the reinforcements are formed in situ by exothermal reactions between elements or between elements and compounds. Using this approach, MMCs with a wide range of matrix materials (including aluminum, titanium, copper, nickel and iron), and second-phase particles (including borides, carbides, nitrides, oxides and their mixtures) have been produced. In the present work, the elemental TiC powders are mixed with aluminum molten metal to produce the Al-TiC MMC. The proposed investigation is to deal with development of aluminium based composite through casting route. Synthesis, characterization, hardness and tensile strength are proposed to be investigated. By its improved mechanical characteristics the new material is expected to replace existing composites applicable to light weight structural and automotive industries.
S.No.: 104
Title : Theoretical study of temperature effect on the wind power extracted as a renewable energy for electricity production in Nassiriyah district
Authors Name: Abdul-Kareem Mahdi Salih
Authors Affilation: Physics Department, College of Science, Thi-Qar University
Volume & Issue No.: Volume2Issue12
Abstract: The temperature effect on the wind power extracted as a renewable energy for electricity production in Nassiriyah district – south of Iraq- has been investigated for three years (2011-2013) by theoretical calculations. The study shows that the air temperature in this district affects extract power from the wind, this effect is dependent on the altitude and the value of temperature. The percentage of annual mean power loss decreases with the increasing of altitude. The annual mean power loss values vary between 6.1%Watt at 40 m altitude to 2.6% Watt at 300m altitude for the study time interval.
S.No.: 105
Title : Mechanical properties of Sisal and Pineapple fiber hybrid Composites reinforced with epoxy resin
Authors Name: vikas sahu
Authors Affilation: ggits, jabalpur (M.P), India
Volume & Issue No.: Volume3Issue1
Abstract: In this study, Work has been carried out to investigated tensile , bending and impact properties of hybrid composite of material constitutes sisal fiber and less discovered pineapple fiber. These composites are adhered using epoxy resin cosists HY951 resin and LY551 hardener suitably mixed in appropriate volume. Hybrid composites were prepared using sisal/pineapple fibers of 100/0, 70/30, 50/50, 30/70, and 0/100 Weight fraction ratios, while overall fiber weight fraction was fixed as 20gram. Here for preparing samples Hand lay up method is used , specimens are prepared , fibers are arrenged in unidirectional manner and tests are carried out , which shows tensile and bending strengths. The tensile & compressive test was applied on specimens of 300×50 & thickness varring from 4-6 mm in dimensions but in different proportions of sisal and pineapple by weight. The test result shows , the composite made by 50/50 fibers weight fraction of sisal & pineapple fiber has been shown best impact strenght 47.2 N/mm2 as compare to other constitutes of sisal & pine fibers. This constitute has good tensile & bending strength & the density is also less than sisal fibers. These composites can be used in various purposes because of its unique features of recycleability, waste utilization, environment friendly, bio-degradibility, good strength and a good alternative to plastics.
S.No.: 106
Title : Information Visualization For Big Data Analytics
Authors Name: Palani Murugan.S, Suresh.V.M, Murali.N, Manikandakumaran.K , Manikandan.S
Authors Affilation: Assistant Professor, Department of Information Technology, E.G.S Pillay Engineering College, Nagapattinam, India
Volume & Issue No.: Volume3Issue1
Abstract: Visualization is the way of representing facts in graphical form rather than traditionally keeping data as flat texts. This writing focuses on information visualization in specific in contrary to typically explaining its types. Information visualization is the study of visual representation of data, meaning information that has been abstracted in some schematic form, including attributes or variables for the units of information, Friendly 2008 describes.
S.No.: 107
Title : Inertia Force Analysis of Crank Shaft and Piston of the Compressor
Authors Name: D. Venugopal Dr P. Ravinder Reddy, Dr M Komuraiah
Authors Affilation: Chaitanya Bharathi Institute of Technology
Volume & Issue No.: Volume3Issue1
Abstract: In rotary compressors, vibrations are comparatively small in amplitude as they have few reciprocating elements, and hence have been considered suitable for lowering the noise in air conditioning equipment. It is likely that the popularity of rolling-piston compressors will continue to increase, and at the same tine strong demands for reducing vibration and noise which arise from the compressors will also rise. In this work, an analytical method to evaluate the inertia forces and torques is established. By theoretically analyzing dynamic behavior of the crankshaft, the rolling piston and the blade in Rolling-Piston Rotary Compressors, constraint forces and sliding speed at each pair of movable machine elements are obtained using MATLAB and MS-Excel sheet calculations. Moreover, it is revealed that one of major factors which cause compressor vibrations is speed variation of the crank shaft and compressor vibrations are not affected by rolling behavior of the piston
S.No.: 108
Title : Construction of Ideological and Political Education Models and Critical Thinking on Information Technology Applied into Political Teaching Practice
Authors Name: Hong Yan
Authors Affilation: Department of Ideological and Political Education, Liaoning Police Academy, Dalian, 116036, China
Volume & Issue No.: Volume3Issue1
Abstract: The Chinese ideological and political education is full of Chinese peculiarity. According to Marxism, the ideological and political education is one kind of social practice which considers education as its central task. Under the new concept of educational technology, ideological and political education should also reflect the characteristics of modern technology. The paper explores three technological models of this particular education including decision model, educational activity model, and educational resources and technology model. In the teaching process, teachers can apply different models in class or after class to meet the requirements of their teaching contents and objectives. Apart from three models, the paper also discusses advantages and disadvantages of information technology applied into political teaching practice. Suggestions on how to apply information technology properly and efficiently are offered in the last part of the paper.
S.No.: 109
Title : OPTIMISTIC TOWER DEPLOYMENT TECHNIQUES IN VANETs
Authors Name: Gagandeep Mishra, Dr Shaveta Rani, Dr Paramjeet Singh
Authors Affilation: Dept. of Computer Science& Engineering, GZS PTU CAMPUS, Punjab. India
Volume & Issue No.: Volume3Issue1
Abstract: This paper presents a survey on optimistic tower deployment techniques or Roadside Units (RSUs) in VANETs and what are their limitations. Vehicular ad hoc networks (VANETs) are becoming the hot issue in todays intelligent vehicular systems. VANETs consist of some vital components: RSU, OBU and Trusted Authority. Among them RSUs is one of the fundamental components of Vehicular ad hoc network (VANET). Roadside Units (RSUs) are placed across the road for infrastructure communication. But the deployment cost of RSUs is very high, so to deploy more and more number of RSUs across roads is quite expensive. Thus, there is a need to optimally place a limited number of RSUs in a given region or road in order to achieve maximum performance. This paper has presented various techniques proposed so far by different researchers to optimally place the RSUs.
S.No.: 110
Title : MODIFIED HOUGH TRANSFORM FOR ROAD LANE COLORIZATION TO PREVENT ACCIDENTS
Authors Name: Guramarjot Kaur, Prof. Jatinder Kumar
Authors Affilation: Dept. of Computer Science and engineering SIET, Amritsar, (Punjab) India.
Volume & Issue No.: Volume3Issue1
Abstract: Lane coloration is becoming popular in real time vehicular ad-hoc network. This research work focus on providing better performance in lane coloration algorithm by using CLAHE to enhance the input image and also by modifying the Hough transform using the dynamic thresholding to detect curve lanes. Main emphasis is to improve the result of lane coloration algorithm when fog, noise or any other factor is present in the images. The methods developed so far are working efficiently and giving good results in case when the straight lane road images are there. But problem is that they fail or not give efficient results when there are curved lane road images. The experiments results for the road images have shown the significant improvement of the proposed technique over the available one.
S.No.: 111
Title : IMPROVED COLOR IMAGE SEGMENTATION USING FUZZY WEIGHTING AND EDGE PRESERVATION
Authors Name: Navjot Kaur, Prof. Jatinder Kumar
Authors Affilation: Dept. of Computer Science and engineering SIET, Amritsar, (Punjab) India
Volume & Issue No.: Volume3Issue1
Abstract: This paper has proposed a new EPS and FELICM approach to improve the accuracy of the color segmentation procedure further. The motivation behind the proposed approach is simple and effective. If segmented area between the FELICM and Principle component analysis is same then it will be added into the final output image. If the segmented area is not same then according to the variance based theory the minimum variance among two segmented outputs will be selected. After this procedure color labeling will be done to color the segmented area in given image. The comparative analysis has shown the significant improvement of the proposed technique over the available one.
S.No.: 112
Title : UPGRADATION OF PLASMA ANTENNA BY USING FLUORESCENT TUBES
Authors Name: Raviprakash S. Shriwas and Sayali Purushottam Gulhane
Authors Affilation: Jawaharlal Darda Institute Of Engineering And Technology Yavatmal,India
Volume & Issue No.: Volume3Issue1
Abstract: Plasma antennas refer to a wide variety of antenna concepts that incorporate some use of an ionized medium. Plasma Antenna is a new captivating concept which could very well be the future of high-speed, high-frequency wireless communications. It is possible to transmit focused radio waves using Plasma antennas that would quickly dissipate using the conventional metal antennas. A plasma antenna is a type of radio antenna currently in development in which plasma is used, replacing the metal elements of a traditional antenna. Plasma antennas can be used for both transmission and reception. The advancement in plasma antenna is with the use of fluorescent tubes. The commercially fluorescent tubes consist of a glass tube filled with mixture mercury vapor and argon gas. The gas inside the fluorescent tube will ionize to plasma after getting sufficient voltage and formed plasma column. The plasma is highly conducting and it acts as a reflector. When all of the surrounding tubes are electrified, the radiation is trapped inside the antenna when the plasma frequency is greater than radio frequency. The developed antenna has potential in military application.
S.No.: 113
Title : Surface Finish Analysis of D2 Steel in WEDM using ANN & Regression Modelling along with Fractional Factorial Design of Experiments
Authors Name: A. U.K.Vates, B. N.K. Singh, C.Mr. B.N.Tripathi
Authors Affilation: AIMT, Greater Noida,
Volume & Issue No.: Volume3Issue1
Abstract: Wire electrical discharge machining (WEDM) is an important metal removal process in precision manufacturing of mould and dies, which comes under non traditional machining processes. It is also quite difficult to find the correct input parametric combinations to give lowest possible values of surface roughness of D2 steel under WEDM.. Non-conventional WEDM process under low temperature dielectric (DI water) is more robust and powerful approach than conventional machining process to obtaining better surface finish in low temperature treated tool steels. Low temperature dielectric cooling medium implementation generally used as secondary treatment to enhance the surface smoothness. Present work aimed to effect of WEDM parameters on surface finish of low temperature treated AISI D2 tool steel is investigated. Montgomery fractional factorial design of experiment, L16 orthogonal array was selected for conducting the experiments. The surface roughness and its corresponding material removal rate (MRR) were considered as responses for improving surface finish. The Analysis of variance (ANOVA) was done to find the optimum machining parametric combination for better surface finish. The experimental result shows that the model suggested by the Montgomery’s method is suitable for improving the surface finish. Regression (RA) analysis method and Artificial Neural Network (ANN) were used to formulate the mathematical models. Based on optimal parametric combination, experiments were conducted to confirm the effectiveness of the proposed ANN model. .
S.No.: 114
Title : Challenges Facing Smartphone Applications User Information Security, Privacy and Trust: A review of the literature
Authors Name: Titus Tossy, Sophia Mfaume
Authors Affilation: 1DEPARTMENT OF COMPUTING SCIENCE STUDIES, FACULTY OF SCIENCE, MZUMBE UNIVERSITY, TANZANIA
Volume & Issue No.: Volume3Issue1
Abstract: A mobile application (mobile app) is a software program which can be downloaded and accessed directly using thesmart phone or another mobile device with internet access.The importance of smartphones is increasingly increasing as it become the primary computing device to most of the people. The smartphones have turned to the context-aware information hub and the engine for information exchange. The information in our smartphones provide the applications such as Facebook, and third part with rich information and expose the user behaviors.The fact that the smartphones applications access peoples sensitive information cause uneasiness to people when using smartphones applications and brings about the issue of breach of privacy, security and trust. This paper expose the meta-analysis of the relevant literature that aims to present the challenges facing the smartphone application user information security, privacy and trust and the suggested ways on how to tackle the challenges.
S.No.: 115
Title : A Survey on Energy Balanced Clustering and Routing Protocol for Wireless Sensor Network
Authors Name: Pateel H S
Authors Affilation: BMSCE Bangalore Karnataka India pin-560018
Volume & Issue No.: Volume3Issue1
Abstract: Abstract—The Wireless Sensor Networks (WSN) consists of hundreds of sensor nodes which are resource constrained. WSN nodes monitor various physical and environmental conditions very cooperatively. WSN uses various nodes for the communication. WSN has become one of the interested areas in the field of research from last few years. To enhance the lifetime of the whole networks energy reduction is the necessary consideration for design and analyze of the clustering and routing protocols. In this paper we present a study of various protocols which are used to enhance energy efficiency of the WSN such as LEACH (Low Energy Adaptive Clustering hierarchy), HEED (Hybrid Energy-Efficient Distributed Clustering), and CEBCRA (Cost Based Energy Balanced Clustering and Routing Algorithm). Finally we conclude this paper with future research and challenges. Key words— Wireless Sensor Network; clustering; Network lifetime; Energy Efficient
S.No.: 116
Title : Impact of technology on creative writing skill(creativity): A conceptual perspective
Authors Name: Muhammad Naveed Anwar, Abrar Ahmed, Shahid Warsi
Authors Affilation: Association for Academic Quality (AFAQ)
Volume & Issue No.: Volume3Issue2
Abstract: The focal perspective of this research initiative is to look into the complex relationship between Information technology (IT) aids and information communication technology (ICT) aids with creative process of thinking. Most of the writers these days are using technological aids to enrich their writing pieces with more and more rational, logical and sentimental support which seems monotonous, lengthy and exaggerated. The prime purpose of technology is to soothe and east the process of thinking rather than being used to gather excessive data, of no use. Researcher has tried to explore the difficulties being faced by publishing houses in streamlining the thought process of content and subject writers who are influenced by technological interfaces. This study does provide swift guidelines by following which the content and subject writers can be benefitted by the use of technology in a desirable manner.
S.No.: 117
Title : LDPC DECODER WITH REDUCED COMPLEXITY MIN SUM ALGORITHM WITH QPSK MODULATION
Authors Name: S.J.JONA PRIYAA, D.M.JOICE ANBIYA, R.JESINTHA, V.HEPHZHIBAH
Authors Affilation: KARUNYA UNIVERSITY
Volume & Issue No.: Volume3Issue2
Abstract: Low-density parity check (LDPC) codes have been shown to have good error correcting performance. Good error correcting performance enables efficient and reliable communication. However, a LDPC code decoding algorithm needs to be executed efficiently to meet cost, time, power and bandwidth requirements of target applications. The constructed codes should also meet error rate performance requirements of those applications. LDPC codes can be designed over a wide space with parameters such as girth, rate and length. There is no unique method of constructing LDPC codes. Existing construction method is limited in some way in producing good error correcting performing and easily implementable codes for a given rate and length. It is done with BPSK modulation. In this paper QPSK modulation is used. There is need to develop methods of constructing codes over a wide range of rates and lengths with good performance. LDPC code is also as varied as LDPC matrix designs and constructions. In this paper, LDPC is implemented because of its flexibility and also code size is easily varied by increasing or decreasing sub-matrix size. The aim is to reduce the BER in comparison to the other existing constructions.
S.No.: 118
Title : Application based technical Approaches of data mining in Pharmaceuticals, and Research approaches in biomedical and Bioinformatics
Authors Name: Sayyada Sara Banu , Dr.Perumal Uma , Mohammed Waseem Ashfaque , Quadri S.S Ali Ahmed
Authors Affilation: College of computer science and information system,J azan university,Saudi Arabia
Volume & Issue No.: Volume3Issue2
Abstract: In the past study shows that flow of direction in the field of pharmaceutical was quit slow and simplest and by the time the process of transformation of information was so complex and the it was out of the reach to the technology, new modern technology could not reach to catch the pharmaceutical field. Then the later on technology becomes the compulsorily part of business and its contributed into business progress and developments. But now a days its get technology enabled and smoothly and easily pharma industries managing their billings and inventories and developing new products and services and now its easy to maintain and merging the drugs detail like its cost ,and usage with the patients records prescribe by the doctors in the hospitals .and data collection methods have improved data manipulation techniques are yet to keep pace with them data mining called and refer with the specific term as pattern analysis on large data sets used like clustering, segmentation and classification for helping better manipulation of the data and hence it helps to the pharma firms and industries this paper describes the vital role of data Mining in the pharma industry and thus data mining improves the quality of decision making services in pharmaceutical fields. This paper also describe a brief overviews of tool kits of Data mining and its various Applications in the field of Biomedical research in terms of relational approaches of data minings with the Emphasis on propositionalisation and relational subgroup discovery, and which is quit helpful to prove to be effective for data analysis in biomedical and its applications and in Bioinformatics as well
S.No.: 119
Title : USING DIVIDEND PAYOUT RATIO AS A DETERMINANT FOR PORTFOLIO SELECTION OF BANK SHARES[A CASE STUDIES OF THREE BANK IN NIGERIA NAMELY ZENITH BANK PLC, GUARANTY TRUST BANK PLC AND FIRST BANK NIGERIA PLC.]
Authors Name: Emiola, Olawale. K. Steve, Alayemi, S. A , Adeoye Akeem Olanrewaju and Igbinehi, E.M
Authors Affilation: 1Department of Mathematics and Statistics, School of Applied Science,The Federal Polytechnic, Offa. Kwara State, Nigeria.
Volume & Issue No.: Volume3Issue2
Abstract: The banking sector of the Nigeria Economy has been viewed as the most profitable place to invest its share capital. Most investors in the nation have their major investment in these banks therefore this research, using Dividend Payout Ratio as a Determinant for Portfolio Selection of Bank Share was aimed to determine portfolio selection of Zenith Bank PLC, Guaranty Trust Bank PLC and First Bank Nigeria PLC. Data was obtained from the Annual Report, Vetiva Research and was formulated as linear programming . The research employs LINDO software to analyse the data. We create the lagrangean expression and we introduce lagrangean multiplier for each constraint. The increment that yields the minimum variance with mixed investment opportunity is 54%. Hence the optimum solution to the model is b1 = 70%, b2 = 5.39% and b3 = 24.61%. It was discovered that allocation of available fund by investors should be allocated to available investment open to investors in order to minimize risk and maximize return. We thereby recommended that any interested investor can decided to invest 70% of available fund on Zenith bank share, 5.39% on Guaranty Trust Bank share and 24.61% on First bank share.
S.No.: 120
Title : A Filtering Microstrip Patch Antenna for S-Band application
Authors Name: A. Vijayashanthi, T. Jayanandan, J. Roshini
Authors Affilation: is currently working as Professor, Department of Electronics and Communication Engineering, Prathyusha Institute of Technology and Management, Chennai, India.
Volume & Issue No.: Volume3Issue2
Abstract: Design and measurement of a new compact integrated filter with a microstrip rectangular patch antenna is proposed for S-Band application. Here the size of the three pole hair pin Band Pass Filter(BPF) is approximately reduced from 6.83 cm to 5.81 cm. The filtering antenna achieves an impedance bandwidth of 25.4 % (over 1.8 – 2.4 GHz) at a reflection coefficient |S11| < -20 dB and has a gain of 5.14 dB. The size of the designed antenna is nearly 47 x 35 mm on a TRF substrate with a resonance frequency of 2.0 GHz.
S.No.: 121
Title : Filipino- Maranao Bi-directional Language Translator With Text-to Speech Synthesizer
Authors Name: Jayson Q. Fallan, Mohammad Ammar T. Rasuman, April V. Sacil and Iluminada Vivien R. Domingo,
Authors Affilation: DBA (Polytechnic University of the Philippines)
Volume & Issue No.: Volume3Issue2
Abstract: Many people want to be understood by others and/or one to understand others many had involved themselves into development of machine translation—even Filipinos. According to researchers study many were being involved in producing todays generation translator but unfortunately, only a few has ever tried to translate domestic dialects into the national language which was understood by many—Filipino language. Because of this phenomenon, the researchers have decided to make a language translator using one of our Philippine dialects—Maranao language. The researchers chose Maranao because Muslims population here in the Philippines is continuously growing and most of them (almost 2/3) are using Maranao. The researchers also included a speech synthesizer which will allow the user to listen to the translated words read by itself.
S.No.: 122
Title : D-VEND: An Automated Vending Machine For Medicines
Authors Name: Raymond Calderon, Gabitan, Kristel, Garcia, Marie Shezel, Lopez, Noelle and Associate Professor Iluminada Vivien R. Domingo,
Authors Affilation: DBA (Polytechnic University of the Philippines)
Volume & Issue No.: Volume3Issue2
Abstract: The D-VEND is an automated vending machine for medicines. In the Philippines, the demand for OTC (Over-the-Counter) medicines is high. This leads to long piles of people buying medicines from drugstores and pharmacies, which in turn brings hassle to almost everyone. This pursues with the main purpose of sending OTC medicines closer to people’s homes.[1] This study focused on how the costumers will have convenience in buying OTC medicines by implementing the use of an automated medicine vending machine. Based upon the results of the implementation, the researchers concluded that for the students, the machine is positively dispensing the right medicine requested by the user.[2] Apart from this, it is also said to be capable of storing medicines safely with correct and updateable information. It is therefore considered reliable, because it ensures the reliability of the medicines that it sells. Accuracy wise, the machine is correctly recognizing the coins inputted. [3] The warning system installed in the device gave the users the assurance that the medicines stored in the machine can be safely stored. It is therefore suggesting that this machine can be very marketable in terms of customer and medicine security. As this research have proved that there is a significant difference between the assessments of the students and the pharmacists, a proposal for implementation to the general public would be very appropriate. Since this machine is just a prototype and is subjected for small population testing only, it would be very advisable if the future researchers would implement the machine in a larger population sample.[4]
S.No.: 123
Title : Context Comparison of Essay-Type Text Files
Authors Name: Jerome G. Domingo, Cara Dominique B. Francisco, and Assoc. Professor Iluminada Vivien R. Domingo,
Authors Affilation: DBA (Polytechnic University of the Philippines)
Volume & Issue No.: Volume3Issue2
Abstract: Measures of text similarity have been used for a long time in applications in natural language processing and related areas [1]. Text similarity has been also used for relevance feedback and text classification, word sense disambiguation, and more recently for extractive summarization and methods for automatic evaluation of machine translation [2] or text summarization [3]. This paper aimed to present a new concept over the existing ones, through which proponents can identify the percentage of semantic similarity between documents to other documents. The system is a combination of any two, three or all the techniques mentioned here - NLP (Natural Language Processing), Statistics, Artificial Intelligence (Machine Learning), Linguistics and Web Technologies, Text Categorization, annotated large corpora etc[4]. The system will compare up to 35 documents. It has the similarity calculations [5].The researcher used the Prototyping Model as a software engineering paradigm in developing the system. Prototyping is an easily modified extensible model (representation, simulation, or demonstration) of a planned software system, likely including its interface and input/output functionality [6].
S.No.: 124
Title : A Proposed Automated Car Parking Based On Android
Authors Name: Pallavi Mane,Samiksha Nagmote,Shubhangi Musle,Shraddha Sarwade
Authors Affilation: Pimpri Chinchwad College Of Enginnering,Nigdi,Pune
Volume & Issue No.: Volume3Issue2
Abstract: The number of personal vehicles usage is increasing manifold. People prefer personal vehicles to commute than depend on public transportation. Finding a parking space in most metropolitan areas, especially during the rush hours, is difficult for drivers. It is often frustrating for drivers to find parking spaces, and parking itself is costly in almost every major city in the world. Due to this there is a need to provide sufficient parking places coupled with plenty of slots to help the user park his vehicle safely. It also ensures that the user does not end up parking on non-parking area and cause discomfort to pedestrian.The aim of this paper is to propose a design of an Automated Car Parking System commanded by an Android application that regulates the number of cars to be parked on designated parking area. This is done by automating the Parking and unparking of the car with the help of an Android Application.
S.No.: 125
Title : A Review And Recent Developments in Solar Water Distillation
Authors Name: Shailja Bahuguna, pooja verma, priya choudhary, shivani chauhan, amit sharma
Authors Affilation: College Of Engineering Roorkee, Roorkee
Volume & Issue No.: Volume3Issue2
Abstract: Solar energy is one of the cheapest and easily available source of energy and we can use it in many ways. One of its application is water purification. The basic idea of solar water distillation came from Aristotle in 4th century BC. There are many types of solar stills designed for this purpose. Solar still is a device which is used to purify water, it operates on the same process as water cycle i.e., evaporation and condensation. Many researchers in this field give mathematical relations, accomplish different research and show positive results. An extensive review on different types of solar stills has been carried out in this paper. This review will also help us in gathering further practical approach in this field. Key words: Solar energy, distillation, solar still
S.No.: 126
Title : EVALAUTION OF CLUSTER-BASED GSTEB PROTOCOL FOR WSN
Authors Name: Amit Kumar, Er. Janpreet Singh
Authors Affilation: Computer Science and Engineering Department Lovely Professional University, Phagwara
Volume & Issue No.: Volume3Issue3
Abstract: The quick growth in network multimedia equipments have allowed additional real-time digital services such as video-conferencing, online games and distance education to grow the conventional internet tasks. Though many protocols has been proposed so far to improve the energy efficiency further but still much enhancement can be done. In order to overcome the constraints of the earlier work a new improved technique is proposed in this paper. The proposed technique has the ability to overcome the limitations of the GSTEB routing protocol by using clustering. From the comparison, it has been shown that proposed technique performs better in comparison to GSTEB protocol.
S.No.: 127
Title : REFLECTION AND TRANSMISSION COEFFICIENT FOR LAYERED PROPAGATION MODEL
Authors Name: Satya Prakash, Pankaj Singh
Authors Affilation: Bhabha Institute of Science and Technology, Kanpur Dehat
Volume & Issue No.: Volume3Issue3
Abstract: Two types of radio propagation modals are developed on the basis of material layer structures. One is three layer propagation model consist of three different material layer. Second one is five layer propagation models which is the extension of three layer propagation models. It consist of five different material layer with their respective thickness is considered. By using these two models the reflection and transmission coefficients are obtained. Material characteristics of concrete and Ferro concrete are also obtained at different operating frequency ranges from 433 MHz to 2 GHz. These models help us to find the detection range for layered material base structures.
S.No.: 128
Title : DYNAMIC MESSAGE AUTHENTICATION CODE FOR SHORT MESSAGES
Authors Name: D GANESH
Authors Affilation: SREE VIDYANIKETHAN ENGINEERING COLLEGE
Volume & Issue No.: Volume3Issue3
Abstract: There is an increase of technology in every field. So many applications rely on the existence of small devices that can exchange information and form communication networks. Short messages are widely in use these days. So many applications rely on the existence of small devices for communication. Here the confidentiality and the integrity play a major role. So we propose two techniques. In the first technique we authenticate the message and encrypt it with a short random string. In the second technique the extra assumptions are made whether the algorithm used is a block cipher and also improve them. MACs provide integrity for messages. Without taking it as an advantage the message must be checked whether it is encrypted or not. The main goal is to utilize the security that the algorithm can provide to design more efficient authentication mechanism.
S.No.: 129
Title : COMPARITIVE STUDY OF VARIOUS MULTI-FOCUS IMAGE FUSION TECHNIQUES
Authors Name: Dr. Vijay Kumar Banga, Astha Mahajan
Authors Affilation: Dept. of Electronics and Communication Engineering Amritsar College of Engineering and Technology, Amritsar
Volume & Issue No.: Volume3Issue3
Abstract: The main objective of vision fusion is to merging information from multiple images of the same view in order to deliver only the valuable information. The discrete cosine transforms (DCT) based methods of vision fusion are more appropriate and time-saving in real-time systems using DCT based standards of motionless images. In this paper, a well-ordered technique for fusion of multi-focus images based on variance calculated in DCT domain is shown. The overall objective of this paper is to compare different image fusion techniques. The comparison has shown that the Alternating Current (AC) coefficients calculated in DCT domain has quite better results. This paper ends up with the suitable future directions to extend this work.
S.No.: 130
Title : IMPROVED COLOR EDEG DETECTION BY FUSION OF HUE,PCA & HYBRID CANNY
Authors Name: Gurpreet kaur, Vijay kumar Banga
Authors Affilation: Dept. of Electronics and Communication Engineering Amritsar College of Engineering and Technology Amritsar, Punjab, India.
Volume & Issue No.: Volume3Issue3
Abstract: Edge detection is the name for a set of mathematical methods which target at classifying points in a image at which the image intensity varies sharply or, has discontinuities. This paper has focused on detecting the edges for the Hue factor in Human visual system (HSV). Hue is usually represented by position significance, so the existing edge detection techniques has been incapable to correctly perceive edges of hue factor in HSV color plane. As a consequence, the most popular approaches of color edge detection typically neglected the role of hue factor, thus misplaced some edges triggered by hue variations. This research work has proposed a new color edge detection technique based on the mixture of hue factor and principal component analysis to resolve the problems with existing methods. The algorithm has been designed and implemented in MATLAB. The performance metrics has shown the efficiency of the proposed algorithm over the existing ones.
S.No.: 131
Title : A Review on Removal of Rain Streaks in an Image by using Image Decomposition
Authors Name: Sneha Wandale,Prof.P.A.Tijare and Prof.S.N.Sawalkar
Authors Affilation: 1M.E. Computer Science and Engineering(Second Year),Computer Science and Engineering Department, Sipna Collage of Engineering, Amravati
Volume & Issue No.: Volume3Issue3
Abstract: Weather conditions i.e. rain, snow, fog, mist and haze degrade the quality also performance of outdoor vision system. Rain is one of the type of weather condition as well as rain is the major component for the dynamic bad weather. Rain introduces sharp intensity variations in images, which degrade the quality or performance of outdoor vision systems. These intensity variations depend on various factors, such as the brightness of the scene, the properties of rain, and the camera parameters. Rain removal has many applications in the field of security surveillance, vision based navigation, video or movie editing and video indexing or retrieval. So, it is important to remove rain streaks from the images. The detection and removal of rain streaks in an image is done by image decomposition which depends on Morphological Component Analysis (MCA) by performing dictionary learning and sparse coding. Rain streaks removal is fall into the category of image noise reduction. After Removal of rain streaks we can easily identify feature in the image.
S.No.: 132
Title : implementation of Sobel and prewitt edge detectors using Xilinx system Generator
Authors Name: shravankumar
Authors Affilation: Lendi Institute of Engineering and Technology
Volume & Issue No.: Volume3Issue3
Abstract: Implementing hardware design in Field Programmable Gate Arrays (FPGAs) is a formidable task. There is more than one way to implement the digital filter. Based on the design specification, careful choice of implementation method and tools can save a lot of time and work. Most of the algorithms are computationally intensive, so it is desirable to implement them in high performance reconfigurable systems. Recently, Field Programmable Gate Array (FPGA) technology has become a viable target for the implementation of algorithms for image processing. Here Xilinx system generator tool is used to implement these image processing algorithms. Edge detection is the process of localizing pixel intensity transitions. The edge detection have been used by object recognition, target tracking, segmentation, and etc. Therefore, the edge detection is one of the most important parts of image processing. Keywords- Xilinx System Generator, FPGA, Edge Detection, Image processing
S.No.: 133
Title : Algorithmic assessment approach based on the similarity measure
Authors Name: Aiouni rym
Authors Affilation: badji mokhtar university annaba
Volume & Issue No.: Volume3Issue3
Abstract: Evaluation in a TEL (Technology Enhanced Learning), in general, and in a algorithmic TEL in particular, is a complex problem. To find a solution, this work presents an algorithmic evaluation process based on breaking down problems and based on structural matching.
S.No.: 134
Title : Virtual Therapist for Wrist and Fingers.
Authors Name: Kajal Agarwal,Madhuri Andhale,Vaibhav Aware, Dipti Chikmurge
Authors Affilation: Dept of Computer Engineering , MIT AOE,Alandi
Volume & Issue No.: Volume3Issue3
Abstract: According to Wikipedia, It is estimated that approximately 6 million people have been surviving with some kind of paralysis, As a consequence wide range of physical reformation treatments or therapies are essential for the paralyzed patients. And also it’s not possible to make doctor’s and therapist available to assist these patients at their home. Sometime physician knowledge, skills and experience is inadequate to yield better results. To acquire solutions to this problem new therapy techniques and devices like Continuous Passive Machines were introduced in some countries for the different parts of the body but that machines are too much expensive and possibly available in our country[3]. The purpose of this project, WAFCPM , is to make this device affordable to common people which defines standard physical therapy treatment methodology that specify better user interface with CPM (Continuous Passive Motion ) could reduces overall old treatment delay and possibly yield better outcomes for patients[13]. The CPM (Continuous Passive Motion) device which is already exist has some issues like hard to operate by the patients themselves, costly , lack of user friendliness etc.WAFCPM solves these problems by means of better user friendliness with the aid of LCD(Liquid Crystal Display) touch screen display user can provide the inputs like control speed, angle of rotation etc. The CPM device contains key components : (1) Touch Screen LCD (2) Rechargeable batteries (3) Atmega Microcontroller (4) motor etc. This CPM device provides movements to the patient’s finger joints with the help of indirect motion given by motor
S.No.: 135
Title : Providing Authentication by Merging Minutiae Template
Authors Name: Ms. Priya Raul, Ms. Sayali Surve, Ms. Sushma Gilbile, Ms. Jasmine Hebbalkar, Prof J.L. Chaudhari
Authors Affilation: Assistant Professor, Department of Computer Science , JSPM’s BSIOTR , University of Pune, Maharashtra , India
Volume & Issue No.: Volume3Issue3
Abstract: Now days use of biometric technologies gains popularity as concern about the privacy and misuse of biometric data increases. Because of this, protecting biometric data becomes an important issue. The oldest and widely used form of biometric identification is the fingerprints. It has been widely used in both forensic and civilian applications. In existing system it is easily possible to revoke the original image from the minutia points. To overcome this drawback we propose a system in which we take two different fingerprints at the enrollment phase and same fingerprints at authentication phase. We extract the minutiae positions and reference Point of first fingerprint and the orientation and reference Point of second fingerprint. Then we merge these two fingerprints to produce a new mixed minutiae template. Incase if hacker hacks this mixed Template image then also He will not able access the data because he will not able to identify that it is combination of two fingerprints, and from which fingerprint we have extracted minutiae points and from which we have extracted orientation. This approach will provide more security to application or data.
S.No.: 136
Title : DESIGN AND FABRICATION OF DOMESTIC RICE HULLER MACHINE
Authors Name: Nikhil S. Pande, Rajat S. Nakhale, Durgesh S. Acharya
Authors Affilation: DATTA MEGHE INSTITUTE OF ENGINEERING TECHNOLOGY AND RESEARCH CENTRE
Volume & Issue No.: Volume3Issue3
Abstract: - A rice huller machine device is used in agricultural field to remove the outer shell of the rice grain. A rice huller or rice husker is an agriculture machine the process of removing the chaff and the outer husk of rice grain. The rice huller uses two rotating rollers which are driven oppositely by an A.C. motor. When the husk is fed through the rotating roller, due to pressure the husk cover breaks and with the help of fan the husk is separated from the rice grains. It can be used either any medium scale farmer or by huge rice mills. The rice milling machine has been used by the farmers all over the world and is also practiced by the paddy farmers. The rice milling machine is an economical mechanism to turn a paddy into rice. Thus, the purpose of this study is to improve, design, fabricate and test the performance of a proposed rice milling machine against the existing rice milling machine. An active rice milling machine was designed, fabricate and tested to mill the paddy.one fan with 12V were installed to the proposed machine as the sorting system. Three major tests were performed. The first test evaluated the importance and effectiveness of the paddy to be dried before mille and it was discovered that by drying the paddy before milling can increase the successful rate of milled rice up to 46%. The second test shows the relationship of the gap distance between the rollers to the paddy milling efficiency, for these proposed rice milling machine, the desired rollers distance for Hill Paddy is 1 to 3 millimeter gap between the rotating rollers. In the third stage the fan is used to separate the rice grains from the chaff. Keywords: A.C. Motor, rollers, sorting system, fan, huller
S.No.: 137
Title : Intellectual Capital: A Hidden Wealth
Authors Name: Dr. Mohammad Anam Akhtar, Dr. Ravindra Tripathi
Authors Affilation: United Group of Instituions and Motilal Nehru National Institute of Technology
Volume & Issue No.: Volume3Issue4
Abstract: Capital, in the business context, refers to any asset that will produce future cash flows. The most well known asset types are tangible in nature. Tangible capital therefore refers to the physical and financial assets of the organization. The value of such assets is disclosed periodically (by publicly listed companies) and can be found easily on the balance sheet of the Company’s financial records. Physical assets can mean land, machinery, inventory, plants, trucks, etc. whereas financial assets refer to the shareowners equity, retained earnings, working capital, prepaid expenses, accounts receivables, etc. Intangible assets on the other hand, such as the skills of the workforce and its organization, are increasingly becoming important towards determining future profits. However, they are much harder to determine, harder still to quantify into a value and therefore are never reported. Hence these types of assets remain largely invisible to the external world – and more often than not to insiders as well. Thomas Stewart, a pioneer in the study of such intangible assets, is credited with having coined the term ‘Intellectual Capital’ to refer to these assets. After more than a decade of studies by various other scholars in this area, there is general agreement that Intellectual Capital itself is composed of three distinct types of capital - Human Capital, Structural Capital and Relational Capital. • Human Capital is the availability of skills, talent and know-how of employees that is required to perform the everyday tasks that are required by the firm’s strategy. • Structural Capital is the availability of information systems, knowledge applications, databases, processes and other infrastructure required to support the firm in executing its strategy. • Relational Capital is the external linkage of the Company with Suppliers and Customers that enables it to procure and sell goods and services in an effortless manner. In the modern world of cut throat competition firms are paying a lot of attention on Intellectual Capital because it is a very important aspect that contributes a lot in development of the core competencies of the firm and a very important source of generating future cash flows. . This article therefore tries to give the importance of Intellectual Capital for the organizations in the modern era, emphasizes on the measurement and recording of it in the balance sheet of the organization in order to make the stakeholders aware about the contributions of the Intellectual Capital in the organizational growth and development, use of technology for the purpose of valuation and recording of Intellectual Capital and also tries to evaluate the attitude of Indian enterprises towards Intellectual Capital.
S.No.: 138
Title : Voice Based Student And College Information System
Authors Name: Kalpit S.Patel; Oshin Bakshi; Pooja Boriwal; Neha Lad
Authors Affilation: GOVERNMENT ENGINEERING COLLEGE,BHARUCH
Volume & Issue No.: Volume3Issue4
Abstract: In this project, we will develop IVRS based information system. It uses IVRS algorithm for giving various information about particular student and institute. Here we emphasize on IVRS algorithm for getting information of particular institute and student. The user can call up the institute and obtain any information by simply pressing certain buttons on its phone as per the guidance of voice fed into the chip. When user call he/she will get the option of either student or institute information that is it works like a call center. According to user demand they will be asked to press the button and will get the response from the IVR system.
S.No.: 139
Title : EVALUATION OF VARIOUS DATA AGGREGATIONS TECHNIQUES FOR ENERGY EFFICIENT WIRELESS SENSOR NETWORKS
Authors Name: Miss. Harsh deep , Miss. Varsha
Authors Affilation: Computer Science. CT institute of Management & Engineering Technology, Jalandhar
Volume & Issue No.: Volume3Issue4
Abstract: The quick growth in network multimedia equipments have allow additional real-time digital services such as video-conferencing, online games and distance education to grow to be the conventional internet tasks. WSNs has become major area of research in computational theory due to its wide range of applications. But due to limited battery power the energy consumption has become major limitations of WSNs protocols. Though many protocols has been proposed so far to improve the energy efficiency further but still much enhancement can be done. This paper has presented various data aggregation techniques for WSNs. This paper has shown that the among others GSTEB has shown quite significant results. The overall objective of this paper is to evaluate the limitations of the earlier techniques of data aggregation. This paper ends up with the suitable future directions to extend GSTEB protocol further.
S.No.: 140
Title : DESIGN, ANALYSIS OF A-TYPE FRONT LOWER SUSPENSION ARM IN COMMERCIAL VEHICLE
Authors Name: 1Mr. Balasaheb Gadade, 2Prof. Dr. R.G.Todkar.
Authors Affilation: HOn. Shree Annasaheb Dange College of Engineering and Technology, Ashta.
Volume & Issue No.: Volume3Issue4
Abstract: In this project work mainly focused on the finite element based stress analysis of A – Type lower suspension arm. The main objective of this study is to calculate working life of the component under static loading. The A – Type lower suspension arm was developed by using CAD software. Actual model was manufacture as per Design by using AISI 1040 material. The finite element modeling and analysis was performed by using HYPERMESH software. Mesh was created with 10 node tetrahedral element. A simple design approach was used to calculate effect of stresses on A – Type lower suspension arm element under static loading condition. After manual calculations a modern computational approach based on FEA for integrated durability assessment in an automotive lower suspension arm component is presented. The experimental work includes validation of the FEA results with actual testing of the model under stress. This is carried out with computerized universal testing machine (UTM) of 25 ton capacity. After trails it is seen that theoretical results agrees with the actual test experiments. Form calculations the maximum value of static load acting on the wheel of the automobile is 5000N. FEA analysis or software calculations gives maximum stress at contact point with wheel hub is about 280 MPa, and actual experimental tests gives maximum stress value of 254 MPa. This shows the fitness of the model designed under actual working conditions.
S.No.: 141
Title : A COMPARITIVE STUDY OF CLUSTERING PROTOCOLS FOR WIRELESS SENSOR NETWORKS
Authors Name: NAVPREET KAUR , JATINDER SHARMA
Authors Affilation: COMPUTER SCINECE DEPARTMENT GLOBAL INSTITUTES OF MANAGEMENT AND EMERGING TECHNOLOGIES
Volume & Issue No.: Volume3Issue4
Abstract: Power and bandwidth of the receptors are appreciated assets and necessary to consume proficiently in the approval based WSNs condition. Flooding is caused by details collecting or amassing by individual nodes which cause highest possible energy utilization. Therefore, to overcome this issue a new details collecting or amassing strategy can be suggested to increase the performance of the heterogeneous WSNs using the team based details collecting or amassing. In this document, the current research on the clustering and details collecting or amassing based methods has been explored. Moreover document discusses various restrictions in the earlier methods in the tabular type.
S.No.: 142
Title : IMPORTANCE OF INFORMATION TECHNOLOGY AND SIX SIGMA IMPLEMENTATION
Authors Name: Afsar Syed
Authors Affilation:
Volume & Issue No.: Volume3Issue4
Abstract: The Six Sigma methodology for quality improvement is a system of many concepts, tools, and principles. This paper discusses the basic concepts of the Six Sigma Process Improve- ment Methodology, presents various computer applications to demonstrate the value of information systems and information technology (IS/IT) in this methodology, and finally, presents an actual case where some of these applications were used to help a major corporation save over $2 million. It is hoped that the focus on IS/IT shows how powerful Six Sigma can be when aided by the latest computer hardware and software technology. The strategic use of IS/IT within the Six Sigma methodology will go a long way in making things easy for professionals to incorporate the principles as part of their everyday work routine.
S.No.: 143
Title : Fabrication and Experimental Analysis of tube in tube Helical Coil Heat Exchanger
Authors Name: Mr.Akshay Patil, Mr.Gajanan Kadam, Mr.Suraj kadam, Mr.Nilesh Thombare
Authors Affilation: Adarsh Institute of Technology and Research Center ,Vita.
Volume & Issue No.: Volume3Issue4
Abstract: In the present days Heat exchangers are the important engineering systems with wide variety of applications including power plants, nuclear reactors, refrigeration and air conditioning systems, heat recovery systems, chemical processing and food industries. Helical coil configuration is very effective for heat exchangers and chemical reactors because they can accommodate a large heat transfer area in a small space, with high heat transfer coefficients. This paper focus on an increase in the effectiveness of a heat exchanger and analysis of various parameters that affect the effectiveness of a heat exchanger and also deals with the performance analysis of heat exchanger by varying various parameters like, flow rate and temperature. The results of the helical tube heat exchanger are compared with the straight tube heat exchanger in both parallel and counter flow by varying parameters like temperature, flow rate.
S.No.: 144
Title : PROPOSAL OF A MORE TESTABLE WEB DESIGN:CENTRALIZED WEB DESIGN
Authors Name: Sonal Anand, Anju Saha
Authors Affilation: Assistant professor, IINTM, GGSIPU Assistant Professor, USICT, GGSIPU New Delhi, India
Volume & Issue No.: Volume3Issue4
Abstract: This paper proposes a new web application design which is proved to be less complex and more testable than the design of existing web applications. OOD (Object Oriented Design) metrics including NOC (Number of Children) and CBC (Coupling between Classes) have been used to demonstrate that the proposed web application design is more testable.
S.No.: 145
Title : Semantic Cloud for Mobile Architecture and Possibilities
Authors Name: Sonal Anand, Sarvesh Gupta
Authors Affilation: Assistant professor, IINTM, GGSIPU Assistant Professor, USICT, GGSIPU New Delhi, India
Volume & Issue No.: Volume3Issue4
Abstract: The paper emphasizes on the way the two most promising web technologies, semantic web and cloud computing, can blend to form SCM (Semantic Cloud for Mobile), for revolutionizing data access and processing capabilities over mobile platform. In this paper we also suggest the architecture of SCM and exclusive possibilities it may offer.
S.No.: 146
Title : Development of an Intelligent Eye for Automatic Surveillance Based on Sound Recognition
Authors Name: Md.Rokunuzzaman, Lutfun Nahar Nipa, Tamanna Tasnim Moon, Shafiul Alam
Authors Affilation: Rajshahi University of Engineering & Technology (RUET)
Volume & Issue No.: Volume3Issue4
Abstract: In surveillance or homeland security most of the systems aiming to automatically detect abnormal situations are only based on visual clues while, in some situations, it may be easier to detect a given event using the audio information. A new platform for sustainable development of automatic surveillance is introduced based on intelligent eye system which gathers information of human behavior, activities and environmental changes. The present research deals with audio events detection in noisy environments for surveillance application. The increasing availability of forensic audio surveillance recordings covering days or weeks of time makes human audition impractical and error prone. The ability of a normal human listener to recognize objects in the environment from only the sounds they produce is extraordinarily robust even in adverse acoustic conditions. In this research, we have developed a surveillance system which can recognize sound sources and detect events. This system can cover large area which is cost efficient. Sound sources can be recognized by comparing the frequency of sounds. This proposed intelligent eye system can recognize different sound sources accurately in real time and pretty much quick.
S.No.: 147
Title : A family of quasi-Newton methods for unconstrained optimization problems
Authors Name: M. S. Salim and A. I. Ahmed
Authors Affilation: Department of Mathematics, Faculty of Science, Al-Azhar University, Assiut, Egypt
Volume & Issue No.: Volume3Issue4
Abstract: Abstract In this paper, we present a class of approximating matrices as a function of a scalar parameter that includes the DFP and BFGS methods as special cases. A powerful iterative descent method for finding a local minimum of a function of several variables is described. The new method preserves the positive definiteness of the approximating matrices. For a region in which the function depends quadratically on the variables, no more than n iterations are required, where n is the number of variables. A set of computational results verifies the superiority of the new method.
S.No.: 148
Title : Comparative analysis for plant power output of solar thermal power plant
Authors Name: abhishek rai and suhail ahmad siddiqui
Authors Affilation: Al-Falah School of Engineering and Technology,Faridabad, Haryana 121004, India
Volume & Issue No.: Volume3Issue4
Abstract: A grid-connected solar thermal power plant, with a gross capacity of 1 MWe, has been designed and is being commissioned at Gurgaon near New Delhi in India. The unique feature of this plant is the integration of two different solar fields (parabolic trough collectors and linear Fresnel reflectors) without a fossil fuel backup. The hot oil from parabolic trough collectors and saturated steam from linear Fresnel reflectors are integrated to produce superheated steam at, to run a turbine-generator to produce electricity. This abstract outlines the plant power output under the climatic conditions of New Delhi and for the same input parameters under the climatic conditions of Jodhpur. The results can be used to compare the plant power output for the given solar thermal power plant at different locations across India. Keywords: Linear Fresnel reflector; Parabolic trough collector; Solar thermal power.
