Just Submited Papers List

List for IPASJ International Journal of Computer Science (IIJCS) ISSN 2321-5992
S.No.: 1
Title : Optimization and Implementation of Parallel Squarer
Authors Affilation: Dr.Ambedkar Institute of Technology,Bangalore
Volume & Issue No.: Volume2Issue7
Abstract: This paper describes the low power architecture design which is implemented in digital systems. It focuses on the design and implementation of Parallel Squarer and its optimization at the gate level netlist. The efficient parallel squarer design is optimized at the gate level and the results are obtained. It’s much efficient than the existing system. Parallel squarer architecture is implemented based on Binary squarer algorithm to provide low, power, area and delay with the trade-offs constraints. Simulation, synthesis is done in the Modelsim 6.5 and Xilinx 13.1 v. The gate level netlist simulation and synthesis are done in Cadence Encounter RTL compiler and the results are compared with Xilinx and cadence tool.
S.No.: 2
Authors Name: Monika Tripathi
Authors Affilation: Department of Electronics, Madhav Institute of Technology and Science Gwalior, India
Volume & Issue No.: Volume2Issue7
Abstract: Nowadays OFDM (Orthogonal Frequency Division Multiplexing) techniques are adopted by many existing or progressing wireless communication standards.OFDM’s sensing and spectrum shaping capabilities together with its flexibility and adaptivity make it the best transmission technology for CR system. Spectrum sensing helps to detect the spectrum holes (unutilized bands of the spectrum) providing high spectral resolution capability.Thus, a robust spectrum sensing algorithm for OFDM modulated signals is highly decide to implement CR when the primary signal uses OFDM modulation. Motivated by this demand,a Time-Domain Symbol Cross-correlation based spectrum sensing algorithm (TDSC method) is presented in this paper.The algorithm makes use of the property that the mean of the TDSC of two OFDM symbols is not zero if they have embedded the same frequency-domain pilot tones. We propse a new decision statistic for the signal detection based on the special feature –Cyclic Prefix embedded in OFDM signal. Further, in this paper we used to control the Transmit Power for cognitive radio.Different spectrum sensing techniques for OFDM based cognitive radio are discussed in this paper.
S.No.: 3
Title : Secure Data Transmission Using DNA ENCRYPTION
Authors Name: Anupriya Aggarwal and Praveen Kanth
Authors Affilation: BRCM College of Engineering ,Bahal,Haryana
Volume & Issue No.: Volume2Issue7
Abstract: DNA Encryption is preferable biological technique for securing text/image because of its parallelism, vast storage and fast computing quality. The process involve biological molecule present in human body called DNA abbreviated as Deoxyribose Nucleic Acid .The DNA molecule is synthesized and protein component part is extracted and then converted to nitrogen base . This nitrogen base is used in Encryption/Decryption and formulated as A (Adenine), C (Cytosine), T (Thymine) and G (Guanine) characters. DNA Cryptography components are ACTG characters only and how the message gets merged and located is known as DNA Cryptography. This ACTG characters create DNA Sequence S and merged with message M to produce new sequence S’ and send to receiver where Sequence S’ back converted to S. The paper will introduce traditional methods of DNA cryptography in which there is need of key and proposed methods ,in which introduction to key is not required ,hence removing the tension of securing the key. The proposed method involves Complementary pair method.
S.No.: 4
Title : Induction Machine Rotor Faults Diagnostics through Stator Current Using Artificial Neural Network
Authors Name: KANIKA GUPTA
Authors Affilation: BADDI UNIVERSITY
Volume & Issue No.: Volume2Issue7
Abstract: Industrial motors are subject to incipient faults which, if undetected, can lead to motor failure. The necessity of incipient fault detection can be justified by safety and economic reasons. The technology of artificial neural networks has been successfully used to solve the motor incipient fault detection problem. This paper develops inexpensive, reliable, and non- invasive NN based incipient fault detection scheme for small and medium sized induction motors. Faults and failures of induction machines can lead to excessive downtimes and generate large losses in terms of maintenance and lost revenues. This motivates motor monitoring, incipient fault detection and diagnosis. Non-invasive, inexpensive, and reliable fault detection techniques are often preferred by many engineers. In this paper, a feed forward neural network based fault detection system is developed for performing induction motors rotor faults detection and severity evaluation using stator current. From the motor current spectrum analysis and the broken rotor bar specific frequency components knowledge, the rotor fault signature is extracted and monitored by neural network for fault detection and classification. The proposed methodology has been experimentally tested on a 5 HP/1750 rpm induction motor. The obtained results provide a satisfactory level of accuracy.
S.No.: 5
Title : Performance Evaluation Of Fuzzy Based DWT Approach To Enhance CT Image Using Image Fusion
Authors Name: Sarabdeep singh, Shikha khera
Authors Affilation: SPGOI , MDU, Rohtak HR (INDIA)
Volume & Issue No.: Volume2Issue7
Abstract: Image fusion is about to combine the features of two or more partial occluded or damaged images to generate a new effective image. The proposed algorithm is about to improve the quality of CT image by using the concept of image fusion. In this work, an effective image analysis model is been presented under multiple parameters. The parameters that will be considered in this work are contrast analysis, entropy analysis and frequency analysis. The proposed algorithm begin, with the decomposition of images using DWT. These decomposed image parts will be analyzed using multiple parameters defined above. To perform the effective pixel area selection, the fuzzy logic will be applied. In this work, a two layered analysis is been performed for image fusion. The first level fusion will be done using DWT and second level fusion will be done using parametric fuzzy logic approach. As the presented work is defined on the basis of multiple parameters so that more effective results are expected from the defined approach. The work will be implemented in matlab environment. The obtained results shows the effective generation of fusion image. The analysis of work is done under different parameter that shows the work has improved the visibility of medical image.
S.No.: 6
Title : Most Popular Webpages as a Basis for Website Re-Structuring for Reducing Web Navigation Efforts
Authors Name: Manpreet Singh Sidhu and Parminder Kaur
Authors Affilation: 1Guru Nanak Dev University, Amritsar
Volume & Issue No.: Volume2Issue7
Abstract: Millions of Webpages are accessed every minute by people from different locations all over the world. Very often users have to un-necessarily visit surplus pages in order to reach the desired page.Users’ activities in a web site are encouraged by the need to reach specific content. Web analytics tools and web mining techniques help visitors to Web sites in a faster way to reach the desired content, while decreasing the probability of leaving the system, or wandering. In exercise, the most commonly used methods for the time being are direct connecting of documents with their potential target documents. There is a scope for an approach that considers the possibility that the documents contained within the path carry useful information and that they may affect the determination of access to a specific target document. This paper puts forward a simple procedure for determining the most popular and the most visited pages which are often accessed by users. Placing most visited webpages higher above in the Website tree structure will decrease the user Navigation Efforts. In addition to it, it will also reduce network traffic as well as load on the server on which the website is hosted. PivotPage Documents– the most often visited documents from user’s path have also been discussed.
S.No.: 7
Authors Name: Gopal Kharvi, Prasanna Medar
Authors Affilation: SIET TUKUR
Volume & Issue No.: Volume2Issue7
Abstract: The demand for higher level machine tools is increasing year by year. Accompanying this, further high precision is demanded for spindles and spindle supporting bearings that are elements of machine tools. Ultra-precision machines require spindles with nanometer accuracy in rotation, moderate axial and radial stiffness, and moderate load carrying capacity. Aerostatic bearings have been adapted to develop this type of spindles called ultra precision aerostatic spindles. Since most of the ultra precision machines require precision class spindle with higher running accuracy, stiffness and good thermal stability, aerostatic bearings are in greater demand. Aerostatic bearing gives high rotational accuracy, thermal stability, stiffness and high operating speeds, compared to other types of bearings. Presently anti-friction bearings were used for the development of precision machine tools. As problems like wear, thermal errors, lubrication problems, bearing failure, etc, were encountered in anti-friction bearings there was a serious research in the field of precision engineering. Then the concept of using air bearings or gas bearings was developed and it received a huge response from all organizations and research centers. Later various concepts like active air bearings and passive air bearings and others were developed. In the present work an attempt has been made to develop an aerostatic spindle for ultra-precision machine tool which overcomes the drawbacks present in anti-friction bearing spindle which were used in precision machine tools. Different types of aerostatic bearings are analyzed and the best one is selected for design and further development. Detailed design of axial grooved journal bearings is done and groove parameters are studied and optimized.
S.No.: 8
Title : Image Segmentation and Shape Analysis for Road-Sign Recognition
Authors Name: Miss Ragini N.Chaudhari, Dr P. R. Deshmukh
Authors Affilation: SIPNA COET Amravati, Maharashtra
Volume & Issue No.: Volume2Issue7
Abstract: Road sign detection is important for regulating the traffic. The traffic signs enhance traffic safety by informing the driver of speed limits or possible dangers such as icy roads, imminent road works or pedestrian crossings. This paper proposes an automatic road-sign recognition method based on image segmentation and joint transform correlation (JTC) with the integration of shape analysis. The presented system is universal, which is able to detect traffic signs of any countries with any colour and any of the existing shapes (e.g., circular, rectangular, triangular, pentagonal, and octagonal) and is invariant to transformation. There are three main stages in the proposed algorithm: 1) segmentation by clustering the pixels based on the color features to find the regions of interest (ROIs); 2) traffic-sign detection by using two shape classifications Criteria, i.e., the relationship between area and perimeter and the number of sides of a given shape; and 3) recognition of the road sign using FJTC to match the unknown signs with the known reference road signs stored in the database. Experimental results on real-life images show a high success rate and a very low false hit rate.
S.No.: 9
Title : Aggregation Protocols in Wireless Sensor Network- A Survey
Authors Name: Nanthini.D, R.A.Roseline
Authors Affilation: Government Arts College,Coimbatore-18
Volume & Issue No.: Volume2Issue7
Abstract: Abstract--In this paper we provide a review of existing approaches, techniques and protocols for aggregation in Wireless Sensor Networks. Throughout this paper we discuss some of the various types of aggregation in Wireless Sensor Networking field. Various protocols have been proposed to routing packets for facilitating data aggregation. Generally the users require only efficient aggregate functions. A sensor network may consist of hundreds or thousands of low-cost sensors. Each acts as an information source, sensing and collecting data from the environment for a given task.
S.No.: 10
Title : What has driven remittance activity of the Indonesian migrant worker in Hong Kong; a study to formulate a proper business strategy To capture the business opportunity
Authors Name: Yunisyaaf Yunizal Arief
Authors Affilation: University of Padjadjaran
Volume & Issue No.: Volume2Issue7
Abstract: This research was conducted to study the things that encourage remittances by Indonesian workers in Hong Kong. The results can be used as a basis for preparing a felicitous strategy to increase remittance activity of Indonesian workers in Hong Kong to Indonesia. The results showed that 61% of motivation to perform a money transfer is influenced by agent variables (X2), the fees and the exchange rate of the Hong Kong dollar to rupiah, which is still perceived to be a burden, meanwhile the remittance processing speed is not very influential. Furthermore, remittances from workers seems to be reinforced by activities to offshore savings and to conduct money transfers to family needs.
S.No.: 11
Authors Name: R.Saranya
Authors Affilation: Research Scholar Madurai Kamaraj University Madurai-21
Volume & Issue No.: Volume2Issue7
Abstract: Requirement Validation engineering is an important part in the software development processes.To provide the exact required software products to the end users, in requirement validation phase, elicitation and specification are gathered from the users to improve the efficiency of the system.Works conducted using item prioritization applied Equality of Cumulative Votes (ECV)to improve the software compositional analysis. ECV prioritized much larger number of software requirements but the software requirement did not yield high quality software validation ratio.Two Product Derivation (TPD) approach verified the key activities of software product lines but the validation of quality was not performed with effective scalability outcome.In this paper, an effective Software Validation system using Bounded Software Replica Recognition (SV-BSRR) is presented for large scale software projects. The SV-BSRR method detects the software programming errors in order to achieve the quality on the users software elicitation and specification needs.The three steps involved in SV-BSRR method are Elicitation-Specification Main Domain Verification, Software Replica Checking and Bounded Software Replica Recognition. Elicitation-Specification Main Domain Verification analyzes the behavior of the software for larger projects using Mathematical monotone iterative functionwithout executing which increases the scalability. Software Replica Checking validates the instruction of the programsand effectiveness of software on larger projects to increase the software validation ratio. Finally, Bounded Software Replica Recognition checks (i.e.,) verify only the bounded software states in the projects to reduce the verification time by minimizing the verification step.SV-BSRR method experiment the parametric result measures of verification time, requirement-specification understandability rate and scalability and software validation ratio.
S.No.: 12
Title : Ontology development from Text Document For Search Engine
Authors Name: Trupti Hake , Vaishali Deshmukh
Authors Affilation: skncoe Pune.
Volume & Issue No.: Volume2Issue7
Abstract: In today’s world we can get any type of information from Internet. Many web applications use Semantic webs. Ontology are elementary part of semantic webs. Also maintain static database for different e learning system is a challenging task. In case unstructured databases which contains the text files , it becomes difficult to retrieving of information and hence it leads failure in acquire accuracy of knowledge. Today’s era is all about maximum knowledge gain in less effort. So the search system has to more prominent. so changing the structure of storing the data. Need and concept of semantic web has given birth to Ontology. Here we are representing a semi-automatic structure to build ontology from text document. And to retrieve information from ontology database Apache Lucene search engine which is developed.
S.No.: 13
Title : A hybrid approach for the mapping of ontologies
Authors Name: Guefrouchi Ryma, Kholladi Mohamed-Khireddine
Authors Affilation: Constantine 2 University, MISC Laboratory
Volume & Issue No.: Volume2Issue7
Abstract: Nowadays, ontologies are a strategic stake in the representation, processing and knowledge management. Several ontologies in different but related fields have been developed, thus a great evolution of knowledge-based systems in distributed environments appeared. To take advantage of structured data in heterogeneous ontologies, and according to different standards, it is essential to develop a method that ensures the interoperability of different ontolo-gies. In this paper we focus on the mapping of ontologies based on the different entities having close semantic contents, to the reuse of ontologies in different application areas such as the Se-mantic Web and Web Services , e-commerce, industrial, etc.
S.No.: 14
Title : Constructing Constraint Principal Curves Algorithms Using Local Optimization and Adaptive Radius
Authors Name: Dewang Chen1, Shiying Yang2, Peter Pudney3, Xin Liu4
Authors Affilation: 1State Key Laboratory of Rail Traffic Control and Safety, Beijing Jiaotong University, Beijing, China dwchen@bjtu.edu.cn 2State Key Laboratory of Rail Traffic Control and Safety, Beijing Jiaotong University, Beijing, China 12120291@bjtu.edu.cn 3Barbara Hardy Institute, University of South Australia, Mawson Lakes, Australia Peter.Pudney@unisa.edu.au 4Computational Mathematics, Academy of Mathematics and System, Chinese Academy of Science, Beijing, China liuxin@lsec.cc.ac.cn
Volume & Issue No.: Volume2Issue7
Abstract: Principal curves are curves that pass through the middle of a data set, which can learn high-accuracy data from multiple low-accuracy data; find the hidden pattern behind large amount of data with noise cloud and save lots of memory space for big data. An important example is a curve that defines a fixed path, such as a road or a rail line. We wish to construct a curve describing a path from noisy GPS measurements taken while traveling along the path. However, current principal curve algorithms are mainly based on global optimization, which are time consuming with low accuracy and narrow application scope in practice. To address these problems, we put forward the idea of CLPC (constraint Local Principal Curve), which uses local optimization methods and restricts the principal curve with two fixed endpoints to reduce the computational complexity. Based on this, we propose three CLPC algorithms, named as CLPCg (CLPC using greedy thinking), CLPCs (CLPC using one dimensional search) and CLPCc (CLPC combining the greedy thinking and one dimensional search) respectively, combining local optimization and adaptive radius to expand the range of applications and increase the solution quality. Then, six performance indices are defined to evaluate the effectiveness and efficiency of the proposed algorithms. Three simulation data sets and one GPS measured data set are used in the numerical experiments. The numerical results demonstrate that all of the three proposed algorithms can learn high-accuracy data from multiple low-accuracy data efficiently. Compared with the existing KPC algorithms, they have a lot of advantages in accuracy, computational speed and the range of applications. Moreover, CLPCc is the best of the three proposed algorithms according to the comprehensive experiments, CLPCg run much faster than other ones and meanwhile CLPCs sits on the hedge.
S.No.: 15
Title : Routing in MANET using CBHRP
Authors Name: Rakhi Vasake , Prof. S .B . Takale, Dr. S. D. Lokhande
Authors Affilation: Sinhgad College of Engg, Vadgaon, Pune
Volume & Issue No.: Volume2Issue7
Abstract: This paper introduces the concept of Cluster Based Hybrid Routing protocol(CBHRP) in Mobile Ad-hoc Networks (MANET). Energy conservation is the main parameter to be considered in MANET. In our proposed work, attempt is made to achieve energy efficiency by clustering and hybrid routing. The MANET is first divided into clusters and then cluster head is elected such that its energy level and signal strength is maintained above some pre defined threshold value. The head selection and its maintenance is done using the Signal and Energy Efficient Clustering(SEEC) algorithm. Once head is selected, routing is carried out such that inter cluster routing is done using reactive protocol, where as intra cluster communication takes place using pro active protocol. Hence the name cluster based hybrid routing protocol. Considerable energy efficiency can be achieved using clustering and hybrid routing.
S.No.: 16
Title : A Multi-Stage Cryptographic Approach Using Mod-Encoder Algorithm
Authors Name: Balajee Maram, P Srihari, K Lakshmana Rao
Authors Affilation: P.hD (CS) Scholar, Research and Development Centre, Bharathiar University, Coimbatore
Volume & Issue No.: Volume2Issue7
Abstract: Our life is bound with digital technology. In Information Technology, everything is available in digital form only. In the field of data communication, there is a need to send and receive data. Really we don’t know how the data will reach the destination successfully and securely. Security and privacy plays an important role in digital and data communication. In the field of secure data communication, cryptography is very important technique. Till now, we have seen many algorithms that are related to symmetric and asymmetric encryption and decryption. Most of the algorithms are related to text/data only. In this technique, there is a need to maintain one shared secret key or a pair of private-public keys. This proposed method tells us how to implement cryptography using mathematical method “Double-Reflecting Data Perturbation Method”, set of sharedsecret- files and Mod-Encoder Mechanism over a language L, which provides encryption and decryption.
S.No.: 17
Title : Hadoop: A Big Data Management Framework for Storage, Scalability, Complexity, Distributed Files and Processing of Massive Datasets
Authors Name: Manoj Kumar Singh, Dr. Parveen Kumar
Authors Affilation: 1Research Scholar, Computer Science & Engineering, Faculty of Engineering & Technology, Shri Venkateshwara University, Gajraula, U.P, India
Volume & Issue No.: Volume2Issue7
Abstract: Every day people make 2.5 quintillion bytes of information. In the most recent two years alone in excess of 90% of the information on the planet has been made and there is no sign that this will change, truth be told, information creation is expanding. The purpose behind the enormous blast in information is that there are such a variety of sources, for example, sensors used to gather barometrical information, information from posts on social networking locales, advanced and movie information, information created from every day transaction records and cell and GPS information, simply to name a couple. The greater part of this information is called Big Data and it incorporates three measurements: Volume, Velocity, Variety. To infer esteem from Big Data, associations need to rebuild their reasoning. With information developing so quickly and the ascent of unstructured information representing 90% of the information today, associations need to look past the legacy and select schemas that place extreme restrictions on overseeing Big Data productively and gainfully. In this paper we give an in-profundity theoretical review of the modules identified with Hadoop, a Big Data administration schema.
S.No.: 18
Title : modified retina verification system based on biometric graph matching
Authors Name: Jyothilekshmi M,Hema S
Authors Affilation: LBSITW,Poojappura,thiruvanthapuram,kerala,india
Volume & Issue No.: Volume2Issue8
Abstract: Biometric identification systems become a real demand for improving the security issues in different organizations. Commonly used biometric features include face, fingerprint, voice, facial thermogram, iris, retina, gait, palm print, hand geometry, and so on. Among these features, retina may provide higher level of security due to its inherent robustness against imposture. This paper presents an automatic retina verification framework based on the biometric graph matching (BGM) algorithm. The retinal vasculature is extracted using morphological operators. Then, retinal templates are defined as formal spatial graphs derived from the retinal vasculature. BGM algorithm uses graph topology to define distance measures between a pair of graphs. Kernel density estimation (KDE) of the genuine and imposter score distributions of the training set are used to measure performance of the BGM algorithm.
S.No.: 19
Authors Name: Meenu Ram .C, James Thomas
Authors Affilation: LBSITW Trivandrum
Volume & Issue No.: Volume2Issue8
Abstract: Retinal image analysis is one of the crucial topics in medical image processing. During the last three decades, people are trying to extract the different features (like blood vessels, optic disk, macula, fovea etc.) automatically from retinal image. Fovea is one of the important feature of a fundus retinal image. This project presents a simple and fast algorithm using Mathematical Morphology to find the fovea region. Here blood vessel detection provides vessel extraction of a normal eye. If blood vessels are having inflammation or any thick formations it is an indication of any other eye disease. Using this algorithm planning to get an actual image of a patient which can be analyzed to detect the category of other diseases if any. Developing automatic fundus image analyzing and diagnosis. The color fundus images are used to keep track of the eye diseases. Extraction of the normal and abnormal features in color fundus images is fundamental and useful to automatic understanding of fundus images. The normal features of fundus images includes optic disk, blood vessels, and fovea. Abnormal features include exudates, hemorrhages , microneurysms etc.
S.No.: 20
Title : Multimodal Biometrics For Human Identification
Authors Affilation: LBSITW TRIVANDRUM
Volume & Issue No.: Volume2Issue8
Abstract: Biometrics is the use of physical, biological, and behavioral traits to identify and verify a person’s identity automatically. There are many different traits that can be used as biometrics, including fingerprint, face, iris, retina, gait, and voice. The sclera is the white and opaque outer protective covering of the eye. The blood vessel structure of the sclera is unique to each person, and it can be remotely obtained non intrusively in the visible wavelengths. Therefore, the vessel patterns in the sclera can be used for human identification in a distance under visible wavelength illuminations. Therefore, it is well suited for human identification (ID). So here we use a new approach for human ID: sclera recognition. For that a new method for sclera segmentation is developed which works for both color and grayscale images. Then design a Gabor wavelet-based sclera pattern enhancement method to emphasize and binarize the sclera vessel patterns. Finally, use a line-descriptor based feature extraction, registration, and matching method that is illumination, scale, orientation, and deformation invariant and can mitigate the multilayered deformation effects and tolerate segmentation error. no biometric is perfect or can be applied universally. In order to increase population coverage, extend the range of environmental conditions, improve resilience to spoofing, and achieve higher recognition accuracy, multimodal biometrics has been used to combine the advantages of multiple biometrics. Therefore here sclera recognition method is combined with other biometrics, such as iris recognition or fingerprint recognition to get an accurate human identification method.
S.No.: 21
Title : A Study on Various Features of Multicast Routing Protocols in Mobile Ad hoc Networks
Authors Name: S.Dinakar, Dr.J.Shanthini
Authors Affilation: PG Scholar, Department of Information Technology, SNS College of Technology, Coimbatore, TamilNadu, India.
Volume & Issue No.: Volume2Issue8
Abstract: In mobile ad hoc networks the routing is performed using multi-hop routing from a source to a destination node (or) nodes. Here, the dynamic routing must be focused since they are infrastructureless networks involving a collection of mobile devices communicating over a wireless link. So, it requires a proper route for forwarding the data packets. The study focuses on some of the widely used multicast routing protocols designed to perform its task in accordance with its design criteria.
S.No.: 22
Title : Remote Patient Monitoring in Telemedicine using computer communication network through Bluetooth, Wi-Fi, Internet Android Mobile
Authors Name: S.Saravanan
Authors Affilation: Research scholar in Annamalai university CSE department, South India
Volume & Issue No.: Volume2Issue8
Abstract: Mobile telemedicine is to provide a medical monitoring for the user at any time, if there is any abnormal change of his/her pulse rate/temperature data. It provides sustained communication for data transmission. Mobile telemedicine brings the convenience and reduced cost, it also reduce the bandwidth problems in communicating reduced data transmission, and unexpected bandwidth congestion. The main purpose is to maintain record of patient data and to give emergency alert if required. We developed android Bluetooth API is to construct a simple peer-to-peer messaging system that works between two paired Bluetooth. At monitoring center android phone receives the data through Bluetooth module. This application is mainly used to send data to doctor, so that user can able to send and receive information[1][2][3].
S.No.: 23
Title : Design and performance evaluation of a healthcare network router enhanced with P-H-T sensing
Authors Name: Fangmin Sun, Zhan Zhao, Zhen Fang, Lidong Du, Shulei Chu, Diliang Chen
Authors Affilation: State Key Laboratory of Transducer Technology Institute of Electronics, Chinese Academy of Sciences Graduate University of Chinese Academy of Sciences
Volume & Issue No.: Volume2Issue8
Abstract: Nowadays, wireless health monitoring network is being widely studied and has gained large advancement. While, most of the existing health monitoring systems are homogenous network, that is, the health monitoring nodes not only sample the physiological data but also relay data from other nodes, which will decrease the network performance such as network throughput, packet loss rate as the power and computation ability of the health monitoring nodes are limited. In this paper, we designed and developed a router node to specially relay different kinds of physiological signals for healthcare networks. The division of functionality between acquiring and relaying data enables the health monitoring nodes to achieve consistent, predictable behavior and low energy consumption, while allowing us to engineer the system to provide superior data transmission performance. Moreover, the atmospheric Pressure, Humidity and Temperature (P-H-T) sensors are integrated in the router which could base the physiological data on a environmental context. The advantages of using these routers can be summarized as the following: 1).The system was featured with a high network throughput rate, with quantified 73.6Kbytes/s when the data were transmitted through three jumps. 2).The system was shown to have low packet loss rates where the packet loss rate was just 0.4% when date were transmitted 50 meters through three jumps. 3). Provides the environment information to the medical supervisor for correctly diagnosing the disease and to the people being monitored to do appropriate health nursing. A high throughput and reliability multi-hop wireless health monitoring system-HTRMH was built with the designed routers forming fixed network architecture, experiments on the network performance of the routers were described and the health and environment monitoring functions were evaluated.
S.No.: 24
Title : Text Classification Mining Support on Categorize Support Vector Machine Based on GA
Authors Name: Geetanjali kukade, Dharmendra Sharma
Authors Affilation:
Volume & Issue No.: Volume2Issue8
Abstract: In this paper proposed Text classification (also identified as text group or topic spotting) is the assignment of automatically categorization a set of text into a predefined set. The SVM network formation that used for web text in sequence categorization is recognized, and we exploit the genetic algorithm to optimize SVM parameters, thus enhancing the congregation rate and the classification accuracy, even when the data is noisy or partially labeled. Our work includes a proportional revision on classification of the same data set with added machine learning algorithms such as support vector machines, genetic algorithm parameters. In our proposed algorithm that combines genetic algorithm and support vectors machine and obtain web pages as an illustration to be appropriate to text classification problem
S.No.: 25
Authors Name: T.Syed Akheel ,Dr. V. Usha shree
Volume & Issue No.: Volume2Issue8
Abstract: Face recognition is interesting to study because it is an application area where computer vision research is being utilized in both military and commercial products. The main purpose of this paper is to develop new algorithms which is insensitive to large variation in lighting direction in image identification. In this we use eigen values for pattern classification each pixel in an image as a coordinate in a high dimensional space. We take advantage of the observation that the Images of a particular image, under varying illumination, Image recognition under variation in lighting and different orientations,
S.No.: 26
Title : Enhancement of Power System Security through Margin Sensitivity Methods In Indian Power System
Authors Name: imran khan
Authors Affilation: AZAD IET , LUCKNOW
Volume & Issue No.: Volume2Issue8
Abstract: For a particular operating point, the amount of additional load in a specific pattern of load increase that would cause a voltage collapse is called the loading margin. This paper describes computing and exploiting the sensitivity of the loading margin to voltage collapse with respect to various parameters. The main idea is that after the loading margin has been computed for nominal parameters, the effect on the loading margin of altering the parameters can be predicted by Taylor series estimates. The linear Taylor series estimates are extremely quick and easy and allow many variations on the nominal case to be quickly explored. Exhaustively recomputing the point of voltage collapse instability for each parameter change is avoided.
S.No.: 27
Title : Retrieving Frequent Itemsets from Distributed Data Base
Authors Name: Hamideh Hajiabadi, SaeidehKabiri Rad
Authors Affilation: Birjand University of Technology
Volume & Issue No.: Volume2Issue8
Abstract: With fast growing of the network and the data storage, large scale data are rapidly expanded and collected on the physically distributed storage, consequently traditional data mining approaches are not appropriate for information retrieval purpose. Distributed data mining techniques are developed in order to examine distributed data by parallel algorithms. Distributed data mining algorithms based on finding frequent itemsets are widely used for this purpose. The itemsets retrieved are numerous. In this paper proposed a tree based mining approachcontributing to user such that reducing number of retrieved itremsets. The algorithm is implemented and the results are demonstrated.
S.No.: 28
Title : Cloud Information Accountability Framework based on the Notion of Information Accountability
Authors Name: N V Sruthi, R Kumaran, Vikram Neerugatti
Authors Affilation: M Tech II Year, CSE, Sri Venkateshwara College of Engineering and Technology, Chittoor, Andhra Pradesh, India
Volume & Issue No.: Volume2Issue8
Abstract: The Motivation of this paper is to present Accountability for the cloud, based on cloud Information Accountability Framework. Main feature of the cloud services is used to processes the user data remotely in the unknown machines. This important feature leads to cause the fear of losing the own data of the user. To overcome this problem we propose the novel highly information Accountability to keep track of the actual usage of the users data in the cloud.To keep track of the usage of the users data we using the Third pary, the method which is used to complete the Accountability work quickly with accuracy. When we compared with the traditional approaches our protocol is better compared with the loss of data, security and privacy.
S.No.: 29
Title : Privacy Preserving Two Layer Encryption Access control in public Clouds
Authors Name: A Reddy Prasad, Gudivada Lokesh, N Vikram
Authors Affilation: II MTech, CSE, Vemu College of Engineering and Technology, Chittoor, Andhra Pradesh, India
Volume & Issue No.: Volume2Issue8
Abstract: The motivation of this paper is to propose a secure Access control scheme, for public clouds. We proposed a Privacy Preserving Two layer Encryption Access control in public clouds, which provides more privacy and security compared to the traditional approaches. Current approaches to enforce ACPs on outsourced data using selective encryption require organizations to manage all keys and encryptions and upload the encrypted data to the remote storage. Such approachesincur high communication and computation cost to manage keys and encryptions whenever user credentials change. In this paper, we proposed a two layer encryption based approach to solve this problem by delegating as much of the access control enforcement responsibilities as possible to the Cloud while minimizing the information exposure risks due to colluding Users and Cloud.
S.No.: 30
Title : Current Control Solutions For DC Machines
Authors Name: Farhan A. Salem
Authors Affilation: Mechatronics Engineering Sec. Dept. of Mechanical Engineering, Faculty of Engineering, Taif University,
Volume & Issue No.: Volume2Issue9
Abstract: To minimize the negative current characteristics, solve the high current drawn, maintain generated motor torque, result in more smooth response and saving in power consumption, this paper proposes current control solutions in DC machines, where the load torque is related to the required current, used to generate DC machine’s torque to overcome the load torque and meet output motion requirements.
S.No.: 31
Title : Binary Phase Shift Keying Demodulation Using Digital Signal Processor
Authors Name: Roopa.V
Authors Affilation: Sree Siddaganga College of Arts, Science and Commerce for Women, Tumkur.
Volume & Issue No.: Volume2Issue9
Abstract: This paper describes about BPSK demodulation using costas loop and implementing on a DSP kit. The demodulation process can be divided into three major subsections. First, since the incoming waveform is suppressed carrier in nature, coherent detection is required. The methods by which a phase-coherent carrier is derived from the incoming signal are termed carrier recovery. Next, the raw data are obtained by coherent multiplication, and used to derive clock-synchronization information. The raw data are then passed through the filter, which shapes the pulse train so as to minimize inter symbol-interference distortion effects. This shaped pulse train is then routed, along with the derived clock, to the data sampler which outputs the demodulated data. The codes for the PLL and the Costas loop are written in C language and implemented on the DSP kit ADSP 21060.[1,2] The various input and output plots are observed on the SHARC (Super Harward Architecture) simulator and also on the Emulator.
S.No.: 32
Title : exploring the possibility of using carbon and boron fibers for leaf spring
Authors Name: k.balaji
Authors Affilation: svcet
Volume & Issue No.: Volume2Issue9
Abstract: ABSTRACT:- For the better suspension system in automobile vehicles parts used are leaf springs and shock absorbers. Leaf springs are effectively utilized which absorbs the maximum shock loads for the vehicle. The main function of leaf spring is not only to support vertical load but also to isolate road induced vibrations. It is subjected to millions of load cycles leading to fatigue failure. The spring consists of a number of leaves of equal width but varying length, placed in laminations and loaded as a beam. The objective of this project is to present modeling and analysis of semielliptical leaf spring assembly and comparison of deformation and stress, load carrying capacity, stiffness and weight savings results between steel leaf spring and composite leaf spring under same conditions. This study gives information about the replacement of steel leaf spring with composite leaf spring assembly made of carbon fiber and boron fiber. The semielliptical leaf spring is to be modeled in solid works and analysis is to be carried out by using ANSYS workbench14 for effective comparison. KEYWORDS:-Leaf spring, steel, carbon & boron fibers.
S.No.: 33
Authors Affilation: M.Phil Research Scholar Department of Computer Science Bharathiar University Coimbatore
Volume & Issue No.: Volume2Issue9
Abstract: Microarray technology allows simultaneous measurement of the expression levels of thousands of genes within a biological tissue sample. This paper effectively uses the art of supervised machine learning methods such as support vector machine and k nearest neighbors for cancer classification problem using microarray data. In this work we compare the performance analysis of support vector machine and k nearest neighbor by using acute myeloid leukemia (AML) and acute lymphoblastic leukemia (ALL) datasets. We observed that the performance metrics such as accuracy, true positive, false positive rate, precision, and recall for k nearest neighbor algorithm are better than support vector machine.
S.No.: 34
Authors Affilation: 1Isaac Jasper Boro College of Education Sagbama, 2Bayelsa State college of Arts and Science, Yenagoa, Bayelsa State
Volume & Issue No.: Volume2Issue9
Abstract: Abstract This paper present the qualitative effects of superposing a ‘parasitic wave’ on a ‘host wave’. The attenuation mechanism of the carrier wave produced by the two interfering waves is studied. We used the known characteristics of the ‘host wave’ in the carrier wave to determine the basic characteristics of the interfering ‘parasitic wave’ which were initially not known. This study reveals that when a carrier wave is undergoing attenuation under any circumstance, it does not consistently come to rest; rather it shows some resistance at some point during the decay process, before it is finally brought to rest. Keywords: ‘Host wave’, ‘parasitic wave’ carrier wave.
S.No.: 35
Title : A novel approach for secure transmission for improving vertical handover in Heterogeneous Network using MIH
Authors Name: Haidarali K Ansari
Authors Affilation: S V Institute of Computer Studies
Volume & Issue No.: Volume2Issue9
Abstract: The demand for the global service is increasing due to the speedily growing demand for mobile internet, increased data rates and the multiplicity of wireless communication technologies. Also due to the challenges to communicate heterogeneous network technologies and to offer ubiquitous services, telecommunications operators look after the best way to provide continuity of service during handover and how to give the mobile client the possibility to get the best connection anywhere and anytime. Customer needs guarantees the continuity of service during a communication while moving between heterogeneous access network technologies. Vertical Handover take place when a wireless node switches from one network to another. One of the main requirements of our proposed work is to make it secure by using reliable security mechanisms, but it can decrease performance as well. So it is very essential to maintain balance between security and performance during vertical handover. Various handover security schemes that can provide reliable security as well as performance to a certain level will be discuss in this paper.
S.No.: 36
Title : Multiple Granularity Locking Model With Colourd Petri Net
Authors Name: Behnam Kiani
Authors Affilation: Tabriz university-IRAN
Volume & Issue No.: Volume2Issue9
Abstract: One of the methods of serializability in transaction commands is lock-based protocol[9]. Although locking ensures mutual exclusion, it brings about starvation or deprivation in executing transactions.Locking on a tree structure through using multiple aggregation method is one of the locking methods for nodes of a tree that allows each node to have various sizes[6,9]. At the same time, it creates a hierarchy of data in which smaller particles are located within the larger ones[6,8,9]. This article fully explains the colored Petri Net model of the protocol along with shapes of places, transitions, functions and commands.
S.No.: 37
Volume & Issue No.: Volume2Issue9
Abstract: Abstract: Visual cryptography scheme (VCS) is one of the techniques for secret sharing and encoding the image into n shares distributed to n participants. Only a set of qualified participants recover the secret image without any cryptographic knowledge. Extended visual cryptography scheme (EVCS) a type of VCS which consists of shares stacked together based on their associations (meaningful) as against random shares in Traditional VCS. Embedded EVCS has provided the better competitive visual quality than with the other EVCS’s. In Embedded EVCS, there exists two trade-offs between the large share pixel expansion and visual quality of shares and between the secret pixel expansion and visual quality of the shares. We propose a solution in Embedded EVCS with reduced pixel expansion and improved quality by introducing a Step construction to construct VCSOR and VCSXOR [5] which have optimal pixel expansion and contrast.
S.No.: 38
Title : Design and Analysis of Leaf spring for Tanker Trailer Suspension System
Authors Name: Mr. Sagar Gharate, Prof. S.H. Deshmukh
Authors Affilation: Sinhgad college of Engineering, Pune
Volume & Issue No.: Volume2Issue9
Abstract: A leaf spring is a simple form of spring, commonly used for the suspension in wheeled vehicles. Leaf Springs are long and narrow plates attached to the frame of trailer that rest above or below the trailer’s axle. For safe and comfortable riding to prevent the road shocks for being transmitted to the vehicle component and to safeguard the occupants from road shocks it is necessary to determine maximum safe stress and deflection. In the pursuit of design and analysis of leaf spring for tanker trailer suspension system an attempt is made to obtain the values of safe stress and deformation by carrying out finite element analysis software tools. The objective was to find safe stress and deflection of leaf spring by applying safe load. The model of leaf spring is created in Catia V5 and analysis id done by using Ansys 14.5 workbench. After carrying out the analysis and experimental work, safe design stress and deformation were in close agreement with analytical and experimentation results.
S.No.: 39
Title : Design and Performance Analysis of Microstrip Patch Antenna Using Different Dielectric Substrates
Authors Name: venkatrao kolli
Authors Affilation: S R K R engineering college Bhimavaram
Volume & Issue No.: Volume2Issue9
Abstract: Abstract: In recent years, the demand for compact handheld communication devices has grown significantly. Devices having internal antennas have appeared to fill this need. Antenna size is a major factor that limits device miniaturization. In the past few years, new designs based on the Microstrip patch antennas (MSPA) are being used for handheld wireless devices because these antennas have low-profile geometry and can be embedded into the devices. New wireless applications requiring operation in more than one frequency band are emerging. Dual-band and tri-band phones have gained popularity because of the multiple frequency bands used for wireless applications. Reducing antenna size generally degrades antenna performance. It is therefore important to also examine the fundamental limits and parameter tradeoffs involved in size reduction. In the handheld environment, antennas are mounted on a small ground plane. This paper presents the performance analysis of Different shapes Microstrip Patch antenna i.e. Z shape, H shape , E shape by using different dielectric substrate materials, to operate in the frequency range of 0.6 GHz to 2 GHz. The aim of this paper is to broaden the impedance bandwidth and to maximize the gain, thereby improving the performance of antenna. By comparing different substrates of dielectric material, an appropriate substrate was chosen to design Microstrip antenna. After simulation the antenna performance characteristics such as antenna input impedance, VSWR, Return loss and current density are obtained. Key Words: E –Shaped patch, H-Shaped patch, Z-patched patch, Microstrip antennas, Ansoft HFSS 13, wide band.
S.No.: 40
Title : A Nyquist Filter Based Technique to Reduce PAPR in MIMO based OFDM Communication System
Authors Name: pooja chauhan and prashant upadhyay
Authors Affilation: Maharishi Markandeshwar University Solan (himachal pradesh)
Volume & Issue No.: Volume2Issue9
Abstract: This paper describes the nyquist filter based technique to reduce the peak to average power ratio (PAPR) in multiple input multiple output Orthogonal Frequency Division Multiplication (MIMO-OFDM) systems. Wideband multi-carrier systems which use orthogonal frequency division multiplexing (OFDM) or multiple input multiple output (MIMO) faces one of the main problems regarding (PAPR) of a transmitted signal. In present paper a nyquist filter along with conventional selected mapping (SLM) and alternative multiseqence (AMS) techniques are used for reducing the PAPR. The nyquist filter reduces the peak power of the transmitted signal and this may cause the reduction in PAPR. The simulated results are compared with conventional SLM and AMS techniques. Proposed nyquist filter based technique shows the lesser PAPR than the conventional SLM and AMS techniques. Coding and simulation has been done in Matlab 7.12.0.
S.No.: 41
Title : Remote Monitoring of Patients Health using Wireless Sensor Networks
Authors Name: Alumona T.L, Idigo V.E, Nnoli K.P, Class Of 2014 Communication Option (Even
Volume & Issue No.: Volume2Issue9
Abstract: Recent technological advances in wireless communications and wireless sensor networks have enabled the design of low-cost, intelligent, tiny, and lightweight medical sensor nodes that can be strategically placed on human body, create a wireless body area network (WBAN) to monitor various physiological vital signs for a long period of time and providing real-time feedback to the user and medical staff via SMS/E-mail. Remote patient monitoring is an alternative to regular home check-ups of patients with certain special medical conditions or the elderly who are unable to regularly visit a healthcare facility. In this paper, wireless technologies are used to reduce the number of home visits which are now only required when special attention is needed. In this paper, sensors were used to collect physiological data from patients and transmit it to Intelligent Personal digital Assistant (IPDA) using ZigBee/IEEE802.15.4 standard and to medical server using 3G communications. The main advantage of this system is to speed up and extend the communication coverage to improve convenience. Priority scheduling and data compression is introduced into the system to increase transmission rate of physiological critical signals which improve bandwidth utilization. This paper discusses remote monitoring of patients health using wireless sensor networks (WSNs). Keywords: Wireless sensors, Wireless body Area Networks (WBAN), ZigBee/IEEE802.15.4, Patient, Healthcare, PDA
S.No.: 42
Authors Name: Ammar A. T. Alkhalidi, Patrick Bryar, Ryoichi S. Amano
Authors Affilation: German Jordanian University University of Wisconsin-Milwaukee
Volume & Issue No.: Volume2Issue9
Abstract: The primary objective of this paper is to examine ways to increase the efficiency of the water aeration process. This was achieved by adding blades that have aerofoil profile to the regular fine bubble aeration diffuser to provide enough power generated from the moving water current to mix the water within the tank. Even more, some power was extracted to generate electrical power. A support structure, mounted above the air diffuser, was added to connect the blade and the electrical generator. Attention was applied to increase saturated oxygen transfer efficiency (SOTE) and power reclamation at the same time. SOTE was tested though the use of three dissolved oxygen probes affixed within a cylindrical testing tank to measure. Power reclamation was tested through the use of a DC stepper motor. Mixing, powered by the water current, will result in pulling less oxygenated water into the center of the tank, without utilizing additional energy, leading to better a more efficient distribution of oxygen within the tank. This in turn will result in lower total power consumption by the system.
S.No.: 43
Authors Name: Mr.Swapnil Desai and Mr. Praful Chougale
Authors Affilation: PVPPs Manohar Phalke Polytechnic
Volume & Issue No.: Volume2Issue9
Abstract: Traditional E-Learning systems developed for laptop and desktop computers were based on stand-alone software application or through websites and lack the ability to provide a comprehensive ubiquitous learning environment. The ability to provide a comprehensive ubiquitous learning environment on mobile device will offer Opportunities to enhance learning by exploring the edge are presenting themselves as well.
S.No.: 44
Authors Name: K.M.Ponnmoli, Dr. S. Selvamuthukumaran
Authors Affilation: Research Scholar, PRIST University
Volume & Issue No.: Volume2Issue9
Abstract: Normalization process for face recognition process is a vital one that can be done by perform the H-connection of pixel coordinates from badly degraded face images are very confronting tasks because of high variation between the image background and the foreground layers of different document images. In this proposed system the novel image normalization using the H-CON (Hierarchical Connection) technique handle these issues with the adaptive image contrast. Combination of the local image contrast and the local image gradient constitutes the adaptive image contrast. It is adaptive to the variation of text and background with the image degradation. In the proposed system the map is first developed for the degradation of the image. The contrast map is then binarize and it is integrated with the Canny’s edge map to recognize the pixel edges. The feature of the image is divided by a threshold and it is determined with the intensities in the pixel edges. In the proposed system the method is clear and strong and includes minimum boundary tuning. The experiments on the test bed has a several challenging tasks and documents .Estimated with other techniques shows the PSNR,FAR and noise level of the output image.
S.No.: 45
Title : Ambient Intelligence–Basic Concept, Intelligent Environment Scenarios, Implementation
Authors Name: Manish Gangwani, Nitin jotwani, Manisha Galani, Anjali Yeole
Authors Affilation: 1B.E. Computer Engg. VES Institute of Technology, Mumbai -400074, Maharashtra, India.
Volume & Issue No.: Volume2Issue9
Abstract: In this paper, we present an integrated, automated and wireless system concept for the human intelligence environment domain based on the technique called ambient intelligence (AmI). We also discuss the resulting challenges in the technology which can bring smooth functioning in human life. Ambient Intelligence system is that which is embedded in an environment, enhancing complex and manual life to simple and automatic life. This technology in an environment is challenging to various algorithm that are being used with respect to human behavior and human life. Development of such intelligent and smart environment is whole and sole depended on the adaptive nature, flexibility, robust and the results parameters of this intelligence system are forecasted on parameters that are reasoning, decision making and acting. The details of new emerging technology, ambient intelligence, its working, architecture and various technologies used to build this system as well as real time scenario and examples are outlined in this paper.
S.No.: 46
Title : Artificial Intelligence and Cognitive Analytics approaches towards efficientpredictions for Business Intelligence
Authors Name: Salil Kanetkar, Neha Chanchlani
Authors Affilation: B.E. Computer Engineering Computer Engineering Department, VES Institute of Technology, Mumbai
Volume & Issue No.: Volume2Issue9
Abstract: Business Intelligence techniques no longer just evolve around traditional databases and warehouses, but have leaped into the era of big data. The aim is now to extract as much hidden knowledge from this rich data. The data is highly varying and evolves from various sources. Business improvement strategies usually revolved just around board room discussions, however these discussions are now more often aided with mining strategies. Machine learning, Artificial Intelligence techniques are of great advantage in predicting efficient strategies and business patterns. Apart from this, cognitive analytics and natural language processing are such techniques which could drastically change how business intelligence has been perceived. They try to emulate the human mind and train the computer to think accordingly. In this paper, we highlight the above listed methods in detail.
S.No.: 47
Title : To analyze the wear resistance of compact faced valve seat influenced by TIG welding process
Authors Name: Harvinder Singh, Manga Singh, Ramandeep Singh
Authors Affilation: Chandigarh Group of Colleges Landran Mohali
Volume & Issue No.: Volume2Issue9
Abstract: In the presented work, wear resistance was studied for compact faced material by TIG welding process. Wear resistance is basic property that is needed in valve seats of globe valves. Satellite 6 filler rods were used as a compact facing material. The variation of parameters like welding current, filler rod diameter and welding speed were observed on wear resistance and compactness. The two factorial method were used for design of experiment. The model developed and was checked for its adequacy and significance, by using F-test and t-test, respectively. Welding current has remarkable effect on wear resistance. Welding speed and Filler rod diameter has less effect on wear resistance.
S.No.: 48
Title : A Review of Watermarking Algorithms for Digital Image
Authors Name: Jaishri guru, Hemant damecha
Authors Affilation: Student of M.E. Software Systems (Computer science and Engineering department), Shri ram Institute of Technology, Jabalpur (R.G.P.V University Bhopal)
Volume & Issue No.: Volume2Issue9
Abstract: The growth of the Internet along with the increasing availability of multimedia applications has spawned a number of copyright issues. One of the areas that this growth has fueled is that of digital watermarking. Digital watermarking is the general technique of embedding a blob of information in the original file, such that an altered file is obtained. The blob of information, thus included, serves one of different uses, such as, identifying piracy, sensing tampering, or reassuring integrity. The approaches to watermarking are diverse and can be broadly classified based on their visibility, robustness, or fragility. Their uses are also versatile, as they can be applied to text, images, audio, or video. In this paper, we will go through various algorithms of watermarking for digital image.
S.No.: 49
Authors Name: K.Manigopinath, HraishMalepati, K.Rangaswamy
Authors Affilation: Assistant professor, Department of CSE, CBIT, Proddatur, Y.S.R (dist), A.P
Volume & Issue No.: Volume2Issue10
Abstract: To improve the performance of the network by implementing the best routing protocols. The purpose of routing algorithms is to make decisions for the router concerning the best path for data. Routing algorithms are to compute its decision’s depends on routing protocol information. Routing protocols collects certain information about a variety of networks and routers from the surrounding environments. Every router has memory to store the information about the networks. In the paper we focus on to provide an efficient path, the routing scheme we propose that the combination of “Traditional link state routing algorithm” (LSA) and routing protocols. Its main objective is by using special packet we reduce the delay and bandwidth in between the neighboring routers.
S.No.: 50
Title : Combustion and Emissions Characteristics for DI Diesel Engine Run by Partially-Premixed (PPCI) Low Temperature Combustion (LTC) Mode
Authors Name: Miqdam Tariq Chaichan
Authors Affilation: University of Technology-Baghdad-Iraq
Volume & Issue No.: Volume2Issue10
Abstract: ABSTRACT This study discusses the partially-premixed combustion (PPC) concept. PPC is a combustion concept by which it is possible to get low PM and NOx concentrations simultaneously. Gasoline/diesel fuel blends as an alternative fuel with high cooled EGR levels accompanied with injection timings sufficiently early to extend the ignition delay. The air and fuel will be mixed extensively prior to combustion. These factors were used to determine the PCC mode operation effects on the performance and emissions characteristics of a DI four-cylinder diesel engine. Gasoline/diesel fuel blends containing 50% gasoline in volume basis were prepared and tested. Experiments were carried out at a constant speed (1500 rpm) and variable engine load. EGR was cooled using a heat exchanger system designed to reduce the EGR temperature. Three EGR rates (30, 40 and 50%) were used with gasoline-diesel blend. The results indicate that fueling the test engine with gasoline/diesel blends caused a reduction in the brake thermal efficiency, while the brake specific fuel consumption increased with proportion to EGR rates. The gasoline/diesel fuel blend properties affected the combustion and emission characteristics in addition to PPC operation used. They caused reductions in NOx and PM concentrations. However, unburned HC and CO concentrations were obviously increased.
S.No.: 51
Title : Design and Analysis of Quad Arrow shaped Patch antennas to enhance the Performance
Authors Name: deepika patil, Abhishek mishra
Authors Affilation: Oriental institute of science & Technology
Volume & Issue No.: Volume2Issue10
Abstract: In this paper we are concentrating on Quad Arrow patch antenna for UWB applications. The proposed geometry will be implemented on a micro strip quad arrow monopole antenna. The iterated quad arrow fractal patch and modified ground plane were in use to achieve the desired wideband characteristics. In this we try to resound the frequency to be reduced radically by cutting slots which are the combinations of four triangular and two rectangular slots at the patch antenna.
S.No.: 52
Title : Extended Range soft switched, Transformer-coupled multiport Resonant switch Converter (ZVS) for Fuel Cell Application
Volume & Issue No.: Volume2Issue10
Abstract: This paper presents Extended Range soft switched, Transformer-coupled multiport Resonant switch Converter (ZVS) for Fuel Cell Application. The designed converter sustains ZVS of all switches commencing full-load down toward very light load condition in excess of extensive variations in the input voltage. Complete analysis, operation, design, simulation and experimental results for the design are presented. The turn-off voltage spikes are absorbed by the additional auxiliary active clamping circuit and allowing the circuit to operate at high voltages and at high frequency range. In addition, it assists in achieving ZVS of semiconductor devices. To sustain ZVS, the transformer magnetizing inductance aided by the energy stored in the transformer leakage inductance, it is utilized by the converter. ZVS range depends upon the design, in particular the ratio of leakage and magnetizing inductances of the transformer. Rectifier diodes operate with zero-current switching. The analysis, design and performance for extensive variations in input voltage and load have presented.
S.No.: 53
Authors Name: K.Vijay Kumar, Dr. N. Chandra Sekhar Reddy, Gaddam Geetha
Authors Affilation: Student, M.Tech CSE Dept, Institute of Aeronautical Engineering, Hyderabad-500043, Andhra Pradesh, India
Volume & Issue No.: Volume2Issue10
Abstract: In the real world, common storage devices, for example, universal serial bus (USB) thumb drives, portable HDDs, mobile phones, Laptop or Desktop PCs are generally utilized, and they are much less expensive or more advantageous for Storing client validation data. However, since these devices dont give alter safety; it is a test to outline to design a secure authentication scheme utilizing these sorts of memory devices. In this paper, password authentication schemes with smart cards are proposed and upgraded framework to eliminate the vulnerabilities and in the meantime to build the security qualities. We show the mapping of a mimic assault against their plan if the smart card gets stolen. We demonstrate that it is simple for an attacker to register password of a client by utilizing data removed from the stolen smart card. We additionally propose a straightforward and simple answer for fix this issue. There are various remote client validation plans proposed in composing for keeping unapproved gatherings from getting to assets in an unreliable environment According to our examination, the proposed scheme ensures common validation furthermore opposes logged off word reference, replay, fraud, and mimic assaults. Subsequently, our scheme is suitable actually for applications in restricted force figuring situations.
S.No.: 54
Authors Name: Y. Shashank Rao , Dr. N. Chandra Sekhar Reddy, B. Srinivas Reddy
Authors Affilation: 1Student, M.Tech CSE Dept, Institute of Aeronautical Engineering, Hyderabad-500043, Telangana, India,
Volume & Issue No.: Volume2Issue10
Abstract: Cloud computing is present trendy expression in the IT business sector. It is paradigm in which assets can be leveraged on for every utilization premise accordingly decreasing the expense and intricacy of administration suppliers. Cloud computing guarantees to cut operational and capital expenses and all the more essentially let IT divisions concentrate on vital tasks as opposed to keeping datacenters running. It is significantly more than basic web. It is a build that permits client to get to applications that really dwell at area other than client machine or other Web associated gadgets. There are various profits of this develop. For example other organization has client application. This suggests that they handle expense of servers, they oversee programming redesigns and relying upon the agreement client pays less i.e. for the administration just. Secrecy, Trustworthiness, Accessibility, Validness, and Security are fundamental attentiveness toward both Cloud suppliers and purchasers also. KERBEROS serves as security apparatus in cloud computing administrations and the establishment layer for the other convenience models and an absence of security in this layer will absolutely influence the other conveyance models. Here this paper shows an esteemed investigation of a few security parts and trustworthiness levels which decides vulnerabilities and countermeasures. Administration Level Ascension ought to be viewed as a whole lot essentialness. Here it can possibly turn into a leader in pushing a safe, monetarily feasible IT arrangement in future.
S.No.: 55
Title : Effective Engine Cooling System for an Air Cooled Engine in Formula Prototype Cars
Authors Name: Akash Sen Gupta, Apurba Sharma, Amritabha Chakraborty
Volume & Issue No.: Volume2Issue10
Abstract: The Paper aims to show an effective cooling of a Royal Enfield 500cc engine in a formula style racecar by designing and manufacturing an effective air guiding system should be provided. The air guiding system was first developed using the CATIA V5 R20. The flow lines were then simulated using ANSYS FLUENT 14.0.
S.No.: 56
Title : Study of mining of outliers for uncertain data
Authors Name: Ms. Aditi C. Dighavkar, Prof. N. M. Shahane
Authors Affilation: M.E. Student, K. K. Wagh Institute of Engineering Education and Research, Savitribai Phule Pune University, Maharashtra, India
Volume & Issue No.: Volume2Issue10
Abstract: Outlier detection is a important problem that has been studied within recognizable research areas. Many existing solutions are based on the assumption that an example can be classified as either a normal or abnormal class. However, data are uncertain in nature in many real life applications because of varied errors or fractional completeness. This data ambiguity introduces difficulty in outlier detection. The principal challenge of supervising uncertain data in outlier detection is to scale down the impact of uncertain data on the learned distinctive classifier. The proposed approach uses single likelihood and bi-likelihood value for each input data signifying degree of membership towards normal and abnormal class. Kernel K-means and Kernel LOF- based methods are used to compute the confidence score/likelihood values. The generated confidence score and limited abnormal examples are incorporated into soft-SVDD and bi-soft-SVDD based learning framework to build superior classifier for outlier disclosure. The proposed system adopts improved mechanism to generate confidence score based on the data characteristics in a given application domain.
S.No.: 57
Title : Web Technologies and Academic Libraries: Applications and Implications
Authors Name: Dr. P. Venkateshwar Rao
Authors Affilation: Osmania University
Volume & Issue No.: Volume2Issue10
Abstract: Paper gives a definition and theory for "Web Technologies and Academic libraries". It suggests that recent thinking describing the changing Web as "Web 2.0" and academic libraries as “library 2.0”will have substantial implications for academic libraries, and recognizes that while these implications keep very close to the history and mission of academic librariesthey still necessitate a new paradigm for librarianship. The paper applies the theory and definition to the practice of librarianship, specifically addressing how Web 2.0 technologies such as synchronous messaging and streaming media, blogs, wikis, social networks, tagging, RSS feedss might intimate changes in how libraries provide access to their collections and user support for that access.
S.No.: 58
Title : Designing Parallel and Distributed Architecture for Data Mining and Unification of Association Rule
Authors Name: Imran Qureshi,Mohammed ali shaik,kanchy suresh
Authors Affilation: Guru nanak Institute of technology
Volume & Issue No.: Volume2Issue10
Abstract: With the continually-increasing accessibility of information many methods have been evolved for encoding and storing the information that simul-taneously grows all the time. Many available information sources includes traditional databases such as relational database , flat file system, parallel or distributed knowledge bases, simple or complex programs, object-oriented or object-based, text documents with distinct proprietary formats that are some variant of a traditional format. We are proposing four extensible architectures that provide flexibility to various data sources for handling data mining operations by creating or mining association rules.
S.No.: 59
Title : Text Dependent Speaker Identification Using A Bayesian network and Mel Frequency Cepstrum Coefficient
Authors Name: Mohd. Manjur Alam, Md. Salah Uddin Chowdury and Niaz Uddin Mahmud
Authors Affilation: Lecturer Dept. of CSE BGC Trust University Bangladesh
Volume & Issue No.: Volume2Issue10
Abstract: Speaker identification is a biometric method. The objective of automatic speaker recognition is to extract, characterize and recognize the information about speaker identity. Speaker Recognition technology has recently been used in large number of commercial areas successfully such as in voice based biometrics; voice controlled appliances, security control for confidential information, remote access to computers and many more interesting areas. A speaker identification system has two phases which are the training phase and the testing phase. Feature extraction is the first step for each phase in speaker recognition. Many algorithms are suggested by the researchers for feature extraction. In this work, the Mel Frequency Cepstrum Coefficient (MFCC) feature has been used for designing a text dependent speaker identification system. While, in the identification phase, the existing reference templates are compared with the unknown voice input. In this thesis, a Bayesian network is used as the training/recognition algorithm which makes the final decision about the specification of the speaker by comparing unknown features to all models in the database and selecting the best matching model. i, e. the highest scored model. The speaker who obtains the highest score is selected as the target speaker.
S.No.: 60
Title : Implementation of 100BASE-T4 Network Repeater Using FPGA
Authors Name: Sudarshan M. Dighade, Pranav P. Kulkarni
Authors Affilation: Bhivrabai Sawant Collage of Engineering Research and technology,Narhe,Pune
Volume & Issue No.: Volume2Issue10
Abstract: Abstract— This paper presents the idea of 100BASE-T4 fast Ethernet repeater design targeting its FPGA implementation is proposed which supports 100Mb/s over low grade category 3 UTP. Although several speed up techniques exist, we present the architecture whose performance is improved based on detail analysis of vhdl programmable logic. A multiplexer based coding style is adapted to utilize the resources optimally. The total estimated power consumption for proposed design have 335mW after the post placement and routing on Xilinx xc3s400 device.. FPGA implementation has the advantage of altering the functionality of the platform to perform several tasks. The implementation results show the minimum power consumption which reduce drastically compared to that of reported design.
S.No.: 61
Title : Java Applets vs Java Servlets
Authors Name: Anjali Rajput, Dipti Bhardwaj, Sakshi Ahuja
Authors Affilation: Department of Computer Science Dronacharya College of Engineering
Volume & Issue No.: Volume2Issue10
Abstract: An applet is a Java program that can be included in an HTML page and executed by a Java Technology-enabled browser. It can be used in web-page enhancement and on enterprise intranets for sharing resource and data. Applets allow local validation of data entered by the user, can Using database to perform list of values lookups and data validation, and have Complex GUI widgets. Servlets are protocol- and platform-independent server side components, which runs as part of a network service and dynamically extend Java-enabled servers. With applets, servlets can provide interactivity/dynamic Web content generation. Servlets can accept form input and generate HTML Web pages dynamically like CGI, support Collaborativeapplicationsbysynchronizingrequest,partition a single logical service between several servers, act as active agents sharing data. Servlets support different protocol, can be part of middle tiers in enterprise networks. Servlet are more appropriated when involves loading large pieces of code over a slow communication channel; when a large part of the computation for generating the Web page can be done on the server side or when processing involvesoperationsthatappletscannotperformduetosecurityrestrictions. If a sophisticated user interface is desired, applets are appropriate. Applets and servlets can share data and communicate, so the processing can be split between them. Client-side Java is a glorious vision that does and will not change the way most people use the Internet anytime soon. Sun has taken some dramatic steps to insure that Java remains ubiquitous by creating a newset of APIs that allow developers to use Javaasaserver-side development tool.
S.No.: 62
Title : Design and Testing of Lightweight Sandwich T- Joint of Composite Material Using FEA And Experimental Techniques for static bending, tensile and compression test
Authors Name: Prof. S.T. Jagtap , Prof. S. M. Rajmane, Mr. K.V.Mahindrakar
Authors Affilation: NBN Sighgad College of Engineering, Solapur Bharat Ratna Indira Gandhi College of Engineering, Solapur Bharat Ratna Indira Gandhi College of Engineering, Solapur
Volume & Issue No.: Volume2Issue10
Abstract: Naval superstructure need to be designed with confidence on the basis of modeling and failure prediction. Fig shows a typical T-joint used in naval ships. It gives an illustration of a T-joint. It consists of a horizontal base panel, a vertical leg panel and fillet and over laminates. The purpose of the fillet is to provide the continuity of the load transfer between the base panel and the leg. The over laminate is used to enhance the capacity of the T-joint. Reduction of weight and increasing strength of the T-joint is one of the objectives. Now a days a large amount of research is going on with the objective to strengthen the technological basis for the large scale application of fiber reinforced composite materials for naval vessels and structures. Fiber reinforced composites are widely used in naval ships and aerospace, ground transport, civil infrastructure because of their high strength and stiffness, low mass, excellent durability and ability to be formed into complex shape. Performance testing of composite sandwich T-joints subjected to both static and dynamic loading commonly used in large panels for naval applications becomes very important. Adhesively bonded T-joints have been extensively used in assembling sandwich structures made from glass fiber reinforced plastic skins and a balsa wood core in naval vessels. The objective of this project is to analysis the behavior of composite T-joints used in marine applications due to variation of many parameters. The advantage of adhesive bonded joints over bolted or riveted joints is that the use of fastener holes in mechanical joints inherently results in micro and local damages to the composite laminate during their fabrication.
S.No.: 63
Authors Name: Faijul Islam
Volume & Issue No.: Volume2Issue10
Abstract: Study was based on data collected from 100 farmers from one district namely Gopalgonj of Bangladesh. Results of the study revealed that, per ha production cost of watermelon as maximum, minimum and mean were tk.150000, tk.117000 and tk.129500 respectively. The gross returns obtained as maximum, minimum and mean were tk.255000, tk.175000 and tk.202500 respectively. The net returns as maximum, minimum and mean were tk.114000, tk.47500 and tk.72500 respectively .The study shown that gross marketing margin of Aratdar, wholesaler, Petty trader, Retailer was tk.5000, tk.7000, tk.4500 and tk.11000 respectively per thousand watermelon .The net marketing margin of Aratdar, wholesaler, Petty trader, Retailer was tk.4000, tk.6300, tk.4100 and tk.10800 respectively per thousand watermelon. Marketing cost of the Aratdar, wholesaler, Petty trader, Retailer was tk.15.92, tk.11.47, tk.12.50 and tk.10.40 respectively per thousand watermelon. Most of farmer faced problems of lack of fertilizer, high price of pesticide and lack of subsidy. The objectives of the study were to estimate the cost of production, returns of banana and to identify the marketing channels of banana.
S.No.: 64
Title : An event Oriented Approach To Digital Forensics For Tracking Criminal
Authors Name: Onyemauche, U.C., Okonkwo, O.R., Nwosu, Q,N
Authors Affilation: Nnamdi Azikiwe University Awka, Anambra State, Nigeria and University of Nigeria Nssukka
Volume & Issue No.: Volume2Issue10
Abstract: In this paper, we present a framework for digital forensics that includes an investigation process model based on physical crime scene procedures. In this model, each digital device is considered a digital crime scene, which is included in the physical crime scene where it is located. The investigation includes the preservation of the system, the search for digital evidence, and the reconstruction of digital events. The focus of the investigation is on the reconstruction of events using evidence so that hypotheses can be developed and tested. This paper also includes definitions and descriptions of the basic and core concepts that the framework uses. Key words: Reconstruction, Computer Forensics, heuristics rule.
S.No.: 65
Title : Smart card: turning point of technology
Authors Name: Abhishek Mahajan, Akash Verma, Dhruv Pahuja
Authors Affilation: CSE Department, Dronacharya College of Engg.
Volume & Issue No.: Volume2Issue11
Abstract: A smart card, chip card, or integrated circuit card (icc) is any pocket-sized card with embedded integrated circuits.Smart Cards are secure portable storage devices used for several applications especially security related ones involving access to system’s database either online or offline. Smart cards are made of plastic, generally polyvinyl chloride, but sometimes polyethylene terephthalate based polyesters, acrylonitrile butadiene styrene orpolycarbonate. This research is chiefly to study the security principals of smart card and assess the security aspects’ affect on smart card technology adoption.
S.No.: 66
Title : Students and Educators Variability that determine Smart Phone Adoption for Self- Directed Learning in Universities in Kenya
Authors Affilation: KIBABII University College- Kenya
Volume & Issue No.: Volume2Issue11
Abstract: Smart phone devices are very popular among people primarily because they are wireless and portable. Their functionalities enable users to communicate while on the move. Educators and students need to employ the technologies for learning and particularly for self-directed learning. This paper seeks to describe mobile learning and how students and educators vary in the use of smart phones for self-directed learning.
S.No.: 67
Title : Features Extraction from NIRS data using Extreme Decomposition
Authors Name: Jiang Yan, Li Xin, Fu Jiangwei
Authors Affilation: College of Information Science and Engineering, Shenyang University of Technology
Volume & Issue No.: Volume2Issue11
Abstract: The main aim of BCI builds a communicating bridge between brain and peripheral devices. If we want to achieve the control of external devices with HbO and HbR, the change of these data must be analyzed, and be extracted. In this paper, we present a new method to achieve in the analysis of the data, and design a new compensated interpolation algorithm achieve completely new feature points to replace the original feature points to represent the data .The interpolated data curves response the change of original data, and realize the removal of high frequency to smooth the output curve.
S.No.: 68
Title : managing password authentication scheme for secure cloud storage
Authors Name: swathi u
Authors Affilation: Institute of Aeronautical Engineering,
Volume & Issue No.: Volume2Issue11
Abstract: Cloud computing is the future of the next generation architecture of IT solutions. Cloud provides computing resources on subscription basis over the internet. The Cloud data storage network includes a Third Party Auditor which has the power and capabilities that a client does not have. It is a trusted entity that has the access to, other than cloud and check on the exposed risk involved in cloud storage data on behalf of the client. In this paper, the problem of data security and integrity has been presented. Also, a scheme to provide maximum data integrity. In proposed scheme, existing fully homomorphic encryption is integrated with TPA auditing system is proposed. This scheme can audit data integrity without decrypting it. In cloud computing we can share our data and application at common place. This uses internet and share resources to provide services. Security is important issue because cloud having many benefits so, it have many users. This paper focuses towards security to cloud. It is based on distributed storage on 3 machines. It uses homomorphic token for checking integrity of data. This helps user low cost communication and computational cost. The auditing result ensures strong cloud storage correctness as well as simultaneously achieves fast data error localization, i.e., the identification of misbehaving server. It allows client to perform secure and efficient dynamic operations on outsourced data, including block modification, deletion, and append [1]. Data privacy is one of the biggest challenges in Cloud Computing. By the introduction of the OTP password protection schemes, the privacy of the user will now be assured to a great extent. The OTP provides a user new password each time.
S.No.: 69
Title : Research on Sorting Algorithm for Web Contents
Authors Name: Zhenfang ZHU, Peipei WANG , Guangyuan ZHANG
Authors Affilation: School of Information Science and Electric Engineering,ShandongJiaotong University, 250357,Jinan,China
Volume & Issue No.: Volume2Issue11
Abstract: Text classification is a basic issue in web information processing. The text sorting algorithm is the basic theory for designing and developing classifier in the text classification. In the field of the text sorting algorithm, the most typical sorting algorithms at present include decision tree calculation, Bayes calculation and KNN calculation, etc. This paper discusses the theoretical basis of the above mentioned typical classification algorithms and introduces the applications of those algorithms through analyzing the advantages and disadvantages of each algorithm. At last, the paper presents a kind of realization process for the webpage classifier on the basis of C4.5 algorithm.
S.No.: 70
Authors Name: Dr. Assem El-Ansary, CEO Ass.Prof. M.M.Elgazzar
Authors Affilation: 1- CEO Emergent Technologies USA, Inc. 2- Faculty of Computing & Information, Egypt
Volume & Issue No.: Volume2Issue11
Abstract: This paper illustrates the event-oriented Behavioral Pattern Analysis (BPA) modeling approach using the Train Traffic Management System. In BPA, events are considered the primary objects of the world model. Events are more effective alternatives to use cases in modeling and understanding the functional requirements. The Event defined in BPA is a real-life conceptual entity that is unrelated to any implementation. The BPA Behavioral Patterns are temporally ordered according to the sequence of the real world events. The major contributions of this research are:  The Behavioral Pattern Analysis (BPA) modeling methodology.  Validation of the hypothesis that the Behavioral Pattern Analysis (BPA) modeling methodology is a more effective alternative to Use Case Analysis (UCA) in modeling the functional requirements of Human-Machine Safety-Critical Real-time Systems.  The development of an interactive software tool (DECISION), which is based on a combination of the Analytic Hierarchy Process (AHP) and the ELECTRE Multi-Criteria Decision Making (MCDM) methods. The DECISION software tool was used to process the assessment results of the case studies.
S.No.: 71
Authors Name: Bhawana Sharma, Dr. Rajiv Mahajan
Authors Affilation: Department: Computer Science & Engineering College: Global Institute of Technology & Management
Volume & Issue No.: Volume2Issue11
Abstract: Wireless Sensor Networks (WSNs) have many sensor nodes having restricted battery, which transmit sensed data to the Base Station that requires high energy consumption. Numerous routing protocols have now been proposed in this regard getting energy efficiency in heterogeneous situations. Though, each protocol is inappropriate for heterogeneous WSNs. Efficiency of WSNs declines as varying the heterogeneity of sensor nodes. This paper has evaluated the performance of varied Distributed Energy- Efficient Clustering based protocols like DEEC, TEEN and EDCS under numerous scenarios; comprising various amount of heterogeneity. MATLAB tool is used for experimental purpose. The comparison has shown that the EDCS has very effective results over other DEEC and TEEN variants because special feature of T-absolute i.e. it treats all heterogeneous sensor nodes with same election probability when each node has lesser energy than T-absolute. The comparative analysis has shown that the EDCS outperforms over the available protocols.
S.No.: 72
Authors Affilation: CSE RIET,PHAGWARA
Volume & Issue No.: Volume2Issue11
Abstract: In the application based WSNs situation, energy and bandwidth of the sensors are valued resources and essential to consume proficiently. Data aggregation at the base station by individual nodes causes flooding of the data which consequences in maximum power utilization. To diminish this problem a BHCDA has been proposed which has improved the performance of the LEACH protocol by using the inter-cluster based data aggregation. In BHCDA grouping of nodes has been done on the basis of the available clustering techniques and grouping of cluster heads is also done to utilize the features to inter cluster data aggregation. But BHCDA has neglected the use of compressive sensing to enhance the data communication between cluster heads and sink. To enhance the BHCDA further a LZW-BHCDA protocol has been proposed in this work that helps to reduce the energy consumption problem and also aggregates and transmit the data in efficient manner. In addition, the additive and divisible data aggregation function has been used by the proposed technique at cluster heads to minimize the power consumption and also controls flooding at base station. The performance evaluation has shown the effective improvement of the LZW-BHCDA over the BHCDA.
S.No.: 73
Title : Fractal image compression in transform domain
Authors Name: A. selim*, M. M. Hadhoud$,, M. I. Dessouky# and F. E. Abd El-Samie#, *ERTU,Egy
Authors Affilation: Fac. of Electronic Eng., Menoufia Univ., 32952, Menouf
Volume & Issue No.: Volume2Issue11
Abstract: Abstract— In this paper we propose the affect of using the fractal image compression algorithms in transform domain. The image is transferred firstly to the transform domain. In this paper we used the Discrete Cosine Transform (DCT) and Wavelet Transform (DWT). After transformation takes place the fractal algorithms is applied. Comparisons between three fractal algorithms; conventional square, spiral, and a simplified fractal compression are proposed. The comparisons are repeated in the two cases of transformation. We found from our results that the decoded images in case of using the wavelet transform are the best. And the in case of using DCT the decoded images has bad qualities.
S.No.: 74
Volume & Issue No.: Volume2Issue11
Abstract: Heterogeneous Wireless sensor networks (HWSNs) are getting very popular in real time applications because of their synthetic intelligence. An sensor node could be quickly became the intelligent product by applying the embedding programming. HWSNs contain many sensor nodes having limited battery power, which transfer sensed data to the sink that really needs high power consumption. So consuming the energy in efficient manner become more crucial area of research in wireless sensor networks. Numerous energy efficient methods have been planned in this respect of getting power efficiency in heterogeneous sensor environment. However, each method has its own limitations. Performance of WSNs declines when the cluster size become high or too low. Although EDDEEC has shown very significant results over present WSNs methods but it has neglected the use of waiting time of sensor node to become CHs. So might some nodes will not become CHs for a long time even they have more potenitial to become CHs. So to overcome this we have applied a waiting time based parameter named as W_r (i). W_r (i) is then total number of waiting rounds for a given node to become cluster head. It will produce a an positive value which will continually increase the T (n) value for a given node to become CH thus increase the chances to become CH. So it will produce more optimized cluster heads. To improve the results further the use of distance between two cluster heads has also been considered. The experimental results has shown the significant improvement of the proposed technique further.
S.No.: 75
Title : Android Based Intelligent Mobile Home Automation Security System
Authors Name: Niraj R Chauhan, Prof. Pranjali P. Deshmukh
Authors Affilation: Dept. of Computer science & engineering Head Of Department P.R.PoteEngg& management College, Amravati
Volume & Issue No.: Volume2Issue11
Abstract: The security of one's belongings once someone leaves his/her home is continually a priority with increasing variety of incidents of larceny, theft etc. several machine-controlled systems has been developed that informs the owner in an exceedingly remote location concerning any intrusion or commit to intrude within the house. 8051 has been extensively utilized in past comes. However, we have a tendency to area unit appearance into the event of AN golem application that interprets the message a mobile device receives on attainable intrusion ANd after a reply (Short Message Service) SMS that triggers an alarm/buzzer within the remote house creating others conscious of the attainable intrusion. dominant home appliances remotely with mobile applications have started changing into quite common attributable to the exponential rise in use of mobile devices. Mobile handsets nowadays area unit primarily hand-held computers with integrated mobile radio communication capabilities. With increasing usage of GSM, network services area unit expanded on the far side spoken language to include several alternative custom applications, machine automation and machine to machine communication. This application will be incorporated with mobile phones is bound to profit each those who continually have a doubt of their belongings being secure within the house in their absence. Most of the mobile devices that area unit factory-made today within the market area unit golem OS based mostly. Taking this into interest the appliance will be developed in golem and created user friendly, thereby creating the applications extremely strong across totally different mobile devices and type of users.
S.No.: 76
Title : Designing a Simulator For Skin Colour Segmentation
Authors Name: Pankaj Mor, Surender Punia
Authors Affilation: M. Tech Scholar, CSE Deptt. Om Institute of Technology &Management, Guru Jambheshwar University, Hisar (Haryana), India
Volume & Issue No.: Volume2Issue11
Abstract: In this era of various technologies we used the concept of skin color segmentation. The main emphasis of this work is on understanding the skin color segmentation which supports to design YCbCr and CIELab algorithm for skin color segmentation which use in various applications such as face detection, human computer interaction, medical x-rays scan, agriculture etc. In present research work YCbCr and CIELab algorithms which has proven to be a useful and sturdy cue for face detection, localization and tracking, hand detection etc.
S.No.: 77
Title : Location Estimation of GSM user Using Enhanced Tringularisation Method with Implementation of RF Fingure Printing
Volume & Issue No.: Volume2Issue11
Abstract: Positioning a Mobile Subscriber in a Cellular Network System remain challenge for law enforcing agencies and cellular operators as many users do not use GPS. According to an estimate, a precise GSM based position system incurs a high cost (approx. U.S. $ 10,000) per base station. This paper suggests an idea to estimate location of cellular user by triangulation method along with use of RF figure prints. As each mobile device monitors signal strength, this helps in assisting the network to take timely handoff decisions. These signal strength information is transferred to network via NMR (Network Measurement Report). Tringularisation method uses NMR to locate a user under the coverage area of a BTS used in a cellular network. Collection of RF parameters such as received signal strength, speech quality, C/I, neighbour signal strength, handover pattern etc in wide area and preparation of data base for the estimation of location of user enhance the accuracy of method.
S.No.: 78
Title : The Performance Comparison of Edge Detection Techniques on MR Images
Authors Name: D. Ratna Bhusan, A. Ramaswamy Reddy
Authors Affilation: Asst.Professor, Professor of CSE, GEC,Guntur,
Volume & Issue No.: Volume2Issue11
Abstract: In this paper, we have presented various edge detection techniques on brain MR images. Generally, edges play very crucial role in processing of medical images, because MR images are complex and its nature is inhomogeneous. The detection of boundaries is very difficult. Here, the performance can be tested by using t-test among various edge detection techniques. Canny edge detection gives good results than Sobel, Roberts and prewitt operators.
S.No.: 79
Title : A Novel Histogram Technique for Detection of Tumor from MR images
Authors Name: G.Mahendra, T.Lakshmi Priya
Authors Affilation: Asst.Professor, Professor of CSE, GEC,Guntur,
Volume & Issue No.: Volume2Issue11
Abstract: In this paper, we have proposed a new technique for segmentation of tumor in brain MRI using Histogram thresholding. Generally, brain images are complex its nature is inhomogenous. Manual segmentation is a challenging task to find out exact location of the tumor from Brain MR Images. The proposed method can be fruitfully applied to notice the contour of the tumor and its geometrical dimension. This technique is very helpful to the experts at the time of surgery.
S.No.: 80
Title : Diabetes Disease Prediction Using Data Mining Techniques
Authors Name: Ravneet Jyot Singh, Williamjeet Singh
Authors Affilation: Research Scholar,Dept. Of Computer Engg. PunjabiUniversity,Patiala,India
Volume & Issue No.: Volume2Issue11
Abstract: The aim of this study is to investigate the performance of different techniques using WEKA and TANAGRA tool on Diabetes Dataset. A major problem in bioinformatics analysis or medical science is to attain the correct diagnosis of certain important information. For the ultimate diagnosis, generally many tests are done that involve clustering or classification of large scale data. All of these test procedures are said to be necessary in order to reach the ultimate diagnosis. However, on the other hand, too many tests could complicate the main diagnosis process and lead to the difficulty in obtaining the end results, particularly in the case where many tests are per- formed. This kind of difficulty could be resolved with the aid of machine learning which could be used directly to obtain the end result with the aid of several artificial intelligence techniques. Machine learning covers such a broad range of processes that it is difficult to define it precisely. The extraction of important information from a large pile of data and its correlations is often the advantage of using machine learning. New knowledge about tasks is constantly being discovered by humans. There is a constant stream of new events in the world and continuing redesign of Artificial Intelligent systems to conform to new knowledge is impractical but machine learning methods might be able to track much of it.
S.No.: 81
Title : The expected economic effects of the new Suez Canal project in Egypt
Authors Name: Dr. Ezzat Molouk Kenawy
Authors Affilation: Faculty of Commerce- Department of Economics- Kafr El-Sheikh University- Egypt
Volume & Issue No.: Volume2Issue11
Abstract: The current Suez Canal is considered as of the most important navigation lanes in the world as the world one tenth trade goes through it. However, its annual revenues do not exceed $ US 5 billion dollars. The Current Suez Canal is narrow and not deep. It depends on one direction navigation alternatively; which leads to a long waiting period. In spite of expansion and deepening attempts, most of giant ships cannot go through the canal and are forced to turn around the Cape of the Good Hope. The current Suez Canal is not optimally exploited despite of its economic importance as there are no adjunct ports services, logistic and industrial centers, ship maintenance and repair workshops, stores and transit trade, etc as existed in other states .The Suez Canal is facing as well important challenges due to the world competition and the attempt of some states particularly Israel to compete against the Suez Canal through several projects that threaten the Suez Canal. Thus, the Suez Canal cannot cope with such challenges except through its contribution to provide attractive privileges for the world trade transition such as efficient and least cost services that can be provided within the shortest time, competitive prices, adoption of world standard technical and management systems and flexible reaction with the technological and economic changes through creating logistic zones and economic fields around the canal to attract further investments in the fields of technology, trade and industry. Therefore, the new Suez Canal project and the project developing current Suez Canal and its surrounding area has posed since its effect on 5th August 2014 domestic, regional and international interest as being one of the national strategic projects that has several economic, development, political, social and regional dichotomies. The study aims to identify the development of the new Suez Canal concept. The study has adopted the descriptive analytical technique.