S.No.: 149
Title : Automated Identification of Diabetic Retinopathy Stages in Digital Fundus Image using CDR and Micro aneurysms
Authors Name: Dhanya C L
Authors Affilation: REVA Institute of Technology and Management, Bangalore
Volume & Issue No.: Volume3Issue4
Abstract: Diabetic retinopathy (DR) and glaucoma are the commonest complications of diabetes and is one of the leading causes of blindness. Early detection of occurrence of DR can greatly help in effective treatments. Very effective treatments are available and are optimally used when retinopathy is detected early. For this reason screening programs for early detection of retinopathy is essential part. The retinal fundus photographs are the main resources for screening of DR. In this work we tried to locate the eye optic disc and optic cup using k-means algorithm, morphological operation and watershed transform. Segmented optic disc and cup are then used to compute the cup to disc ratio for DR screening, for grading the disease we use microaneurysms. Micro aneurysms are the clinical sign of DR they appear small red dots on retinal fundus images, their detection can be used to grade the DR in different stages.
S.No.: 150
Title : Baseline JPEG Image Compression with K-Means Clustering Based Algorithm
Authors Name: Karri Tata Rao
Authors Affilation: AITAM
Volume & Issue No.: Volume3Issue4
Abstract: Applications of Digital Image Communication have increased drastically in our day to day activities. Baseline Joint Photographic Experts Group (JPEG) is the common image compression method for reducing bandwidth. Baseline JPEG Compression system comprises of a DCT unit followed by a normalizer and encoder. At the receiving end, image is reconstructed by inverse DCT. In this paper, we develop a JPEG Compression algorithm that joins K-Means clustering technique and DCT to further reduce the bandwidth requirements. Experiments are carried out with many standard images. Our algorithm proved to be giving approximately same Peak Signal-to-Noise Ratio (PSNR) as that of Base line conventional JPEG algorithm.
S.No.: 151
Title : Cut Detection and Re-routing in Wireless Sensor networks
Authors Name: Mrs.DipaliSonawane, Prof. AlkaKhade, Prof. SeemaBiday
Authors Affilation: Dept. Computer Engineering, Terna Engineering College Nerul, Navi-Mumbai-400706, MS, India
Volume & Issue No.: Volume3Issue4
Abstract: A wireless sensor network can get separated into multiple connected components due to the failure of some of its nodes, which is called a “cut.” In this paper, we consider the problem of detecting cuts by the remaining nodes of a wireless sensor network. Wireless Sensor Network (WSN) is made up of few or large number of sensor nodes and one sink node. One of the crucial challenges in WSN is cut generation instead of increase the life sensor node. Sensor node is small device made up of three basic units as sensor unit, processing unit and wireless communication (transceiver) unit equipped with limited power supply through batteries. Since the node has limited energy supply, these nodes are put in sleep mode to conserve energy which helps to prolong network life..Wepropose an algorithm that allows 1) every node to detect when the connectivity to a specially designated node has been lost, and 2) oneor more nodes (that are connected to the special node after the cut) to detect the occurrence of the cut. The algorithm is distributed andasynchronous: every node needs to communicate with only those nodes that are within its communication range. The algorithm is basedon the iterative computation of a fictitious “electrical potential” of the nodes. The convergence rate of the underlying iterative scheme isindependent of the size and structure of the network. We demonstrate the effectiveness of the proposed algorithm through simulationsand a real hardware implementation.
S.No.: 152
Title : Implementation of data watcher for identifying data leakage and detecting guilty agent
Authors Name: Navnath Kondalkar, Priya Walunj,Satish Mahamre,Priya Tadge
Authors Affilation: MMIT,Lohgaon, Pune
Volume & Issue No.: Volume3Issue4
Abstract: Data Leakage, put simply, is the unauthorized transmission of private or sensitive data or information from within an organization to a third party, i.e., an unauthorized recipient. In Organizations, detecting data leaker is facing many difficulties to and who cause for the data leakage. In previous approaches there are many techniques to find the leaker using fake objects and how much data leaked. In this paper we represent s-random algorithm, probability function, fake record generation and an algorithm for data distribution. We also implemented a data watcher to detect the guilty agents and calculating the probability.
S.No.: 153
Title : Review on –Different types of Vedic Multipliers Using Reversible Logic
Authors Name: ILLA BHARTI
Authors Affilation: G H R C E M WAGHOLI,PUNE MAHARASTRA
Volume & Issue No.: Volume3Issue4
Abstract: Energy dissipation is an important consideration in VLSI design. Reversible logic is first related to energy when Landauer states that information loss due to function irreversibility leads to energy dissipation. Thus reversibility will become an essential property in future circuit design. Reversible circuits are of high interest in DSPs, low power CMOS design, nanotechnolo optical computing and quantum computing etc. The main aim of this paper is to improve the speed and power dissipation of the processor by using efficient Vedic multiplier. Vedic multiplier known as "Urdhva Tiryakbhayam" which means vertical and crosswise. This multiplier will be implemented using reversible logic Feynman Gate, Peres Gate and HNG gate. Feynman and Peres gates are used to implement the basic two bit multiplier and HNG gate is used as full adder for summation of the partial product generated by two bit multiplier in four and eight bit multiplier. The proposed system will be designed using VHDL and implemented through Xilinx ISE 13.2 Navigator.
S.No.: 154
Title : A REVIEW ON MRI IMAGE SEGMENTATION TECHNIQUES
Authors Name: Anubha Lakra, Dr. R.B. Dubey
Authors Affilation: Hindu College of Engineering
Volume & Issue No.: Volume3Issue4
Abstract: Image processing is the most important achievements and commonly used engineering techniques in all the areas of science, including medical science that now a days severely has eclipsed diagnosis and treatment of many diseases Since MRI compared to other diagnostic modalities is safe and noninvasive and on the other hand reflects the true dimensions of the organ, its use in imaging of brain is widely considered. This paper presents a latest review of different technologies used in medical image segmentation like genetic algorithm & fuzzy control etc.
S.No.: 155
Title : AN EXHAUSTIVE REVIVES APPROACH USING IOT FOR SMART TRAFFIC FLOW PREDICTION
Authors Name: KIRAN V,ESHWARAIAH R
Authors Affilation: R.V.COLLEGE OF ENGINEERING
Volume & Issue No.: Volume3Issue4
Abstract: The cluster of vehicle density on the roads is significantly growing, making the management of traffic motion, especially in the metropolitan cities more and more complex, critical and challenging. One of the key method is to adopt for having smooth traffic flows and better mobility is to rely on ‘Real-time’ traffic monitoring systems.Traffic flow is predicted using RF camera by capturing images frequently, then translating to suitable compatibility and later encoded and stored in advanced ARM processors. The information which we obtained will be stored in Cloud using GPRS thus making every cloud browser to access to database server. Suitable packages for accessing to Global data base server will be dumped into algorithm kit. Knowing the information about near-by future one can smartly plan their journey and also can predict the traffic link with smallest traffic density and enables smooth mobility of vehicles using the concept of IOT.
S.No.: 156
Title : Efficient Design and Performance Analysis of a DCT Processor using CORDIC Algorithm for Image Compression
Authors Name: Veenadevi S V, Siddappa P Odeyar
Authors Affilation: R.V.College of.Engineering, Bangalore, India
Volume & Issue No.: Volume3Issue4
Abstract: Discrete Cosine Transform is one of the broadly used transform technique for multimedia applications. In the DCT algorithm all the inputs are in time domain where as the outputs are in frequency domain and DCT technique is extensively used for image compression. DCT architecture using CORDIC algorithm requires less number of calculations and it increases the accuracy. In DCT all the calculations are not uniformly essential in producing the frequency domain DCT output. Therefore the computation energy can be considerably reduced without severely compromising the quality of the image. More power savings may be achieved by means of 2-D DCT. In a lookahead CORDIC approach, the implementation complexity is considerably high because lookahead approach requires more area and all interior data path become individualistic. The proposed recursive CORDIC architecture requires less power and area as compared to lookahead CORDIC. The design is implemented using Xilinx 14.2/Modelsim PE10.4a and MATLAB software. In this project, the aim is to construct 2-D DCT architecture, coding in Verilog and to implement the module in Xilinx-virtex5 FPGA.
S.No.: 157
Title : The Design of TMA Gain Adjustment Based on AISG2.0
Authors Name: Manjunath HA, Chethana G, Suma MS
Authors Affilation: RVCE Bangalore
Volume & Issue No.: Volume3Issue4
Abstract: This paper relates to the mobile communication, more interrelated to the gain adjustment method of Tower Mounted Amplifier (TMA), Implementation of TMA application (TMAAPP) based on the standard technical specification of 3GPP and AISG2.0 protocol, The method of communication between base station (BST) and Tower Mounted Device (TMD), software realization, gain message handling is discussed and steps followed in the implementation of parallel procedure handling in parallel to a Time -Consuming Procedure is represented. Discussed work of physical, datalink, and application layer from multi-layer architecture and object-oriented design method of AISG2.0 communication, the TMA application has added advantages to support Antenna line devices (ALD).
S.No.: 158
Title : Energy Efficient Transformer for Optimized Electric Power System
Authors Name: Mohit Tikekar
Authors Affilation: Jabalpur Engineering College
Volume & Issue No.: Volume3Issue5
Abstract: The electric power system is load with a low power factor and high power factor for the same amount of useful power transferred. The energy lost in the distribution system, and requires larger wires and other equipment. The energy efficiency of low voltage and distribution transformers is influenced primarily by the imposition of energy efficiency regulations and by the operational conditions imposed on the transformers. In my thesis work we will examine the energy efficiency regulations that govern the measurement and specification of energy efficiency for low voltage, distribution transformers and evaluates whether the requirement used to certify the transformer efficiency is optimized for minimizing power loss. And also attempts to characterize operational load levels experienced by the transformers, including seasonal and periodical load variations, and the operational load levels to the efficiency standard and alternate methods. We will demonstrate the importance of considering transformers and distribution networks as part of a system when evaluating the implementation of other energy efficiency improvements.
S.No.: 159
Title : HEAD CONTROLLED MOUSE AND KEYBOARD.
Authors Name: Chetna Rizwani, Siddhant Wadhwani, jharna dodeja and hiral parekh
Authors Affilation: Vivekanand Education Society Institute of Technology
Volume & Issue No.: Volume3Issue5
Abstract: This paper is about an improved design of human computer interface using wireless and accelerometer technology, for comfortable interaction with computer and will be of great use to physically challenged people. A Wireless Gesture Controlled Human Computer Interface enables us to use a computer by intuitive head and eye motions in the air. While using this we can move the cursor by forming a gesture and click by blinking the eye. These functions are implemented by using 3-axis accelerometer and our device wirelessly communicates with the PC and we use a ps/2 to USB interface. Unlike normal mouse we don’t require a flat surface, anyone can use this and can use it from anywhere by not just being fixed to a particular place.
S.No.: 160
Title : Modelling, Simulation and Control of Utility Grid Integrated Solar Photovoltaic System Using Matlab
Authors Name: SHIDDALINGESH AKKI, BASAVARAJ T, ASHOK M, GAURAV NAYAK
Authors Affilation: BVB COLLEGE OG ENGG.TECH., HUBLI,KARNATAKA
Volume & Issue No.: Volume3Issue5
Abstract: In this paper we are modelling a solar based non-conventional energy generation system using MATLAB software. A 500-KW grid connected PV system in a radial 2-bus test system is modeled and simulated using Matlab/Simulink software to study the effects of this technology on the system under different levels of solar irradiation. PV module with a central three level inverter is developed in the thesis, which is more suitable for medium power applications. However, the output of solar arrays varies due to change of solar irradiation and weather conditions. Therefore, the maximum power point tracking algorithm is implemented in DC/DC converter (Boost converter) to enable PV arrays to operate at maximum power point. The widely used MPPT technique, incremental conductance algorithm is employed to control the boost converter. Then the central three level inverter is controlled by decoupled current (Id, Iq) control algorithm and interfaced with the utility grid via the distribution network. Besides, the current control of the inverter is independent of maximum power point control of the DC/DC converter. Finally, system performance and transient responses are analyzed. And system stability is evaluated when solar irradiation change or system fault happens. The system is simulated in MATLAB.
S.No.: 161
Title : Biodiesel Production in a Process Intensified Pilot Plant
Authors Name: Haruna Ibrahim*a, Abdulkarim S. Ahmed*, Idris M. Bugaje*a and Ibrahim A. Mohammed-Dabo*
Authors Affilation: Ahmadu Bello University, Zaria-Nigeria
Volume & Issue No.: Volume3Issue5
Abstract: Since fossil fuels sources are finite and the use of these fuels increase the emission of greenhouse gas, CO2 in our environment hence, development of alternative fuels, biofuels have become important. Biodiesel produced from plant and animal origins is the environmental friendly replacement for fossil diesel. A study of process intensification on biodiesel production was carried with Jatropha curcas seed oil, methanol and five solid base catalysts in a process intensified pilot plant. Samples of biodiesel were produced with 3 moles of methanol to 1 mole of oil after esterification of the oil, methyl ester yield of 97.4, 96.94, 95.76, 99.99 and 98.25% catalyzed by bulk CaO, super base calcium oxide (CaO/(NH4)2CO3), bulk MgO, CaO/MgO and 10% impregnated CaO/MgO respectively. The samples were analyzed in accordance with ASTM standard for biodiesel and were found satisfactory for use in compression ignition engines. It was found that this process produced biodiesel devoid of glycerol, the co-product.
S.No.: 162
Title : A Novel Mechanism For Handover Management in PCS Networks
Authors Name: Alyaa Abdou Hamza 1, Ahmed.I.Saleh 2, Mohamed sherif elkasas3
Authors Affilation: Mansoura University, Faculty of Engineering, Department of Computer Engineering And Systems
Volume & Issue No.: Volume3Issue5
Abstract: with the development technology of mobile communication, it is important improvement of the quality of service (QOS) in PCS networks by treating problems which appear in users’ movements. Handover (handoff) is one of process which affects the quality of the call during users mobility from cell to another. In this paper, we propose a new mechanism to reduce handover problem by predicting the future movement of mobile users . This mechanism is composed of two systems to cover all probabilities, first Fuzzy Prediction Engine (FPE) is used when a mobile user has a history, it depend on 6 factors (GPS, Distance, Famous Places, Time, Date, User Profile) to predict future user mobility. Second is Ant Prediction Engine (APE) is used when a user has insufficient history or a new mobile user. It depends on neighbors’ history to predict future user mobility.
S.No.: 163
Title : Study of Maximum Power Point Tracking in PV systems
Authors Name: Basavaraj Totad, Ashok Muvva, Gaurav Nayak, Shiddalingesh Akki, Kiran.R.Patil
Authors Affilation: Asst. Professor Dept.of Electrical and Electronics, BVBCET Hubli, India
Volume & Issue No.: Volume3Issue5
Abstract: Power generation from solar PV has long been seen as a clean sustainable energy technology which draws upon the planet’s most plentiful and widely distributed renewable energy source – the sun. The photovoltaic (PV) system for converting solar energy into electricity is in general costly and is a vital way of electricity generation only if it can produce the maximum possible output for all weather conditions. This paper presents an improved maximum power point tracking (MPPT) algorithm of a PV system under real climatic conditions. The method is based on use of a Incremental conductance of the PV to determine an optimum operating current for the maximum output power.
S.No.: 164
Title : Comfort conditioning in Accordance with Physiology of Human Body
Authors Name: Shiv Kumar Sharma1, Abhishek Jain2, Nitesh Singh Rajput3
Authors Affilation: Amity University Rajasthan, Jaipur1,2,3
Volume & Issue No.: Volume3Issue5
Abstract: Thermal comfort of human body is governed by the laws of thermodynamics. Physiology of human body is affected by the conditions of air, temperature and humidity. Metabolism and catabolism are to major physiological process associated with human body. Human body behaves as a open thermodynamics system. Thermal comfort can be defined as the condition of mental satisfaction with the surrounding thermal environment. This definition can not be expressed in terms of mathematical and physical parameters but easy to understand. It means thermal comfort is a multivariable function like relative humidity, Pressure, Temperature, Density of air etc. From this research we have concluded that existing empirical model present significant co-relation of building design and environmental engineering. Despite that comfort model of Fanger based on thermal regulation and heat balance theories of human body presents actual analysis that helps to understand the relation with the thermal variables responsible for thermal comfort and thermal sensation of Human body. Thus, our analysis represents an improvement in human thermal modeling and gives even more information about the environmental impact. In this research, main focus is to study the impact of comfort conditioning on the physiology of human body in the city like Jaipur. Key words – Comfort, Physiology, Thermal Variable, Air
S.No.: 165
Title : Power Consumption Analysis
Authors Name: Vivek Sadhwani, Dinesh Rohra, Manoj Valesha, Gresha Bhatia
Authors Affilation: 1B.E. Computer Engg. VES Institute of Technology, Mumbai -400074, Maharashtra, India
Volume & Issue No.: Volume3Issue5
Abstract: Even though India being the worlds third largest electricity producer and consumer after the United States and China, the nation still suffers from frequent power outages that last as long as 10 hours. Further, about 25% of the population, about 300 million people, have no electricity at all. Efforts are underway to reduce transmission and distribution losses and increase production further. The term blackout is used to describe a widespread cutoff or loss of supply of electrical power, especially as a result of a shortage, a mechanical failure, or overuse by consumers. It is well known that blackouts happen only rarely and they are usually caused by a sequence of low probability outages.
S.No.: 166
Title : Virtual Power Control and Sinusoidal Current ‎Operation for Grid-Connected Inverter under ‎Unbalanced Grid Voltages Conditions
Authors Name: Mahmoud M. Salem and Yousry Atia
Authors Affilation: Electronics Research Institute, National Research Center Building, El-Tahrir St., Dokki, 12311-Giza, Egypt
Volume & Issue No.: Volume3Issue5
Abstract: Power oscillation and current quality are the important performance targets for the grid-connected inverter under unbalanced and ‎distorted grid voltages. In this work, the inherent reason for the current harmonic and power oscillations of the inverter are ‎discussed. Then away from the positive and negative sequences analysis, novel strategy to determine the harmonic components of ‎the grid currents during constant power control and to obtain relations for the power oscillations during sinusoidal current control ‎are introduced. Based on the introduced analysis, a power control strategy is suggested. The proposed power control strategy uses a ‎virtual power as a controlled variable. The virtual power depends on virtual grid voltages which can be extracted from actual grid ‎voltages by using second order generalized integrator. By controlling the virtual power, sinusoidal grid currents with minimum ‎THD is obtained under unbalanced and distorted grid voltages. For constant power operations, the actual power is used as a ‎controlled variable. Based on an adaptive parameter, flexible control technique is used to switch between sinusoidal current control ‎and constant power control operations. Simulation studies are carried out to confirm the effectiveness of the proposed controller to ‎obtain constant power/sinusoidal current control operation under unbalanced and distorted grid voltages and to confirm the ‎correctness of the introduced equations to calculate the grid current harmonic components and the power oscillations under ‎unbalanced grid voltages.‎
S.No.: 167
Title : Review on Modelling of Cleaning Machines
Authors Name: Abhinay Lade,Prof Manoday Ramteke,Monali Nikam, Prajakta Kadam
Authors Affilation: Smt. Kashibai Navle College Of Engineering,Pune.
Volume & Issue No.: Volume3Issue5
Abstract: Abstract- In this work; we have focused on the conceptual designs and models of cleaning machines. The CAD models and block diagram provides a better understanding for design and analysis of machines. Also it gives a primary outlook towards the design of machine. Here we have described shoe sole cleaning machine and cleaning robot. The shoe sole cleaner with shoe polishing machine is designed, considering all the parameters with respect to customer need in terms portability and also economically available to them. While, the system working of a cleaning robot is proposed for further design of robot.
S.No.: 168
Title : INNOVATIVE APPROACH TOWARDS THE IMPLEMENTATION OF BARCODE SYSTEM IN MEDICAL DOMAIN
Authors Name: Rahul Vaswani, Rohit Vaswani, Rahul Tharwani, Gresha Bhatia
Authors Affilation: VESIT
Volume & Issue No.: Volume3Issue5
Abstract: As the world is evolving continuously, so there is strong need for automating the retailer’s management process. One such category includes automating the management process of medical shop retailers. We describe the design of system that eliminates human resource and tools like barcode scanner, computer system, barcode printer is used. System supports inventory management, invoice generation, annual accounting, track of sales, placing order capabilities, shortlisting expired products etc. Automating the system is must for expanding the business, eliminate human errors and to maintain the leadership status in market. This also saves time of both retailer and customer that is retailer can manage all the things in a faster and easier way and serves the customer appropriately. So our proposed system helps the Medical shop owner/pharmacist to manage his/her work in an efficient way and eliminates the Errors and Misinterpretations.
S.No.: 169
Title : performance analysis of optical link using EDFA
Authors Name: Bhumika A.Patel
Authors Affilation: shankersinh vaghela bapu institute of technology
Volume & Issue No.: Volume3Issue5
Abstract: Analysis of DWDM system using EDFA in C band. Optimum results of gain, output power, BER and Q-factor are obtained proper choosing of input power, pump power, EDF length and concentration of erbium ions. Transmit 320Gb/s data rate for 70km of fiber length. Pumping methods are discussed at 1440nm and 980nm. Results were obtained using optisystemv13 software.
S.No.: 170
Title : Dashboard Creation Tool
Authors Name: Tinckle Trivedi, Heena Nagrani, Sneha Mulrajani
Authors Affilation: VESIT
Volume & Issue No.: Volume3Issue5
Abstract: With the increase of visualization platforms targeting novices, researchers are now focusing on gathering insights regarding novice user practices. We describe the design of Dashboard Creation Tool (DCT), a system that allows users to easily build and customize information dashboards. DCT provides an intuitive environment for dynamically creating, rearranging, searching and exploring multiple visual data representations from diverse data-sources. These aspects aid users to better retrieve, experiment and familiarize themselves with their data.
S.No.: 171
Title : RECENT TRENDS TOWARDS MULTIMEDIA BASED WIRELESS NETWORKING PROTOCOLS
Authors Name: Shivani Sharma
Authors Affilation:
Volume & Issue No.: Volume3Issue5
Abstract: The fast development in network multimedia tools have let extra real-time digital companies such as for instance as an example video-conferencing, online games and distance knowledge to cultivate to be the standard internet tasks. These companies often necessitate the fundamental process to provide multicast facility. The multicast describes the distribution of structures from merely a unitary node to level of destinations. These real-time companies have a stringent necessity of QoS factors like bandwidth, delay, jitter etc. to make sure clear, regular, and fair sign to the receivers. This paper has presented recent protocols which are used in multimedia networks to provide better services. This paper ends up with the suitable future directions to extend this work.
S.No.: 172
Title : Handwritten Form Processing
Authors Name: Bandhan V, Neetish Bhat, Karthik Borkar, Dr. Mamtha HR
Authors Affilation: ISE department, PESIT, Bangalore
Volume & Issue No.: Volume3Issue5
Abstract: Analysis of document images for information extraction has become vital in the modern day. These days so much variety of information is being conventionally stored on paper. For better storage and accurate processing, the paper is being converted into electronic form. This involves a lot of processing of documents using image processing techniques and other computer vision concepts. Document image analysis differs from the conventional image processing in its information content and the format. Document images are usually rich in formally presented information. The subjective-ness associated with the natural image analysis is not therefore present in the document images. Information present in these images is considered more structured, and is presented in a natural language with the help of a grammar and a script. A document is a printed-paper or written which bears the legal, official or original form of data and that can be used to furnish decisive information required or evidence. There are a wide variety of documents that we encounter in day-to-day life.
S.No.: 173
Title : VMAIL: Voice Based Email Application
Authors Name: Rahul Anwani, Deeksha Raina, Usha Santuramani, Priya R.L
Authors Affilation: Computer Engineering Computer Engineering Computer Engineering Department of Computer VESIT VESIT VESIT VESIT University of Mumbai
Volume & Issue No.: Volume3Issue5
Abstract: With the advent of technologies in mobile phones, many technological solutions have been implemented for visually impaired so that they can utilize them, and get benefited by them. Considering it as a key idea we have built an android application that will help blind people to send and read emails as ordinary people do. In this research paper we describe the VMAIL system architecture for android platform that can be used by a Blind Person to access e-mails easily. The application uses text to speech and voice recognizer to facilitate sending, reading, forwarding and replying to emails using an android smart phone. The Application provides a secured platform by including an additional feature of Applock for accessing the application, which is designed considering the convenience of a blind person.
S.No.: 174
Title : NEW COMPACT DESIGN OF HAXAGONAL SLOTTED HEXAGONAL MICROSTRIP PATCH ANTENNA
Authors Name: Pankaj Gupta
Authors Affilation: Institute of Information Technology & Management(IITM), Gwalior
Volume & Issue No.: Volume3Issue5
Abstract: In this paper a HEXAGON shaped Microstrip Patch Antenna has been designed, simulated and analyzed in Zealand IE3D upbringing. The antenna is fabricated with a dielectric constant of 3.4 and loss tangent of 0.002. Microstrip patch antenna becomes very popular day by day because of its ease of analysis and fabrication, inexpensive, trivial, easy to feed and their striking radiation characteristics. Although patch antenna has several advantages, it has also some drawbacks such as restricted bandwidth, and a potential decrease in radiation pattern. Different techniques for bandwidth improvement of usual rectangular microstrip antenna are anticipated in this paper. By increasing the height of patch , escalating the substrate thickness and decreasing the permittivity of substrate the %bandwidth is increased. IE3D Software is used for the simulation and design calculation of microstrip patch antenna. The return loss, VSWR curve, directivity and gain are evaluated. The designed antenna operates in the frequency range of 2.4 to 5.1 GHz having the optimum bandwidth of about 57.63%. Using IE3D software put together of Zeland, according to the set size, the antenna is simulated
S.No.: 175
Title : Heat TransferEnhancement in Tube in Tube Heat Exchanger with Helical Wire Coil Inserts and CuO Nanofluid
Authors Name: Sunil P. Kulkarni, Prof. S.M. Oak
Authors Affilation: Student of M.E.(Master of engg.) in Heat Power Engg., VIT, Bibvewadi, Pune, (MH), India
Volume & Issue No.: Volume3Issue5
Abstract: In the present work, heat transfer enhancement in tube in tube counter flow heat exchanger with helical wire coil inserts and CuO nanofluid for turbulent flow has been investigated. Different parameters affecting the heat transfer characteristics were investigated so that the influence of each parameter can be determined. The Copper Oxide nanoparticles of 40nm size with volumetric fractions of 0.25% are used to prepare the nanofluid for the experiment. The helical wire coil inserts of three different pitch lengths of 14.2, 16.124 and 20.36 mm which correspond to pitch ratios of P/D = 1.29, 1.47 and 1.85 respectively are used to strengthen the heat transfer efficiency for heat exchangers.The Reynolds number varied from 10000 to 35000, the convective heat transfer coefficients were determined. The results gained in the study showed that dispersion of CuO nanoparticles in water significantly increased the overall heat transfer coefficient and convective heat transfer coefficient. The results also revealed that heat transfer improvement could be achieved by the coil having lower pitch ratio i.e. 1.29 as compared with that of coils with P/D=1.47 and 1.85. The overall heat transfer coefficient, Nusselt number, convective heat transfer coefficients for different configurations with and without inserting helical wire coil and nanofluid are compaired.
S.No.: 176
Title : Effect of Forging condition on Mechanical Properties of Al/SiC Metal Matrix Composites
Authors Name: Hanamantraygouda.M.B, Dr.B.P.Shivakumar
Authors Affilation: Department of Mechanical Engineering Sir M Visvesvaraya Institute of Technology, Bangalore
Volume & Issue No.: Volume3Issue5
Abstract: The objective of the research work to investigate effect of forging condition on mechanical properties of Al/SiC composites prepared in open die at the temperature of 450 °C with three different stages then specimens are aged at T6 conditions. Forged specimens subjected tensile, compression and hardness tests to evaluate effect of forging levels on Al/SiC composites. The effect of plastic deformation and high temperature during forging led to a recrystallization of the Al/SiC matrix with a grain refinement. At first and second stage higher grain refine could be seen but at third stage no further grain refinement could be absorbed. The modification of grain which was influenced an enhancement in the mechanical strength. The scanning electron microscope shows the brittle and ductile mixture failure was absorbed in all type of the specimens. Forging improve the mechanical properties with nominal loss of ductility.
S.No.: 177
Title : RECENT TRENDS TOWARD FAULT TOLERANCE TECHNIQUES IN MANET
Authors Name: Kulwinder Kaur, Kamaljit Kaur
Authors Affilation: Nanak Dev University Amritsar Computer Science Department
Volume & Issue No.: Volume3Issue5
Abstract: Mobile ad hoc networks (MANETs) have emerged like a key technology with regard to next-generation wireless networking. MANETs usually are going through rapid progress and also inspiring quite a few purposes. Even so, a lot of complex issues are still dealing with the particular deployment on this technological innovation. On the other hand, adversarial conditions are standard in MANET environments, and there are misbehaving nodes that decay the overall performance.MANETs should be fault tolerant to recover even after a failure occurs. This paper has focused on the significance of the fault tolerant routing protocols and what are the various challenges for fault tolerant MANETs.In this paper, areview on issues in fault tolerance is presented. This review paper has presented various fault tolerance techniques to improve failures in network.
S.No.: 178
Title : Security Model to Secure legacy OPC Server and Client Communication
Authors Name: Aakanksha Dhidhi
Authors Affilation: Master of Technology (Electronics Design) National Institute of Electronics and IT,Aurangabad,India
Volume & Issue No.: Volume3Issue5
Abstract: Steel Authority Of India Limited (SAIL) is the leading steel making company in India. SAIL has its own private network connecting different production units located at Durgapur, Bokaro, Bhilai, Rourkela steel plants etc and corporate offices at Delhi, Kolkata etc. Some of the links in private network are also connected to open and larger network such as internet to communicate with suppliers and customers. Therefore the internal network of SAIL is private as well as public network. So security for this network is most important. Everyday a number of attacks are launched. Among them service attacks are growing exponentially. Since private network of SAIL is indirectly connected to public network through internet. Therefore OPC connected to PLC in steel plants are also indirectly connected to internet. Since it is not possible to route data from OPC through firewall and switching off the firewall makes the plant network insecure and prone to viruses like STUXNET. In this paper, I will propose a security model to secure OPC client and server communication
S.No.: 179
Title : Implementation Of Web Based Management System For Remote Access Terminal
Authors Name: Namita Gadhave,Dilip Bhosale
Authors Affilation: BHIVARABAI SAWANT INSTITUTE OF TECHNOLOGY & RESEARCH, PUNE.
Volume & Issue No.: Volume3Issue5
Abstract: The project aims at designing a Machine Remote Access Terminal using GPRS Modem. Most data loggers or Access Terminal depend on RF communication with limitation of certain Distance of communication. Some use wired Ethernet which is not feasible in certain areas of Industry. Some Telemetry solution providers have also used GSM SMS/DATA calls to solve the problems but it turned out costly and non-reliable. This project uses GPRS Data transfer TCPIP protocols to transfer chunks of data to server which runs a Web server script on APACHE engine. By simple HTML codes we can save real time data being sent from the unit and another HTML page can be used to show the IP data in a presentable way. This unit at present transmits one analog and digital signal and is a proof of concept. This concept can be expanded to include many other analog and digital channels into it.
S.No.: 180
Title : Implementation of PTP Stack on FPGAs
Authors Name: Sindhu R, Suchita Kumari, Rajani K, Rakshita Y N
Authors Affilation: Dayananda Sagar College of Engineering
Volume & Issue No.: Volume3Issue5
Abstract: Precision Time Protocol, described in IEEE 1588 is able to synchronize distributed clocks with an accuracy of less than 1 microsecond. Precision Time Protocol’s operating principle is to exchange messages consecutively to determine the offset between master and slave. The precision and the performance of Precision Time Protocol is based on the precision of Timestamp. The timestamp of communicating packets achieve synchronization between two devices. In this paper, we are implementing the Precision Time Protocol stack on FPGAs to show the working of Protocol and the different layers of OSI model. Precision Time Protocol stack is developed by implementing MAC layer with VHDL code and the upper layer with C code. The developed stack on FPGA acts as Master used to communicate with Slave (in our case, Computer) and a communication is established.
S.No.: 181
Title : A novel Model for Improvement Of Infrared Images
Authors Name: H. I. Ashiba, H.M.Mansour, M.F. El-Kordy, H.M.Ahmed
Authors Affilation: Faculty of Shoubra Engineering, Electrical Engineering DepartmentBanha, Egypt , Dept. of Electronics & Electrical Comm
Volume & Issue No.: Volume3Issue5
Abstract: This paper presents a new enhancement approach for infrared images. The idea behind this technique is based on that modifies the local luminance mean of an image and controls the local contrast as a function of the local Luminance mean of the image. The algorithm first separates an image into LPF (low pass filtered) and HPF (high pass filtered) components. The LPF component then controls the amplitude of the HPF component to increase the local contrast. The LPF component is then subjected to a non linearity to modify the local luminance mean of the image and is combined with the processed HPF component. Finally, this approach is enhanced to get an infrared image with better visual details.
S.No.: 182
Title : Enhancement of Infrared Images with An adaptive Histogram Equalization Approach
Authors Name: H. I. Ashiba, H.M.Mansour, M.F. El-Kordy, H.M.Ahmed
Authors Affilation: Faculty of Shoubra Engineering, Electrical Engineering DepartmentBanha, Egypt , Dept. of Electronics & Electrical Comm
Volume & Issue No.: Volume3Issue5
Abstract: This paper proposes a novel enhancement method for infrared images (IR) .This algorithm based on contrast limited adaptive histogram equalization (CLAHE)that adaptive and improves infrared images. Some attempts are proposed for enhancement of infrared imagesusingthis model, sinceinfrared images have several many applications, it is expected that CLAHEwould be better in their enhancement than histogram equalization (HE). The simulation results show the superiority of CLAHEto HE in the enhancement of IR images from both the visual quality and Peak-to-peak signal-to-noise ratio (PSNR) points of view.So, applying this proposed method reinforces visual details inIR images enhancement.
S.No.: 183
Title : A Comparative Analysis of Software development life cycle Models
Authors Name: Rashmika K. Vaghela
Authors Affilation: R.C.Technical Institute
Volume & Issue No.: Volume3Issue5
Abstract: There are various software development life cycle models used for developing software. SDLC provides a systematic way for developing software. Each SDLC model has it’s own advantages and disadvantages according to which we decide which model is suitable for development under which condition. In this paper the comparison of various SDLC models like waterfall, incremental, spiral and RAD model have been carried out
S.No.: 184
Title : ASPECTS OF COMPENSATION MANAGEMENT: AN INDIAN EXPERIENCE
Authors Name: SHISIR KUMAR SETHI
Authors Affilation: BERHAMPUR UNIVERSITY, DEPARTMENT OF INDUSTRIAL RELATIONS & PERSONNEL MANAGEMENT (IR&PM)
Volume & Issue No.: Volume3Issue5
Abstract: Compensation is a systematic approach to providing monetary value to employees in exchange of their work. Compensation may achieve several purposes assisting in recruitment, job performance, and job satisfaction. An ideal compensation management system will help significantly boost the performance of employees and create a more engaged workforce that’s willing to go the extra mile for the organisation. This paper focuses on aspects of compensation management. Mostly, it includes the elements of vision, potential, communication and motivation and can be realised if incentive promises are fulfilled by both employer and employee. The aim of the paper is to identify the most important attributes of compensation system of management. Keywords: Compensation, Motivation, Employees, Incentives, Management Practices.
S.No.: 185
Title : Analysis of Fatigue behaviour and Impact strength of IS 500/7 Grade Ductile Iron Subjected to Austempering Heat treatment
Authors Name: Muhammed Naseef M.A, Sameer, Vijaykumar H.K
Authors Affilation: Bearys Institute of Technology, Mangalore, Karnataka, India
Volume & Issue No.: Volume3Issue5
Abstract: Austempered Ductile Iron (ADI) is replacing steel and it is finding applications in agriculture, mining, construction and automotive sector due to its superior mechanical properties and cost-effectiveness in manufacturing. In this study IS500/7 grade ductile iron castings were made subjected to austempering heat treatment to get ADI i.e., to bring about changes in microstructure and hence therefore mechanical properties. Austempering heat treatment involves austenisation at 9000C temperature for 2 hours duration, austempering temperatures selected was 3600C and 4300C and austempering duration selected were 50,100,150,200 and 250 minutes.Fatigue behaviour and impact strength of the ADI specimens were analysed and compared with as cast condition specimen. The results of the investigation indicate that the ADI castings possess better impact strength compared to as cast specimens and fatigue strength decreases with increase in austempering temperature.
S.No.: 186
Title : A STUDY OF VARIOUS BRAIN TUMOR DETECTION TECHNIQUES
Authors Name: Kirna Rani
Authors Affilation: Computer science of Engineering Guru Nanak Dev University Amritsar
Volume & Issue No.: Volume3Issue5
Abstract: The brain tumor detection is a very important application of medical image processing. This paper has presented a review on various brain tumor detection techniques. The overall objective of this paper is to explore the various limitations of earlier techniques. The literature survey has shown that the most of existing methods has ignored the poor quality images like images with noise or poor brightness. Also the most of the existing work on tumor detection has neglected the use of object based segmentation. This paper ends up with the suitable future directions.
S.No.: 187
Title : Translating Indian Sign Language to text and voice messages using flex sensors
Authors Name: Sachin Bhat, Amruthesh M, Ashik, Chidanand Das, Sujith
Authors Affilation: Shri Madhwa Vadiraja Institute of Technology, Udupi
Volume & Issue No.: Volume3Issue5
Abstract: Communication plays an important role for human beings. Communication is treated as a life skill. Keeping these important words in mind we present our paper to mainly focused on aiding the speech impaired and paralysed patients. Our work helps in improving the communication with the deaf and dumb using flex sensor technology. A brief description about various gestures and the implementation part is discussed in this paper. A device is developed that can translate different signs including Indian sign language to text as well as voice format. Flex sensors are placed on hand gloves for the use of above said people. Flex sensor’s resistance changes according to the flexion experienced. Sensors in the glove pick up gestures and transmit that to text data with the help of Analog to Digital convertor and micro controllers. This converted text data will be sent wirelessly via Bluetooth to a cell phone which runs Text to Speech software and incoming message will be converted to voice. Here device recognizes Indian sign language alphabets, numbers and symbols based on sensor movement.
S.No.: 188
Title : Implementation of Memory Efficient Data Hiding Technique
Authors Name: Anushka Nagpal
Authors Affilation: CSE& Kurukshetra University Haryana, India
Volume & Issue No.: Volume3Issue5
Abstract: Steganography is an important area of research in recent years involving a number of application. In this paper, a new Steganography technique is presented, implemented and analyzed. The proposed method hides the secret message into cover medium. It can hide three images into one. Evaluation is done on PSNR based. Comparison with existing techniques is also compared. Then the performance specification of image steganography is disscussed . Different embedding techniques that are LSB, Spatial domain ,DCT, Huffman encoding, are generalized .
S.No.: 189
Title : MOBILE SINK AND ANT COLONY OPTIMIZATION BASED ENERGY EFFICIENT ROUTING ALGORITHM
Authors Name: NAVPREET KAUR, ER. JATINDER PAL SHARMA
Authors Affilation: COMPUTER SCIENCE DEPARTMENT GLOBAL INSTITUTE OF MANAGEMENT AND EMERGING TECHNOLOGY
Volume & Issue No.: Volume3Issue5
Abstract: In this paper, an Ant colony optimization based energy efficient routing algorithm has been proposed. Principle improvement has been done for energy efficient routing algorithm. Additionally the use of the compressive sensing also increases the performance further. The compressive sensing uses data fusion to remove redundant data from sensor nodes. So it improves the results further. In the end to evaluate the effectiveness of the proposed technique further the effect of the scalability of number of nodes has also been considered.
S.No.: 190
Title : Performance Analysis Of ICA Using Tuning Parameters
Authors Name: Jaya Dhawan, Pooja Narula
Authors Affilation: Student, Haryana Engineering College
Volume & Issue No.: Volume3Issue5
Abstract: Remote sensing has played a vital role in change detection of the hyperspectral images. In past some years, several improvements have been made in change detection techniques. The objective of this paper is also to propose such an improvement in Independent Component Analysis(ICA) by introducing certain tuning parameters in the FastICA algorithm. The algorithm can be run with different approaches and under different criteria with these parameters and thus making the algorithm much efficient. A comparison is made between the two important techniques of change detection that are PCA and ICA. The better performance of ICA to remove correlation efficiently among the components found from a given hyperspectral data has been assured by experimental results.
S.No.: 191
Title : Delay And Energy-Aware Routing (DEAR) In Proactive Source Routing Protocol For Mobile Adhoc Networks
Authors Name: MEHROOSH TALATH, Mrs. BHAGYA K
Authors Affilation: Mtech 4th sem, Associate Professor HKBK College of engineering,CSE Dept
Volume & Issue No.: Volume3Issue5
Abstract: A wireless communication where the nodes are not within direct transmission range of each other it requires other node to forward the data this is a Mobile Adhoc Network (MANET).Opportunistic data forwarding express an assuring solution to utilize the broadcasting nature of wireless communication link. It has drawn much diligence in research community of multihop wireless network, but it has not been used in MANET because of lack of light weight proactive routing scheme with strong source routing capability .In this paper a lightweight proactive source routing(PSR) is proposed , which can have more network topology information and less overhead than other traditional DV-based protocol[e.g., destination-sequenced DV (DSDV)],link state (LS)-based routing [e.g., optimized link state routing(OLSR)],and reactive source routing [e.g., dynamic source routing (DSR)]. In this proposed PSR network overwhelming is occurring due to the route update and energy consumed is more because of node mobility. To overcome this disadvantage and new innovative method called delay and energy aware routing method (DEAR) is proposed for reducing energy consumption. In this method the delay is selected until the end of the cycle so that only one update is broadcast in each period. Furthermore, due to the dynamic topology, node consumes more energy while roaming. For this, the topology control approach has been introduced. In this approach, considered two cases, i) Energy consumption of the node and routes. ii) Link stability and location stability. The experimental result using computer simulation in Network Simulator 2(ns-2) shows that the proposed PSR and DEAR yield similar or better data transportation performance than these baseline protocols.
S.No.: 192
Title : IMROVED LAB BASED CONTRAST LIMITED ADAPTIVE HISTOGRAM EQUALIZATION FOR UNDERWATER IMAGES
Authors Name: MANPREET KAUR, MANVI
Authors Affilation: COMPUTER SCIENCE DEPARTMENT LALA LAJPAT RAI INSTITUTE OF ENGINEERING AND TECHNOLOGY. MOGA
Volume & Issue No.: Volume3Issue5
Abstract: Under water vision is one of the scientific fields of investigation for researchers. Autonomous Under water Vehicles (AUV) and Remotely Operated Vehicles (ROV) are often employed to fully capture the information such as for instance under water mines, shipwrecks, coral reefs, pipelines and telecommunication cables from the underwater environment. Underwater image degrades due to limited range visibility, low contrast, non-uniform lighting, blurring, bright artifacts, color diminished, and noise. In this paper, to overcome the problems of existing technique a new L*A*B color space and CLAHE based image enhancement algorithm has been proposed. To overcome the issue of the uneven illuminate issue in the output image of the CLAHE output has further removed using the use of color channel normalization. The main scope of the proposed algorithm has been to improve the accuracy of the underwater image enhancement techniques
S.No.: 193
Title : A STUDY ON DIGITAL WATERMARKING ALGORITHMS
Authors Name: Kudratpreet Kaur, Malkit Singh
Authors Affilation: M.Tech CSE GCET
Volume & Issue No.: Volume3Issue5
Abstract: In this paper, a survey on various digital watermarking techniques has been done. A watermark system is considered to be secure, if the hacker cannot eliminate the watermark without having full understanding of embedding algorithm, detector and composition of watermark. From the survey, it is been found that none of the technique performs efficiently in every fields. Therefore the paper ends with the future scope to overcome these issues.
S.No.: 194
Title : A REVIEW ON IMAGE ENHANCEMENT TECHNIQUES
Authors Name: Shikha Mahajan, Assit.Prof. Richa Dogra
Authors Affilation: M.TECH/CSE GCET (PTU)s
Volume & Issue No.: Volume3Issue5
Abstract: Image enhancement plays a fundamental role in vision applications. Enhancement is the manner of improving the superiority of an electronic digital stored image. Recently much work is completed in the field of images enhancement. Many techniques have previously been proposed up to now for enhancing the digital images. In this paper, a survey on various image enhancement techniques has been done. After surveying different techniques, it has been concluded that none of the techniques performs efficiently in all fields. Therefore the paper ends with the future scope to overcome these limitations.
S.No.: 195
Title : A REVIEW ON UNDERWATER WIRELESS SENSOR NETWORKS
Authors Name: Vishesh Mahajan, Harjeet Singh
Authors Affilation: Department of electronics and communication technology Regional campus GNDU, Gurdaspur
Volume & Issue No.: Volume3Issue5
Abstract: Underwater Wireless Sensor Networks (UWSNs) support various applications like pollution monitor, tsunami warning, offshore exploration, planned surveillance, etc. Distinctive top features of UWSNs like low available bandwidth, large propagation delay, highly dynamic network topology, and high error probability pose many challenges for designing efficient and reliable communication protocols. This paper has reviewed extension of IAMCTD (Improved Adaptive Mobility of Courier nodes in Threshold-optimized DBR protocol for UWSNs) thats targeted on enhancing network reliability and throughput for critical-range based applications. Extension of IAMCTD scheme avoids control overhead that has been contained in IAMCTD for implementing changes thorough threshold. The movement pattern of courier nodes alongside reducing communication burden on nodes increases throughput as well.
S.No.: 196
Title : SIMULATION AND AUTOMATIC TUNING OF OLSR ROUTING PROTOCOL FOR VANETs
Authors Name: Sugendha, Bandana Sharma
Authors Affilation: PG student & CSE & Kurukshetra University & Kurukshetra (Haryana), India
Volume & Issue No.: Volume3Issue5
Abstract: This paper presents a class of routing protocols for vehicular ad hoc networks (VANETs) called the Optimized link state routing protocol (OLSR). OLSR protocol performs well in networks having changing topology of nodes, as it can adapt in such environments easily and updated routing table is maintained by all nodes all the time. Wide range of improvement is possible by changing only the configuration parameters of OLSR protocol. Modification to the OLSR protocol is needed to increase the performance of the OLSR protocol in a VANET scenario. This can be done by implementing Genetic Algorithm on OLSR protocol and this result in fine auto-tuned OLSR configuration. Performance gets improved in terms of increased PDR and Throughput and reduced End to End Delay with optimized-OLSR (OLSR-GA)
S.No.: 197
Title : AN APPROACH TO PROCESSOR ALLOCATION SCHEDULING FOR HETEROGENEOUS MULTI-CLUSTER SYSTEM
Authors Name: JYOTI BALA, MOHIT ANGURALA
Authors Affilation: COMPUTER SCIENCE ENGINEERING GOLDEN COLLEGE OF ENGINEERING & TECHNOLOGY, GURDASPUR (PUNJAB)
Volume & Issue No.: Volume3Issue6
Abstract: Heterogeneous Multi-cluster System is a best developing area in computer science engineering. Job scheduling and processor allocation is two main area of improve performance in Multi-cluster System. Recently much work is performed in the field of heterogeneous scheduling of multi-cluster system. In this paper, a research on different scheduling for methods has been done. After surveying different methods, it has been concluded that none of the methods performs efficiently in all fields. Therefore the paper ends with the future scope to overcome these limitations.
S.No.: 198
Title : A SURVEY ON VARIOUS UNDERWATER IMAGE ENHANCEMENT TECHNIQUES
Authors Name: SONAM BHARAL
Authors Affilation: GNDU, AMRITSAR
Volume & Issue No.: Volume3Issue6
Abstract: Image enhancement is the process of improving the quality of the input image so that it would b easily understood by viewers in the future. Underwater images mainly suffer from the problem of poor color contrast and poor visibility. These problems occurred due to the scattering of light and refraction of light while entering from rarer to denser medium. Many techniques and methods are established by researchers to solve the problem of underwater image enhancement. In this paper different underwater image enhancing techniques are reviewed and studied. The overall objective is to explore the shortcomings in earlier techniques.