S.No.: 82
Title : Comparative analysis of PCA and LDA
Authors Name: K.Raju1, Dr.Y.Srinivasa Rao2, Dr.M.Narsing Yadav3
Authors Affilation: KKR & KSR Institute of Technology and Science, Guntur, AP
Volume & Issue No.: Volume2Issue11
Abstract: The problem of face recognition is a composite task that involves the detection and location of faces in a cluttered background, normalization, recognition and verification. Depending on the nature of the application like the sizes of the training and testing databases, clutter and visibility of the background, noise, occlusion and speed requirements, some of these tasks could be very challenging. There have been several methods proposed for face recognition. And one of the key components of any methods is facial feature extraction. There are two major approaches to facial feature extraction for recognition, holistic template matching based systems and geometrical local feature based systems. In this paper we present the methods of PCA and LDA which are based on the holistic approach. The paper first focuses the major aspects of the implementation of both PCA and LDA and finally compare the performance analysis of both the techniques on the standard Image data base of AT&T
S.No.: 83
Title : Prediction and analysis of injury severity in traffic system using data mining techniques
Authors Name: Dheeraj Khera, Williamjeet Singh
Authors Affilation: Punjabi University, Patiala
Volume & Issue No.: Volume2Issue11
Abstract: Road Traffic Accidents (RTAs) are a major public health concern, resulting in an estimated 1.2 million deaths and 50 million injuries worldwide each year. Road traffic is an indispensable important part to life, but the frequent road accidents bring serious bodily harm and loss of property. The aim of this study is to investigate the performance of different classification methods using WEKA and TANAGRA tool on Traffic Injury Severity Dataset. This paper presents results comparison of three supervised data mining algorithms using various performance criteria. The performance is evaluated by the algorithms Naive bayes, ID3 and Random tree. Comparison of Performance of data mining algorithm based on Error rate, Computing time, precision value and accuracy. The comparison of the model using WEKA experimenter showed that Naive Bayes outperforms Random tree and ID3 algorithms with an accuracy of 50.7%, 45.07 and 25.35% respectively and comparison of the model using TANAGRA experimenter showed that Random tree outperforms Naive Bayes and ID3 algorithms with an accuracy of 92.95%, 67.6% and 57.74% respectively. In the end, we have to conclude that TANAGRA tool is the best data mining tools as compare to the WEKA.
S.No.: 84
Title : Review of Image Enhancement in Spatial Domain
Authors Name: Vimal Bibhu, Bhanu P.Lohani, MeghaVaid, Anjana Swanny, Komal Verma
Authors Affilation: Amity University, Greater Noida
Volume & Issue No.: Volume2Issue11
Abstract: Digital Image Processing is a area where digital images are processed for enhancements of the image for various applications. Its main application is to improve the pictorial information for human interpretation. Almost all of the digital images contain noise. To improve a digital image, a number of enhancement techniques are available. Filtering is one of the common techniques used to remove unwanted information (noise) from the image. Image enhancement plays a vital role in every field particularly where images need to be closely examined and understood. Different images like satellite images, medical images, aerial images, microscopy images and even the real life photographs contain noise and a difference in lightness, brightness and/or hue between two colors that makes them more or less distinguishable. It is also used for image sharpening and smoothening. The problem is considered as a quality improvement. Digital images contain various types of noises which reduce the quality of images. Noises can be removed by various enhancement techniques. Digital images can be either spatial domain or frequency domain. This paper analyses various techniques used in spatial domain image processing.
S.No.: 85
Title : security attacks on different Wi-Fi protocols
Authors Name: Nachiket S. Ketkar
Authors Affilation: Sinhagad College of Engineering, Vadgaon
Volume & Issue No.: Volume2Issue12
Abstract: The security in Wi-Fi networks is a very important subject, because nowadays Wi-Fi networks are extensively used. Although there are numerous protocols suggested for Wi-Fi security, they fail to protect against various attacks due to lack of upgradation. So to secure the wi-fi that is deployed, first it has to be checked for the vulnerability of it to the various types of attacks that are popular and are subjected to happen at present. Also the owner of Wi-Fi need to know what type of security measures he is currently provided with and what type of security measures he needs to incorporate in his Wi-Fi settings to ensure that the deployed Wi-Fi is secure against various attacks that may happen in the current scenario. For this Attacks on Wi-Fi networks are important to be deeply studied. The necessity of audit tool is to test the Wi-Fi for vulnerabilities. If such vulnerabilities are found then we can make the settings such that Wi-Fi is more secure. Thus the tool is extremely useful for creation of secure Wi-Fi network. Such tools are available in market but they perform a single attack at a time and are required to be executed from terminal. Also they are manual tools so user have to give each and every command. Thus need of automated tool is there which is satisfied by this tool.
S.No.: 86
Title : Brain Tumor Detection using New Region Growing Method from MR Images
Authors Name: P. Raga Deepthi, V. Nagi Reddy
Authors Affilation: Asst. Professor, Asst.Professor, NIET, Guntur,
Volume & Issue No.: Volume2Issue12
Abstract: In this paper, we have proposed a novel region growing method for brain MR images. Initially, the seed point is calculated based on standard normal variate method. This method consisting of two steps, one is calculate ROI and locate the seed point at the centroid of region. And second one is region is growing from initial seed point up to meet the convergence of criteria. We have to obtain optimum results using MR images.
S.No.: 87
Title : Preemptive scheduling algorithm based object tracking system by using ARM processor
Authors Name: Sukumar.P, Sreenath.M,
Authors Affilation: 12Asst. Professors, Dept.Of E.C.E., A.I.T.S., Rajampet, Kadapa, A.P., India.
Volume & Issue No.: Volume2Issue12
Abstract: RTOS is an operating system that supports real-time applications and embedded systems by providing logically correct result within the deadline. In this, dealing with the effect of gain time on soft task scheduling in RTOS based application. In Multitasking gain time is a key factor which explicit the difference between the actual time and maximum time for completion of a process. In some real time applications, delay in a particular process may lead to severe effects. In this, delay in a task execution is avoided by using an effective preemptive scheduling and giving importance to high priority interrupts even though if there is any pending low priority interrupts on semaphore. As a prototype demonstration implementing the hardware using ARM Processor for an automobile application. An object tracking system will be fixed in the vehicle with vehicle-object distance measurement facility. If an object approaches the vehicle beyond the minimum distance limit, then preemptive scheduler will assign the object interference as a high priority interrupt. As an immediate response the speed of the vehicle will be changed by using a control method PWM. The Pulse width modulating technique will be initiated automatically by the Processor without any manual braking system and a heavy alert will be given to the person to bring concentration in driving.
S.No.: 88
Authors Name: R.Kayalvizhi M.Sc.,B.Ed.,M.Phil
Authors Affilation: VMKV UNIVERSITY , SALEM
Volume & Issue No.: Volume2Issue12
Abstract: In this Thesis we propose a peer-to-peer service discovery protocol specially designed for Mobile Ad-hoc NET work (MANET) environment. The proposed Mobile Service Discovery Protocol (MSDP) uses a dynamic clustering algorithm to group nodes in a MANET, and utilizes Distributed Hash Tables (DHTs) to efficiently cache service information in a peer-to-peer manner. Simulation results under different scenarios show that MSDP has steady performance and is able to reduce message overhead efficiently. Unlike a fixed wireless network, wireless ad-hoc or on-the-fly networks are characterized by the lack of infrastructure. Nodes in a mobile ad-hoc network are free to move and organize themselves in an arbitrary fashion. Each user is free to roam about while communicating with others. The path between each pair of the users may have multiple links, and the radio between them can be heterogeneous. This allows an association of various links to be a part of the same network. Mobile ad-hoc networks can operate in a stand-alone fashion or could possibly be connected to a larger network such as the Internet.
S.No.: 89
Title : Vibration Analysis of an Automotive Silencer for Reduced Incidence of Failure
Authors Name: Krishnal Bhangale
Authors Affilation: NRI institute of technology, Bhopal
Volume & Issue No.: Volume2Issue12
Abstract: The Engine exhaust is the major source for contributing noise in automobile. There are many challenges in designing the muffler system as size, engine back pressure, noise level, emission norms and also cost. Sufficient insertion loss at engine frequency and first few harmonics are important. Recent efficient muffler systems are designed considering linear plane wave theory using transfer matrix method. Development of fibrous material strands that is used in hot exhaust system without binders has led to use of combination of muffler and exhaust system. Particulate matter filters and air cleaners also modified acoustically. For all these to happen exhaust muffler designers need simple and fast modeling tool, especially at the initial stages. FEM and Boundary element methods are time consuming. This paper is about plane wave based models such as transfer matrix method that has advantage of building fast prototype for muffler design, find out transmission loss and compared with experimental setup.
S.No.: 90
Title : Real-Time Algorithms and Architectures for several user Channel Detection in Wireless Base Station Receivers
Authors Name: Mr.Nitish meena ,Dr. Nilesh parihar
Authors Affilation: pratap university,jaipur (Rajasthan)
Volume & Issue No.: Volume2Issue12
Abstract: Abstract—This paper presents algorithms and architecture designs that can meet real-time requirements of for several user channel estimation and detection in code-division multipleaccess- based wireless base-station receivers. entangled algorithms proposed to implement several user channel assessment and demodulation make their real-time execution difficult on current digital signal processor-based receivers. A maximum-likelihood based several user channel assessment scheme requiring matrix conversion is draft again from an demodulation perspective for a reduced intricacy, repetitive scheme with a simple fixed-point very large scale integration (VLSI) architecture. A reduced-intricacy, bit-streaming several user demodulation algorithm that avoids the need for multishot demodulation is also developed for a simple, pipelined VLSI architecture. Thus, we develop real-time solutions for several user channel assessment and demodulation for third-generation wireless systems by: 1) designing the algorithms from a fixed-point execution perspective, without significant loss in error rate performance; 2) task partitioning; and 3) designing bit-streaming fixed-point VLSI architectures that explore pipelining, correspondence, and bit-level computations to achieve real-time with minimum area overhead. Terms - Digital signal processor, several user channel estimation, several user detection, realtime exe. ,very large scale integration, wideband code-division multiple-access.
S.No.: 91
Volume & Issue No.: Volume2Issue12
Abstract: ABSTRACT: — In this new era, the recent technological invasions have propelled the development of the entire world to its new heights. These development have to be transformed the world into its new dimensions through technology aspect & impact. This is the main reason for the increase in the power demand. The rate of the world development in geometric ratio catalyses the need of extracting power from renewable energy resources and another reason is that the availability of conventional energy resources is only up to 60-70 year. This causes a higher demand to electric power management system. Therefore, it has a great theoretical significance to study the Advanced SEPIC converter with fuzzy logic controller based MPPT for standalone systems. The design has to be simulated and verified using Matlab R2010a KEYWORDS: MPPT (Maximum Power Point Tracking)
S.No.: 92
Title : A Comparative Study on AES, Blowfish, Twofish and Serpent Cryptography algorithms
Authors Name: Debasish Roy, Saptarshi Paul, Sanju Das
Authors Affilation: Department of Computer Science Department of Computer Science (Assam University, Silchar)
Volume & Issue No.: Volume2Issue12
Abstract: This paper provides a performance comparison between four of the most common symmetric key cryptography algorithms: AES(Rijndael), Blowfish, Twofish and Serpent. The comparison has been conducted by running four encryption algorithms to process different sizes of data blocks with any extension of files to evaluate the algorithms encryption/decryption speed. Simulation has been conducted using java language.
S.No.: 93
Title : survey on multifocus image fusion
Authors Name: Drashti patel
Authors Affilation: SVIT
Volume & Issue No.: Volume2Issue12
Abstract: In the field of digital camera system image capture are blurred and may exhibit insufficient resolution. Due to this multifocus image fusion is used to obtain clear image that contain all object in focus. This paper represent a literature review on some of Multifocus image fusion technique like average, select maximum, select minimum, PCA, pyramid base method etc. Comparisons of all the technique conclude the batter approach for its future research.
S.No.: 94
Authors Name: Mr. Sumit Agarwal, Dr. K S Thakur,Dr Garima Bhardwaj
Authors Affilation: Amity University, Greater Noida
Volume & Issue No.: Volume2Issue12
Abstract: ABSTRACT In today’s world Service industry is playing a very important role in the economy of many countries. In case of India more than 50% of Indian GDP comes from services. In today’s competitive environment, delivering efficient service quality is necessary for the success of any organization. Service Quality is very well connected with increased profitability, customer satisfaction and also working as a tool for providing competitive advantages. It can be also linked with repeat sales, word of mouth feedback of customers and overall maximization of company profit. Betterment of services always results in increase in market share, reduction of cost and also in increase in profit and ROI. The aim of the study was to find out the gap exist between the customer expectations and employee perceptions on importance dimensions of services on quality of service and customer satisfaction in Indian call centre.
S.No.: 95
Title : Web Search by Inferring User Interest based on Personalized search andImplicit Indicators
Authors Name: A.sangeetha and C.nalini
Authors Affilation: Bharat university
Volume & Issue No.: Volume2Issue12
Abstract: Abstract—In the context of the personalized information retrieval, this paper for inferring the user’s interests based on personalizes web search .T his paper aims to collect implicitly the relevant documents, during the user’s search session by inference of the degree of interest based on a combination of some relevant implicit indicators. The main advantage of our approach is that it does not require any log file. Indeed, calculates the degree of interest in real time and decides if the web page is quite relevant to feed the search history dimension
S.No.: 96
Title : A Cryptographic Approach Based on Genetic Algorithm and Multilevel Fingerprint Authentication
Authors Name: Ayan Mukherjee, Sebanti Sengupta
Authors Affilation: Sabita Debi Education Trust, Brainware Group of Institutions, Kolkata
Volume & Issue No.: Volume2Issue12
Abstract: A fingerprint in its narrow sense is an impression left by the friction ridges of a human finger. In a wider use of the term,fingerprints are the traces of an impression from the friction ridges of any part of a human or other primate hand. Fingerprint recognition or fingerprint authentication refers to the automated method of verifying a match between two human fingerprints. Fingerprints are one of many forms of biometrics used to identify individuals and verify their identity. This article touches on two major classes of algorithms (minutia and pattern) and four sensor designs (optical, ultrasonic, passive capacitance, and active capacitance). The main objective of our project is to protect a file or an important document using a 2 layer encryption approach i.e. by biometric fingerprint and a strong password given by the person to encrypt the file. Firstly authentication is done by the fingerprint and then key for the encryption is generated with the composition of the fingerprint image and a password given by the user.
S.No.: 97
Title : Binary Matrix Approach For Mining Frequent Sequential Pattern in Large Databases
Authors Name: sowjanya pathi,Amarendra Kothalanka,Vasudevarao Addala
Authors Affilation: Dadi Institute of Engineering Technology
Volume & Issue No.: Volume2Issue12
Abstract: Data mining is the computational process of discovering patterns in large datasets involving methods at the intersection of artificial intelligence, machine learning, statistics, and systems. Mining sequential patterns from inaccurate or uncertain data, such as those data arising from sensor readings and GPS trajectories, is important for discovering hidden knowledge in such applications. The overall goal of the data mining process is to extract information from a data set and transform it into an understandable structure for further use. Here this paper was proposed to find the frequent sequential patterns in a large uncertain database. For the finding of frequent pattern it is using binary matrix approach. The binary matrix approach is efficient and more flexible for finding the frequent pattern. By using this approach the time complexity was reduced for finding frequent patterns.
S.No.: 98
Title : Binary Matrix Approach For Mining Frequent Sequential Pattern in Large Databases
Authors Name: sowjanya pathi,Amarendra Kothalanka,Vasudevarao Addala
Authors Affilation: Dadi Institute of Engineering & Technology
Volume & Issue No.: Volume2Issue12
Abstract: Data mining is the computational process of discovering patterns in large datasets involving methods at the intersection of artificial intelligence, machine learning, statistics, and systems. Mining sequential patterns from inaccurate or uncertain data, such as those data arising from sensor readings and GPS trajectories, is important for discovering hidden knowledge in such applications. The overall goal of the data mining process is to extract information from a data set and transform it into an understandable structure for further use. In this paper we are proposed to find the frequent sequential patterns in a large uncertain database. For the finding of frequent pattern we are using binary matrix approach. The binary matrix approach is efficient and more flexible for finding the frequent pattern. By using this approach we can reduce the time complexity for finding frequent patterns.
S.No.: 99
Title : A Described Feasibility Analysis on Web Document Clustering
Authors Name: Ganesh Kr Yadav, Harpal Sing Kushwaha
Authors Affilation: SITM, Lucknow
Volume & Issue No.: Volume2Issue12
Abstract: Abstract: The paper articulates the unique requirements of Web document clustering and reports on the first evaluation of clustering methods in this domain. A key requirement is that the methods create their clusters based on the short snippets returned by Web search engines. Surprisingly, we find that clusters based on snippets are almost as good as clusters created using the full text of Web documents. To satisfy the stringent requirements of the Web domain, we introduce an incremental, linear time (in the document collection size) algorithm called Suffix Tree Clustering (STC), which creates clusters based on phrases shared between documents. We show that STC is faster than standard clustering methods in this domain, and argue that Web document clustering via STC is both feasible and potentially beneficial.
S.No.: 100
Authors Name: Harrison Mwinzi Kiema
Authors Affilation: Technical University of Mombasa
Volume & Issue No.: Volume2Issue12
Abstract: Abstract 1.0 Introduction The auditor’s services are needed in organizations to measure the relationship between the management and the user on the information provided by the management and the user perception on the same. Internal audit independence applies when the auditor is free from any conditions that deter his ability of the internal audit event or the chief audit executive (CAE) that could lead to carrying out internal audit responsibilities in an unbiased manner. The main objective of this study was to examine the influence of internal audit independence on the financial performance of Small and Medium Enterprises in the construction industry in Mombasa County. The first part of the objective was to determine the effect of records accessibility on the financial performance of SMEs in the Construction companies in Mombasa County. Majority agreed that they accessed the records but others denied having access to records. The second part was to determine the effect of the reporting structure on the financial performance of SMEs. Majority of the respondents were satisfied with the internal audit reporting structure in the construction companies. However, some were not satisfied. The third analysis was to determine the effect of the internal auditors qualification on the financial performance of SMEs. A bigger percentage of respondents depict that internal audit qualifications were considered in the organizations, but a magnificent percentage of respondents disagreed. The fourth analysis was to determine the effect of internal audit roles on the financial performance of SMEs . Majority of the respondents agreed that there was unlimited access to information they were supposed to audit before. However, the rest of the respondents agreed that access to records was unlimited. The study focused on the construction companies in Mombasa County. The study was carried out in 65 Class National Construction Authority ( NCA 8) Construction Companies that represented the units of analysis for the study. Systematic sampling was used in getting the sample size of the construction companies. Purposive sampling technique was used to get respondents from different construction companies and expected sample derived from internal auditors, audit committee members and audit assistants of the sample population. The survey involved collecting information by administering questionnaires to the sample. Data collected was descriptively analyzed .Data was then summarized using tables and finally was presented in form of pie charts, graphs, and bar charts. The summarized responses were used for further analysis and facilitated comparison to ascertain if the objectives would be achieved from conducting the study. Data was analyzed using Microsoft Excel. From the research, it was evident that some construction companies within Mombasa County did not accord the internal auditors the independence they deserved to effectively give their opinion on the financial statements of the organizations. SMEs should be given Public education by the Minister for commerce and industry on the importance of internal audit independence. The government should establish an internal audit unit, which should be independent to ensure that all SMEs in Kenya comply with the laid down audit procedures and rules . The research study sought to evaluate the influence of internal audit independence on the financial performance of small and medium enterprises in Mombasa county. The study explored the objectives provided in chapter one of the research. The sample under the study comprised 32 respondents. The study used primary and secondary data that was collected using questionnaires which were served to the respondents and the findings presented using tables
S.No.: 101
Title : Protecting End-to-End Location Privacy in Cloud Computing Environment
Authors Name: Khushwant Virdi, Anil Kumar
Authors Affilation: Computer Science Guru Nanak Dev University, Amritsar (Pb.)
Volume & Issue No.: Volume2Issue12
Abstract: Cloud computing is a technology that provides the processing huge amount of data which depend on sharing computing resources like networks, servers, storage, applications, and services. The end-to-end location privacy has been neglecting in the field of cloud computing. Location privacy deals with the hide the location of source and sink from the hackers by providing them fake locations so that hackers can utilize their maximum time to search the fake location instead of original location of source and destination. This paper has focus on various end-to-end location privacy techniques that can be applied in cloud computing. The review has shown that the location privacy is required for cloud computing environment especially for public clouds network.
S.No.: 102
Title : Moving body/ object detection and tracking
Authors Name: Rohini Khanderay, D.S. Patil
Authors Affilation: S.S.V.P.S.C.O.E,Dhule-424002
Volume & Issue No.: Volume2Issue12
Abstract: This paper describes a method of exactly tracking a moving body in video capture from camera. It also overcoe problem of blurring and noise. innitially moving body is exactly detected by its motion and then track it for exactly getting moving body. Method used is background subtraction and for object tracking we used colour feature specification for differantiate between objects. this method is effective for both indoor and outdoor videos.
S.No.: 103
Authors Name: R.Kumar, J.Jegan, L.Initha
Authors Affilation: 1, 3-Assistant Professor, 2-P.G.Scholar, SNS College of Engineering, Coimbatore
Volume & Issue No.: Volume2Issue12
Abstract: Composite material is a combination of two or more materials having compositional variations and depicting properties distinctively different from those of the individual materials of the composite. During the past decade, considerable research effort has been directed towards the development of in situ Metal Matrix Composites (MMCs), in which the reinforcements are formed in situ by exothermal reactions between elements or between elements and compounds. Using this approach, MMCs with a wide range of matrix materials (including aluminum, titanium, copper, nickel and iron), and second-phase particles (including borides, carbides, nitrides, oxides and their mixtures) have been produced. In the present work, the elemental TiC powders are mixed with aluminum molten metal to produce the Al-TiC MMC. The proposed investigation is to deal with development of aluminium based composite through casting route. Synthesis, characterization, hardness and tensile strength are proposed to be investigated. By its improved mechanical characteristics the new material is expected to replace existing composites applicable to light weight structural and automotive industries.
S.No.: 104
Title : Theoretical study of temperature effect on the wind power extracted as a renewable energy for electricity production in Nassiriyah district
Authors Name: Abdul-Kareem Mahdi Salih
Authors Affilation: Physics Department, College of Science, Thi-Qar University
Volume & Issue No.: Volume2Issue12
Abstract: The temperature effect on the wind power extracted as a renewable energy for electricity production in Nassiriyah district – south of Iraq- has been investigated for three years (2011-2013) by theoretical calculations. The study shows that the air temperature in this district affects extract power from the wind, this effect is dependent on the altitude and the value of temperature. The percentage of annual mean power loss decreases with the increasing of altitude. The annual mean power loss values vary between 6.1%Watt at 40 m altitude to 2.6% Watt at 300m altitude for the study time interval.
S.No.: 105
Title : Mechanical properties of Sisal and Pineapple fiber hybrid Composites reinforced with epoxy resin
Authors Name: vikas sahu
Authors Affilation: ggits, jabalpur (M.P), India
Volume & Issue No.: Volume3Issue1
Abstract: In this study, Work has been carried out to investigated tensile , bending and impact properties of hybrid composite of material constitutes sisal fiber and less discovered pineapple fiber. These composites are adhered using epoxy resin cosists HY951 resin and LY551 hardener suitably mixed in appropriate volume. Hybrid composites were prepared using sisal/pineapple fibers of 100/0, 70/30, 50/50, 30/70, and 0/100 Weight fraction ratios, while overall fiber weight fraction was fixed as 20gram. Here for preparing samples Hand lay up method is used , specimens are prepared , fibers are arrenged in unidirectional manner and tests are carried out , which shows tensile and bending strengths. The tensile & compressive test was applied on specimens of 300×50 & thickness varring from 4-6 mm in dimensions but in different proportions of sisal and pineapple by weight. The test result shows , the composite made by 50/50 fibers weight fraction of sisal & pineapple fiber has been shown best impact strenght 47.2 N/mm2 as compare to other constitutes of sisal & pine fibers. This constitute has good tensile & bending strength & the density is also less than sisal fibers. These composites can be used in various purposes because of its unique features of recycleability, waste utilization, environment friendly, bio-degradibility, good strength and a good alternative to plastics.
S.No.: 106
Title : Information Visualization For Big Data Analytics
Authors Name: Palani Murugan.S, Suresh.V.M, Murali.N, Manikandakumaran.K , Manikandan.S
Authors Affilation: Assistant Professor, Department of Information Technology, E.G.S Pillay Engineering College, Nagapattinam, India
Volume & Issue No.: Volume3Issue1
Abstract: Visualization is the way of representing facts in graphical form rather than traditionally keeping data as flat texts. This writing focuses on information visualization in specific in contrary to typically explaining its types. Information visualization is the study of visual representation of data, meaning information that has been abstracted in some schematic form, including attributes or variables for the units of information, Friendly 2008 describes.
S.No.: 107
Title : Inertia Force Analysis of Crank Shaft and Piston of the Compressor
Authors Name: D. Venugopal Dr P. Ravinder Reddy, Dr M Komuraiah
Authors Affilation: Chaitanya Bharathi Institute of Technology
Volume & Issue No.: Volume3Issue1
Abstract: In rotary compressors, vibrations are comparatively small in amplitude as they have few reciprocating elements, and hence have been considered suitable for lowering the noise in air conditioning equipment. It is likely that the popularity of rolling-piston compressors will continue to increase, and at the same tine strong demands for reducing vibration and noise which arise from the compressors will also rise. In this work, an analytical method to evaluate the inertia forces and torques is established. By theoretically analyzing dynamic behavior of the crankshaft, the rolling piston and the blade in Rolling-Piston Rotary Compressors, constraint forces and sliding speed at each pair of movable machine elements are obtained using MATLAB and MS-Excel sheet calculations. Moreover, it is revealed that one of major factors which cause compressor vibrations is speed variation of the crank shaft and compressor vibrations are not affected by rolling behavior of the piston
S.No.: 108
Title : Construction of Ideological and Political Education Models and Critical Thinking on Information Technology Applied into Political Teaching Practice
Authors Name: Hong Yan
Authors Affilation: Department of Ideological and Political Education, Liaoning Police Academy, Dalian, 116036, China
Volume & Issue No.: Volume3Issue1
Abstract: The Chinese ideological and political education is full of Chinese peculiarity. According to Marxism, the ideological and political education is one kind of social practice which considers education as its central task. Under the new concept of educational technology, ideological and political education should also reflect the characteristics of modern technology. The paper explores three technological models of this particular education including decision model, educational activity model, and educational resources and technology model. In the teaching process, teachers can apply different models in class or after class to meet the requirements of their teaching contents and objectives. Apart from three models, the paper also discusses advantages and disadvantages of information technology applied into political teaching practice. Suggestions on how to apply information technology properly and efficiently are offered in the last part of the paper.
S.No.: 109
Authors Name: Gagandeep Mishra, Dr Shaveta Rani, Dr Paramjeet Singh
Authors Affilation: Dept. of Computer Science& Engineering, GZS PTU CAMPUS, Punjab. India
Volume & Issue No.: Volume3Issue1
Abstract: This paper presents a survey on optimistic tower deployment techniques or Roadside Units (RSUs) in VANETs and what are their limitations. Vehicular ad hoc networks (VANETs) are becoming the hot issue in todays intelligent vehicular systems. VANETs consist of some vital components: RSU, OBU and Trusted Authority. Among them RSUs is one of the fundamental components of Vehicular ad hoc network (VANET). Roadside Units (RSUs) are placed across the road for infrastructure communication. But the deployment cost of RSUs is very high, so to deploy more and more number of RSUs across roads is quite expensive. Thus, there is a need to optimally place a limited number of RSUs in a given region or road in order to achieve maximum performance. This paper has presented various techniques proposed so far by different researchers to optimally place the RSUs.
S.No.: 110
Authors Name: Guramarjot Kaur, Prof. Jatinder Kumar
Authors Affilation: Dept. of Computer Science and engineering SIET, Amritsar, (Punjab) India.
Volume & Issue No.: Volume3Issue1
Abstract: Lane coloration is becoming popular in real time vehicular ad-hoc network. This research work focus on providing better performance in lane coloration algorithm by using CLAHE to enhance the input image and also by modifying the Hough transform using the dynamic thresholding to detect curve lanes. Main emphasis is to improve the result of lane coloration algorithm when fog, noise or any other factor is present in the images. The methods developed so far are working efficiently and giving good results in case when the straight lane road images are there. But problem is that they fail or not give efficient results when there are curved lane road images. The experiments results for the road images have shown the significant improvement of the proposed technique over the available one.
S.No.: 111
Authors Name: Navjot Kaur, Prof. Jatinder Kumar
Authors Affilation: Dept. of Computer Science and engineering SIET, Amritsar, (Punjab) India
Volume & Issue No.: Volume3Issue1
Abstract: This paper has proposed a new EPS and FELICM approach to improve the accuracy of the color segmentation procedure further. The motivation behind the proposed approach is simple and effective. If segmented area between the FELICM and Principle component analysis is same then it will be added into the final output image. If the segmented area is not same then according to the variance based theory the minimum variance among two segmented outputs will be selected. After this procedure color labeling will be done to color the segmented area in given image. The comparative analysis has shown the significant improvement of the proposed technique over the available one.
S.No.: 112
Authors Name: Raviprakash S. Shriwas and Sayali Purushottam Gulhane
Authors Affilation: Jawaharlal Darda Institute Of Engineering And Technology Yavatmal,India
Volume & Issue No.: Volume3Issue1
Abstract: Plasma antennas refer to a wide variety of antenna concepts that incorporate some use of an ionized medium. Plasma Antenna is a new captivating concept which could very well be the future of high-speed, high-frequency wireless communications. It is possible to transmit focused radio waves using Plasma antennas that would quickly dissipate using the conventional metal antennas. A plasma antenna is a type of radio antenna currently in development in which plasma is used, replacing the metal elements of a traditional antenna. Plasma antennas can be used for both transmission and reception. The advancement in plasma antenna is with the use of fluorescent tubes. The commercially fluorescent tubes consist of a glass tube filled with mixture mercury vapor and argon gas. The gas inside the fluorescent tube will ionize to plasma after getting sufficient voltage and formed plasma column. The plasma is highly conducting and it acts as a reflector. When all of the surrounding tubes are electrified, the radiation is trapped inside the antenna when the plasma frequency is greater than radio frequency. The developed antenna has potential in military application.
S.No.: 113
Title : Surface Finish Analysis of D2 Steel in WEDM using ANN & Regression Modelling along with Fractional Factorial Design of Experiments
Authors Name: A. U.K.Vates, B. N.K. Singh, C.Mr. B.N.Tripathi
Authors Affilation: AIMT, Greater Noida,
Volume & Issue No.: Volume3Issue1
Abstract: Wire electrical discharge machining (WEDM) is an important metal removal process in precision manufacturing of mould and dies, which comes under non traditional machining processes. It is also quite difficult to find the correct input parametric combinations to give lowest possible values of surface roughness of D2 steel under WEDM.. Non-conventional WEDM process under low temperature dielectric (DI water) is more robust and powerful approach than conventional machining process to obtaining better surface finish in low temperature treated tool steels. Low temperature dielectric cooling medium implementation generally used as secondary treatment to enhance the surface smoothness. Present work aimed to effect of WEDM parameters on surface finish of low temperature treated AISI D2 tool steel is investigated. Montgomery fractional factorial design of experiment, L16 orthogonal array was selected for conducting the experiments. The surface roughness and its corresponding material removal rate (MRR) were considered as responses for improving surface finish. The Analysis of variance (ANOVA) was done to find the optimum machining parametric combination for better surface finish. The experimental result shows that the model suggested by the Montgomery’s method is suitable for improving the surface finish. Regression (RA) analysis method and Artificial Neural Network (ANN) were used to formulate the mathematical models. Based on optimal parametric combination, experiments were conducted to confirm the effectiveness of the proposed ANN model. .
S.No.: 114
Title : Challenges Facing Smartphone Applications User Information Security, Privacy and Trust: A review of the literature
Authors Name: Titus Tossy, Sophia Mfaume
Volume & Issue No.: Volume3Issue1
Abstract: A mobile application (mobile app) is a software program which can be downloaded and accessed directly using thesmart phone or another mobile device with internet access.The importance of smartphones is increasingly increasing as it become the primary computing device to most of the people. The smartphones have turned to the context-aware information hub and the engine for information exchange. The information in our smartphones provide the applications such as Facebook, and third part with rich information and expose the user behaviors.The fact that the smartphones applications access peoples sensitive information cause uneasiness to people when using smartphones applications and brings about the issue of breach of privacy, security and trust. This paper expose the meta-analysis of the relevant literature that aims to present the challenges facing the smartphone application user information security, privacy and trust and the suggested ways on how to tackle the challenges.
S.No.: 115
Title : A Survey on Energy Balanced Clustering and Routing Protocol for Wireless Sensor Network
Authors Name: Pateel H S
Authors Affilation: BMSCE Bangalore Karnataka India pin-560018
Volume & Issue No.: Volume3Issue1
Abstract: Abstract—The Wireless Sensor Networks (WSN) consists of hundreds of sensor nodes which are resource constrained. WSN nodes monitor various physical and environmental conditions very cooperatively. WSN uses various nodes for the communication. WSN has become one of the interested areas in the field of research from last few years. To enhance the lifetime of the whole networks energy reduction is the necessary consideration for design and analyze of the clustering and routing protocols. In this paper we present a study of various protocols which are used to enhance energy efficiency of the WSN such as LEACH (Low Energy Adaptive Clustering hierarchy), HEED (Hybrid Energy-Efficient Distributed Clustering), and CEBCRA (Cost Based Energy Balanced Clustering and Routing Algorithm). Finally we conclude this paper with future research and challenges. Key words— Wireless Sensor Network; clustering; Network lifetime; Energy Efficient
S.No.: 116
Title : Impact of technology on creative writing skill(creativity): A conceptual perspective
Authors Name: Muhammad Naveed Anwar, Abrar Ahmed, Shahid Warsi
Authors Affilation: Association for Academic Quality (AFAQ)
Volume & Issue No.: Volume3Issue2
Abstract: The focal perspective of this research initiative is to look into the complex relationship between Information technology (IT) aids and information communication technology (ICT) aids with creative process of thinking. Most of the writers these days are using technological aids to enrich their writing pieces with more and more rational, logical and sentimental support which seems monotonous, lengthy and exaggerated. The prime purpose of technology is to soothe and east the process of thinking rather than being used to gather excessive data, of no use. Researcher has tried to explore the difficulties being faced by publishing houses in streamlining the thought process of content and subject writers who are influenced by technological interfaces. This study does provide swift guidelines by following which the content and subject writers can be benefitted by the use of technology in a desirable manner.
S.No.: 117
Authors Affilation: KARUNYA UNIVERSITY
Volume & Issue No.: Volume3Issue2
Abstract: Low-density parity check (LDPC) codes have been shown to have good error correcting performance. Good error correcting performance enables efficient and reliable communication. However, a LDPC code decoding algorithm needs to be executed efficiently to meet cost, time, power and bandwidth requirements of target applications. The constructed codes should also meet error rate performance requirements of those applications. LDPC codes can be designed over a wide space with parameters such as girth, rate and length. There is no unique method of constructing LDPC codes. Existing construction method is limited in some way in producing good error correcting performing and easily implementable codes for a given rate and length. It is done with BPSK modulation. In this paper QPSK modulation is used. There is need to develop methods of constructing codes over a wide range of rates and lengths with good performance. LDPC code is also as varied as LDPC matrix designs and constructions. In this paper, LDPC is implemented because of its flexibility and also code size is easily varied by increasing or decreasing sub-matrix size. The aim is to reduce the BER in comparison to the other existing constructions.
S.No.: 118
Title : Application based technical Approaches of data mining in Pharmaceuticals, and Research approaches in biomedical and Bioinformatics
Authors Name: Sayyada Sara Banu , Dr.Perumal Uma , Mohammed Waseem Ashfaque , Quadri S.S Ali Ahmed
Authors Affilation: College of computer science and information system,J azan university,Saudi Arabia
Volume & Issue No.: Volume3Issue2
Abstract: In the past study shows that flow of direction in the field of pharmaceutical was quit slow and simplest and by the time the process of transformation of information was so complex and the it was out of the reach to the technology, new modern technology could not reach to catch the pharmaceutical field. Then the later on technology becomes the compulsorily part of business and its contributed into business progress and developments. But now a days its get technology enabled and smoothly and easily pharma industries managing their billings and inventories and developing new products and services and now its easy to maintain and merging the drugs detail like its cost ,and usage with the patients records prescribe by the doctors in the hospitals .and data collection methods have improved data manipulation techniques are yet to keep pace with them data mining called and refer with the specific term as pattern analysis on large data sets used like clustering, segmentation and classification for helping better manipulation of the data and hence it helps to the pharma firms and industries this paper describes the vital role of data Mining in the pharma industry and thus data mining improves the quality of decision making services in pharmaceutical fields. This paper also describe a brief overviews of tool kits of Data mining and its various Applications in the field of Biomedical research in terms of relational approaches of data minings with the Emphasis on propositionalisation and relational subgroup discovery, and which is quit helpful to prove to be effective for data analysis in biomedical and its applications and in Bioinformatics as well
S.No.: 119
Authors Name: Emiola, Olawale. K. Steve, Alayemi, S. A , Adeoye Akeem Olanrewaju and Igbinehi, E.M
Authors Affilation: 1Department of Mathematics and Statistics, School of Applied Science,The Federal Polytechnic, Offa. Kwara State, Nigeria.
Volume & Issue No.: Volume3Issue2
Abstract: The banking sector of the Nigeria Economy has been viewed as the most profitable place to invest its share capital. Most investors in the nation have their major investment in these banks therefore this research, using Dividend Payout Ratio as a Determinant for Portfolio Selection of Bank Share was aimed to determine portfolio selection of Zenith Bank PLC, Guaranty Trust Bank PLC and First Bank Nigeria PLC. Data was obtained from the Annual Report, Vetiva Research and was formulated as linear programming . The research employs LINDO software to analyse the data. We create the lagrangean expression and we introduce lagrangean multiplier for each constraint. The increment that yields the minimum variance with mixed investment opportunity is 54%. Hence the optimum solution to the model is b1 = 70%, b2 = 5.39% and b3 = 24.61%. It was discovered that allocation of available fund by investors should be allocated to available investment open to investors in order to minimize risk and maximize return. We thereby recommended that any interested investor can decided to invest 70% of available fund on Zenith bank share, 5.39% on Guaranty Trust Bank share and 24.61% on First bank share.
S.No.: 120
Title : A Filtering Microstrip Patch Antenna for S-Band application
Authors Name: A. Vijayashanthi, T. Jayanandan, J. Roshini
Authors Affilation: is currently working as Professor, Department of Electronics and Communication Engineering, Prathyusha Institute of Technology and Management, Chennai, India.
Volume & Issue No.: Volume3Issue2
Abstract: Design and measurement of a new compact integrated filter with a microstrip rectangular patch antenna is proposed for S-Band application. Here the size of the three pole hair pin Band Pass Filter(BPF) is approximately reduced from 6.83 cm to 5.81 cm. The filtering antenna achieves an impedance bandwidth of 25.4 % (over 1.8 – 2.4 GHz) at a reflection coefficient |S11| < -20 dB and has a gain of 5.14 dB. The size of the designed antenna is nearly 47 x 35 mm on a TRF substrate with a resonance frequency of 2.0 GHz.
S.No.: 121
Title : Filipino- Maranao Bi-directional Language Translator With Text-to Speech Synthesizer
Authors Name: Jayson Q. Fallan, Mohammad Ammar T. Rasuman, April V. Sacil and Iluminada Vivien R. Domingo,
Authors Affilation: DBA (Polytechnic University of the Philippines)
Volume & Issue No.: Volume3Issue2
Abstract: Many people want to be understood by others and/or one to understand others many had involved themselves into development of machine translation—even Filipinos. According to researchers study many were being involved in producing todays generation translator but unfortunately, only a few has ever tried to translate domestic dialects into the national language which was understood by many—Filipino language. Because of this phenomenon, the researchers have decided to make a language translator using one of our Philippine dialects—Maranao language. The researchers chose Maranao because Muslims population here in the Philippines is continuously growing and most of them (almost 2/3) are using Maranao. The researchers also included a speech synthesizer which will allow the user to listen to the translated words read by itself.
S.No.: 122
Title : D-VEND: An Automated Vending Machine For Medicines
Authors Name: Raymond Calderon, Gabitan, Kristel, Garcia, Marie Shezel, Lopez, Noelle and Associate Professor Iluminada Vivien R. Domingo,
Authors Affilation: DBA (Polytechnic University of the Philippines)
Volume & Issue No.: Volume3Issue2
Abstract: The D-VEND is an automated vending machine for medicines. In the Philippines, the demand for OTC (Over-the-Counter) medicines is high. This leads to long piles of people buying medicines from drugstores and pharmacies, which in turn brings hassle to almost everyone. This pursues with the main purpose of sending OTC medicines closer to people’s homes.[1] This study focused on how the costumers will have convenience in buying OTC medicines by implementing the use of an automated medicine vending machine. Based upon the results of the implementation, the researchers concluded that for the students, the machine is positively dispensing the right medicine requested by the user.[2] Apart from this, it is also said to be capable of storing medicines safely with correct and updateable information. It is therefore considered reliable, because it ensures the reliability of the medicines that it sells. Accuracy wise, the machine is correctly recognizing the coins inputted. [3] The warning system installed in the device gave the users the assurance that the medicines stored in the machine can be safely stored. It is therefore suggesting that this machine can be very marketable in terms of customer and medicine security. As this research have proved that there is a significant difference between the assessments of the students and the pharmacists, a proposal for implementation to the general public would be very appropriate. Since this machine is just a prototype and is subjected for small population testing only, it would be very advisable if the future researchers would implement the machine in a larger population sample.[4]
S.No.: 123
Title : Context Comparison of Essay-Type Text Files
Authors Name: Jerome G. Domingo, Cara Dominique B. Francisco, and Assoc. Professor Iluminada Vivien R. Domingo,
Authors Affilation: DBA (Polytechnic University of the Philippines)
Volume & Issue No.: Volume3Issue2
Abstract: Measures of text similarity have been used for a long time in applications in natural language processing and related areas [1]. Text similarity has been also used for relevance feedback and text classification, word sense disambiguation, and more recently for extractive summarization and methods for automatic evaluation of machine translation [2] or text summarization [3]. This paper aimed to present a new concept over the existing ones, through which proponents can identify the percentage of semantic similarity between documents to other documents. The system is a combination of any two, three or all the techniques mentioned here - NLP (Natural Language Processing), Statistics, Artificial Intelligence (Machine Learning), Linguistics and Web Technologies, Text Categorization, annotated large corpora etc[4]. The system will compare up to 35 documents. It has the similarity calculations [5].The researcher used the Prototyping Model as a software engineering paradigm in developing the system. Prototyping is an easily modified extensible model (representation, simulation, or demonstration) of a planned software system, likely including its interface and input/output functionality [6].
S.No.: 124
Title : A Proposed Automated Car Parking Based On Android
Authors Name: Pallavi Mane,Samiksha Nagmote,Shubhangi Musle,Shraddha Sarwade
Authors Affilation: Pimpri Chinchwad College Of Enginnering,Nigdi,Pune
Volume & Issue No.: Volume3Issue2
Abstract: The number of personal vehicles usage is increasing manifold. People prefer personal vehicles to commute than depend on public transportation. Finding a parking space in most metropolitan areas, especially during the rush hours, is difficult for drivers. It is often frustrating for drivers to find parking spaces, and parking itself is costly in almost every major city in the world. Due to this there is a need to provide sufficient parking places coupled with plenty of slots to help the user park his vehicle safely. It also ensures that the user does not end up parking on non-parking area and cause discomfort to pedestrian.The aim of this paper is to propose a design of an Automated Car Parking System commanded by an Android application that regulates the number of cars to be parked on designated parking area. This is done by automating the Parking and unparking of the car with the help of an Android Application.
S.No.: 125
Title : A Review And Recent Developments in Solar Water Distillation
Authors Name: Shailja Bahuguna, pooja verma, priya choudhary, shivani chauhan, amit sharma
Authors Affilation: College Of Engineering Roorkee, Roorkee
Volume & Issue No.: Volume3Issue2
Abstract: Solar energy is one of the cheapest and easily available source of energy and we can use it in many ways. One of its application is water purification. The basic idea of solar water distillation came from Aristotle in 4th century BC. There are many types of solar stills designed for this purpose. Solar still is a device which is used to purify water, it operates on the same process as water cycle i.e., evaporation and condensation. Many researchers in this field give mathematical relations, accomplish different research and show positive results. An extensive review on different types of solar stills has been carried out in this paper. This review will also help us in gathering further practical approach in this field. Key words: Solar energy, distillation, solar still
S.No.: 126
Authors Name: Amit Kumar, Er. Janpreet Singh
Authors Affilation: Computer Science and Engineering Department Lovely Professional University, Phagwara
Volume & Issue No.: Volume3Issue3
Abstract: The quick growth in network multimedia equipments have allowed additional real-time digital services such as video-conferencing, online games and distance education to grow the conventional internet tasks. Though many protocols has been proposed so far to improve the energy efficiency further but still much enhancement can be done. In order to overcome the constraints of the earlier work a new improved technique is proposed in this paper. The proposed technique has the ability to overcome the limitations of the GSTEB routing protocol by using clustering. From the comparison, it has been shown that proposed technique performs better in comparison to GSTEB protocol.
S.No.: 127
Authors Name: Satya Prakash, Pankaj Singh
Authors Affilation: Bhabha Institute of Science and Technology, Kanpur Dehat
Volume & Issue No.: Volume3Issue3
Abstract: Two types of radio propagation modals are developed on the basis of material layer structures. One is three layer propagation model consist of three different material layer. Second one is five layer propagation models which is the extension of three layer propagation models. It consist of five different material layer with their respective thickness is considered. By using these two models the reflection and transmission coefficients are obtained. Material characteristics of concrete and Ferro concrete are also obtained at different operating frequency ranges from 433 MHz to 2 GHz. These models help us to find the detection range for layered material base structures.
S.No.: 128
Authors Name: D GANESH
Volume & Issue No.: Volume3Issue3
Abstract: There is an increase of technology in every field. So many applications rely on the existence of small devices that can exchange information and form communication networks. Short messages are widely in use these days. So many applications rely on the existence of small devices for communication. Here the confidentiality and the integrity play a major role. So we propose two techniques. In the first technique we authenticate the message and encrypt it with a short random string. In the second technique the extra assumptions are made whether the algorithm used is a block cipher and also improve them. MACs provide integrity for messages. Without taking it as an advantage the message must be checked whether it is encrypted or not. The main goal is to utilize the security that the algorithm can provide to design more efficient authentication mechanism.
S.No.: 129
Authors Name: Dr. Vijay Kumar Banga, Astha Mahajan
Authors Affilation: Dept. of Electronics and Communication Engineering Amritsar College of Engineering and Technology, Amritsar
Volume & Issue No.: Volume3Issue3
Abstract: The main objective of vision fusion is to merging information from multiple images of the same view in order to deliver only the valuable information. The discrete cosine transforms (DCT) based methods of vision fusion are more appropriate and time-saving in real-time systems using DCT based standards of motionless images. In this paper, a well-ordered technique for fusion of multi-focus images based on variance calculated in DCT domain is shown. The overall objective of this paper is to compare different image fusion techniques. The comparison has shown that the Alternating Current (AC) coefficients calculated in DCT domain has quite better results. This paper ends up with the suitable future directions to extend this work.
S.No.: 130
Authors Name: Gurpreet kaur, Vijay kumar Banga
Authors Affilation: Dept. of Electronics and Communication Engineering Amritsar College of Engineering and Technology Amritsar, Punjab, India.
Volume & Issue No.: Volume3Issue3
Abstract: Edge detection is the name for a set of mathematical methods which target at classifying points in a image at which the image intensity varies sharply or, has discontinuities. This paper has focused on detecting the edges for the Hue factor in Human visual system (HSV). Hue is usually represented by position significance, so the existing edge detection techniques has been incapable to correctly perceive edges of hue factor in HSV color plane. As a consequence, the most popular approaches of color edge detection typically neglected the role of hue factor, thus misplaced some edges triggered by hue variations. This research work has proposed a new color edge detection technique based on the mixture of hue factor and principal component analysis to resolve the problems with existing methods. The algorithm has been designed and implemented in MATLAB. The performance metrics has shown the efficiency of the proposed algorithm over the existing ones.
S.No.: 131
Title : A Review on Removal of Rain Streaks in an Image by using Image Decomposition
Authors Name: Sneha Wandale,Prof.P.A.Tijare and Prof.S.N.Sawalkar
Authors Affilation: 1M.E. Computer Science and Engineering(Second Year),Computer Science and Engineering Department, Sipna Collage of Engineering, Amravati
Volume & Issue No.: Volume3Issue3
Abstract: Weather conditions i.e. rain, snow, fog, mist and haze degrade the quality also performance of outdoor vision system. Rain is one of the type of weather condition as well as rain is the major component for the dynamic bad weather. Rain introduces sharp intensity variations in images, which degrade the quality or performance of outdoor vision systems. These intensity variations depend on various factors, such as the brightness of the scene, the properties of rain, and the camera parameters. Rain removal has many applications in the field of security surveillance, vision based navigation, video or movie editing and video indexing or retrieval. So, it is important to remove rain streaks from the images. The detection and removal of rain streaks in an image is done by image decomposition which depends on Morphological Component Analysis (MCA) by performing dictionary learning and sparse coding. Rain streaks removal is fall into the category of image noise reduction. After Removal of rain streaks we can easily identify feature in the image.
S.No.: 132
Title : implementation of Sobel and prewitt edge detectors using Xilinx system Generator
Authors Name: shravankumar
Authors Affilation: Lendi Institute of Engineering and Technology
Volume & Issue No.: Volume3Issue3
Abstract: Implementing hardware design in Field Programmable Gate Arrays (FPGAs) is a formidable task. There is more than one way to implement the digital filter. Based on the design specification, careful choice of implementation method and tools can save a lot of time and work. Most of the algorithms are computationally intensive, so it is desirable to implement them in high performance reconfigurable systems. Recently, Field Programmable Gate Array (FPGA) technology has become a viable target for the implementation of algorithms for image processing. Here Xilinx system generator tool is used to implement these image processing algorithms. Edge detection is the process of localizing pixel intensity transitions. The edge detection have been used by object recognition, target tracking, segmentation, and etc. Therefore, the edge detection is one of the most important parts of image processing. Keywords- Xilinx System Generator, FPGA, Edge Detection, Image processing
S.No.: 133
Title : Algorithmic assessment approach based on the similarity measure
Authors Name: Aiouni rym
Authors Affilation: badji mokhtar university annaba
Volume & Issue No.: Volume3Issue3
Abstract: Evaluation in a TEL (Technology Enhanced Learning), in general, and in a algorithmic TEL in particular, is a complex problem. To find a solution, this work presents an algorithmic evaluation process based on breaking down problems and based on structural matching.
S.No.: 134
Title : Virtual Therapist for Wrist and Fingers.
Authors Name: Kajal Agarwal,Madhuri Andhale,Vaibhav Aware, Dipti Chikmurge
Authors Affilation: Dept of Computer Engineering , MIT AOE,Alandi
Volume & Issue No.: Volume3Issue3
Abstract: According to Wikipedia, It is estimated that approximately 6 million people have been surviving with some kind of paralysis, As a consequence wide range of physical reformation treatments or therapies are essential for the paralyzed patients. And also it’s not possible to make doctor’s and therapist available to assist these patients at their home. Sometime physician knowledge, skills and experience is inadequate to yield better results. To acquire solutions to this problem new therapy techniques and devices like Continuous Passive Machines were introduced in some countries for the different parts of the body but that machines are too much expensive and possibly available in our country[3]. The purpose of this project, WAFCPM , is to make this device affordable to common people which defines standard physical therapy treatment methodology that specify better user interface with CPM (Continuous Passive Motion ) could reduces overall old treatment delay and possibly yield better outcomes for patients[13]. The CPM (Continuous Passive Motion) device which is already exist has some issues like hard to operate by the patients themselves, costly , lack of user friendliness etc.WAFCPM solves these problems by means of better user friendliness with the aid of LCD(Liquid Crystal Display) touch screen display user can provide the inputs like control speed, angle of rotation etc. The CPM device contains key components : (1) Touch Screen LCD (2) Rechargeable batteries (3) Atmega Microcontroller (4) motor etc. This CPM device provides movements to the patient’s finger joints with the help of indirect motion given by motor
S.No.: 135
Title : Providing Authentication by Merging Minutiae Template
Authors Name: Ms. Priya Raul, Ms. Sayali Surve, Ms. Sushma Gilbile, Ms. Jasmine Hebbalkar, Prof J.L. Chaudhari
Authors Affilation: Assistant Professor, Department of Computer Science , JSPM’s BSIOTR , University of Pune, Maharashtra , India
Volume & Issue No.: Volume3Issue3
Abstract: Now days use of biometric technologies gains popularity as concern about the privacy and misuse of biometric data increases. Because of this, protecting biometric data becomes an important issue. The oldest and widely used form of biometric identification is the fingerprints. It has been widely used in both forensic and civilian applications. In existing system it is easily possible to revoke the original image from the minutia points. To overcome this drawback we propose a system in which we take two different fingerprints at the enrollment phase and same fingerprints at authentication phase. We extract the minutiae positions and reference Point of first fingerprint and the orientation and reference Point of second fingerprint. Then we merge these two fingerprints to produce a new mixed minutiae template. Incase if hacker hacks this mixed Template image then also He will not able access the data because he will not able to identify that it is combination of two fingerprints, and from which fingerprint we have extracted minutiae points and from which we have extracted orientation. This approach will provide more security to application or data.
S.No.: 136
Authors Name: Nikhil S. Pande, Rajat S. Nakhale, Durgesh S. Acharya
Volume & Issue No.: Volume3Issue3
Abstract: - A rice huller machine device is used in agricultural field to remove the outer shell of the rice grain. A rice huller or rice husker is an agriculture machine the process of removing the chaff and the outer husk of rice grain. The rice huller uses two rotating rollers which are driven oppositely by an A.C. motor. When the husk is fed through the rotating roller, due to pressure the husk cover breaks and with the help of fan the husk is separated from the rice grains. It can be used either any medium scale farmer or by huge rice mills. The rice milling machine has been used by the farmers all over the world and is also practiced by the paddy farmers. The rice milling machine is an economical mechanism to turn a paddy into rice. Thus, the purpose of this study is to improve, design, fabricate and test the performance of a proposed rice milling machine against the existing rice milling machine. An active rice milling machine was designed, fabricate and tested to mill the paddy.one fan with 12V were installed to the proposed machine as the sorting system. Three major tests were performed. The first test evaluated the importance and effectiveness of the paddy to be dried before mille and it was discovered that by drying the paddy before milling can increase the successful rate of milled rice up to 46%. The second test shows the relationship of the gap distance between the rollers to the paddy milling efficiency, for these proposed rice milling machine, the desired rollers distance for Hill Paddy is 1 to 3 millimeter gap between the rotating rollers. In the third stage the fan is used to separate the rice grains from the chaff. Keywords: A.C. Motor, rollers, sorting system, fan, huller
S.No.: 137
Title : Intellectual Capital: A Hidden Wealth
Authors Name: Dr. Mohammad Anam Akhtar, Dr. Ravindra Tripathi
Authors Affilation: United Group of Instituions and Motilal Nehru National Institute of Technology
Volume & Issue No.: Volume3Issue4
Abstract: Capital, in the business context, refers to any asset that will produce future cash flows. The most well known asset types are tangible in nature. Tangible capital therefore refers to the physical and financial assets of the organization. The value of such assets is disclosed periodically (by publicly listed companies) and can be found easily on the balance sheet of the Company’s financial records. Physical assets can mean land, machinery, inventory, plants, trucks, etc. whereas financial assets refer to the shareowners equity, retained earnings, working capital, prepaid expenses, accounts receivables, etc. Intangible assets on the other hand, such as the skills of the workforce and its organization, are increasingly becoming important towards determining future profits. However, they are much harder to determine, harder still to quantify into a value and therefore are never reported. Hence these types of assets remain largely invisible to the external world – and more often than not to insiders as well. Thomas Stewart, a pioneer in the study of such intangible assets, is credited with having coined the term ‘Intellectual Capital’ to refer to these assets. After more than a decade of studies by various other scholars in this area, there is general agreement that Intellectual Capital itself is composed of three distinct types of capital - Human Capital, Structural Capital and Relational Capital. • Human Capital is the availability of skills, talent and know-how of employees that is required to perform the everyday tasks that are required by the firm’s strategy. • Structural Capital is the availability of information systems, knowledge applications, databases, processes and other infrastructure required to support the firm in executing its strategy. • Relational Capital is the external linkage of the Company with Suppliers and Customers that enables it to procure and sell goods and services in an effortless manner. In the modern world of cut throat competition firms are paying a lot of attention on Intellectual Capital because it is a very important aspect that contributes a lot in development of the core competencies of the firm and a very important source of generating future cash flows. . This article therefore tries to give the importance of Intellectual Capital for the organizations in the modern era, emphasizes on the measurement and recording of it in the balance sheet of the organization in order to make the stakeholders aware about the contributions of the Intellectual Capital in the organizational growth and development, use of technology for the purpose of valuation and recording of Intellectual Capital and also tries to evaluate the attitude of Indian enterprises towards Intellectual Capital.
S.No.: 138
Title : Voice Based Student And College Information System
Authors Name: Kalpit S.Patel; Oshin Bakshi; Pooja Boriwal; Neha Lad
Volume & Issue No.: Volume3Issue4
Abstract: In this project, we will develop IVRS based information system. It uses IVRS algorithm for giving various information about particular student and institute. Here we emphasize on IVRS algorithm for getting information of particular institute and student. The user can call up the institute and obtain any information by simply pressing certain buttons on its phone as per the guidance of voice fed into the chip. When user call he/she will get the option of either student or institute information that is it works like a call center. According to user demand they will be asked to press the button and will get the response from the IVR system.
S.No.: 139
Authors Name: Miss. Harsh deep , Miss. Varsha
Authors Affilation: Computer Science. CT institute of Management & Engineering Technology, Jalandhar
Volume & Issue No.: Volume3Issue4
Abstract: The quick growth in network multimedia equipments have allow additional real-time digital services such as video-conferencing, online games and distance education to grow to be the conventional internet tasks. WSNs has become major area of research in computational theory due to its wide range of applications. But due to limited battery power the energy consumption has become major limitations of WSNs protocols. Though many protocols has been proposed so far to improve the energy efficiency further but still much enhancement can be done. This paper has presented various data aggregation techniques for WSNs. This paper has shown that the among others GSTEB has shown quite significant results. The overall objective of this paper is to evaluate the limitations of the earlier techniques of data aggregation. This paper ends up with the suitable future directions to extend GSTEB protocol further.
S.No.: 140
Authors Name: 1Mr. Balasaheb Gadade, 2Prof. Dr. R.G.Todkar.
Authors Affilation: HOn. Shree Annasaheb Dange College of Engineering and Technology, Ashta.
Volume & Issue No.: Volume3Issue4
Abstract: In this project work mainly focused on the finite element based stress analysis of A – Type lower suspension arm. The main objective of this study is to calculate working life of the component under static loading. The A – Type lower suspension arm was developed by using CAD software. Actual model was manufacture as per Design by using AISI 1040 material. The finite element modeling and analysis was performed by using HYPERMESH software. Mesh was created with 10 node tetrahedral element. A simple design approach was used to calculate effect of stresses on A – Type lower suspension arm element under static loading condition. After manual calculations a modern computational approach based on FEA for integrated durability assessment in an automotive lower suspension arm component is presented. The experimental work includes validation of the FEA results with actual testing of the model under stress. This is carried out with computerized universal testing machine (UTM) of 25 ton capacity. After trails it is seen that theoretical results agrees with the actual test experiments. Form calculations the maximum value of static load acting on the wheel of the automobile is 5000N. FEA analysis or software calculations gives maximum stress at contact point with wheel hub is about 280 MPa, and actual experimental tests gives maximum stress value of 254 MPa. This shows the fitness of the model designed under actual working conditions.
S.No.: 141
Volume & Issue No.: Volume3Issue4
Abstract: Power and bandwidth of the receptors are appreciated assets and necessary to consume proficiently in the approval based WSNs condition. Flooding is caused by details collecting or amassing by individual nodes which cause highest possible energy utilization. Therefore, to overcome this issue a new details collecting or amassing strategy can be suggested to increase the performance of the heterogeneous WSNs using the team based details collecting or amassing. In this document, the current research on the clustering and details collecting or amassing based methods has been explored. Moreover document discusses various restrictions in the earlier methods in the tabular type.
S.No.: 142
Authors Name: Afsar Syed
Authors Affilation:
Volume & Issue No.: Volume3Issue4
Abstract: The Six Sigma methodology for quality improvement is a system of many concepts, tools, and principles. This paper discusses the basic concepts of the Six Sigma Process Improve- ment Methodology, presents various computer applications to demonstrate the value of information systems and information technology (IS/IT) in this methodology, and finally, presents an actual case where some of these applications were used to help a major corporation save over $2 million. It is hoped that the focus on IS/IT shows how powerful Six Sigma can be when aided by the latest computer hardware and software technology. The strategic use of IS/IT within the Six Sigma methodology will go a long way in making things easy for professionals to incorporate the principles as part of their everyday work routine.
S.No.: 143
Title : Fabrication and Experimental Analysis of tube in tube Helical Coil Heat Exchanger
Authors Name: Mr.Akshay Patil, Mr.Gajanan Kadam, Mr.Suraj kadam, Mr.Nilesh Thombare
Authors Affilation: Adarsh Institute of Technology and Research Center ,Vita.
Volume & Issue No.: Volume3Issue4
Abstract: In the present days Heat exchangers are the important engineering systems with wide variety of applications including power plants, nuclear reactors, refrigeration and air conditioning systems, heat recovery systems, chemical processing and food industries. Helical coil configuration is very effective for heat exchangers and chemical reactors because they can accommodate a large heat transfer area in a small space, with high heat transfer coefficients. This paper focus on an increase in the effectiveness of a heat exchanger and analysis of various parameters that affect the effectiveness of a heat exchanger and also deals with the performance analysis of heat exchanger by varying various parameters like, flow rate and temperature. The results of the helical tube heat exchanger are compared with the straight tube heat exchanger in both parallel and counter flow by varying parameters like temperature, flow rate.
S.No.: 144
Authors Name: Sonal Anand, Anju Saha
Authors Affilation: Assistant professor, IINTM, GGSIPU Assistant Professor, USICT, GGSIPU New Delhi, India
Volume & Issue No.: Volume3Issue4
Abstract: This paper proposes a new web application design which is proved to be less complex and more testable than the design of existing web applications. OOD (Object Oriented Design) metrics including NOC (Number of Children) and CBC (Coupling between Classes) have been used to demonstrate that the proposed web application design is more testable.
S.No.: 145
Title : Semantic Cloud for Mobile Architecture and Possibilities
Authors Name: Sonal Anand, Sarvesh Gupta
Authors Affilation: Assistant professor, IINTM, GGSIPU Assistant Professor, USICT, GGSIPU New Delhi, India
Volume & Issue No.: Volume3Issue4
Abstract: The paper emphasizes on the way the two most promising web technologies, semantic web and cloud computing, can blend to form SCM (Semantic Cloud for Mobile), for revolutionizing data access and processing capabilities over mobile platform. In this paper we also suggest the architecture of SCM and exclusive possibilities it may offer.
S.No.: 146
Title : Development of an Intelligent Eye for Automatic Surveillance Based on Sound Recognition
Authors Name: Md.Rokunuzzaman, Lutfun Nahar Nipa, Tamanna Tasnim Moon, Shafiul Alam
Authors Affilation: Rajshahi University of Engineering & Technology (RUET)
Volume & Issue No.: Volume3Issue4
Abstract: In surveillance or homeland security most of the systems aiming to automatically detect abnormal situations are only based on visual clues while, in some situations, it may be easier to detect a given event using the audio information. A new platform for sustainable development of automatic surveillance is introduced based on intelligent eye system which gathers information of human behavior, activities and environmental changes. The present research deals with audio events detection in noisy environments for surveillance application. The increasing availability of forensic audio surveillance recordings covering days or weeks of time makes human audition impractical and error prone. The ability of a normal human listener to recognize objects in the environment from only the sounds they produce is extraordinarily robust even in adverse acoustic conditions. In this research, we have developed a surveillance system which can recognize sound sources and detect events. This system can cover large area which is cost efficient. Sound sources can be recognized by comparing the frequency of sounds. This proposed intelligent eye system can recognize different sound sources accurately in real time and pretty much quick.
S.No.: 147
Title : A family of quasi-Newton methods for unconstrained optimization problems
Authors Name: M. S. Salim and A. I. Ahmed
Authors Affilation: Department of Mathematics, Faculty of Science, Al-Azhar University, Assiut, Egypt
Volume & Issue No.: Volume3Issue4
Abstract: Abstract In this paper, we present a class of approximating matrices as a function of a scalar parameter that includes the DFP and BFGS methods as special cases. A powerful iterative descent method for finding a local minimum of a function of several variables is described. The new method preserves the positive definiteness of the approximating matrices. For a region in which the function depends quadratically on the variables, no more than n iterations are required, where n is the number of variables. A set of computational results verifies the superiority of the new method.
S.No.: 148
Title : Comparative analysis for plant power output of solar thermal power plant
Authors Name: abhishek rai and suhail ahmad siddiqui
Authors Affilation: Al-Falah School of Engineering and Technology,Faridabad, Haryana 121004, India
Volume & Issue No.: Volume3Issue4
Abstract: A grid-connected solar thermal power plant, with a gross capacity of 1 MWe, has been designed and is being commissioned at Gurgaon near New Delhi in India. The unique feature of this plant is the integration of two different solar fields (parabolic trough collectors and linear Fresnel reflectors) without a fossil fuel backup. The hot oil from parabolic trough collectors and saturated steam from linear Fresnel reflectors are integrated to produce superheated steam at, to run a turbine-generator to produce electricity. This abstract outlines the plant power output under the climatic conditions of New Delhi and for the same input parameters under the climatic conditions of Jodhpur. The results can be used to compare the plant power output for the given solar thermal power plant at different locations across India. Keywords: Linear Fresnel reflector; Parabolic trough collector; Solar thermal power.
S.No.: 149
Title : Automated Identification of Diabetic Retinopathy Stages in Digital Fundus Image using CDR and Micro aneurysms
Authors Name: Dhanya C L
Authors Affilation: REVA Institute of Technology and Management, Bangalore
Volume & Issue No.: Volume3Issue4
Abstract: Diabetic retinopathy (DR) and glaucoma are the commonest complications of diabetes and is one of the leading causes of blindness. Early detection of occurrence of DR can greatly help in effective treatments. Very effective treatments are available and are optimally used when retinopathy is detected early. For this reason screening programs for early detection of retinopathy is essential part. The retinal fundus photographs are the main resources for screening of DR. In this work we tried to locate the eye optic disc and optic cup using k-means algorithm, morphological operation and watershed transform. Segmented optic disc and cup are then used to compute the cup to disc ratio for DR screening, for grading the disease we use microaneurysms. Micro aneurysms are the clinical sign of DR they appear small red dots on retinal fundus images, their detection can be used to grade the DR in different stages.
S.No.: 150
Title : Baseline JPEG Image Compression with K-Means Clustering Based Algorithm
Authors Name: Karri Tata Rao
Authors Affilation: AITAM
Volume & Issue No.: Volume3Issue4
Abstract: Applications of Digital Image Communication have increased drastically in our day to day activities. Baseline Joint Photographic Experts Group (JPEG) is the common image compression method for reducing bandwidth. Baseline JPEG Compression system comprises of a DCT unit followed by a normalizer and encoder. At the receiving end, image is reconstructed by inverse DCT. In this paper, we develop a JPEG Compression algorithm that joins K-Means clustering technique and DCT to further reduce the bandwidth requirements. Experiments are carried out with many standard images. Our algorithm proved to be giving approximately same Peak Signal-to-Noise Ratio (PSNR) as that of Base line conventional JPEG algorithm.
S.No.: 151
Title : Cut Detection and Re-routing in Wireless Sensor networks
Authors Name: Mrs.DipaliSonawane, Prof. AlkaKhade, Prof. SeemaBiday
Authors Affilation: Dept. Computer Engineering, Terna Engineering College Nerul, Navi-Mumbai-400706, MS, India
Volume & Issue No.: Volume3Issue4
Abstract: A wireless sensor network can get separated into multiple connected components due to the failure of some of its nodes, which is called a “cut.” In this paper, we consider the problem of detecting cuts by the remaining nodes of a wireless sensor network. Wireless Sensor Network (WSN) is made up of few or large number of sensor nodes and one sink node. One of the crucial challenges in WSN is cut generation instead of increase the life sensor node. Sensor node is small device made up of three basic units as sensor unit, processing unit and wireless communication (transceiver) unit equipped with limited power supply through batteries. Since the node has limited energy supply, these nodes are put in sleep mode to conserve energy which helps to prolong network life..Wepropose an algorithm that allows 1) every node to detect when the connectivity to a specially designated node has been lost, and 2) oneor more nodes (that are connected to the special node after the cut) to detect the occurrence of the cut. The algorithm is distributed andasynchronous: every node needs to communicate with only those nodes that are within its communication range. The algorithm is basedon the iterative computation of a fictitious “electrical potential” of the nodes. The convergence rate of the underlying iterative scheme isindependent of the size and structure of the network. We demonstrate the effectiveness of the proposed algorithm through simulationsand a real hardware implementation.
S.No.: 152
Title : Implementation of data watcher for identifying data leakage and detecting guilty agent
Authors Name: Navnath Kondalkar, Priya Walunj,Satish Mahamre,Priya Tadge
Authors Affilation: MMIT,Lohgaon, Pune
Volume & Issue No.: Volume3Issue4
Abstract: Data Leakage, put simply, is the unauthorized transmission of private or sensitive data or information from within an organization to a third party, i.e., an unauthorized recipient. In Organizations, detecting data leaker is facing many difficulties to and who cause for the data leakage. In previous approaches there are many techniques to find the leaker using fake objects and how much data leaked. In this paper we represent s-random algorithm, probability function, fake record generation and an algorithm for data distribution. We also implemented a data watcher to detect the guilty agents and calculating the probability.
S.No.: 153
Title : Review on –Different types of Vedic Multipliers Using Reversible Logic
Authors Name: ILLA BHARTI
Volume & Issue No.: Volume3Issue4
Abstract: Energy dissipation is an important consideration in VLSI design. Reversible logic is first related to energy when Landauer states that information loss due to function irreversibility leads to energy dissipation. Thus reversibility will become an essential property in future circuit design. Reversible circuits are of high interest in DSPs, low power CMOS design, nanotechnolo optical computing and quantum computing etc. The main aim of this paper is to improve the speed and power dissipation of the processor by using efficient Vedic multiplier. Vedic multiplier known as "Urdhva Tiryakbhayam" which means vertical and crosswise. This multiplier will be implemented using reversible logic Feynman Gate, Peres Gate and HNG gate. Feynman and Peres gates are used to implement the basic two bit multiplier and HNG gate is used as full adder for summation of the partial product generated by two bit multiplier in four and eight bit multiplier. The proposed system will be designed using VHDL and implemented through Xilinx ISE 13.2 Navigator.
S.No.: 154
Authors Name: Anubha Lakra, Dr. R.B. Dubey
Authors Affilation: Hindu College of Engineering
Volume & Issue No.: Volume3Issue4
Abstract: Image processing is the most important achievements and commonly used engineering techniques in all the areas of science, including medical science that now a days severely has eclipsed diagnosis and treatment of many diseases Since MRI compared to other diagnostic modalities is safe and noninvasive and on the other hand reflects the true dimensions of the organ, its use in imaging of brain is widely considered. This paper presents a latest review of different technologies used in medical image segmentation like genetic algorithm & fuzzy control etc.
S.No.: 155
Volume & Issue No.: Volume3Issue4
Abstract: The cluster of vehicle density on the roads is significantly growing, making the management of traffic motion, especially in the metropolitan cities more and more complex, critical and challenging. One of the key method is to adopt for having smooth traffic flows and better mobility is to rely on ‘Real-time’ traffic monitoring systems.Traffic flow is predicted using RF camera by capturing images frequently, then translating to suitable compatibility and later encoded and stored in advanced ARM processors. The information which we obtained will be stored in Cloud using GPRS thus making every cloud browser to access to database server. Suitable packages for accessing to Global data base server will be dumped into algorithm kit. Knowing the information about near-by future one can smartly plan their journey and also can predict the traffic link with smallest traffic density and enables smooth mobility of vehicles using the concept of IOT.
S.No.: 156
Title : Efficient Design and Performance Analysis of a DCT Processor using CORDIC Algorithm for Image Compression
Authors Name: Veenadevi S V, Siddappa P Odeyar
Authors Affilation: R.V.College of.Engineering, Bangalore, India
Volume & Issue No.: Volume3Issue4
Abstract: Discrete Cosine Transform is one of the broadly used transform technique for multimedia applications. In the DCT algorithm all the inputs are in time domain where as the outputs are in frequency domain and DCT technique is extensively used for image compression. DCT architecture using CORDIC algorithm requires less number of calculations and it increases the accuracy. In DCT all the calculations are not uniformly essential in producing the frequency domain DCT output. Therefore the computation energy can be considerably reduced without severely compromising the quality of the image. More power savings may be achieved by means of 2-D DCT. In a lookahead CORDIC approach, the implementation complexity is considerably high because lookahead approach requires more area and all interior data path become individualistic. The proposed recursive CORDIC architecture requires less power and area as compared to lookahead CORDIC. The design is implemented using Xilinx 14.2/Modelsim PE10.4a and MATLAB software. In this project, the aim is to construct 2-D DCT architecture, coding in Verilog and to implement the module in Xilinx-virtex5 FPGA.
S.No.: 157
Title : The Design of TMA Gain Adjustment Based on AISG2.0
Authors Name: Manjunath HA, Chethana G, Suma MS
Authors Affilation: RVCE Bangalore
Volume & Issue No.: Volume3Issue4
Abstract: This paper relates to the mobile communication, more interrelated to the gain adjustment method of Tower Mounted Amplifier (TMA), Implementation of TMA application (TMAAPP) based on the standard technical specification of 3GPP and AISG2.0 protocol, The method of communication between base station (BST) and Tower Mounted Device (TMD), software realization, gain message handling is discussed and steps followed in the implementation of parallel procedure handling in parallel to a Time -Consuming Procedure is represented. Discussed work of physical, datalink, and application layer from multi-layer architecture and object-oriented design method of AISG2.0 communication, the TMA application has added advantages to support Antenna line devices (ALD).
S.No.: 158
Title : Energy Efficient Transformer for Optimized Electric Power System
Authors Name: Mohit Tikekar
Authors Affilation: Jabalpur Engineering College
Volume & Issue No.: Volume3Issue5
Abstract: The electric power system is load with a low power factor and high power factor for the same amount of useful power transferred. The energy lost in the distribution system, and requires larger wires and other equipment. The energy efficiency of low voltage and distribution transformers is influenced primarily by the imposition of energy efficiency regulations and by the operational conditions imposed on the transformers. In my thesis work we will examine the energy efficiency regulations that govern the measurement and specification of energy efficiency for low voltage, distribution transformers and evaluates whether the requirement used to certify the transformer efficiency is optimized for minimizing power loss. And also attempts to characterize operational load levels experienced by the transformers, including seasonal and periodical load variations, and the operational load levels to the efficiency standard and alternate methods. We will demonstrate the importance of considering transformers and distribution networks as part of a system when evaluating the implementation of other energy efficiency improvements.
S.No.: 159
Authors Name: Chetna Rizwani, Siddhant Wadhwani, jharna dodeja and hiral parekh
Authors Affilation: Vivekanand Education Society Institute of Technology
Volume & Issue No.: Volume3Issue5
Abstract: This paper is about an improved design of human computer interface using wireless and accelerometer technology, for comfortable interaction with computer and will be of great use to physically challenged people. A Wireless Gesture Controlled Human Computer Interface enables us to use a computer by intuitive head and eye motions in the air. While using this we can move the cursor by forming a gesture and click by blinking the eye. These functions are implemented by using 3-axis accelerometer and our device wirelessly communicates with the PC and we use a ps/2 to USB interface. Unlike normal mouse we don’t require a flat surface, anyone can use this and can use it from anywhere by not just being fixed to a particular place.
S.No.: 160
Title : Modelling, Simulation and Control of Utility Grid Integrated Solar Photovoltaic System Using Matlab
Volume & Issue No.: Volume3Issue5
Abstract: In this paper we are modelling a solar based non-conventional energy generation system using MATLAB software. A 500-KW grid connected PV system in a radial 2-bus test system is modeled and simulated using Matlab/Simulink software to study the effects of this technology on the system under different levels of solar irradiation. PV module with a central three level inverter is developed in the thesis, which is more suitable for medium power applications. However, the output of solar arrays varies due to change of solar irradiation and weather conditions. Therefore, the maximum power point tracking algorithm is implemented in DC/DC converter (Boost converter) to enable PV arrays to operate at maximum power point. The widely used MPPT technique, incremental conductance algorithm is employed to control the boost converter. Then the central three level inverter is controlled by decoupled current (Id, Iq) control algorithm and interfaced with the utility grid via the distribution network. Besides, the current control of the inverter is independent of maximum power point control of the DC/DC converter. Finally, system performance and transient responses are analyzed. And system stability is evaluated when solar irradiation change or system fault happens. The system is simulated in MATLAB.
S.No.: 161
Title : Biodiesel Production in a Process Intensified Pilot Plant
Authors Name: Haruna Ibrahim*a, Abdulkarim S. Ahmed*, Idris M. Bugaje*a and Ibrahim A. Mohammed-Dabo*
Authors Affilation: Ahmadu Bello University, Zaria-Nigeria
Volume & Issue No.: Volume3Issue5
Abstract: Since fossil fuels sources are finite and the use of these fuels increase the emission of greenhouse gas, CO2 in our environment hence, development of alternative fuels, biofuels have become important. Biodiesel produced from plant and animal origins is the environmental friendly replacement for fossil diesel. A study of process intensification on biodiesel production was carried with Jatropha curcas seed oil, methanol and five solid base catalysts in a process intensified pilot plant. Samples of biodiesel were produced with 3 moles of methanol to 1 mole of oil after esterification of the oil, methyl ester yield of 97.4, 96.94, 95.76, 99.99 and 98.25% catalyzed by bulk CaO, super base calcium oxide (CaO/(NH4)2CO3), bulk MgO, CaO/MgO and 10% impregnated CaO/MgO respectively. The samples were analyzed in accordance with ASTM standard for biodiesel and were found satisfactory for use in compression ignition engines. It was found that this process produced biodiesel devoid of glycerol, the co-product.
S.No.: 162
Title : A Novel Mechanism For Handover Management in PCS Networks
Authors Name: Alyaa Abdou Hamza 1, Ahmed.I.Saleh 2, Mohamed sherif elkasas3
Authors Affilation: Mansoura University, Faculty of Engineering, Department of Computer Engineering And Systems
Volume & Issue No.: Volume3Issue5
Abstract: with the development technology of mobile communication, it is important improvement of the quality of service (QOS) in PCS networks by treating problems which appear in users’ movements. Handover (handoff) is one of process which affects the quality of the call during users mobility from cell to another. In this paper, we propose a new mechanism to reduce handover problem by predicting the future movement of mobile users . This mechanism is composed of two systems to cover all probabilities, first Fuzzy Prediction Engine (FPE) is used when a mobile user has a history, it depend on 6 factors (GPS, Distance, Famous Places, Time, Date, User Profile) to predict future user mobility. Second is Ant Prediction Engine (APE) is used when a user has insufficient history or a new mobile user. It depends on neighbors’ history to predict future user mobility.
S.No.: 163
Title : Study of Maximum Power Point Tracking in PV systems
Authors Name: Basavaraj Totad, Ashok Muvva, Gaurav Nayak, Shiddalingesh Akki, Kiran.R.Patil
Authors Affilation: Asst. Professor Dept.of Electrical and Electronics, BVBCET Hubli, India
Volume & Issue No.: Volume3Issue5
Abstract: Power generation from solar PV has long been seen as a clean sustainable energy technology which draws upon the planet’s most plentiful and widely distributed renewable energy source – the sun. The photovoltaic (PV) system for converting solar energy into electricity is in general costly and is a vital way of electricity generation only if it can produce the maximum possible output for all weather conditions. This paper presents an improved maximum power point tracking (MPPT) algorithm of a PV system under real climatic conditions. The method is based on use of a Incremental conductance of the PV to determine an optimum operating current for the maximum output power.
S.No.: 164
Title : Comfort conditioning in Accordance with Physiology of Human Body
Authors Name: Shiv Kumar Sharma1, Abhishek Jain2, Nitesh Singh Rajput3
Authors Affilation: Amity University Rajasthan, Jaipur1,2,3
Volume & Issue No.: Volume3Issue5
Abstract: Thermal comfort of human body is governed by the laws of thermodynamics. Physiology of human body is affected by the conditions of air, temperature and humidity. Metabolism and catabolism are to major physiological process associated with human body. Human body behaves as a open thermodynamics system. Thermal comfort can be defined as the condition of mental satisfaction with the surrounding thermal environment. This definition can not be expressed in terms of mathematical and physical parameters but easy to understand. It means thermal comfort is a multivariable function like relative humidity, Pressure, Temperature, Density of air etc. From this research we have concluded that existing empirical model present significant co-relation of building design and environmental engineering. Despite that comfort model of Fanger based on thermal regulation and heat balance theories of human body presents actual analysis that helps to understand the relation with the thermal variables responsible for thermal comfort and thermal sensation of Human body. Thus, our analysis represents an improvement in human thermal modeling and gives even more information about the environmental impact. In this research, main focus is to study the impact of comfort conditioning on the physiology of human body in the city like Jaipur. Key words – Comfort, Physiology, Thermal Variable, Air
S.No.: 165
Title : Power Consumption Analysis
Authors Name: Vivek Sadhwani, Dinesh Rohra, Manoj Valesha, Gresha Bhatia
Authors Affilation: 1B.E. Computer Engg. VES Institute of Technology, Mumbai -400074, Maharashtra, India
Volume & Issue No.: Volume3Issue5
Abstract: Even though India being the worlds third largest electricity producer and consumer after the United States and China, the nation still suffers from frequent power outages that last as long as 10 hours. Further, about 25% of the population, about 300 million people, have no electricity at all. Efforts are underway to reduce transmission and distribution losses and increase production further. The term blackout is used to describe a widespread cutoff or loss of supply of electrical power, especially as a result of a shortage, a mechanical failure, or overuse by consumers. It is well known that blackouts happen only rarely and they are usually caused by a sequence of low probability outages.
S.No.: 166
Title : Virtual Power Control and Sinusoidal Current ‎Operation for Grid-Connected Inverter under ‎Unbalanced Grid Voltages Conditions
Authors Name: Mahmoud M. Salem and Yousry Atia
Authors Affilation: Electronics Research Institute, National Research Center Building, El-Tahrir St., Dokki, 12311-Giza, Egypt
Volume & Issue No.: Volume3Issue5
Abstract: Power oscillation and current quality are the important performance targets for the grid-connected inverter under unbalanced and ‎distorted grid voltages. In this work, the inherent reason for the current harmonic and power oscillations of the inverter are ‎discussed. Then away from the positive and negative sequences analysis, novel strategy to determine the harmonic components of ‎the grid currents during constant power control and to obtain relations for the power oscillations during sinusoidal current control ‎are introduced. Based on the introduced analysis, a power control strategy is suggested. The proposed power control strategy uses a ‎virtual power as a controlled variable. The virtual power depends on virtual grid voltages which can be extracted from actual grid ‎voltages by using second order generalized integrator. By controlling the virtual power, sinusoidal grid currents with minimum ‎THD is obtained under unbalanced and distorted grid voltages. For constant power operations, the actual power is used as a ‎controlled variable. Based on an adaptive parameter, flexible control technique is used to switch between sinusoidal current control ‎and constant power control operations. Simulation studies are carried out to confirm the effectiveness of the proposed controller to ‎obtain constant power/sinusoidal current control operation under unbalanced and distorted grid voltages and to confirm the ‎correctness of the introduced equations to calculate the grid current harmonic components and the power oscillations under ‎unbalanced grid voltages.‎
S.No.: 167
Title : Review on Modelling of Cleaning Machines
Authors Name: Abhinay Lade,Prof Manoday Ramteke,Monali Nikam, Prajakta Kadam
Authors Affilation: Smt. Kashibai Navle College Of Engineering,Pune.