S.No.: 199
Title : REVIEW OF IMAGE FUSION TECHNIQUES
Authors Name: Shalima, Dr. Rajinder Virk
Authors Affilation: Dept of CSE, GNDU Amritsar
Volume & Issue No.: Volume3Issue6
Abstract: Image fusion is a process of fusing two or more images of same scene to form single fused image which displays vital information in the fused image. There are different techniques of image fusion which have many advantages and disadvantages. Many techniques suffer from the problem of color artefacts that comes in the fused image formed. In this paper different techniques have been reviewed and the main objective is to find the shortcomings that occur in difeerent image fusion techniques.
S.No.: 200
Title : A STUDY OF VARIOUS QOS MULTICAST ROUTING PROTOCOLS FOR MANETS
Authors Name: Neelam Kumari, Mr.Arpinder Singh
Authors Affilation: Computer Science Beant College Of Engineering & Technology
Volume & Issue No.: Volume3Issue6
Abstract: The rapid growth in network multimedia equipments have allow additional real-time digital services such as video-conferencing, online games and distance education to grow to be the conventional internet tasks. These services frequently necessitate the fundamental system to provide multicast facility. The multicast describes the distribution of structures from just one single node to multiple destinations. These real-time services have a stringent inevitability of QoS factors like bandwidth, delay, jitter etc. to ensure dirt free, reliable, and reasonable sign to the receivers. In this paper, a survey on various meta-heuristic algorithms has been done along with routing protocols. From the survey it has been concluded that none of the technique performs effectively in all fields. Therefore the paper ends with the future scope to overcome these issues.
S.No.: 201
Title : Healthcare Fraud Detection Using Data Mining
Authors Name: Deepak Badlani, Priya R.L., Suryaprakash Vishwakarma, Harsh Modi
Authors Affilation: V.E.S Institute of technology
Volume & Issue No.: Volume3Issue6
Abstract: Health Insurance companies are facing difficulty to detect the false claims made by customers and providers. Customer’s requests for the false claim and they were getting passed. This project helps the healthcare insurance companies to detect whether the customer claim is valid or not. The project helps to deal with the large chunk of data of customers, providers and analyse the data and helps the health insurance companies to detect the fraud. Data mining analytics in healthcare is evolving into a promising field for providing insight from very large data sets and improving outcomes while reducing costs. Its potential is great; however there remain challenges to overcome.
S.No.: 202
Title : Review of Forward & Backward Sweep Method for Load Flow Analysis of Radial Distribution System
Authors Name: Chitransh Shrivastava, Manoj Gupta, Dr. Atul Kosthi
Authors Affilation: PG Scholar, Department of Electrical & Electronics Engineering, IES-IPS Academy, Indore
Volume & Issue No.: Volume3Issue6
Abstract: Due to sharp increase in power demand, voltage instability & line overloading has become challenging problems for power engineers. Voltage collapse, unexpected line & generator outages & blackouts are the major problems associated with voltage instability. Reactive power unbalancing is the major cause of voltage instability. So that the problem of enhancing the voltage profile and decreasing power losses in electrical systems is a task that must be solved in an optimal way. This type of problem is in single phase & three phases. Therefore to improve & enhance the voltage profile & stability of the existing power system, FACTS devices and load flow analysis are the alternative solution. This paper describes a forward backward sweep method based approach for load flow analysis in radial distribution system to improve voltage stability and to minimize the transmission line losses considering cost function for entire power system planning. The proposed approach will be tested on IEEE-33 bus system.
S.No.: 203
Title : Denial of Services based Countermeasures Key Exchange Protocols
Authors Name: Asst. Prof. Arpit Agarwal and Asst. Prof. Agrawal Jitendra Soni
Authors Affilation: Department of Computer Engineering Institute of Engineering & Technology Institute of Engineering & Technology Devi Ahilya University Devi Ahilya University M.P., India M.P., India
Volume & Issue No.: Volume3Issue6
Abstract: Cryptography has become indispensable in areas such as e-commerce, the legal safeguarding of medical records, and secures electronic communication. Cryptographic protocols like key exchange usually require expensive computations such as finite field exponentiations or elliptic curve scalar-point multiplications. In an adversarial environment such as the Internet, an attacker could effect a denial of service attack against a server by forcing the server to perform many instances of a cryptographic protocol. To help tackle this challenge, several cryptographic primitives and constructions have been proposed, including mechanisms to securely distribute data over a unidirectional insecure channel, schemes in which leakage of cryptographic keys can be traced back to the leaker, and techniques to combine revocation and tracing capabilities. In this paper we proposed the integration of denial of service countermeasures key exchange protocol by introducing a formal model for denial of service resilience that complements model for secure key agreement, we cover a wide range of existing denial of service attacks and prevent them by carefully using client queries and puzzles.
S.No.: 204
Title : Novel Region Based Multi Focus Image Fusion based on Region spatial frequency and Linear Exponential Weight
Authors Name: drashti patel
Authors Affilation: SVIT
Volume & Issue No.: Volume3Issue6
Abstract: Due to the depth of focus problem in digital camera, we get the images that contain only certain objects in focus that are the objects within the depth of focus. Multifocus image fusion is the technique to overcome such a problem and get the image that contains all objects in focus. In this paper we proposed new Multi focus image fusion algorithm based on linear exponential Weight and Region spatial frequency. The fusion process is as follow: first, Input images are fused using transform domain method that is the Laplacian pyramid method. Then the image get using Laplacian pyramid is segmented. Then the two input images are segmented according to the result of the Laplacian pyramid image. Finally, According to the Region Spatial frequency, apply linear exponential weigh on the source images to get final fused image. Experimental results shows that proposed method can give good results then other methods.
S.No.: 205
Title : Task distribution scheme:The offloading framework for Mobile Cloud
Authors Name: YOGESH DUMBARE,SANDIP KAHATE
Authors Affilation: Department of Computer Engineering, Sharadchandra Pawar College of Engineering, Otur(Pune), India.
Volume & Issue No.: Volume3Issue6
Abstract: Now a days Mobile become the essential part of human life. So we can use this platform to execute all the online services. Mobile cloud computing for enabling the future of online services using computation offloading framework to improve security and performance. We are using BBAP offloading algorithms for security and to minimize the computation overhead. Task distribution scheme is also used which help the cloud to achieved desired goal. Cloud computing will play a major role in the future Internet of Services, enabling on demand provisioning of applications, platforms, and computing infrastructures. However, the cloud community must address several technology challenges to turn this vision into reality. Specific issues relate to deploying future infrastructure-as-a-service clouds and include efficiently managing such clouds to deliver scalable and elastic service platforms on demand, developing cloud aggregation architectures and technologies that let cloud providers collaborate and inter operate, and improving cloud infrastructures’ security, Reliability and energy efficiency.
S.No.: 206
Title : DIGITAL IMAGE WATERMARKING USING MODIFIED SVD WITH ARNOLD TRANSFORM, DCT, DWT AND CZT
Authors Name: Navdeep kaur, Dr. Rajinder Virk
Authors Affilation: Department of Computer Engineering and Technology, Guru Nanak Dev University, Amritsar Punjab, India
Volume & Issue No.: Volume3Issue6
Abstract: The reliability and protection issues of digital pictures are fetching fame than ever, due to the speedy progress of multimedia and Internet expertise. Watermarking procedures for images are used to safeguard the digital pictures. There can be a visible or an invisible watermark. In this study we confine our consideration to invisible watermarks. An invisible watermarking procedure, generally, consists of an encoding method and a decoding method. To overcome the limitations of earlier techniques a new technique is proposed which has evaluated DCT, DWT, CZT and SVD. The SVD is modified by the Arnold transform. The planned algorithm uses the advantages of the watermarking techniques which are well-known. The basic goal of this work is to alter the SVD in such a way so that it can sense the attacks in more capable way. Modified-SVD (MSVD) is used to evaluate the SVD matrix and values obtained from the input image and then will be tailored with the values of the image going to be watermarked.
S.No.: 207
Title : SIMULATION BASED ANALYSIS OF IEEE 802.16 WIMAX ROUTING PROTOCOLS FOR HIGH LOAD APPLICATIONS
Authors Name: Jatinder Preet Kaur and Mandeep Kaur
Authors Affilation: Punjab Institute of Technology, Rajpura, Punjab
Volume & Issue No.: Volume3Issue6
Abstract: Worldwide Interoperability for Microwave Access (WiMAX) is a technology that bridges the gap between fixed and mobile access and offer the same subscriber experience for fixed and mobile user. Routing is the key issue of WiMAX. Routing protocols are studied mainly on the basis of distance vector routing protocols, link state routing protocols and path vector routing protocols and the protocols are IGRP, RIP, EIGRP; OSPF, IS-IS and BGP respectively. The performance of each routing protocols is different from others. Optimized Network Engineering Tool (OPNET) simulator is used to analyze and measure the comparative performance of various routing protocols. In this paper, focus is made on comparative analysis of routing protocols for high load application such as FTP. The performance evaluation of three routing protocols that are Border Gateway Routing (BGP), Open Shortest Path First (OSPF) and Interior Gateway Routing Protocol (IGRP), is carried on the basis of End to End delay, network load, Media Access Delay, Retransmission Attempts and Throughput. The analysis is done by obtaining the results from simulation scenarios in OPNET Modeler version 14.0.
S.No.: 208
Title : Efficient Data Aggregation Scheme For Wireless Sensor Network
Authors Name: Dhara Patel, Virendra Barot
Authors Affilation: Information Technology Dept. Sardar Vallabhbhai Patel Institute of technology, Vasad, Gujarat, India
Volume & Issue No.: Volume3Issue6
Abstract: Due to limited resources available for sensor nodes in wsn(wireless sensor network), we must use the data aggregation technique to improve the residual energy. Data Aggregation is the technique which aggregating the data from multiple sensors to eliminate redundant transmission and provide fused information to Base station. In this context, we propose a modified protocol which is based on greedy routing and data aggregation using LEACH. In existing greedy routing includes two algorithm as: greedy selection and greedy election. In selection algorithm neighbors exchange packets with RSSI information and next hop of the packet is then selected from routing table at each step. In election algorithm, next hop is dynamically elected at each step and no extra packets Are required for routing task. Still there are some issues with this algorithms like energy consumption, network lifetime etc. So we have proposed the new protocol using LEACH to improve existing scheme to make it more energy efficient. Now using modified protocol, there should be less data transmission so that energy consumption should be reduced and improve the overall network lifetime which is also most important issue of wsn. The result clearly shows that our proposed scheme improve the residual energy than existing scheme and make the system energy efficient.
S.No.: 209
Title : Recent Techniques for Image Fusion: A survey
Authors Name: Prabhdip Kaur, Manjit Singh, Butta Singh
Authors Affilation: Department of Electronics, Department of Electronics, Department of Electronics, GNDU Regional Campus, GNDU Regional Campus, GNDU Regional Campus, Jalandhar.
Volume & Issue No.: Volume3Issue6
Abstract: Image fusion is a process of assimilating all relevant and complementary information from images of identical source or various sources into a single combined image without any degradation. Three major fusion methods have been dealt in the literature of image fusion – pixel level, feature level and decision level. In this paper, a review of different image fusion techniques is presented. DCT based image fusion methods are time saving and efficient but leads to color artifacts. PCA image fusion based methods have high spatial quality. Also it suffers from spectral degradation and is computationally poor. The overall goal of this paper is to find the gaps in existing literature and suggesting a suitable method to reduce the gaps of existing techniques.
S.No.: 210
Title : Progressive visual cryptography in secret image for image security
Authors Name: Mr. Abhimanyu S. Gunjal, Dr. S. V. Gumaste
Authors Affilation: Student of ME (Computer) Project Guide Department of Computer.Engg. Department of Computer.Engg. Sharadchandra Pawar college of Engg. Sharadchandra Pawar college of Engg. Otur, Pune, India
Volume & Issue No.: Volume3Issue7
Abstract: Visual cryptography is a cryptographic technique which allows visual information (pictures, text, etc.) to be encrypted in such a way that the decryption can be performed by the human visual system, without the aid of computersIf we only have a few pieces of shares, then we could get an outline of the secret image, by increasing the number of the shares being stacked, the details of the hidden information can be revealed progressively. PVC using un-expanded shares regenerates images of high quality. But this method is not secure as the shares generated are noise like images and interest of hackers as they treat them as critical information in the transmission. If the random looking shares are enveloped into some meaningful images the interest of hackers can be minimized In the proposed method, a digital watermarking technique is used to generate meaningful shares. The secret image shares are watermarked with different cover images and are transmitted. At the receiving side the cover images are extracted from the shares and stacked one by one which reveals the secret image progressively. This process provides a more efficient way to hide images in different meaningful shares providing high security and recovered image with high contrast.
S.No.: 211
Title : Organizational culture impact on reduction the causes of organizational conflict (Applied study on ……Jordan Hospital )
Authors Name: Dr: zahid Mohamed diri
Authors Affilation: zarga university ,Faculty of economics and administrative sciences, Business administration department.
Volume & Issue No.: Volume3Issue7
Abstract: The study aimed to determine the organizational culture impact on reduction the causes of organizational conflict in Jordan Hospital . The required data was collected via developing a questionnaire that was designed particularly for that purpose based in previous studies, then was distributed on a sample of 86 people of the hospitals personnel. To test the study hypotheses, the linear regression analysis was employed .The study took into consideration four dimensions of organizational culture, as follows: innovation, personnel and appreciation, trust, and teamwork. As for organizational conflict, the study has determined three causes for it, as follows: resource limitations, unclear responsibilities, goals conflict. The results of the study showed that there is an organizational culture dominating the Hospital of Jordan and that it has great impact on reduction of conflict causes. The results also showed that there is an impact with statistical significance at level (α<0.05) on the relation between the organizational culture dimensions (innovation, personnel respect and appreciation, trust and teamwork) and conflict reduction in the Hospital of Jordan as a result of resource limitations. The results showed that there is an impact with statistical significance at level (α<0.05) on the relation between the organizational culture dimensions (innovation, personnel respect and appreciation, trust and teamwork) and conflict reduction in the Hospital of Jordan as a result of unclear responsibilities. Finally , the study results have shown that there is an impact with statistical significance at level ( α<0.05 ) on the relation between the organizational culture dimensions ( innovation , personnel respect and appreciation , trust and teamwork ) and conflict reduction in the Hospital of Jordan as a result of goals conflict . In the light of the results, the study recommends the following: • Paying attention to the dominating organizational culture and developing it , • Improving the work environment , • Allowing for personnel partnership in developing the hospitals strategies , • Encouraging creativity and competition among the personnel • Managing the organizational conflict in accordance with the hospitals and the personnel goals.
S.No.: 212
Title : ORGANIZATIONAL CULTURE DIMENSIONS and its IMPACT ON The success of ORGANIZATIONAL CHANGE PROGRAMS ( THE JORDANIAN BANKS)
Authors Name: Dr: zahid Mohamed diri
Authors Affilation: zarga university ,Faculty of economics and administrative sciences, Business administration department.
Volume & Issue No.: Volume3Issue7
Abstract: The study aimed to recognize the impacts of the organizational culture dimensions on the success of organizational programs in the Jordanian banks, via a questionnaire that targeted the views of managementadministrators of the Jordanian banks centers and branches in the city of Amman. The study population included 278 administrators from elevenbanks, with 65 administrators taken as study sample. The study concluded that the banks had been conducting change programs, and that there is a firm and strong organizational culture that is expressed its identity. The study also showed that there an impact with statistical significance of the organizational culture dimensions on the organizational change programs success with various degrees in the Jordanian banks.In the light of previous results, the study recommends that the workers be included as partners in the change programs, developing innovation supporting systems , improving the work environment and personnel respect , promoting competition culture , stimulating the personnel , developing communication systems, and increasing interest in the social capital .
S.No.: 213
Title : Congestion Control Clustering a Review Paper
Authors Name: Navdeep Singh, Er. Nitika Soni
Authors Affilation: G.N.D.U Regional Campus Assistant Professor Jalandhar
Volume & Issue No.: Volume3Issue7
Abstract: Wireless Sensor Networks consists of sensor nodes which are scattered in the environment, gather data and transmit it to a base station for processing. Energy conservation in the Wireless Sensor Networks (WSN) is a very important task because of their limited battery power. The related works so far have been done have tried to solve the problem keeping in the mind the constraints of WSNs. In this paper, a priority based application specific congestion control clustering (PASCCC) protocol has been studied, which often integrates the range of motion and heterogeneity of the nodes to detect congestion in a very network. Moreover a comparison of the various clustering techniques has been done. From the survey it has been found that none of the protocol is efficient for energy conservation. Hence the paper ends with future scope to overcome these issues.
S.No.: 214
Title : A MODEL FOR IMPLEMENTING DATABASE SECURITY USING RADIO FREQUENCY IDENTIFICATION (RFID)AND ROLE - BASED ACCESS CONTROL
Authors Name: NICHOLAS OLUWOLE OGINI
Authors Affilation: Department of Mathematics and Computer Science, Delta State University, Abraka, Delta State
Volume & Issue No.: Volume3Issue7
Abstract: To state that the computer has found its way into most fields of human interest is saying the obvious. This is because almost all corporate organizations now depend on computers for their day today operations including themeans of storing sensitive data and information vital to the organization.In this computer age, everyone needs a computer to remain relevant and up to date,and this has arguably made the computer to become the most sought after piece of electronic device (albeit for both legitimate and illegitimate use). Most organizations today are networking in order to share resources including databases thereby allowing several computers access the same database. Advantage of this is being taken by criminals as they have become aware of the enormous benefitsof the illegal business of gaining access without authorization (hacking) database of organizations. One of the approaches of this is to device means of taking advantage of any idle computer in a remote area to access a common database.The security of remote computer systems from physical hackers is highly desired, in this paper therefore, the Radio frequency identification (RFID) is introduced into computers security using Tags and Readers. The general operations and applications of the RFID, its types and characteristics are discussed,and aframework for this is designed.
S.No.: 215
Title : ACDCT WITH PCA AND ADAPTIVE HISTOGRAM EQUALIZATION BASED MULTI-FOCUS IMAGE FUSION
Authors Name: HARMANJOT SINGH ,SHARANJEET SINGH
Authors Affilation: GURU NANAK DEV UNIVERSITY REGIONAL CAMPUS GURDAPUR
Volume & Issue No.: Volume3Issue7
Abstract: This research work has proposed a new technique which will integrate the higher valued Alternating Current (AC) coefficients calculated in Discrete Cosine Transform (DCT) domain based fusion with principle component analysis (PCA) and adaptive histogram equalization to reduce the color artifacts which will be introduced due to the transform domain method i.e. DCT. The fusion process may degrade the sharpness of the fused images so to overcome this problem adaptive histogram equalization is used to enhance the results further. The use of PCA is for increasing the speed of the AC-DCT based fusion method; because in color images AC-DCT has been applied on each color separately which time is consuming in nature. The experimental results has clearly shown that the proposed technique outperforms over the available methods. The proposed algorithm has been designed and implemented in MATLAB tool using image processing toolbox. The comparative analysis has shown the significance of the proposed algorithm
S.No.: 216
Title : PRESERVATION OF EDGES&IMPROVING CONTRAST ENHANCEMENT OF AN IMAGE USING FUZZY LOGIC
Authors Name: Sonal Sharma, Gurveen Kaur
Authors Affilation: Dept Of Computer Engineering, DAVIET, Jalandhar
Volume & Issue No.: Volume3Issue7
Abstract: Image Enhancement can improve the perception of information for human viewers, but there also exist some deficiencies in most image enhancement methods and one such deficiency is the loss of edges in an image. An edge in an image is a boundary or contour at which a significant change occurs in some physical aspect of an image, such as the surface reflectance, illumination or the distances of the visible surfaces from the viewer. Changes in physical aspects manifest themselves in a variety of ways, including changes in intensity, colors, and texture. In this paper, after a brief overview of some existing methods of contrast enhancement and their limitations, we present computationally efficient method of enhancing the contrast by using Fuzzy Logic. The proposed algorithm is applied on different images, and few evaluation parameters are calculated which proves the effectiveness of the proposed algorithm.
S.No.: 217
Title : IMPROVED IMAGE SEGMENTATION TECHNIQUE
Authors Name: Sonal Sharma, Gurveen Kaur
Authors Affilation: Dept Of Computer Engineering, DAVIET, Jalandhar
Volume & Issue No.: Volume3Issue7
Abstract: Image segmentation is the most important part in digital image processing. It is used to analyze the image and can be defined as aprocessing technique used to classify or cluster an imageinto several disjoint parts by grouping the pixels to form aregion of homogeneity based on the pixel characteristics likegray level, color, texture, intensity and other features. The aim of the segmentation process is to get moreinformation in the region of interest in an image which helpsin annotation of the object scene. Thresholding, compression-based, histogram based etc are the various methods of image segmentationbut none of the method has been very much efficient for segmentation in various types of images. So, to overcome this issue new hybrid image segmentation by using gaussian mixture model based HMRF, anisotropic diffusion and the guided image filter has been proposed in this paper. To evaluate the effectiveness of the proposed technique on different kinds of images, various performance metrics have been evaluated.
S.No.: 218
Title : IMPROVED COLOR FILTER ARRAY USING EDGE STRENGTH FILTER
Authors Name: Vikramjeet Singh , Sharanjeet Singh
Authors Affilation: Guru Nanak Dev University, Regional Campus, Gurdaspur
Volume & Issue No.: Volume3Issue7
Abstract: A demosaicing algorithm is a digital image process used to reconstruct a full color image from the incomplete color samples output from an image sensor overlaid with a color filter array (CFA). It is also known as CFA interpolation or color reconstruction. The review has clearly shown that the problem of uneven illuminate has been ignored in the majority of existing research on CFA. The effect of the color artifacts has also been neglected in the existing research. The use of the illuminate normalization has also been neglected which can overcome the issue of uneven illuminate and color artifact. This research work deals with the edge strength filter based color interpolation along with the color normalization in such a way that it can reduce the artifacts of colors in efficient manner. MATLAB tool is used to design and implement the algorithm. The comparative analysis has clearly shown that the proposed technique outperforms over the available one.
S.No.: 219
Title : INTEGRATED ADAPTIVE HISTOGRAM STRETCHING AND SATURATION WEIGHTING BASED COLOR CONSTANCY
Authors Name: Sehaj Rai, Dr.Karanjeet Singh Kahlon
Authors Affilation: Department of Computer Science and Engineering, GNDU
Volume & Issue No.: Volume3Issue7
Abstract: The color constancy is a procedure that measures the influence of different light sources and a digital image. Existing color constancy methods are all based on specific assumptions such as the spatial and spectral features of images. As a final result, no algorithm can be considered as universal. The image recorded by a camera depends on three factors: the physical content of the scene, the illumination occurrence on the view, and the features of the camera. The goal of the computational color constancy is to account for the effect of the illuminate. Many traditional methods such as max RGB, Gray World and learning based methods were used to measure the color constancy of digital images affected by source of light. All these methods have a disadvantage that the light source across the scene is spectrally unvarying. This hypothesis is often violated as there might be more than one light source illuminating the scene. For instance, indoor scenes could be affected both by indoor and outdoor illumination, each having different shadowlike power distributions.
S.No.: 220
Title : Towards a Formal Representation of Cognitive Dissonance Knowledge Application: control driving vehicles
Authors Name: MOUSSALLEM ISSAM, HUSSEIN BILAL, VANDERHAGEAN FREDERIC, CAULIER PATRICE
Authors Affilation: 1Université de Valenciennes, LAMIH UMR CNRS 8201, Valenciennes, France 2 Université Libanaise, IUT, Saida, Liban
Volume & Issue No.: Volume3Issue7
Abstract: This paper presents an approach based on the notion of Object Knowledge (OK) to facilitate the cognition dissonance diagnosis. This approach is enhanced with a Metaknowledge system (Driver-VehicleEnvironment) which will be modeled with objects knowledge and specified by a temporal formal language. We will first present the concept and theory of dissonance and the strategies to reduce it. Then, the approach is tested for controlling driving vehicles. Finally, the paper shows the use of cognitive dissonance diagnosis in real time system.
S.No.: 221
Title : Arm Based Fixtures Monitoring Of CNC Machine
Authors Name: Pingale Namrata Namdev
Authors Affilation: G.H.Raisoni College Of Engineering,Ahmednagar.
Volume & Issue No.: Volume3Issue7
Abstract: This paper introduce a system that used ARM based microcontroller and wireless sensors to control the various devices and to monitor the information regarding the CNC machines parameter using WI-FI technology .If there is any error in machine it can’t be recognized by the person sitting in the office.The existing system is difficult to maintain. This consumes lot of time on communication between technical persons. To overcome this problem we are trying to develop the system. This system will give a informationto the respective technical person according to the error detected.This paper introduce a system that used ARM basedmicrocontroller and wireless sensors to control the various devices and to monitor the information regarding the CNC machines parameter using WI-FI technology .This consumes lot of time on communication between technical persons. To overcome this problem we are trying to develop the system. This system will give a information to the respective technical person according to the error detected.This consumes less time.
S.No.: 222
Title : PSSE SOLUTION USING MODIFIED MODELS OF PSO ALGORITHM: COMPARATIVE STUDY
Authors Name: Diambomba Hyacinthe Tungadio; Jacobus Andries Jordaan; Mukwanga Willy Siti
Authors Affilation: Tshwane University of Technology
Volume & Issue No.: Volume3Issue7
Abstract: The objective of all power system state estimation (PSSE) is to determine, by statistical projections, the best estimate of state variables represented by the voltage magnitudes and voltage angles of all the buses. Due to the complexity and non linearity of the power system (PS), it is necessary to use more advanced methods for its analysis and control in real-time environment. This research discusses the application and the comparison of hybrid models of one of the algorithm using artificial intelligence (AI) technique (particle swarm optimization) in minimizing the raw measurement errors in order to estimate the optimal point of the PS when certain sensitive data are incomplete. The effectiveness of the hybrid models are demonstrated and compared with the original PSO, artificial bee swarm optimization (ABSO) algorithm and genetic algorithm (GA) using IEEE 14, 30, 118 and 300 bus test systems. Newton-Raphson load flow solution is taken as benchmark. Two different objective function formulations assessed by PSWV, EPSOWP, PSO-RF. The first formulation is the Weighted Least Square (WLS) and the second one is the Weighted Least Absolute Value (WLAV).
S.No.: 223
Title : Research on collision risk model in free flight based on position error
Authors Name: Zhang Zhaoning, Shi Ruijun
Authors Affilation: College of Air Traffic Management, Civil Aviation University of China, TianJin, China
Volume & Issue No.: Volume3Issue7
Abstract: The problem of collision risk in free flight with a certain safe distance is studied. In free flight, the collision risk is closely related to the aircraft position error. With the stochastic characteristics, the position error is set to satisfy a three-dimensional Gaussian distribution, and the position error model of the aircraft is established in the horizontal and the vertical direction. Determine the location and the time when the two aircrafts are closest by the nominal route, and calculate the probability that the aircraft appears at any point near the theoretical position by the position error model. Because every collision occurs after conflict, the conflict probability is calculated first, and then the collision risk given safe distance in free flight is modeled. Moreover, the algorithm is presented to use this collision risk model to obtain the minimum safe distance with a safety target level. The results of case study show the feasibility of this model.
S.No.: 224
Title : Ant colony optimization based energy efficient routing algorithm (AERA) for mobile sink based WSN
Authors Name: NavpreetKaur, Er. Jatinder Pal Sharma
Authors Affilation: C.S.E Department G.I.M.E.T
Volume & Issue No.: Volume3Issue7
Abstract: WSN means for Wireless sensor network .WSN consists of a large number of nodes which communicates together through sensing and by monitoring the physical world. There are many application of WSN .In this paper, different protocol of WSN has been discussed,the analysis has shown that the most of the presented technique has abandoned the issues like the effects of the mobile descend in the most of the energy efficient protocols has been ignored. Moreover the effect of lossless data compression has been abandoned by theresearchers. Also no optimization technique is considered for the effective route selection in ERA protocol. Therefore to overcome these issues,an Ant colony optimization based energy efficient routing algorithm (AERA) has been proposed Also the performance of AERA and ERA under mobile sink based wireless sensor networks has been evaluated.
S.No.: 225
Title : Use of honeypot and IP tracing mechanism for prevention of DDos attack
Authors Name: Shantanu shukla
Authors Affilation: Pranveer singh institute of technology kanpur
Volume & Issue No.: Volume3Issue7
Abstract: A DDoS attack is a malicious attempt to make a server or a network resource unavailable to users, usually by temporarily interrupting or suspending the services of a host connected to the Internet. Everybody has been hacked one way or another when dealing with computers. DDoS attackers hijack secondary victim systems using them to wage a coordinated large-scale attack against primary victim systems. These attacks are not easily detected. One of the main difficulties in the detection and prevention of Distributed Denial of Service (DDoS) attacks is That the incoming packets cannot be traced back to the source of the attack, because (typically) they contain invalid or spoofed source IP address. For that reason, a victim system cannot determine whether an incoming packet is part of a DDoS attack or belongs to a legitimate user. Various methods have been proposed to solve the problem of IP traceback for large packet flows.
S.No.: 226
Title : ENHANCED COLOR FILTER ARRAY USING EDGE STRENGTH FILTER
Authors Name: sharanjeet singh, vikramjeet singh
Authors Affilation: guru nanak dev university,regional campus, gurdaspur
Volume & Issue No.: Volume3Issue7
Abstract: A demosaicing algorithm is a digital image process used to reconstruct a full color image from the incomplete color samples output from an image sensor overlaid with a color filter array (CFA). It is also known as CFA interpolation or color reconstruction. The review has clearly shown that the problem of uneven illuminate has been ignored in the majority of existing research on CFA. The effect of the color artifacts has also been neglected in the existing research. The use of the illuminate normalization has also been neglected which can overcome the issue of uneven illuminate and color artifact. This research work deals with the edge strength filter based color interpolation along with the color normalization in such a way that it can reduce the artifacts of colors in efficient manner. MATLAB tool is used to design and implement the algorithm. The comparative analysis has clearly shown that the proposed technique outperforms over the available one.
S.No.: 227
Title : A Latency Reduction Mechanism for Virtual Machine Resource Allocation in Delay Sensitive Cloud Service
Authors Name: Rahul Kumar Sharma, Pragya Kamal, Dr.Sarv Pal Singh
Authors Affilation: 1M.tech Computer Science& Engg. Madan Mohan Malaviya University of Technology Gorakhpur, Uttar Pradesh, India
Volume & Issue No.: Volume3Issue7
Abstract: Resource provisioning in cloud is highly crucial to confirm the delivery of delay sensitive service through cloud like business transaction etc. Reservation into virtual machine takes place based on cloud resource availability. VM resource would be waste because a large number of virtual machine resources are often provisioned to confirm service response time. There were various techniques to measure service response time but these are for selected cloud infrastructures, analyzing and gathering to collect each dataset individually. Few techniques are perform better in offline analysis but not effective for real-time performance measurement. Now, we are proposed an improve and effective light weight mechanism for real time service latency prediction for optimum VM resource allocation in delay-sensitive services of cloud. Our aim is to present actual and accurate time delay and cloud resource conditions in short reflect time by our latency prediction mechanism. We are expecting to get 80-90% accurate service latency prediction in cloud resources.
S.No.: 228
Title : Contribution to development of a dynamic service adaptation architecture
Authors Name: BAROUDI MOHAMMED YASSINE, BENAMMAR ABDELKRIM, BENDIMERAD FETHI TARIK
Authors Affilation: 1Department of Electrical engineering and electronics University Aboubakr BELKAID Tlemcen ALGERIA
Volume & Issue No.: Volume3Issue8
Abstract: Dynamic service adaptation based software architecture has been projected in this article. The services are applying the reusable components. The objective of such adaptation protocol is to augment the functions of the services including their execution context. At an initial phase, user needs will be provided priority and later on other elements could be appended. In this very proposal a special feature of user profile has been suggested which will give the details of the components apart from the context’s elements. All the profiles are compared and compatibility has been checked through an adapter, incompatible regions are detected through this method. Adaptation solutions are investigated and applied via the same adapters and that is done through customization of the individual components wherever and whenever needed, insertion and replacement of the components depending on the need.
S.No.: 229
Title : UPGRADATION OF MOBILITY PATTERN FOR PATH REDUCTION IN MOBILE ENVIRONMENT
Authors Name: Dr.S.Thabasu Kannan, S.Shakeela Banu
Authors Affilation: Principal, Pannai College of Engg & Tech, Sivagangai – 630 561, Tamilnadu, India
Volume & Issue No.: Volume3Issue8
Abstract: With the increasing number of mobile terminals, it is a challenge how to reduce the cost and provide fast and efficient call delivery to the mobile terminals. In the existing system, the call is connected on the basis of the registration of their identity in the databases known as home location register and visitor location register. Here the mobility management is accomplished by a two-tier hierarchical architecture consisting of Home Location Register (HLR) and Visitor Location Register (VLR). It leads to a high volume of signaling traffic and it is suited up to a certain level of call to mobility ratio. The main aim of this paper is to upgrade the formula used for calculating the search cost and location updation cost. By this upgradation, the path traversed from one mobile system to other is reduced. Hence the time taken to retrieve the data is also minimized. Hence the performance can be improved. In this paper, we propose a mobility pattern based location tracking scheme based, which efficiently reduces the location updates and searching cost in the mobile networks. Here various formula used in the existing system has been revised to reach the objectives we have defined. Here we have updated the cost function of existing location management cost, which contains only the number of location updates and the number of paging performed. Here we have seen that the cost of a location update is usually much higher than the cost of paging-several times higher. But in our new scheme, we have defined the number of location updates performed, the number of paging performed, the movement weight associated, the call arrival weight, the vicinity value, the total number of cells in the network, and the set of reporting cells in the network.
S.No.: 230
Title : Designing an Automotive Brake Disc
Authors Name: PRANAY TIWARI, PRANJAL AGRAWAL, DEVANJAN MISHRA
Authors Affilation: MAULANA AZAD NATIONAL INSTITUTE OF TECHNOLOGY, BHOPAL, MADHYA PRADESH, INDIA
Volume & Issue No.: Volume3Issue8
Abstract: using thermal as well as structural analysis while designing a brake disc and its practical results.
S.No.: 231
Title : RIPPLET TRANSFORM BASED MULTISENSOR IMAGE FUSION
Authors Name: ANUSH DOGRA
Authors Affilation:
Volume & Issue No.: Volume3Issue8
Abstract: In this paper, we propose a simple but efficient image fusion method based on Ripplet transform. To check the efficiency of Ripplet transform type -1, we employ multisensor image fusion. The performance of image fusion is evaluated by Q AB/F metric.
S.No.: 232
Title : Importance of Industry Training for Engineering Undergraduate students-case study
Authors Name: Mrs. Veena Patki, Manasi Patki
Authors Affilation: 1Walchand Institute of Technology , Solapur, Maharashtra
Volume & Issue No.: Volume3Issue8
Abstract: This paper is an exploratory study based on training programs within the industry. The information gathered and discerned in this paper will explore the training needs of the engineering students in industry and will give an insight on effectiveness of training in industry. Training is the activity that are designed to provide learners with the knowledge and skills needed for their jobs. Formal education from academic institutions is basically the proper venue for acquiring appropriate knowledge and skills necessary for future employment. Training is part of the tertiary curriculum which connects the gap between theory and practice as well as between classroom education and real industry life.
S.No.: 233
Title : Experimental study of MIG welding and solid state welding for age hardenable AA 7075 aluminium alloy
Authors Name: U.K.Ghodwade, S.S.Patil , Dr. C.L.Gogte
Authors Affilation: M.B.E.Society’s College of engineering, Ambajogai, 431517(M.S.), India
Volume & Issue No.: Volume3Issue8
Abstract: High strength age hardenable 7xxx series aluminium alloy such as AA 7075 is commonly found in several key components of aircraft and automobiles. These alloys are difficult to join by conventional fusion welding techniques. Realizing a weld joint in such alloys without impairing the mechanical properties is difficult task. The 7xxx alloys among the Al-Zn-Mg-Cu versions provide the highest strengths of all aluminium alloys. AA 7075-T6 aluminium alloys with thickness of 3mm were butt welded using friction stir welding and metal inert gas welding (MIG). The joints were compared in terms of electrical conductivity (% IACS), a physical property of aluminium alloy used to define relationship of changes in alloy composition and metallurgy. The same joints were also assessed for hardness and micro structural properties. The results show that the solid state FSW joints have higher electrical conductivity and hardness than MIG joints. The width of heat affected zone of FSW joints is narrower than the MIG fusion welds indicating better mechanical properties. An attempt has been made to correlate the electrical conductivity and the hardness in different weld regions, and found that electrical conductivity and hardness are non linear to each other in FSW joint, but they cannot be co-related to each other in MIG welded joint.
S.No.: 234
Title : A Novel Application Development Approach by SOSE Principles
Authors Name: Musa Midila Ahmed & Sukumar Letchmunan
Authors Affilation: School of Computer Science University Sains Malaysia
Volume & Issue No.: Volume3Issue8
Abstract: SOSE is concern with the theories, principles, methods and tools for building flexible and dynamic business solutions. The main aim of SOSE is to align business requirements with appropriate technological capabilities to achieve overall organizational goals. First, three approaches for service identification; top-down, bottom-up, and meet-in-the-middle techniques are presented, followed by service identification and realization techniques. This technique identifies candidate services as well as decision either to reuse existing service or build service from scratch. Second, building service from scratch requires modeling the organizational business flow. Consequently, BPMN and UML are adopted. The main goal of BPMN is to generate an easy mechanism to construct a business process model to handle the complexities of business organization. UML is used for capturing and expressing relationships, behaviors, and ideas for easy understanding. Finally, the implementation aspect of SCA artifacts enables writing business logic in executable languages such as BPEL, Java, C++, spring, PHP, etc. Service composition is the combination of service components to form a business solution.
S.No.: 235
Title : A procedure to extract defects density induced by electrical stress using gate induced drain leakage current model in n-channel thin film MOSFET Transistors
Authors Name: noureddine maouhoub
Authors Affilation: Faculté des sciences. Université Ibn Zohr
Volume & Issue No.: Volume3Issue9
Abstract: In this work, a procedure has been used to extract the defects density induced by stress on gate induced drain leakage current. The method includes the calculating of experimental ratio of the GIDL current after stress and before stress. We apply different steps of negative stress and positive stress on MOSFET by electrical constraints to validate this procedure and extract the defects density. The transistor used in this work has been fabricated in CNET with oxide thickness equal to 8 nm.
S.No.: 236
Title : IMPROVED ROUTING PROTOCOL USING HYBRID ANT COLONY OPTIMIZATION AND PARTICLE SWARM OPTIMIZATION
Authors Name: NEELAM KUMARI, ARPINDER SINGH SANDHU
Authors Affilation: DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING Beant College of Engineering & Technology
Volume & Issue No.: Volume3Issue9
Abstract: The principle problem of QoS routing would be to setup a new multicast hierarchy that may meet specific QoS concern. In order to lessen the constraints of the earlier work a whole new improved approach is proposed with this exertion. Inside of proposed technique the challenge of multi-cast sapling is removed using clustering primarily based technique. For starters multi-radio along with multichannel primarily based clustering will be deployed along with these bunch head have the effect of the multicasting. Its going to diminish the general energy consumption of nodes along with complexity of intelligent algorithms. The way will end up being evaluated based upon the ish colony marketing. Thus they have produced better results in comparison with other strategies.
S.No.: 237
Title : Designing a GIS Web Basefor locating Health Care locations in KSA Using Google Earth
Authors Name: Dr.Samir MahmoudAdam Abdoalla
Authors Affilation: Computer Science Department, Applied Medical Sciences College, Taif University, Kingdom of Saudi Arabia (KSA)
Volume & Issue No.: Volume3Issue9
Abstract: This study focuses on the development of a web-based GIS for public healthcare system using GIS web base application choosing Google Earth as a sample . The development of thissystem is motivated to provide opportunities for the healthcare workers to gain access to vital information that canaid him/her in the location of viable hospitals for the patients to fully enjoy available enhanced healthcare services. Currently, three major problems still exist in the healthcare geographic applications. This relate to health mappingmethods, reusability of health applications, and interoperability issues. To handle these problems, we design a Web basedGIS for Public healthcare system to support health data sharing and representation. The developed modelmakes it possible to locate the nearest hospitals as well as the services they rendered. With Google Earth, youll be able to see math concepts in a different light. Theyre worth exploring and understanding fully. In Google Earth youll be able to interact with the concepts and see how theyre evident in real life. These lessons are sure to be more interesting than just another page in a math text.
S.No.: 238
Title : Cloud based Mobile Video Recommendation System with User behavior
Authors Name: Ms. Latika R. Gaddam, Mrs. Pratibha S.Yalagi
Authors Affilation: Walchand Institute of Technology Solapur, India
Volume & Issue No.: Volume3Issue9
Abstract: Nowadays, Countless online video services are available Users usually waste lot of time to obtain their interested videos in browsing and watching those videos on mobile. The existing result shows the poor service quality of video streaming over mobile network such long buffering and interrupt happen in the streaming video. The proposed system is a video recommendation system which can speed up the recommendation process and reduce network overhead. The mobile video streamed by using the cloud. For video-sharing mobile application Mobile properties are collected for context aware recommendation. The Cloud based recommendation system is created with Mahout Machine learning library. Core algorithms of Mahout are used for classification, cluster and collaborative Moreover filtering. We use Mahout’s user and item based recommendation and user behavior. The System collects user, item, rating, genre and viewing time for creating clusters of user profiles to generate implicit preferences video recommendations. Mobile properties such as location, time and network types are used to generate recommendation rules. User context and profile clusters are used for finding video recommendation from the massive amount of video collection on cloud. The proposed system can recommend desired services with high recall, high precision and low response delay.
S.No.: 239
Title : Smart Intrusion Detection System (Double guard)
Authors Name: Jadhav Priya Babaji,Hadawale Shwetali Namdev,Pinjarkar Nilesh R.
Authors Affilation: Sahyadri Valley College Of engineering and technology,rajuri
Volume & Issue No.: Volume3Issue9
Abstract: For enabling communication and the personal information management from anywhere, an inextricable part of daily life is the Internet services and applications. To entertain this increase in application and complexity of data, web services have moved to a multi-tiered design wherein the application front-end logic runs by the web server and to a database or file server the data are outsourced. In this system, we propose an IDS system which is Double Guard, that models the network user sessions behavior across both the back-end database as well as the front-end web server. By monitoring both web and subsequent database requests we are able to ferret out attacks that independent IDS would not be able to identify. Furthermore, in terms of sessions of training and functionality coverage we measure any multitier IDS limitations. With My SQL and lightweight virtualization with the help of an Apache web server we implement Double Guard. In both dynamic and static web applications the real-world traffic then processed and collected over a 15-day of system deployment period. Finally, using Double Guard, we will able to display a wide range of attacks which will give the 100 percent accuracy while for web services which are static, 0 percent false positives maintain by it and for web services which is dynamic, it is 0.6 percent false positives.
S.No.: 240
Title : Smart Traveller- Proficient Taxi Business Application
Authors Name: Jadhav Mayuri Vilas,Gadge Varsha Anil,Aher Priyanka S.
Authors Affilation: Sahyadri Valley College Of engineering and Technology,Rajuri
Volume & Issue No.: Volume3Issue9
Abstract: FOR EFFICIENT TAXI BUSINESS BASED ON GPS HAS BECOME AN IMPORTANT TOOL, THE TAXI FLEET MANAGEMENT SYSTEM. IT CAN BE USED PROVIDING USEFUL INFORMATION FOR TAXI DRIVERS TO EARN MORE PROFIT BY MINING THE HISTORICAL GPS TRAJECTORIES AND ALSO FOR THE SAKE OF FLEET MANAGEMENT. FOR NEXT CRUISING LOCATION WHICH COULD BE A VALUE ADDED MODULE OF THE FLEET MANAGEMENT SYSTEM, WE PROPOSED A TAXI RECOMMENDER SYSTEM. TO PROVIDE THE SIMILAR OBJECTIVE WE INVESTIGATED, THREE FACTORS CONSIDERED IN DIFFERENT WORKS, WHICH ARE DISTANCE BETWEEN THE CURRENT LOCATION AND THE RECOMMENDED LOCATION, FOR NEXT PASSENGERS WAITING TIME, AND EXPECTED FARE FOR THE TRIP. IN ADDITION TO THESE FACTORS, BASED ON DRIVERS EXPERIENCE WHICH IS THE MOST LIKELY LOCATION WE CONSIDER ONE MORE FACTOR TO PICK UP PASSENGERS GIVEN THE CURRENT PASSENGER DROP OFF LOCATION.TO CAPTURE THE RELATION BETWEEN THE PASSENGER GET-OFF LOCATION AND THE NEXT PASSENGER GET-ON LOCATION, A LOCATION-TO-LOCATION GRAPH MODEL, REFERRED TO AS OFF-ON MODEL, ADOPTED. TO ESTIMATE THE EXPECTED FARE FOR A TRIP STARTED AT A RECOMMENDED LOCATION WE ALSO ADAPTED AN ON-OFF MODEL, TO EVALUATE THE PROPOSED SYSTEM. A SIMULATOR SIMULATES CRUISING BEHAVIOUR OF TAXIES IN THE DATASET A REAL WORLD DATASET FROM CRAWDAD IS USED AND ONE VIRTUAL TAXI WHICH CRUISES BASED ON OUR RECOMMENDER SYSTEM.
S.No.: 241
Title : PARTICIPATION OF TESTING TO ATTAIN A DEGREE OF QUALITY OF SOFTWARE
Authors Name: Mansi Sharma, Asst. Prof. Mr. Praveen Gupta
Authors Affilation: Pranveer Singh Institute of Technology Kanpur, Uttar Pradesh, India
Volume & Issue No.: Volume3Issue9
Abstract: Software quality is the characteristic of the software that defines how well the software meets the customer requirements, business requirements, coding standards etc. It can be divided into two categories: Software Functional Software Functional Quality: characteristics that define how well the software meets functional requirements, and how well it satisfies the end-user. Software Non-Functional Quality: characteristics that define how well structural requirements are met that support the delivery of functional requirements. It is usually related to software code and internal structure. Following are the different attributes (parameters) that are used to measure the software quality: Testability ,Usability ,Understandability ,Consistency, Efficiency ,Effectiveness ,Accuracy ,Maintainability ,reliability ,Portability ,Security, Robustness and testing is first step towards software quality this paper depicts how testing helps to measure the software quality as objective of testing is to find the defect and get them fixed as early as possible. This paper also describes how we can achieve quality assurance through use of selenium IDE tool and how communication take place between developer and tester through bugzilla tool?
S.No.: 242
Title : View Selection Issues in Data Warehouses Environment
Authors Name: Mr. Ashish S. Sambare Dr. R. Nedunchezhian
Authors Affilation: Anna University Chennai
Volume & Issue No.: Volume3Issue10
Abstract: On-Line Analytical Processing (OLAP) tools are frequently used in business, science and health to extract useful knowledge from massive databases. An important and hard optimization problem in OLAP data warehouses is the view selection problem, consisting of selecting a set of aggregate views of the data for speeding up future query processing. A view always shows up-to-date data. The database engine recreates the data, using the view’s SQL statement, every time a user queries a view. The goal of on-line analytical processing (OLAP) is to quickly answer queries from large amounts of data residing in a data warehouse. Materialized view selection is an optimization problem encountered in OLAP systems. In computing, a materialized view is a database object that contains the results of a query. For example, it may be a local copy of data located remotely, or may be a subset of the rows and/or columns of a table or join results, or may be a summary based on aggregations of a table’s data.
S.No.: 243
Title : Determination of Water Demand Management in GCC Using GIS
Authors Name: Dr.Samir Mahmoud Adam Abdaalh
Authors Affilation: Computer Science Department, Faculty of Computers and Information systems Taif University, Kingdom of Saudi Arabia (KSA).
Volume & Issue No.: Volume3Issue10
Abstract: GCC(Gulf Councel Countrie ) is facing potential water shortages. The alarming increase in the scarcity of water in various parts of the world. Water is a main issue in many countries especially in those GCC, it has focused a global attention on the need for a stronger and more appropriate water resource management and availability solutions. imperative for nations to come up with more focused and direct measures that would address and stem this resource scarcity. Water sustainability needs a balance between demand and availability. The main objective ofthis paper is the application of these concepts to Arabs countries. Water demand management is about achieving a reduction in the use of water resources, normally through increased efficiency of water application. The management of water resources was not explicitly included in the past from thirty-five years in all most of those countries normative system partly because water was believed to be a free good in mind, and was not accepted to have a price to pay to use it. This work contributed to a low efficiency of water use and waste of it, and water prices are often well below levels needed to cover the costs of the system. Moreover, this contributes to a worse quality of water, and, as quality of water decrease, the management of water resources becomes more challenging and the need to integrate water quality into an overall water resources management grows. The main goal of this paper is showing, how Geographical Information Systems (GIS ) can be used to support infrastructure planners and analyst on water demand of a local area in GCC they are (Saudi Arabia ,Kuwait, Bahrain, Oman and UAE).
S.No.: 244
Title : One to one mapping list for SQL Injection attack detection System
Authors Name: Swati Dwivedi
Authors Affilation: Jawaharlal nehru college of technology,Rewa (m.p.)
Volume & Issue No.: Volume3Issue10
Abstract: Web application are always susceptible to attacks, as many attacking techniques are present for web application, banking ,reservation, education etc and various applications are completely dependent on Internet.SQL Injection attack, one of the major and open attacking technique ,which destroys web application by the analysis of database finger printing and signatures. The SQL Injection attack occurs due to modification of dynamically generated query. here, the mapping techniques checks the authenticity of query with the attacking points ,if found in query ,It if tested on different query dataset and the results are comparable
S.No.: 245
Title : Design and Development of Head Motion Controlled Wheelchair
Authors Name: Satish Kumar, Dheeraj, Neeraj, Sandeep Kumar
Authors Affilation: MIT CEM BANI, Hamirpur (H.P.), India
Volume & Issue No.: Volume3Issue10
Abstract: The aim of the project is to design a wheelchair tilt communicator system that could operate the wheelchair of the handicapped person with the help of tilt of head movements. This system could be used by physically disable persons who cannot move their hands or legs but make head and eye motions. This wheelchair could be operated in any direction using head tilt movements by the handicapped person. Design and development of Head motion controlled wheelchair has been achieved using tilt sensors and wireless modules. The system is implemented practically and works well with a person sitting on it and has a weight bearing capacity of upto 100 kg. This wheelchair is aimed to be designed at a lower cost as compared to the other versions available in the market. The head motion controlled wheelchair designed using tilt communicator system turns out to be a great use for quadriplegic patients and disabled people having more than 45% or more disability as this could be operated easily through head gestures. Index Terms—, Tilt sensors, Wireless control, Gesture based control, Gear Ratio.
S.No.: 246
Title : Image Steganography using DWT Transform Compression
Authors Name: Poonam Survase
Authors Affilation: RSCOE
Volume & Issue No.: Volume3Issue10
Abstract: Steganography is proved to be effective if it provide two attributes: high security and second optimum compression. Image compression is obtained as it not only reduces storage but also benefits transmission. In this paper the image steganography is achieved with enhanced security by using QR code and compression using DWT transform algorithm , compression is achieved without affecting vision of the actual cover image due to addition of secret information which is in form of QR codes. The process for embedding the QR codes has been carried out using Embedding and Extraction algorithm which insures secure and fast transmission of stego image. Here aim is to conceal a secret image into the cover image of the reduced size without noticeable degradation . The effectiveness of the proposed method has been estimated by computing Mean square error (MSE) and Peak Signal to Noise Ratio (PSNR).
S.No.: 247
Title : Tumor detection with EEG Signals usingWavelet Transform
Authors Name: Ankush Surkar
Authors Affilation: Priyadarshini COE Nagpur
Volume & Issue No.: Volume3Issue10
Abstract: The Brain tumor harmful disease of brain. 10 Billion or more working cells contained in a brain cells. Normally, damaged cell turnover takes place in an orderly and controlled manner. If in curtained condition the process gets out of control then the cells will continue to divide and developing into a lump, that causes a tumor. Brain tumors are classified into two types that is primary brain tumor and secondary brain tumor. The detection of primary brain tumor which is also called as Gliomas is possible by analyzing EEG signals. This paper, proposes a method to classification EEG signal for detection of primary brain tumor detection, that is combination of multi-wavelet transform and artificial neural network. Uncertainty in the EEG signals is measured by using the Approximate Entropy. The proposed method will implemented, tested and compared with existing method based on performance indices such as sensitivity, specificity, accuracy; results are promising with accuracy of upto 80%.
S.No.: 248
Title : Analysis on Brake Shoe of ICF Bogies
Authors Name: Ambikaprasad Omprakash Chaubey
Authors Affilation: GHRCE , NAGPUR
Volume & Issue No.: Volume3Issue10
Abstract: An overview of design methods for thread braking systems is given with special focus on the braking capacity. Several aspect of the tread braking system, important for the dimensioning of railway brake shoe pad, are assessed, such as brake block material, residual stresses and temperature gradients through wheel disc. The influence of heat partitioning between wheel, brake block and rail on wheel temperature for different braking cycle is consider. The existing air brake system of Railway coach has the following drawbacks due to excessive brake force on the brake blocks - thermal cracks on wheel tread, brake binding and reduced life of brake block. The aim of the project is to overcome the above said drawbacks by reducing the effective brake force on the brake blocks without affecting the existing designed (Braking Function) requirements. To validate the strength of train brake, Structural and Modal analysis are to be done on the train brake.. In this project we are going to do failure analysis on brake shoe by stress analysis and thermal analysis using software and after that we will suggest alternative solution to avoid or reduce the problems.
S.No.: 249
Title : AN OVERVIEW OF AERODYNAMIC BEHAVIOUR OF WIND TURBINE BLADE
Authors Name: PROSUN ROY
Authors Affilation: BCHELOR OF TECHNOLOGY, DEPARTMENT OF MECHANICAL ENGINEERING TECHNO INDIA COLLEGE OF TECHNOLOGY
Volume & Issue No.: Volume3Issue11
Abstract: Wind turbine is a device that extracts kinetic from wind and converts it into mechanical energy. These can only be understood with a deep comprehension of the aerodynamics. This paper focuses primarily how the blade captures wind power. The majority of the paper details the analytical approach for the analysis of aerodynamics and performance of wind turbine blades. The analysis of aerodynamic behavior of wind turbines can be started without any specific turbine design just by considering the energy extraction process. Additionally, more advanced method “blade element momentum theory” (BEM) is also introduced briefly. A number of mathematical and analytical treatments have extended the knowledge of the physics and mechanics behind the aerodynamics forces. Actually, this article outlines briefly an overview of wind turbine blade analysis based on aerodynamic forces i.e. lift force and drag force. Indeed, the design of blade according to aerodynamic requirements is crystal clear through this paper.
S.No.: 250
Title : PORTABLE DEVICE FOR SECURE DATA TRANSMISSION TO AND FROM REMOVABLE DRIVES
Authors Name: Miss.Sayali D. Wavikar, Miss. Swapnali S. Ravle
Authors Affilation: Students Master of Computer Application MGM’s Jawaharlal Nehru Engineering College (JNEC), Aurangabad, Maharashtra, INDIA.
Volume & Issue No.: Volume3Issue11
Abstract: This research paper gives a useful idea for a device which is beneficial for every removable-drive users. This portable device is a embeded system, which will check memory or size of USB-drive and also check how much amount memory is vacant or full.This device can also copy data from one removable drive to another and also using bluetooth connectivity and WI-FI connectivity to this device we can able to transfer or receive data of mobile phones to and from attached removable drive .The most important feature of this device is that when removable drive is attached to it, it scans and removes the viruses and malicious data which is in USB- drive and act as a antivirus. This system which is capable to attach two removable drives,one towards the input and another towards the output side. This device also has a display screen which is touch sensitive, and very easy for user convenience and efficient.Portable device provides facility to choose folders or files customizable and also can see size of file. It works on small and chargeable battery with a backup of 4 to 5 hours. It is a most useful device to use it on the move.
S.No.: 251
Title : IT Governance Model Based on IT Governance Framework, Case Study: Universities in North Sumatera, Indonesia
Authors Name: Roni Yunis; Kristian Telaumbanua
Authors Affilation: Department of Information System STMIK Mikroskil, North Sumatera Indonesia
Volume & Issue No.: Volume3Issue11
Abstract: IT Governance framework can be identified by three elements in it such as, elements of structure, process, and IT Governance relationship mechanism. In this paper we will discuss about elements of IT Governance Model based on IT Governance component that accordance with the needs of the higher education. The use of IT Governance component based on components delivered by M. Mohseni [1] and add some new components based on previous research [2]. All these components were selected and analyzed again by the CIO perspective at several universities with case studies; universities in North Sumatra, Indonesia. Element of IT Governance model ranging from policy, structure, IT management processes, standards and procedures used in support of good IT Governance for Higher Education. Model IT Governance of Higher Education cover by IT Governance Framework COBIT 5, objective of model to align IT and business strategies. Element of model IT Governance can be adoption by Higher Education institution for governance and management of information system and technologies.
S.No.: 252
Title : STRESS ANALYSIS OF PRESSURE VESSEL WITH DIFFERENT END CONNECTIONS
Authors Name: Dr. D. V. BHOPE
Authors Affilation: RAJIV GANDHI COLLEGE OF ENGINEERING RESEARCH AND TECHNOLOGY, CHANDRAPUR
Volume & Issue No.: Volume3Issue11
Abstract: Abstract: A thin cylindrical pressure vessel has been analyzed for different end connections using analytical and finite element analysis. The main objective of project is to compare stress distribution in the pressure vessel for different end connections viz. hemispherical, flat circular, standard ellipsoidal and dished shape. The various dimensions of pressure vessel like internal diameter, thickness of vessel and end connections has been decided using analytical design and three dimensional model is prepared in modeling software Pro-E and analyzed using FE tool ANSYS. The analysis has been carried out for 2-D axysymmetric analysis, 3-D horizontal pressure vessel with saddle support and vertical pressure vessel over the stand.
S.No.: 253
Title : 3D Reconstruction based on multiple images views
Authors Name: H. Bakry, S. Abdel-Ghani, S. M. Kareem
Authors Affilation: Information Systems Department, Faculty of Computer and Information Sciences, Mansoura University, Egypt
Volume & Issue No.: Volume3Issue11
Abstract: The extract key points and matching the pictures are the most paramount reconstruction 3D factors. They almost two-thirds the time of reconstruction. This paper presents a method to extract the most paramount key points, through the use of GrabCut algorithm that elimintes considerable parts of images that does not have its prominence in the reconstruction moreover, the proposed algorithm uses siftGPU algorithm that run parallel to any process more than one image at a time to extract key points and carry out matching process. The experiments show that the proposed system increase of the speed of reconstruction and thoroughly good.
S.No.: 254
Title : An enhancing approaches using Delphi Against Wormhole Attacks Detection in MANET.
Authors Name: Akanksha khare
Authors Affilation: BIST Bhopal
Volume & Issue No.: Volume3Issue12
Abstract: Wireless network is at its peak nowadays to be connected anytime and anywhere popularity is desired. Mobile Ad Hoc Network (MANET) is a former and existing infrastructure to determine the topology of wireless mobile nodes that do not need, have been distributed. In this work we, through the wormhole attack detection and prevention, which is helpful to present a mechanism for Receiver for different path delay and verification of digital signatures by looking at the signs of Per Hop (Delphi) and TTL delay. These systems detect and pinpoint the location of the wormhole to stop them.
S.No.: 255
Title : POWER COMMUNICATION USING OPTICAL FIBER
Authors Name: SAURABH, VARUN KUMAR
Authors Affilation: DR. KEDAR NATH MODI INSTITUTE OF ENGINEERING AND TECHNOLOGY
Volume & Issue No.: Volume3Issue12
Abstract: Power transmission is a very important tool in electrical engineering field. In power transmission it is very necessary to communicate from on location to another. For such communication it is generally desired to have a wired communication but that cost too high and also faces the problem of interference of power frequency of 50Hz /60Hz with communicating frequency of GHz. To win over this problem certain improvement in wired communication or else wireless communication can be chosen but wired communication is given priority over the wireless communication due to economic considerations and the complexity of the wireless communication. Also wireless communication use is prohibited in the radioactive zone of the nuclear plants. Here a brief detail on the power communication using Optical fiber will be presented.
S.No.: 256
Title : Possible benefits, returns and the economic rewards of Medical Tourism in Zimbabwe.
Authors Name: Maphosa Thembinkosi
Authors Affilation: Scholar Department of Tourism, Leisure and Hospitality Management, University of Zimbabwe.
Volume & Issue No.: Volume3Issue12
Abstract: Medical Tourism also called health tourism or medical travel describes the private purchase and arrangement of medical care by patients across international borders. It is a rapidly growing industry. There are many factors or rewards that medical tourism can contribute to the host economy; such as: Economic growth, advanced technology, advancement in communications, providing better, access to health care, information, and improved logistics and healthcare standards and tourism revenues. With these factors above, the pool of patients to Zimbabwe must expand naturally. Currently the pool of patients is described more with internal movements such as rural (clinic) to urban (hospital). There is need to expand the pool so to attract external medical tourists and more internal medical tourists.
S.No.: 257
Title : Strengthening in AODV routing protocol by Flooding Attacks discrepancy of TTL parameters to improve overall recital
Authors Name: Sushma Kushwaha
Authors Affilation: Bansal Institute of Science and technology
Volume & Issue No.: Volume3Issue12
Abstract: Mobile ad hoc networks (MANETs) mobile nodes connected by wireless links to self - configuring the network. Self configurability and rapid deployment of MANET feature that enables users to the most attractive option. Routing in the network decides the network performance, which is an important issue. Ad Hoc on-demand distance vector (AODV) routing algorithms are widely used is reactive protocol. Energy consumption and the delay to a number of researchers is the main concern which has to solve. Due to the unbalanced node to use, battery powered nodes drain faster than some of the others. Re-discovery of this pathway in delay and larger than average end to end control overhead is causing a problem. In this paper we gain an improved AODV protocol in which a copy of diversity and flooding attacks are presented. Proposed protocol can improve energy among nodes, the average end -to-end network delay, a delay reduction, which reduces and stabilizes the system conserves and introduces a stability factor. An NS3 simulator is used to compare the performance of AODV and AODV. Simulation results of the variation of node mobility, stoppage time , with the rate of network field and sent packets are observed by wireless network scenarios . The result of the delay in mobile scenarios is energy consumption and end to end QoS and other parameters without affecting much, show significantly decreases. Also proposed improved packet delivery protocol
S.No.: 258
Title : Big Data-Survey
Authors Name: P.S.G. Aruna Sri, Anusha M
Authors Affilation: K L University
Volume & Issue No.: Volume3Issue12
Abstract: Big data is the term for any gathering of information sets, so expensive and complex, that it gets to be hard to process for utilizing customary information handling applications. The difficulties incorporate investigation, catch, duration, inquiry, sharing, stockpiling, Exchange, perception, and protection infringement. To reduce spot business patterns, anticipate diseases, conflict etc., we require bigger data sets when compared with the smaller data sets. Enormous information is hard to work with utilizing most social database administration frameworks and desktop measurements and perception bundles, needing rather enormously parallel programming running on tens, hundreds, or even a large number of servers. In this paper there was an observation on Hadoop architecture, different tools used for big data and its security issues.
S.No.: 259
Title : A review on Static Three Point Bending Load on Composite Sandwich Panel.
Authors Name: Nitin Ratan Gir
Authors Affilation: college of engineering osmanabad ,BAMU university.
Volume & Issue No.: Volume3Issue12
Abstract: The use of sandwich structure continues to increase rapidly due to the wide fields of their application, for instance: satellites, aircraft, ships, automobiles, rail cars, wind energy systems, and bridge construction to mention only a few. The sandwich composites are multi-layered materials made by bonding stiff, high strength skins facings to low density core material. The main benefits of using the sandwich concept in structural components are the high stiffness and low weight ratios. In this paper static behavior of honeycomb sandwich composites are investigated through three-point bending.
S.No.: 260
Title : A Survey Paper on Prepaid Electricity Distribution System
Authors Name: SHRADDHA YADAV,PRATEEKSHAPANDEY
Authors Affilation: Chhatrapati Shivaji Institute of Technology
Volume & Issue No.: Volume3Issue12
Abstract: The electricity energy saving scheme is used in business, agriculture, domestic and general purpose. The problem occurs in postpaid scheme is, there is no control of use of electricity from the consumer side and the problem of collection of meter reading and also in generating the bill. In this project technique used for prepaid scheme using smart meter included the embedded system and GSM for sending and receiving the SMS through GSM network. Smart meter is a meter which is attached with the existing meter in embedded system which helps the consumer to send a SMS for their day to day power consumption. The aim of this project is to control the consumption of electricity in consumer side. Establish a communication network between the consumer and service provider using GSM. Service provider verify the meter id and card number and accept the request and recharge the meter. The aim of this project is to minimize the queue at the electricity billing counters and to retrieve the electricity automatically. The project also aims at proposing a system that will reduce the loss of power and revenue due to power theft and other illegal activities. The automated billing system will keep doing of real time consumption and will leave little scope for disagreement on consumption and billing. The project also addresses about various debugging tools such as Keilμ4 Vision. Smart meter enable two-way communication between the meter and the central system. Smart meters are also believed to be a less costly alternative to traditional time of uses meter and are intended to be used on a wide scale with all customer classes.
S.No.: 261
Title : Implement of Image Authentication by Encryption Procedure using LDPC Codes
Authors Name: imran khan , Mr, k.suresh , Miss Ranjana Batham
Authors Affilation: IVEKANAND GROUP OF INSTITUTE ,BHOPAL
Volume & Issue No.: Volume3Issue12
Abstract: In this paper, we prefer a way using encryption technique and LDPC origin coding for the image authentication complication. Image authentication is relevant in contented delivery via entrusted intermediaries, just for peer-to-peer (P2P) file sharing. More separatly encoded versions of the original image efficacy exist. In addition, intermediaries may tamper with the contents. Diffrent appropriate diversity from mean manipulations is the protest addressed in this research. The main idea is to add a Slepian-Wolf encoded quantized image point as verification data which is repeatedly encrypted using a secret key cryptography since ready to send. This might be correctly decoded with the advice of an authentic image as side information. This structure provides the like robustness across appropriate variations although find illegitimate modification. The decoder absorb expectation maximization (EM) algorithms may authenticate images whatever have supported contrast, brightness and even corrupt alteration. Our different authentication system also others changing localization by using assumption over a factor graph that represents tampering model.
S.No.: 262
Title : Medical Tourism an economic activity; focus on marketing Zimbabwe as a potential medical tourism destination
Authors Name: Maphosa Thembinkosi
Authors Affilation: Scholar, department of Tourism, Leisure and Hospitality Studies, University of Zimbabwe
Volume & Issue No.: Volume4Issue1
Abstract: Present day developing economies such as India, South Africa and Nigeria are making maximum use of medical tourism as a strategy to continuously improve their economies and lure more tourists. At the same-time this research explores and examines the potential impact of medical tourism on Zimbabwe’s economy. The research brought out a positive relationship between medical tourism and the economy in Zimbabwe. It enlightened that medical tourism can improve standard of living, foreign currency reserves, balance of payments, economic relations with other economies and employment. On the other hand, what puzzles most and can be a challenge to implement medical tourism in Zimbabwe is the ‘needs’ of patient movement. Internal / domestic patients make movements more focused on medical reasons than tourism activities. External / international patients are more for tourism activities than economic activities. However there testimonies of external patients who have received and are still receiving medical treatment in Zimbabwe, from either a medical doctor, traditional healer, apostolic sect healers or from hot springs. Key words: Medical tourism, economic development, internal and external patient movement.
S.No.: 263
Title : Performance of Dual-Bridge High Frequency Resonant DC/DC Converter for Energy Storage Application
Authors Name: Gurupal K. Gaishane, Anil S. Sindekar
Authors Affilation: Government College of Engineering Amravati
Volume & Issue No.: Volume4Issue1
Abstract: A bidirectional dual-bridge high-frequency isolated resonant DC-DC converter is gaining more attention in renewable energy system due to its high power density, small size, reducing stress and removing electromagnetic interference noise. In this paper the simulation of dual bridge LC-L resonant converter is carried out for resistive and battery load. The simplified steady state analysis using complex ac analysis is given and conditions for zero voltage switching are presented accordingly. A closed loop control operation of a converter using PI controller is suggested to minimize the reverse power flow for battery load.
S.No.: 264
Title : Open and Distance Learning Assessments value chain challenges: An explorative study of BOCODOL School of Business and Management studies
Authors Name: Phetogo Sechele- Mosimanegape and Clever Gumbo
Authors Affilation: BOCODOL and Botho University, Botswana
Volume & Issue No.: Volume4Issue1
Abstract: This empirical study has explored the role and importance of quality assurance through the open and distance assessments value chain systems. A value chain framework is an approach for breaking down the sequence (chain) of Open and Distance learning (ODL) systems into the strategically relevant activities through which efficacy is added to the learners’ assignments and examinations systems. This paper has considered the relationship between quality assurance and open and distance education, and between quality assurance and learners’ assignments and examinations systems .It is our conviction that quality assurance for distance higher education is a prerequisite that guarantees competitiveness of an institution’s qualifications thereby instilling stakeholders’ confidence. To instill and retain its desired credibility, an open and distance learning institution should be benchmarked on robust integrated quality assurance processes through the value chain systems. This study focused on assignments and examinations mode of assessment in business. Constrained resources (financial, human, technological), outsourcing of the tutors, and lack information and technology systems were found to be the main challenges against quality sustainable assessment systems. This study was done in Gaborone (Botswana) and Francistown through face to face interviews with eight (8) various stakeholders. While there are many quality drivers towards ODL products, this study found that the main determinants of effective quality assurance through the assessment value chain include effective corporate governance, efficient and effective human capital, modern information technology based systems supported by a sound funding foundation.
S.No.: 265
Title : Hierarchy Based Distributed Scheduling Algorithm for Mobile Data Gathering in WSN
Authors Name: U. Palani
Authors Affilation: Associate Professor & Head, Department of Information Technology, I.F.E.T College of Engineering, Gangarampalayam Post, Villupuram-605 108 Tamil Nadu,
Volume & Issue No.: Volume4Issue1
Abstract: In this paper, priority based distributed scheduling algorithm for mobile data gathering in Wireless sensor networks (WSN) is proposed. This proposed method involves data exchange policy to avoid dropping and then distributed scheduling algorithm for data gathering. Initially, the centralized algorithm places the polling points (PPs) on the shortest path. These polling points (PP) buffer locally aggregated data and upload the data to the mobile data collector when it arrives. The data is classified as high and low priority based on the deadline and urgency. At the second module, data exchange policy is processed and it is used in order to avoid dropping of higher priority data, data can be exchanged between two mobile data collectors. Finally in the distributed scheduling algorithm, the time slots are scheduled according to which the data collector could gather the maximal amount of data within a limited period. By simulation results, we show that the proposed algorithm minimizes the data losses and reduces energy consumption.
S.No.: 266
Title : Prediction Based on Ant Colony For Handover Management in PCS Networks
Authors Name: Alyaa Abdou Hamza 1, Ahmed.I.Saleh 2, Mohamed sherif elkasas3
Authors Affilation: Mansoura University, Faculty of Engineering, Department of Computer Engineering and Systems, Mansoura city, Cairo
Volume & Issue No.: Volume4Issue1
Abstract: Mobile phones are used in everyday life exceedingly, human behaviors can be detected by analyzing mobile phone data. Handover (handoff) is one of process which affects the quality of the call during users’ mobility from cell to another. In this paper, we propose a new mechanism to reduce handover problem by predicting the future movement of mobile users. This mechanism is Ant Prediction Engine (APE) is used when a user has insufficient history or a new mobile user. It depends on neighbors’ history to predict future user mobility.
S.No.: 267
Title : Appraisal Management System using Data Mining Classification Technique.
Authors Name: Nikhjil N. Salvithal, Dr. R. B. Kulkarni
Authors Affilation: Walchand Institute of Technology, Solapur, Maharashtra.
Volume & Issue No.: Volume4Issue1
Abstract: Performance appraisal may be a method within which staff are rated on however well they need met performance expectations. Performance appraisals are meant to support employees’ selections, as well as promotions, terminations, training, and remuneration will increase. This task involves lots of social control selections that depends on numerous factors like human expertise, knowledge, preference and judgment. of these factors will cause inconsistent, inaccurate, difference and unpredictable selections. DM is rising knowledge analysis tool and wide utilized in order to supply valuable information for deciding. DM classification methodology are often used for talent statement, particularly for employee’s job promotion. within the planned system the assorted classifier algorithms are going to be applied on Talent dataset to spot the talent set so as to judge the performance of the individual. Finally counting on accuracy one best suited classifier is chosen this method has been used to construct classification rules to predict the potential talent that helps in determining whether or not the individual is acceptable for promotion or not.
S.No.: 268
Title : FACTORS AFFECTING THE UNSYMMETRICAL PUNCHING SHEAR RESISTANCE OF HIGH-STRENGTH CONCRETE SLABS
Authors Name: mansour mohmmed abdel-halim
Authors Affilation: faculty of engineering-ain shams university-cairo-egypt
Volume & Issue No.: Volume4Issue1
Abstract: ABSTRACT One of the most common floor systems is the flat slabs. It provides architectural flexibilities, more clear space, less building height, easier form work and consequently shorter construction time. A serious problem that can arise in flat slab is the brittle punching shear failure due to shear and moment transfer from slabs to columns. As a result of the combined effect of the moment and the shear, stress is no longer uniformly distributed in the vicinity of the column. High- strength concrete is a new type of concrete that having mechanical properties that are far superior to those of conventional concrete. The main characteristics of HSC are then improved. This thesis discusses the behavior of punching shear strength of flat slabs subjected to centric and eccentric loading, with and without shear reinforcement. In this way, 5 concrete slabs (1450 ×1450×150) with edge column; and reinforced by 10diameter 18mm/m bottom steel; and 5 diameter 10/m top steel for all slabs; were casted to examine different parameters such as concrete strengths and effect of shear reinforcements (central mesh and shear studs). A finite element program (ANSYS® Release 14) was applied to model the tested specimens to predict the behavior and compatibility between experimental and theoretical investigations to display the difference in behavior considering cracking and failure loads as well as deformations and strains. Keywords: punching shear, shear reinforcement, flat slabs, and high strength concrete.
S.No.: 269
Title : Improved fuzzy technology for instant searching
Authors Name: Bhagyashri G. Patil and S. N. Holambe
Authors Affilation: TPCT COE, Osmanabad
Volume & Issue No.: Volume4Issue1
Abstract: Query logs provides a way that how users using search techniques. Depending how data is collected log is created which contain additional information. Query log collect information without disturbing users from normal interaction with system. Normally query logs collect information such as identification of users and or results of query typed by users. Generally now days most of researchers uses information collected by query log for search process of search engines. Information collected by query log is used for any different ways such as to provide context during search, for query classification, for intention of search. Query log are important in information retrieval.
S.No.: 270
Title : Review on Email Spam Filtering Techniques
Authors Name: Shiva Sharma, U. Dutta
Authors Affilation: Computer Science and Engineering Department, Maharana Pratap College of technology Putli Ghar Road, Near Collectorate, Gwalior-474006, Madhya Pradesh, India
Volume & Issue No.: Volume4Issue2
Abstract: In this paper we present email spam filtering and email authorship identification. Electronic mail is used by millions of people to communicate around the world daily and is a mission-critical application for many businesses. Over the last 10 years, unsolicited bulk email has become a major problem for email users called senders and receivers. And the recent years spam became as a big problem of internet and electronic communication known as users. There is developed lot of techniques to fight them. We presents the overview of existing e-mail spam filtering methods is given. The classification, valuation and juxtaposition of traditional and learning based methods are provided. I think using this paper user can understand easily spam filtering techniques and user can protect from spammed mails to financial damage, mentally damage to companies and annoying individual users.
S.No.: 271
Title : Minimal grasper
Authors Name: Rajina c
Authors Affilation: malabar institute of technology Anjarakandy,Kannur
Volume & Issue No.: Volume4Issue2
Abstract: A fliexible enveloping grasper is proposed for grasp and place task with low manipulation and task planning complexity for practical applications .The proposed grasper has two main characteristics self adaptively and flexibility These two properties helps the grasper to minimize internal forces and to achieve successful force distribution.
S.No.: 272
Title : Security & Concurrency control in Real-Time Database Systems: A Survey
Authors Name: Ebrahim Abduljalil1, Dr.S.B.Thorat2
Authors Affilation: School of Computational Science, SRTM University, Nanded, Maharashtra, India
Volume & Issue No.: Volume4Issue2
Abstract: Real-time Database Systems (RTDBS) ought to fulfil timing constraints related to transactions. Usually, a timing constraint is stated as a deadline, which is characterized as a necessity to be utilized by schedulers. Currently, security becomes another significant challenge in several real-time systems. In many systems, sensitive information is expressed by numerous users with various levels of security clearance. More complicated database systems are now being employed in applications that need to support timeliness while coping with sensitive information. Key issues of real-time developers have been addressed in this paper. Furthermore, an extensive survey of real-time systems research has been presented. The survey classification of the proposed mechanisms has been proposed based on the security and concurrency control in RTDBS.
S.No.: 273
Title : Multiple Biometric System Application: Iris And Fingerprint Recognition System
Authors Name: Pradnya Shende, Dr. Milind Sarode
Authors Affilation: Jagadambha college of engineering and technology, Yavatmal-445001,(MS)
Volume & Issue No.: Volume4Issue3
Abstract: In day today life security is most important issue. Biometric detection system is one of those system which is more secure than other security system i.e. Password, card etc. This paper introduces advantage of iris and fingerprint recognition system because this multi-biometric recognition system also used image processing and liveness detection technique for identifies the fake and genuine user. This system not only capable of working with a very good performance under multi-biometric systems, but it also provides a very good level of protection against certain non-spoofing attacks (multi-attack).Iris and fingerprint detection is an important module in an iris Recognition and fingerprint Recognition system to reduce the risks of being spoofed by fake iris and fingerprint patterns and at the sensor input.
S.No.: 274
Title : FEA and Experimentation evaluation of Composite Sandwich panel under Static Three Point Bending Load
Authors Name: Nitin Ratan Gir
Authors Affilation: college of Engineering osmanabad, Maharashtra ,India.
Volume & Issue No.: Volume4Issue3
Abstract: The use of sandwich structure continues to increase rapidly due to the wide fields of their application, for instance: satellites, aircraft, ships, automobiles, rail cars, wind energy systems, and bridge construction to mention only a few. The sandwich composites are multi-layered materials made by bonding stiff, high strength skins facings to low density core material. The main benefits of using the sandwich concept in structural components are the high stiffness and low weight ratios. In this paper, composite panel made of 8 layers of Glass fiber sheets arranged with different degree of orientation is taken into consideration. Gradually increasing loads(1KN-7KN) are applied to check the behavior of honeycomb sandwich composites through three-point bending. The objective of this work is to minimize weight of sandwich panel with respect to bending stiffness and strength.FEA results are compared with experimentally tested results.
S.No.: 275
Title : Regenerative Braking system via flywheel
Authors Name: Abrar Ahmed, Arpit Intwala
Authors Affilation: DY Patil College Of Engineering Akurdi, Pune
Volume & Issue No.: Volume4Issue4
Abstract: ABSTRACT Usually in cars hydraulic brakes are used, which converts the excess of kinetic energy into heat, due to which there is energy lost. Regenerative braking technology focuses on converting this kinetic energy of the decelerating wheels back into electrical energy so we can use this energy again, for example during acceleration. Currently new hybrid vehicles are installed with such braking technology, which makes them particularly interesting for situations where there is frequent deceleration, like in traffic. However, the technology used in these vehicles has its limitations and therefore,we have to use this technology with conventional hydraulic brakes. This paper removes the limitation mentioned above and allows a vehicle to fully rely on regenerative braking technology to deal with all braking situation from slowing down a vehicle to stop a vehicle. To enable this, multiple generators are used which have different gear ratio. One more advantage of using this construction is , by introducing the appropriate control circuit, the generators can be used as electrical engine. As the motors are connected with different gear ratios so at any speed we can get a consistent acceleration. This paper shows us that the ,overall efficiency of the system is nearby to the efficiency of the generators used while achieving braking performance which is similar to conventional braking mechanisms.
S.No.: 276
Title : SMART BILLING SYSTEM USING RFID TECHNOLOGY FOR SUPER MARKET AUTOMATION
Authors Name: SASIKALA.D
Authors Affilation: IFET COLLEGE OF ENGINEERING
Volume & Issue No.: Volume4Issue4
Abstract: The objective of this paper is used to find expiry date of the product by using RFID technology. Nowadays in shopping mall big rushes is available for billing to reduce rush and save time .we go for smart billing system using RFID technology. This project is used in shopping complex for purchase the products. In this project RFID card is used as security access for product. If the product is put in to the trolley means it will shows the amount and also the total amount. But in this project RFID card is used for accessing the products and also find the expiry date of the product. If the product is expired it will indicate by a buzzer sound. So this project improves the safety measures of the human beings and also the speed.
S.No.: 277
Title : wireless transmission using magnetic resonance circuits
Authors Name: himanshu garg
Authors Affilation: rbs engineering technical campus bichpuri agra
Volume & Issue No.: Volume4Issue4
Abstract: Since the industrialisation of the world our power requirement are increasing day by day but due to massive usage of wire installation which behaves like a nervous of out earth which link from place to place and time to time increasing day by day , which includes the thermal, hydro ,wind ,nuclear power plants but main disadvantage arises when we are using these methods to installation of power wire transmission system it cannot operate easily due to hindrance offered by corona, atmospheric condition & some man made disturbances like voltage rise and strictly dropdown which is not quite feasible .according to wireless power transmission phenomenon with magnetic resonance circuit we achieved. How to overcome all the losses & easy efficiently transmitting the magnetic flux with the desired range even the receiving end we can absorb lots of transmitted flux from that kind of range easily & this make crated a hope of world without the transmission without wire.
S.No.: 278
Title : Design and Analysis of Hydro Test Rig for GGCB Forged Valve with 4 Stations
Authors Name: Rajat Suresh Shinde,Saurabh Bapusaheb Gharge,Rajat Balasaheb Shinde,Akshay Sunil Shinde
Authors Affilation: NBN Sinhgad School of Engineering, Ambegaon (BK), Pune, India
Volume & Issue No.: Volume4Issue4
Abstract: Hydro testing as the name suggests using water as the working fluid. It is used to detect leakages present in the valves such as Gate, Globe, Check and Ball valves (GGCB Valves). The water is used as testing as well as working fluid which gives the exact results. Since water is incompressible it can be pressurised at high pressures without significant change in its volume. Valve to be checked is subjected to the high pressure when it is clamped to the hydro test rig. The pressure for testing is verified by the ANSI standard used for manufacturing the valve. It includes two types of leakage tests namely ‘body leakage test’ and ‘seat leakage test’. The main components of hydro test rig are design by theoretical method and the same design is checked by finite elemental analysis method using ANSYS 15.0 software.
S.No.: 279
Title : PREPROCESSING TECHNIQUES IN IMAGE FUSION
Authors Name: B Ragashree Narasimha, Leena Chandrashekar
Authors Affilation: R N S instiyute of technology, Bangalore
Volume & Issue No.: Volume4Issue4
Abstract: Preprocessing techniques aims at an improvement of an image data that suppresses unwanted distortions or enhance some image features important for further processing. Filtering techniques discussed in this paper is spatial domain and frequency domain filters. The other type of preprocessing technique discussed is edge detection. It helps in finding the discontinuities of image. The various applications are remote sensing, medical imaging, military, printing etc;. The few advantages of preprocessing techniques, it enhances image quality, increases contrast, reduces poor illumination, distortion and so on
S.No.: 280
Title : A Formal Model based on Priorities and Distributed implementation of Arbitration Protocols for MPSoCs Architecture
Authors Name: Maroua Ben Slimene, Imen Ben Hafaiedh
Authors Affilation: Tunisia Polytechnic School (EPT), Higher Institute of computer Scicence of Tunis (ISI), LIP2
Volume & Issue No.: Volume4Issue4
Abstract: In digital system design, control access protocols are used to allocate shared resources. Whenever a resource, such as a bus is shared, an arbiter is required to assign the access to the resource at a particular time. In SoC (System on Chip) architectures, the design, analysis and implementation of such arbiter, has become increasingly important due to its significant impact on the performance and efficiency of such systems. In this paper, we provide a high-level abstract and formal model of MPSoCs architecture. The proposed model provides a way to easily implement, analyze and compare different arbitration protocols. It also allows to study relevant properties such as fairness and deadlock freedom at a high level of abstraction. The studied protocols as well as the MPSoC architecture have been modeled in a distributed manner which makes the generation of a distributed implementation more relevant.
S.No.: 281
Title : A Statistical Method of Knowledge Extraction on Online Stock Forum Using Subspace Clustering with Outlier Detection
Authors Name: N.Pooranam,G.Shyamala
Authors Affilation: sri shakthi College of Engineering and Technology
Volume & Issue No.: Volume4Issue5
Abstract: Financial stock Data Analysis and future prediction in terms of Sentiments is great challenge in the big data research. Among the unlabeled opinion, opinion classification in terms of unsupervised learning algorithm will lead to classification error as data is sparse and high dimensional. To overcome this problem, the sentiment analysis to extract the opinion of each word in the stock data has been proposed. Moreover the data size is large, hence the singular value decomposition to resolve the inconsistent constraints correlating to the large dimensions, and dimensionally reduced feature set is been used. The dimensionally reduced feature set is classified into clusters through employment of Principle component analysis which is used to calculate the strength of actionable clusters with utilization of the domain knowledge and validate the optimal centroids dynamically. Cluster data which further inconsistent with the outlier probability can further reduced through subspace clustering. Experimental results prove that the proposed framework outperforms the state of art approaches in terms of precision, recall and F measure. Keywords: Opinion mining, sentiment analysis, Singular Value Decomposition, Principle Component Analysis, Subspace Clustering.
S.No.: 282
Title : FABRICATION OF PRINTED CIRCUIT GENERATOR FOR WIND ENERGY APPLICATION
Authors Name: VAIBHAV GOEL AKSHAY JAIN NIKHIL SINGH ARYAN MANI
Authors Affilation: BHARATI VIDYAPEETH UNIVERSITY COLLEGE OF ENGINEERING,PUNE
Volume & Issue No.: Volume4Issue5
Abstract: The Printed Circuit Generator is a type of generator which is coreless and have many specific features. The construction model used in this is called pancake model in which axial magnetic field is used to get flat construction. In this paper single sided PCB is fabricated. In stator part printed or welded windings are used and are mounted on a glass fibre circuit board forming a disc shaped structure. This structure rotates in the gap between the pair of magnets which are set up around the disk. A pair of metal end caps hold the magnets in a small block named as pancake which completes the magnetic circuit. The rotor part is mounted above the stator core and is free to rotate axially. The major aim of our project is to generate electricity using a test model of printed circuit generator at low and variable wind speed replacing the conventional permanent magnet wind generator model.
S.No.: 283
Title : Wireless Network Vulnerabilities A Review
Authors Name: Dr.Pramod Sharma , Danish Sharma , Nitin Kasana , shivam shrivastava, krishna kumar singh sengar , Mayank Sharma
Authors Affilation: RBS ENGG. TECHNICAL CAMPUS BICHPURI AGRA
Volume & Issue No.: Volume4Issue5
Abstract: As per CERT Annual report there is rapid increase in Cyber Crime From 2008 – 2015 . There is an increase of 130,338, in 2014 it was 127,773 . They are divided in security incidents which are website Defacements , malicious code , Network Scanning , Phisihng , Etc . In all over the world Hacking can be done easily , The main & First Ingredients for Hacking Is Internet . In Earlier times Hacker uses – proxy servers , Hide ip’s , MAC Spoofing , Etc. To hide it’s own identity , But now a day’s they used a new technique which is called wi-fi Hacking . The main Advantages to use this is that firstly his identity is hide & the second is police arrested the owner of wi-fi or internet provider because the ip address which is police is search in investigation is same as the ip address of the wi-fi owner. Rencently this type of cases is increases rapidly & reported in many cyber cells . So in this paper we’ll discuss that how hacker hack wi-fi & which type of security protocol is best for the public user’s.
S.No.: 284
Title : Improved Tumor Detection Using Modified Hough Mertic Trasformation
Authors Name: Kirna Rani
Authors Affilation: Computer Science of Engineering Guru Nanak Dev University Amritsar
Volume & Issue No.: Volume4Issue5
Abstract: The brain tumor detection is a very important vision application in the medical field. In this paper, an efficient brain tumor detection using the object detection and modified hough metric has been proposed. To enhance the tumor detection rate further we have integrated the proposed object based tumor detection with the Decision based alpha trimmed global mean. The proposed technique has the ability to produce effective results even in case of high density of the noise. This approach has been tested on various images thus defining an efficient and robust technique for automated detection and segmentation of brain tumors.
S.No.: 285
Title : modelling and vibrational analysis of front loading washing machine
Authors Name: vishal patil, prof A V Patil
Authors Affilation: SSGBCOE,BHUSAWAL ,MAHARASHTRA,INDIA
Volume & Issue No.: Volume4Issue5
Abstract: Current environmental awareness demands the improvement of washing efficiency. Talking about efficiency, the first thought that comes to mind is optimization. The basic factors that lead to optimization in a washing machine are its washing capacity, power consumption, cost and vibration. In terms of power consumption, two third of all electrical energy generated is consumed in industry. Many of the above parameters can be approximately optimised by solving the problem of Vibration.In a washing machine, vibration of the outer tub causes vibration of the frame and the force transfers from the supports of the frame to the floor. Although springs and dampers between the outer tub and the frame, and rubber cushions have reduced these vibrations, it is difficult to efficiently design the stiffness coefficients and the damping coefficients of these mechanical components. Thus, various washing machine vibration analysis models have been proposed at various unbalanced conditions in this paper. In this report we are concentrating on reducing the vibrations of the drum with the help of maintaining optimum coefficient of dampers and stiffness of the springs.
S.No.: 286
Title : Fading Multiplicative Noise Model Estimation for Low Lightness Images
Authors Name: Ali Jabbar Karam, Ali Abid D.Al – Zuky, Heba Kh. Abbas, Anwar H. Mahdy
Authors Affilation: Department of Information Technology,Kalar Technical Institute, Sulaimani Polytechnic University, Iraq
Volume & Issue No.: Volume4Issue5
Abstract: Abstract The study of image processing that deals with low lightness and low contrast has a major importance in many applications in several fields especially surveillance and security systems, under water imaging, night vision in bad vision conditions like: rain, fog, dust, aerial and medical Imaging. Low-light images accompanied by high proportion of noise and defects and this considered big problems for the digital images in this fields. Therefore, this study focused on low lightness effect on captured test images (black and white targets) using two types of cameras (Samsung and Sony). Lighting environment is controlled by a lighting system depending on three fluorescents of light with different sizes and power Estimating mathematical model for the noise accompanied with captured images under low lightness for each camera. Where have been captured several images in different lightness values from (0 Lux to 7 Lux). Then computed the probability distribution for the estimated multiplicative noise separately in each image targets (black target and white target).After that using Table Curve Software to estimate the best matching eq. with noise distributions. This model represents the multiplicative noise that combine between the Gaussian function and expositional function. The results show that best matching is dependent on the correlation factor which exceeds 90 %. Whereas, the best matching of the black region for test images is for Samsung camera sensors for multiplicative noise, while in the white region of the test images, the best matching of the results is for Sony camera.
S.No.: 287
Title : optimize design and analysis of chassis of an quad bike
Authors Name: S.A , Puviyarasu, V.S. Ukkeshwar
Authors Affilation: Dr. NGP institute of technology adithya institute of technology
Volume & Issue No.: Volume4Issue5
Abstract: Abstract— The epicentric goal of this study is to optimize design and analysis a quad bike chassis. This is an ATV based platform that comprises of various automotive components like chassis for which more durable design is a primary requirement as these vehicles are more concentrated on rider safety parameters and all other requirements. In order to accomplish this task, various tests like front impact, rear impact, side impact tests were made with the aid of theoretical calculations. The design of chassis of the vehicle using PTC CREO 2.0 software and analysis is carried out using ANSYS software.
S.No.: 288
Title : Information Cryptical Steganalysis Detection Technique by PSNR and RGB Intensity
Authors Name: Md. Sohel Ansari, Prof. Deepak Jain
Authors Affilation: 1M-Tech student. Organization: JNCT, Bhopal, India,
Volume & Issue No.: Volume4Issue6
Abstract: Abstract- We all know day by day technologies become strong hacker and terrariums attacked become more power full as per older techniques for cryptical messages inside images. In this research paper propose a high-tech region-adaptive steganalysis algorithm which will be used for the legend application to detect watermark attacks. The major advantages of the proposed steganalysis detection technique is RGB Intensity value, PSNR values and NC values which is allows tamper detection using linear classifier by given that these selective features. In the watermark processes data is embed on diverse location of the targeted image using a combination of discrete wavelet transform (DWT) and singular value decomposition (SVD) technique. In addition, there is a new use the major region-adaptive steganalysis technique to detect attack, if certain types of attack have occurred. As will be elaborate, the method to improve the efficiency of detection, Test the robustness of the projected steganalysis method. Histogram Equalization, Gaussian Noise, Sharpen, Salt and Pepper Noise, JPEG Compression, and Smoothing are the major attack. Some different system effect robustness of the projected steganalysis which are translation, rotation, and scaling belongs to geometric attacks. The cruelty of these attacks can be adjusted by modifying their corresponding factor values. Experimental results will detect the cryptical data on the original image or targeted images file.
S.No.: 289
Title : Image Mining for Mammogram Classification by Genetic Association Rule Mining Using Intensity Histogram and GLCM features
Authors Name: Aswini kumar mohanty, Amalendu Bag, Devitosh Acharya
Authors Affilation: 1Kmbb college of engg Bhubaneswar,Odisha
Volume & Issue No.: Volume4Issue6
Abstract: Breast cancer is the leading cause of cancer death among women. Screening mammography is the only method currently available for the reliable detection of early and potentially curable breast cancer. Research indicates that the mortality rate could decrease by 30% if women age 50 and older have regular mammograms. The detection rate can be increased 5-15% by providing the radiologist with results from a computer-aided diagnosis (CAD) system acting as a second opinion. However, among screening mammograms routinely interpreted by radiologists, very few (approximately 0.5%) cases actually have breast cancer. It would be beneficial if an accurate CAD system existed to identify normal mammograms and thus allowing the radiologist to focus on suspicious cases. This strategy could reduce the radiologists workload and improve screening performance. Image mining is concerned with knowledge discovery in image databases. Since mammography is considered as the most effective means for breast cancer diagnosis, this paper introduces multi dimensional genetic association rule mining for classification of mammograms. The image Data mining approach has four major steps: Preprocessing, Feature Extraction, Preparation of Transactional database and multi dimensional genetic association rule mining. The purpose of our experiments is to explore the feasibility of data mining approach. Results will show that there is promise in image mining based on multi dimensional genetic association rule mining. It is well known that data mining techniques are more suitable to larger databases than the one used for these preliminary tests. Computer-aided method using association rule could assist medical staff and improve the accuracy of mammogram detection. In particular, a Computer aided method based on association rules becomes more accurate with a larger dataset .Experimental results show that this new method can quickly and effectively mine potential association rules.
S.No.: 290
Title : Revolution Technique To Enhance Cognition of Sensor Nodes in ZigBee Network with Advertisement Packets
Authors Name: Mr. Ravi Kumar Singh, Prof. Amit Saxena
Authors Affilation: M-Tech (CSE), TIEIT, Bhopal, *Prof. (CSE), TIEIT Bhopal, (M.P.) India
Volume & Issue No.: Volume4Issue6
Abstract: A ZigBee network platform is developed to improve performance under a wide range of conditions and for both unicast and broadcast packets over ZigBee networks that support multi-hopping. Both ZigBee networking and IEEE 802.15 Transport layer utility like fragmentation and reassembly which are performed at the application layer, since the ZigBee network does not have a fragmentation support. Observations and resulting statistics are presented, and the MAC schedule provides to increase in lifetime for different traffic scenarios in the get/broadcast schedule to robotically coordinate the nodes that can decrease packet delivery delays, which can provide an increases efficiency and also throughput will increases. At the similar time, an increase in packet size boost the lost in packet. This is because the radio transmits for packet or until interrupted, whatever the packet size. The advantages of ZigBee are reduced further when the data packet size achieve that of the advertisement size because the advertisement packet is no longer easier to hear than the data packet. As discussed, we begin this evaluation with the simulation of an analytical model, and verify it with a Matlab implementation.