Volume & Issue No.: Volume3Issue5
Abstract: Abstract- In this work; we have focused on the conceptual designs and models of cleaning machines. The CAD models and block diagram provides a better understanding for design and analysis of machines. Also it gives a primary outlook towards the design of machine. Here we have described shoe sole cleaning machine and cleaning robot. The shoe sole cleaner with shoe polishing machine is designed, considering all the parameters with respect to customer need in terms portability and also economically available to them. While, the system working of a cleaning robot is proposed for further design of robot.
S.No.: 168
Authors Name: Rahul Vaswani, Rohit Vaswani, Rahul Tharwani, Gresha Bhatia
Authors Affilation: VESIT
Volume & Issue No.: Volume3Issue5
Abstract: As the world is evolving continuously, so there is strong need for automating the retailer’s management process. One such category includes automating the management process of medical shop retailers. We describe the design of system that eliminates human resource and tools like barcode scanner, computer system, barcode printer is used. System supports inventory management, invoice generation, annual accounting, track of sales, placing order capabilities, shortlisting expired products etc. Automating the system is must for expanding the business, eliminate human errors and to maintain the leadership status in market. This also saves time of both retailer and customer that is retailer can manage all the things in a faster and easier way and serves the customer appropriately. So our proposed system helps the Medical shop owner/pharmacist to manage his/her work in an efficient way and eliminates the Errors and Misinterpretations.
S.No.: 169
Title : performance analysis of optical link using EDFA
Authors Name: Bhumika A.Patel
Authors Affilation: shankersinh vaghela bapu institute of technology
Volume & Issue No.: Volume3Issue5
Abstract: Analysis of DWDM system using EDFA in C band. Optimum results of gain, output power, BER and Q-factor are obtained proper choosing of input power, pump power, EDF length and concentration of erbium ions. Transmit 320Gb/s data rate for 70km of fiber length. Pumping methods are discussed at 1440nm and 980nm. Results were obtained using optisystemv13 software.
S.No.: 170
Title : Dashboard Creation Tool
Authors Name: Tinckle Trivedi, Heena Nagrani, Sneha Mulrajani
Authors Affilation: VESIT
Volume & Issue No.: Volume3Issue5
Abstract: With the increase of visualization platforms targeting novices, researchers are now focusing on gathering insights regarding novice user practices. We describe the design of Dashboard Creation Tool (DCT), a system that allows users to easily build and customize information dashboards. DCT provides an intuitive environment for dynamically creating, rearranging, searching and exploring multiple visual data representations from diverse data-sources. These aspects aid users to better retrieve, experiment and familiarize themselves with their data.
S.No.: 171
Authors Name: Shivani Sharma
Authors Affilation:
Volume & Issue No.: Volume3Issue5
Abstract: The fast development in network multimedia tools have let extra real-time digital companies such as for instance as an example video-conferencing, online games and distance knowledge to cultivate to be the standard internet tasks. These companies often necessitate the fundamental process to provide multicast facility. The multicast describes the distribution of structures from merely a unitary node to level of destinations. These real-time companies have a stringent necessity of QoS factors like bandwidth, delay, jitter etc. to make sure clear, regular, and fair sign to the receivers. This paper has presented recent protocols which are used in multimedia networks to provide better services. This paper ends up with the suitable future directions to extend this work.
S.No.: 172
Title : Handwritten Form Processing
Authors Name: Bandhan V, Neetish Bhat, Karthik Borkar, Dr. Mamtha HR
Authors Affilation: ISE department, PESIT, Bangalore
Volume & Issue No.: Volume3Issue5
Abstract: Analysis of document images for information extraction has become vital in the modern day. These days so much variety of information is being conventionally stored on paper. For better storage and accurate processing, the paper is being converted into electronic form. This involves a lot of processing of documents using image processing techniques and other computer vision concepts. Document image analysis differs from the conventional image processing in its information content and the format. Document images are usually rich in formally presented information. The subjective-ness associated with the natural image analysis is not therefore present in the document images. Information present in these images is considered more structured, and is presented in a natural language with the help of a grammar and a script. A document is a printed-paper or written which bears the legal, official or original form of data and that can be used to furnish decisive information required or evidence. There are a wide variety of documents that we encounter in day-to-day life.
S.No.: 173
Title : VMAIL: Voice Based Email Application
Authors Name: Rahul Anwani, Deeksha Raina, Usha Santuramani, Priya R.L
Authors Affilation: Computer Engineering Computer Engineering Computer Engineering Department of Computer VESIT VESIT VESIT VESIT University of Mumbai
Volume & Issue No.: Volume3Issue5
Abstract: With the advent of technologies in mobile phones, many technological solutions have been implemented for visually impaired so that they can utilize them, and get benefited by them. Considering it as a key idea we have built an android application that will help blind people to send and read emails as ordinary people do. In this research paper we describe the VMAIL system architecture for android platform that can be used by a Blind Person to access e-mails easily. The application uses text to speech and voice recognizer to facilitate sending, reading, forwarding and replying to emails using an android smart phone. The Application provides a secured platform by including an additional feature of Applock for accessing the application, which is designed considering the convenience of a blind person.
S.No.: 174
Authors Name: Pankaj Gupta
Authors Affilation: Institute of Information Technology & Management(IITM), Gwalior
Volume & Issue No.: Volume3Issue5
Abstract: In this paper a HEXAGON shaped Microstrip Patch Antenna has been designed, simulated and analyzed in Zealand IE3D upbringing. The antenna is fabricated with a dielectric constant of 3.4 and loss tangent of 0.002. Microstrip patch antenna becomes very popular day by day because of its ease of analysis and fabrication, inexpensive, trivial, easy to feed and their striking radiation characteristics. Although patch antenna has several advantages, it has also some drawbacks such as restricted bandwidth, and a potential decrease in radiation pattern. Different techniques for bandwidth improvement of usual rectangular microstrip antenna are anticipated in this paper. By increasing the height of patch , escalating the substrate thickness and decreasing the permittivity of substrate the %bandwidth is increased. IE3D Software is used for the simulation and design calculation of microstrip patch antenna. The return loss, VSWR curve, directivity and gain are evaluated. The designed antenna operates in the frequency range of 2.4 to 5.1 GHz having the optimum bandwidth of about 57.63%. Using IE3D software put together of Zeland, according to the set size, the antenna is simulated
S.No.: 175
Title : Heat TransferEnhancement in Tube in Tube Heat Exchanger with Helical Wire Coil Inserts and CuO Nanofluid
Authors Name: Sunil P. Kulkarni, Prof. S.M. Oak
Authors Affilation: Student of M.E.(Master of engg.) in Heat Power Engg., VIT, Bibvewadi, Pune, (MH), India
Volume & Issue No.: Volume3Issue5
Abstract: In the present work, heat transfer enhancement in tube in tube counter flow heat exchanger with helical wire coil inserts and CuO nanofluid for turbulent flow has been investigated. Different parameters affecting the heat transfer characteristics were investigated so that the influence of each parameter can be determined. The Copper Oxide nanoparticles of 40nm size with volumetric fractions of 0.25% are used to prepare the nanofluid for the experiment. The helical wire coil inserts of three different pitch lengths of 14.2, 16.124 and 20.36 mm which correspond to pitch ratios of P/D = 1.29, 1.47 and 1.85 respectively are used to strengthen the heat transfer efficiency for heat exchangers.The Reynolds number varied from 10000 to 35000, the convective heat transfer coefficients were determined. The results gained in the study showed that dispersion of CuO nanoparticles in water significantly increased the overall heat transfer coefficient and convective heat transfer coefficient. The results also revealed that heat transfer improvement could be achieved by the coil having lower pitch ratio i.e. 1.29 as compared with that of coils with P/D=1.47 and 1.85. The overall heat transfer coefficient, Nusselt number, convective heat transfer coefficients for different configurations with and without inserting helical wire coil and nanofluid are compaired.
S.No.: 176
Title : Effect of Forging condition on Mechanical Properties of Al/SiC Metal Matrix Composites
Authors Name: Hanamantraygouda.M.B, Dr.B.P.Shivakumar
Authors Affilation: Department of Mechanical Engineering Sir M Visvesvaraya Institute of Technology, Bangalore
Volume & Issue No.: Volume3Issue5
Abstract: The objective of the research work to investigate effect of forging condition on mechanical properties of Al/SiC composites prepared in open die at the temperature of 450 °C with three different stages then specimens are aged at T6 conditions. Forged specimens subjected tensile, compression and hardness tests to evaluate effect of forging levels on Al/SiC composites. The effect of plastic deformation and high temperature during forging led to a recrystallization of the Al/SiC matrix with a grain refinement. At first and second stage higher grain refine could be seen but at third stage no further grain refinement could be absorbed. The modification of grain which was influenced an enhancement in the mechanical strength. The scanning electron microscope shows the brittle and ductile mixture failure was absorbed in all type of the specimens. Forging improve the mechanical properties with nominal loss of ductility.
S.No.: 177
Authors Name: Kulwinder Kaur, Kamaljit Kaur
Authors Affilation: Nanak Dev University Amritsar Computer Science Department
Volume & Issue No.: Volume3Issue5
Abstract: Mobile ad hoc networks (MANETs) have emerged like a key technology with regard to next-generation wireless networking. MANETs usually are going through rapid progress and also inspiring quite a few purposes. Even so, a lot of complex issues are still dealing with the particular deployment on this technological innovation. On the other hand, adversarial conditions are standard in MANET environments, and there are misbehaving nodes that decay the overall performance.MANETs should be fault tolerant to recover even after a failure occurs. This paper has focused on the significance of the fault tolerant routing protocols and what are the various challenges for fault tolerant MANETs.In this paper, areview on issues in fault tolerance is presented. This review paper has presented various fault tolerance techniques to improve failures in network.
S.No.: 178
Title : Security Model to Secure legacy OPC Server and Client Communication
Authors Name: Aakanksha Dhidhi
Authors Affilation: Master of Technology (Electronics Design) National Institute of Electronics and IT,Aurangabad,India
Volume & Issue No.: Volume3Issue5
Abstract: Steel Authority Of India Limited (SAIL) is the leading steel making company in India. SAIL has its own private network connecting different production units located at Durgapur, Bokaro, Bhilai, Rourkela steel plants etc and corporate offices at Delhi, Kolkata etc. Some of the links in private network are also connected to open and larger network such as internet to communicate with suppliers and customers. Therefore the internal network of SAIL is private as well as public network. So security for this network is most important. Everyday a number of attacks are launched. Among them service attacks are growing exponentially. Since private network of SAIL is indirectly connected to public network through internet. Therefore OPC connected to PLC in steel plants are also indirectly connected to internet. Since it is not possible to route data from OPC through firewall and switching off the firewall makes the plant network insecure and prone to viruses like STUXNET. In this paper, I will propose a security model to secure OPC client and server communication
S.No.: 179
Title : Implementation Of Web Based Management System For Remote Access Terminal
Authors Name: Namita Gadhave,Dilip Bhosale
Volume & Issue No.: Volume3Issue5
Abstract: The project aims at designing a Machine Remote Access Terminal using GPRS Modem. Most data loggers or Access Terminal depend on RF communication with limitation of certain Distance of communication. Some use wired Ethernet which is not feasible in certain areas of Industry. Some Telemetry solution providers have also used GSM SMS/DATA calls to solve the problems but it turned out costly and non-reliable. This project uses GPRS Data transfer TCPIP protocols to transfer chunks of data to server which runs a Web server script on APACHE engine. By simple HTML codes we can save real time data being sent from the unit and another HTML page can be used to show the IP data in a presentable way. This unit at present transmits one analog and digital signal and is a proof of concept. This concept can be expanded to include many other analog and digital channels into it.
S.No.: 180
Title : Implementation of PTP Stack on FPGAs
Authors Name: Sindhu R, Suchita Kumari, Rajani K, Rakshita Y N
Authors Affilation: Dayananda Sagar College of Engineering
Volume & Issue No.: Volume3Issue5
Abstract: Precision Time Protocol, described in IEEE 1588 is able to synchronize distributed clocks with an accuracy of less than 1 microsecond. Precision Time Protocol’s operating principle is to exchange messages consecutively to determine the offset between master and slave. The precision and the performance of Precision Time Protocol is based on the precision of Timestamp. The timestamp of communicating packets achieve synchronization between two devices. In this paper, we are implementing the Precision Time Protocol stack on FPGAs to show the working of Protocol and the different layers of OSI model. Precision Time Protocol stack is developed by implementing MAC layer with VHDL code and the upper layer with C code. The developed stack on FPGA acts as Master used to communicate with Slave (in our case, Computer) and a communication is established.
S.No.: 181
Title : A novel Model for Improvement Of Infrared Images
Authors Name: H. I. Ashiba, H.M.Mansour, M.F. El-Kordy, H.M.Ahmed
Authors Affilation: Faculty of Shoubra Engineering, Electrical Engineering DepartmentBanha, Egypt , Dept. of Electronics & Electrical Comm
Volume & Issue No.: Volume3Issue5
Abstract: This paper presents a new enhancement approach for infrared images. The idea behind this technique is based on that modifies the local luminance mean of an image and controls the local contrast as a function of the local Luminance mean of the image. The algorithm first separates an image into LPF (low pass filtered) and HPF (high pass filtered) components. The LPF component then controls the amplitude of the HPF component to increase the local contrast. The LPF component is then subjected to a non linearity to modify the local luminance mean of the image and is combined with the processed HPF component. Finally, this approach is enhanced to get an infrared image with better visual details.
S.No.: 182
Title : Enhancement of Infrared Images with An adaptive Histogram Equalization Approach
Authors Name: H. I. Ashiba, H.M.Mansour, M.F. El-Kordy, H.M.Ahmed
Authors Affilation: Faculty of Shoubra Engineering, Electrical Engineering DepartmentBanha, Egypt , Dept. of Electronics & Electrical Comm
Volume & Issue No.: Volume3Issue5
Abstract: This paper proposes a novel enhancement method for infrared images (IR) .This algorithm based on contrast limited adaptive histogram equalization (CLAHE)that adaptive and improves infrared images. Some attempts are proposed for enhancement of infrared imagesusingthis model, sinceinfrared images have several many applications, it is expected that CLAHEwould be better in their enhancement than histogram equalization (HE). The simulation results show the superiority of CLAHEto HE in the enhancement of IR images from both the visual quality and Peak-to-peak signal-to-noise ratio (PSNR) points of view.So, applying this proposed method reinforces visual details inIR images enhancement.
S.No.: 183
Title : A Comparative Analysis of Software development life cycle Models
Authors Name: Rashmika K. Vaghela
Authors Affilation: R.C.Technical Institute
Volume & Issue No.: Volume3Issue5
Abstract: There are various software development life cycle models used for developing software. SDLC provides a systematic way for developing software. Each SDLC model has it’s own advantages and disadvantages according to which we decide which model is suitable for development under which condition. In this paper the comparison of various SDLC models like waterfall, incremental, spiral and RAD model have been carried out
S.No.: 184
Volume & Issue No.: Volume3Issue5
Abstract: Compensation is a systematic approach to providing monetary value to employees in exchange of their work. Compensation may achieve several purposes assisting in recruitment, job performance, and job satisfaction. An ideal compensation management system will help significantly boost the performance of employees and create a more engaged workforce that’s willing to go the extra mile for the organisation. This paper focuses on aspects of compensation management. Mostly, it includes the elements of vision, potential, communication and motivation and can be realised if incentive promises are fulfilled by both employer and employee. The aim of the paper is to identify the most important attributes of compensation system of management. Keywords: Compensation, Motivation, Employees, Incentives, Management Practices.
S.No.: 185
Title : Analysis of Fatigue behaviour and Impact strength of IS 500/7 Grade Ductile Iron Subjected to Austempering Heat treatment
Authors Name: Muhammed Naseef M.A, Sameer, Vijaykumar H.K
Authors Affilation: Bearys Institute of Technology, Mangalore, Karnataka, India
Volume & Issue No.: Volume3Issue5
Abstract: Austempered Ductile Iron (ADI) is replacing steel and it is finding applications in agriculture, mining, construction and automotive sector due to its superior mechanical properties and cost-effectiveness in manufacturing. In this study IS500/7 grade ductile iron castings were made subjected to austempering heat treatment to get ADI i.e., to bring about changes in microstructure and hence therefore mechanical properties. Austempering heat treatment involves austenisation at 9000C temperature for 2 hours duration, austempering temperatures selected was 3600C and 4300C and austempering duration selected were 50,100,150,200 and 250 minutes.Fatigue behaviour and impact strength of the ADI specimens were analysed and compared with as cast condition specimen. The results of the investigation indicate that the ADI castings possess better impact strength compared to as cast specimens and fatigue strength decreases with increase in austempering temperature.
S.No.: 186
Authors Name: Kirna Rani
Authors Affilation: Computer science of Engineering Guru Nanak Dev University Amritsar
Volume & Issue No.: Volume3Issue5
Abstract: The brain tumor detection is a very important application of medical image processing. This paper has presented a review on various brain tumor detection techniques. The overall objective of this paper is to explore the various limitations of earlier techniques. The literature survey has shown that the most of existing methods has ignored the poor quality images like images with noise or poor brightness. Also the most of the existing work on tumor detection has neglected the use of object based segmentation. This paper ends up with the suitable future directions.
S.No.: 187
Title : Translating Indian Sign Language to text and voice messages using flex sensors
Authors Name: Sachin Bhat, Amruthesh M, Ashik, Chidanand Das, Sujith
Authors Affilation: Shri Madhwa Vadiraja Institute of Technology, Udupi
Volume & Issue No.: Volume3Issue5
Abstract: Communication plays an important role for human beings. Communication is treated as a life skill. Keeping these important words in mind we present our paper to mainly focused on aiding the speech impaired and paralysed patients. Our work helps in improving the communication with the deaf and dumb using flex sensor technology. A brief description about various gestures and the implementation part is discussed in this paper. A device is developed that can translate different signs including Indian sign language to text as well as voice format. Flex sensors are placed on hand gloves for the use of above said people. Flex sensor’s resistance changes according to the flexion experienced. Sensors in the glove pick up gestures and transmit that to text data with the help of Analog to Digital convertor and micro controllers. This converted text data will be sent wirelessly via Bluetooth to a cell phone which runs Text to Speech software and incoming message will be converted to voice. Here device recognizes Indian sign language alphabets, numbers and symbols based on sensor movement.
S.No.: 188
Title : Implementation of Memory Efficient Data Hiding Technique
Authors Name: Anushka Nagpal
Authors Affilation: CSE& Kurukshetra University Haryana, India
Volume & Issue No.: Volume3Issue5
Abstract: Steganography is an important area of research in recent years involving a number of application. In this paper, a new Steganography technique is presented, implemented and analyzed. The proposed method hides the secret message into cover medium. It can hide three images into one. Evaluation is done on PSNR based. Comparison with existing techniques is also compared. Then the performance specification of image steganography is disscussed . Different embedding techniques that are LSB, Spatial domain ,DCT, Huffman encoding, are generalized .
S.No.: 189
Volume & Issue No.: Volume3Issue5
Abstract: In this paper, an Ant colony optimization based energy efficient routing algorithm has been proposed. Principle improvement has been done for energy efficient routing algorithm. Additionally the use of the compressive sensing also increases the performance further. The compressive sensing uses data fusion to remove redundant data from sensor nodes. So it improves the results further. In the end to evaluate the effectiveness of the proposed technique further the effect of the scalability of number of nodes has also been considered.
S.No.: 190
Title : Performance Analysis Of ICA Using Tuning Parameters
Authors Name: Jaya Dhawan, Pooja Narula
Authors Affilation: Student, Haryana Engineering College
Volume & Issue No.: Volume3Issue5
Abstract: Remote sensing has played a vital role in change detection of the hyperspectral images. In past some years, several improvements have been made in change detection techniques. The objective of this paper is also to propose such an improvement in Independent Component Analysis(ICA) by introducing certain tuning parameters in the FastICA algorithm. The algorithm can be run with different approaches and under different criteria with these parameters and thus making the algorithm much efficient. A comparison is made between the two important techniques of change detection that are PCA and ICA. The better performance of ICA to remove correlation efficiently among the components found from a given hyperspectral data has been assured by experimental results.
S.No.: 191
Title : Delay And Energy-Aware Routing (DEAR) In Proactive Source Routing Protocol For Mobile Adhoc Networks
Authors Affilation: Mtech 4th sem, Associate Professor HKBK College of engineering,CSE Dept
Volume & Issue No.: Volume3Issue5
Abstract: A wireless communication where the nodes are not within direct transmission range of each other it requires other node to forward the data this is a Mobile Adhoc Network (MANET).Opportunistic data forwarding express an assuring solution to utilize the broadcasting nature of wireless communication link. It has drawn much diligence in research community of multihop wireless network, but it has not been used in MANET because of lack of light weight proactive routing scheme with strong source routing capability .In this paper a lightweight proactive source routing(PSR) is proposed , which can have more network topology information and less overhead than other traditional DV-based protocol[e.g., destination-sequenced DV (DSDV)],link state (LS)-based routing [e.g., optimized link state routing(OLSR)],and reactive source routing [e.g., dynamic source routing (DSR)]. In this proposed PSR network overwhelming is occurring due to the route update and energy consumed is more because of node mobility. To overcome this disadvantage and new innovative method called delay and energy aware routing method (DEAR) is proposed for reducing energy consumption. In this method the delay is selected until the end of the cycle so that only one update is broadcast in each period. Furthermore, due to the dynamic topology, node consumes more energy while roaming. For this, the topology control approach has been introduced. In this approach, considered two cases, i) Energy consumption of the node and routes. ii) Link stability and location stability. The experimental result using computer simulation in Network Simulator 2(ns-2) shows that the proposed PSR and DEAR yield similar or better data transportation performance than these baseline protocols.
S.No.: 192
Volume & Issue No.: Volume3Issue5
Abstract: Under water vision is one of the scientific fields of investigation for researchers. Autonomous Under water Vehicles (AUV) and Remotely Operated Vehicles (ROV) are often employed to fully capture the information such as for instance under water mines, shipwrecks, coral reefs, pipelines and telecommunication cables from the underwater environment. Underwater image degrades due to limited range visibility, low contrast, non-uniform lighting, blurring, bright artifacts, color diminished, and noise. In this paper, to overcome the problems of existing technique a new L*A*B color space and CLAHE based image enhancement algorithm has been proposed. To overcome the issue of the uneven illuminate issue in the output image of the CLAHE output has further removed using the use of color channel normalization. The main scope of the proposed algorithm has been to improve the accuracy of the underwater image enhancement techniques
S.No.: 193
Authors Name: Kudratpreet Kaur, Malkit Singh
Authors Affilation: M.Tech CSE GCET
Volume & Issue No.: Volume3Issue5
Abstract: In this paper, a survey on various digital watermarking techniques has been done. A watermark system is considered to be secure, if the hacker cannot eliminate the watermark without having full understanding of embedding algorithm, detector and composition of watermark. From the survey, it is been found that none of the technique performs efficiently in every fields. Therefore the paper ends with the future scope to overcome these issues.
S.No.: 194
Authors Name: Shikha Mahajan, Assit.Prof. Richa Dogra
Authors Affilation: M.TECH/CSE GCET (PTU)s
Volume & Issue No.: Volume3Issue5
Abstract: Image enhancement plays a fundamental role in vision applications. Enhancement is the manner of improving the superiority of an electronic digital stored image. Recently much work is completed in the field of images enhancement. Many techniques have previously been proposed up to now for enhancing the digital images. In this paper, a survey on various image enhancement techniques has been done. After surveying different techniques, it has been concluded that none of the techniques performs efficiently in all fields. Therefore the paper ends with the future scope to overcome these limitations.
S.No.: 195
Authors Name: Vishesh Mahajan, Harjeet Singh
Authors Affilation: Department of electronics and communication technology Regional campus GNDU, Gurdaspur
Volume & Issue No.: Volume3Issue5
Abstract: Underwater Wireless Sensor Networks (UWSNs) support various applications like pollution monitor, tsunami warning, offshore exploration, planned surveillance, etc. Distinctive top features of UWSNs like low available bandwidth, large propagation delay, highly dynamic network topology, and high error probability pose many challenges for designing efficient and reliable communication protocols. This paper has reviewed extension of IAMCTD (Improved Adaptive Mobility of Courier nodes in Threshold-optimized DBR protocol for UWSNs) thats targeted on enhancing network reliability and throughput for critical-range based applications. Extension of IAMCTD scheme avoids control overhead that has been contained in IAMCTD for implementing changes thorough threshold. The movement pattern of courier nodes alongside reducing communication burden on nodes increases throughput as well.
S.No.: 196
Authors Name: Sugendha, Bandana Sharma
Authors Affilation: PG student & CSE & Kurukshetra University & Kurukshetra (Haryana), India
Volume & Issue No.: Volume3Issue5
Abstract: This paper presents a class of routing protocols for vehicular ad hoc networks (VANETs) called the Optimized link state routing protocol (OLSR). OLSR protocol performs well in networks having changing topology of nodes, as it can adapt in such environments easily and updated routing table is maintained by all nodes all the time. Wide range of improvement is possible by changing only the configuration parameters of OLSR protocol. Modification to the OLSR protocol is needed to increase the performance of the OLSR protocol in a VANET scenario. This can be done by implementing Genetic Algorithm on OLSR protocol and this result in fine auto-tuned OLSR configuration. Performance gets improved in terms of increased PDR and Throughput and reduced End to End Delay with optimized-OLSR (OLSR-GA)
S.No.: 197
Volume & Issue No.: Volume3Issue6
Abstract: Heterogeneous Multi-cluster System is a best developing area in computer science engineering. Job scheduling and processor allocation is two main area of improve performance in Multi-cluster System. Recently much work is performed in the field of heterogeneous scheduling of multi-cluster system. In this paper, a research on different scheduling for methods has been done. After surveying different methods, it has been concluded that none of the methods performs efficiently in all fields. Therefore the paper ends with the future scope to overcome these limitations.
S.No.: 198
Authors Name: SONAM BHARAL
Authors Affilation: GNDU, AMRITSAR
Volume & Issue No.: Volume3Issue6
Abstract: Image enhancement is the process of improving the quality of the input image so that it would b easily understood by viewers in the future. Underwater images mainly suffer from the problem of poor color contrast and poor visibility. These problems occurred due to the scattering of light and refraction of light while entering from rarer to denser medium. Many techniques and methods are established by researchers to solve the problem of underwater image enhancement. In this paper different underwater image enhancing techniques are reviewed and studied. The overall objective is to explore the shortcomings in earlier techniques.
S.No.: 199
Authors Name: Shalima, Dr. Rajinder Virk
Authors Affilation: Dept of CSE, GNDU Amritsar
Volume & Issue No.: Volume3Issue6
Abstract: Image fusion is a process of fusing two or more images of same scene to form single fused image which displays vital information in the fused image. There are different techniques of image fusion which have many advantages and disadvantages. Many techniques suffer from the problem of color artefacts that comes in the fused image formed. In this paper different techniques have been reviewed and the main objective is to find the shortcomings that occur in difeerent image fusion techniques.
S.No.: 200
Authors Name: Neelam Kumari, Mr.Arpinder Singh
Authors Affilation: Computer Science Beant College Of Engineering & Technology
Volume & Issue No.: Volume3Issue6
Abstract: The rapid growth in network multimedia equipments have allow additional real-time digital services such as video-conferencing, online games and distance education to grow to be the conventional internet tasks. These services frequently necessitate the fundamental system to provide multicast facility. The multicast describes the distribution of structures from just one single node to multiple destinations. These real-time services have a stringent inevitability of QoS factors like bandwidth, delay, jitter etc. to ensure dirt free, reliable, and reasonable sign to the receivers. In this paper, a survey on various meta-heuristic algorithms has been done along with routing protocols. From the survey it has been concluded that none of the technique performs effectively in all fields. Therefore the paper ends with the future scope to overcome these issues.
S.No.: 201
Title : Healthcare Fraud Detection Using Data Mining
Authors Name: Deepak Badlani, Priya R.L., Suryaprakash Vishwakarma, Harsh Modi
Authors Affilation: V.E.S Institute of technology
Volume & Issue No.: Volume3Issue6
Abstract: Health Insurance companies are facing difficulty to detect the false claims made by customers and providers. Customer’s requests for the false claim and they were getting passed. This project helps the healthcare insurance companies to detect whether the customer claim is valid or not. The project helps to deal with the large chunk of data of customers, providers and analyse the data and helps the health insurance companies to detect the fraud. Data mining analytics in healthcare is evolving into a promising field for providing insight from very large data sets and improving outcomes while reducing costs. Its potential is great; however there remain challenges to overcome.
S.No.: 202
Title : Review of Forward & Backward Sweep Method for Load Flow Analysis of Radial Distribution System
Authors Name: Chitransh Shrivastava, Manoj Gupta, Dr. Atul Kosthi
Authors Affilation: PG Scholar, Department of Electrical & Electronics Engineering, IES-IPS Academy, Indore
Volume & Issue No.: Volume3Issue6
Abstract: Due to sharp increase in power demand, voltage instability & line overloading has become challenging problems for power engineers. Voltage collapse, unexpected line & generator outages & blackouts are the major problems associated with voltage instability. Reactive power unbalancing is the major cause of voltage instability. So that the problem of enhancing the voltage profile and decreasing power losses in electrical systems is a task that must be solved in an optimal way. This type of problem is in single phase & three phases. Therefore to improve & enhance the voltage profile & stability of the existing power system, FACTS devices and load flow analysis are the alternative solution. This paper describes a forward backward sweep method based approach for load flow analysis in radial distribution system to improve voltage stability and to minimize the transmission line losses considering cost function for entire power system planning. The proposed approach will be tested on IEEE-33 bus system.
S.No.: 203
Title : Denial of Services based Countermeasures Key Exchange Protocols
Authors Name: Asst. Prof. Arpit Agarwal and Asst. Prof. Agrawal Jitendra Soni
Authors Affilation: Department of Computer Engineering Institute of Engineering & Technology Institute of Engineering & Technology Devi Ahilya University Devi Ahilya University M.P., India M.P., India
Volume & Issue No.: Volume3Issue6
Abstract: Cryptography has become indispensable in areas such as e-commerce, the legal safeguarding of medical records, and secures electronic communication. Cryptographic protocols like key exchange usually require expensive computations such as finite field exponentiations or elliptic curve scalar-point multiplications. In an adversarial environment such as the Internet, an attacker could effect a denial of service attack against a server by forcing the server to perform many instances of a cryptographic protocol. To help tackle this challenge, several cryptographic primitives and constructions have been proposed, including mechanisms to securely distribute data over a unidirectional insecure channel, schemes in which leakage of cryptographic keys can be traced back to the leaker, and techniques to combine revocation and tracing capabilities. In this paper we proposed the integration of denial of service countermeasures key exchange protocol by introducing a formal model for denial of service resilience that complements model for secure key agreement, we cover a wide range of existing denial of service attacks and prevent them by carefully using client queries and puzzles.
S.No.: 204
Title : Novel Region Based Multi Focus Image Fusion based on Region spatial frequency and Linear Exponential Weight
Authors Name: drashti patel
Authors Affilation: SVIT
Volume & Issue No.: Volume3Issue6
Abstract: Due to the depth of focus problem in digital camera, we get the images that contain only certain objects in focus that are the objects within the depth of focus. Multifocus image fusion is the technique to overcome such a problem and get the image that contains all objects in focus. In this paper we proposed new Multi focus image fusion algorithm based on linear exponential Weight and Region spatial frequency. The fusion process is as follow: first, Input images are fused using transform domain method that is the Laplacian pyramid method. Then the image get using Laplacian pyramid is segmented. Then the two input images are segmented according to the result of the Laplacian pyramid image. Finally, According to the Region Spatial frequency, apply linear exponential weigh on the source images to get final fused image. Experimental results shows that proposed method can give good results then other methods.
S.No.: 205
Title : Task distribution scheme:The offloading framework for Mobile Cloud
Authors Affilation: Department of Computer Engineering, Sharadchandra Pawar College of Engineering, Otur(Pune), India.
Volume & Issue No.: Volume3Issue6
Abstract: Now a days Mobile become the essential part of human life. So we can use this platform to execute all the online services. Mobile cloud computing for enabling the future of online services using computation offloading framework to improve security and performance. We are using BBAP offloading algorithms for security and to minimize the computation overhead. Task distribution scheme is also used which help the cloud to achieved desired goal. Cloud computing will play a major role in the future Internet of Services, enabling on demand provisioning of applications, platforms, and computing infrastructures. However, the cloud community must address several technology challenges to turn this vision into reality. Specific issues relate to deploying future infrastructure-as-a-service clouds and include efficiently managing such clouds to deliver scalable and elastic service platforms on demand, developing cloud aggregation architectures and technologies that let cloud providers collaborate and inter operate, and improving cloud infrastructures’ security, Reliability and energy efficiency.
S.No.: 206
Authors Name: Navdeep kaur, Dr. Rajinder Virk
Authors Affilation: Department of Computer Engineering and Technology, Guru Nanak Dev University, Amritsar Punjab, India
Volume & Issue No.: Volume3Issue6
Abstract: The reliability and protection issues of digital pictures are fetching fame than ever, due to the speedy progress of multimedia and Internet expertise. Watermarking procedures for images are used to safeguard the digital pictures. There can be a visible or an invisible watermark. In this study we confine our consideration to invisible watermarks. An invisible watermarking procedure, generally, consists of an encoding method and a decoding method. To overcome the limitations of earlier techniques a new technique is proposed which has evaluated DCT, DWT, CZT and SVD. The SVD is modified by the Arnold transform. The planned algorithm uses the advantages of the watermarking techniques which are well-known. The basic goal of this work is to alter the SVD in such a way so that it can sense the attacks in more capable way. Modified-SVD (MSVD) is used to evaluate the SVD matrix and values obtained from the input image and then will be tailored with the values of the image going to be watermarked.
S.No.: 207
Authors Name: Jatinder Preet Kaur and Mandeep Kaur
Authors Affilation: Punjab Institute of Technology, Rajpura, Punjab
Volume & Issue No.: Volume3Issue6
Abstract: Worldwide Interoperability for Microwave Access (WiMAX) is a technology that bridges the gap between fixed and mobile access and offer the same subscriber experience for fixed and mobile user. Routing is the key issue of WiMAX. Routing protocols are studied mainly on the basis of distance vector routing protocols, link state routing protocols and path vector routing protocols and the protocols are IGRP, RIP, EIGRP; OSPF, IS-IS and BGP respectively. The performance of each routing protocols is different from others. Optimized Network Engineering Tool (OPNET) simulator is used to analyze and measure the comparative performance of various routing protocols. In this paper, focus is made on comparative analysis of routing protocols for high load application such as FTP. The performance evaluation of three routing protocols that are Border Gateway Routing (BGP), Open Shortest Path First (OSPF) and Interior Gateway Routing Protocol (IGRP), is carried on the basis of End to End delay, network load, Media Access Delay, Retransmission Attempts and Throughput. The analysis is done by obtaining the results from simulation scenarios in OPNET Modeler version 14.0.
S.No.: 208
Title : Efficient Data Aggregation Scheme For Wireless Sensor Network
Authors Name: Dhara Patel, Virendra Barot
Authors Affilation: Information Technology Dept. Sardar Vallabhbhai Patel Institute of technology, Vasad, Gujarat, India
Volume & Issue No.: Volume3Issue6
Abstract: Due to limited resources available for sensor nodes in wsn(wireless sensor network), we must use the data aggregation technique to improve the residual energy. Data Aggregation is the technique which aggregating the data from multiple sensors to eliminate redundant transmission and provide fused information to Base station. In this context, we propose a modified protocol which is based on greedy routing and data aggregation using LEACH. In existing greedy routing includes two algorithm as: greedy selection and greedy election. In selection algorithm neighbors exchange packets with RSSI information and next hop of the packet is then selected from routing table at each step. In election algorithm, next hop is dynamically elected at each step and no extra packets Are required for routing task. Still there are some issues with this algorithms like energy consumption, network lifetime etc. So we have proposed the new protocol using LEACH to improve existing scheme to make it more energy efficient. Now using modified protocol, there should be less data transmission so that energy consumption should be reduced and improve the overall network lifetime which is also most important issue of wsn. The result clearly shows that our proposed scheme improve the residual energy than existing scheme and make the system energy efficient.
S.No.: 209
Title : Recent Techniques for Image Fusion: A survey
Authors Name: Prabhdip Kaur, Manjit Singh, Butta Singh
Authors Affilation: Department of Electronics, Department of Electronics, Department of Electronics, GNDU Regional Campus, GNDU Regional Campus, GNDU Regional Campus, Jalandhar.
Volume & Issue No.: Volume3Issue6
Abstract: Image fusion is a process of assimilating all relevant and complementary information from images of identical source or various sources into a single combined image without any degradation. Three major fusion methods have been dealt in the literature of image fusion – pixel level, feature level and decision level. In this paper, a review of different image fusion techniques is presented. DCT based image fusion methods are time saving and efficient but leads to color artifacts. PCA image fusion based methods have high spatial quality. Also it suffers from spectral degradation and is computationally poor. The overall goal of this paper is to find the gaps in existing literature and suggesting a suitable method to reduce the gaps of existing techniques.
S.No.: 210
Title : Progressive visual cryptography in secret image for image security
Authors Name: Mr. Abhimanyu S. Gunjal, Dr. S. V. Gumaste
Authors Affilation: Student of ME (Computer) Project Guide Department of Computer.Engg. Department of Computer.Engg. Sharadchandra Pawar college of Engg. Sharadchandra Pawar college of Engg. Otur, Pune, India
Volume & Issue No.: Volume3Issue7
Abstract: Visual cryptography is a cryptographic technique which allows visual information (pictures, text, etc.) to be encrypted in such a way that the decryption can be performed by the human visual system, without the aid of computersIf we only have a few pieces of shares, then we could get an outline of the secret image, by increasing the number of the shares being stacked, the details of the hidden information can be revealed progressively. PVC using un-expanded shares regenerates images of high quality. But this method is not secure as the shares generated are noise like images and interest of hackers as they treat them as critical information in the transmission. If the random looking shares are enveloped into some meaningful images the interest of hackers can be minimized In the proposed method, a digital watermarking technique is used to generate meaningful shares. The secret image shares are watermarked with different cover images and are transmitted. At the receiving side the cover images are extracted from the shares and stacked one by one which reveals the secret image progressively. This process provides a more efficient way to hide images in different meaningful shares providing high security and recovered image with high contrast.
S.No.: 211
Title : Organizational culture impact on reduction the causes of organizational conflict (Applied study on ……Jordan Hospital )
Authors Name: Dr: zahid Mohamed diri
Authors Affilation: zarga university ,Faculty of economics and administrative sciences, Business administration department.
Volume & Issue No.: Volume3Issue7
Abstract: The study aimed to determine the organizational culture impact on reduction the causes of organizational conflict in Jordan Hospital . The required data was collected via developing a questionnaire that was designed particularly for that purpose based in previous studies, then was distributed on a sample of 86 people of the hospitals personnel. To test the study hypotheses, the linear regression analysis was employed .The study took into consideration four dimensions of organizational culture, as follows: innovation, personnel and appreciation, trust, and teamwork. As for organizational conflict, the study has determined three causes for it, as follows: resource limitations, unclear responsibilities, goals conflict. The results of the study showed that there is an organizational culture dominating the Hospital of Jordan and that it has great impact on reduction of conflict causes. The results also showed that there is an impact with statistical significance at level (α<0.05) on the relation between the organizational culture dimensions (innovation, personnel respect and appreciation, trust and teamwork) and conflict reduction in the Hospital of Jordan as a result of resource limitations. The results showed that there is an impact with statistical significance at level (α<0.05) on the relation between the organizational culture dimensions (innovation, personnel respect and appreciation, trust and teamwork) and conflict reduction in the Hospital of Jordan as a result of unclear responsibilities. Finally , the study results have shown that there is an impact with statistical significance at level ( α<0.05 ) on the relation between the organizational culture dimensions ( innovation , personnel respect and appreciation , trust and teamwork ) and conflict reduction in the Hospital of Jordan as a result of goals conflict . In the light of the results, the study recommends the following: • Paying attention to the dominating organizational culture and developing it , • Improving the work environment , • Allowing for personnel partnership in developing the hospitals strategies , • Encouraging creativity and competition among the personnel • Managing the organizational conflict in accordance with the hospitals and the personnel goals.
S.No.: 212
Authors Name: Dr: zahid Mohamed diri
Authors Affilation: zarga university ,Faculty of economics and administrative sciences, Business administration department.
Volume & Issue No.: Volume3Issue7
Abstract: The study aimed to recognize the impacts of the organizational culture dimensions on the success of organizational programs in the Jordanian banks, via a questionnaire that targeted the views of managementadministrators of the Jordanian banks centers and branches in the city of Amman. The study population included 278 administrators from elevenbanks, with 65 administrators taken as study sample. The study concluded that the banks had been conducting change programs, and that there is a firm and strong organizational culture that is expressed its identity. The study also showed that there an impact with statistical significance of the organizational culture dimensions on the organizational change programs success with various degrees in the Jordanian banks.In the light of previous results, the study recommends that the workers be included as partners in the change programs, developing innovation supporting systems , improving the work environment and personnel respect , promoting competition culture , stimulating the personnel , developing communication systems, and increasing interest in the social capital .