S.No.: 291
Title : Moroccan human resources between educational system and labor market
Authors Name: ELMORTADA Asmaa, MOKHLIS Ahmed, ELFEZAZI Said and MOKHLIS Chams Eddoha
Authors Affilation: 1-Higher School of Technology (Cadi Ayyad University), Safi city, Morocco 2- National School of Applied Sciences (ENSAJ_UCD), El Jadida city, Morocco 3-National School of Business and Management (ENCG) – Morocco
Volume & Issue No.: Volume4Issue6
Abstract: Since the independence, the Moroccan education system is the subject of a continuous attention from state and private authorities, because of his key role in the restructuring of the desired new Morocco. However, increased economic disruption and demographic development have a profound impact. Therefore, the secession of experienced mutations recovered, continually questioning the quality of higher education, including its relevance to the needs of the labor market. The concern of this article is, first, to describe the evolution of the strategies adopted by the Moroccan university through the past. On the other hand, we will try to highlight the impact of policies on the global landscape of higher education in the light of the competitive corporate culture, as well as the desired level of progress.
S.No.: 292
Title : SECURITY ISSUES ON CLOUD COMPUTING
Authors Name: Neelam Sharma, Sonia Batra
Authors Affilation: Affliated to MDU Rohtak: Computer Science and Engineering World College of Technology and Management Gurgaon, Haryana, India
Volume & Issue No.: Volume4Issue6
Abstract: Cloud computing is basically up gradation to grid computing. It is very amazing technology because we can store data remotely on the cloud server it means it is location independent and service avail on rental basis also. According to NIST [1] Cloud computing is a model for convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. Rather than lots of features it is also having security issues. Sometimes the data kept on cloud can be misused or stolen. So in this review paper we basically discuss about the issues develops due to security and the solution given by different researchers. Security is one of the most vis-à-vis issue of Information technology Issue. To keep structural or user data is primary concern. If organizations data is not safe on cloud then there is no use of ever-changing from old technology to cloud technology. There are lot of Non-Profit Organization (NPO) which are helping and creating responsiveness about security issues of cloud computing. One of such organization is CSA (Cloud Security Alliance) that issue a report in each year regarding most popular security issues in cloud computing. CSA reports they identified nine infamous security threats to cloud which can harm users individual data without knowing them. Here we discuss these types of issues in this paper.
S.No.: 293
Title : MRI Brain Image Tumor detection & Classification
Authors Name: Shrikant Burje, Prof.Dr.Sourabh Rungta, Prof.Dr.Anupam Shukla
Authors Affilation: Rungta College of Engineering & Technology, Bhilai
Volume & Issue No.: Volume4Issue6
Abstract: A hybrid approach is being proposed for classification of brain tissues in magnetic resonance images (MRI) based on the approach adopted. A wavelet based texture feature set is derived. The optimal texture features are extracted from normal as well as tumor regions by using spatial gray level dependence method (SGLDM). The Proposed technique resolves the big problem of classification techniques. These optimal features are then used to classify the brain tissues into benign, normal, or malignant tumor. The performance of the algorithm is evaluated based on a series of brain tumor images.
S.No.: 294
Title : DEVELOPING HYBRID METRIC USING CODE METRICS LACK OF COHESION IN METHODS(LCOM), DEPTH OF INHERITANCE TREE(DIT), COUPLING BETWEEN OBJETCS(CBO)
Authors Name: harman preet kaur, vikramjeet singh guraya
Authors Affilation: guru nanak dev university, regional campus, gurdaspur
Volume & Issue No.: Volume4Issue6
Abstract: Software re-engineering is the process of introducing the changes in the existing software to adapt to the changes in the environment. One of the major goals of the software re-engineering is to select that software version in which we have put in the least effort with the maximum positive output which means that we spend a little amount and do minimum changes and get the better software as output. There are number of versions available for a single software. So selecting the software version which is best suitable for re-engineering is considered to be a critical task. We usually prefer that software in which we have to do the minimum changes and we get the best new software version. As the new versions are developed for a software, unintentionally the bugs are introduced into the software versions and the complexity of the software is increased. So selecting the best and the most feasible software version for software re-engineering is a very important. We would be considering the open source software for experimental purpose. In this dissertation, we have developed the hybrid metric by considering the three different metrics which are LCOM, CBO and DIT which helps in evaluating the best software. These three metrics are considered to effecting the software with more impact so we have selected these three metrics for developing the hybrid metric. The main aim of this dissertation is to evaluate the best alternative for software re-engineering using hybrid code metric. The experimental analysis has been done on the different versions of jChart2d software in order to validate that among all the versions of this software which version is best suited for software re-engineering.
S.No.: 295
Title : Safetronic Technology using ultrasonic sensor
Authors Name: Vishwas B S, Satishkumar
Authors Affilation: The National Institute Of Engineering Mysuru
Volume & Issue No.: Volume4Issue6
Abstract: Accident will occur every time and everywhere and cause worst damage, serious injury and dead. Accidents are caused mostly due to the delay in applying of brakes and the wrong decisions taken by the driver like opening the doors at the wrong time and place. This work is designed to develop a new system that can solve this problem where drivers may not brake manually but the vehicles can stop automatically due to obstacles and locks the door at the extreme rear collision scenarios. This work is about a system that can control the central locking system of the car. Using ultrasonic transducer as a ranging sensor, its function based on ultrasonic wave .After transmit by transmitter, the wave can reflect when obstacle detected and receive by receiver.
S.No.: 296
Title : An Enhanced Light-weight Proactive Source Routing Protocol using DIFT-BFHS for MANET
Authors Name: Dr. N. Rama, Justin Sophia. I
Authors Affilation: 1Associate Professor, Post Graduate and Research Department of Computer Science,
Volume & Issue No.: Volume4Issue7
Abstract: A mobile ad hoc network (MANET) is a baseless wireless communication network with a collection of mobile nodes, these nodes are not lies within the direct transmission range of each other but depend on the intermediate nodes for data transmission. In multi hop wireless networking the opportunistic data forwarding related research has drawn much attention. The main reason for opportunistic data forwarding has not been widely utilized in mobile ad hoc networks (MANETs) is lack of an effective lightweight proactive routing feature with strong source routing capability. In this research the PSR working is modified by Depth-first iterative-deepening combined with the best first heuristic search to maintain the information of the entire network topology. DIFT-BFHS spanning tree is constructed to maintain the network topology information. Instead of periodically updating this information, the updation is made only when modification occur, in network topology through the nodes. This makes the neighbor node discovery process simple and reduces the routing overhead, therefore the energy is saved as much as possible.
S.No.: 297
Title : Processing Natural Language and Grading it using Artificial Intelligence
Authors Name: Ricky Yadav
Authors Affilation: Vivekanand Education Societys Institute of Technology
Volume & Issue No.: Volume4Issue7
Abstract: Online Test are conducted now a days to evaluate a persons knowledge regarding a subject. The best way to evaluate a persons understanding regarding a subject is to let him answer the question in his natural language. But the situation is this that we dont have such systems which can examine a users natural language answers. Hence, I propose a unified neural network architecture approach that can be applied to various natural language processing tasks including part-of-speech tagging, chunking, named entity recognition, and other tasks. Natural language processing is an area of artificial intelligence that defines a set of methods and techniques used to automate the translation process between computers and humans or mediate the human-machine communication. Also we will be grading the answer given by the user, so the refined output of NLP will be given for further processing. Once the overall processing of the answer is done we will get the grades out of 10 by applying some formulas to the passage, sentences and there words.
S.No.: 298
Title : Integration of Spring-based Web application with OSGi
Authors Name: Sangeeta Oswal, Krutika Tawde , Harshvardhan Singh, Pankaj Singh
Authors Affilation: VESIT, Mumbai
Volume & Issue No.: Volume4Issue7
Abstract: The objective of this paper is to enlist the integration steps &challenges faced during integration of a spring MVC based web application archive (WAR) with OSGi and measures taken to handle them. The WAR consisting of more than ten sub-applications provide a rich set of functionality like reporting, job scheduling, clustering, multidimensional online analysis respectively. The idea was to redesign the sub-apps as loosely coupled but highly cohesive modules. OSGi framework was adopted keeping in mind the potential for releasing the sub-apps in future, as independent modules that can be easily integrated with existing Data Analysis solutions or used as stand-alone web application. The service component architecture and modular nature of OSGi were the key aspects sought for undertaking this endeavour.
S.No.: 299
Title : Implementing Web Browser that Detect and Block Phishing Attack
Authors Name: Priyanka Raut
Authors Affilation: Ballarpur Institute Of Technology, Ballarshah(M.H)
Volume & Issue No.: Volume4Issue7
Abstract: Phishing is a type of cyber attack where the attacker creates a replica of an existing webpage with an aim to acquire information such as usernames, passwords and credit card details of the users by fooling them into submitting personal data to what they think is their service provider’s website. In this work, we present, a novel, algorithm to detect phishing web sites,based on the characteristics of the hyperlinks used in the phishing attacks and the content in the website. We also discuss how this approach is better than all other existing methods.
S.No.: 300
Title : Survey on Dust Network and Energy Efficiency Communications in Wireless Sensor Network
Authors Name: Gayatri Devi, Suvendra Kumar Jayasingh, Rajeeb Sankar Bal
Authors Affilation: 1Professor, Department of Computer Science and Engineering, ABIT, Sector-1, CDA, Cuttack, Odisha, India
Volume & Issue No.: Volume4Issue7
Abstract: Recent technological innovations made in electronics and wireless communications have fostered the development of wireless sensor networks (WSNs). A WSN typically consists of many small, low cost, low-power communication devices called sensor nodes. But Dust Networks, a pioneer in the field of wireless sensor networking, is defining the way to connect smart devices. Dust Networks delivers reliable, resilient and scalable wireless products with advanced network management and comprehensive security features. Thousands of Dust-enabled networks have been deployed around the globe, securely connecting a wide variety of smart devices to applications that are delivering on the promise of a smarter, greener, more efficient planet. In wireless sensor network, there are two types of sensor nodes as a representative single hop heterogeneous network. For multi-hop homogeneous networks (sensor nodes use multi-hopping to reach the cluster head), we propose and analyze a multi-hop variant of LEACH that we call M-LEACH. We show that M-LEACH has better energy efficiency than LEACH in many cases.
S.No.: 301
Title : Identify the Attack in Embedded Image with Steganalysis Detection Methodby PSNR and RGB Intensity
Authors Name: Md. Sohel Ansari, Prof. Deepak Jain
Authors Affilation: #1M-Tech student. Organization: JNCT, Bhopal, India, *2Designation: Professor, JNCT, Bhopal, India
Volume & Issue No.: Volume4Issue7
Abstract: In this research paper we plot experimental result and analysis report of propose a high-tech region-adaptive steganalysis algorithm which will be used for the legend application to detect watermark attacks. From the experiment result it is clear that major benefits of the proposed steganalysis detection technique is RGB Intensity value, PSNR values and NC valueswhich is allows tamper detection using linear classifier by given that these discerning features. In addition, there is a new use the major region-adaptive steganalysis technique to detect attack, if certain types of attack have occurred. As will be elaborate, we find that the method is improve the efficiency of detection, testingof the robustness of the projected steganalysis method. We use some major attack technique which is given as Sharpen, Histogram Equalization, Salt and Pepper Noise,GaussianNoise, Smoothing, and JPEG Compression.Were different system are effect the robustness of the projected steganalysis which arescaling, rotation, and translation belongs to geometric attacks. The cruelty of these attacks can be adjusted by adjusting their equivalent factor values. Experimental results and Analysis report show that will detect the crypticaldata on the original Host image or targeted images file.
S.No.: 302
Title : MASS CLASSIFICATION METHOD IN MAMMOGRAMS USING ASSOCIATION RULE MINING TO DIAGNOSE BREAST CANCER
Authors Name: Aswini Kumar Mohanty, Mrs. Arati Pradhan, Mrs. Swasati Sahoo
Authors Affilation: KMBB Collegw of Engg & Tech,Daleiput,Khurda, Odisha, India
Volume & Issue No.: Volume4Issue7
Abstract: An improved image mining technique for breast tumor classification using pruned association rule with MARI algorithm is presented in this paper. The method proposed makes use of association rule mining technique to classify the mammogram breast images into two categories namely benign and malign. It combines the low-level features extracted from images and high level knowledge from specialists. The developed algorithm can assist the physicians for efficient classification with multiple keywords per image to improve the accuracy. Here using Associationrule mining, performs benign-malignant classification on region of interest (ROI) that contains mass. One of the major mammographic characteristics for mass classification is texture. ARM exploits this important factor to classify the mass into benign or malignant. The statistical textural features used in characterizing the masses are mean, standard deviation, entropy, skewness, kurtosis and uniformity. The main aim of the method is to increase the effectiveness and efficiency of the classification process in an objective manner to reduce the numbers of false-positive of malignancies. Association rule mining was proposed for classifying the marked regions into benign and malignant and 93.81% sensitivity and 97.11% specificity is achieved that is very much promising compare to the radiologists sensitivity 75%.
S.No.: 303
Title : A hybrid D-STATCOM with T-connected Transformer used to mitigate power quality issues
Authors Name: Mohd Navaid Ansari
Authors Affilation: Oriental Institute of Science AND technology bhopal
Volume & Issue No.: Volume4Issue7
Abstract: Now a days electrical power faces several quality issues like voltage distortion, load unbalancing, excessive neutral current due to harmonics. In this paper, a hybrid D-STATCOM with T-connected transformer and a single phase Active Power Filter is used to reduce harmonics and to compensate the neutral current. SRF based control algorithm is used to control the D-STATCOM. The complete model is designed in MATLAB Simulink environment and the results are shown.
S.No.: 304
Title : CFD Analysis & Experimental investigation of NACA0018 Blade Profile for Darrieus Turbine
Authors Name: SAGAR KAILAS MORE
Authors Affilation: P.D.V.V.P.C.O.E.,AHMEDNAGAR,MAHARASHTRA
Volume & Issue No.: Volume4Issue8
Abstract: In present work an attempt is made to investigate the Lift and Drag forces for wind turbine blade at 4000 Reynolds number and different chord length i.e.15cm & 25 cm. In this work NACA0018 airfoil profile is considered for analysis of wind turbine blade. The Lift and Drag forces are calculated at different angle of attack varying from 0o to 80o by Computational Fluid Dynamics (CFD) analysis. The values of CL and CD for this Reynolds number is much important in analysis of Darrieus and horizontal axis type of wind turbine blade, still it these values are not available from the literature reviewed . From CFD analysis it is concluded that as Reynolds number increase lift forces and drag forces decreases for particular chord length and if chord length increases CL and CD increases. And Comparison has been done on NACA0018 for all two chord length and from that we concluded that NACA0018 at 15cm provides maximum lift and drag. Keywords: Lift coefficient, Drag coefficient, angel of attack, NACA Blade profile, Chord length.
S.No.: 305
Title : Design and development of tractor rear loader arrangement for material handling in constructional applications
Authors Name: More sagar kailas
Authors Affilation: P.D.V.V.P.C.O.E.Ahmednagar
Volume & Issue No.: Volume4Issue8
Abstract: This rear loader attachment is developed to minimize the labor work as well as to minimize a time for material handling in various applications like constructional work. It is simple in construction and can be easily attached with the existing rear mechanism of any tractor so no need to develop a new mechanism for rear loader attachment. This attachment is developed to overcome the various limitations which other earth moving equipment have like larger size, heavier in mass generally in tones etc. Rear loader is designed with components which are easily available in market so maintenance and replacement of components is not a problem. Important benefit of this design is that, it allows mower desk to stay attached to the tractor while providing quick engagement-disengament features. Unskilled person can also operate this arrangement very easily as it does not requires any special training which requires while working with other machines like lathe machine. The loader arm and bucket assemblies are completely detachable from the tractor in landscaping task. This rear loader attachment also allows for a greater load carrying capacity and lift range. It can pick up a load up to 120 kg to 150 kg and has enough lift to be able to put loads of mulch, soil and gravel. Various models of tractors like Arjun (605), Mahindra (575), Swaraj (744), Sonalika (855) Select tractor-Arjun (605) can use this rear loader attachment as accessory without changing its actual mechanism at rear side. It can lift weight of material up to 5 to 8 fits. Its capacity of load lifting can be improved by small changes in design and it can be improved up to 200 to 250 kg. Its cost is much lower as compare to other accessories available in market. Keywords: bucket assemblies, lower cost, quick disconnect, Rear-End Loader.
S.No.: 306
Title : identification of fruits and vegetables using colour representation
Authors Name: neeraja n,karthika p,mena chandran
Authors Affilation: cochin college of engineering and technology,valanchery
Volume & Issue No.: Volume4Issue9
Abstract: Picking or Harvesting is one of the most effort-requiring and time-consuming link in fruit production operation which, according to statistics, approximately accounts for 40% of all the working out. With the aging of population and the decrease of farming labour force, fruit picking robots have become the research hotspot in the present agricultural mechanization. A new fruit recognition system has been proposed, which analysis color in order to increase accuracy of recognition. In the proposed system the RASPBERRY PI hardware is used to perform the image processing. It gives more accuracy when compared to the existing systems. In this work the above methodology is used which in turn uses a micro camera to capture the image which is compared with the reference image in the RASPBERRRY PI.
S.No.: 307
Title : Design of Automated Resume Extraction System Using Horspool and Karp-Rabin Algorithms
Authors Name: P.Gajalakshmi, Dr.V.Ramesh
Authors Affilation: Sri Chandrasekharendra Saraswathi Viswa Mahavidyalya, University,Enathur,Kanchipuram-631561.
Volume & Issue No.: Volume4Issue9
Abstract: Human resources departments of organizations receive infinite resumes on regular basis, making it more tedious for the HR person to find the best job candidates. In fact, an employer receives an average of 144 resumes per job opening. According to market status, companies depend extensively on assessment tools to select the best suitable candidates for job positions. While most of the companies are turning to software tools that quickly identify the best candidates, the process of evaluation involves challenges in both the sequence of actions by HR and the quality of execution for each procedure. The question is whether the right candidates were chosen, as per the requirement of the jobs. The aim of this study is to provide an efficient resume extraction tool using keyword matching pattern algorithm. Single keyword pattern matching means locating all occurrences of the search pattern in the input text string. It occurs naturally as part of data processing, text editing, text retrieval, and so on. Many text editors and programming languages have facilities for matching strings. The core objective of this work is provide a simplest and well-organized resume automation tool. This tool is fast in data retrieval and therefore saves time. The working logic of this involves the combination of two keyword Pattern matching algorithm (HP&KR). Using the proposed algorithm, the data is processed to determine which applicants are the best fit for a particular job based on a powerful combination of skills, work experience, location etc. The algorithm devised in this research keeps the organizations needs as the prime aspect in evaluating the candidates.
S.No.: 308
Title : Object Removal and Region Filling In Image
Authors Name: Pankaj Bagal & Ravi Kateeyare
Authors Affilation: Central India Institute of Technology,Indore
Volume & Issue No.: Volume4Issue9
Abstract: Sometimes people have been taken photographs, there has been the need to remove unwanted artefacts or damaged areas from these images. This is something previously conducted by experts, using computer tools and extensive user input to produce a visually real-istic result. The difficulty of the problem lies in how to fill the missing regions, such that they are perceptually unnoticeable, whilst minimizing user input. Object removal and region filling algorithm proposed for removing unwanted objects from digital images. The challenge is to fill the hole that is left behind in visually plausible way. This problem has been addressed by two classes of algorithms: i) “Texture synthe-sis” for generating large image regions from sample textures, and ii) “In-painting” techniques for filling in small gaps. Each being used for images with different characteristics. This dissertation is concerned with investigating whether advances in texture synthesis techniques contain the necessary functionality to cross the divide between the two and successfully fill holes in a variety of images. The advantage of the proposed techniques is that it limits the amount of knowledge required by the user, and performs the region filling autonomously, once started.
S.No.: 309
Title : Design and Implementation of 3D Visualisation Virtual World laser Diode End Pumped Nd:YVO4
Authors Name: Zaynab Q. Mohammed, MohammedJ. Abdul-Razak, Raaed K. Ibraheem
Authors Affilation: 1Laser & Optoelectronics Engineering Department, University of Technology, Baghdad, Iraq
Volume & Issue No.: Volume4Issue9
Abstract: In this paper virtual-reality (VR) as a tool has been used to design and implementation 3D visualisation for a laser diode end-pump Nd:YVO4 laser system. The simulation modeled using virtual reality has been developed to predict the parameters that influence system efficiency.A new model were designed and implemented in virtual reality toolbox to describe the diode-pumped laser system using the data available (rod dimensions, output-coupler reflectivities, pump source wavelength and output wavelength of the laser system). A model of the laser system was built and converted into an Open GL, and then ported into SIMULINK block using virtual reality toolbox in MATLAB. The equations of dynamic and static effects on the system are solved and converted to appropriate model blocks in the SIMULINK with appropriate vector dimension used to animate or effect on the virtual world.
S.No.: 310
Title : An Efficient Technique for Recovery of Text UsingBinarization
Authors Name: 1.YASHPAL YADAV 2. MANOJ KUMAR
Authors Affilation: SRM UNIVERSITY NCR-CAMPUS GHAZIABAD
Volume & Issue No.: Volume4Issue9
Abstract: Image Binarization is performed in the pre-processing stage for document analysis and preservation and it aims to segment the foreground text from the document background. However, is a very challenging task due to the high inter/intra variation between the document background and the foreground text of different document images. Scanned document images, especially historical and handwritten documents, generally carry various levels of noise because of the age, paper, pen and pencil influences on the documents. Age factor adds irremovable noise and meaningless random shapes on the documents which prevent efficient separation and recognition of the layers. Paper properties such as patterned or colored papers; add different background layers to the scanned documents. Since document image may suffers from invariant illumination which offers threat in deciding a threshold value which converts the document into binary image
S.No.: 311
Title : An efficient method for discovering frequent patterns in the incremental databases
Authors Name: Farid sheikhnourani
Authors Affilation: department of education
Volume & Issue No.: Volume4Issue10
Abstract: Incremental mining of frequent patterns for association rules is considered as one of the most important issues in science. Mining association rules is a research work in the data mining fields and goal of this issue is discovery important relationships between items in the large databases. Many algorithms have been proposed for the discovery of association rules that FP-growth with FP-tree structure is one of the most efficient algorithms, but FP-tree is not easily adoptable with incremental updating because this structure is the static nature, and also is not suitable for large databases. In this paper, we proposed a dynamic tree structure based on FP-tree to resolve updating problem, called IFP-tree and compare my results with previous algorithms. This tree is a irregularly tree.The proposed tree is created based on the frequency of last items and it required only one scan of database. The experimental results show that using the proposed tree and Branch-Sorting method can enhanced the efficiency of incremental mining of frequent patterns.
S.No.: 312
Title : Determining the affecting factors on the delay to renew the auto insurance
Authors Name: N. Abbasi, R. Mahmoudvan and S. Mordi Kakash
Authors Affilation: Depertment of Statistics, Payame Noor University, I. R. Iran
Volume & Issue No.: Volume4Issue10
Abstract: All the owners of land and rail vehicles whether they are real persons or legal persons, are obliged to insure their vehicles against physical and financial damages to the third parties which may occur because of accidents of the mentioned vehicles or towing and trailer attached to them or their cargo. Despite third party insurance is compulsory, but there are people who have delays in their renewal of the insurance contract. This research intends to identify the affecting factors on this delayed action. For conducting the research, 524 registered case in all of the Saman insurance agencies in the city of Shiraz over five years (2011-2015) was studied. The factors are year of manufacturing, the number of driving accidents record, the type of automobile, type of insurance company, the beginning month of the contract. The results show that only the desire to change of type of insurance has been the affecting factor on this delay.
S.No.: 313
Title : Empirical Study of the Relationship Between Cash Flow Management and Financial Performance of the Jordanian Insurance Companies
Authors Name: Nimer Alslehat & Munther AI-Nimer
Authors Affilation: Faculty of Business, Amman Arab University, Amman, Jordan
Volume & Issue No.: Volume4Issue10
Abstract: The study aims to examine the impact of cash flow management, namely operating, investing, and financing activities on financial performance and the contribution of each of these activities to predict the financial performance of the Jordanian Insurance Companies (JICs). The population under observation consists of the JICs, which includes (23) companies. The study covers the period 2009-2013 by analyzing annual reports for each company. The study indicated that net cash flows from operating activities are considered the highest compared with other activities, which demonstrates that the JICs generate money from their main business and are not facing liquidity crisis. Regarding the impact of each orientation of these activities and their effect on financial performance, the study revealed that the net cash flows from the operation activities influences the return on assets. Moreover, the net cash from investing activities was found to play a significant role in the financial performance.
S.No.: 314
Title : PLC Based Automatic Nozzle Welding Control System
Authors Name: Mayuri Gaonkar, Dhiraj Ahire, Akanksha Kadam,Shrinivas Dhawale
Authors Affilation: UG Student of Department of Electronics and Telecommunication Engineering, Terna Engineering College,Navi Mumbai, India
Volume & Issue No.: Volume4Issue10
Abstract: In industries, to produce different products we need various types of raw materials. Those can be in solid, liquid or gaseous state. To store such large quantity of material, we need big containers. Hence large containers such as ‘shells’ are used along with nozzles to fix to it. Nozzles are use as inlet or outlet to store fluids. The problem associated with the constructions of such big containers is welding of nozzles with shells. SAW is type of welding use for fixing. During welding, boom is used to control vertical motion of the shaft on which whole assembly of the welding is situated. Even during the welding according to curve path of the job we have to vertically move the welding torch which is done manually. This is very inconvenient, inappropriate and time consuming. Objective of this project is to reduce time consumption and human efforts and to increase the accuracy. Along with this use, objective of this project is to control the different parameters of welding. So there are following objectives of this project: 1. To control vertical motion of the welding torch. 2. To control different parameters which handle the functions of welding torch 3. To Avoid time consuming task of manual handling
S.No.: 315
Title : Analysis of Transistor Open Fault Diagnosis for Shunt Active Power filters
Authors Name: L. Benyettou, T. Benslimane
Authors Affilation: Laboratory of Electrical Engineering, University of M’sila, Algeria
Volume & Issue No.: Volume4Issue11
Abstract: In this paper a transistor open-circuit fault diagnosis problem in two-level voltage inverter controlled shunt active power filter drives was discussed. Taking into consideration requirements of the contemporary monitoring drive systems original transistor fault diagnostic technique were proposed. Presented results were obtained by designed in PSIM software simulation model.
S.No.: 316
Title : APPLICATION OF TEXT MINING FOR FASTER WEATHER FORECASTING
Authors Name: Er. Suvendra Kumar Jayasingh, Dr. Jibendu Kumar Mantri
Authors Affilation: Assistant Professor, Reader, Institute of Management and Information North Orissa University, Technology, Cuttack – BPUT, Odisha, India
Volume & Issue No.: Volume4Issue11
Abstract: Weather forecasting is a challenging problem in predicting the state of the climate for a future time at a given location. Weather is the state of atmosphere which is measured based on a scale of hot or cold, dry or wet, storm or calm and cloudy or clear. Human kind has tried a lot since ancient times to anticipate the future climate. It is why climate change prediction has become a very important task to the scientists and researchers of many countries. The weather is a continuous, data-intensive, multi dimensional, dynamic and chaotic process [6] and these characteristics made the weather forecasting a challenging job in the world. In order to make accurate prediction, many scientists have tried to forecast the meteorological behaviours. The objective of the research is to predict more accurately the meteorological characteristics. This article gives importance on using the fuzzy field and Natural Language Generation (NLG) that will make the weather prediction in a better and faster manner.
S.No.: 317
Title : Cryptography Based Hybrid Security Architecture for Mobile Multi Agents
Authors Name: Swati Singhal, Heman Pathak
Authors Affilation: 1Research Scholar, Department of Computer Science, Gurukul kangri University, Haridwar
Volume & Issue No.: Volume4Issue11
Abstract: Distributed Computing is the current area of research. Many researchers are working in area of Distributed Computing and trying to find a solution for the security and other issues. In Distributed Computing the mobile agents are the very important thing. When different mobile agents work in the same environment simultaneously it becomes a very important issue. Mobile agents have automatic, pro-active, and dynamic problem solving behaviors. However, scope of this paper is limited to analyze the existing security approaches for Mobile Multi Agent System. Security issues of mobile agent address the problem of securing and protecting agents from the attack of malicious hosts and other agents as well as securing the host from attack of malicious agents. This paper introduces a new approach of security for agent from other agents. Paper discusses Cryptography Based Hybrid Security Architecture with trust and reputation named CBHSA. It breaks the security of MA in two parts. The first level of security is work on the MA and second level of security is maintained on network. The model CBHSA, its different components and security of MA during movements around the network are discussed in this paper. This paper emphasis on the security of MA’s during migration within the network or outside the network.
S.No.: 318
Title : Characterization and reliability of A36 steel under alternating dynamic and static loading
Authors Name: JILALI NATTAJ
Authors Affilation: Laboratory Of Atmosphere’s Physics and Modeling, FST Mohammadia, Hassan II University Of Casablanca
Volume & Issue No.: Volume4Issue11
Abstract: The principal purpose of this article is the prediction of the life of ordinary steel A36 by using the method of unified theory. Separation of phases boot / propagation and cycle number reduction at break for a given load level. Experimental results from the fatigue tests virgins specimens, combined with static testing tensile test machine the calculated values are analyzed, discussed and compared. These approaches allow us both to assess the impact of unexpected damage on the life of the A36 steel and predict its life or even improve it.. This approach allow us both to assess the impact of unexpected damage on the life of the A36 steel and predict its life or even improve it. In this paper we present the first part of our research we have determined the number of life cycles of A36 steel (smooth) from alternating fatigue tests with other static, as well as the different relations binding the various life phases of the material and the loading level applied. This allowed us to quantify the initial damage caused by the notch results that we will operate in future articles to determine and compare alternative approaches for the damage to lead to the development of a simple tool usable in a maintenance policy
S.No.: 319
Title : Study on Performance Characteristics of PV Array Under Non-uniform Irradiation Conditions
Authors Name: N. Nagaraja
Authors Affilation: S.V.University College of Engineering, Tirupati, Andhra Pradesh.
Volume & Issue No.: Volume4Issue11
Abstract: Ever increasing energy demand, owing to population growth, technology development, and industrial expansion, has led to exploring alternative sources for energy generation. Solar energy emerged as the most effective and reliable source of renewable energy as it is pollution free, less maintenance, recyclable and inexhaustible. Photo Voltaic (PV) technology is used for direct conversion of e solar energy into electrical energy. The performance of PV system is mostly affected by irradiance, module temperature and array configuration. The knowledge of relationship between these effects and the output power of the PV array is very important while analyzing the performance of the PV system. This paper presents a MATLAB-programmed model to study the I-V and P-V characteristics of PV array under non-uniform insolation caused by both partially and completely shaded modules. In the first part, with the developed MATLAB/Simulink model the performance characteristics of PV array is illustrated by analyzing the different shading situations, then the impact of shading on PV array is illustrated experimentally by measurements on an array with 3 series connected 60W modules. Under the non-uniform insolation condition, both developed model and experimental results shows that, the output power of a PV array get reduced and output PV curve become more complex with multiple peaks.
S.No.: 320
Title : Optimizing the usage of SimpleDateFormat in a Java multi-threaded environment
Authors Name: Mr. Mihai Stancu
Authors Affilation: Faculty of Sciences, Department of Computer Science, University of Craiova
Volume & Issue No.: Volume4Issue12
Abstract: In almmost every Java application that uses dates we are required at some point to perform date formatting. The Java core libraries offer a great way to format dates using the DateFormat abstract class, and it’s implementing class SimpleDateFormat. However the way SimpleDateFormat is generally used, creating a new SimpleDateFormat object for every formatting block, is very expensive and should not be used this way. In this article we will be looking at why this method is not the way to do it, and how it would be better to get the same results with lower execution times.
S.No.: 321
Title : Characterization and reliability of A36 steel under alternating dynamic and static loading
Authors Name: JILALI NATTAJ
Authors Affilation: Laboratory Of Atmosphere’s Physics and Modeling, FST Mohammadia, Hassan II University Of Casablanca Morocco
Volume & Issue No.: Volume4Issue12
Abstract: The principal purpose of this article is the prediction of the life of ordinary steel A36 by using the method of unified theory. Separation of phases boot / propagation and cycle number reduction at break for a given load level. Experimental results from the fatigue tests virgins specimens, combined with static testing tensile test machine the calculated values are analyzed, discussed and compared. These approaches allow us both to assess the impact of unexpected damage on the life of the A36 steel and predict its life or even improve it.. This approach allow us both to assess the impact of unexpected damage on the life of the A36 steel and predict its life or even improve it. In this paper we present the first part of our research we have determined the number of life cycles of A36 steel (smooth) from alternating fatigue tests with other static, as well as the different relations binding the various life phases of the material and the loading level applied. This allowed us to quantify the initial damage caused by the notch results that we will operate in future articles to determine and compare alternative approaches for the damage to lead to the development of a simple tool usable in a maintenance policy
S.No.: 322
Title : Analysis and Design of a Disk Microstrip Patch Antenna Loaded two Annular Ring
Authors Name: Raed M. Shaaban, Zeki A. Ahmed, Wail A. Godaymi
Authors Affilation: College OF Science University of Basra
Volume & Issue No.: Volume4Issue12
Abstract: In this paper presents design of circular microstrip antenna loaded two annular 𝐶𝑀𝑆𝐴𝐿2𝐴𝑅C . The propose designed using the moment of method and simulation by using Ansoft HFSS .Using coaxial probe feed is designed and fabricated at 14.47 GHz resonance frequencies and simulated on an Arlon AD320A (tm) substrate with dielectric constant εr of 3.2 and substrate size of (𝐿𝑆×𝑊𝑆×ℎ) 29 × 24 × 1.79 mm3 , disk patch radius(𝑅𝑝=6𝑚𝑚),and laded annular two ring (𝑅𝑎−𝑏=1𝑚𝑚) . The antenna parameters is presented in this paper by introducing such as , bandwidths for -10 dB reflection coefficient are 1.92 GHz (13.2%) (simulated) , 𝑉𝑆𝑊𝑅 < 1.12 for 50 Ω reference impedance and return loss is less than to -10dB.
S.No.: 323
Title : Mobile Based Tracking for Cloud Messaging Emergency Medical Service
Authors Name: C. Sunil Kumar
Authors Affilation: SNIST
Volume & Issue No.: Volume5Issue1
Abstract: This paper proposes Mobile Based Tracking for EMS (Emergency Medical Service) on cloud, by pressing power button the app or shaking the phone will send alert to nearest ambulance driver which is available among registered users also send message to emergency contact number. This helps to find appropriate hospital for his emergency even in an unknown area. This app also provides facilities to store electronic healthcare data which can be accessed by hospitals. It is observed that people in unknown area are in severe danger if they didnt able to find hospital quickly. In emergency case a single minute counts. So it is very important that automatic applications must be used for decision making, Maintain up to date status of the hospital and saving the time which can save life of the patient. The proposed system locates nearest available hospital, contacts its ambulance emergency system, accesses a Electronic Health Record of emergency patient that can critically assist in pre-hospital treatments. The system will identify availability of the nearest available specialized hospital all through EMS server which provides continuous information about the incoming patient to the hospital.
S.No.: 324
Title : Paper on Scope of Stress Management in Hotel Industry.
Authors Name: Purnima Bora
Authors Affilation: Faculty of Commerce and Management Studies, Department of Commerce, Kumaoun University, Nainital
Volume & Issue No.: Volume5Issue2
Abstract: Like any other tourism product or service the hotel product is not storable and in case of non use, it is perishable. The hotel business is highly competitive. For organizational effectiveness that is quality maintenance, growth, productivity and profit the work force in hotels are under high work pressure that results in stress and burnouts. Star category hotels demand duty round the clock. As the expectations are high, the Human resource is bound to undergo stress of different types. How one deal with the seemingly uncontrollable is the key to good management . As nature is full of differences and variety, stress too has its different implications. There is another face of stress, without it life would be routine and dull. One needs pressure but too much will make him/her unproductive and inefficient. Stress management can help in providing a new dimension to stress. This paper discusses scope of stress management in Star category Hotels of Uttarakhand, India. This paper contributes in the awareness and techniques to be taken for effective stress management in Star category Hotels of Uttarakhand. It will help in improving the work quality of employees and employee empowerment at different levels working in these Hotels.
S.No.: 325
Title : A Advance Approach for test case Prioritization for Regression Testing: A Survey
Authors Name: sulaxna solanki
Authors Affilation: mahila engg. college Ajmer(Rajasthan)
Volume & Issue No.: Volume5Issue2
Abstract: The main aim of regression testing is to test the modified software during maintenance level. It is an expensive activity and it assures that modifications performed in software are correct. An easiest strategy to regression testing is to retest all test cases in test suite, but due to limitation of resources and time it is inefficient to implement. Therefore, it is necessary to discover the techniques with the goal of increasing the regression testing’s effectiveness, by arranging test cases of test suite according to some objective criteria. Test case prioritization intends to arrange test cases in such a manner that higher priority test cases execute earlier those test cases of lower priority according to some performance criteria. A well organized test case prioritization technique reduces the cost of testing and fault detection capabilities of testing. We will go to purpose a new technique which reduces the cost of testing by using new approach for test case prioritization. Keywords- Regression testing, Test case prioritization, Genetic algorithm, Average percentage of faults detection (APFD).
S.No.: 326
Title : An Advance Approach for Test case Prioritization for Regression Testing: A Survey
Authors Name: SULAXNA SOLANKI
Authors Affilation: GOVT. WOMEN ENGG. COLLEGE, AJMER RAJASTHAN
Volume & Issue No.: Volume5Issue2
Abstract: The main aim of regression testing is to test the modified software during maintenance level. It is an expensive activity and it assures that modifications performed in software are correct. An easiest strategy to regression testing is to retest all test cases in test suite, but due to limitation of resources and time it is inefficient to implement. Therefore, it is necessary to discover the techniques with the goal of increasing the regression testing’s effectiveness, by arranging test cases of test suite according to some objective criteria. Test case prioritization intends to arrange test cases in such a manner that higher priority test cases execute earlier those test cases of lower priority according to some performance criteria. A well organized test case prioritization technique reduces the cost of testing and fault detection capabilities of testing. We will go to purpose a new technique which reduces the cost of testing by using new approach for test case prioritization.
S.No.: 327
Title : Proxy Re-encryption Schemes for Data Security in Cloud
Authors Name: Mrs. Vedika Pansare and Prof. Nilima Nikam
Authors Affilation: Yadavrao Tasgaonkar institute of engineering & Technology, Dept. of Computer Engineering Mumbai.
Volume & Issue No.: Volume5Issue3
Abstract: Abstract—Cloud computing is an emerging technology in which resources of the computing infrastructures are provided as services of the internet. Cloud allows user to access application without installation and their personal data at any computer with internet access. It provides with a way to share distributed recourses and services that belong to different organizations or sites. In cloud computing environment a number of extended Proxy Re-Encryptions (PRE), e.g. Conditional (CPRE), Identity-Based PRE (IPRE) and Broadcast PRE (BPRE), have been proposed for flexible applications. By incorporating CPRE, IPRE and BPRE, this paper proposes a versatile primitive referred to as Proxy Re-encryption Schemes for Data Security in Cloud is a Conditional Identity-based Broadcast PRE (CIBPRE) and formalizes its semantic security. CIBPRE allows a sender to encrypt a message to multiple receivers by specifying these receivers’ identities, and the sender can delegate a re-encryption key to a proxy so that he can convert the initial cipher text into a new one to a new set of intended receivers. We propose an efficient CIBPRE scheme with provable security. In the instantiated scheme, the initial cipher text, the re-encrypted cipher text and the re-encryption key are all in constant size and the parameters to generate a re-encryption key is independent of the original receivers of any initial cipher text. Finally, we show an application of our CIBPRE to secure cloud email system advantageous over existing secure email systems based on Pretty Good Privacy protocol or Identity-Based Encryption.
S.No.: 328
Title : Identifying initial condition in degenerate/singular parabolic equation from final observation
Authors Name: Khalid Atifi, EL-H. Essoufi, Khouiti bouchra
Authors Affilation: Laboratoire de Mathématiques, Informatique et Sciences de l’ingénieur (MISI), Université Hassan 1, Settat 26000, Morocco.
Volume & Issue No.: Volume5Issue3
Abstract: See the paper abstract
S.No.: 329
Title : Robust Digital Invisible Watermarkingfor Copyright Protection of Image using DCT (Discrete Cosine Transform)
Authors Name: Prof. Devasis Pradhan, Rabinarayan PanigrahiManini Monalisa Pradhan Dibyashree Panda
Authors Affilation: AIT, Banglore
Volume & Issue No.: Volume5Issue3
Abstract: Digital watermarking is an important issue for the copyright protection and ownership authentication in multimedia applications. We implement the watermarking algorithm using frequency domain technique by using DCT (Discrete Cosine Transform) on images. Here, the invisible watermarking is used to protect copyrights of multimedia contents. The invisible watermarks are new technologies which could solve the problem of enforcing the copyright protection is required for ownership identification as well as hidden information can also be identified. Where, the watermark is invisible to the human eye. Also, the authenticity of the information in the image can be obtained by comparing the watermarked image with the original image.
S.No.: 330
Title : ERUDITION ADAPTED MODEL FOR FACIAL APPEARANCE ANALYSIS AND GESTICULATION RECOGNITION
Authors Name: Karthika Rajarethinam, Shanmathy Arivinbam, M.R.Rajeswari, Veeralakshmi Ponnuramu
Authors Affilation: Prince Shri Venkateshwara Padmavathy Engineering College
Volume & Issue No.: Volume5Issue3
Abstract: Abstract- Image processing is the analysis and manipulation of a digital image, especially in order to improve its quality. This system is used to detect the human emotions from the input image. First an image is given as input, skin is segmented based on skin colour. The face region is then scanned by marking the edges of the face and the connected region is then cropped. From the cropped face image the eyes and the lips are separated. It draws Bezier curve for eyes and lips. Emotion of the Bezier curve is assigned as emotion of this image. The proposed approach in different applications: pain recognition and action unit detection using visual data and gestures classification using inertial measurements, demonstrating the generality of our method with respect to different input data types and basic classifiers. In terms of accuracy and computational time both with respect to user-independent approaches and to previous personalization techniques this project succeeds. This paper presents a framework for personalizing classification models which does not require labelled target data. It proposes a regression framework which exploits auxiliary annotated data to learn the relation between person-specific sample distributions and the parameters of the corresponding classifiers. Then, when considering a new target user, the classification model is computed by simply feeding the unlabeled sample distribution into the learned regression function.
S.No.: 331
Title : Enrichment of Education through new service model - TaaS
Authors Name: *Dr K Ravindranath , P N P Pujitha, P N S Divatejaswi
Authors Affilation: K L University
Volume & Issue No.: Volume5Issue3
Abstract: In perspective of the way that the information of distributed computing has been comprehensively actualized in various ranges, that passes on inventive plans for underwriting versatile learning. Professionals and recipients are worried in drawing the support of distributed computing to modify the present facilitating methods of learning administration systems(LMSs) in control to bless with extra handiness to mentoring providers, upgraded considering events to understudies and minor charges to together of them. Accordingly, a modern inclination shows up, in particular the mobile cloud based learning. Regardless of the possibility that mobile computing encourages learners to get to web based learning substance through recognizably utilized machines, it can be convoluted to cooperate in versatile environment, for which there are moderately a littler sum writing demonstrating to recommend strategies to create collaboration execution. Apparatuses over the cloud are administration situated, they can cooperate adapt ably and can be basically assembled to finish sequentially or in parallel to plot a work process. In view of this, we distinguished a learning stream, a plan of work process installing the Kolbs Team Learning Experience (KTLE).The learning stream is perceived by the mix of the cloud facilitating LMSs and recently arranged administration situated cloud based framework, cooperation as an administration- (TaaS).
S.No.: 332
Title : IMPLEMENTATION OF CAPTCHA BASED ON HUMAN FEELINGS
Authors Name: C.SREEJA,P. VENKATESWARA RAO,A.SAISIRISHA ,N. VAMSI KRISHNA ,CH.SUREENDDRA
Authors Affilation: KL UNIVERSITY
Volume & Issue No.: Volume5Issue3
Abstract: Objectives: This paper tries to provide a better CAPTCHA, which is easy for humans to use and difficult bots to crack. Methods/Analysis: The purpose of differentiating between humans and machines has been raised due to the corrupt operations of automated bots. CAPTCHAs (Completely Automated Public Turing test to tell Computers and Humans Apart) have been introduced to overcome such problems. CAPTCHA is a computer program or framework intended to distinguish human from machine input, typically as a way of opposing spam and automated extraction of data from websites. Findings: On the other hand, different textual and images based CAPTCHAs have been cracked recently by the bots. So, this is an opportunity for the development of new anti-automation methods. Novelty /Improvement: In this paper, we propose simple and effective emoticon CAPTCHAs, in other words CAPTCHAs based on human feelings. Here, we use checkboxes because it is really hard for bots to analyse a checkbox, this not only increases the security but also the efficiency of the system. We also discuss the pros and cons of different type of CAPTCHAs that are already available and how our new CAPTCHA can overcome the problems of the previous CAPTCHAs used. Keywords: CAPTCHA, spam, bots, human feelings, checkbox, Security.
S.No.: 333
Title : Efficient Prototype ofSecure SOAP Messagetransmission in Web Service
Authors Name: Amtul Waheed, Jana Shafi
Authors Affilation: 1Prince Sattam Bin Abdul Aziz University, College of Arts and Science, Riyadh Region, Saudi Arabia.
Volume & Issue No.: Volume5Issue3
Abstract: With the growth of web services security issues based on heterogeneous platform have become gradually more prominent. Web services Security provides basic means to secure SOAP messages. Secure transmission of SOAP messages play an essential task for the applicability of Web Services. The main confront to the secure transmission of SOAP messages includes: confidentiality, authentication, integrity, and both-party no repudiation. We explored and procure advantage of existing technologies to propose a Prototype Of Secure Transmission (POST) for the main mechanism of Web Services security and secure communication between client and web server in heterogeneous platform. The study in this paper indicates that for the basic requirement towards secure transmission of SOAP messages, our Prototype Of Secure Transmission (POST) is ensuring a high level security to SOAP message transmission over heterogeneous platform.
S.No.: 334
Title : An Improved Content Based Image Retrieval Approach using Local Binary Pattern (LBP)
Authors Name: Manju Prajapati, Govind Prasad Arya
Authors Affilation: M.Tech, Scholar, UTU, Dehradun
Volume & Issue No.: Volume5Issue3
Abstract: The increased necessity of content based image retrieval (CBIR) technique can be found in a variety of different domains such as Data Mining (DM), Education, Medical Imaging (MI), Weather forecasting Crime Prevention, , Remote Sensing (RS) etc. An image retrieval system permits us to browse, search & retrieve the images. In past because of very huge image collections the manual annotation approach was more tedious. In order to conquer these difficulties content based image retrieval (CBIR) was introduced. This paper presents the content based image retrieval (CBIR), using local binary pattern (LBP). The local binary pattern encodes the relationship between the referenced pixel & its surrounding neighbors by computing the GLD (gray-level difference). The objective of the proposed methodology is to retrieve the best images from the stored database that resemble the query image with an optimized way.
S.No.: 335
Title : DESIGN AND FABRICATION OF TWO WAY PADEL OPERATED HACKSAW MACHINE
Authors Name: Mukund S. Gosavi, Suraj D. Sawant, Prashant T. Sawant, Mahesh S. Gosavi
Authors Affilation: MECHANICAL ENGINEERING, SOLAPUR UNIVERSITY/FABTECH TECHNICAL CAMPUS COLLEGE OF ENGINEERING AND RESEARCH , SANGOLA, MAHARASHTRA, INDIA
Volume & Issue No.: Volume5Issue3
Abstract: This project work deals with the design and fabrication of a pedal powered two way hacksaw cutting machine. In this Pedal operated two-way hacksaw machine which can be used for Small scale Shop applications for cutting of wooden block, pvc pipe. The machine works on the principle of Scotch yoke mechanism. In scotch yoke mechanism rotary motion is converted into a To and Fro (reciprocating) motion. In this machine peddle in connected Sprocket ( ratchet ) through chain which is connected to scotch yoke mechanism to the hacksaw frame from both the side and the power is supplied to the hacksaw frame by means of chain. The main aim of this machine to reduce cutting time as well as energy. In which no external power is required for cutting operation, it also available in minimum cost. The peddle power two-way hacksaw machine, which runs on human power, works on the principle of the conversion of rotational motion to oscillatory motion. This is a project which saves electricity need and can be easily use in day today’s life.