S.No.: 213
Title : Congestion Control Clustering a Review Paper
Authors Name: Navdeep Singh, Er. Nitika Soni
Authors Affilation: G.N.D.U Regional Campus Assistant Professor Jalandhar
Volume & Issue No.: Volume3Issue7
Abstract: Wireless Sensor Networks consists of sensor nodes which are scattered in the environment, gather data and transmit it to a base station for processing. Energy conservation in the Wireless Sensor Networks (WSN) is a very important task because of their limited battery power. The related works so far have been done have tried to solve the problem keeping in the mind the constraints of WSNs. In this paper, a priority based application specific congestion control clustering (PASCCC) protocol has been studied, which often integrates the range of motion and heterogeneity of the nodes to detect congestion in a very network. Moreover a comparison of the various clustering techniques has been done. From the survey it has been found that none of the protocol is efficient for energy conservation. Hence the paper ends with future scope to overcome these issues.
S.No.: 214
Authors Affilation: Department of Mathematics and Computer Science, Delta State University, Abraka, Delta State
Volume & Issue No.: Volume3Issue7
Abstract: To state that the computer has found its way into most fields of human interest is saying the obvious. This is because almost all corporate organizations now depend on computers for their day today operations including themeans of storing sensitive data and information vital to the organization.In this computer age, everyone needs a computer to remain relevant and up to date,and this has arguably made the computer to become the most sought after piece of electronic device (albeit for both legitimate and illegitimate use). Most organizations today are networking in order to share resources including databases thereby allowing several computers access the same database. Advantage of this is being taken by criminals as they have become aware of the enormous benefitsof the illegal business of gaining access without authorization (hacking) database of organizations. One of the approaches of this is to device means of taking advantage of any idle computer in a remote area to access a common database.The security of remote computer systems from physical hackers is highly desired, in this paper therefore, the Radio frequency identification (RFID) is introduced into computers security using Tags and Readers. The general operations and applications of the RFID, its types and characteristics are discussed,and aframework for this is designed.
S.No.: 215
Volume & Issue No.: Volume3Issue7
Abstract: This research work has proposed a new technique which will integrate the higher valued Alternating Current (AC) coefficients calculated in Discrete Cosine Transform (DCT) domain based fusion with principle component analysis (PCA) and adaptive histogram equalization to reduce the color artifacts which will be introduced due to the transform domain method i.e. DCT. The fusion process may degrade the sharpness of the fused images so to overcome this problem adaptive histogram equalization is used to enhance the results further. The use of PCA is for increasing the speed of the AC-DCT based fusion method; because in color images AC-DCT has been applied on each color separately which time is consuming in nature. The experimental results has clearly shown that the proposed technique outperforms over the available methods. The proposed algorithm has been designed and implemented in MATLAB tool using image processing toolbox. The comparative analysis has shown the significance of the proposed algorithm
S.No.: 216
Authors Name: Sonal Sharma, Gurveen Kaur
Authors Affilation: Dept Of Computer Engineering, DAVIET, Jalandhar
Volume & Issue No.: Volume3Issue7
Abstract: Image Enhancement can improve the perception of information for human viewers, but there also exist some deficiencies in most image enhancement methods and one such deficiency is the loss of edges in an image. An edge in an image is a boundary or contour at which a significant change occurs in some physical aspect of an image, such as the surface reflectance, illumination or the distances of the visible surfaces from the viewer. Changes in physical aspects manifest themselves in a variety of ways, including changes in intensity, colors, and texture. In this paper, after a brief overview of some existing methods of contrast enhancement and their limitations, we present computationally efficient method of enhancing the contrast by using Fuzzy Logic. The proposed algorithm is applied on different images, and few evaluation parameters are calculated which proves the effectiveness of the proposed algorithm.
S.No.: 217
Authors Name: Sonal Sharma, Gurveen Kaur
Authors Affilation: Dept Of Computer Engineering, DAVIET, Jalandhar
Volume & Issue No.: Volume3Issue7
Abstract: Image segmentation is the most important part in digital image processing. It is used to analyze the image and can be defined as aprocessing technique used to classify or cluster an imageinto several disjoint parts by grouping the pixels to form aregion of homogeneity based on the pixel characteristics likegray level, color, texture, intensity and other features. The aim of the segmentation process is to get moreinformation in the region of interest in an image which helpsin annotation of the object scene. Thresholding, compression-based, histogram based etc are the various methods of image segmentationbut none of the method has been very much efficient for segmentation in various types of images. So, to overcome this issue new hybrid image segmentation by using gaussian mixture model based HMRF, anisotropic diffusion and the guided image filter has been proposed in this paper. To evaluate the effectiveness of the proposed technique on different kinds of images, various performance metrics have been evaluated.
S.No.: 218
Authors Name: Vikramjeet Singh , Sharanjeet Singh
Authors Affilation: Guru Nanak Dev University, Regional Campus, Gurdaspur
Volume & Issue No.: Volume3Issue7
Abstract: A demosaicing algorithm is a digital image process used to reconstruct a full color image from the incomplete color samples output from an image sensor overlaid with a color filter array (CFA). It is also known as CFA interpolation or color reconstruction. The review has clearly shown that the problem of uneven illuminate has been ignored in the majority of existing research on CFA. The effect of the color artifacts has also been neglected in the existing research. The use of the illuminate normalization has also been neglected which can overcome the issue of uneven illuminate and color artifact. This research work deals with the edge strength filter based color interpolation along with the color normalization in such a way that it can reduce the artifacts of colors in efficient manner. MATLAB tool is used to design and implement the algorithm. The comparative analysis has clearly shown that the proposed technique outperforms over the available one.
S.No.: 219
Authors Name: Sehaj Rai, Dr.Karanjeet Singh Kahlon
Authors Affilation: Department of Computer Science and Engineering, GNDU
Volume & Issue No.: Volume3Issue7
Abstract: The color constancy is a procedure that measures the influence of different light sources and a digital image. Existing color constancy methods are all based on specific assumptions such as the spatial and spectral features of images. As a final result, no algorithm can be considered as universal. The image recorded by a camera depends on three factors: the physical content of the scene, the illumination occurrence on the view, and the features of the camera. The goal of the computational color constancy is to account for the effect of the illuminate. Many traditional methods such as max RGB, Gray World and learning based methods were used to measure the color constancy of digital images affected by source of light. All these methods have a disadvantage that the light source across the scene is spectrally unvarying. This hypothesis is often violated as there might be more than one light source illuminating the scene. For instance, indoor scenes could be affected both by indoor and outdoor illumination, each having different shadowlike power distributions.
S.No.: 220
Title : Towards a Formal Representation of Cognitive Dissonance Knowledge Application: control driving vehicles
Authors Affilation: 1Université de Valenciennes, LAMIH UMR CNRS 8201, Valenciennes, France 2 Université Libanaise, IUT, Saida, Liban
Volume & Issue No.: Volume3Issue7
Abstract: This paper presents an approach based on the notion of Object Knowledge (OK) to facilitate the cognition dissonance diagnosis. This approach is enhanced with a Metaknowledge system (Driver-VehicleEnvironment) which will be modeled with objects knowledge and specified by a temporal formal language. We will first present the concept and theory of dissonance and the strategies to reduce it. Then, the approach is tested for controlling driving vehicles. Finally, the paper shows the use of cognitive dissonance diagnosis in real time system.
S.No.: 221
Title : Arm Based Fixtures Monitoring Of CNC Machine
Authors Name: Pingale Namrata Namdev
Authors Affilation: G.H.Raisoni College Of Engineering,Ahmednagar.
Volume & Issue No.: Volume3Issue7
Abstract: This paper introduce a system that used ARM based microcontroller and wireless sensors to control the various devices and to monitor the information regarding the CNC machines parameter using WI-FI technology .If there is any error in machine it can’t be recognized by the person sitting in the office.The existing system is difficult to maintain. This consumes lot of time on communication between technical persons. To overcome this problem we are trying to develop the system. This system will give a informationto the respective technical person according to the error detected.This paper introduce a system that used ARM basedmicrocontroller and wireless sensors to control the various devices and to monitor the information regarding the CNC machines parameter using WI-FI technology .This consumes lot of time on communication between technical persons. To overcome this problem we are trying to develop the system. This system will give a information to the respective technical person according to the error detected.This consumes less time.
S.No.: 222
Authors Name: Diambomba Hyacinthe Tungadio; Jacobus Andries Jordaan; Mukwanga Willy Siti
Authors Affilation: Tshwane University of Technology
Volume & Issue No.: Volume3Issue7
Abstract: The objective of all power system state estimation (PSSE) is to determine, by statistical projections, the best estimate of state variables represented by the voltage magnitudes and voltage angles of all the buses. Due to the complexity and non linearity of the power system (PS), it is necessary to use more advanced methods for its analysis and control in real-time environment. This research discusses the application and the comparison of hybrid models of one of the algorithm using artificial intelligence (AI) technique (particle swarm optimization) in minimizing the raw measurement errors in order to estimate the optimal point of the PS when certain sensitive data are incomplete. The effectiveness of the hybrid models are demonstrated and compared with the original PSO, artificial bee swarm optimization (ABSO) algorithm and genetic algorithm (GA) using IEEE 14, 30, 118 and 300 bus test systems. Newton-Raphson load flow solution is taken as benchmark. Two different objective function formulations assessed by PSWV, EPSOWP, PSO-RF. The first formulation is the Weighted Least Square (WLS) and the second one is the Weighted Least Absolute Value (WLAV).
S.No.: 223
Title : Research on collision risk model in free flight based on position error
Authors Name: Zhang Zhaoning, Shi Ruijun
Authors Affilation: College of Air Traffic Management, Civil Aviation University of China, TianJin, China
Volume & Issue No.: Volume3Issue7
Abstract: The problem of collision risk in free flight with a certain safe distance is studied. In free flight, the collision risk is closely related to the aircraft position error. With the stochastic characteristics, the position error is set to satisfy a three-dimensional Gaussian distribution, and the position error model of the aircraft is established in the horizontal and the vertical direction. Determine the location and the time when the two aircrafts are closest by the nominal route, and calculate the probability that the aircraft appears at any point near the theoretical position by the position error model. Because every collision occurs after conflict, the conflict probability is calculated first, and then the collision risk given safe distance in free flight is modeled. Moreover, the algorithm is presented to use this collision risk model to obtain the minimum safe distance with a safety target level. The results of case study show the feasibility of this model.
S.No.: 224
Title : Ant colony optimization based energy efficient routing algorithm (AERA) for mobile sink based WSN
Authors Name: NavpreetKaur, Er. Jatinder Pal Sharma
Authors Affilation: C.S.E Department G.I.M.E.T
Volume & Issue No.: Volume3Issue7
Abstract: WSN means for Wireless sensor network .WSN consists of a large number of nodes which communicates together through sensing and by monitoring the physical world. There are many application of WSN .In this paper, different protocol of WSN has been discussed,the analysis has shown that the most of the presented technique has abandoned the issues like the effects of the mobile descend in the most of the energy efficient protocols has been ignored. Moreover the effect of lossless data compression has been abandoned by theresearchers. Also no optimization technique is considered for the effective route selection in ERA protocol. Therefore to overcome these issues,an Ant colony optimization based energy efficient routing algorithm (AERA) has been proposed Also the performance of AERA and ERA under mobile sink based wireless sensor networks has been evaluated.
S.No.: 225
Title : Use of honeypot and IP tracing mechanism for prevention of DDos attack
Authors Name: Shantanu shukla
Authors Affilation: Pranveer singh institute of technology kanpur
Volume & Issue No.: Volume3Issue7
Abstract: A DDoS attack is a malicious attempt to make a server or a network resource unavailable to users, usually by temporarily interrupting or suspending the services of a host connected to the Internet. Everybody has been hacked one way or another when dealing with computers. DDoS attackers hijack secondary victim systems using them to wage a coordinated large-scale attack against primary victim systems. These attacks are not easily detected. One of the main difficulties in the detection and prevention of Distributed Denial of Service (DDoS) attacks is That the incoming packets cannot be traced back to the source of the attack, because (typically) they contain invalid or spoofed source IP address. For that reason, a victim system cannot determine whether an incoming packet is part of a DDoS attack or belongs to a legitimate user. Various methods have been proposed to solve the problem of IP traceback for large packet flows.
S.No.: 226
Authors Name: sharanjeet singh, vikramjeet singh
Authors Affilation: guru nanak dev university,regional campus, gurdaspur
Volume & Issue No.: Volume3Issue7
Abstract: A demosaicing algorithm is a digital image process used to reconstruct a full color image from the incomplete color samples output from an image sensor overlaid with a color filter array (CFA). It is also known as CFA interpolation or color reconstruction. The review has clearly shown that the problem of uneven illuminate has been ignored in the majority of existing research on CFA. The effect of the color artifacts has also been neglected in the existing research. The use of the illuminate normalization has also been neglected which can overcome the issue of uneven illuminate and color artifact. This research work deals with the edge strength filter based color interpolation along with the color normalization in such a way that it can reduce the artifacts of colors in efficient manner. MATLAB tool is used to design and implement the algorithm. The comparative analysis has clearly shown that the proposed technique outperforms over the available one.
S.No.: 227
Title : A Latency Reduction Mechanism for Virtual Machine Resource Allocation in Delay Sensitive Cloud Service
Authors Name: Rahul Kumar Sharma, Pragya Kamal, Dr.Sarv Pal Singh
Authors Affilation: 1M.tech Computer Science& Engg. Madan Mohan Malaviya University of Technology Gorakhpur, Uttar Pradesh, India
Volume & Issue No.: Volume3Issue7
Abstract: Resource provisioning in cloud is highly crucial to confirm the delivery of delay sensitive service through cloud like business transaction etc. Reservation into virtual machine takes place based on cloud resource availability. VM resource would be waste because a large number of virtual machine resources are often provisioned to confirm service response time. There were various techniques to measure service response time but these are for selected cloud infrastructures, analyzing and gathering to collect each dataset individually. Few techniques are perform better in offline analysis but not effective for real-time performance measurement. Now, we are proposed an improve and effective light weight mechanism for real time service latency prediction for optimum VM resource allocation in delay-sensitive services of cloud. Our aim is to present actual and accurate time delay and cloud resource conditions in short reflect time by our latency prediction mechanism. We are expecting to get 80-90% accurate service latency prediction in cloud resources.
S.No.: 228
Title : Contribution to development of a dynamic service adaptation architecture
Authors Affilation: 1Department of Electrical engineering and electronics University Aboubakr BELKAID Tlemcen ALGERIA
Volume & Issue No.: Volume3Issue8
Abstract: Dynamic service adaptation based software architecture has been projected in this article. The services are applying the reusable components. The objective of such adaptation protocol is to augment the functions of the services including their execution context. At an initial phase, user needs will be provided priority and later on other elements could be appended. In this very proposal a special feature of user profile has been suggested which will give the details of the components apart from the context’s elements. All the profiles are compared and compatibility has been checked through an adapter, incompatible regions are detected through this method. Adaptation solutions are investigated and applied via the same adapters and that is done through customization of the individual components wherever and whenever needed, insertion and replacement of the components depending on the need.
S.No.: 229
Authors Name: Dr.S.Thabasu Kannan, S.Shakeela Banu
Authors Affilation: Principal, Pannai College of Engg & Tech, Sivagangai – 630 561, Tamilnadu, India
Volume & Issue No.: Volume3Issue8
Abstract: With the increasing number of mobile terminals, it is a challenge how to reduce the cost and provide fast and efficient call delivery to the mobile terminals. In the existing system, the call is connected on the basis of the registration of their identity in the databases known as home location register and visitor location register. Here the mobility management is accomplished by a two-tier hierarchical architecture consisting of Home Location Register (HLR) and Visitor Location Register (VLR). It leads to a high volume of signaling traffic and it is suited up to a certain level of call to mobility ratio. The main aim of this paper is to upgrade the formula used for calculating the search cost and location updation cost. By this upgradation, the path traversed from one mobile system to other is reduced. Hence the time taken to retrieve the data is also minimized. Hence the performance can be improved. In this paper, we propose a mobility pattern based location tracking scheme based, which efficiently reduces the location updates and searching cost in the mobile networks. Here various formula used in the existing system has been revised to reach the objectives we have defined. Here we have updated the cost function of existing location management cost, which contains only the number of location updates and the number of paging performed. Here we have seen that the cost of a location update is usually much higher than the cost of paging-several times higher. But in our new scheme, we have defined the number of location updates performed, the number of paging performed, the movement weight associated, the call arrival weight, the vicinity value, the total number of cells in the network, and the set of reporting cells in the network.
S.No.: 230
Title : Designing an Automotive Brake Disc
Volume & Issue No.: Volume3Issue8
Abstract: using thermal as well as structural analysis while designing a brake disc and its practical results.
S.No.: 231
Authors Name: ANUSH DOGRA
Authors Affilation:
Volume & Issue No.: Volume3Issue8
Abstract: In this paper, we propose a simple but efficient image fusion method based on Ripplet transform. To check the efficiency of Ripplet transform type -1, we employ multisensor image fusion. The performance of image fusion is evaluated by Q AB/F metric.
S.No.: 232
Title : Importance of Industry Training for Engineering Undergraduate students-case study
Authors Name: Mrs. Veena Patki, Manasi Patki
Authors Affilation: 1Walchand Institute of Technology , Solapur, Maharashtra
Volume & Issue No.: Volume3Issue8
Abstract: This paper is an exploratory study based on training programs within the industry. The information gathered and discerned in this paper will explore the training needs of the engineering students in industry and will give an insight on effectiveness of training in industry. Training is the activity that are designed to provide learners with the knowledge and skills needed for their jobs. Formal education from academic institutions is basically the proper venue for acquiring appropriate knowledge and skills necessary for future employment. Training is part of the tertiary curriculum which connects the gap between theory and practice as well as between classroom education and real industry life.
S.No.: 233
Title : Experimental study of MIG welding and solid state welding for age hardenable AA 7075 aluminium alloy
Authors Name: U.K.Ghodwade, S.S.Patil , Dr. C.L.Gogte
Authors Affilation: M.B.E.Society’s College of engineering, Ambajogai, 431517(M.S.), India
Volume & Issue No.: Volume3Issue8
Abstract: High strength age hardenable 7xxx series aluminium alloy such as AA 7075 is commonly found in several key components of aircraft and automobiles. These alloys are difficult to join by conventional fusion welding techniques. Realizing a weld joint in such alloys without impairing the mechanical properties is difficult task. The 7xxx alloys among the Al-Zn-Mg-Cu versions provide the highest strengths of all aluminium alloys. AA 7075-T6 aluminium alloys with thickness of 3mm were butt welded using friction stir welding and metal inert gas welding (MIG). The joints were compared in terms of electrical conductivity (% IACS), a physical property of aluminium alloy used to define relationship of changes in alloy composition and metallurgy. The same joints were also assessed for hardness and micro structural properties. The results show that the solid state FSW joints have higher electrical conductivity and hardness than MIG joints. The width of heat affected zone of FSW joints is narrower than the MIG fusion welds indicating better mechanical properties. An attempt has been made to correlate the electrical conductivity and the hardness in different weld regions, and found that electrical conductivity and hardness are non linear to each other in FSW joint, but they cannot be co-related to each other in MIG welded joint.
S.No.: 234
Title : A Novel Application Development Approach by SOSE Principles
Authors Name: Musa Midila Ahmed & Sukumar Letchmunan
Authors Affilation: School of Computer Science University Sains Malaysia
Volume & Issue No.: Volume3Issue8
Abstract: SOSE is concern with the theories, principles, methods and tools for building flexible and dynamic business solutions. The main aim of SOSE is to align business requirements with appropriate technological capabilities to achieve overall organizational goals. First, three approaches for service identification; top-down, bottom-up, and meet-in-the-middle techniques are presented, followed by service identification and realization techniques. This technique identifies candidate services as well as decision either to reuse existing service or build service from scratch. Second, building service from scratch requires modeling the organizational business flow. Consequently, BPMN and UML are adopted. The main goal of BPMN is to generate an easy mechanism to construct a business process model to handle the complexities of business organization. UML is used for capturing and expressing relationships, behaviors, and ideas for easy understanding. Finally, the implementation aspect of SCA artifacts enables writing business logic in executable languages such as BPEL, Java, C++, spring, PHP, etc. Service composition is the combination of service components to form a business solution.
S.No.: 235
Title : A procedure to extract defects density induced by electrical stress using gate induced drain leakage current model in n-channel thin film MOSFET Transistors
Authors Name: noureddine maouhoub
Authors Affilation: Faculté des sciences. Université Ibn Zohr
Volume & Issue No.: Volume3Issue9
Abstract: In this work, a procedure has been used to extract the defects density induced by stress on gate induced drain leakage current. The method includes the calculating of experimental ratio of the GIDL current after stress and before stress. We apply different steps of negative stress and positive stress on MOSFET by electrical constraints to validate this procedure and extract the defects density. The transistor used in this work has been fabricated in CNET with oxide thickness equal to 8 nm.
S.No.: 236
Authors Affilation: DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING Beant College of Engineering & Technology
Volume & Issue No.: Volume3Issue9
Abstract: The principle problem of QoS routing would be to setup a new multicast hierarchy that may meet specific QoS concern. In order to lessen the constraints of the earlier work a whole new improved approach is proposed with this exertion. Inside of proposed technique the challenge of multi-cast sapling is removed using clustering primarily based technique. For starters multi-radio along with multichannel primarily based clustering will be deployed along with these bunch head have the effect of the multicasting. Its going to diminish the general energy consumption of nodes along with complexity of intelligent algorithms. The way will end up being evaluated based upon the ish colony marketing. Thus they have produced better results in comparison with other strategies.
S.No.: 237
Title : Designing a GIS Web Basefor locating Health Care locations in KSA Using Google Earth
Authors Name: Dr.Samir MahmoudAdam Abdoalla
Authors Affilation: Computer Science Department, Applied Medical Sciences College, Taif University, Kingdom of Saudi Arabia (KSA)
Volume & Issue No.: Volume3Issue9
Abstract: This study focuses on the development of a web-based GIS for public healthcare system using GIS web base application choosing Google Earth as a sample . The development of thissystem is motivated to provide opportunities for the healthcare workers to gain access to vital information that canaid him/her in the location of viable hospitals for the patients to fully enjoy available enhanced healthcare services. Currently, three major problems still exist in the healthcare geographic applications. This relate to health mappingmethods, reusability of health applications, and interoperability issues. To handle these problems, we design a Web basedGIS for Public healthcare system to support health data sharing and representation. The developed modelmakes it possible to locate the nearest hospitals as well as the services they rendered. With Google Earth, youll be able to see math concepts in a different light. Theyre worth exploring and understanding fully. In Google Earth youll be able to interact with the concepts and see how theyre evident in real life. These lessons are sure to be more interesting than just another page in a math text.
S.No.: 238
Title : Cloud based Mobile Video Recommendation System with User behavior
Authors Name: Ms. Latika R. Gaddam, Mrs. Pratibha S.Yalagi
Authors Affilation: Walchand Institute of Technology Solapur, India
Volume & Issue No.: Volume3Issue9
Abstract: Nowadays, Countless online video services are available Users usually waste lot of time to obtain their interested videos in browsing and watching those videos on mobile. The existing result shows the poor service quality of video streaming over mobile network such long buffering and interrupt happen in the streaming video. The proposed system is a video recommendation system which can speed up the recommendation process and reduce network overhead. The mobile video streamed by using the cloud. For video-sharing mobile application Mobile properties are collected for context aware recommendation. The Cloud based recommendation system is created with Mahout Machine learning library. Core algorithms of Mahout are used for classification, cluster and collaborative Moreover filtering. We use Mahout’s user and item based recommendation and user behavior. The System collects user, item, rating, genre and viewing time for creating clusters of user profiles to generate implicit preferences video recommendations. Mobile properties such as location, time and network types are used to generate recommendation rules. User context and profile clusters are used for finding video recommendation from the massive amount of video collection on cloud. The proposed system can recommend desired services with high recall, high precision and low response delay.
S.No.: 239
Title : Smart Intrusion Detection System (Double guard)
Authors Name: Jadhav Priya Babaji,Hadawale Shwetali Namdev,Pinjarkar Nilesh R.
Authors Affilation: Sahyadri Valley College Of engineering and technology,rajuri
Volume & Issue No.: Volume3Issue9
Abstract: For enabling communication and the personal information management from anywhere, an inextricable part of daily life is the Internet services and applications. To entertain this increase in application and complexity of data, web services have moved to a multi-tiered design wherein the application front-end logic runs by the web server and to a database or file server the data are outsourced. In this system, we propose an IDS system which is Double Guard, that models the network user sessions behavior across both the back-end database as well as the front-end web server. By monitoring both web and subsequent database requests we are able to ferret out attacks that independent IDS would not be able to identify. Furthermore, in terms of sessions of training and functionality coverage we measure any multitier IDS limitations. With My SQL and lightweight virtualization with the help of an Apache web server we implement Double Guard. In both dynamic and static web applications the real-world traffic then processed and collected over a 15-day of system deployment period. Finally, using Double Guard, we will able to display a wide range of attacks which will give the 100 percent accuracy while for web services which are static, 0 percent false positives maintain by it and for web services which is dynamic, it is 0.6 percent false positives.
S.No.: 240
Title : Smart Traveller- Proficient Taxi Business Application
Authors Name: Jadhav Mayuri Vilas,Gadge Varsha Anil,Aher Priyanka S.
Authors Affilation: Sahyadri Valley College Of engineering and Technology,Rajuri
Volume & Issue No.: Volume3Issue9
S.No.: 241
Authors Name: Mansi Sharma, Asst. Prof. Mr. Praveen Gupta
Authors Affilation: Pranveer Singh Institute of Technology Kanpur, Uttar Pradesh, India
Volume & Issue No.: Volume3Issue9
Abstract: Software quality is the characteristic of the software that defines how well the software meets the customer requirements, business requirements, coding standards etc. It can be divided into two categories: Software Functional Software Functional Quality: characteristics that define how well the software meets functional requirements, and how well it satisfies the end-user. Software Non-Functional Quality: characteristics that define how well structural requirements are met that support the delivery of functional requirements. It is usually related to software code and internal structure. Following are the different attributes (parameters) that are used to measure the software quality: Testability ,Usability ,Understandability ,Consistency, Efficiency ,Effectiveness ,Accuracy ,Maintainability ,reliability ,Portability ,Security, Robustness and testing is first step towards software quality this paper depicts how testing helps to measure the software quality as objective of testing is to find the defect and get them fixed as early as possible. This paper also describes how we can achieve quality assurance through use of selenium IDE tool and how communication take place between developer and tester through bugzilla tool?
S.No.: 242
Title : View Selection Issues in Data Warehouses Environment
Authors Name: Mr. Ashish S. Sambare Dr. R. Nedunchezhian
Authors Affilation: Anna University Chennai
Volume & Issue No.: Volume3Issue10
Abstract: On-Line Analytical Processing (OLAP) tools are frequently used in business, science and health to extract useful knowledge from massive databases. An important and hard optimization problem in OLAP data warehouses is the view selection problem, consisting of selecting a set of aggregate views of the data for speeding up future query processing. A view always shows up-to-date data. The database engine recreates the data, using the view’s SQL statement, every time a user queries a view. The goal of on-line analytical processing (OLAP) is to quickly answer queries from large amounts of data residing in a data warehouse. Materialized view selection is an optimization problem encountered in OLAP systems. In computing, a materialized view is a database object that contains the results of a query. For example, it may be a local copy of data located remotely, or may be a subset of the rows and/or columns of a table or join results, or may be a summary based on aggregations of a table’s data.
S.No.: 243
Title : Determination of Water Demand Management in GCC Using GIS
Authors Name: Dr.Samir Mahmoud Adam Abdaalh
Authors Affilation: Computer Science Department, Faculty of Computers and Information systems Taif University, Kingdom of Saudi Arabia (KSA).
Volume & Issue No.: Volume3Issue10
Abstract: GCC(Gulf Councel Countrie ) is facing potential water shortages. The alarming increase in the scarcity of water in various parts of the world. Water is a main issue in many countries especially in those GCC, it has focused a global attention on the need for a stronger and more appropriate water resource management and availability solutions. imperative for nations to come up with more focused and direct measures that would address and stem this resource scarcity. Water sustainability needs a balance between demand and availability. The main objective ofthis paper is the application of these concepts to Arabs countries. Water demand management is about achieving a reduction in the use of water resources, normally through increased efficiency of water application. The management of water resources was not explicitly included in the past from thirty-five years in all most of those countries normative system partly because water was believed to be a free good in mind, and was not accepted to have a price to pay to use it. This work contributed to a low efficiency of water use and waste of it, and water prices are often well below levels needed to cover the costs of the system. Moreover, this contributes to a worse quality of water, and, as quality of water decrease, the management of water resources becomes more challenging and the need to integrate water quality into an overall water resources management grows. The main goal of this paper is showing, how Geographical Information Systems (GIS ) can be used to support infrastructure planners and analyst on water demand of a local area in GCC they are (Saudi Arabia ,Kuwait, Bahrain, Oman and UAE).
S.No.: 244
Title : One to one mapping list for SQL Injection attack detection System
Authors Name: Swati Dwivedi
Authors Affilation: Jawaharlal nehru college of technology,Rewa (m.p.)
Volume & Issue No.: Volume3Issue10
Abstract: Web application are always susceptible to attacks, as many attacking techniques are present for web application, banking ,reservation, education etc and various applications are completely dependent on Internet.SQL Injection attack, one of the major and open attacking technique ,which destroys web application by the analysis of database finger printing and signatures. The SQL Injection attack occurs due to modification of dynamically generated query. here, the mapping techniques checks the authenticity of query with the attacking points ,if found in query ,It if tested on different query dataset and the results are comparable
S.No.: 245
Title : Design and Development of Head Motion Controlled Wheelchair
Authors Name: Satish Kumar, Dheeraj, Neeraj, Sandeep Kumar
Authors Affilation: MIT CEM BANI, Hamirpur (H.P.), India
Volume & Issue No.: Volume3Issue10
Abstract: The aim of the project is to design a wheelchair tilt communicator system that could operate the wheelchair of the handicapped person with the help of tilt of head movements. This system could be used by physically disable persons who cannot move their hands or legs but make head and eye motions. This wheelchair could be operated in any direction using head tilt movements by the handicapped person. Design and development of Head motion controlled wheelchair has been achieved using tilt sensors and wireless modules. The system is implemented practically and works well with a person sitting on it and has a weight bearing capacity of upto 100 kg. This wheelchair is aimed to be designed at a lower cost as compared to the other versions available in the market. The head motion controlled wheelchair designed using tilt communicator system turns out to be a great use for quadriplegic patients and disabled people having more than 45% or more disability as this could be operated easily through head gestures. Index Terms—, Tilt sensors, Wireless control, Gesture based control, Gear Ratio.
S.No.: 246
Title : Image Steganography using DWT Transform Compression
Authors Name: Poonam Survase
Authors Affilation: RSCOE
Volume & Issue No.: Volume3Issue10
Abstract: Steganography is proved to be effective if it provide two attributes: high security and second optimum compression. Image compression is obtained as it not only reduces storage but also benefits transmission. In this paper the image steganography is achieved with enhanced security by using QR code and compression using DWT transform algorithm , compression is achieved without affecting vision of the actual cover image due to addition of secret information which is in form of QR codes. The process for embedding the QR codes has been carried out using Embedding and Extraction algorithm which insures secure and fast transmission of stego image. Here aim is to conceal a secret image into the cover image of the reduced size without noticeable degradation . The effectiveness of the proposed method has been estimated by computing Mean square error (MSE) and Peak Signal to Noise Ratio (PSNR).
S.No.: 247
Title : Tumor detection with EEG Signals usingWavelet Transform
Authors Name: Ankush Surkar
Authors Affilation: Priyadarshini COE Nagpur
Volume & Issue No.: Volume3Issue10
Abstract: The Brain tumor harmful disease of brain. 10 Billion or more working cells contained in a brain cells. Normally, damaged cell turnover takes place in an orderly and controlled manner. If in curtained condition the process gets out of control then the cells will continue to divide and developing into a lump, that causes a tumor. Brain tumors are classified into two types that is primary brain tumor and secondary brain tumor. The detection of primary brain tumor which is also called as Gliomas is possible by analyzing EEG signals. This paper, proposes a method to classification EEG signal for detection of primary brain tumor detection, that is combination of multi-wavelet transform and artificial neural network. Uncertainty in the EEG signals is measured by using the Approximate Entropy. The proposed method will implemented, tested and compared with existing method based on performance indices such as sensitivity, specificity, accuracy; results are promising with accuracy of upto 80%.
S.No.: 248
Title : Analysis on Brake Shoe of ICF Bogies
Authors Name: Ambikaprasad Omprakash Chaubey
Authors Affilation: GHRCE , NAGPUR
Volume & Issue No.: Volume3Issue10
Abstract: An overview of design methods for thread braking systems is given with special focus on the braking capacity. Several aspect of the tread braking system, important for the dimensioning of railway brake shoe pad, are assessed, such as brake block material, residual stresses and temperature gradients through wheel disc. The influence of heat partitioning between wheel, brake block and rail on wheel temperature for different braking cycle is consider. The existing air brake system of Railway coach has the following drawbacks due to excessive brake force on the brake blocks - thermal cracks on wheel tread, brake binding and reduced life of brake block. The aim of the project is to overcome the above said drawbacks by reducing the effective brake force on the brake blocks without affecting the existing designed (Braking Function) requirements. To validate the strength of train brake, Structural and Modal analysis are to be done on the train brake.. In this project we are going to do failure analysis on brake shoe by stress analysis and thermal analysis using software and after that we will suggest alternative solution to avoid or reduce the problems.
S.No.: 249
Authors Name: PROSUN ROY
Volume & Issue No.: Volume3Issue11
Abstract: Wind turbine is a device that extracts kinetic from wind and converts it into mechanical energy. These can only be understood with a deep comprehension of the aerodynamics. This paper focuses primarily how the blade captures wind power. The majority of the paper details the analytical approach for the analysis of aerodynamics and performance of wind turbine blades. The analysis of aerodynamic behavior of wind turbines can be started without any specific turbine design just by considering the energy extraction process. Additionally, more advanced method “blade element momentum theory” (BEM) is also introduced briefly. A number of mathematical and analytical treatments have extended the knowledge of the physics and mechanics behind the aerodynamics forces. Actually, this article outlines briefly an overview of wind turbine blade analysis based on aerodynamic forces i.e. lift force and drag force. Indeed, the design of blade according to aerodynamic requirements is crystal clear through this paper.
S.No.: 250
Authors Name: Miss.Sayali D. Wavikar, Miss. Swapnali S. Ravle
Authors Affilation: Students Master of Computer Application MGM’s Jawaharlal Nehru Engineering College (JNEC), Aurangabad, Maharashtra, INDIA.
Volume & Issue No.: Volume3Issue11
Abstract: This research paper gives a useful idea for a device which is beneficial for every removable-drive users. This portable device is a embeded system, which will check memory or size of USB-drive and also check how much amount memory is vacant or full.This device can also copy data from one removable drive to another and also using bluetooth connectivity and WI-FI connectivity to this device we can able to transfer or receive data of mobile phones to and from attached removable drive .The most important feature of this device is that when removable drive is attached to it, it scans and removes the viruses and malicious data which is in USB- drive and act as a antivirus. This system which is capable to attach two removable drives,one towards the input and another towards the output side. This device also has a display screen which is touch sensitive, and very easy for user convenience and efficient.Portable device provides facility to choose folders or files customizable and also can see size of file. It works on small and chargeable battery with a backup of 4 to 5 hours. It is a most useful device to use it on the move.
S.No.: 251
Title : IT Governance Model Based on IT Governance Framework, Case Study: Universities in North Sumatera, Indonesia
Authors Name: Roni Yunis; Kristian Telaumbanua
Authors Affilation: Department of Information System STMIK Mikroskil, North Sumatera Indonesia
Volume & Issue No.: Volume3Issue11
Abstract: IT Governance framework can be identified by three elements in it such as, elements of structure, process, and IT Governance relationship mechanism. In this paper we will discuss about elements of IT Governance Model based on IT Governance component that accordance with the needs of the higher education. The use of IT Governance component based on components delivered by M. Mohseni [1] and add some new components based on previous research [2]. All these components were selected and analyzed again by the CIO perspective at several universities with case studies; universities in North Sumatra, Indonesia. Element of IT Governance model ranging from policy, structure, IT management processes, standards and procedures used in support of good IT Governance for Higher Education. Model IT Governance of Higher Education cover by IT Governance Framework COBIT 5, objective of model to align IT and business strategies. Element of model IT Governance can be adoption by Higher Education institution for governance and management of information system and technologies.
S.No.: 252
Authors Name: Dr. D. V. BHOPE
Volume & Issue No.: Volume3Issue11
Abstract: Abstract: A thin cylindrical pressure vessel has been analyzed for different end connections using analytical and finite element analysis. The main objective of project is to compare stress distribution in the pressure vessel for different end connections viz. hemispherical, flat circular, standard ellipsoidal and dished shape. The various dimensions of pressure vessel like internal diameter, thickness of vessel and end connections has been decided using analytical design and three dimensional model is prepared in modeling software Pro-E and analyzed using FE tool ANSYS. The analysis has been carried out for 2-D axysymmetric analysis, 3-D horizontal pressure vessel with saddle support and vertical pressure vessel over the stand.
S.No.: 253
Title : 3D Reconstruction based on multiple images views
Authors Name: H. Bakry, S. Abdel-Ghani, S. M. Kareem
Authors Affilation: Information Systems Department, Faculty of Computer and Information Sciences, Mansoura University, Egypt
Volume & Issue No.: Volume3Issue11
Abstract: The extract key points and matching the pictures are the most paramount reconstruction 3D factors. They almost two-thirds the time of reconstruction. This paper presents a method to extract the most paramount key points, through the use of GrabCut algorithm that elimintes considerable parts of images that does not have its prominence in the reconstruction moreover, the proposed algorithm uses siftGPU algorithm that run parallel to any process more than one image at a time to extract key points and carry out matching process. The experiments show that the proposed system increase of the speed of reconstruction and thoroughly good.
S.No.: 254
Title : An enhancing approaches using Delphi Against Wormhole Attacks Detection in MANET.
Authors Name: Akanksha khare
Authors Affilation: BIST Bhopal
Volume & Issue No.: Volume3Issue12
Abstract: Wireless network is at its peak nowadays to be connected anytime and anywhere popularity is desired. Mobile Ad Hoc Network (MANET) is a former and existing infrastructure to determine the topology of wireless mobile nodes that do not need, have been distributed. In this work we, through the wormhole attack detection and prevention, which is helpful to present a mechanism for Receiver for different path delay and verification of digital signatures by looking at the signs of Per Hop (Delphi) and TTL delay. These systems detect and pinpoint the location of the wormhole to stop them.
S.No.: 255
Volume & Issue No.: Volume3Issue12
Abstract: Power transmission is a very important tool in electrical engineering field. In power transmission it is very necessary to communicate from on location to another. For such communication it is generally desired to have a wired communication but that cost too high and also faces the problem of interference of power frequency of 50Hz /60Hz with communicating frequency of GHz. To win over this problem certain improvement in wired communication or else wireless communication can be chosen but wired communication is given priority over the wireless communication due to economic considerations and the complexity of the wireless communication. Also wireless communication use is prohibited in the radioactive zone of the nuclear plants. Here a brief detail on the power communication using Optical fiber will be presented.
S.No.: 256
Title : Possible benefits, returns and the economic rewards of Medical Tourism in Zimbabwe.
Authors Name: Maphosa Thembinkosi
Authors Affilation: Scholar Department of Tourism, Leisure and Hospitality Management, University of Zimbabwe.
Volume & Issue No.: Volume3Issue12
Abstract: Medical Tourism also called health tourism or medical travel describes the private purchase and arrangement of medical care by patients across international borders. It is a rapidly growing industry. There are many factors or rewards that medical tourism can contribute to the host economy; such as: Economic growth, advanced technology, advancement in communications, providing better, access to health care, information, and improved logistics and healthcare standards and tourism revenues. With these factors above, the pool of patients to Zimbabwe must expand naturally. Currently the pool of patients is described more with internal movements such as rural (clinic) to urban (hospital). There is need to expand the pool so to attract external medical tourists and more internal medical tourists.
S.No.: 257
Title : Strengthening in AODV routing protocol by Flooding Attacks discrepancy of TTL parameters to improve overall recital
Authors Name: Sushma Kushwaha
Authors Affilation: Bansal Institute of Science and technology
Volume & Issue No.: Volume3Issue12
Abstract: Mobile ad hoc networks (MANETs) mobile nodes connected by wireless links to self - configuring the network. Self configurability and rapid deployment of MANET feature that enables users to the most attractive option. Routing in the network decides the network performance, which is an important issue. Ad Hoc on-demand distance vector (AODV) routing algorithms are widely used is reactive protocol. Energy consumption and the delay to a number of researchers is the main concern which has to solve. Due to the unbalanced node to use, battery powered nodes drain faster than some of the others. Re-discovery of this pathway in delay and larger than average end to end control overhead is causing a problem. In this paper we gain an improved AODV protocol in which a copy of diversity and flooding attacks are presented. Proposed protocol can improve energy among nodes, the average end -to-end network delay, a delay reduction, which reduces and stabilizes the system conserves and introduces a stability factor. An NS3 simulator is used to compare the performance of AODV and AODV. Simulation results of the variation of node mobility, stoppage time , with the rate of network field and sent packets are observed by wireless network scenarios . The result of the delay in mobile scenarios is energy consumption and end to end QoS and other parameters without affecting much, show significantly decreases. Also proposed improved packet delivery protocol
S.No.: 258
Title : Big Data-Survey
Authors Name: P.S.G. Aruna Sri, Anusha M
Authors Affilation: K L University
Volume & Issue No.: Volume3Issue12
Abstract: Big data is the term for any gathering of information sets, so expensive and complex, that it gets to be hard to process for utilizing customary information handling applications. The difficulties incorporate investigation, catch, duration, inquiry, sharing, stockpiling, Exchange, perception, and protection infringement. To reduce spot business patterns, anticipate diseases, conflict etc., we require bigger data sets when compared with the smaller data sets. Enormous information is hard to work with utilizing most social database administration frameworks and desktop measurements and perception bundles, needing rather enormously parallel programming running on tens, hundreds, or even a large number of servers. In this paper there was an observation on Hadoop architecture, different tools used for big data and its security issues.