S.No.: 336
Title : Performance and Emission Characteristics of Single Cylinder Diesel Engine with Safflower Biodiesel Blends
Authors Name: G.S. Guru Dattatreya1* , P. Sreenivasulu2
Authors Affilation: G Pulla Reddy Engineering College(Autonomous), A.P India,sankarguru123@gmail.com,9533052880
Volume & Issue No.: Volume5Issue4
Abstract: The consumption and demand for the petroleum products are increasing every year due to increase in vehicle population, standard of living and urbanization. This causes fast depletion of petroleum products, which leads to move towards the alternative fuels for researchers. Among so many alternative fuels for diesel engine, non edible vegetable oils are the most widely used under the test. The purpose of present work is to investigate the engine performance and emission characteristics of DI diesel engine with different blends of safflower seed oil. Engine tests have been carried out to obtain comparison of fuel consumption, specific fuel consumption, brake thermal efficiency, volumetric efficiency and smoke opacity and compared with that of diesel fuel. The aim of the proposed project work is to investigate experimentally the performance and emissions characteristics of safflower biodiesel at different loads. A single cylinder, direct injection, compression ignition engine has been selected for investigation. Keywords: D.I .Diesel Engine, Performance, Transesterification, Emissions.
S.No.: 337
Title : EXPERIMENTAL COMPARISON OF SOLAR COOKER USING BLACK COATED AND ALUMINIUM COATED BOX
Authors Name: Tariku Achamyeleh1, S.Ramu2, BantelaySintayehu3 and R.Srinivasan4
Authors Affilation: Debre Tabor University, Sri Muthukumaran Institute of Technology
Volume & Issue No.: Volume5Issue4
Abstract: Two different methods of solar cooker hasbeen designed to improve thermal performance of the solar cooker. We have committed to analyze the technical measurements such as cooker parameters, materials and energies. Two major solar cookers, aluminium plated and black coated boxes, are currently used to be tested both in load test. Thermocouples were used to measure the temperature of the two cookers at different parts of the cookers. Based on the input and output energy the two solar box cookers were compared on their efficiency. Theoretical and practical comparison was conducted to choose which cooker was the best in efficiency with the same working environment. These techniques are used to compute the solar cooker for betterment performance and comparison achievement on the studies and finally the experiment results are given by the maximum thermal performance at the aluminium laminated coated box.
S.No.: 338
Title : Image Mining for Leaf Classification to detect belonging tree by Association Reverse Rule Using Texture features
Authors Name: Aswini Kumar Mohanty, Amalendu Bag
Authors Affilation: KMBB College of engg & CET Bhubaneswar, Orissa, India
Volume & Issue No.: Volume5Issue4
Abstract: The image mining technique deals with the extraction of implicit knowledge and image with data relationship or other patterns not explicitly stored in the images. It is an extension of data mining to image domain. Textures are one of the basic features in visual searching, computational vision and also a general property of any surface having ambiguity. The main objective of this paper is to apply image mining in the domain such as different leaves belonging to different trees to classify and detect the exact belonging class of tree. Leaf images of different trees with different texture and shape including sizes can be classified into many classes as per given data base and to explore the feasibility of data mining approach. Results will show that there is promise in image mining based on content. It is well known that data mining techniques are more suitable to larger databases than the one used for these preliminary tests. In particular, a Computer aided method based on association rules becomes more accurate with a larger dataset. Traditional association rule algorithms adopt an iterative method to discovery frequent item set, which requires very large calculations and a complicated transaction process. Because of this, a new association rule algorithm is proposed in this paper. Experimental results show that this new method can quickly discover frequent item sets and effectively mine potential association rules. A total of 26 features including histogram intensity features and GLCM features are extracted from leaf images. Experiments have been taken for a data set of 322 images taken of different types with the aim of improving the accuracy by generating minimum no. of rules to cover more patterns. The accuracy obtained by this method is approximately 97% which is highly encouraging.
S.No.: 339
Title : MULTI-OPERATIONAL ELECTROMAGNETIC FORMING MACHINE
Authors Name: Abhishek Rane, Ghanshyam Pendurkar, Tejas Phage, Aniket natalkar, Ganesh Pednekar
Authors Affilation: SSPMs college of engineering, Kankavli
Volume & Issue No.: Volume5Issue4
Abstract: The purpose of this project is to design and fabricate the economic machine for small sized sheet metal products. Conventionally for production of these products large machines are used which are not cost economical. Also there is a loss of energy due to friction. The objective of this project is to reduce the energy consumption, cost and to perform the various forming operations on a single machine. The solution is obtained with the implementation of ‘Electromagnet’. Since the actuation is electrically assisted the operation is friction less and accurate. The punching force is controlled by varying current using ‘DIMMER’ circuit. The power is consumed only during the punching stroke resulting into efficient operation. After successful fabrication, the set up was tested and optical testing is done for any defects in the punched samples.
S.No.: 340
Title : Provide an approach to development and security preparation Farnzyky
Authors Name: Reza Sadeghi Rashed, Mohammad BagherMohammadi Lame
Authors Affilation: University of Shiraz
Volume & Issue No.: Volume5Issue4
Abstract: In the world, despite the efforts sparse for the use of information and communication technologies in some industries and businesses carried out, due to the lack of capacities and infrastructure required, preparation Farnzyky, causing a sharp drop in the performance of investments undertaken and the lack of benefits of ICT and mistrust and insecurity in And the vulnerability of information assets. In this regard Farnzyky preparation assessment models provide the most help in understanding the status quo. Elements such as access mechanism, event tags, structure, communication systems and operating systems, intrusion detection systems, standards for data collection run by technical and non-technical factors affect protection of witnesses and the time this location. In this paper, according to the progress of society in the field of computer networking vacuum talk Farnzyk and preparedness in this area due to the emergence of e-government, there is discussed that requires the review process liable to digital evidence is in case any thing happened to information assets to risk losing assets and lowered consumer expenditure in this area to ensure future Farnzyky assets.
S.No.: 341
Title : Knowledge Management In E-Learning: A Critical Analysis
Authors Name: Jui Pattnayak and Sabyasachi Pattnaik
Authors Affilation: Fakir Mohan University
Volume & Issue No.: Volume5Issue4
Abstract: The integration of knowledge management (KM) and e-learning (EL) become inevitable day by day. KM applications focus in providing institutions with tools to enrich knowledge, while the EL focuses on managing the delivery of academic knowledge. But integration of both the areas is far more behind in research. This research proposed a KM model to provide 24x7 hours synchronous collaborative learning. Requirement of KM in EL is the focus of this paper by creating a new approach of KM and emphasizing on various processes accompanying. Several Artificial Intelligence (AI) tools and technologies such as big data, linked data, semantic web, 3D visualization, etc. are incorporated hypothetically to achieve the collaborative learning environment.
S.No.: 342
Title : A hybrid modelling and Artificial Neural Network validation of plastic strain variation with workpiece average roughness
Authors Name: Y. Ech-charqy1, 2, H.Gziri2, M.Essahli1
Authors Affilation: 1University Hassan 1, Laboratory of Applied Chemistry and Environment, BP 577 Settat, Morocco 2University Hassan 1, Laboratory of mechanic, industrial management and innovation, BP 577 Settat, Morocco.
Volume & Issue No.: Volume5Issue4
Abstract: Many theoretical models for surface roughness assume that the plastic strain for a workpiece is influenced by cutting parameters, lubrications, machine vibration and other phenomena. The effect of the surface roughness is usually neglected in the investigation about plastic strain, the reason is the difficulty of modeling analytically the average roughness. In this work, the average roughness Ra is taken into account in order to predict the plastic strain ε, and the material behavior in turning. The analytical model for ε is developed as a function of three parameters, namely average roughness Ra, Poisson ratio υ, and a dimensional parameter Cd. For this modelling, the theory of beam was combined with Ernst- Merchant Theory, and Piispanen Model Card. The Results indicate that average roughness have a linear correlation with plastic strain. So, the impact of material properties in model is showed by Poisson ratio. Finally, the validity of model is tested by empirical and intelligent analysis
S.No.: 343
Title : Automated Timetable Generation using Genetic Algorithm
Authors Name: Mithila Shetye, Anusha Pai, Cassandra Dias
Authors Affilation: P.C.C.E.
Volume & Issue No.: Volume5Issue4
Abstract: Timetable generation is a very burdensome and time consuming task. This is usually done ‘by hand’, taking several days or weeks of iterative repair. Timetable generation is the NP-hard problem, which is very difficult to solve using conventional methods. A highly constrained timetabling problem can also be solved by evolutionary techniques. We must determine an acceptable assignment of the time slots and rooms to the courses based on a variety of their requirements. This project will try to reduce the difficulties of generating timetable by using Genetic Algorithm. By using Genetic algorithm, the time required to generate time table will be reduced and the generated timetable will be more accurate, precise and free of human errors. Main goal is to minimize the number of conflicts in the timetable. System generates timetable for each class and faculty, in keeping with the availability calendar of teachers, availability and capacity of physical resources (such as classrooms, laboratories and number of computers) and rules applicable at different classes, semesters, faculty and subjects level. Project results will possibly show that the genetic algorithm improves the fitness of the population for each generation, and it returns a feasible solution, even for the most constrained benchmarks.
S.No.: 344
Title : A Survey on Ensemble computing Method for Rainfall Prediction in different regions of Chhattisgarh
Authors Name: SHAHISTA NAVAZ , HUMA KHAN AND S.M GHOSH
Authors Affilation: KITE,RAIPUR RCET,RAIPUR
Volume & Issue No.: Volume5Issue5
Abstract: India is an agricultural country and most of economy of India depends upon the agriculture. Rainfall plays an important role in agriculture so early prediction of rainfall is necessary for the better economic growth of our country. Rainfall Forecasting is one of the most challenging topics across the globe. Unlike traditional methods, modern Weather forecasting involves a combination of knowledge of trends and patterns and computer models. Using these methods, accurate forecasting could be done. Forecasting System is based on any architecture or technology such as Artificial Neural Network Forecasting, Sensor-Based, Numerical weather prediction model, Fuzzy sub-system or a used friendly web based system. The weather predictions in advance of 2-8 days are also possible. Forecasting could be carried out globally or region based. This paper represents a review of different rainfall prediction techniques for the early prediction of rainfall prediction of rainfall. It also focuses on giving different ways to forecast the weather in different regions. The paper presents the review of Rainfall Forecasting using different techniques and studies the benefit of using them. It provides a survey of available literatures of some techniques given by different researchers. The technical success, that have been achieved by various researchers in the field of rainfall forecasting ,has been reviewed and presented in this survey paper.
S.No.: 345
Title : Classification Analysis of Student Performance usingDecision Trees and Optimization Algorithms
Authors Name: Arjun Panicker, Dipannita Panda, S. Thenmalar
Authors Affilation: SRM University
Volume & Issue No.: Volume5Issue5
Abstract: Data mining is used to extract information which can aid to knowledge building and to develop useful relationships among features stored in a large dataset. In universities, teachers are concerned about the performance of the students which is of great importance considering their career. This research based project is an attempt to select a machine learning algorithm that is more suited to classify the result of the students in their final examination. The data set has been taken from the UCI Repository and the algorithms for the classification analysis of student performance include C5.0, Random Forest and SVM (Support Vector Machines) and the language used is R language. The feature set used for training the model and testing it does not include the marks obtained by the students in their previous examinations. Our paper would be predicting the result beforehand so that the student, teacher and the parents could be prepared for the consequences of the same. We have used supervised learning to achieve higher accuracy.
S.No.: 346
Title : EXPERIMENTAL INVESTIGATION ON 4 –STROKE SINGLE CYLINDER DIESEL ENGINE BLENDED WITH TYRE OIL
Authors Name: R.JYOTHUNAIK
Authors Affilation: NARASARAOPETA ENGG COLLEGE NARASARAOPET
Volume & Issue No.: Volume5Issue5
Abstract: Due to the scarcity of conventional fuels, the crude oil the price was going up day to day and there will be no more conventional fuels in future and also increasing the environmental pollution by the usage of crude oils there is a need for the search of alternative fuel sources for the automobile applications. There are many alternate fuels we already existing like bio-diesel, bio-mass, alcoholic fuels, hydrogen, non-fossil methane and non-fossil gases (like LPG, CNG) and other bio-mass sources which were useful for different applications, out of these bio-diesels are one of the prominent alternative fuel for diesel engines. Generally bio-diesel is the renewable fuel which is derived by chemically reacting with the sources of bio diesel like vegetable oils, animal oils, plastics, and waste automobile tyres etc. The chemical reaction requires a catalyst usually a strong acid or base such as sulfuric acid, sodium or potassium hydroxide, and produces a new chemical compounds called methyl or ethyl esters of the vegetable crude oil which is called as bio-diesel. Therefore in the present investigation the oil taken is the tyre pyrolysis oil which was obtained by the pyrolysis of the waste automobile tyres.
S.No.: 347
Title : Comparitive analysis of carbon nano tube coated tool and HSS tool
Authors Name: ABHISHEK KUIMAR
Authors Affilation: DELHI TECHNOLOGICAL UNIVERSITY
Volume & Issue No.: Volume5Issue5
Abstract: This study focuses on synthesis of carbon nanotube (CNT) on HSS single point cutting tool & comparative analyses of tool-wear of non-coated and CNT coated HSS single point cutting tool in machining of EN8 steel work piece. Chemical vapor deposition method is used for synthesis of CNT on this tool. The gases used for this method is acetylene and argon which have very less cost also this coating have less cost due to this CNT coated tool can be commercially used for machining. Analysis done by computing three forces such as cutting force, feed force &thrust force with the help of dynamometer under different machining parameters. Obtained results shows that CNT coated tool have high machinability, more hardness & less tool wear.
S.No.: 348
Title : Design and Implementation of a Customized Compiler
Authors Name: Govind Prasad Arya, Neha Sohail, Pallavi Ranjan, Priya Kumari & Shabina Khatoon
Authors Affilation: Department of Computer Science & Engineering, Shivalik College of Engineering Affiliated to Uttarakhand Technical University, Dehradun
Volume & Issue No.: Volume5Issue5
Abstract: DFA (Deterministic Finite Automata) is designed for the set of customized tokens that we have taken. A grammar in compiler is a set rule that specify how sentences can be structured with the terminals, non-terminals, the set of productions and the start symbol. CFG (Context Free Grammar) is used in compiler for parsing. This paper presents the steps to convert a high level language written according to our customization into assembly language. It also presents what is a compiler, its phases and functions. Basically, the compiler passes through the six phases but here only the implementation through three phases are shown, i.e Lexical Analyzer, Syntax Analyzer and Target Code Generation. The Target Code generated here is in Assembly Language.
S.No.: 349
Title : Wireless Home Appliance Control Using IOT
Authors Name: Govind Prasad Arya, Atiya Mumtaz & Suryakant Ghildiyal
Authors Affilation: Department of Computer Science & Engineering, Shivalik College of Engineering Affiliated to Uttarakhand Technical University, Dehradun
Volume & Issue No.: Volume5Issue5
Abstract: This paper explains how with the help of mobile phone WiFi one can control various home appliance or devices. This paper is explaining How to control designed circuit of two bulbs wirelessly but according to ones need one can connect any device (sensors, Appliance etc, upto 8) to NodeMCU and can gain wireless control over it, With the help of this paper one can implement circuit and connect it with NodeMCU, Program it accordingly with the help of Arduino and control device with the help of a Smartphone. This paper is mostly helpful to those who want to work on it as their project as practical implementation in homes requires certain changes.
S.No.: 350
Title : Solar Based Three Phase Power Supply Using Seven Level Inverter
Authors Name: Pankaj Bagal
Authors Affilation: CIIT,Indore
Volume & Issue No.: Volume5Issue5
Abstract: This paper implements an efficient way to power generation system, using solar power. Solar energy system is used to collect maximum power from sun. This proposal is to use the solar panels implemented in this project more efficiently and to carry out a realistic experimental approach to enhance the solar output power. We can broadly categorize these sources as renewable and nonrenewable sources. The renewable sources include: solar energy, wind energy, biomass energy, geothermal energy, tidal energy etc. The non-renewable energy sources include fossil fuels (coal, oil, natural gas), nuclear power. While the non-renewable energy sources will get exhausted eventually in the next century. Therefore we are going for the renewable sources because they do not exhaust, they can be used for long time, freely available from nature, does not affect environment. In recent years, the interesting solar energy has risen due to surging oil prices and environmental concern. In many remote or under developed areas, direct access to an electric grid is not easily possible and therefore photovoltaic inverter system which works on solar energy would make life much simpler and more convenient. With this in mind, this project aims to design, build solar panel inverter. Multilevel inverters (MLI) are highly being used for medium voltage and high power applications due to their various advantages such as low voltage stress on the power switches, low electromagnetic interferences (EMI), low dv/dt ratio to supply lower harmonic contents in the output voltage and current. Multilevel inverters have become more popular over the years in electric high power application with the promise of very low disturbances and the possibility to function at lower switching frequencies than ordinary two-level inverters. This paper presents different topologies, emphasizing mainly on seven level inverters
S.No.: 351
Title : Carrier suppressed parametric pump for Flat Gain Raman parametric hybrid amplifier in Dense Wave Multiplexed systems
Authors Name: Dr. Gaganpreet Kaur
Authors Affilation: Thapar University, Patiala, Punjab
Volume & Issue No.: Volume5Issue5
Abstract: We demonstrate improved performance of Raman parametric hybrid amplifier for L-band amplification in Dense Wave division Multiplexed (DWDM) systems using novel parametric pump modulation. Results have been evaluated in 16 x 10 Gbps, NRZ(non-return to zero), 25 GHz DWDM system employing CSRZ (Carrier suppressed Return to Zero) modulation. Evaluated results are compare with conventional DWDM system in of gain flatness, Bit Error Ratio(BER), eye diagrams and Q factor. Gain ripple is improved by nearly 11 dB while the. Q-factor at high parametric pump powers increases by factor of 1.33 resulting in significant BER improvement when using CSRZ modulated FOPA pump. Hybrid modulation of parametric pump has been proposed to suppress the high power idlers by controlling the shape of the pump signal using hybrid modules. Due to Four Wave Mixing (FWM) the parametric gain falls near the pump vicinity. Higher the pump power more severe is the fall in the gain. This sudden fall of gain around pump region defeats the use of parametric amplifier for flat gain. Though Raman-parametric hybrid is able to improve the gain flatness by tuning Raman amplifiers in the region of parametric gain fall but gain ripple is still significant. So employing pump modulation, flat gain of 40.45 dB has been achieved with maximum gain ripple of 2.63 dB has been achieved using the proposed model when extended to 100 x10 Gbps system. The peak to peak gain variation of less than 1.2 dB has been achieved using CSRZ modulated parametric pump. Due to phase dependence of FWM, phase modulated pump show much better results confirming effective suppressing of FWM generated idlers using pump modulation.
S.No.: 352
Title : Control of Three Phase Inverter using DSP for Renewable Energy Applications
Authors Name: Vinayak Tiwari, Piyush Wankhede, Riya Verma, Dr. Ujjwala Mate
Authors Affilation: College Of Engineering, Pune - 05
Volume & Issue No.: Volume5Issue5
Abstract: Inverter is the most important device to utilize the renewable energy sources efficiently. The Sinusoidal Pulse Width Modulation (SPWM) technique is one of the most popular PWM techniques for harmonic reduction of inverters since these use three sine waves displaced in 120? phase difference as reference signals for three phase inverter. Nowadays the SPWM switching signal is generated with the help of different FPGAs, microcontrollers and microprocessors. But for these kind of devices it is necessary to do programming or coding. This paper represents the SPWM technique for harmonic reduction and shows how to generate SPWM switching signal using Digital Signal Processor for three phase pulse width modulated (PWM) voltage source inverter (VSI).
S.No.: 353
Title : A Model Approach for Verifying Outsourced Computation of Cloud for Frequent Itemset Mining
Authors Name: Umesh Borse
Authors Affilation: Smt Kashibai Navale College of Engineering, Pune.
Volume & Issue No.: Volume5Issue6
Abstract: In recent years, It has been shown that outsourcing the most expensive task in data mining process to a service provider (e.g., cloud) brings several benefits to the data owner such as cost relief and less commitment to storage and computational resources. This introduces Data mining as Service paradigm. An Outsourcing data to the server facing a critical problem of verification, whether the server returned correct and complete computation result to the client. The correctness integrity of mining results may be corrupted if the service provider is with random fault or malicious. In the case of frequent itemset mining Apriori, Eclat, FP-growth algorithms are used for a vast database which contains a large number of transactions. Merkel hash tree, Bilinear pairing, Artificial Itemset Planting(AIP) techniques are used for result verification of outsourced computation. The work introduces a new system for result verification of outsourced frequent itemset mining computation. In proposed system tree comparison is the main component used for the verification. Client formed tree from received result of outsourced computation by calculating support value for the frequent itemset, and another tree is created for the small part of the outsourced computation. By comparing these two trees verification of the outsourced computation is done.
S.No.: 354
Title : OPTIMIZATION OF STEGANOGRAPHY ON AUDIO WAVE AND EMBEDDING MINIMUM AND MAXIMUM MESSAGE INTO VARIOUS LAYERS
Authors Name: Sachin Kumar
Authors Affilation: SKITM
Volume & Issue No.: Volume5Issue6
Abstract: Steganography is a sub-discipline of information hiding that focuses on concealing the existence of messages. It is the study of techniques for hiding the existence of a secondary message in the presence of a primary message. Here we embed minimum and maximum message in to the various layers of audio wave. Digital audio is stored on a computer as a sequence of 0s and 1s with the right tools, it is possible to change the individual bits that make up a digital audio file. Such precise control allows changes to be made to the binary sequence that are not discernible to the human ear. In a computer-based audio steganography system, secret messages are embedded by slightly altering the binary sequence of a sound file. We propose complete steganography on wav audio files using four stages of genetic algorithm – Encryption, Modulation, Decryption and Demodulation. We can hide any text within the layer of data structure of wav files.
S.No.: 355
Title : Virtual Consciousness from 3D to 4D Password:A Next Generation Security System Inspiration
Authors Name: SAURABH
Authors Affilation: GURU GOBIND SINGH INDRAPRASTHA UNIVERSITY
Volume & Issue No.: Volume5Issue6
Abstract: We have many authentication schemes presently, but they all have a few disadvantages. So recently, the 3D password paradigm was introduced. The 3D password is multi-factor authentication system as it uses a various authentication techniques such as graphical password, textual password etc. Most important part of 3D password is inclusion of 3D virtual environment. However the 3D Password is still in its initial stages. Designing various kinds of 3D virtual environments, interpreting user feedback and deciding on password spaces, and experiences from such environments will bring about upgrading and enhancing the client experience of the 3D Password. Moreover, gathering attackers from various foundations to break the system is one of the future works that will lead to system improvement and demonstrate the complexity of breaking a 3D password. This paper introduces a study of the 3D password and a way to deal with reinforce it by method for including a Fourth dimension, that that deals with time recording and gesture recognition, and that would help strengthen the authentication paradigm. Henceforth we endeavor to propose a 4D Password as a one-up technique to the 3D Password.
S.No.: 356
Title : DESIGN, MODELING AND CFD SIMULATIONS OF A MICRO HYDRO PELTON TURBINE RUNNER
Authors Name: Tilahun Nigussie1*, Edessa Dribssa2, Abraham Engeda3
Authors Affilation: 1(School of Mechanical and Industrial Engineering, Addis Ababa Institute of Technology, Ethiopia) 2(School of Mechanical and Industrial Engineering, Addis Ababa Institute of Technology, Ethiopia) 3(Department of Mechanical Engineering, Michigan State University, Mechanical Engineering Department, USA),
Volume & Issue No.: Volume5Issue6
Abstract: Utilisation of Micro hydro-power as renewable energy source is of great concern now a-days. For this purpose, selected types of micro hydro turbines such as Pelton, cross flow can be designed and developed depending up on the site locations. Besides, the incorporation of computational fluid dynamics (CFD) in the design process appears to be necessary in order to improve their efficiency and cost-effectiveness beyond the traditional design practices. Thus, this paper envisions/ addresses the design, modeling and CFD simulation of a Pelton turbine for one of the selected potential site (Indris River) in South West Shewa of Ethiopia to meet the requirements of the energy demands. The site has a net head of 47 m, flow rate of 0.14 m3/s and theoretical hydropower energy of 48.123KW. The design process starts with the design of initial dimensions for the runner based on different literatures and directed towards the modeling of bucket in a 3D Cad tool called CATIA V5. The runner has been analyzed in ANSYS CFX simulation tool and ANSYS static structural testing tools under given loading conditions of the turbine. The torque calculation from CFX result was further used to calculate the hydraulic efficiency. Finally, a methodology is presented to improve further the hydraulic efficiency along with complete visualization of the computed flow field using CFD.
S.No.: 357
Title : Cybersecurity Attacks: Common Vulnerabilities in the Critical Infrastructure
Authors Name: Sohail Razi Khan, Professor Luis Borges Gouveia
Authors Affilation: University Fernando Pessoa, Computer Science Department, Porto, Portugal
Volume & Issue No.: Volume5Issue6
Abstract: The future of the digital economy relies upon the ability of cybersecurity technical solution with non-technical areas working in tandem with business units, executives, providers, and end-users to prevent any cyberattacks. In the recent many years there are multiple targeted cyberattacks carried against the critical infrastructures of a digital economy across the world. These cyberattacks have resulted in permanent or long term damage to the critical infrastructure and there is steady rise in the cyber and physical security related events that continue to raise the concerns. In this paper the attempt is made to identify the vulnerabilities that exist in the critical infrastructure that are exploited by the attacker to carry out a successful attack. The paper identifies software security vulnerabilities, poorly design networks, weak configuration vulnerabilities as a major vulnerabilities that are exploited to carry out successful attacks on the critical infrastructures. The paper identified nontechnical vulnerabilities such as talent gap, budget constraints, lack of management priority and weak cyber security mechanism across various regions for a multi-national business that is spread across the globe as common vulnerabilities that are exploited for successful attacks on the critical infrastructure.
S.No.: 358
Title : Artificial Intelligence and Bluetooth Techniques in a Multiuser M-learning Domain
Authors Name: shilpa rana
Authors Affilation: VES Institute of Technology Mumbai, Maharashtra, India
Volume & Issue No.: Volume5Issue7
Abstract: This paper present implementation of mlearning that combines Artificial Intelligence (AI) and Bluetooth (BT) techniques. The objective is to build an m-learning environment where students can work in a customized way also the system provides teachers with real-time feedback about individual and group learners and how mobile learning can aid in learning, its strengths and current challenges. Applying BT capabilities on this domain can be isolated into a classroom and used by several learners simultaneously. The student activities can be supervised by means of AI strategies (planning, scheduling and expert systems). Integrating these technologies like the whole system will be able to recognize each of the users, organize his/her work and evaluate his/her results without or little educator intervention. Developing of this technology contains an empirical analysis of students performance, perceptions, and achievements when using ALAS on mobile devices.
S.No.: 359
Title : Artificial Intelligence and Bluetooth Techniques in a Multiuser M-learning Domain
Authors Name: shilpa rana
Authors Affilation: VES Institute of Technology Mumbai, Maharashtra, India
Volume & Issue No.: Volume5Issue7
Abstract: This paper present implementation of mlearning that combines Artificial Intelligence (AI) and Bluetooth (BT) techniques. The objective is to build an m-learning environment where students can work in a customized way also the system provides teachers with real-time feedback about individual and group learners and how mobile learning can aid in learning, its strengths and current challenges. Applying BT capabilities on this domain can be isolated into a classroom and used by several learners simultaneously. The student activities can be supervised by means of AI strategies (planning, scheduling and expert systems). Integrating these technologies like the whole system will be able to recognize each of the users, organize his/her work and evaluate his/her results without or little educator intervention. Developing of this technology contains an empirical analysis of students performance, perceptions, and achievements when using ALAS on mobile devices.
S.No.: 360
Title : Design & Implementation of a DNA Compression Algorithm
Authors Name: Manju Rani, Pawan Kumar Mishra
Authors Affilation: M.Tech Scholar, UTU, Dehradun Assistant Professor - CSE Uttarakhand Technical University, Dehradun
Volume & Issue No.: Volume5Issue7
Abstract: If we talk about the DNA arrangements, we understand that it oversees only four pictures addressing four nucleotide bases {A, C, T, G}. these four pictures could have been shown as {00, 01, 10, 11} independently, where we can watch that every nucleotide base having 8 bit is made to include 2 bits, when encoded in the already said parallel shape. This could have been a champion among the most capable encoding designs, if and only if there were the same pictures in the plan, other than A, G, T and C base characters. Here, however the encoding ought to be conceivable, yet essential issue will occur in the midst of decompression as the twofold code of the unanticipated picture like N or S will organize with the matched code of A, G, T and C. An another sort of figuring used for DNA weight is Differential Direct (2D) Coding Algorithm, which can vanquish this issue by isolating between the base characters and the astounding pictures. The 2D coding computation uses the social occasion of three characters (triplets), being supplanted by some other character [28]. This calculation was essentially intended to separate between the arrangement information and the assistant images, which had many drawbacks in the Direct Coding algorithm. In this research we are presenting an improved DNA compression algorithm which is based on differential direct coding and variable length look up table.
S.No.: 361
Title : Design & Implementation of a Page Replacement Algorithm Using Block Reading
Authors Name: Ruchi Gairola, Sanjay Kumar
Authors Affilation: M.Tech Scholar, UTU, Dehradun Assistant Professor - CSE Uttarakhand Technical University, Dehradun
Volume & Issue No.: Volume5Issue7
Abstract: The software developers write programming codes of any length without concerning of primary memory available with the users. It is possible by using the concept of virtual memory. As the name implies, virtual memory is a concept of executing a programming code of any size even having a primary memory of lesser size than the size of program to be executed. The virtual memory is implemented with the help of concept called paging. The operating system allocates a number of memory frames for each and every program to be executed. The programming code is equally divided into a number of pages. The size of pages and memory frames are kept equal for the better utilization of the memory. As every process is allotted a limited number of memory frames, the need of page replacement is obvious. To overcome this limitation, a number of page replacement techniques are proposed by the researchers. In this thesis I have proposed an improved page replacement technique which is based on the concept of block reading from the secondary storage. The disc access is very slow as compared to primary memory access. Whenever there is a page fault, the required page is accessed from the secondary storage. The frequent page faults increase the execution time of process. As per the proposed methodology, a number of pages equal to the allotted memory frames are read every time when there is a page fault. After reading a block of pages, it definitely increases the possibilities of page hit and as a result it will improve the hit ratio for the processes.
S.No.: 362
Title : A Priority Based Round Robin CPU Scheduling Algorithm
Authors Name: Monika Belwal , Sanjay Kumar
Authors Affilation: M.Tech Scholar, UTU, Dehradun Assistant Professor - CSE Uttarakhand Technical University, Dehradun
Volume & Issue No.: Volume5Issue7
Abstract: Operating system is an essential part of any computer system. Scheduling is the basic paradigm of an Operating System. Process scheduling is the technique of arrangement of processes in order to execute in a defined fashion. The aim of scheduling is to make the system efficient and fast. The basic scheduling algorithms are: First Come First Serve (FCFS), Round Robin, Priority Based Scheduling, Shortest Job First (SJF) etc. Our main focus is on Round Robin Scheduling algorithm. There are various issues related to Round Robin Scheduling. One of the limitations of Round Robin Scheduling is the length of the Time Quantum. If the Time Quantum is too large, the scheduling will be similar to FCFS otherwise a smaller Time Quantum results in increased Context Switches. Our main objective is to overcome this limitation of traditional Round Robin scheduling algorithm and make maximum utilization of the CPU and make the system more efficient. In this thesis, we proposed an algorithm that categorizes the processes as High priority processes and low priority processes. The proposed scheme reduces the average waiting time of high priority process irrespective of the low priority process. The overall average waiting time will change according to the set of processes considered. Based on the average waiting time, it is justified that the proposed scheme provides reduced average waiting time of the process set than previously proposed schemes.
S.No.: 363
Title : Implementation of Mining Trajectory Patterns for various Temporal Tightness
Authors Name: 1. Ashwini Maruti Bhingare 2.Rahul.L .Paikrao
Authors Affilation: Amrutvahini college of Engineering,sangamner
Volume & Issue No.: Volume5Issue7
Abstract: Some traditional methods of UT pattern mining are inefficient as well as more complicated which only capable of identifying specific type of trajectory pattern from input dataset. We proposed UT-pattern mining framework to address the limitations of previous methods. It contains two phases to mine UT patterns such as, initial pattern mining & pattern forest construction. Clusters of various UT patterns are constructed using Traclus method. This cluster contains initial UT patterns. After pattern forest construction, patterns are classified into different categories such as, time relaxed, time constrained & time independent. Along with the UT pattern discovery & classification proposed system identifies Geographical Mobility Borders. With experimental result system demonstrates the efficiency of UT pattern framework in terms of time and memory.
S.No.: 364
Title : Patient report Retrieval Using Semantic LDA with Cosine Similarity
Authors Name: Poonam Yadav
Authors Affilation: D.A.V College of Engineering & Technology, Kanina, Haryana 123027, India
Volume & Issue No.: Volume5Issue7
Abstract: Now a day, the enlargement of information technology has altered the entire human life which includes medical and healthcare behaviors. A medical information storage and retrieval system is a precious tool used by the healthcare professionals for investigating the medical cases. Extracting the similar cases from the case database can aid the doctors to recognize the same kind of patients and their treatment details. This paper presents the case retrieval method for extracting the similar cases from the collection of patient’s reports. Initially, the patient’s details are gathered and divided into 100 reports. Then, the stop words and delimiters are removed from these reports, and each report is applied to the SLDA model. The SLDA model generates the topic keywords for the reports, and the patient-topic matrix is constructed. Then, the query report is sent to the proposed system, the stop words removal and the stemming process is performed. Then, the keywords in the query report are matched with the retrieved topic keywords, the most similar topic is extracted and the corresponding patient report is retrieved from the database. The matching process is performed by the cosine similarity. The performance of the proposed method is analyzed with the existing methods, such as LDA and LDA+CS for the performance measures DCG and fall-out. The experimental results show that the proposed method attains the higher DCG of 20.154 and the minimum fall-out 0.032 when compared to the existing methods.
S.No.: 365
Title : A Method Based on Sequential Access Patterns for Information Retrieval
Authors Name: Poonam Yadav
Authors Affilation: D.A.V College of Engineering & Technology
Volume & Issue No.: Volume5Issue7
Abstract: Extraction of relevant information from the web has become the emerging challenge as the data in World Wide Web has been progressively increased. To solve this problem, a valid method called web usage mining is used that can mine weblogs for user models and recommendations. The general recommender systems of the web mainly function on the basis of association rule mining and clustering. Apart from this, web personalization is proposed in this paper which adopts sequential access pattern mining. The recurrent sequential web access patterns are recognized through this method. Those patterns are further stored in tree structure termed as pattern-tree. The subsequent processes such as matching and producing web links for recommendation are done with these stored patterns. Finally, a valuable performance analysis is carried out to validate the proposed model.
S.No.: 366
Title : Android Application Pen-testing Framework
Authors Name: Dr. Digvijaysinh Rathod
Authors Affilation: Institute of Forensic Science, Gujarat Forensic Sciences University
Volume & Issue No.: Volume5Issue8
Abstract: Android OS running Smartphones are widely accepted and popular in the recent years and as the vogue of using the Android applications in the android phone are inspiring the Android developers to build verities of Android applications. There are 2.8 million android applications in Android play store itself. Security pet-testing of Android mobile application is challengeable and complicated for pen-tester because of various versions of Android OS and mobile phone fragmentation. The two major problems found in Android applications were Insecure Communication over the network and Code Mitigating which includes altering some portion of code which leads certain benefits to the attacker. There are various other ways to penetrate the android applications and find innumerable vulnerabilities and bugs which might lead to critical organizational fail. I used Santoku OS which is Linux based open source operating and Genymotion to configure virtual envirnmentwith DIVA (Damn insecure and vulnerable App) to perform mobile application penetration testing. I elaborated broad categories of mobile application vulnerabilities and demonstrate practically vary crucial security loophole - insecure data storage, insecure communication and data leakage.
S.No.: 367
Title : Incident Response Management
Authors Name: Dr. Digvijaysinh Rathod
Authors Affilation: Institute of Forensic Science, Gujarat Forensic Sciences University
Volume & Issue No.: Volume5Issue8
Abstract: Incident Response is an important component of an enterprise business continuity and resilience program. The increasing numbers of information security threats can damage enterprise working business and can harm enterprise information assets. A well configured Incident Response Framework can help reduce the number of Incidents.Understanding the incident and methodologies to effectively manage unexpected disruptive events with the objective of minimizing impacts and maintaining or restoring normal operations within defined time limits should be important part of any companies’ business plan. The aim and objective of this paper is to propose and configure an effective incident response management framework to detect, report and eliminate the incident. Same proposed IRM framework is configured and tested with AlienVault named ‘OSSIM’.
S.No.: 368
Title : Effective Mobile Based Health Care System By Body Sensor Networks (BSNs)
Authors Name: Dr K Rajendra Prasad
Authors Affilation: Institute of Aeronautical Engineering
Volume & Issue No.: Volume5Issue8
Abstract: Nowadays, many of us are facing with health issue, so that it is emerging need to solve health issues for being additional health aware. With the advent of device primarily based technologies, its become create wearable wireless biometric device networks, known as Body sensor Networks (BSNs) which permit individuals to gather their health knowledge and send it remotely for more analysis and storage. Analysis has shown that the employment of BSNs allows remote wireless diagnosing of varied health conditions. During this paper, we propose a unique stratified design for sensible health care system where health community service suppliers, patients, doctors and hospitals have access to real time knowledge that has been gathered using numerous sensory mechanisms. Associate in nursing experimental case study has been enforced for analysis. Early results show edges of this method in up the standard of health care.
S.No.: 369
Title : Evaluation of best Steganography Tool using Image Features
Authors Name: Jensi Lakdawala, Jiya Rankawat, Preeti Bhatt
Authors Affilation: UKA Tarsadia University
Volume & Issue No.: Volume5Issue8
Abstract: Steganography is technique of hiding a data under cover media using different steganography tools. Image steganography is hiding of data (Text/Image/Audio/Video) under a cover as Image. This review paper presents classification of image steganography and the comparison of various Image steganography tools using different image formats. The attainment of this study is to identify the reliable and best tool available in the market for Steganography. Analysing numerous tools on the basis of Image features and extracting the best one is the main goal of this paper.
S.No.: 370
Title : DATA DISSEMINATION PROCESS IN WIRELESS BODY AREA NETWORKS FOR HEALTHCARE APPLICATIONS
Authors Name: Mohd. Zakir Hussain
Authors Affilation: Genesys International
Volume & Issue No.: Volume5Issue8
Abstract: Advancements made in the field of wireless communication have paved the innovation of Wireless Body Area Networks (WBANs). It’s a sort of wearable computing devices embedded into tissue of human parts to monitor the health issues of patients from anywhere. Though, it offers variety of fruitful services, Security is the major concern. Data collection and data dissemination process are to be effectively handled to offer better end-to-end services. In this paper, we design an access control scheme which stores, transmits and retrieve the sensitive data to the concern users via certificateless signcryption scheme. Controller is the main part of WBAN architecture where the data are preserved. When the user is in need of patient’s data, the retrieval process from controller to user should be safer and easier process. The ciphertext are duly signed in order to make strong authentication process. When the user satisfies with the established secret key, the ciphertext data is returned. Experimental analysis is done for security purpose in terms of efficient key generation, processing cost and energy consumption. Our proposed scheme achieves lessened storage space with efficient key updates and data retrieval process within stipulation period of time.
S.No.: 371
Title : IMPROVISED OPPORTUNISTIC ROUTING FOR UNDERWATER WIRELESS SENSOR NETWORKS
Authors Name: Mohd. Zakir Hussain
Authors Affilation: Genesys International
Volume & Issue No.: Volume5Issue8
Abstract: In the recent years, Underwater Wireless Sensor Networks (UWSNs) has attracted the wireless research communities. Resource Discovery (RD) and Ocean monitoring are the two concepts explored by the researchers. In order to achieve successful packet delivery ratio, the constraints in acoustic communication channel has to be explored. This paper concentrates over devising opportunistic routing protocols using acoustic communication channel. Improved opportunistic routing protocols takes advantage of distributed beaconing, constructs the adjacency graph at each hop and selects a forwarding set that holds the best trade-off between reliability and energy efficiency. The unique feature of an improved opportunistic routing is the selection of accurate next-hop forwarder nodes which trade-off the node configuration issue. Our simulation result shows that improved opportunistic routing works better than prior routing protocols, GOR in terms of reduced packet loss, energy consumption, end-to-end delay and propagation deviation factor.
S.No.: 372
Title : COST MINIMIZATION MODEL FOR ONLINE SOCIAL NETWORKS IN GEO-DISTRIBUTED CLOUDS
Authors Name: Mohd. Zakir Hussain
Authors Affilation: Genesys International
Volume & Issue No.: Volume5Issue8
Abstract: The growth of internet services have greater impact among the social users. Cloud computing is the recent technology adopted by several Internet Service Providers (ISPs). Data center is the core part of the cloud technologies. Irrespective of different geographic locations, the data availability should be an easier process. Different sorts of system objectives can be addressed for data placement and replication process at different cloud servers. Social users have different proximities for every location. This paper resolves the data placement issue for Online Social Networks (OSN). Usually, the user’s data are interconnected at different locations. Every read/write operations incur storage costs. Thus, we have proposed an enhanced cost optimization model for placing social media data which investigates the storage cost, redistribution cost and total estimated cost. Experimental analysis is carried out in Twitter dataset. The local information about the user i.e profile data and their connection details are collected for certain period of time. The cost is optimized from the throughput factor of the data placements over the cloud servers. Based on the geographical distance value, the user data are placed over the cloud servers. The cost is explored for one-time cost reduction and continuous cost reduction for inter-cloud . We have achieved 10% lesser cost than prior model.
S.No.: 373
Title : IMPROVED AND PROFICIENT ATTRIBUTE BASED ENCRYPTION MODEL FOR WIRELESS BODY AREA SENSOR NETWORKS
Authors Name: Mohd. Zakir Hussain
Authors Affilation: Genesys International
Volume & Issue No.: Volume5Issue8
Abstract: Wireless body area networks plays major role in the medical field especially in monitoring of patient health and regulating it gradually. In recent times, Wireless BSN got higher attention among the researchers. But, major difficulties in this techniques is making perfect link between user and sensors. In this paper, we propose a secure data communication model for BAN by creating a secure the data exchange between the sensors(devices) and users (medical representatives) using enhanced Attribute Based Encryption (ABE) model. Initially, the data users get enrolled with their attributes. This attribute is further used for building efficient data communication process. The secure communication between data sink and data consumer is efficiently improved under Key Generation Center. Node authentication is the process carried out for easier data retrieval and prevention of collusion attacks. Simulation analysis is processed under pre-defined set of sensor nodes and attributes. Time consumption is an evaluation metric studied for system parameters initialization, generation of secret keys, encryption and decryption. The results show that our scheme is scalable irrespective of increased users and their attributes. Our proposed model is scalable and stable in healthcare applications.
S.No.: 374
Title : Hybrid Approach of Scheduling Using BAT&CUCKO Algorithm in Parallel System
Authors Name: Sharanjeet Singh, Manisha
Authors Affilation: Asst.Prof. Deptt of Computer Science Deptt of Computer Science GNDU RC Gurdaspur GNDU RC Gurdaspur
Volume & Issue No.: Volume5Issue8
Abstract: These days, Grid computing has increased huge consideration because of its innovative progression, cost lessening and accessibility. In the Grid situations, the appropriate scheduling of the got tasks over service gives has turned into a vital and essential issue. The scheduling issue in Grid situations is a NP-hard issue. Hence, numerous heuristics have been proposed to take care of this issue up to now. In this paper, we propose another bee colony calculation to plan the tasks on service providers in the Grid conditions. The comes about exhibited that the proposed calculation has a superior operation as far as task execution time, holding up time and missed tasks.
S.No.: 375
Title : Different Methodologies for Minimizing Congestion in the Deregulated Power System: a Review
Authors Name: Naresh Kumar Yadav and Jyoti Srivastava
Authors Affilation: DCRUST
Volume & Issue No.: Volume5Issue8
Abstract: In the restructured power system, optimal power flow (OPF) in the smart grid is the important technical matter to be look upon as related to congestion management, loss in transmission lines and power network operating constraints. The power transaction increases with the increase in customer demand and to meet this demand and to satisfy it, the competition between generating companies (GENCOs) also increases. This results in the stress on transmission network due to which threat occur to voltage security, line flow limits can also get violated, line losses may also increases, requirement of reactive power also increases, threat to stability of power system and also the congestion of transmission network due to overload of the lines. This is overcome by rescheduling the generators or optimally locates the distributed generation which should be cost efficient and with minimum losses with the same operating constraints. This paper includes the review of some of the important methods and techniques such as nodal pricing technique, FACTS devices, Differential Evolution method (DE), Static Synchronous Compensator (STATCOM), Extended interior point technique (EQIP) based OPF, Unified Power Flow Controller (UPFC), Firefly Algorithm, fuzzy logic, Particle Swarm Optimization method (PSO), Mixed integer nonlinear programming (MINLP) and Genetic Algorithm method (GA) which are used for managing the problem of congestion management (CM) in Deregulated power system. Every method has its own importance and capability to deal with the problem of congestion in transmission lines in a restructured power system by rescheduling the generators.
S.No.: 376
Title : Assessment and Enhancement of Available Transfer Capability under Deregulated Environment: A Review
Authors Name: Naresh Kumar Yadav and Anju bala
Authors Affilation: Deenbandhu Chhotu Ram University of Science & Technology, Sonipat, India.
Volume & Issue No.: Volume5Issue8
Abstract: In deregulated power markets, to intimate ATC by Independent System Operator (ISO) is a prime concern. For all companies, Independent Power Producers (IPPs), retailers, transmitters, distributors and customers, the prime important indication is ATC, to participate in the commercial transaction of electricity. ATC communicates between remaining transfer capability over and above already committed use in a competitive power markets for trading. This paper reviews the literature survey analogous to assessment and enhancement of ATC in deregulated power markets.
S.No.: 377
Title : An Empirical Study on Online Grocery Shopping Intentions of Consumers in Ahmedabad City
Authors Name: Dr. Amol Ranadive
Authors Affilation: Navrachana University
Volume & Issue No.: Volume5Issue8
Abstract: This growing competition in the online grocery segment has led to an almost oligopolistic market with a very few players in this segment in India. The growth in the online retail industry is propelled by the fact that the better and faster a company understands the grocery consumer’s intent and attitude in this respect, the more will this understanding contribute to the company’s success. This study focuses on measuring the consumer’s shopping intention towards online grocery services in the city of Ahmedabad. The study utilizes one of the most popular consumer behavioural model and its underlying theories and constructs to gauge the consumer’s intention. The study also suggests some amicable marketing strategies for the online grocers to succeed in this highly competitive online retailing market.
S.No.: 378
Title : EXPERIMENTAL INVESTIGATION OF MECHANICAL PROPERTIES OF FRICTION STIR WELDED BUTT JOINT OF ALUMINIUM ALLOY AA6061
Authors Name: Dr. T Nancharaiah
Authors Affilation: Bapatla Engineering College, Bapatla
Volume & Issue No.: Volume5Issue8
Abstract: Friction Stir Welding (FSW) is solid state welding process. This process is widely used in now a day because it produces sound welds and does not have common problems such as solidification and liquefaction cracking associated with fusion welding techniques. Using Taguchi design of experiments, at different levels of identical process parameters, orthogonal array is selected based on the orthogonal array the test specimens are to be prepared using FSW process. The present work aims to determine the feasibility to weld aluminium alloy AA6061 by FSW process and study the effect of process parameters on the mechanical properties of welded joint. By using MINITAB17 analyzed the results and plotted the S/N ratio and mean graphs. Special welding fixture fixed on conventional milling machine has been conducted to attempt this welding. Finally, the mechanical properties of welded joints were investigated using destructive testing.