S.No.: 259
Title : A review on Static Three Point Bending Load on Composite Sandwich Panel.
Authors Name: Nitin Ratan Gir
Authors Affilation: college of engineering osmanabad ,BAMU university.
Volume & Issue No.: Volume3Issue12
Abstract: The use of sandwich structure continues to increase rapidly due to the wide fields of their application, for instance: satellites, aircraft, ships, automobiles, rail cars, wind energy systems, and bridge construction to mention only a few. The sandwich composites are multi-layered materials made by bonding stiff, high strength skins facings to low density core material. The main benefits of using the sandwich concept in structural components are the high stiffness and low weight ratios. In this paper static behavior of honeycomb sandwich composites are investigated through three-point bending.
S.No.: 260
Title : A Survey Paper on Prepaid Electricity Distribution System
Authors Affilation: Chhatrapati Shivaji Institute of Technology
Volume & Issue No.: Volume3Issue12
Abstract: The electricity energy saving scheme is used in business, agriculture, domestic and general purpose. The problem occurs in postpaid scheme is, there is no control of use of electricity from the consumer side and the problem of collection of meter reading and also in generating the bill. In this project technique used for prepaid scheme using smart meter included the embedded system and GSM for sending and receiving the SMS through GSM network. Smart meter is a meter which is attached with the existing meter in embedded system which helps the consumer to send a SMS for their day to day power consumption. The aim of this project is to control the consumption of electricity in consumer side. Establish a communication network between the consumer and service provider using GSM. Service provider verify the meter id and card number and accept the request and recharge the meter. The aim of this project is to minimize the queue at the electricity billing counters and to retrieve the electricity automatically. The project also aims at proposing a system that will reduce the loss of power and revenue due to power theft and other illegal activities. The automated billing system will keep doing of real time consumption and will leave little scope for disagreement on consumption and billing. The project also addresses about various debugging tools such as Keilμ4 Vision. Smart meter enable two-way communication between the meter and the central system. Smart meters are also believed to be a less costly alternative to traditional time of uses meter and are intended to be used on a wide scale with all customer classes.
S.No.: 261
Title : Implement of Image Authentication by Encryption Procedure using LDPC Codes
Authors Name: imran khan , Mr, k.suresh , Miss Ranjana Batham
Volume & Issue No.: Volume3Issue12
Abstract: In this paper, we prefer a way using encryption technique and LDPC origin coding for the image authentication complication. Image authentication is relevant in contented delivery via entrusted intermediaries, just for peer-to-peer (P2P) file sharing. More separatly encoded versions of the original image efficacy exist. In addition, intermediaries may tamper with the contents. Diffrent appropriate diversity from mean manipulations is the protest addressed in this research. The main idea is to add a Slepian-Wolf encoded quantized image point as verification data which is repeatedly encrypted using a secret key cryptography since ready to send. This might be correctly decoded with the advice of an authentic image as side information. This structure provides the like robustness across appropriate variations although find illegitimate modification. The decoder absorb expectation maximization (EM) algorithms may authenticate images whatever have supported contrast, brightness and even corrupt alteration. Our different authentication system also others changing localization by using assumption over a factor graph that represents tampering model.
S.No.: 262
Title : Medical Tourism an economic activity; focus on marketing Zimbabwe as a potential medical tourism destination
Authors Name: Maphosa Thembinkosi
Authors Affilation: Scholar, department of Tourism, Leisure and Hospitality Studies, University of Zimbabwe
Volume & Issue No.: Volume4Issue1
Abstract: Present day developing economies such as India, South Africa and Nigeria are making maximum use of medical tourism as a strategy to continuously improve their economies and lure more tourists. At the same-time this research explores and examines the potential impact of medical tourism on Zimbabwe’s economy. The research brought out a positive relationship between medical tourism and the economy in Zimbabwe. It enlightened that medical tourism can improve standard of living, foreign currency reserves, balance of payments, economic relations with other economies and employment. On the other hand, what puzzles most and can be a challenge to implement medical tourism in Zimbabwe is the ‘needs’ of patient movement. Internal / domestic patients make movements more focused on medical reasons than tourism activities. External / international patients are more for tourism activities than economic activities. However there testimonies of external patients who have received and are still receiving medical treatment in Zimbabwe, from either a medical doctor, traditional healer, apostolic sect healers or from hot springs. Key words: Medical tourism, economic development, internal and external patient movement.
S.No.: 263
Title : Performance of Dual-Bridge High Frequency Resonant DC/DC Converter for Energy Storage Application
Authors Name: Gurupal K. Gaishane, Anil S. Sindekar
Authors Affilation: Government College of Engineering Amravati
Volume & Issue No.: Volume4Issue1
Abstract: A bidirectional dual-bridge high-frequency isolated resonant DC-DC converter is gaining more attention in renewable energy system due to its high power density, small size, reducing stress and removing electromagnetic interference noise. In this paper the simulation of dual bridge LC-L resonant converter is carried out for resistive and battery load. The simplified steady state analysis using complex ac analysis is given and conditions for zero voltage switching are presented accordingly. A closed loop control operation of a converter using PI controller is suggested to minimize the reverse power flow for battery load.
S.No.: 264
Title : Open and Distance Learning Assessments value chain challenges: An explorative study of BOCODOL School of Business and Management studies
Authors Name: Phetogo Sechele- Mosimanegape and Clever Gumbo
Authors Affilation: BOCODOL and Botho University, Botswana
Volume & Issue No.: Volume4Issue1
Abstract: This empirical study has explored the role and importance of quality assurance through the open and distance assessments value chain systems. A value chain framework is an approach for breaking down the sequence (chain) of Open and Distance learning (ODL) systems into the strategically relevant activities through which efficacy is added to the learners’ assignments and examinations systems. This paper has considered the relationship between quality assurance and open and distance education, and between quality assurance and learners’ assignments and examinations systems .It is our conviction that quality assurance for distance higher education is a prerequisite that guarantees competitiveness of an institution’s qualifications thereby instilling stakeholders’ confidence. To instill and retain its desired credibility, an open and distance learning institution should be benchmarked on robust integrated quality assurance processes through the value chain systems. This study focused on assignments and examinations mode of assessment in business. Constrained resources (financial, human, technological), outsourcing of the tutors, and lack information and technology systems were found to be the main challenges against quality sustainable assessment systems. This study was done in Gaborone (Botswana) and Francistown through face to face interviews with eight (8) various stakeholders. While there are many quality drivers towards ODL products, this study found that the main determinants of effective quality assurance through the assessment value chain include effective corporate governance, efficient and effective human capital, modern information technology based systems supported by a sound funding foundation.
S.No.: 265
Title : Hierarchy Based Distributed Scheduling Algorithm for Mobile Data Gathering in WSN
Authors Name: U. Palani
Authors Affilation: Associate Professor & Head, Department of Information Technology, I.F.E.T College of Engineering, Gangarampalayam Post, Villupuram-605 108 Tamil Nadu,
Volume & Issue No.: Volume4Issue1
Abstract: In this paper, priority based distributed scheduling algorithm for mobile data gathering in Wireless sensor networks (WSN) is proposed. This proposed method involves data exchange policy to avoid dropping and then distributed scheduling algorithm for data gathering. Initially, the centralized algorithm places the polling points (PPs) on the shortest path. These polling points (PP) buffer locally aggregated data and upload the data to the mobile data collector when it arrives. The data is classified as high and low priority based on the deadline and urgency. At the second module, data exchange policy is processed and it is used in order to avoid dropping of higher priority data, data can be exchanged between two mobile data collectors. Finally in the distributed scheduling algorithm, the time slots are scheduled according to which the data collector could gather the maximal amount of data within a limited period. By simulation results, we show that the proposed algorithm minimizes the data losses and reduces energy consumption.
S.No.: 266
Title : Prediction Based on Ant Colony For Handover Management in PCS Networks
Authors Name: Alyaa Abdou Hamza 1, Ahmed.I.Saleh 2, Mohamed sherif elkasas3
Authors Affilation: Mansoura University, Faculty of Engineering, Department of Computer Engineering and Systems, Mansoura city, Cairo
Volume & Issue No.: Volume4Issue1
Abstract: Mobile phones are used in everyday life exceedingly, human behaviors can be detected by analyzing mobile phone data. Handover (handoff) is one of process which affects the quality of the call during users’ mobility from cell to another. In this paper, we propose a new mechanism to reduce handover problem by predicting the future movement of mobile users. This mechanism is Ant Prediction Engine (APE) is used when a user has insufficient history or a new mobile user. It depends on neighbors’ history to predict future user mobility.
S.No.: 267
Title : Appraisal Management System using Data Mining Classification Technique.
Authors Name: Nikhjil N. Salvithal, Dr. R. B. Kulkarni
Authors Affilation: Walchand Institute of Technology, Solapur, Maharashtra.
Volume & Issue No.: Volume4Issue1
Abstract: Performance appraisal may be a method within which staff are rated on however well they need met performance expectations. Performance appraisals are meant to support employees’ selections, as well as promotions, terminations, training, and remuneration will increase. This task involves lots of social control selections that depends on numerous factors like human expertise, knowledge, preference and judgment. of these factors will cause inconsistent, inaccurate, difference and unpredictable selections. DM is rising knowledge analysis tool and wide utilized in order to supply valuable information for deciding. DM classification methodology are often used for talent statement, particularly for employee’s job promotion. within the planned system the assorted classifier algorithms are going to be applied on Talent dataset to spot the talent set so as to judge the performance of the individual. Finally counting on accuracy one best suited classifier is chosen this method has been used to construct classification rules to predict the potential talent that helps in determining whether or not the individual is acceptable for promotion or not.
S.No.: 268
Authors Name: mansour mohmmed abdel-halim
Authors Affilation: faculty of engineering-ain shams university-cairo-egypt
Volume & Issue No.: Volume4Issue1
Abstract: ABSTRACT One of the most common floor systems is the flat slabs. It provides architectural flexibilities, more clear space, less building height, easier form work and consequently shorter construction time. A serious problem that can arise in flat slab is the brittle punching shear failure due to shear and moment transfer from slabs to columns. As a result of the combined effect of the moment and the shear, stress is no longer uniformly distributed in the vicinity of the column. High- strength concrete is a new type of concrete that having mechanical properties that are far superior to those of conventional concrete. The main characteristics of HSC are then improved. This thesis discusses the behavior of punching shear strength of flat slabs subjected to centric and eccentric loading, with and without shear reinforcement. In this way, 5 concrete slabs (1450 ×1450×150) with edge column; and reinforced by 10diameter 18mm/m bottom steel; and 5 diameter 10/m top steel for all slabs; were casted to examine different parameters such as concrete strengths and effect of shear reinforcements (central mesh and shear studs). A finite element program (ANSYS® Release 14) was applied to model the tested specimens to predict the behavior and compatibility between experimental and theoretical investigations to display the difference in behavior considering cracking and failure loads as well as deformations and strains. Keywords: punching shear, shear reinforcement, flat slabs, and high strength concrete.
S.No.: 269
Title : Improved fuzzy technology for instant searching
Authors Name: Bhagyashri G. Patil and S. N. Holambe
Authors Affilation: TPCT COE, Osmanabad
Volume & Issue No.: Volume4Issue1
Abstract: Query logs provides a way that how users using search techniques. Depending how data is collected log is created which contain additional information. Query log collect information without disturbing users from normal interaction with system. Normally query logs collect information such as identification of users and or results of query typed by users. Generally now days most of researchers uses information collected by query log for search process of search engines. Information collected by query log is used for any different ways such as to provide context during search, for query classification, for intention of search. Query log are important in information retrieval.
S.No.: 270
Title : Review on Email Spam Filtering Techniques
Authors Name: Shiva Sharma, U. Dutta
Authors Affilation: Computer Science and Engineering Department, Maharana Pratap College of technology Putli Ghar Road, Near Collectorate, Gwalior-474006, Madhya Pradesh, India
Volume & Issue No.: Volume4Issue2
Abstract: In this paper we present email spam filtering and email authorship identification. Electronic mail is used by millions of people to communicate around the world daily and is a mission-critical application for many businesses. Over the last 10 years, unsolicited bulk email has become a major problem for email users called senders and receivers. And the recent years spam became as a big problem of internet and electronic communication known as users. There is developed lot of techniques to fight them. We presents the overview of existing e-mail spam filtering methods is given. The classification, valuation and juxtaposition of traditional and learning based methods are provided. I think using this paper user can understand easily spam filtering techniques and user can protect from spammed mails to financial damage, mentally damage to companies and annoying individual users.
S.No.: 271
Title : Minimal grasper
Authors Name: Rajina c
Authors Affilation: malabar institute of technology Anjarakandy,Kannur
Volume & Issue No.: Volume4Issue2
Abstract: A fliexible enveloping grasper is proposed for grasp and place task with low manipulation and task planning complexity for practical applications .The proposed grasper has two main characteristics self adaptively and flexibility These two properties helps the grasper to minimize internal forces and to achieve successful force distribution.
S.No.: 272
Title : Security & Concurrency control in Real-Time Database Systems: A Survey
Authors Name: Ebrahim Abduljalil1, Dr.S.B.Thorat2
Authors Affilation: School of Computational Science, SRTM University, Nanded, Maharashtra, India
Volume & Issue No.: Volume4Issue2
Abstract: Real-time Database Systems (RTDBS) ought to fulfil timing constraints related to transactions. Usually, a timing constraint is stated as a deadline, which is characterized as a necessity to be utilized by schedulers. Currently, security becomes another significant challenge in several real-time systems. In many systems, sensitive information is expressed by numerous users with various levels of security clearance. More complicated database systems are now being employed in applications that need to support timeliness while coping with sensitive information. Key issues of real-time developers have been addressed in this paper. Furthermore, an extensive survey of real-time systems research has been presented. The survey classification of the proposed mechanisms has been proposed based on the security and concurrency control in RTDBS.
S.No.: 273
Title : Multiple Biometric System Application: Iris And Fingerprint Recognition System
Authors Name: Pradnya Shende, Dr. Milind Sarode
Authors Affilation: Jagadambha college of engineering and technology, Yavatmal-445001,(MS)
Volume & Issue No.: Volume4Issue3
Abstract: In day today life security is most important issue. Biometric detection system is one of those system which is more secure than other security system i.e. Password, card etc. This paper introduces advantage of iris and fingerprint recognition system because this multi-biometric recognition system also used image processing and liveness detection technique for identifies the fake and genuine user. This system not only capable of working with a very good performance under multi-biometric systems, but it also provides a very good level of protection against certain non-spoofing attacks (multi-attack).Iris and fingerprint detection is an important module in an iris Recognition and fingerprint Recognition system to reduce the risks of being spoofed by fake iris and fingerprint patterns and at the sensor input.
S.No.: 274
Title : FEA and Experimentation evaluation of Composite Sandwich panel under Static Three Point Bending Load
Authors Name: Nitin Ratan Gir
Authors Affilation: college of Engineering osmanabad, Maharashtra ,India.
Volume & Issue No.: Volume4Issue3
Abstract: The use of sandwich structure continues to increase rapidly due to the wide fields of their application, for instance: satellites, aircraft, ships, automobiles, rail cars, wind energy systems, and bridge construction to mention only a few. The sandwich composites are multi-layered materials made by bonding stiff, high strength skins facings to low density core material. The main benefits of using the sandwich concept in structural components are the high stiffness and low weight ratios. In this paper, composite panel made of 8 layers of Glass fiber sheets arranged with different degree of orientation is taken into consideration. Gradually increasing loads(1KN-7KN) are applied to check the behavior of honeycomb sandwich composites through three-point bending. The objective of this work is to minimize weight of sandwich panel with respect to bending stiffness and strength.FEA results are compared with experimentally tested results.
S.No.: 275
Title : Regenerative Braking system via flywheel
Authors Name: Abrar Ahmed, Arpit Intwala
Authors Affilation: DY Patil College Of Engineering Akurdi, Pune
Volume & Issue No.: Volume4Issue4
Abstract: ABSTRACT Usually in cars hydraulic brakes are used, which converts the excess of kinetic energy into heat, due to which there is energy lost. Regenerative braking technology focuses on converting this kinetic energy of the decelerating wheels back into electrical energy so we can use this energy again, for example during acceleration. Currently new hybrid vehicles are installed with such braking technology, which makes them particularly interesting for situations where there is frequent deceleration, like in traffic. However, the technology used in these vehicles has its limitations and therefore,we have to use this technology with conventional hydraulic brakes. This paper removes the limitation mentioned above and allows a vehicle to fully rely on regenerative braking technology to deal with all braking situation from slowing down a vehicle to stop a vehicle. To enable this, multiple generators are used which have different gear ratio. One more advantage of using this construction is , by introducing the appropriate control circuit, the generators can be used as electrical engine. As the motors are connected with different gear ratios so at any speed we can get a consistent acceleration. This paper shows us that the ,overall efficiency of the system is nearby to the efficiency of the generators used while achieving braking performance which is similar to conventional braking mechanisms.
S.No.: 276
Authors Name: SASIKALA.D
Volume & Issue No.: Volume4Issue4
Abstract: The objective of this paper is used to find expiry date of the product by using RFID technology. Nowadays in shopping mall big rushes is available for billing to reduce rush and save time .we go for smart billing system using RFID technology. This project is used in shopping complex for purchase the products. In this project RFID card is used as security access for product. If the product is put in to the trolley means it will shows the amount and also the total amount. But in this project RFID card is used for accessing the products and also find the expiry date of the product. If the product is expired it will indicate by a buzzer sound. So this project improves the safety measures of the human beings and also the speed.
S.No.: 277
Title : wireless transmission using magnetic resonance circuits
Authors Name: himanshu garg
Authors Affilation: rbs engineering technical campus bichpuri agra
Volume & Issue No.: Volume4Issue4
Abstract: Since the industrialisation of the world our power requirement are increasing day by day but due to massive usage of wire installation which behaves like a nervous of out earth which link from place to place and time to time increasing day by day , which includes the thermal, hydro ,wind ,nuclear power plants but main disadvantage arises when we are using these methods to installation of power wire transmission system it cannot operate easily due to hindrance offered by corona, atmospheric condition & some man made disturbances like voltage rise and strictly dropdown which is not quite feasible .according to wireless power transmission phenomenon with magnetic resonance circuit we achieved. How to overcome all the losses & easy efficiently transmitting the magnetic flux with the desired range even the receiving end we can absorb lots of transmitted flux from that kind of range easily & this make crated a hope of world without the transmission without wire.
S.No.: 278
Title : Design and Analysis of Hydro Test Rig for GGCB Forged Valve with 4 Stations
Authors Name: Rajat Suresh Shinde,Saurabh Bapusaheb Gharge,Rajat Balasaheb Shinde,Akshay Sunil Shinde
Authors Affilation: NBN Sinhgad School of Engineering, Ambegaon (BK), Pune, India
Volume & Issue No.: Volume4Issue4
Abstract: Hydro testing as the name suggests using water as the working fluid. It is used to detect leakages present in the valves such as Gate, Globe, Check and Ball valves (GGCB Valves). The water is used as testing as well as working fluid which gives the exact results. Since water is incompressible it can be pressurised at high pressures without significant change in its volume. Valve to be checked is subjected to the high pressure when it is clamped to the hydro test rig. The pressure for testing is verified by the ANSI standard used for manufacturing the valve. It includes two types of leakage tests namely ‘body leakage test’ and ‘seat leakage test’. The main components of hydro test rig are design by theoretical method and the same design is checked by finite elemental analysis method using ANSYS 15.0 software.
S.No.: 279
Authors Name: B Ragashree Narasimha, Leena Chandrashekar
Authors Affilation: R N S instiyute of technology, Bangalore
Volume & Issue No.: Volume4Issue4
Abstract: Preprocessing techniques aims at an improvement of an image data that suppresses unwanted distortions or enhance some image features important for further processing. Filtering techniques discussed in this paper is spatial domain and frequency domain filters. The other type of preprocessing technique discussed is edge detection. It helps in finding the discontinuities of image. The various applications are remote sensing, medical imaging, military, printing etc;. The few advantages of preprocessing techniques, it enhances image quality, increases contrast, reduces poor illumination, distortion and so on
S.No.: 280
Title : A Formal Model based on Priorities and Distributed implementation of Arbitration Protocols for MPSoCs Architecture
Authors Name: Maroua Ben Slimene, Imen Ben Hafaiedh
Authors Affilation: Tunisia Polytechnic School (EPT), Higher Institute of computer Scicence of Tunis (ISI), LIP2
Volume & Issue No.: Volume4Issue4
Abstract: In digital system design, control access protocols are used to allocate shared resources. Whenever a resource, such as a bus is shared, an arbiter is required to assign the access to the resource at a particular time. In SoC (System on Chip) architectures, the design, analysis and implementation of such arbiter, has become increasingly important due to its significant impact on the performance and efficiency of such systems. In this paper, we provide a high-level abstract and formal model of MPSoCs architecture. The proposed model provides a way to easily implement, analyze and compare different arbitration protocols. It also allows to study relevant properties such as fairness and deadlock freedom at a high level of abstraction. The studied protocols as well as the MPSoC architecture have been modeled in a distributed manner which makes the generation of a distributed implementation more relevant.
S.No.: 281
Title : A Statistical Method of Knowledge Extraction on Online Stock Forum Using Subspace Clustering with Outlier Detection
Authors Name: N.Pooranam,G.Shyamala
Authors Affilation: sri shakthi College of Engineering and Technology
Volume & Issue No.: Volume4Issue5
Abstract: Financial stock Data Analysis and future prediction in terms of Sentiments is great challenge in the big data research. Among the unlabeled opinion, opinion classification in terms of unsupervised learning algorithm will lead to classification error as data is sparse and high dimensional. To overcome this problem, the sentiment analysis to extract the opinion of each word in the stock data has been proposed. Moreover the data size is large, hence the singular value decomposition to resolve the inconsistent constraints correlating to the large dimensions, and dimensionally reduced feature set is been used. The dimensionally reduced feature set is classified into clusters through employment of Principle component analysis which is used to calculate the strength of actionable clusters with utilization of the domain knowledge and validate the optimal centroids dynamically. Cluster data which further inconsistent with the outlier probability can further reduced through subspace clustering. Experimental results prove that the proposed framework outperforms the state of art approaches in terms of precision, recall and F measure. Keywords: Opinion mining, sentiment analysis, Singular Value Decomposition, Principle Component Analysis, Subspace Clustering.
S.No.: 282
Volume & Issue No.: Volume4Issue5
Abstract: The Printed Circuit Generator is a type of generator which is coreless and have many specific features. The construction model used in this is called pancake model in which axial magnetic field is used to get flat construction. In this paper single sided PCB is fabricated. In stator part printed or welded windings are used and are mounted on a glass fibre circuit board forming a disc shaped structure. This structure rotates in the gap between the pair of magnets which are set up around the disk. A pair of metal end caps hold the magnets in a small block named as pancake which completes the magnetic circuit. The rotor part is mounted above the stator core and is free to rotate axially. The major aim of our project is to generate electricity using a test model of printed circuit generator at low and variable wind speed replacing the conventional permanent magnet wind generator model.
S.No.: 283
Title : Wireless Network Vulnerabilities A Review
Authors Name: Dr.Pramod Sharma , Danish Sharma , Nitin Kasana , shivam shrivastava, krishna kumar singh sengar , Mayank Sharma
Volume & Issue No.: Volume4Issue5
Abstract: As per CERT Annual report there is rapid increase in Cyber Crime From 2008 – 2015 . There is an increase of 130,338, in 2014 it was 127,773 . They are divided in security incidents which are website Defacements , malicious code , Network Scanning , Phisihng , Etc . In all over the world Hacking can be done easily , The main & First Ingredients for Hacking Is Internet . In Earlier times Hacker uses – proxy servers , Hide ip’s , MAC Spoofing , Etc. To hide it’s own identity , But now a day’s they used a new technique which is called wi-fi Hacking . The main Advantages to use this is that firstly his identity is hide & the second is police arrested the owner of wi-fi or internet provider because the ip address which is police is search in investigation is same as the ip address of the wi-fi owner. Rencently this type of cases is increases rapidly & reported in many cyber cells . So in this paper we’ll discuss that how hacker hack wi-fi & which type of security protocol is best for the public user’s.
S.No.: 284
Title : Improved Tumor Detection Using Modified Hough Mertic Trasformation
Authors Name: Kirna Rani
Authors Affilation: Computer Science of Engineering Guru Nanak Dev University Amritsar
Volume & Issue No.: Volume4Issue5
Abstract: The brain tumor detection is a very important vision application in the medical field. In this paper, an efficient brain tumor detection using the object detection and modified hough metric has been proposed. To enhance the tumor detection rate further we have integrated the proposed object based tumor detection with the Decision based alpha trimmed global mean. The proposed technique has the ability to produce effective results even in case of high density of the noise. This approach has been tested on various images thus defining an efficient and robust technique for automated detection and segmentation of brain tumors.
S.No.: 285
Title : modelling and vibrational analysis of front loading washing machine
Authors Name: vishal patil, prof A V Patil
Volume & Issue No.: Volume4Issue5
Abstract: Current environmental awareness demands the improvement of washing efficiency. Talking about efficiency, the first thought that comes to mind is optimization. The basic factors that lead to optimization in a washing machine are its washing capacity, power consumption, cost and vibration. In terms of power consumption, two third of all electrical energy generated is consumed in industry. Many of the above parameters can be approximately optimised by solving the problem of Vibration.In a washing machine, vibration of the outer tub causes vibration of the frame and the force transfers from the supports of the frame to the floor. Although springs and dampers between the outer tub and the frame, and rubber cushions have reduced these vibrations, it is difficult to efficiently design the stiffness coefficients and the damping coefficients of these mechanical components. Thus, various washing machine vibration analysis models have been proposed at various unbalanced conditions in this paper. In this report we are concentrating on reducing the vibrations of the drum with the help of maintaining optimum coefficient of dampers and stiffness of the springs.
S.No.: 286
Title : Fading Multiplicative Noise Model Estimation for Low Lightness Images
Authors Name: Ali Jabbar Karam, Ali Abid D.Al – Zuky, Heba Kh. Abbas, Anwar H. Mahdy
Authors Affilation: Department of Information Technology,Kalar Technical Institute, Sulaimani Polytechnic University, Iraq
Volume & Issue No.: Volume4Issue5
Abstract: Abstract The study of image processing that deals with low lightness and low contrast has a major importance in many applications in several fields especially surveillance and security systems, under water imaging, night vision in bad vision conditions like: rain, fog, dust, aerial and medical Imaging. Low-light images accompanied by high proportion of noise and defects and this considered big problems for the digital images in this fields. Therefore, this study focused on low lightness effect on captured test images (black and white targets) using two types of cameras (Samsung and Sony). Lighting environment is controlled by a lighting system depending on three fluorescents of light with different sizes and power Estimating mathematical model for the noise accompanied with captured images under low lightness for each camera. Where have been captured several images in different lightness values from (0 Lux to 7 Lux). Then computed the probability distribution for the estimated multiplicative noise separately in each image targets (black target and white target).After that using Table Curve Software to estimate the best matching eq. with noise distributions. This model represents the multiplicative noise that combine between the Gaussian function and expositional function. The results show that best matching is dependent on the correlation factor which exceeds 90 %. Whereas, the best matching of the black region for test images is for Samsung camera sensors for multiplicative noise, while in the white region of the test images, the best matching of the results is for Sony camera.
S.No.: 287
Title : optimize design and analysis of chassis of an quad bike
Authors Name: S.A , Puviyarasu, V.S. Ukkeshwar
Authors Affilation: Dr. NGP institute of technology adithya institute of technology
Volume & Issue No.: Volume4Issue5
Abstract: Abstract— The epicentric goal of this study is to optimize design and analysis a quad bike chassis. This is an ATV based platform that comprises of various automotive components like chassis for which more durable design is a primary requirement as these vehicles are more concentrated on rider safety parameters and all other requirements. In order to accomplish this task, various tests like front impact, rear impact, side impact tests were made with the aid of theoretical calculations. The design of chassis of the vehicle using PTC CREO 2.0 software and analysis is carried out using ANSYS software.
S.No.: 288
Title : Information Cryptical Steganalysis Detection Technique by PSNR and RGB Intensity
Authors Name: Md. Sohel Ansari, Prof. Deepak Jain
Authors Affilation: 1M-Tech student. Organization: JNCT, Bhopal, India,
Volume & Issue No.: Volume4Issue6
Abstract: Abstract- We all know day by day technologies become strong hacker and terrariums attacked become more power full as per older techniques for cryptical messages inside images. In this research paper propose a high-tech region-adaptive steganalysis algorithm which will be used for the legend application to detect watermark attacks. The major advantages of the proposed steganalysis detection technique is RGB Intensity value, PSNR values and NC values which is allows tamper detection using linear classifier by given that these selective features. In the watermark processes data is embed on diverse location of the targeted image using a combination of discrete wavelet transform (DWT) and singular value decomposition (SVD) technique. In addition, there is a new use the major region-adaptive steganalysis technique to detect attack, if certain types of attack have occurred. As will be elaborate, the method to improve the efficiency of detection, Test the robustness of the projected steganalysis method. Histogram Equalization, Gaussian Noise, Sharpen, Salt and Pepper Noise, JPEG Compression, and Smoothing are the major attack. Some different system effect robustness of the projected steganalysis which are translation, rotation, and scaling belongs to geometric attacks. The cruelty of these attacks can be adjusted by modifying their corresponding factor values. Experimental results will detect the cryptical data on the original image or targeted images file.
S.No.: 289
Title : Image Mining for Mammogram Classification by Genetic Association Rule Mining Using Intensity Histogram and GLCM features
Authors Name: Aswini kumar mohanty, Amalendu Bag, Devitosh Acharya
Authors Affilation: 1Kmbb college of engg Bhubaneswar,Odisha
Volume & Issue No.: Volume4Issue6
Abstract: Breast cancer is the leading cause of cancer death among women. Screening mammography is the only method currently available for the reliable detection of early and potentially curable breast cancer. Research indicates that the mortality rate could decrease by 30% if women age 50 and older have regular mammograms. The detection rate can be increased 5-15% by providing the radiologist with results from a computer-aided diagnosis (CAD) system acting as a second opinion. However, among screening mammograms routinely interpreted by radiologists, very few (approximately 0.5%) cases actually have breast cancer. It would be beneficial if an accurate CAD system existed to identify normal mammograms and thus allowing the radiologist to focus on suspicious cases. This strategy could reduce the radiologists workload and improve screening performance. Image mining is concerned with knowledge discovery in image databases. Since mammography is considered as the most effective means for breast cancer diagnosis, this paper introduces multi dimensional genetic association rule mining for classification of mammograms. The image Data mining approach has four major steps: Preprocessing, Feature Extraction, Preparation of Transactional database and multi dimensional genetic association rule mining. The purpose of our experiments is to explore the feasibility of data mining approach. Results will show that there is promise in image mining based on multi dimensional genetic association rule mining. It is well known that data mining techniques are more suitable to larger databases than the one used for these preliminary tests. Computer-aided method using association rule could assist medical staff and improve the accuracy of mammogram detection. In particular, a Computer aided method based on association rules becomes more accurate with a larger dataset .Experimental results show that this new method can quickly and effectively mine potential association rules.
S.No.: 290
Title : Revolution Technique To Enhance Cognition of Sensor Nodes in ZigBee Network with Advertisement Packets
Authors Name: Mr. Ravi Kumar Singh, Prof. Amit Saxena
Authors Affilation: M-Tech (CSE), TIEIT, Bhopal, *Prof. (CSE), TIEIT Bhopal, (M.P.) India
Volume & Issue No.: Volume4Issue6
Abstract: A ZigBee network platform is developed to improve performance under a wide range of conditions and for both unicast and broadcast packets over ZigBee networks that support multi-hopping. Both ZigBee networking and IEEE 802.15 Transport layer utility like fragmentation and reassembly which are performed at the application layer, since the ZigBee network does not have a fragmentation support. Observations and resulting statistics are presented, and the MAC schedule provides to increase in lifetime for different traffic scenarios in the get/broadcast schedule to robotically coordinate the nodes that can decrease packet delivery delays, which can provide an increases efficiency and also throughput will increases. At the similar time, an increase in packet size boost the lost in packet. This is because the radio transmits for packet or until interrupted, whatever the packet size. The advantages of ZigBee are reduced further when the data packet size achieve that of the advertisement size because the advertisement packet is no longer easier to hear than the data packet. As discussed, we begin this evaluation with the simulation of an analytical model, and verify it with a Matlab implementation.
S.No.: 291
Title : Moroccan human resources between educational system and labor market
Authors Name: ELMORTADA Asmaa, MOKHLIS Ahmed, ELFEZAZI Said and MOKHLIS Chams Eddoha
Authors Affilation: 1-Higher School of Technology (Cadi Ayyad University), Safi city, Morocco 2- National School of Applied Sciences (ENSAJ_UCD), El Jadida city, Morocco 3-National School of Business and Management (ENCG) – Morocco
Volume & Issue No.: Volume4Issue6
Abstract: Since the independence, the Moroccan education system is the subject of a continuous attention from state and private authorities, because of his key role in the restructuring of the desired new Morocco. However, increased economic disruption and demographic development have a profound impact. Therefore, the secession of experienced mutations recovered, continually questioning the quality of higher education, including its relevance to the needs of the labor market. The concern of this article is, first, to describe the evolution of the strategies adopted by the Moroccan university through the past. On the other hand, we will try to highlight the impact of policies on the global landscape of higher education in the light of the competitive corporate culture, as well as the desired level of progress.
S.No.: 292
Authors Name: Neelam Sharma, Sonia Batra
Authors Affilation: Affliated to MDU Rohtak: Computer Science and Engineering World College of Technology and Management Gurgaon, Haryana, India
Volume & Issue No.: Volume4Issue6
Abstract: Cloud computing is basically up gradation to grid computing. It is very amazing technology because we can store data remotely on the cloud server it means it is location independent and service avail on rental basis also. According to NIST [1] Cloud computing is a model for convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. Rather than lots of features it is also having security issues. Sometimes the data kept on cloud can be misused or stolen. So in this review paper we basically discuss about the issues develops due to security and the solution given by different researchers. Security is one of the most vis-à-vis issue of Information technology Issue. To keep structural or user data is primary concern. If organizations data is not safe on cloud then there is no use of ever-changing from old technology to cloud technology. There are lot of Non-Profit Organization (NPO) which are helping and creating responsiveness about security issues of cloud computing. One of such organization is CSA (Cloud Security Alliance) that issue a report in each year regarding most popular security issues in cloud computing. CSA reports they identified nine infamous security threats to cloud which can harm users individual data without knowing them. Here we discuss these types of issues in this paper.
S.No.: 293
Title : MRI Brain Image Tumor detection & Classification
Authors Name: Shrikant Burje, Prof.Dr.Sourabh Rungta, Prof.Dr.Anupam Shukla
Authors Affilation: Rungta College of Engineering & Technology, Bhilai
Volume & Issue No.: Volume4Issue6
Abstract: A hybrid approach is being proposed for classification of brain tissues in magnetic resonance images (MRI) based on the approach adopted. A wavelet based texture feature set is derived. The optimal texture features are extracted from normal as well as tumor regions by using spatial gray level dependence method (SGLDM). The Proposed technique resolves the big problem of classification techniques. These optimal features are then used to classify the brain tissues into benign, normal, or malignant tumor. The performance of the algorithm is evaluated based on a series of brain tumor images.
S.No.: 294
Authors Name: harman preet kaur, vikramjeet singh guraya
Authors Affilation: guru nanak dev university, regional campus, gurdaspur
Volume & Issue No.: Volume4Issue6
Abstract: Software re-engineering is the process of introducing the changes in the existing software to adapt to the changes in the environment. One of the major goals of the software re-engineering is to select that software version in which we have put in the least effort with the maximum positive output which means that we spend a little amount and do minimum changes and get the better software as output. There are number of versions available for a single software. So selecting the software version which is best suitable for re-engineering is considered to be a critical task. We usually prefer that software in which we have to do the minimum changes and we get the best new software version. As the new versions are developed for a software, unintentionally the bugs are introduced into the software versions and the complexity of the software is increased. So selecting the best and the most feasible software version for software re-engineering is a very important. We would be considering the open source software for experimental purpose. In this dissertation, we have developed the hybrid metric by considering the three different metrics which are LCOM, CBO and DIT which helps in evaluating the best software. These three metrics are considered to effecting the software with more impact so we have selected these three metrics for developing the hybrid metric. The main aim of this dissertation is to evaluate the best alternative for software re-engineering using hybrid code metric. The experimental analysis has been done on the different versions of jChart2d software in order to validate that among all the versions of this software which version is best suited for software re-engineering.
S.No.: 295
Title : Safetronic Technology using ultrasonic sensor
Authors Name: Vishwas B S, Satishkumar
Authors Affilation: The National Institute Of Engineering Mysuru
Volume & Issue No.: Volume4Issue6
Abstract: Accident will occur every time and everywhere and cause worst damage, serious injury and dead. Accidents are caused mostly due to the delay in applying of brakes and the wrong decisions taken by the driver like opening the doors at the wrong time and place. This work is designed to develop a new system that can solve this problem where drivers may not brake manually but the vehicles can stop automatically due to obstacles and locks the door at the extreme rear collision scenarios. This work is about a system that can control the central locking system of the car. Using ultrasonic transducer as a ranging sensor, its function based on ultrasonic wave .After transmit by transmitter, the wave can reflect when obstacle detected and receive by receiver.
S.No.: 296
Title : An Enhanced Light-weight Proactive Source Routing Protocol using DIFT-BFHS for MANET
Authors Name: Dr. N. Rama, Justin Sophia. I
Authors Affilation: 1Associate Professor, Post Graduate and Research Department of Computer Science,
Volume & Issue No.: Volume4Issue7
Abstract: A mobile ad hoc network (MANET) is a baseless wireless communication network with a collection of mobile nodes, these nodes are not lies within the direct transmission range of each other but depend on the intermediate nodes for data transmission. In multi hop wireless networking the opportunistic data forwarding related research has drawn much attention. The main reason for opportunistic data forwarding has not been widely utilized in mobile ad hoc networks (MANETs) is lack of an effective lightweight proactive routing feature with strong source routing capability. In this research the PSR working is modified by Depth-first iterative-deepening combined with the best first heuristic search to maintain the information of the entire network topology. DIFT-BFHS spanning tree is constructed to maintain the network topology information. Instead of periodically updating this information, the updation is made only when modification occur, in network topology through the nodes. This makes the neighbor node discovery process simple and reduces the routing overhead, therefore the energy is saved as much as possible.
S.No.: 297
Title : Processing Natural Language and Grading it using Artificial Intelligence
Authors Name: Ricky Yadav
Authors Affilation: Vivekanand Education Societys Institute of Technology
Volume & Issue No.: Volume4Issue7
Abstract: Online Test are conducted now a days to evaluate a persons knowledge regarding a subject. The best way to evaluate a persons understanding regarding a subject is to let him answer the question in his natural language. But the situation is this that we dont have such systems which can examine a users natural language answers. Hence, I propose a unified neural network architecture approach that can be applied to various natural language processing tasks including part-of-speech tagging, chunking, named entity recognition, and other tasks. Natural language processing is an area of artificial intelligence that defines a set of methods and techniques used to automate the translation process between computers and humans or mediate the human-machine communication. Also we will be grading the answer given by the user, so the refined output of NLP will be given for further processing. Once the overall processing of the answer is done we will get the grades out of 10 by applying some formulas to the passage, sentences and there words.
S.No.: 298
Title : Integration of Spring-based Web application with OSGi
Authors Name: Sangeeta Oswal, Krutika Tawde , Harshvardhan Singh, Pankaj Singh
Authors Affilation: VESIT, Mumbai
Volume & Issue No.: Volume4Issue7
Abstract: The objective of this paper is to enlist the integration steps &challenges faced during integration of a spring MVC based web application archive (WAR) with OSGi and measures taken to handle them. The WAR consisting of more than ten sub-applications provide a rich set of functionality like reporting, job scheduling, clustering, multidimensional online analysis respectively. The idea was to redesign the sub-apps as loosely coupled but highly cohesive modules. OSGi framework was adopted keeping in mind the potential for releasing the sub-apps in future, as independent modules that can be easily integrated with existing Data Analysis solutions or used as stand-alone web application. The service component architecture and modular nature of OSGi were the key aspects sought for undertaking this endeavour.
S.No.: 299
Title : Implementing Web Browser that Detect and Block Phishing Attack
Authors Name: Priyanka Raut
Authors Affilation: Ballarpur Institute Of Technology, Ballarshah(M.H)
Volume & Issue No.: Volume4Issue7
Abstract: Phishing is a type of cyber attack where the attacker creates a replica of an existing webpage with an aim to acquire information such as usernames, passwords and credit card details of the users by fooling them into submitting personal data to what they think is their service provider’s website. In this work, we present, a novel, algorithm to detect phishing web sites,based on the characteristics of the hyperlinks used in the phishing attacks and the content in the website. We also discuss how this approach is better than all other existing methods.