S.No.: 379
Title : SQUEAL ANALYSIS OF DISC BRAKE
Authors Name: V.Balaji, P.Sathyaseelan, D. Rajesh
Authors Affilation: aAssistant Professor, Department of Mechanical Engineering, VEL TECH Dr.RR & Dr.SR University, Avadi, Chennai
Volume & Issue No.: Volume5Issue8
Abstract: Brake squeal noise has been under investigation by automotive manufacturers for decades due to consistent customer complaints and high warranty costs. Brakes generally develop large and sustained friction-induced oscillations, referred to brake squeal. Brake squeal is considered a serious operational braking problem in passenger cars and commercial vehicles. This project involves an approach to discover the main causes of disc brake squeal occurrence using finite element methods (FEM). The application of complex eigenvalue analysis in a finite element model of a disc brake system is used to extract unstable modes. The effect of the operational parameters (friction coefficient, braking pressure and angular velocity) and contact stiffness on the dynamic stability of the brake system is done. Using Abaqus version 6.10 the complex eigen value are extracted and examining its real part will identify the squeal frequency
S.No.: 380
Title : Improved Image Steganographic System by using Multiple Encryption and DWT
Authors Name: Manoj Kumar Ramaiya, Dr. Dinesh Goyal , Dr. Naveen Hemrajani
Authors Affilation: Suresh Gyan Vihar University , Jaipur, Rajasthan
Volume & Issue No.: Volume5Issue8
Abstract: The protection of data over unsecure transmission network has continually a key concern in the consideration of investigators or cyber professionals. With the fast promising practice of the internet in all personnel and professional drives, the distress for the unauthorized entrance by an intruder and the valuable information will be later exploitation, has further put pressure on the industry or researchers for developing methods and techniques to protect the information from intruders involves in unlawful activities or cybercrime. Cryptography is the art which deal with the transmuting a valuable and confidential information into inaudible forms. This unintelligible information might produce mistrustful in the observance of opponents when it transfers on open or unsafe communication networks and only legitimate receiver can only understand it meaning by decoding it. Conversely, Steganography embed confidential information or secrete message in to a cover image and hides its existence. As a common practice, hiding of secrete data into other media is apply in communication on text, image or multimedia contents for the purpose of digital signature, intellectual property protection and authentication. Both Cryptographic and Steganographic methods delivers the adequate amount of security but are susceptible to intruder’s attacks when information flow over unsafe communication channel. Efforts to combines these techniques i.e. Steganography and Cryptography, gives the ultimate results in security enhancement. The steganographic techniques currently used mainly emphasis on embedding mechanism with fewer attention to pre-processing of valuable information. Pre-processing of data offer robustness, high security level and flexibility. The suggested hybrid mechanism is exclusive method for image steganography based on multiple encryption using Triple Data Encryption Algorithm (TDEA) improving the security over unsecure transmission channel.
S.No.: 381
Title : Comparison of performance with support vector machines
Authors Name: Kai Li, Lulu Zhai
Authors Affilation: College of Computer Science and Technology, Hebei University, Baoding,China
Volume & Issue No.: Volume5Issue8
Abstract: Support vector machine (SVM) is an important machine learning method, which has many applications in pattern recognition, network security, etc. However, this method has some shortcomings such as complicated computation of quadratic programming, time-consuming training and low anti-noise performance. To this end, the researchers have proposed some improved methods. In this paper, we select the commonly used SVM classifiers including C-SVM, v-SVM, PSVM and TWSVM to study their performance of classification on the standard data set by experiments. The experimental results are shown that the performance with TWSVM has an advantage over C-SVM, v-SVM and PSVM in selected ten data sets using linear kernel. However, when Gauss kernel is used, accuracy with different support vector machine is almost no differences except data set wdbc.
S.No.: 382
Title : Out-of-plane effect of stacking sequences on crack resistance and energy absorption of glass fiber vinyl ester composite: Experimental
Authors Name: Arnauld Robert Tapa, Wang Ji Hui
Authors Affilation: School of Materials Science and Engineering, Wuhan University of Technology, China
Volume & Issue No.: Volume5Issue8
Abstract: The laminate stacking sequences are considered in fiber composites manufacturing, as one of the most complex design parameters affecting the overall properties of the final parts. However, due to the big number of fibers, matrix, and parts geometries; and the number of possible combinations, there is still a need of data on the effect of stacking sequences, on crack resistance and energy absorption capability of fiber composites. Many works have been done so far to understand this effect; with most using whether carbon or glass fibers combined with epoxy or polyester resin, but very few involve the vinyl ester resin, very popular in industries, but used mostly in the case of filament winding process instead of vacuum assisted resin infusion (VARI) process, or hand layup process as it is the case for epoxy and polyester resin. In this work, we will investigate the out-of-plane effect of stacking sequences, on crack resistance and energy absorption capability of short-beam, made of unidirectional glass fiber vinyl ester composite. The investigation is conducted experimentally under three-point-bending test, with samples of composite manufactured using the VARI process, and according to the following stacking sequences: [0]16, [01/903]2S, [02/902]2S, [03/901]2S, [90]16, [901/03]2S, [902/02]2S and [903/01]2S. This work can be used as database in case of research on out-of-plane behavior of thin-walled structures, made of unidirectional glass fiber vinyl ester composites.

List for IPASJ International Journal of Electronics & Communication (IIJEC) ISSN 2321-5984
S.No.: 383
Title : OPNET Based Performance evaluation of WIMAX Network with WIMAX Management using different QoS
Authors Name: Neeru Jakhar, Ankit, Kuldeep Vats, Suman
Authors Affilation: 1 M.tech , Department of electronics and communication, C.B.S Group of Institute, Jhajjar, Haryana, India
Volume & Issue No.: Volume2Issue7
Abstract: IEEE 802.16 WiMAX network is designed for providing high speed wide area broadband wireless access. WiMAX is an emerging wireless technology which is used for creating multi-hop mesh networks offering variable and high data rates, QoS, seamless mobility within a network. OPNET modeler is a simulation program tool used to simulate the different types of wireless networks. In this paper, simulation and evaluation of two different sized networks (small, large) is carried out. We are using the modeler to study networks with 35 and 50 mobile workstations. In each network, group of five WiMAX workstations connect and call each other through one WiMAX base stations during 1000sec. Performance of parameters that indicate the quality of services such as WIMAX management Periodic Ranging activity, WIMAX management initial ranging activity, delay, Throughput, neighbor advertisements sent and Network load have been studied.
S.No.: 384
Title : Gesture Recognition Techniques and Applications
Authors Name: Manisha Devi, B. Anil Kumar and Magan Deep
Authors Affilation: Metch from Department of EC Engineering, Lingaya’s University, Faridabad, India
Volume & Issue No.: Volume2Issue7
Abstract: Gestures are the soul of visual interpretation which can accomplish human machine interaction (HCI). We use various gestures to express our intentions in day to day life. These gestures can be defined as a sequence of states in a measurement or configuration space. Gesture is said to be recognized successfully when the sequence of state are measured effectively. To identify and recognize the different gestures use the concept of “Gesture Recognition(GR) Technology”. In this paper we proposed the techniques which are used very often. The paper summarizes the concept behind Gesture Recognition System (GRS), and explains the various methods that make gesture recognition possible. In this paper we explore the models which are vigorously used for gesture recognition such as Hidden Markov Model (HMM), Principal Component Analysis (PCA) for feature extraction and Artificial Neural Network (ANN). These network models achieve a recognition rate (training as well as generalization) of up to 100% over a number of test subjects. Recommended algorithms based on past research will be detailed, classification of gesture, exploitation of gestures in experimental systems, future scope of gesture recognition system, importance and real time applications.
S.No.: 385
Title : FPGA IMPLEMENTATION OF PARALLEL 2-D MRI IMAGE FILTERING
Authors Name: JYOTHISH A GHOSH
Authors Affilation: Sree Buddha College Of Engineering, Kerala
Volume & Issue No.: Volume2Issue7
Abstract: Currently, Field Programmable Gate Array (FPGA) goes beyond the low-level line-by-line hardware description language programming in implementing parallel multidimensional image filtering algorithms. High-level abstract hardware-oriented parallel programming method can structurally bridge this gap. This project proposes a first step toward such a method to efficiently implement Parallel 2-D MRI image filtering algorithms using the Xilinx system Generator and reduce complexity in FPGA prototyping. The model is first implemented in MATLAB and on successful completion implemented in Xilinx System Generator and finally implemented on FPGA.
S.No.: 386
Title : Enhanced Detection Of Double Adjacent Errors In Hamming Codes Through Selective Bit Placement
Authors Name: Lintu K Babu, Hima Sara Jacob
Authors Affilation: ELECTRONICS AND COMMUNICATION MANGALAM COLLEGE OF ENGINEERING ETTUMANOOR
Volume & Issue No.: Volume2Issue7
Abstract: This paper explain the Enhanced detection of Double adjacent Errors in Hamming codes. In 1950’s Richard Hamming invented the Hamming code. Designed for correct single bit errors. Hamming Codes are used in computing, telecommunication, and other applications. Codes are simple to construct for any word length. It can be easy to Encode and decode.2D Hamming Product Code is used to detect and correct errors. But, this fails to detect adjacent errors . Detecting double adjacent errors using Selective Bit Placement Algorithm. In this paper the algorithm for hamming code is discussed and then implementation of it in verilog is done to get the result.Here code is implemented in verilog in which 4 bit of information data is transmitted. Delay, area and power analyses were carried out using Xilinx ISE-13.2.The results obtained are presented and compared. The enhanced detection is achieved by selective bit placement strategy.
S.No.: 387
Title : Concatneted GA-MMSE and PSO-MMSE performace analysis and comparision with different MUD techniques for SDMA-OFDM System
Authors Name: Medha Vijayvargiya, Manish Gurjar
Authors Affilation: Digital communication TIT College, India
Volume & Issue No.: Volume2Issue7
Abstract: Smart antenna primarily uses the SDMA-OFDM based architecture of communication. Due to robustness and protection against interference provide by OFDM. Although High data rate transmission is effectively achieved by using OFDM but detection techniques especially in over-loaded scenario poses many challenging issues. There are many optimization techniques presents for optimal multiuser detection process in SDMA-OFDM system, though each method is suffered from limitations. In these paper two popular evolutionary algorithms such as particle swarm optimization (PSO) hybrid with MMSE technique and genetic algorithm (GA) based SDMA-OFDM multi user detection (MUD) is hybrid with the MMSE technique. These optimization multiuser detection (MUD) techniques are simulated using three different modulation techniques these are PAK, PSM, QAM and its performance is compared against four existing MUDs such as MMSE ,GA,PSO and ZF varying different parameters. PSOMMSE and GAMMSE, the two methods are better in terms of simulation and reduces complexity. These techniques are proved to provide a very high performance when comparing with the existing detectors especially in a rank-deficient scenario in which numbers of users are very high as compare to transmitting antenna. From the experimental results it is crystal clear that GAMMSE and PSOMMSE improve the results by 29.8% than existing multiuser detection technique and BER reached to a level of 0.09 .
S.No.: 388
Title : CMOS LNA Design for Ultra Wide Band- Review
Authors Name: Miss. K.B.Satale, Miss. A.R.Kaushik, Miss. P.S.Deokar
Authors Affilation: Assistant Professor ,Department of Electronics and Telecommunication, 1,2,3 KVNNIEER, Nashik1,
Volume & Issue No.: Volume2Issue8
Abstract: Low Noise Amplifier (LNA) functions important role in receiver designs. In, microwave receiver LNA circuit plays important role in quality factor of receiver. At radio frequency range, trade-off characteristics like gain, noise figure, stability, power consumption and complexity forces designer for various circuit’s simulation for optimizing those. An LNA design presents a considerable challenge because of its simultaneous requirement for high gain, low noise figure, good input and output matching and unconditional stability at the lowest possible current draw from the amplifier. For short range and high data rate wireless applications UWB technology offers a promising solution to the radio frequency. As LNA is most important block included in the UWB front-end RF receiver, we focused this paper on review of LNA design using CMOS technique.
S.No.: 389
Title : A Novel data Protection System for Data Concealment using Reserving Room Approach
Authors Name: T. Ramasubbaiah, A. Surendra Reddy, Ande siva sai kumar
Authors Affilation: M. Tech (DECS), Dept. of E.C.E. NECG, JNTUA Gudur, A.P, INDIA
Volume & Issue No.: Volume2Issue8
Abstract: This paper presents the enhancement of data protection system for secret communication through common network based on reversible data concealment in encrypted images with reserve room approach. This idea will be implemented for true color image (RGB image) and reserve room approach under multi scale decomposition. The Blue plane will be chosen for hiding the secret text data. Reserving room approach is used to reserve space for embedding a privacy text messages. Chaos encryption is used to scramble an image except reserved space to make protection of image details during transmission. After encryption, the data hider will conceal the encrypted secret data into the reserved coefficients using Adaptive LSB replacement algorithm. By using the decryption keys, the image and extracted text data will be extracted from encryption to get the original information. Finally the performance of this proposal in encryption and data hiding will be analyzed based on image and data recovery.
S.No.: 390
Title : Channel Modeling for Underwater Optical Communication
Authors Name: Arvind.A, uthira mohan
Authors Affilation: Meenakshi sundararjan Engineering College
Volume & Issue No.: Volume2Issue8
Abstract: We investigate in this paper channel modeling for underwater optical channels. In particular, we focus on the channel impulse response and quantify the channel time dispersion under different conditions of water type, link distance, and the transmitter/receiver parameters. Our approach is based on Monte Carlo simulations where we simulate the trajectories of emitted photons propagating in water channel towards the receiver. We show that in most practical cases, the time dispersion is negligible and does not induce any inter-symbol interference on the received symbols. The realistic channel model that we present in this paper can be used to appropriately set different system design parameters.
S.No.: 391
Title : An Innovative Approach: Image Encryption with Chaotic Maps using DNA Addition Operation
Authors Name: Manisha Raj, Shelly Garg
Authors Affilation: Indus Institute Of Engineering And Technology Kinana, Haryana
Volume & Issue No.: Volume2Issue8
Abstract: Encryption technology is an important measure to ensure the security of digital image, this papers main purpose is to research how to encrypt images by chaos. In this paper, five chaotic maps are compared and noise effects are observed on image. Firstly, we use the image encryption algorithm to convert original image to encrypted image. Now we apply noise on the encrypted image and then decrypt cipher image with noise back to original image. The Simulation experimental results shows that Cross Chaotic map has got best results. Also, noise has a little effect on original image and can easily be received by the receiver.
S.No.: 392
Title : MEDICAL IMAGE FUSION USING DISCRETE WAVELET TRANSFORM
Authors Name: Nayera Nahvi, Deep Mittal
Authors Affilation: 1Punjab Technical University, ECE Dept, SVIET, Banur , India
Volume & Issue No.: Volume2Issue8
Abstract: Medical image fusion is the process of registering and combining multiple images from single or multiple imaging modalities to improve the imaging quality and reduce randomness and redundancy in order to increase the clinical applicability of medical images for diagnosis and assessment of medical problems. Multimodal medical image fusion algorithms and devices have shown notable achievements in improving clinical accuracy of decisions based on medical images. The domain where image fusion is readily used nowadays is in medical diagnostics to fuse medical images such as CT (Computed Tomography), MRI (Magnetic Resonance Imaging) and MRA. This paper aims to present a new algorithm to improve the quality of multimodality medical image fusion using Discrete Wavelet Transform (DWT) approach. Discrete Wavelet transform has been implemented using different fusion techniques including pixel averaging, maximum and minimum methods for medical image fusion. Performance of fusion is calculated on the basis of PSNR, MSE and the total processing time and the results demonstrate the effectiveness of fusion scheme based on wavelet transform.
S.No.: 393
Title : Reduction of Leakage Current and Power in Full Subtractor Using MTCMOS Technique
Authors Name: MUNGARA DEEPTHI SAROJA,M.RAMAMURTHY NAIK
Authors Affilation: M.Tech dept of ECE(DECS) in K.S.R.M.C.E(JNTUA) in KADAPA
Volume & Issue No.: Volume2Issue8
Abstract: In this paper a full subtractor using MTCMOS technique design is proposed. Combinational logic has extensive applications in quantum computing, low power VLSI design and optical computing. Reducing power dissipation is one of the most principle subjects in VLSI design today. But Scaling causes sub threshold leakage currents to become a large component of total power dissipation. Lowpower design techniques proposed to minimize the active leakage power in nanoscale CMOS very large scale integration (VLSI) systems. Using MTCMOS approach compare leakage current and leakage power of full subtractor in active mode.leakage current in conventional full subtractor is 271.1 fA and proposed 2-stack full subtractor in 16 nm technology is 0.528 μA, reduction in current is almost 90%. simulation result is performed at 0.9 volt using electric tool for schemantic and LTspice for simulation in 45 nm,32 nm, 28 nm and 16 nanometer technology.
S.No.: 394
Title : AN EMPIRICAL MODE DECOMPOSITION ALGORITHM FOR AUDIO WATER MARKING IN AUDIO SIGNALS
Authors Name: s.sumalatha,B.ramesh nayk,s.sandeep
Authors Affilation: SIT Puttur
Volume & Issue No.: Volume2Issue9
Abstract: With the development of internet, illegal copying problem has become more serious and thus made digital watermarking enters as an important role to handle and deal such a critical issue. In this paper we present a digital audio watermarking process with the use of Empirical Mode Decomposition (EMD) and Hilbert Transform (HT). A binary image, which is obtained by mapping from standard normal distributed pseudo random numbers, is embedded as secret information into the significant coefficients of the highest energetic IMF that are greater than a specified adaptive threshold. Thus watermarked IMF is less sensitive to common signal processing attacks like such as additive noise, low pass filtering, re-sampling, re-quantization, MP3 compression, and sound processing effects etc . As a result this method increases more robustness. All this mean that, our methodology is applied to any image and any audio signals. .Experimentation has ensured the mark physical property, the ability of detection of the mark and therefore the hardiness against completely different varieties of attacks. Keywords- EMD, Hilbert transform, IMF, re-sampling, MP3 compression.
S.No.: 395
Title : A SURVEY ANALYSIS ON CMOS INTEGRATED CIRCUITS WITH CLOCK-GATED LOGIC STRUCTURE
Authors Name: PADMA KHARE, SHAISTA ANJUM
Authors Affilation: LNCT Bhopal, MP, India
Volume & Issue No.: Volume2Issue9
Abstract: Various circuit design techniques has been presented to improve noise tolerance of the proposed CGS logic families. Noise in deep submicron technology limits the reliability and performance of ICs. The ANTE (Average Noise Threshold Energy) metric is used for the analysis of noise tolerance of proposed CGS. A 2-input NAND and NOR gate is designed by the proposed technique. Simulation results for a 2-input NAND gate at clock gated logic show that the proposed noise tolerant circuit achieves 1.79X ANTE improvement along with the reduction in leakage power. Continuous scaling of technology towards the manometer range significantly increases leakage current level and the effect of noise. This research can be further extended for performance optimization in terms of power, speed, area and noise immunity.
S.No.: 396
Title : TECHNICAL REPORT ON DATA ACQUISITION OF PATIENT’S HEALTH STATUS USING GSM AND WSN
Authors Name: Alumona T.L, Idigo V.E,Azubuike A
Authors Affilation: Department of Electronic & Computer Engineering, NnamdiAzikiwe University Awka, AnambraState.Nigeria
Volume & Issue No.: Volume2Issue9
Abstract: The medical domain is improving day by day at an exponential rate,constant monitoring of the patient’s vital body parameters will add to the advancement in the Medical Facilities available today. Currently, patient monitoring in most hospitals requires the doctor to personally examine each patient and keep a record of his health. This paper presents a method, Hospital Management System that can be used for examining the patients and maintaining their health records. It is based on a communication network with a Central Controller Unit. This Central Controller Unit wirelessly communicates with its Terminal Units. The system comprises of multiple Terminal Units. The terminal units are used for data acquisition for a patient’s health information automatically by some sensors. The Terminal Unit wirelessly sends this data to the Central Unit. The Central Unit receives this data and saves it in a database for all the patients. It also determines whether a patient is in extreme condition and in such an emergency case it calls the assigned doctor by sending a message through GSM. This system reduces manual data record management, thereby reducing the possibility of human error. It is user friendly without compromising on the efficiency of the system. Moreover, centralization of control leads to security of data and maintaining its accuracy.
S.No.: 397
Title : TECHNICAL REPORT ON STEP BY STEP CONFIGURATION OF FREE TO AIR SATELLITE IN WEST AFRICA IN KU BAND
Authors Name: Alumona T.L, Idigo V.E,Azubuike A
Authors Affilation: Department of Electronic & Computer Engineering, NnamdiAzikiwe University Awka, AnambraState.Nigeria
Volume & Issue No.: Volume2Issue9
Abstract: This technical paper describes Free-to-air (FTA)satellite for West Africain Ku band. It allows any user with the appropriate receiving equipment to receive the signal and view to the content without requiring a subscription. Free to airalso refers to channels and broadcasters providing content for which no subscription is expected, even though they may be delivered to the viewer by another carrier for which a subscription is required, e.g. cable, satellite or the Internet. These carriers may be mandated in some environment to deliver FTA channels even if a premium subscription is not present (providing the necessary equipment is still available), especially where FTA channels are expected to be used for emergency broadcasts, similar to the 112 emergency service provided by mobile phone operators and manufacturers. This technical paper will x-ray the state of art involved in the configuration of free to air satellite reception for West Africa. [1]
S.No.: 398
Title : Medical Image Segmentation Using Modified K Means Clustering
Authors Name: Kalpana Shrivastava, Neelesh Gupta, Neetu Sharma
Authors Affilation: M.Tech, Scholar, TIEIT, Bhopal, India
Volume & Issue No.: Volume2Issue9
Abstract: Image segmentation is an important technique for image processing which aims at partitioning the image into different homogeneous regions or clusters. Lots of general-purpose techniques and algorithms have been developed and widely applied in various application areas. For the study of anatomical structures and to identify the region of interest. Magnetic Resonance Images are used to produce images of soft tissue of human body. Noise present in the Brain MRI images are multiplicative noise and reductions of these noise are difficult task. However, accurate Segmentation of the MRI images is very important and crucial for the exact diagnosis by computer aided clinical tools. A large variety of algorithms for segmentation of MRI images had been developed. However most of these have some limitations, to overcome these limitations; modified k means clustering is proposed. The comparison of existing segmentation approaches such as C-Means Clustering, K-Means Clustering with Modified K-Means Clustering is performed then the performance evaluated. Finally generated outcomes of the Fuzzy c- means clustering, k-means clustering and modified k means clustering algorithm for the brain MRI shows that modified k-means clustering technique gives better results for all performance measuring parameters such as structural similarity index measure, structural content, mean squared error and peak to signal noise ratio.
S.No.: 399
Title : CHARACTERISTICS OF IMAGE ENHANCEMENT IN IMAGE FUSION TECHNIQUES USED FOR ENERGY SALVATION OF VISUAL SENSOR NETWORKS
Authors Name: Mehrummeet Singh
Authors Affilation: Dept. of ECE Punjab Institute of Tech. (Main Campus P.T.U.), Kapurthala Punjab, India
Volume & Issue No.: Volume2Issue9
Abstract: This paper presents the role of image enhancement in image fusion techniques used for energy salvation of wireless visual sensor networks. The image fusion is going to be the part of the important techniques in image processing. Many image enhancements methods have been discovered in a number of applications. Image fusion amalgamates the information from the several images of one scene to obtain an enlightened image which is much better for human visual perception or additional vision processing. Image focus is related to the quality of the image. Many image fusion methods have been discovered to conserve the energy of wireless visual sensor networks. The images tarnished by fog suffer from poor contrast. In order to remove fog effect, an Adaptive Histogram Equalization or stretching filter based method is presented in this paper. The main objective of image fusion is to combine the information from multiple images of same scene in order to transfer only the useful information. The discrete cosine transforms (DCT) based methods are more suitable for the image fusion. If there is bonding in the image enhancement or an Adaptive Histogram Equalization or stretching filter to the discrete cosine transforms (DCT) based methods of image fusion there can be the improvement in the energy conservation of wireless visual sensor networks and time-saving in real-time systems
S.No.: 400
Title : WAVELET BASED ON IMAGE DENOISING USING THRESHOLDING TECHNIQUES
Authors Name: M. Neelima, Md. Mahaboob Pasha
Authors Affilation: Department of ECE, K.S.R.M College of Engineering, Kadapa, INDIA.
Volume & Issue No.: Volume2Issue9
Abstract: wavelet transforms enable us to represent signals with a high degree of scarcity .This is the principle behind a non-linear wavelet based signal estimation technique known as wavelet denoising. wavelet thresholding is a signal estimation technique that exploits the capabilities of wavelet transform for signal denoising. The aim of this project, is to study various techniques such as visuShrink, SureShrink, NeighShrink(propoed method) and determine the best one for image denoising. VisuShrink and SureShrink, the thresholding application removes the coefficients that are in significant to some threshold. NeighShrink is an efficient image denoising algorithm based on the decimated wavelet transform (DWT). Its disadvantage is to use a suboptimal universal threshold and identical neighbouring window size in all wavelet subbands. In this paper, an improved method is given, which can determine an optimal threshold and neighbouring window size for every subband by the Stein’s unbiased risk estimate (SURE). In NeighShrink, optimal threshold and neighborhood window size in all subbands keep unchanged. In NeighShrink(proposed method), the Optimal threshold and Neighborhood window size in all subbands is changed. In NeighShrink(proposed method) we retain the required information from the removed coefficients by using neighborhood window size and optimal threshold. They threshold the wavelet coefficients in overlapping blocks rather than individually or term by term as VisuShrink or SureShrink.
S.No.: 401
Title : ANTI THEFT SECURITY SYSTEM USING GSM,GPS,RFID TECHNOLOGY BASED ON ARM7
Authors Name: VidyaSagar V.Mulge, Mrs G. Sathyaprabha, Mr P.V.VaraPrasad Rao
Authors Affilation: M.Tech(ES&VLSI), SLC’s Institute of Technology, JNTU, Hyderabad, India
Volume & Issue No.: Volume2Issue10
Abstract: An embedded system based on the Global Positioning System, the GPS, and Radio frequency identification technology is developed to prevent automobile from theft. This consists of GSM, GPS, RFID & two sensors. When any one wants to open the door of vehicle, it will ask for correct RFID identification & accelerometer sensor is used to measure any breaking of window & movement of car ,if any unauthorized access is there ,a message will be sent to the owner’s mobile. This is followed by the system present in the car asking the user to enter correct password . If the user fails to enter the correct password in three trials ,a text message is sent to the owner’s mobile with vehicle location using GPS. Further the connection to fuel injector of the car is deactivated so that unauthorized person cannot start the vehicle anyhow.
S.No.: 402
Title : REGION OF INTEREST BASED LOSSLESS IMAGE COMPRESSION FORTELEMEDICINE APPLICATION
Authors Name: D.Ashok kumar, V.Ram Reddy
Authors Affilation: M.Tech Student, Department of ECE, GANAPATHY ENGINEERING COLLEGE, Warangal, India
Volume & Issue No.: Volume2Issue10
Abstract: The fundamental aim of region of interest (ROI) based compression for medical image is to improve the compression effectiveness for communication and storage. major objective of Region of interest(ROI) compression is to condense ROI with superlative eminence as associate to another region called Background. For exemplar, whereas condensing medical image the diagnostically essential region must be compacted with enhanced superiority than background. hence, the ROI region is compacted with a reduction of compression ratio & the background with the utmost probable compression ratio into get on the whole improved compression recital. As an element of ROI compression method algorithm is expanded with discrete cosine transform and Wavelet transform. A complete study is accepted on the source of constraints like compression ratio(CR), peak signal to noise ratio(PSNR) & mean square error(MSE). Benefit of ROI compression above conservative compression proposal is to enhance quality of ROI with least significance of MSE and PSNR.
S.No.: 403
Title : PERFORMANCE AND ANALYSIS WITH POWER QUALITY IMPROVEMENT WITH INDUCTION MOTOR IN ELECTRIC DRIVE
Authors Name: Shobhit Jain, Akram Ansari, Sanjeev Gupta
Authors Affilation: POWER ELECTRONICS(M.E) S.A.T.I,Electrical Department ,VIDISHA,M.P,INDIA
Volume & Issue No.: Volume2Issue10
Abstract: The Objective of the present analysis is to get the reduced harmonics AC results which obtained by reduced number of power electronics switches and increases the voltage level. This voltage level received through the using asymmetrically DC voltage Source and Analysis on the basis of non linear load of three phase induction motor ,theoretically and simulation analysis are through the MATLAB/SIMULINK shows the speed, torque characteristics of the motor and seven level output voltage of inverter. The seven level and nine level inverter with reduced total harmonic distortion can be acheived.
S.No.: 404
Title : SPATIAL MODULATION USING INCREMENTAL REDUNDANCY HYBRID-ARQ
Authors Name: Neharika Valecha, Prabhat Sharma, Mohammed Ahmed
Authors Affilation: Oriental Institute of Science and Technology
Volume & Issue No.: Volume2Issue10
Abstract: Spatial Modulation(SM) is a single-radio-frequency (RF) large-scale MIMO communication scheme. It is a energy efficient scheme that has lower power consumption than prevalent MIMO schemes since it has single RF chain. In this paper we combine spatial modulation with incremental redundancy (IR) hybrid ARQ with Low-density parity-check (LDPC) code scheme to reduce signal-to-noise ratio (SNR) at the receiver and improve the spectral efficiency without affecting the energy efficiency.
S.No.: 405
Title : SPATIAL MODULATION USING INCREMENTAL REDUNDANCY HYBRIDARQ
Authors Name: Neharika Valecha, Prabhat Sharma and Mohammed Ahmed
Authors Affilation: Electronics and Communication Department Oriental Institute of Science and Technology, Bhopal
Volume & Issue No.: Volume2Issue10
Abstract: Spatial Modulation(SM) is a single-radio-frequency (RF) large-scale MIMO communication scheme. It is a energy efficient scheme that has lower power consumption than prevalent MIMO schemes since it has single RF chain. In this paper we combine spatial modulation with incremental redundancy (IR) hybrid ARQ with Low-density parity-check (LDPC) code scheme to reduce signal-to-noise ratio (SNR) at the receiver and improve the spectral efficiency without affecting the energy efficiency.
S.No.: 406
Title : SMART VEHICLE WITH ADVANCED SECURITY SYSTEM
Authors Name: NEHA KAPIL
Authors Affilation: VIGNANA BHARATHI ISTITUTE OF SCIENCE AND TECHNOLOGY
Volume & Issue No.: Volume2Issue10
Abstract: Design of Smart vehicle with advanced security system is based on automotive localization system using GPS and GSM-SMS services. The system permits localization of the automobile and transmitting the position to the owner on his mobile phone as a short message (SMS) on his request. GPS is the acronym for global positioning system which receives the information from the satellite anywhere in the world and provides the same for controller. The GPS provides us the data like location, time, and speed. The GSM modem provides the communication mechanism between the user and the PIC18F452 microcontroller system by means of SMS messages. It is capable of receiving a set of command instructions in the form of Short message service and performs the necessary actions. We will be using a dedicated modem at the receiver module i.e. and send the commands using SMS service as per the required actions. The system can be interconnected with the car alarm system and alert the owner on his mobile phone. This tracking system is composed of a GPS receiver, Microcontroller and a GSM Modem. GPS Receiver gets the location information from satellites in the form of latitude and longitude. The Microcontroller processes this information and this processed information is sent to the user/owner using GSM modem. If the vehicle come across any obstacle that can be detected by ultrasonic sensor and gives information to the microcontroller so that data is displayed on LCD. The Data read by the GPS is stored in the MMC card which can be retrieved by connecting the system to the PC through MAX232.In this design face recognition can be done by interfacing USB camera to the microcontroller through PC with MATLAb. The presented application is a low cost solution for automobile position and status, very useful in case of car theft situations, for monitoring adolescent drivers by their parents as well as in car tracking system applications. The proposed solution can be used in other types of application, where the information needed is requested rarely and at irregular period of time (when requested)
S.No.: 407
Title : Design of Energy Efficient CMOS Full Adder Circuits
Authors Name: LAKSHMIPRIYA KATARI, JAYANAIDU
Authors Affilation: Assistant Professor, Department of ECE, SSN Engineering College, ONGOLE.
Volume & Issue No.: Volume2Issue10
Abstract: With the advancement of technology, Integrated Chip (IC) has achieved smaller chip size with more functions integrated. Through the usage of more transistors, it has lead to an increase of power dissipation and undesired noise. As the design gets more complex, this results in slower speed. Hence, the demand for low power, fast speed is desired. In this paper an adder and logic circuits are designed in three different CMOS technology structures like complementary logic, ratio logic and dynamic logic. They all have a similar function, but the way of producing the intermediate nodes and the transistor count is different. The main objective of this paper is comparison of static CMOS adder, ratio logic adder and clocked cascade voltage switch logic adder (also known as dual rail domino) in terms of power dissipation and area in different design methodologies in 45nm technology.
S.No.: 408
Title : Carry Select-Ahead Adder (Improved version of ‘Carry Select Adder’)
Authors Name: Simarpreet Singh Chawla, Swapnil Aggarwal
Authors Affilation: Delhi Technological University (Formerly known as Delhi College of Engineering)
Volume & Issue No.: Volume2Issue10
Abstract: In this paper, we propose a new architecture for a high-speed adder. Combining the advantages of Carry Look Ahead Adder (CLAA) and Carry Select Adder (CSA) and devising a hybrid CSA elevated the overall performance. Initially, the CSA uses CLAA technology to generate the carry for each sum bit. These carry bits are then used to select the respective multiplexer (MUX) which adds the carry bit to the sum accordingly. The proposed circuit was synthesized with bulk 40 nm standard CMOS library on Synopsis tools. The Carry Select Ahead Adder (CSAA) thus shows superiority over both CLAA and CSA by using more area on the chip to provide a shorter average path respectively. Results also show simplicity in hardware as compared to the CLAA. These simple yet critical advantages help us in providing a faster processing speed by increasing the complexity of circuit on the chip. The above-mentioned adder can be thus be used in various Arithmetic and Logic Units (ALU) of CPUs for faster arithmetic results.
S.No.: 409
Title : REVIEW ON FPGA BASED HEALTH CARE SYSTEM
Authors Name: GINU THOMAS, Dr K.GnanaSheela
Authors Affilation: TOC H INSTITUDE OF SCIENCE AND TECHNOLOGY
Volume & Issue No.: Volume2Issue10
Abstract: Health care and medical organizations utilize various management information systems and communication technologies to improve their service availability and operating efficiency to the patients. The general trend in developed countries is to increase public in spending to improve the quality of health care. But with the aid of growing population, it made the nation struggling against the inefficient health care system. Cases like delay regarding different reports, wrong surgery have placed health care system as the main challenging issue. In contrast to most of the existing health care system; we propose an efficient solution in this paper to implement the health care system using Zigbee enabled RFID technology in accordance with the advanced VLSI design of the processor. Xilinx ISE 14.3 simulator has been used to simulate the processor module and the hardware of the processor has been implemented up to the RTL schematic level.This is to show how RFID technology can be used to reduce medical mistakes improve patient safety and enhance the quality of medical service in hospitals. The benefits of this system include easy to setup, use and maintenance and can achieve simple and reliable information accessing and to improve the quality of the hospital services.
S.No.: 410
Title : COMPARATIVE STUDY ON LOSSES IN ASYNCHRONOUS TRANSFER MODE (ATM) SWITCHES AND FRAME RELAY SWITCHES
Authors Name: Alumona T.C, Olugburu Ekene Chisindi, Engr. Jude Eneh I.
Authors Affilation: Nnamdi azikiwe university, awka Department of electronics and computer engineering
Volume & Issue No.: Volume2Issue10
Abstract: Asynchronous transfer mode is a network technology based on transferring data in packets of a fixed size. Losses in ATM Networking and frame relay depend on the performance of switch. This Report was made on measure to get the successive loss and analysis of the switch performance made. From the switch performance, sound techniques were devised for appropriate combination of parameters of the switch to achieve reduced loss in asynchronous transfer mode and frame Relay networks. Also comparative study was made on switch performance based on the computation of the distribution of constant loss. The extremely loss probability requirements of ATM switch prevents the use of simulation and thus the use of analytic and numerical techniques which calls for the construction and solution of the stochastic processes which has to do with the switch and workload. Also carried out were the computation of the distribution of quene length and its performance analysis with both a generic frame Relay switches (FRS) and an ATM switch (the knockout Switch). It was observed that large burst sizes and low Activity fractions (AFs) or low AFs and high loads resulted in frame Relay loss. However, a combination of high Afs and low loads was done to achieve minimized losses in ATM switches and frame Relay switches. From the Result of this study it is evident that appropriate combination of the parameters above through proper connection admission minimizes losses greatly and as such, improves the performance of asynchronous transfer mode (ATM) switches and frame relay switches. ATM is a high speed connection oriented cell based switching and multiplexing technology with little or no error control. It is designed to offer flexible transmission support for a wide range of services. ATM can support any traffic type in separate or mixed streams, delay – sensitive traffic and non delay traffics. AMT combines both circuit switching and packet switching.
S.No.: 411
Title : Implementation of 100 BASE-T4 Network Repeater using FPGA
Authors Name: Sudarshan M. Dighade, Pranav. P. Kulkarni
Authors Affilation: Bhivrabai Sawant collage of engineering and research, Narhe, Pune
Volume & Issue No.: Volume2Issue11
Abstract: Abstract— This paper presents the idea of 100BASE-T4 fast Ethernet repeater design targeting its FPGA implementation is proposed which supports 100Mb/s over low grade category 3 UTP. Although several speed up techniques exist, we present the architecture whose performance is improved based on detail analysis of vhdl programmable logic. The total estimated power consumption for proposed design have 335mW after the post placement and routing on Xilinx xc3s400 device.. FPGA implementation has various advantage of altering the function of the platform to perform several tasks. The implementation results show the minimum power consumption which reduce drastically compared to that of reported design
S.No.: 412
Title : A VLSI Architecture ForDecision Tree Based Denoising And Image Enhancement
Authors Name: REMYA P V
Authors Affilation: SNGCE
Volume & Issue No.: Volume2Issue11
Abstract: Images are often corrupted by noises in the procedures of image acquisition and transmission. In this paper, an efficient denoising scheme and VLSI architecture for the removal of noises is proposed. To achieve the goal of low complexity, a decision tree based impulse noise detector to detect the noisy pixels and an edge preserving filter to reconstruct the intensity values of noisy pixels is used. Furthermore histogram equalization is used to enhance the quality of images. The performance will be comparable to the higher complexity methods and the design requires only low computational complexity and suitable to be applied to many real time applications So final architecture consists of denoising and Image enhancement. Then this method is applied for different types of noises and compare results of image corrupted by impulses and equalized image using peak signal to noise ratio, mean square error, structural content.
S.No.: 413
Title : Detection of Spectrum Sensing by Using Coherent Detection Technique
Authors Name: meenakshi,rupinderkaur
Authors Affilation: Asst Professor.Rayat Bahra College of Engineering &Nanotechnology / Punjab Technical University, India and panjabi university patiala punajb
Volume & Issue No.: Volume2Issue11
Abstract: As, the radio spectrum for transmission is very limited but the usage of spectrum is increasing. So, to solve spectrum problem ,new method is used.where the vacant spectrum sense by detector. There are different methods are used which are Transmitter detection,Co-operative detection, Interference base detection. In this paper transmission type coherent detection technique is used for spectrum sensing. For sensing the spectrum ROC curve is used where absent or present of primary users is sense through the probability of detection.
S.No.: 414
Title : LUT OPTIMIZATION USING COMBINED APC-OMS TECHNIQUE
Authors Name: S.Basi Reddy, K.Sreenivasa Rao
Authors Affilation: M.Tech Student, Digital Electronics & Communication Systems, Annamacharya Institute of Technology & Sciences (Autonomous), Rajampet (A.P), India.
Volume & Issue No.: Volume2Issue12
Abstract: Now a day’s in signal processing multiplication is the most important arithmetic operation that uses look-up-table (LUT) as a memory for computations in arithmetic logic unit(ALU). LUT based computing is suitable for most of the digital-signal-processing (DSP) algorithms, which involves multiplication with a fixed set of coefficients. The design of multiplier requires huge number of logic gates in DSP, thus it occupies more area, delay and consumes large amount power. This paper aims to develop APC (Anti-symmetric product coding) and OMS (Odd Multiple Storage) techniques for reducing the size of the LUT and power consumption of the multiplier. The APC and OMS module contains 4-line to 3- line address encoder, 3 to 8 line address decoder, control circuit, memory and barrel shifter modules. The performance of the designed LUT based multiplier With APC and OMS technique are verified in N-tap filter. The design can be simulated & synthesized by using Modelsim6.0.
S.No.: 415
Title : Comparative Optimization and Analysis of Active Power and Delay of CMOS & DTMOS of 1-Bit and 8-Bit Full Adder
Authors Name: M Mounika, Dr. K. Ragini
Authors Affilation: 1M.Tech, DECE, G.Narayanamma Institute of Technology and Science, JNTUH
Volume & Issue No.: Volume2Issue12
Abstract: To optimize the power use of goods and services of a digital design such as that of an integrated circuit, while keeping up the functionality, we believe the power optimization is the employment of electronic design automation tools. The performance analysis and comparing between several parameters that are power delay, powerful, delay product of different 1-bit and 8-bit CMOS full adders that are conventional CMOS with different full adders has been presented here. The increasing speed and complexity of today’s designs, implies a significant increase in the power consumption of very-large-scale-integration (VLSI) chips. In this paper proposed full adder is a novel 1-bit full adder cell which uses only eight transistors also three multiplexers and one inverter are applied to minimize the transistor count and bring down power consumption. The low power and low transistor count make the novel 8T full adder cell a candidate for power efficient application. The plans have been borne away by the HSpice tool at 180nm and 45nmtechnologies. DTMOS is where the body is linked up to gate. These techniques offer high current device comparable to CMOS circuits operated at lower voltages (i.e. sub threshold). The leakage current produced by DTMOS circuits during OFF state is comparable with leakage currents of CMOS circuits.
S.No.: 416
Title : Design of High Speed Architecture for an LDPC Decoder
Authors Name: Saranraj.B, Yuvetha.M and Suguna devi.K
Authors Affilation: Assistant Professor, Department of ECE, P.A. College of Engineering and Technology , Pollachi-642002, TamilNadu, India
Volume & Issue No.: Volume2Issue12
Abstract: From the given set of inputs finding the minimum number is a very easy task. But finding the second minimum requires the derivatives of the first minimum and finding the minimum number from the remaining numbers. This paper proposes new two techniques to find the first two minimum numbers. In these techniques first method is based on sorting algorithm and second method is based on tree structure. In this paper, implementation of previous techniques, the new two techniques are done in AlteraDE2 FPGA kit. Comparison of performance analysis of previous techniques and the new techniques are done. Efficient algorithms and cost effective hardware of finding the two smallest numbers are greatly needed for low density parity check (LDPC) decoder design.
S.No.: 417
Title : Devanagari Handwritten Numeral recognition with Probabilistic Neural network
Authors Name: Mr. Abhay S. Lengare and Dr. Suhas S. Patil
Authors Affilation: lecturer, Electronics Department, Shivaji University, India
Volume & Issue No.: Volume2Issue12
Abstract: In the last half century, the English characterrecognition was studied and the results were of such type thats it can produce technology driven applications. But the same approach cannot be used in case of Indian languages due to the nature of complication in terms of structure and computation. Hindi the national language of India (written in Devanagriscript) is worlds third most popular language after Chinese andEnglish. Devanagri handwritten character recognition has got lot of application in different fields like postal address reading, cheques reading electronically. There are several Handwrittennumeral recognition have been proposed and evolved during last few decades. But robustness and accuracy of such system is still a issue due to variety of writing patterns, size, slant, ink, and writing style. So In this paper, a novel approach for Devanagari handwritten numerals recognition based on global and local structural features is proposed. Probabilistic NeuralNetwork(PNN) Classifier is used to classify the Devanagari numerals separately.
S.No.: 418
Title : Review- Challenges in Face Authentication using Extended Principal Component Analysis
Authors Name: Samarjeet Powalkar and Prof. Moresh M.Mukhedkar
Authors Affilation: VLSI &Embedded System Dr.D.Y.Patil college of Engg Pune, India
Volume & Issue No.: Volume2Issue12
Abstract: As the word become moving towards the globalization in engineering techniques, the capacity and techniques establish an identity of individuals using face as a biometric has become a more important. This paper includes the face recognition using the Extended Principal Component Analysis (EPCA) algorithm. The proposed algorithm uses the concept of PCA and represents an extended version of PCA by using the LDA (Linear Discriminate Analysis) to deal with the problem of operating the multiple numbers of the training images in the database. The Extended version of PCA algorithm may be used in to the face identification for security purpose, criminal face recognition, surveillance authentication etc. The problems related to background, noise and occlusion, and finally speed requirements are also overcome by using this algorithm. This paper focuses on developing a face recognition system using an extended PCA algorithm. The proposed algorithm uses the concept of PCA and represents an improved version of PCA to deal with the problem of orientation and lightening conditions present in the original PCA. Never the less the PCA algorithm is outperforms correct and good result in the less amount of database.
S.No.: 419
Title : DESIGN AND DEVELOPMENT OF DOT MATRIX HOLOGRAM BY LabVIEW
Authors Name: AKHIL K R
Authors Affilation: MODEL ENGINEERING COLLEGE, THRIKKAKARA
Volume & Issue No.: Volume2Issue12
Abstract: Diffractive optical elements are gaining more importance in photonics as interconnects, filters, detectors, light concentrators, wave-front modifying elements, security devices and decorative arrays. Holography is widely used to create optical elements (HOEs) of very specific features and applications. Generally Dot-matrix holography creates computer generated complex relief structures for security. However Dot-matrix holography can play a significant role in the fabrication of HOEs and replicate these in a cost effective manner. The paper describes about the design and application of a Dot-matrix holographic system that uses a high resolution Spatial Light Modulator (SLM) to modulate the simulated fringes on to a laser beam and project this to form an array, resulting in the creation of holo-lenses of very interesting features and applications. Acknowledgement: Technical and equipment support from Light Logics Holography and Optics, Technopark, Trivandrum is thankfully acknowledged.
S.No.: 420
Title : A survey on Virtualization concept to provide run time execution
Authors Name: Miss. Snehal MahadevPatil, Prof. Rohini V. Agawane
Authors Affilation: KJ College Of Engineering and Management Research, Kondhawa – SaswadRoad,Pin- 411048 Ta: Haweli, Dist: Pune , Pune University India.
Volume & Issue No.: Volume3Issue1
Abstract: Virtualization is very important concept in computer system design. Virtual Machines are used to enhance system impregnability, software interoperability, and platform versatility. Virtual Compilers has benefits to provide the use of Computer network to the maximum level. In this project I have aim to do centralize compiling, balancing of load, distribution of task, client/server architectureimplementation using distributed system. A virtual machine used to support individual processes or a complete system which depends on the abstraction level where virtualization occurs.So this project helps to avoid number of types of compilers in system. Most important benefit is that project helps to supports many languages. This project provides good reliability, good scalability and good service ability over the existing systems. This project overcomes the server overloading problem for source code compiling.
S.No.: 421
Title : Up gradation of Plasma Antenna by Using Fluorescent Tubes
Authors Name: Raviprakash Shriwas and Sayali Gulhane
Authors Affilation: Assist.Professor in EXTC Department Jawaharlal Darda Institute Of Engineering And Technology Yavatmal,India
Volume & Issue No.: Volume3Issue1
Abstract: Plasma antennas refer to a wide variety of antenna concepts that incorporate some use of an ionized medium. Plasma Antenna is a new captivating concept which could very well be the future of high-speed, high-frequency wireless communications. It is possible to transmit focused radio waves using Plasma antennas that would quickly dissipate using the conventional metal antennas. A plasma antenna is a type of radio antenna currently in development in which plasma is used, replacing the metal elements of a traditional antenna. Plasma antennas can be used for both transmission and reception. The advancement in plasma antenna is with the use of fluorescent tubes. The commercially fluorescent tubes consist of a glass tube filled with mixture mercury vapor and argon gas. The gas inside the fluorescent tube will ionize to plasma after getting sufficient voltage and formed plasma column. The plasma is highly conducting and it acts as a reflector. When all of the surrounding tubes are electrified, the radiation is trapped inside the antenna when the plasma frequency is greater than radio frequency. The developed antenna has potential in military application.
S.No.: 422
Title : ANALYZING AODV AND DSDV PROTOCOL TO PREVENT WORMHOLE ATTACK IN WSN
Authors Name: Harleen kaur , Neetu Gupta
Authors Affilation: Department of ECE, GIMET Amritsar, Punjab, India
Volume & Issue No.: Volume3Issue2
Abstract: Wireless sensor network are usually deployed in unattended or hostile environment for information gathering and transmitting it to the base station for evaluation. Due to built-in deficiencies of sensors, security is the major threat in WSN. WSNs are responsive to various external and internal attacks being curbed by computation assets, definite memory capacity and battery life, mechanism power, lack of tamper resistant packaging and the use of doubtful wireless communication channels. The wormhole attack is one of the intense attacks on WSN that can affect the networks performance. In this paper, protocol (AODV and DSDV) that is based on security is implied against wormhole attack in WSN. The evaluation of AODV and DSDV protocol is evaluated on the basis of metrics like throughput, average energy, packet overhead, packet delivery ratio. We present a technique to identify wormhole attack in wireless ad hoc network and a solution to discover a safe route by using NS-2 simulator.
S.No.: 423
Title : iWheel- a robotic wheelchair with mobile controlled navigation system
Authors Name: Vivek Deodeshmukh, Samarjeet Prithviraj Chavan
Authors Affilation: D. J. Sanghvi College Of Engineering ,Mumbai
Volume & Issue No.: Volume3Issue2
Abstract: Many people those using wheelchairs are not able to control a electronic wheelchair with joystick interface. The "iWheel" robotic wheelchair system is a general purpose navigational assistant in environments that are accessible for the disabled (e.g., ramps and doorways of sufficient width to allow a wheelchair to pass). The reactive system does not use maps for navigation. One of the advantages of this strategy is that users are not limited to one particular location by the need for maps or environment modifications. This report describes indoor navigation in the "iWheel" system; outdoor navigation is currently under development.
S.No.: 424
Title : A Review on Brain Machine Interface with AI for a Person with Disability
Authors Name: Ujwala Marghade, Vinay Keswani
Authors Affilation: Vidarbha institute of Technology, Nagpur university, india
Volume & Issue No.: Volume3Issue3
Abstract: Brain machine interface (BMI) system is very useful technique for the disabled that is handicapped & paralyzed person to express their emotions & feeling to other with the help of EEG signal of brain without any muscle activity, as human brain is developed by billions of interconnected neurons. BMI’s are the system which convert the brain signal to electrical signal to control the external devices by using person thoughts. By using this system, it allow disabled patients to improve & recover their mobility for communicate in surrounding environment. In this paper EEG (electroencephalogram) is used (non-invasive method) to capture a brain signal used for BMI to control any electronic devices like mouse cursor, wheel chair, robotic arm, etc. The research in this area of BMI system uses the sequence of 256 channels for capturing EEG signals coming out from brain by using traditional gel based on multi sensor system which is not convenient for real time applications. So this work improves the system to analyze EEG signals. The goal of this research is to improve the quality of life & speed of communication for those with severe disabilities Key words: Brain machine interface, BMI, EEG signals, brain signals, disability.
S.No.: 425
Title : IMPLEMENTING BIOMETRIC SECURITY ON MEASURE OF ATM
Authors Name: Hayder Hussien Azeez, Saif Mohammed Ali, Ali Taha Yaseen
Authors Affilation: The Qar University College of computer science
Volume & Issue No.: Volume3Issue3
Abstract: With the improvement of Computer Network Technology and E-business, the organization toward oneself keeping money system has got a broad advancement with the Banks Systems offering fan-tastic 24 x 7 hours service to the client. These days, utilizing the ATM (Automatic Teller Machine) which furnishes clients with the advantages banknote exchanging is extremely normal. Customary ATM systems validate for the most part by utilizing the Visa and the pin, the system has a few de-formities. Utilizing Mastercard and password we cant check the customers character precisely. Many offenders mess with the ATM and take the Clients credit card and the password by unlawful means. When the Clients Credit card is lost and the password is stolen, the criminal will take out all the money in a limited time, which will acquire gigantic budgetary misfortunes to the client. Step by step instructions to bear on the substantial character to the client turns into the center in a current money related loop. Lately, Biometric frameworks, unique mark innovation otherwise called bio-metric specifically, can give the likelihood to create an arrangement of insurance in ATM machines. Since biometrics-based verification offers a few focal points over other confirmation routines, there has been a critical surge in the utilization of biometrics for client validation lately. In this paper the current security of the ATM (Automated Teller Machine) framework has been enhanced by coordinating the unique mark of the client Into the banks database as to further confirm it. This was accomplished by displaying and building an ATM test system that will emulate a common ATM framework. The deciding result is an upgraded biometric verified ATM framework that guarantees more noteworthy security and expanded clients trust in the keeping money part
S.No.: 426
Title : Design the 2X1 mux with different logics and Comparing the Power dissipation and Area
Authors Name: Sreenivasa Rao N, Y.Vishnuvardhan Reddy, G.Shivamanikanta, B.Vijaysree
Authors Affilation: Santhiram Engg. College, Nandyal
Volume & Issue No.: Volume3Issue3
Abstract: Among various types of decoders (ex. Thermometer - to - Binary decoders) available multiplexer-based decoder requires less hardware, has more regular structure and shorter critical path. A 2-to-1 multiplexer is the leaf cell in the decoder. In this paper a 2-to-1 multiplexer circuit using complementary CMOS, dynamic and pass- ransistor logic styles have been analyzed. The power consumption, delay, area and power-delay product of various logic styles are compared. This paper shows that 2T multiplexer is an optimum device level design which has characteristics of high speed with minimum power compared with other realizations.
S.No.: 427
Title : An Intelligent System for the Detection of Breast Cancer Using Feature Selection and PCA Methods
Authors Name: M Ramya devi, Dr. B Gomathy
Authors Affilation: Dept. of Computer Science and Engineering Bannari Amman Institute of Technology Erode, India
Volume & Issue No.: Volume3Issue3
Abstract: Breast cancer becomes a serious disease in the modern world. It is caused due to obesity, lack of physical exercise, alcohol consumption, hormone replacement therapy during menopause, early age at first menstruation, ionizing radiation. Breast cancer is the second leading cause of cancer death in women, exceeded by lung cancer. The chance that breast cancer will be responsible for a womans death is about 1 in 36 (about 3%). Death rates due to breast cancer have been declining since about 1989, with greater decreases in younger women. The decreases are the result of earlier detection through screening techniques and increased awareness, as well as the treatment. The detection of breast cancer and the dimensional reduction of high dimensional data become difficult for large datasets using association rule mining. A new hybrid method called feature selection method which combines Association rules (Apriori algorithm) and Principal Component Analysis (PCA) with artificial neural network classifier (ANN). Feature selection method distinguishes features from a set of features and eliminates the irrelevant and redundant data. It results in increased accuracy and reduces the processing time. Neural network classification uses the output of AP method as input and extracts the features. The average accuracy of AP and NN is 98.29%. Finally, comprehensive experimental study is made and the accuracy is increased by combining PCA and Linear Discriminant Analysis (LDA) methods in future to reduce the size.
S.No.: 428
Title : An Assessment of PSNR for Reversible Watermarking Techniques
Authors Name: Abhishek Patanwar, Shikha Singh
Authors Affilation: Dr. C. V. Raman Institute of Science & Technology, Kota- Bilaspur C.G. India
Volume & Issue No.: Volume3Issue3
Abstract: Reversible watermarking gets enormous attention from researchers in past decade as the need of recovering the original work image after extracting the watermark arises in various applications like military and hospitals. Due to many researches in this field, there are various techniques are available. So to choose which one is the best technique, a definite need arises to compare those techniques on some criteria like PSNR and Embedding Capacity. In this paper, we present a comparative analysis of three basic robust techniques, which are Least Significant Bit (LSB), Difference Expansion (DE) and Reversible Contrast Mapping (RCM) technique.
S.No.: 429
Title : SELF SECURITY ALERT SYSTEM USING WIRELESS SENSOR NETWORKS
Authors Name: M. RAMYA PRINCESS, J. BASKARAN
Authors Affilation: VALLIAMMAI ENGINEERING COLLEGE
Volume & Issue No.: Volume3Issue3
Abstract: Security is the most important in day to day life for almost all the sectors of the world. The development of self security alert system using wireless sensor network is presented in this project The main aim of this project is to secure a person under risk by automatic alert system using Peripheral Interface Controller, mobile communication and Force Sensing Resistor. Force Sensing Resistor at the bottom of the foot senses the force being applied. The analog information from this resistor will be converted into digital for further processing by the Microcontroller series. Whenever a person is in distress, he/she has to hit the sandal forcibly on the ground to activate the control unit. When the applied force exceeds the threshold level, the signal will be transmitted to the Radio Frequency Transceiver through Serial Peripheral interface. When Radio Frequency Transceiver receives the signal, it is given to the Microcontroller. Global Positioning System is the receiver that collects data from the satellite and feeds the exact location in the form of latitude and longitude to the user’s mobile. Communication is possible by sending a text message in the predefined format to the GSM modem. The main concept in this design is introducing the mobile communication into an embedded system for the purpose of security. The design unit is very simple and low cost.
S.No.: 430
Title : DESIGNING OF LOW POWER DUAL EDGE - TRIGGERED STATIC D FLIP-FLOP WITH DETFF LOGIC
Authors Name: Sreenivasa Rao N, Jyothi. P, Naveen Sagar Reddy. K, Krishna Tulasi M
Authors Affilation: Santhiram Engg. College, Nandyal, A.P
Volume & Issue No.: Volume3Issue3
Abstract: The normal D flipflop consumes very high power. So in this paper we enumerates new architecture of low power dual-edge triggered Flip-Flop (DETFF) designed at 90nm CMOS technology. In DETFF same data throughput can be achieved with half of the clock frequency as compared to static output-controlled discharge Flip–Flop (SCDFF). SCDFF involves an explicit pulse generator and a latch that captures the pulse signal. The latch structure of SCDFF consists of two static stages. In the first stage, input D is used to drive the pre charge transistor so that node follows D during the sampling period. In SEDNIFF, a pulse generator circuit is used to generate narrow pulses at both rising and falling edges of the clock In this paper conventional and proposed DETFF are presented and compared at same simulation conditions. Therefore the proposed DETFF design is suitable for low power and small area applications
S.No.: 431
Title : IMPLEMENTATION OF SOBEL AND PREWITT EDGE DETECTIONS USING XILINX SYSTEM GENERATOR
Authors Name: K.Dinesh Kumar, A.V.Karthik, K.Shravan Kumar, M.Koteswara Rao, V.Nancharaiah
Authors Affilation: Students, Department of ECE, Lendi Institute Of Engineering And Technology, Vizianagaram, India.
Volume & Issue No.: Volume3Issue3
Abstract: Implementing hardware design in Field Programmable Gate Arrays (FPGAs) is a formidable task. There is more than one way to implement the digital filter. Based on the design specification, careful choice of implementation method and tools can save a lot of time and work. Most of the algorithms are computationally intensive, so it is desirable to implement them in high performance reconfigurable systems. Recently, Field Programmable Gate Array (FPGA) technology has become a viable target for the implementation of algorithms for image processing. Here Xilinx system generator tool is used to implement these image processing algorithms. Edge detection is the process of localizing pixel intensity transitions. The edge detection have been used by object recognition, target tracking, segmentation, and etc. Therefore, the edge detection is one of the most important parts of image processing.
S.No.: 432
Title : Improved document image binarization method for degraded images
Authors Name: Ritu, Kamaljit Kaur
Authors Affilation: Department Of Computer Science and Engineering Department Of Computer Science and Engineering Guru Nanak Dev University, Amritsar
Volume & Issue No.: Volume3Issue4
Abstract: Image binarization plays significant role for document image binarization. Scanning and printing of documents may degrades their visibility that means it become difficult to understand and interpret them. This paper has focused on the different image binarization technique. This paper has proposed a new technique which has the ability to binarized documents in more efficient manner. The proposed method has integrated the image gradients and the image contrast enhancement to improve the accuracy of document image binarization. The comparative analysis has shown that the proposed algorithm provides quite significant improvement over the available algorithms.
S.No.: 433
Title : Secret Data Hiding In Encrypted Compressed Video Bitstreams For Privacy Info Protection
Authors Name: Jobit Mathew and K Manivel
Authors Affilation: 1Department of ECE,Mahendra college of Engineering Salem,Tamilnadu,India
Volume & Issue No.: Volume3Issue4
Abstract: The project presents that encryption of compressed video bit streams and hiding privacy information to protect videos during transmission or cloud storage. In this research, a privacy protection mechanism in video is proposed. The sensitive or private visual information in frames, which should not be viewable by the general public or regular users, will be scrambled by directly modifying or removing the related data in video bit streams. In this way, data hiding in encrypted domain without decryption preserves the confidentiality of the content. In addition, it is more efficient without decryption followed by data hiding and re-encryption. Data hiding directly in the encrypted version of any video stream includes the following three parts, i.e., video encryption, data embedding, and data extraction. The code words of each frames and pixels are encrypted with stream ciphers. Then, a data hider may embed additional data in the encrypted domain by using bits replacement technique, without knowing/removing the original video content. Chaos crypto system is used here to encrypt/decrypt secret text data before/after data embedding/extraction. For different application purpose, data extraction can be done either in the encrypted domain or in the decrypted domain. The project simulated results shows that used methods provides better performance in terms of computation efficiency ,high data security and video quality after decryption.
S.No.: 434
Title : Interpretation of Terahertz Emission from Photo-excited Semiconductors by the Hot Carriers Repelling Phenomenon
Authors Name: Prof. Dr. Mohammad H. El-SABA
Authors Affilation: Faculty of Engineering, Ain-Shams University, Cairo,
Volume & Issue No.: Volume3Issue4
Abstract: Abstract- In this paper, we discuss the terahertz (THz) oscillations of hot carriers in semiconductor devices, upon the exposure to femto-second laser pulses. In particular, we discuss THz emission from silicon p-i-n diodes under high electric field effects. In this context, we present the theory of back thermal diffusion of hot carriers across p-n junctions to interpret the emission of THz waves when they are subjected to femtosecond laser. We call this “Hot Carrier Repelling Phenomenon”. This phenomenon explains the origin of the tera Hertz (THz) oscillations, whose period is in the order of the electron energy-relaxation time in semiconductors.
S.No.: 435
Title : Highly reliable and modular on-chip communication based on cluster method
Authors Name: Raj Kumar.S
Authors Affilation: ASSISTANT PROFESSOR Department of Electronics and Communication Engineering, Dhanalakshmi Srinivasan College of Engineering, Perambalur District,Tamilnadu,India.
Volume & Issue No.: Volume3Issue4
Abstract: Network-on-Chip architectures are emerging for the highly scalable, reliable, and modular on-chip communication infrastructure platform.On-chip networks utilize 2-D mesh topology. As the number of the cores present on-chip is increasing rapidly, the diameter of the network-on-chip is also increasing rapidly, which leads to large delay and energy consumption. The NoC architecture uses layered protocols and packet-switched networks which consist of on-chip routers, links, and network interfaces on a predefined topology.This paper proposed a cluster based topology with long-range links insertion algorithm.Finally, we evaluate the performance of the topology proposed in this paper through simulations.
S.No.: 436
Title : A SURVEY ON HUMAN MOTION DETECTION AND SURVEILLANCE
Authors Name: S. K .Mishra, K .S .Bhagat
Authors Affilation: Dept. of Electronics and Telecommunication Maharashtra, India J.T.M.C.O.E., FAIZPUR
Volume & Issue No.: Volume3Issue4
Abstract: Over years detecting human beings in a video scene of a surveillance system is one of the most active research topics in computer vision. This interest is driven by wide applications in many areas such as virtual reality, smart surveillance and perceptual interface, human gait characterization person counting in a dense crowd, person identification, gender classification, and fall detection for elderly people. Video surveillance system mainly deals with tracking and classification of moving objects. The general processing steps of human motion detection for video surveillance includes modeling of environments, detection of motion, object detection and classification human detection, activity recognition and behavior understanding. In this paper we review recent developments and analyze future open directions in visual surveillance systems.
S.No.: 437
Title : REVIEW ON VARIOUS TECHNIQUES OF MAMMOGRAM IMAGE SEGMENTATION
Authors Name: PRIYANKA JAGYA
Authors Affilation: HINDU COLLEGE OF ENGINEERING,SONIPAT(HARYANA)
Volume & Issue No.: Volume3Issue4
Abstract: Image segmentation is the most challenging problem in image processing despite decades of research. Breast cancer is one of the major causes of death among women thus; to detect the breast cancer in digital mammogram, firstly we have to segment it properly. Segmentation refers to the process of dividing an image into multiple segments. The aim of segmentation is to change the way of representation of an image in such a form that is more meaningful and easier to analyze. It is used to locate objects and boundaries in the images. In this paper we have reviewed various mammogram image segmentation techniques like watershed, level set, fuzzy c-means & wavelet based methods.
S.No.: 438
Title : A Routing Algorithm Based On Dynamic Forecast of Vehicle Speed and Position in VANET
Authors Name: Preeti Soni
Authors Affilation: Southpoint Institute of Technology and Management- Sonipat, Haryana
Volume & Issue No.: Volume3Issue5
Abstract: Reactive routing protocols such as GPSR, and Ad hoc On-demand Distance Vector (AODV)routing determination on an interest or need premise and keep up just the courses that are at present being used, along these lines lessening the weight on the system when just a subset of accessibleroutes is in use at any time. Communicationamong vehicles will just utilize an exceptionally set number of routes, and therefore reactive routing is especially suitable for this application situation. In this paper, we take the position that VANETs would to be sure end up being the systems administration stage that would support the future vehicular applications.We analyze the factors that are critical in deciding thenetworking framework over the future vehicular applications. We dissect the elements that are discriminating in choosing the systems administration structure over which the future vehicular applications would be conveyed and demonstrate that there are dynamic examination endeavors towards making VANETs a realityin the near future.
S.No.: 439
Title : Implementation Of Web Based Management System For Remote Access Terminal
Authors Name: Namita Gadhave, Dilip Bhosale
Authors Affilation: Student,of Bhivarabai Sawant Institute of Technology &Research, Pune.
Volume & Issue No.: Volume3Issue5
Abstract: The project aims at designing a Machine Remote Access Terminal using GPRS Modem. Most data loggers or Access Terminal depend on RF communication with limitation of certain Distance of communication. Some use wired Ethernet which is not feasible in certain areas of Industry. Some Telemetry solution providers have also used GSM SMS/DATA calls to solve the problems but it turned out costly and non-reliable. This project uses GPRS Data transfer TCPIP protocols to transfer chunks of data to server which runs a Web server script on APACHE engine. By simple HTML codes we can save real time data being sent from the unit and another HTML page can be used to show the IP data in a presentable way. This unit at present transmits one analog and digital signal and is a proof of concept. This concept can be expanded to include many other analog and digital channels into it.
S.No.: 440
Title : PERFORMANCE IMPROVEMENT OF MICROSTRIP PATCH RADIATOR USINGMETAMATERIALSTRUCTURE
Authors Name: Radhika Sharma, Anand N. Sharma
Authors Affilation: Mtech Scholar MPCT, Gwalior(MP)
Volume & Issue No.: Volume3Issue5
Abstract: This paper is aimed to investigate microstrip patch antenna loaded with metamaterial are simulated for S-Band (1.70GHz-3.60GHz). Metamaterial offers advantages such as greater bandwidth, reduction in return loss, impedance matching, high gain and high directivity. FR-4 lossy material (dielectric constant εr = 4.3, height of substrate = 1.6mm and loss tangent = 0.02) is used for designing of patch antenna. Metamaterial is loaded on FR-4 substrate at height of 3.314mm from ground plane. All simulations are carried by CST MW Studio software. single band rectangular microstrip patch antenna at frequency 2.33 GHz has been simulated. Further metamaterial is loaded on a ground plane of rectangular microstrip patch antenna at height 3.2mm the return loss of antenna significantly decreasing form -30.5 dB to -40.92 dB.
S.No.: 441
Title : Miniature Guided Wave Radar for Precise level Measurement using Time domain reflectrometry (TDR) Principle
Authors Name: ashish sahare
Authors Affilation: Veermata Jijabai Technological Institute, Mumbai
Volume & Issue No.: Volume3Issue5
Abstract: The aim of paper is to achieve a precise level measurement in the field of industrial tank. The principle of measurement is based on time domain reflectrometry (TDR), which is well known measurement technique in telecommunication industries for evaluating electric and dielectric property of various material. Despite all advancement made within last few years, there is still lack of low cost, small TDR meter equipment in market. This paper proposed design leads to development of low cost TDR meter with high resolution. In order to achieve high resolution, an extremely small time of incident and reflection pulse is thus required to be precisely measured. The key techniques of pulse generation and time measurement are introduce with the selection of guided radar probe (GWR) for accuracy even when the measurement within a highly unstable environment. The measurement is accomplished with the charge time measurement unit (CTMU), which is responsible to measure time with 3.5 ps resolution. Hardware design were discuss with the various parameter. Due to low cost and get rid of complex laboratory setup, the TDR meter can be used in field of chemical, petroleum, shipbuilding and geoscience industries.
S.No.: 442
Title : IMPLEMENTATION OF ARTIFICIAL NEURAL NETWORK CONTROLLED SHUNT ACTIVE POWER FILTER FOR CURRENT HARMONICS COMPENSATION
Authors Name: B.Mangaiyarkarasi
Authors Affilation: M.E. Department of Power electronics and drives, Sri Shakthi Institute of engineering and technology, Coimbatore, Tamil Nadu. India
Volume & Issue No.: Volume3Issue5
Abstract: A pure sinusoidal voltage is a conceptual quantity produced by an ideal AC generator. The nonlinear loads cause the current to vary disproportionately and the current taken by them has a non-sinusoidal waveform. The aim of this project is to present harmonic cancellation using shunt APF with an application of neural network (NN). Shunt active power filter (SAPF) is commonly used as an effective method in compensating harmonic components in non-linear loads. This active filter concept uses power electronic equipment to produce the current components that cancel the harmonic current components from the nonlinear loads. For the extraction of sequence currents and to improve the performance, the back propagation algorithm is used. This is a multi-layer feed-forward neural network. The back propagation method is for obtaining the source currents at the fundamental frequency. The Active Power Filter reference compensation currents are then determined by subtracting the fundamental components from the load currents. Thus proposed is an algorithm for maintaining ideal phase source currents when the source voltages are amplitude-imbalanced. Hence this method can be used when the loads may be balanced/unbalanced, linear/non-linear and any distortion the source current must be sinusoidal.
S.No.: 443
Title : Optimization of 14nm Gate All around MOSFET for Gate Leakage Current
Authors Name: Rafeek Alas, Dr.Kiran Bailey
Authors Affilation: MTech Student Electronics BMSCE, Banglore,India
Volume & Issue No.: Volume3Issue6
Abstract: As semiconductor device geometry scales down, the Short Channel Effects (SCE) are dominating. To reduce the SCE, oxide thickness is reduced. This leads to increase in gate leakage current. To overcome the SCE and to control the gate leakage current, Gate All Around (GAA) structure is proposed with optimum values of fin width for NMOS, fin height for PMOS and thickness of the gate oxide. The performance of GAA MOSFET with gate oxide HfO2 are simulated and compared with conventional gate oxide SiO2 for the same Effective Oxide Thickness (EOT) and fin dimensions. It has been shown here that the performance of the GAA structure with HfO2 as gate dielectric is comparable with the performance of the optimized GAA structure with the traditional SiO2 dielectric. The gate leakage current has been controlled with the optimization of the fin width and gate dielectric thickness without compromising on Ion/Ioff ratio. The use of HfO2 material as gate oxide has some limitations on manufacturing and performance such as reduction in drain current, transconductance and mobility degradation. With implementation of HfO2, essentially the gate leakage current was improved, but other issues such as thermal stability, interface layer control, increased interface charges and poly depletion degradation still exists. According to International Technology Roadmap for Semiconductors (ITRS), the EOT for gate lengths below 9.7nm is less than 0.6nm. It becomes very difficult to maintain a thin interfacial layer of SiO2 of around 0.5nm along with High K such as HfO2, in turn it leads to increase in manufacturing complexity and cost. The threshold voltage gets affected as thickness of the gate oxide varies, but the proposed GAA structure has wrap around gate structure and thin fin width(height), which makes better electrostatic control over the channel, hence effect on the threshold voltage shift is nullified. All the simulations are performed using the 3D Sentaurus TCAD Device simulator. Here, we are concluding that proposed device structure 2 has better performance over nominal structure with gate oxide HfO2.
S.No.: 444
Title : Single Precision Floating point Numbers Multiplication using IEEE 754 standard
Authors Name: Tejaswini.H.N., Dr. Ravishankar. C. V
Authors Affilation: Department of ECE, Sambhram Institute of Technology, Bangalore
Volume & Issue No.: Volume3Issue6
Abstract: Floating-point arithmetic involves manipulating exponents and shifting fractions, the bulk of the time in floating point operations is spent operating on fractions using integer algorithms. This paper proposes the multiplication of floating point numbers. IEEE Standard 754 floating point is the most common representation today for real numbers on computers, including Intel-based PCs, Macintoshes, and most Unix platforms. In this paper, IEEE 754 standard which is the standardized computer representation for binary floating-point numbers is used. It is the most commonly used representation in modern computing machines. This standard defines several different precisions. The most popular formats are single precision and double precision.
S.No.: 445
Title : Data reduction and energy minimization in sensor network for landslide monitoring
Authors Name: Prof. Miss. Rupali.R.Jagtap, Miss. Shweta.A.Desai
Authors Affilation: 1Head of Department of Electronics and Telecommunication Engineering,ADCET, Ashta, MH,India
Volume & Issue No.: Volume3Issue6
Abstract: Enviourmental disasters are largely unpredictable and occur short span of time therefore India faces rainfall-induced landslides every year with large threat to human life’s and annual loss. Here, we present extensive studies into data reduction andenergy minimization in Sensor Networks for landslide detection and its exact location.The objective of the purposed system is throttling the collected data dynamically with the minimizing energy consumption without diminishing the effectiveness of landslide monitoring by implementing the heterogeneous networkof wirelessprobes with each probe consisting of four different types of sensors to measure rainfall, moisture, pore pressure, and movement, all of which have been in continuous operation.. All captured data will send using Differential Forecast sampling technique for reduction in data and energy consumption. Also the Global Positioning System (GPS) captures the actual location of the landslide. So the system can save human lives and loss.
S.No.: 446
Title : Development of Autopilot for VTOL application
Authors Name: Akshay Pawar, Prof. Joshi S G
Authors Affilation: 1M.E. VLSI & Embedded Systems-II Year, Vishwabahrti Academy’s COE, Ahmednagar, Maharashtra, India
Volume & Issue No.: Volume3Issue6
Abstract: In the ever expanding field of machine assisting humans, flight of an aircraft is one of those branches that cause fair amount of head turns. One of the interests is the ability of the software programmed aircraft control system arriving at decisions for flight control in either a military or civilian application. This paper presents the design decision and development of autopilot system for an autonomous unmanned aerial vehicle (UAV) hexarotor model. The autopilot system designed to demonstrate autonomous maneuver such as vertical take-off and landing (VTOL), hover and forward flight. The overall system consists of the hexacopter with an on-board computer which is Ardupilot Mega 2560 (APM) and a second computer serving as a ground control station (GCS). The flight control is done on-board while mission planning and human user interaction takes place at GCS. The sensors accounting for autonomous operation include MEMS based accelerometer, magnetometer, and gyro sensors collectively forming the Inertial Measurement Unit (IMU). The monitoring of the Hexacopter is done with the help of Mission Planner (MP) software which also enables us to graph various parameters of the flight. The hardware and software used to autonomously pilot the hexacopter are described in detailed in this paper.
S.No.: 447
Title : Over speed indicator and Accident Avoidance systems in a four wheeler
Authors Name: Ramkumar, Guru Prasana
Authors Affilation: Department Mechanical Engineering ,priest University Thanjour
Volume & Issue No.: Volume3Issue6
Abstract: Automotive vehicles are increasingly being equipped with collision avoidance and warning systems for predicting the potential collision with an external object, such as another vehicle or a pedestrian. The system has a computer which stores the speed limits of different areas. The GPS in the system feeds the exact location of the car to the computer which looks up in its database to determine the permissible speed for the area and limits the car within the allowable speed. Here is an inductive proximity sensor, requires a metal target. The proximity sensor fixed near the wheel of vehicle to detect the sensor we fixed one plate on the wheel It also provides a warning signal to the driver if the distance between vehicle and obstacle crosses a particular limit. It also monitors the speed of the vehicle and if the speed limit is exceeded it is informed to the driver.
S.No.: 448
Title : Improved Time-Frequency Approach For Detection Of Sudden Cardiac Death On Electrocardiogram Signals
Authors Name: Deepthi B, Suresh D S, Roopa S
Authors Affilation: Dept., of ECE, CIT, Gubbi, Tumkur
Volume & Issue No.: Volume3Issue6
Abstract: Sudden cardiac death (SCD) detection on Electrocardiogram (ECG) signal is a popular area of research because of its seriousness of the matter for surviving the life of cardiac patient. Here, an algorithm is proposed to detection and prediction of SCD using electrocardiogram signals. It is done by processing the heart rate variability signal through the methods like classical and improved time-frequency methods. The proposed algorithm is mainly evaluated based on the database of patients with sudden cardiac death and healthy person. Here one minute of ECG signal extracted before and few seconds after the cardiac death is considered, then using this extracted one minute signal the heart rate variability(HRV) is computed. Eight features in time domain and four features in frequency domain are extracted by using HRV signal and these features are considered as classical linear features. Then by applying the improved time-frequency method to HRV signal, statistical features are extracted. Finally extracted features in improved time-frequency method is given to the SVM classifier. The results obtained shows that, improved time-frequency distinguishes the SCD and healthy person effectively compare to other time-frequency methods. The proposed algorithm can be evaluated by using MIT-BIT database. Proposed method gives better resolution and gives 100% accuracy.
S.No.: 449
Title : A REVERSIBLE DATA HIDING METHOD BASED ON TWO-DIMENSIONAL DIFFERENCE HISTOGRAM AND BLOCK DIVISION
Authors Name: Nitheesh C. N., Arathy C. Haran
Authors Affilation: Electronics and Communication Engineering, MBCET, Trivandrum, India
Volume & Issue No.: Volume3Issue6
Abstract: Reversible data hiding (RDH) aims to embed secret message into a cover image by slightly modifying its pixel values, and the embedded message as well as the cover image can be completely recovered from the marked content. Many RDH methods have been proposed e.g., the methods based on lossless compression, difference expansion, histogram modification, prediction-error expansion, and integer transform etc. The histogram-based methods modify the histogram in such a way that certain bins are shifted to create vacant space while some other bins are utilized to carry data by filling the vacant space. This type of methods can control the embedding distortion and provide a sufficient embedding capacity. The existing technique is based on two-dimensional difference histogram modification. Here reversible data hiding (RDH) scheme is done by using difference-pair-mapping (DPM). First, by considering each pixel-pair and its context, a sequence consisting of pairs of difference values is computed. Then, a two -dimensional difference-histogram is generated by counting the frequency of the resulting difference-pairs. Reversible data embedding is implemented according to a specifically designed DPM. Here, the DPM is an injective mapping defined on difference-pairs. The embedding capacity of the existing data hiding technique can be increased by combining block division of the input image and the 2-D Difference histogram modification. The block division is done to improve the data hiding capacity, the marked image quality and to improve the hiding places of information in the image.
S.No.: 450
Title : DESIGN OF AN ADAPTIVE FILTERING ALGORITHM FOR NOISE CANCELLATION
Authors Name: Roshny Jose George
Authors Affilation: Department of Electronics and Communication Viswajyothi College of Engineering & Technology, Vazhakulam, Kerala, India
Volume & Issue No.: Volume3Issue6
Abstract: The aim of this paper is to implement a non-pipelined Least Mean Square (LMS) and a pipelined delayed-LMS (DLMS) adaptive digital Finite Impulse Response (FIR) filters on Field Programmable Gate Array (FPGA) chips for typical noise cancellation applications and compare the behavior of non-pipelined and pipelined adaptive algorithms in terms of FPGA resource, speed and area. The direct FIR architecture is considered for non-pipelined filter designing and the transposed FIR architecture is considered for pipelined filter designing. The VHDL hardware description language is used for algorithm modeling and synthesized using XILINX ISE 9.2i on a SPARTAN 3E chip. The obtained results demonstrate that the DLMS algorithm which has pipeline architecture is faster than LMS algorithm while it uses more chip area due to extra registers. The LMS algorithm for adaptive filtering was coded in MATLAB using direct form FIR filter and Signal to Noise Ratio (SNR) of noisy signal and the filtered signals were calculated. Also Mean Square Error (MSE) for different sound signals was determined.
S.No.: 451
Title : Performance of Low-Power Rail-to-Rail Operational Amplifier at Constant gm
Authors Name: Jaibir Malik, Sudhir Malik
Authors Affilation: Department of Electronics and Communication Engineering, RN Engineering. College, rohatk, India
Volume & Issue No.: Volume3Issue7
Abstract: A low power CMOS op-amp rail to rail op-amp. We relize in SCNO 180nm technology Under 1.8 power supply voltage. A constant Transconductance is ensured for the whole common-mode input range. The class AB output stage also has a full voltage swing. The circuit provides a gain bandwidth of 17.3-MHz and a DC gain of 83.67 dB. The input transistors operate in weak inversion, which have big gm/Id value, so the power consumption is reduced.
S.No.: 452
Title : PAPR Reduction Using PTS Technique in OFDM – MIMO System
Authors Name: Celina Antony, Prof S.G. Hate
Authors Affilation: Department of E&TC Engineering.,G.H.Raisoni Institute of Technology, Pune.
Volume & Issue No.: Volume3Issue7
Abstract: In the advancement of technology multicarrier transmission is of great importance. Orthogonal Frequency Division Multiplexing (OFDM) is a promising multicarrier technology for wireless communications. It facilitates high data rate for communication. The biggest drawback which OFDM encounters is high PAPR. The high PAPR results some interference to the system. This paper analyses the PAPR reduction technique called Partial Time Sequence (PTS) with different sub block and concludes that PTS technique is the most promising technique for PAPR reduction in OFDM system. OFDM – MIMO system with reduced PAPR is the best method for multicarrier transmission with higher data rate.
S.No.: 453
Title : WIRELESS ROBOT USING ACCELEROMETER
Authors Name: Prof. Keyur Chauhan;
Authors Affilation: Madhuben and Bhanubhai Patel Women’s institute of engineering, New V.v.nagar. anand, gujarat
Volume & Issue No.: Volume3Issue7
Abstract: This paper is based on the wireless control robot using accelerometer. Nowadays MEM (Micro Electro Mechanical) devices are widely used in day-to-day life. Accelerometer is one of the most popularly used devices. A Gesture Controlled robot is a kind of robot which can be controlled by your hand gestures not by old buttons. You just need to wear a small transmitting device in your hand which included an acceleration meter. This will transmit an appropriate command to the robot so that it can do whatever we want. The transmitting device includes an accelerometer and RF transmitter. The receiving device includes an ATMega16 Microcontroller, L293D IC (Motor Driver IC) and RF Receiver. The accelerometer gives the output of the X, Y, Z coordinate values of the present location with respect to the initial position of the accelerometer. Using these coordinates, we can control five different tasks (Forward, Backward, Left, Right, and Stop) of the robot. To provide remotely operation we are using 2.4GHz RF module. Using this RF module we can control the robot from 30 m away.
S.No.: 454
Title : IMPLEMENTATION OF VECTOR CONTROLLED DRIVE
Authors Name: Ravi Maloth , M.C.Shekar
Authors Affilation: M.Tech – SEOR – IITR M.Tech - EPE Assoc. Professor Asst.Professor Kshatriya College of Engg. - Armoor
Volume & Issue No.: Volume3Issue7
Abstract: Vector control is becoming the industrial standard for induction motor control. The vector control technique decouples the two components of stator current space vector: one providing the control of flux and the other providing the control of torque. The two components are defined in the synchronously rotating reference frame. The vector control technique is therefore a better solution so that the control on flux and torque become independent from each other and the induction motor is transformed from a non-linear to linear control plant.
S.No.: 455
Title : COMPARING THE EFFECTIVENESS OF FEEDBACK AND LOAD COMPENSATION TECHNIQUES IN CONTROLLING THE DISTURBED STATE OF NOMINAL-T CONFIGURATION
Authors Name: Ale, T. O.
Authors Affilation: Electrical & Electronics Engineering Department, Federal University of Technology Akure, Ondo State, Nigeria
Volume & Issue No.: Volume3Issue7
Abstract: This research work stated clearly the effectiveness of two compensation techniques; feedback and load compensation techniques in compensating for the disturbed state of one of the configurations of medium transmission line; nominal-T configuration [2]. Also, the effectiveness of these compensation techniques was compared. In order to achieve the set objectives, transmission line data was obtained from Akure substation, because Oshogbo to Akure 132kV transmission line was chosen as a case study. The configuration was modeled into transfer function model and state space model [5], the compensator circuit which happens to be the phase lag circuit was also modeled into transfer function model and state space model. The transfer function model contained the line parameters extracted from the transmission data obtained at Akure substation. While the state space model was obtained from the transfer function model of the configuration, a code was written to achieve these procedures, using MATLAB object. The result revealed that load compensation technique offered a perfect compensation to unit step disturbance and unit impulse disturbance. While feedback compensation technique provides perfect compensation to unit impulse disturbance only.
S.No.: 456
Title : Design & Comparison of Performance of Butterworth Filter & Chebyshev Filter
Authors Name: Er. Gaurav Singla, Er. Manpreet Singh
Authors Affilation: Electronics & Comuunication Bhai Gurdas Institute of Engineering & Technology Sangrur, India
Volume & Issue No.: Volume3Issue8
Abstract: Filter design is an area of interest in communication systems. Various types of optimization techniques are used for obtaining a better response in desired frequency band. This paper presents two different filters, Butterworth & Chebyshev for the comparison their parameters like pole zero plot & magnitude response of both the filters are obtained. Percentage error is also calculated for better observations.
S.No.: 457
Title : An Efficient Low Power Multiplier Based on Shift-and-Add Architecture
Authors Name: Mahesh Gajula, N. Rushi Shrunga
Authors Affilation: M.Tech VLSI Avanthi Scientific Tech.& Research Academy, Hyderabad
Volume & Issue No.: Volume3Issue8
Abstract: In this paper, an efficient low-power structure called bypass zero, feeding directly to An Efficient Low Power Multiplier based on shift-and-add multipliers is proposed. This architecture derives for lowers the switching activity of conventional multipliers. The modifications made to the multiplier which multiplies by include the removal of the shifting of the register and direct feeding to the adder, It bypasses the adder whenever possible, by using The ring counter instead of a binary counter and removal of the partial product shift. In this architecture we make use of a low-power ring counter proposed. The Simulation results for 32-bit radix-2 multipliers show that the Very an Efficient Low architecture and lowers the total switching activity up to 76% and power consumption up to 30% than to the conventional architecture. The proposed Architecture of multiplier can be used for low-power applications and where the speed is not a primary design parameter.
S.No.: 458
Title : Design and Simulation of Novel Full Adder Cells using Modified GDI Cell
Authors Name: John George Victor, Dr. M Sunil Prakash
Authors Affilation: 1PG Student, Department of ECE, MVGR College of Engineering, Vizianagaram-India
Volume & Issue No.: Volume3Issue8
Abstract: This paper presents low-power, low voltage and high speed 1-bit full adder circuits is proposed. Our approach is based on XOR-XNOR design full adder circuits in a single unit as well as Gate Diffusion Input techniques. Using 3transistor XOR Gate Logic style 8T,9T and 12T full adder cell are designed, which increases the speed and performance and reduces power dissipation at lower supply voltage. The design of 5 different full adder topologies using Modified Gate Diffusion Input (MGDI) Technique is reviewed in this paper. This MGDI technique allows the circuit to consume less power, less delay and to get optimized area of digital circuits, while maintaining low complexity of logic design. The simulations are carried out using 130nm CMOS Technology of Mentor Graphics. Analysis and evaluation is carried out for various adder circuit and their performances are compared by varying supply voltages. Simulation results illustrates that proposed adders have better performance, Low power, High speed against other designed adder circuits like CCMOS, CPL, TGA and Hybrid adder circuits.
S.No.: 459
Title : Health-IOT Platform Based Intelligent Medicine Box
Authors Name: Yateesh Kumar.T.V
Authors Affilation: Jain University
Volume & Issue No.: Volume3Issue8
Abstract: In-home healthcare services based on the Internet-of-Things (IOT) have great business potential. In this project, the Health-IOT platform based Intelligent Medicine box is proposed and implemented. Owing to people’s busy schedules and their forgetfulness or loss of memory due to age, many a times they miss their medication dosage meant to be taken at a specific time. Apart from the factor of forgetfulness, sometimes the patients (specifically in the case of elderly and blind people) are unable to read the names written on the medicine packets which may lead to intake of wrong medicines. These factors lead to medication non-adherence which may result in negative consequences for the patient. This is a critical problem for Medical Researchers as it hampers treatment success. This project proposes the design of an automated system which reminds people of their medication schedule and can also take the required medicine at a specific time. This project also provides mechanism to determine the condition of the elderly patients by sensing the one or more vital parameters using sensors such as heart beat sensor and temperature sensor. In the developed system, the time at which patient has taken medicine and the vital parameters readings of the patient measured through sensors can be monitored from the hospital management i.e., from clinical professionals by accessing the database of the patient in the hospital website.
S.No.: 460
Title : Design of High Speed MAC Unit using Vedic Multiplier
Authors Name: Neeraj Devarari, D.S.Gangwar, Shivika
Authors Affilation: 1M.Tech. VLSI student, 2Assistance Professor, Electronic and Communication Department
Volume & Issue No.: Volume3Issue8
Abstract: The design of high speed MAC Unit using Vedic Multiplier is the techniques of Ancient Indian Vedic Mathematics that has been modified as per technology to improve performance of mathematically computational. MAC is used in DSP application to multiply and accumulate at the same time. Vedic Mathematics is the ancient system of mathematics which has a unique technique of calculations based on 16 Sutras. The work has proved by the efficiency of Urdhva tirykbhyam Sutra and Nikhilam sutra– Vedic method for multiplication which strikes a difference in the actual process of multiplication itself and also reduces the complexity. It enables parallel generation of intermediate products, eliminates unwanted multiplication steps during the mechanism. For such application I used here carry select adder in the Vedic multiplier that has reduced the delay. Adders are the basic building blocks of any processor or data path application and computation. In adder design carry generation is the critical path. Carry Select Adder (CSLA) is one of the fast adder used in many data path applications. There is a chance to reduce the delay in the MAC structure.
S.No.: 461
Title : Optimal Cooperative Beam forming Design for MIMO Decode-and-Forward Relay Channels
Authors Name: Srisudha Addepalli, Prof. Pragnesh Shah
Authors Affilation: Electronics, Pillai Institute of Information Technologies,Mumbai University, Mumbai,India
Volume & Issue No.: Volume3Issue8
Abstract: In this project, a transmit beam forming design for the Multiple-Input–Multiple-Output(MIMO) Decode-and-Forward (DF) half-duplex two-hop relay channels with a direct source destination link is taken into consideration. For this source, relay and destination nodes are set with multiple antennas; we formulated and solved the optimal beam forming vectors for source, relay and destination nodes jointly. In specific, we identify several unique properties of the optimal solutions through mathematical derivation, based on which we have developed a systematic approach to arrive at the optimal beam forming vectors for source, relay and destination nodes for different system configurations. We derive a low complexity explicit expression for the optimal beam forming vectors for some specific scenarios. Numerical results show that our anticipated beam forming design scheme can achieve the - optimal solution with low computational complexity for MIMO DF relay networks.
S.No.: 462
Title : E-VOTING SYSTEM USING MOBILE SMS
Authors Name: Dinesh R. Gawade, Amardeep A.Shirolkar, Sagar R. Patil
Authors Affilation: 1B.Tech (ECT), B.A. (PSY)Student, Department of Technology, Shivaji University, Kolhapur, MS, India.
Volume & Issue No.: Volume3Issue9
Abstract: Electronic voting system have the potential to improve the traditional voting procedure by providing added convenience and flexibility to voter numerous. Voting scheme have been proposed in past such as electronic voting machine (EVM) and paper based voting, but most of them have failed to provide voter authentication in an efficient and transparent way, also such traditional voting scheme voter must be present physically in voting centre at the time of voting . But now a days most of voters are busy and dont like to wait in queues thus due to these voters dont visit to the pooling booth. Percentage of voting is decreasing these which is main and saviour drawback of traditional voting scheme now a days some improvement needed in this field, in this paper we are introducing such a system which eliminate drawback of traditional voting scheme this voting scheme is based on SMS. Also the all voting machine are connected through LAN. Due to this voting result is displayed on the same day of voting. Voting result is then sending to voter via sms. on the other hand GSM (Global System for Mobile Communication) since it is the most widely used mobile networking standard, there are more than one billion GSM users worldwide that represent a large user potential not just for mobile telephony but also for other mobile application that exploit the mature GSM infrastructure in these paper an electronic voting using GSM mobile technology is present by integrating an electronic voting scheme with the GSM infra structure we are able to exploit existing GSM authentication mechanism and provide enhance voter authentication and mobility while maintaining voter privacy. In these paper SMS has been used to send message which contain only code or identification of candidate on the other hand use mobile to receive message and it is connected via server to collect message.
S.No.: 463
Title : Design of Cascaded CMOS LNA for Ultra Low Power Application Using Positive Feedback Technique
Authors Name: Dipali D. Shende, Prof. R Sathyanarayana, Prof. M Mukhedkar
Authors Affilation: 1 E & TC Dept. D. Y. Patil College of Engineering Pune, India
Volume & Issue No.: Volume3Issue9
Abstract: A novel circuit topology for a CMOS low-noise amplifier (LNA) is presented in this paper. By employing a positive feedback technique at the common-source transistor of the cascade stage, the voltage gain can be enhanced. In addition, with the MOS transistors biased in the moderate inversion region, the proposed LNA circuit is well suited to operate at reduced power consumption and supply voltage conditions. Utilizing a standard CMOS process, the CMOS LNA has been demonstrated for 5-GHz frequency band applications. Operated at a supply voltage of 0.6 V, the LNA with the gain-boosting technique achieves a gain of 17 dB and a noise figure of 2.1dB. This CMOS LNA will be planned to work for military applications.
S.No.: 464
Title : FPGA BASED DIGITAL BEAM FORMING FOR PHASED ARRAY RADAR
Authors Name: YOGESH P SAJJAN, KRISHNA R, SHAHUL H
Authors Affilation: 14th semester M.Tech, BIT, Bengaluru
Volume & Issue No.: Volume3Issue9
Abstract: with the widespread use of digital techniques in modern communication systems, Digital Beam Forming (DBF) technique can be used for radar transmitter Beam Steering. Beam forming is a signal processing technique used for directional signal transmission or reception in antenna arrays and is achieved by controlling the phase and amplitude of each antenna element. The functions of a Timing Signal Generator (TSG) of a radar system is been implemented using VHDL programming and targeting it on to a FPGA. TSG works directly under the control of Radar Controller (RC) implemented using MATLAB and interfaced through Ethernet. Multiple DDS chips is used to generate multichannel radar waveforms and FPGA is used to send data and control signals to these DDS chips via SPI to achieve DBF. DDS (Direct Digital Synthesis) is a digitally controlled method of generating signals whose frequency, phase and amplitude are controlled by the respective description words. A sixteen channel direct-digital waveform synthesizer has been developed to enable Digital Beam Steering of the transmitting side for a 4x4 array Patch Antenna. Each antenna element has separate beam forming exciter. The RC communicates to the TSG unit implemented in FPGA and sends commands to TSG. Through the RC GUI, the control parameters like frequency and phase shift values are sent to the TSG. Based on the control signals, data has to be sent to internal registers of each DDS. Xilinx FPGA is used to program sixteen AD9957 DDS and output of FPGA and DDS devices are analyzed.
S.No.: 465
Title : Smart Brain Hemorrhage Diagnosis Using Artificial Neural Networks
Authors Name: Mr. Santosh H. Suryawanshi. and Prof.K. T. Jadhao.