S.No.: 300
Title : Survey on Dust Network and Energy Efficiency Communications in Wireless Sensor Network
Authors Name: Gayatri Devi, Suvendra Kumar Jayasingh, Rajeeb Sankar Bal
Authors Affilation: 1Professor, Department of Computer Science and Engineering, ABIT, Sector-1, CDA, Cuttack, Odisha, India
Volume & Issue No.: Volume4Issue7
Abstract: Recent technological innovations made in electronics and wireless communications have fostered the development of wireless sensor networks (WSNs). A WSN typically consists of many small, low cost, low-power communication devices called sensor nodes. But Dust Networks, a pioneer in the field of wireless sensor networking, is defining the way to connect smart devices. Dust Networks delivers reliable, resilient and scalable wireless products with advanced network management and comprehensive security features. Thousands of Dust-enabled networks have been deployed around the globe, securely connecting a wide variety of smart devices to applications that are delivering on the promise of a smarter, greener, more efficient planet. In wireless sensor network, there are two types of sensor nodes as a representative single hop heterogeneous network. For multi-hop homogeneous networks (sensor nodes use multi-hopping to reach the cluster head), we propose and analyze a multi-hop variant of LEACH that we call M-LEACH. We show that M-LEACH has better energy efficiency than LEACH in many cases.
S.No.: 301
Title : Identify the Attack in Embedded Image with Steganalysis Detection Methodby PSNR and RGB Intensity
Authors Name: Md. Sohel Ansari, Prof. Deepak Jain
Authors Affilation: #1M-Tech student. Organization: JNCT, Bhopal, India, *2Designation: Professor, JNCT, Bhopal, India
Volume & Issue No.: Volume4Issue7
Abstract: In this research paper we plot experimental result and analysis report of propose a high-tech region-adaptive steganalysis algorithm which will be used for the legend application to detect watermark attacks. From the experiment result it is clear that major benefits of the proposed steganalysis detection technique is RGB Intensity value, PSNR values and NC valueswhich is allows tamper detection using linear classifier by given that these discerning features. In addition, there is a new use the major region-adaptive steganalysis technique to detect attack, if certain types of attack have occurred. As will be elaborate, we find that the method is improve the efficiency of detection, testingof the robustness of the projected steganalysis method. We use some major attack technique which is given as Sharpen, Histogram Equalization, Salt and Pepper Noise,GaussianNoise, Smoothing, and JPEG Compression.Were different system are effect the robustness of the projected steganalysis which arescaling, rotation, and translation belongs to geometric attacks. The cruelty of these attacks can be adjusted by adjusting their equivalent factor values. Experimental results and Analysis report show that will detect the crypticaldata on the original Host image or targeted images file.
S.No.: 302
Authors Name: Aswini Kumar Mohanty, Mrs. Arati Pradhan, Mrs. Swasati Sahoo
Authors Affilation: KMBB Collegw of Engg & Tech,Daleiput,Khurda, Odisha, India
Volume & Issue No.: Volume4Issue7
Abstract: An improved image mining technique for breast tumor classification using pruned association rule with MARI algorithm is presented in this paper. The method proposed makes use of association rule mining technique to classify the mammogram breast images into two categories namely benign and malign. It combines the low-level features extracted from images and high level knowledge from specialists. The developed algorithm can assist the physicians for efficient classification with multiple keywords per image to improve the accuracy. Here using Associationrule mining, performs benign-malignant classification on region of interest (ROI) that contains mass. One of the major mammographic characteristics for mass classification is texture. ARM exploits this important factor to classify the mass into benign or malignant. The statistical textural features used in characterizing the masses are mean, standard deviation, entropy, skewness, kurtosis and uniformity. The main aim of the method is to increase the effectiveness and efficiency of the classification process in an objective manner to reduce the numbers of false-positive of malignancies. Association rule mining was proposed for classifying the marked regions into benign and malignant and 93.81% sensitivity and 97.11% specificity is achieved that is very much promising compare to the radiologists sensitivity 75%.
S.No.: 303
Title : A hybrid D-STATCOM with T-connected Transformer used to mitigate power quality issues
Authors Name: Mohd Navaid Ansari
Authors Affilation: Oriental Institute of Science AND technology bhopal
Volume & Issue No.: Volume4Issue7
Abstract: Now a days electrical power faces several quality issues like voltage distortion, load unbalancing, excessive neutral current due to harmonics. In this paper, a hybrid D-STATCOM with T-connected transformer and a single phase Active Power Filter is used to reduce harmonics and to compensate the neutral current. SRF based control algorithm is used to control the D-STATCOM. The complete model is designed in MATLAB Simulink environment and the results are shown.
S.No.: 304
Title : CFD Analysis & Experimental investigation of NACA0018 Blade Profile for Darrieus Turbine
Volume & Issue No.: Volume4Issue8
Abstract: In present work an attempt is made to investigate the Lift and Drag forces for wind turbine blade at 4000 Reynolds number and different chord length i.e.15cm & 25 cm. In this work NACA0018 airfoil profile is considered for analysis of wind turbine blade. The Lift and Drag forces are calculated at different angle of attack varying from 0o to 80o by Computational Fluid Dynamics (CFD) analysis. The values of CL and CD for this Reynolds number is much important in analysis of Darrieus and horizontal axis type of wind turbine blade, still it these values are not available from the literature reviewed . From CFD analysis it is concluded that as Reynolds number increase lift forces and drag forces decreases for particular chord length and if chord length increases CL and CD increases. And Comparison has been done on NACA0018 for all two chord length and from that we concluded that NACA0018 at 15cm provides maximum lift and drag. Keywords: Lift coefficient, Drag coefficient, angel of attack, NACA Blade profile, Chord length.
S.No.: 305
Title : Design and development of tractor rear loader arrangement for material handling in constructional applications
Authors Name: More sagar kailas
Authors Affilation: P.D.V.V.P.C.O.E.Ahmednagar
Volume & Issue No.: Volume4Issue8
Abstract: This rear loader attachment is developed to minimize the labor work as well as to minimize a time for material handling in various applications like constructional work. It is simple in construction and can be easily attached with the existing rear mechanism of any tractor so no need to develop a new mechanism for rear loader attachment. This attachment is developed to overcome the various limitations which other earth moving equipment have like larger size, heavier in mass generally in tones etc. Rear loader is designed with components which are easily available in market so maintenance and replacement of components is not a problem. Important benefit of this design is that, it allows mower desk to stay attached to the tractor while providing quick engagement-disengament features. Unskilled person can also operate this arrangement very easily as it does not requires any special training which requires while working with other machines like lathe machine. The loader arm and bucket assemblies are completely detachable from the tractor in landscaping task. This rear loader attachment also allows for a greater load carrying capacity and lift range. It can pick up a load up to 120 kg to 150 kg and has enough lift to be able to put loads of mulch, soil and gravel. Various models of tractors like Arjun (605), Mahindra (575), Swaraj (744), Sonalika (855) Select tractor-Arjun (605) can use this rear loader attachment as accessory without changing its actual mechanism at rear side. It can lift weight of material up to 5 to 8 fits. Its capacity of load lifting can be improved by small changes in design and it can be improved up to 200 to 250 kg. Its cost is much lower as compare to other accessories available in market. Keywords: bucket assemblies, lower cost, quick disconnect, Rear-End Loader.
S.No.: 306
Title : identification of fruits and vegetables using colour representation
Authors Name: neeraja n,karthika p,mena chandran
Authors Affilation: cochin college of engineering and technology,valanchery
Volume & Issue No.: Volume4Issue9
Abstract: Picking or Harvesting is one of the most effort-requiring and time-consuming link in fruit production operation which, according to statistics, approximately accounts for 40% of all the working out. With the aging of population and the decrease of farming labour force, fruit picking robots have become the research hotspot in the present agricultural mechanization. A new fruit recognition system has been proposed, which analysis color in order to increase accuracy of recognition. In the proposed system the RASPBERRY PI hardware is used to perform the image processing. It gives more accuracy when compared to the existing systems. In this work the above methodology is used which in turn uses a micro camera to capture the image which is compared with the reference image in the RASPBERRRY PI.
S.No.: 307
Title : Design of Automated Resume Extraction System Using Horspool and Karp-Rabin Algorithms
Authors Name: P.Gajalakshmi, Dr.V.Ramesh
Authors Affilation: Sri Chandrasekharendra Saraswathi Viswa Mahavidyalya, University,Enathur,Kanchipuram-631561.
Volume & Issue No.: Volume4Issue9
Abstract: Human resources departments of organizations receive infinite resumes on regular basis, making it more tedious for the HR person to find the best job candidates. In fact, an employer receives an average of 144 resumes per job opening. According to market status, companies depend extensively on assessment tools to select the best suitable candidates for job positions. While most of the companies are turning to software tools that quickly identify the best candidates, the process of evaluation involves challenges in both the sequence of actions by HR and the quality of execution for each procedure. The question is whether the right candidates were chosen, as per the requirement of the jobs. The aim of this study is to provide an efficient resume extraction tool using keyword matching pattern algorithm. Single keyword pattern matching means locating all occurrences of the search pattern in the input text string. It occurs naturally as part of data processing, text editing, text retrieval, and so on. Many text editors and programming languages have facilities for matching strings. The core objective of this work is provide a simplest and well-organized resume automation tool. This tool is fast in data retrieval and therefore saves time. The working logic of this involves the combination of two keyword Pattern matching algorithm (HP&KR). Using the proposed algorithm, the data is processed to determine which applicants are the best fit for a particular job based on a powerful combination of skills, work experience, location etc. The algorithm devised in this research keeps the organizations needs as the prime aspect in evaluating the candidates.
S.No.: 308
Title : Object Removal and Region Filling In Image
Authors Name: Pankaj Bagal & Ravi Kateeyare
Authors Affilation: Central India Institute of Technology,Indore
Volume & Issue No.: Volume4Issue9
Abstract: Sometimes people have been taken photographs, there has been the need to remove unwanted artefacts or damaged areas from these images. This is something previously conducted by experts, using computer tools and extensive user input to produce a visually real-istic result. The difficulty of the problem lies in how to fill the missing regions, such that they are perceptually unnoticeable, whilst minimizing user input. Object removal and region filling algorithm proposed for removing unwanted objects from digital images. The challenge is to fill the hole that is left behind in visually plausible way. This problem has been addressed by two classes of algorithms: i) “Texture synthe-sis” for generating large image regions from sample textures, and ii) “In-painting” techniques for filling in small gaps. Each being used for images with different characteristics. This dissertation is concerned with investigating whether advances in texture synthesis techniques contain the necessary functionality to cross the divide between the two and successfully fill holes in a variety of images. The advantage of the proposed techniques is that it limits the amount of knowledge required by the user, and performs the region filling autonomously, once started.
S.No.: 309
Title : Design and Implementation of 3D Visualisation Virtual World laser Diode End Pumped Nd:YVO4
Authors Name: Zaynab Q. Mohammed, MohammedJ. Abdul-Razak, Raaed K. Ibraheem
Authors Affilation: 1Laser & Optoelectronics Engineering Department, University of Technology, Baghdad, Iraq
Volume & Issue No.: Volume4Issue9
Abstract: In this paper virtual-reality (VR) as a tool has been used to design and implementation 3D visualisation for a laser diode end-pump Nd:YVO4 laser system. The simulation modeled using virtual reality has been developed to predict the parameters that influence system efficiency.A new model were designed and implemented in virtual reality toolbox to describe the diode-pumped laser system using the data available (rod dimensions, output-coupler reflectivities, pump source wavelength and output wavelength of the laser system). A model of the laser system was built and converted into an Open GL, and then ported into SIMULINK block using virtual reality toolbox in MATLAB. The equations of dynamic and static effects on the system are solved and converted to appropriate model blocks in the SIMULINK with appropriate vector dimension used to animate or effect on the virtual world.
S.No.: 310
Title : An Efficient Technique for Recovery of Text UsingBinarization
Volume & Issue No.: Volume4Issue9
Abstract: Image Binarization is performed in the pre-processing stage for document analysis and preservation and it aims to segment the foreground text from the document background. However, is a very challenging task due to the high inter/intra variation between the document background and the foreground text of different document images. Scanned document images, especially historical and handwritten documents, generally carry various levels of noise because of the age, paper, pen and pencil influences on the documents. Age factor adds irremovable noise and meaningless random shapes on the documents which prevent efficient separation and recognition of the layers. Paper properties such as patterned or colored papers; add different background layers to the scanned documents. Since document image may suffers from invariant illumination which offers threat in deciding a threshold value which converts the document into binary image
S.No.: 311
Title : An efficient method for discovering frequent patterns in the incremental databases
Authors Name: Farid sheikhnourani
Authors Affilation: department of education
Volume & Issue No.: Volume4Issue10
Abstract: Incremental mining of frequent patterns for association rules is considered as one of the most important issues in science. Mining association rules is a research work in the data mining fields and goal of this issue is discovery important relationships between items in the large databases. Many algorithms have been proposed for the discovery of association rules that FP-growth with FP-tree structure is one of the most efficient algorithms, but FP-tree is not easily adoptable with incremental updating because this structure is the static nature, and also is not suitable for large databases. In this paper, we proposed a dynamic tree structure based on FP-tree to resolve updating problem, called IFP-tree and compare my results with previous algorithms. This tree is a irregularly tree.The proposed tree is created based on the frequency of last items and it required only one scan of database. The experimental results show that using the proposed tree and Branch-Sorting method can enhanced the efficiency of incremental mining of frequent patterns.
S.No.: 312
Title : Determining the affecting factors on the delay to renew the auto insurance
Authors Name: N. Abbasi, R. Mahmoudvan and S. Mordi Kakash
Authors Affilation: Depertment of Statistics, Payame Noor University, I. R. Iran
Volume & Issue No.: Volume4Issue10
Abstract: All the owners of land and rail vehicles whether they are real persons or legal persons, are obliged to insure their vehicles against physical and financial damages to the third parties which may occur because of accidents of the mentioned vehicles or towing and trailer attached to them or their cargo. Despite third party insurance is compulsory, but there are people who have delays in their renewal of the insurance contract. This research intends to identify the affecting factors on this delayed action. For conducting the research, 524 registered case in all of the Saman insurance agencies in the city of Shiraz over five years (2011-2015) was studied. The factors are year of manufacturing, the number of driving accidents record, the type of automobile, type of insurance company, the beginning month of the contract. The results show that only the desire to change of type of insurance has been the affecting factor on this delay.
S.No.: 313
Title : Empirical Study of the Relationship Between Cash Flow Management and Financial Performance of the Jordanian Insurance Companies
Authors Name: Nimer Alslehat & Munther AI-Nimer
Authors Affilation: Faculty of Business, Amman Arab University, Amman, Jordan
Volume & Issue No.: Volume4Issue10
Abstract: The study aims to examine the impact of cash flow management, namely operating, investing, and financing activities on financial performance and the contribution of each of these activities to predict the financial performance of the Jordanian Insurance Companies (JICs). The population under observation consists of the JICs, which includes (23) companies. The study covers the period 2009-2013 by analyzing annual reports for each company. The study indicated that net cash flows from operating activities are considered the highest compared with other activities, which demonstrates that the JICs generate money from their main business and are not facing liquidity crisis. Regarding the impact of each orientation of these activities and their effect on financial performance, the study revealed that the net cash flows from the operation activities influences the return on assets. Moreover, the net cash from investing activities was found to play a significant role in the financial performance.
S.No.: 314
Title : PLC Based Automatic Nozzle Welding Control System
Authors Name: Mayuri Gaonkar, Dhiraj Ahire, Akanksha Kadam,Shrinivas Dhawale
Authors Affilation: UG Student of Department of Electronics and Telecommunication Engineering, Terna Engineering College,Navi Mumbai, India
Volume & Issue No.: Volume4Issue10
Abstract: In industries, to produce different products we need various types of raw materials. Those can be in solid, liquid or gaseous state. To store such large quantity of material, we need big containers. Hence large containers such as ‘shells’ are used along with nozzles to fix to it. Nozzles are use as inlet or outlet to store fluids. The problem associated with the constructions of such big containers is welding of nozzles with shells. SAW is type of welding use for fixing. During welding, boom is used to control vertical motion of the shaft on which whole assembly of the welding is situated. Even during the welding according to curve path of the job we have to vertically move the welding torch which is done manually. This is very inconvenient, inappropriate and time consuming. Objective of this project is to reduce time consumption and human efforts and to increase the accuracy. Along with this use, objective of this project is to control the different parameters of welding. So there are following objectives of this project: 1. To control vertical motion of the welding torch. 2. To control different parameters which handle the functions of welding torch 3. To Avoid time consuming task of manual handling
S.No.: 315
Title : Analysis of Transistor Open Fault Diagnosis for Shunt Active Power filters
Authors Name: L. Benyettou, T. Benslimane
Authors Affilation: Laboratory of Electrical Engineering, University of M’sila, Algeria
Volume & Issue No.: Volume4Issue11
Abstract: In this paper a transistor open-circuit fault diagnosis problem in two-level voltage inverter controlled shunt active power filter drives was discussed. Taking into consideration requirements of the contemporary monitoring drive systems original transistor fault diagnostic technique were proposed. Presented results were obtained by designed in PSIM software simulation model.
S.No.: 316
Authors Name: Er. Suvendra Kumar Jayasingh, Dr. Jibendu Kumar Mantri
Authors Affilation: Assistant Professor, Reader, Institute of Management and Information North Orissa University, Technology, Cuttack – BPUT, Odisha, India
Volume & Issue No.: Volume4Issue11
Abstract: Weather forecasting is a challenging problem in predicting the state of the climate for a future time at a given location. Weather is the state of atmosphere which is measured based on a scale of hot or cold, dry or wet, storm or calm and cloudy or clear. Human kind has tried a lot since ancient times to anticipate the future climate. It is why climate change prediction has become a very important task to the scientists and researchers of many countries. The weather is a continuous, data-intensive, multi dimensional, dynamic and chaotic process [6] and these characteristics made the weather forecasting a challenging job in the world. In order to make accurate prediction, many scientists have tried to forecast the meteorological behaviours. The objective of the research is to predict more accurately the meteorological characteristics. This article gives importance on using the fuzzy field and Natural Language Generation (NLG) that will make the weather prediction in a better and faster manner.
S.No.: 317
Title : Cryptography Based Hybrid Security Architecture for Mobile Multi Agents
Authors Name: Swati Singhal, Heman Pathak
Authors Affilation: 1Research Scholar, Department of Computer Science, Gurukul kangri University, Haridwar
Volume & Issue No.: Volume4Issue11
Abstract: Distributed Computing is the current area of research. Many researchers are working in area of Distributed Computing and trying to find a solution for the security and other issues. In Distributed Computing the mobile agents are the very important thing. When different mobile agents work in the same environment simultaneously it becomes a very important issue. Mobile agents have automatic, pro-active, and dynamic problem solving behaviors. However, scope of this paper is limited to analyze the existing security approaches for Mobile Multi Agent System. Security issues of mobile agent address the problem of securing and protecting agents from the attack of malicious hosts and other agents as well as securing the host from attack of malicious agents. This paper introduces a new approach of security for agent from other agents. Paper discusses Cryptography Based Hybrid Security Architecture with trust and reputation named CBHSA. It breaks the security of MA in two parts. The first level of security is work on the MA and second level of security is maintained on network. The model CBHSA, its different components and security of MA during movements around the network are discussed in this paper. This paper emphasis on the security of MA’s during migration within the network or outside the network.
S.No.: 318
Title : Characterization and reliability of A36 steel under alternating dynamic and static loading
Authors Affilation: Laboratory Of Atmosphere’s Physics and Modeling, FST Mohammadia, Hassan II University Of Casablanca
Volume & Issue No.: Volume4Issue11
Abstract: The principal purpose of this article is the prediction of the life of ordinary steel A36 by using the method of unified theory. Separation of phases boot / propagation and cycle number reduction at break for a given load level. Experimental results from the fatigue tests virgins specimens, combined with static testing tensile test machine the calculated values are analyzed, discussed and compared. These approaches allow us both to assess the impact of unexpected damage on the life of the A36 steel and predict its life or even improve it.. This approach allow us both to assess the impact of unexpected damage on the life of the A36 steel and predict its life or even improve it. In this paper we present the first part of our research we have determined the number of life cycles of A36 steel (smooth) from alternating fatigue tests with other static, as well as the different relations binding the various life phases of the material and the loading level applied. This allowed us to quantify the initial damage caused by the notch results that we will operate in future articles to determine and compare alternative approaches for the damage to lead to the development of a simple tool usable in a maintenance policy
S.No.: 319
Title : Study on Performance Characteristics of PV Array Under Non-uniform Irradiation Conditions
Authors Name: N. Nagaraja
Authors Affilation: S.V.University College of Engineering, Tirupati, Andhra Pradesh.
Volume & Issue No.: Volume4Issue11
Abstract: Ever increasing energy demand, owing to population growth, technology development, and industrial expansion, has led to exploring alternative sources for energy generation. Solar energy emerged as the most effective and reliable source of renewable energy as it is pollution free, less maintenance, recyclable and inexhaustible. Photo Voltaic (PV) technology is used for direct conversion of e solar energy into electrical energy. The performance of PV system is mostly affected by irradiance, module temperature and array configuration. The knowledge of relationship between these effects and the output power of the PV array is very important while analyzing the performance of the PV system. This paper presents a MATLAB-programmed model to study the I-V and P-V characteristics of PV array under non-uniform insolation caused by both partially and completely shaded modules. In the first part, with the developed MATLAB/Simulink model the performance characteristics of PV array is illustrated by analyzing the different shading situations, then the impact of shading on PV array is illustrated experimentally by measurements on an array with 3 series connected 60W modules. Under the non-uniform insolation condition, both developed model and experimental results shows that, the output power of a PV array get reduced and output PV curve become more complex with multiple peaks.
S.No.: 320
Title : Optimizing the usage of SimpleDateFormat in a Java multi-threaded environment
Authors Name: Mr. Mihai Stancu
Authors Affilation: Faculty of Sciences, Department of Computer Science, University of Craiova
Volume & Issue No.: Volume4Issue12
Abstract: In almmost every Java application that uses dates we are required at some point to perform date formatting. The Java core libraries offer a great way to format dates using the DateFormat abstract class, and it’s implementing class SimpleDateFormat. However the way SimpleDateFormat is generally used, creating a new SimpleDateFormat object for every formatting block, is very expensive and should not be used this way. In this article we will be looking at why this method is not the way to do it, and how it would be better to get the same results with lower execution times.
S.No.: 321
Title : Characterization and reliability of A36 steel under alternating dynamic and static loading
Authors Affilation: Laboratory Of Atmosphere’s Physics and Modeling, FST Mohammadia, Hassan II University Of Casablanca Morocco
Volume & Issue No.: Volume4Issue12
Abstract: The principal purpose of this article is the prediction of the life of ordinary steel A36 by using the method of unified theory. Separation of phases boot / propagation and cycle number reduction at break for a given load level. Experimental results from the fatigue tests virgins specimens, combined with static testing tensile test machine the calculated values are analyzed, discussed and compared. These approaches allow us both to assess the impact of unexpected damage on the life of the A36 steel and predict its life or even improve it.. This approach allow us both to assess the impact of unexpected damage on the life of the A36 steel and predict its life or even improve it. In this paper we present the first part of our research we have determined the number of life cycles of A36 steel (smooth) from alternating fatigue tests with other static, as well as the different relations binding the various life phases of the material and the loading level applied. This allowed us to quantify the initial damage caused by the notch results that we will operate in future articles to determine and compare alternative approaches for the damage to lead to the development of a simple tool usable in a maintenance policy
S.No.: 322
Title : Analysis and Design of a Disk Microstrip Patch Antenna Loaded two Annular Ring
Authors Name: Raed M. Shaaban, Zeki A. Ahmed, Wail A. Godaymi
Authors Affilation: College OF Science University of Basra
Volume & Issue No.: Volume4Issue12
Abstract: In this paper presents design of circular microstrip antenna loaded two annular 𝐶𝑀𝑆𝐴𝐿2𝐴𝑅C . The propose designed using the moment of method and simulation by using Ansoft HFSS .Using coaxial probe feed is designed and fabricated at 14.47 GHz resonance frequencies and simulated on an Arlon AD320A (tm) substrate with dielectric constant εr of 3.2 and substrate size of (𝐿𝑆×𝑊𝑆×ℎ) 29 × 24 × 1.79 mm3 , disk patch radius(𝑅𝑝=6𝑚𝑚),and laded annular two ring (𝑅𝑎−𝑏=1𝑚𝑚) . The antenna parameters is presented in this paper by introducing such as , bandwidths for -10 dB reflection coefficient are 1.92 GHz (13.2%) (simulated) , 𝑉𝑆𝑊𝑅 < 1.12 for 50 Ω reference impedance and return loss is less than to -10dB.
S.No.: 323
Title : Mobile Based Tracking for Cloud Messaging Emergency Medical Service
Authors Name: C. Sunil Kumar
Authors Affilation: SNIST
Volume & Issue No.: Volume5Issue1
Abstract: This paper proposes Mobile Based Tracking for EMS (Emergency Medical Service) on cloud, by pressing power button the app or shaking the phone will send alert to nearest ambulance driver which is available among registered users also send message to emergency contact number. This helps to find appropriate hospital for his emergency even in an unknown area. This app also provides facilities to store electronic healthcare data which can be accessed by hospitals. It is observed that people in unknown area are in severe danger if they didnt able to find hospital quickly. In emergency case a single minute counts. So it is very important that automatic applications must be used for decision making, Maintain up to date status of the hospital and saving the time which can save life of the patient. The proposed system locates nearest available hospital, contacts its ambulance emergency system, accesses a Electronic Health Record of emergency patient that can critically assist in pre-hospital treatments. The system will identify availability of the nearest available specialized hospital all through EMS server which provides continuous information about the incoming patient to the hospital.
S.No.: 324
Title : Paper on Scope of Stress Management in Hotel Industry.
Authors Name: Purnima Bora
Authors Affilation: Faculty of Commerce and Management Studies, Department of Commerce, Kumaoun University, Nainital
Volume & Issue No.: Volume5Issue2
Abstract: Like any other tourism product or service the hotel product is not storable and in case of non use, it is perishable. The hotel business is highly competitive. For organizational effectiveness that is quality maintenance, growth, productivity and profit the work force in hotels are under high work pressure that results in stress and burnouts. Star category hotels demand duty round the clock. As the expectations are high, the Human resource is bound to undergo stress of different types. How one deal with the seemingly uncontrollable is the key to good management . As nature is full of differences and variety, stress too has its different implications. There is another face of stress, without it life would be routine and dull. One needs pressure but too much will make him/her unproductive and inefficient. Stress management can help in providing a new dimension to stress. This paper discusses scope of stress management in Star category Hotels of Uttarakhand, India. This paper contributes in the awareness and techniques to be taken for effective stress management in Star category Hotels of Uttarakhand. It will help in improving the work quality of employees and employee empowerment at different levels working in these Hotels.
S.No.: 325
Title : A Advance Approach for test case Prioritization for Regression Testing: A Survey
Authors Name: sulaxna solanki
Authors Affilation: mahila engg. college Ajmer(Rajasthan)
Volume & Issue No.: Volume5Issue2
Abstract: The main aim of regression testing is to test the modified software during maintenance level. It is an expensive activity and it assures that modifications performed in software are correct. An easiest strategy to regression testing is to retest all test cases in test suite, but due to limitation of resources and time it is inefficient to implement. Therefore, it is necessary to discover the techniques with the goal of increasing the regression testing’s effectiveness, by arranging test cases of test suite according to some objective criteria. Test case prioritization intends to arrange test cases in such a manner that higher priority test cases execute earlier those test cases of lower priority according to some performance criteria. A well organized test case prioritization technique reduces the cost of testing and fault detection capabilities of testing. We will go to purpose a new technique which reduces the cost of testing by using new approach for test case prioritization. Keywords- Regression testing, Test case prioritization, Genetic algorithm, Average percentage of faults detection (APFD).
S.No.: 326
Title : An Advance Approach for Test case Prioritization for Regression Testing: A Survey
Volume & Issue No.: Volume5Issue2
Abstract: The main aim of regression testing is to test the modified software during maintenance level. It is an expensive activity and it assures that modifications performed in software are correct. An easiest strategy to regression testing is to retest all test cases in test suite, but due to limitation of resources and time it is inefficient to implement. Therefore, it is necessary to discover the techniques with the goal of increasing the regression testing’s effectiveness, by arranging test cases of test suite according to some objective criteria. Test case prioritization intends to arrange test cases in such a manner that higher priority test cases execute earlier those test cases of lower priority according to some performance criteria. A well organized test case prioritization technique reduces the cost of testing and fault detection capabilities of testing. We will go to purpose a new technique which reduces the cost of testing by using new approach for test case prioritization.
S.No.: 327
Title : Proxy Re-encryption Schemes for Data Security in Cloud
Authors Name: Mrs. Vedika Pansare and Prof. Nilima Nikam
Authors Affilation: Yadavrao Tasgaonkar institute of engineering & Technology, Dept. of Computer Engineering Mumbai.
Volume & Issue No.: Volume5Issue3
Abstract: Abstract—Cloud computing is an emerging technology in which resources of the computing infrastructures are provided as services of the internet. Cloud allows user to access application without installation and their personal data at any computer with internet access. It provides with a way to share distributed recourses and services that belong to different organizations or sites. In cloud computing environment a number of extended Proxy Re-Encryptions (PRE), e.g. Conditional (CPRE), Identity-Based PRE (IPRE) and Broadcast PRE (BPRE), have been proposed for flexible applications. By incorporating CPRE, IPRE and BPRE, this paper proposes a versatile primitive referred to as Proxy Re-encryption Schemes for Data Security in Cloud is a Conditional Identity-based Broadcast PRE (CIBPRE) and formalizes its semantic security. CIBPRE allows a sender to encrypt a message to multiple receivers by specifying these receivers’ identities, and the sender can delegate a re-encryption key to a proxy so that he can convert the initial cipher text into a new one to a new set of intended receivers. We propose an efficient CIBPRE scheme with provable security. In the instantiated scheme, the initial cipher text, the re-encrypted cipher text and the re-encryption key are all in constant size and the parameters to generate a re-encryption key is independent of the original receivers of any initial cipher text. Finally, we show an application of our CIBPRE to secure cloud email system advantageous over existing secure email systems based on Pretty Good Privacy protocol or Identity-Based Encryption.
S.No.: 328
Title : Identifying initial condition in degenerate/singular parabolic equation from final observation
Authors Name: Khalid Atifi, EL-H. Essoufi, Khouiti bouchra
Authors Affilation: Laboratoire de Mathématiques, Informatique et Sciences de l’ingénieur (MISI), Université Hassan 1, Settat 26000, Morocco.
Volume & Issue No.: Volume5Issue3
Abstract: See the paper abstract
S.No.: 329
Title : Robust Digital Invisible Watermarkingfor Copyright Protection of Image using DCT (Discrete Cosine Transform)
Authors Name: Prof. Devasis Pradhan, Rabinarayan PanigrahiManini Monalisa Pradhan Dibyashree Panda
Authors Affilation: AIT, Banglore
Volume & Issue No.: Volume5Issue3
Abstract: Digital watermarking is an important issue for the copyright protection and ownership authentication in multimedia applications. We implement the watermarking algorithm using frequency domain technique by using DCT (Discrete Cosine Transform) on images. Here, the invisible watermarking is used to protect copyrights of multimedia contents. The invisible watermarks are new technologies which could solve the problem of enforcing the copyright protection is required for ownership identification as well as hidden information can also be identified. Where, the watermark is invisible to the human eye. Also, the authenticity of the information in the image can be obtained by comparing the watermarked image with the original image.
S.No.: 330
Authors Name: Karthika Rajarethinam, Shanmathy Arivinbam, M.R.Rajeswari, Veeralakshmi Ponnuramu
Authors Affilation: Prince Shri Venkateshwara Padmavathy Engineering College
Volume & Issue No.: Volume5Issue3
Abstract: Abstract- Image processing is the analysis and manipulation of a digital image, especially in order to improve its quality. This system is used to detect the human emotions from the input image. First an image is given as input, skin is segmented based on skin colour. The face region is then scanned by marking the edges of the face and the connected region is then cropped. From the cropped face image the eyes and the lips are separated. It draws Bezier curve for eyes and lips. Emotion of the Bezier curve is assigned as emotion of this image. The proposed approach in different applications: pain recognition and action unit detection using visual data and gestures classification using inertial measurements, demonstrating the generality of our method with respect to different input data types and basic classifiers. In terms of accuracy and computational time both with respect to user-independent approaches and to previous personalization techniques this project succeeds. This paper presents a framework for personalizing classification models which does not require labelled target data. It proposes a regression framework which exploits auxiliary annotated data to learn the relation between person-specific sample distributions and the parameters of the corresponding classifiers. Then, when considering a new target user, the classification model is computed by simply feeding the unlabeled sample distribution into the learned regression function.
S.No.: 331
Title : Enrichment of Education through new service model - TaaS
Authors Name: *Dr K Ravindranath , P N P Pujitha, P N S Divatejaswi
Authors Affilation: K L University
Volume & Issue No.: Volume5Issue3
Abstract: In perspective of the way that the information of distributed computing has been comprehensively actualized in various ranges, that passes on inventive plans for underwriting versatile learning. Professionals and recipients are worried in drawing the support of distributed computing to modify the present facilitating methods of learning administration systems(LMSs) in control to bless with extra handiness to mentoring providers, upgraded considering events to understudies and minor charges to together of them. Accordingly, a modern inclination shows up, in particular the mobile cloud based learning. Regardless of the possibility that mobile computing encourages learners to get to web based learning substance through recognizably utilized machines, it can be convoluted to cooperate in versatile environment, for which there are moderately a littler sum writing demonstrating to recommend strategies to create collaboration execution. Apparatuses over the cloud are administration situated, they can cooperate adapt ably and can be basically assembled to finish sequentially or in parallel to plot a work process. In view of this, we distinguished a learning stream, a plan of work process installing the Kolbs Team Learning Experience (KTLE).The learning stream is perceived by the mix of the cloud facilitating LMSs and recently arranged administration situated cloud based framework, cooperation as an administration- (TaaS).
S.No.: 332
Authors Affilation: KL UNIVERSITY
Volume & Issue No.: Volume5Issue3
Abstract: Objectives: This paper tries to provide a better CAPTCHA, which is easy for humans to use and difficult bots to crack. Methods/Analysis: The purpose of differentiating between humans and machines has been raised due to the corrupt operations of automated bots. CAPTCHAs (Completely Automated Public Turing test to tell Computers and Humans Apart) have been introduced to overcome such problems. CAPTCHA is a computer program or framework intended to distinguish human from machine input, typically as a way of opposing spam and automated extraction of data from websites. Findings: On the other hand, different textual and images based CAPTCHAs have been cracked recently by the bots. So, this is an opportunity for the development of new anti-automation methods. Novelty /Improvement: In this paper, we propose simple and effective emoticon CAPTCHAs, in other words CAPTCHAs based on human feelings. Here, we use checkboxes because it is really hard for bots to analyse a checkbox, this not only increases the security but also the efficiency of the system. We also discuss the pros and cons of different type of CAPTCHAs that are already available and how our new CAPTCHA can overcome the problems of the previous CAPTCHAs used. Keywords: CAPTCHA, spam, bots, human feelings, checkbox, Security.
S.No.: 333
Title : Efficient Prototype ofSecure SOAP Messagetransmission in Web Service
Authors Name: Amtul Waheed, Jana Shafi
Authors Affilation: 1Prince Sattam Bin Abdul Aziz University, College of Arts and Science, Riyadh Region, Saudi Arabia.
Volume & Issue No.: Volume5Issue3
Abstract: With the growth of web services security issues based on heterogeneous platform have become gradually more prominent. Web services Security provides basic means to secure SOAP messages. Secure transmission of SOAP messages play an essential task for the applicability of Web Services. The main confront to the secure transmission of SOAP messages includes: confidentiality, authentication, integrity, and both-party no repudiation. We explored and procure advantage of existing technologies to propose a Prototype Of Secure Transmission (POST) for the main mechanism of Web Services security and secure communication between client and web server in heterogeneous platform. The study in this paper indicates that for the basic requirement towards secure transmission of SOAP messages, our Prototype Of Secure Transmission (POST) is ensuring a high level security to SOAP message transmission over heterogeneous platform.
S.No.: 334
Title : An Improved Content Based Image Retrieval Approach using Local Binary Pattern (LBP)
Authors Name: Manju Prajapati, Govind Prasad Arya
Authors Affilation: M.Tech, Scholar, UTU, Dehradun
Volume & Issue No.: Volume5Issue3
Abstract: The increased necessity of content based image retrieval (CBIR) technique can be found in a variety of different domains such as Data Mining (DM), Education, Medical Imaging (MI), Weather forecasting Crime Prevention, , Remote Sensing (RS) etc. An image retrieval system permits us to browse, search & retrieve the images. In past because of very huge image collections the manual annotation approach was more tedious. In order to conquer these difficulties content based image retrieval (CBIR) was introduced. This paper presents the content based image retrieval (CBIR), using local binary pattern (LBP). The local binary pattern encodes the relationship between the referenced pixel & its surrounding neighbors by computing the GLD (gray-level difference). The objective of the proposed methodology is to retrieve the best images from the stored database that resemble the query image with an optimized way.
S.No.: 335
Authors Name: Mukund S. Gosavi, Suraj D. Sawant, Prashant T. Sawant, Mahesh S. Gosavi
Volume & Issue No.: Volume5Issue3
Abstract: This project work deals with the design and fabrication of a pedal powered two way hacksaw cutting machine. In this Pedal operated two-way hacksaw machine which can be used for Small scale Shop applications for cutting of wooden block, pvc pipe. The machine works on the principle of Scotch yoke mechanism. In scotch yoke mechanism rotary motion is converted into a To and Fro (reciprocating) motion. In this machine peddle in connected Sprocket ( ratchet ) through chain which is connected to scotch yoke mechanism to the hacksaw frame from both the side and the power is supplied to the hacksaw frame by means of chain. The main aim of this machine to reduce cutting time as well as energy. In which no external power is required for cutting operation, it also available in minimum cost. The peddle power two-way hacksaw machine, which runs on human power, works on the principle of the conversion of rotational motion to oscillatory motion. This is a project which saves electricity need and can be easily use in day today’s life.
S.No.: 336
Title : Performance and Emission Characteristics of Single Cylinder Diesel Engine with Safflower Biodiesel Blends
Authors Name: G.S. Guru Dattatreya1* , P. Sreenivasulu2
Authors Affilation: G Pulla Reddy Engineering College(Autonomous), A.P India,sankarguru123@gmail.com,9533052880
Volume & Issue No.: Volume5Issue4
Abstract: The consumption and demand for the petroleum products are increasing every year due to increase in vehicle population, standard of living and urbanization. This causes fast depletion of petroleum products, which leads to move towards the alternative fuels for researchers. Among so many alternative fuels for diesel engine, non edible vegetable oils are the most widely used under the test. The purpose of present work is to investigate the engine performance and emission characteristics of DI diesel engine with different blends of safflower seed oil. Engine tests have been carried out to obtain comparison of fuel consumption, specific fuel consumption, brake thermal efficiency, volumetric efficiency and smoke opacity and compared with that of diesel fuel. The aim of the proposed project work is to investigate experimentally the performance and emissions characteristics of safflower biodiesel at different loads. A single cylinder, direct injection, compression ignition engine has been selected for investigation. Keywords: D.I .Diesel Engine, Performance, Transesterification, Emissions.
S.No.: 337
Authors Name: Tariku Achamyeleh1, S.Ramu2, BantelaySintayehu3 and R.Srinivasan4
Authors Affilation: Debre Tabor University, Sri Muthukumaran Institute of Technology
Volume & Issue No.: Volume5Issue4
Abstract: Two different methods of solar cooker hasbeen designed to improve thermal performance of the solar cooker. We have committed to analyze the technical measurements such as cooker parameters, materials and energies. Two major solar cookers, aluminium plated and black coated boxes, are currently used to be tested both in load test. Thermocouples were used to measure the temperature of the two cookers at different parts of the cookers. Based on the input and output energy the two solar box cookers were compared on their efficiency. Theoretical and practical comparison was conducted to choose which cooker was the best in efficiency with the same working environment. These techniques are used to compute the solar cooker for betterment performance and comparison achievement on the studies and finally the experiment results are given by the maximum thermal performance at the aluminium laminated coated box.
S.No.: 338
Title : Image Mining for Leaf Classification to detect belonging tree by Association Reverse Rule Using Texture features
Authors Name: Aswini Kumar Mohanty, Amalendu Bag
Authors Affilation: KMBB College of engg & CET Bhubaneswar, Orissa, India
Volume & Issue No.: Volume5Issue4
Abstract: The image mining technique deals with the extraction of implicit knowledge and image with data relationship or other patterns not explicitly stored in the images. It is an extension of data mining to image domain. Textures are one of the basic features in visual searching, computational vision and also a general property of any surface having ambiguity. The main objective of this paper is to apply image mining in the domain such as different leaves belonging to different trees to classify and detect the exact belonging class of tree. Leaf images of different trees with different texture and shape including sizes can be classified into many classes as per given data base and to explore the feasibility of data mining approach. Results will show that there is promise in image mining based on content. It is well known that data mining techniques are more suitable to larger databases than the one used for these preliminary tests. In particular, a Computer aided method based on association rules becomes more accurate with a larger dataset. Traditional association rule algorithms adopt an iterative method to discovery frequent item set, which requires very large calculations and a complicated transaction process. Because of this, a new association rule algorithm is proposed in this paper. Experimental results show that this new method can quickly discover frequent item sets and effectively mine potential association rules. A total of 26 features including histogram intensity features and GLCM features are extracted from leaf images. Experiments have been taken for a data set of 322 images taken of different types with the aim of improving the accuracy by generating minimum no. of rules to cover more patterns. The accuracy obtained by this method is approximately 97% which is highly encouraging.
S.No.: 339
Authors Name: Abhishek Rane, Ghanshyam Pendurkar, Tejas Phage, Aniket natalkar, Ganesh Pednekar
Authors Affilation: SSPMs college of engineering, Kankavli
Volume & Issue No.: Volume5Issue4
Abstract: The purpose of this project is to design and fabricate the economic machine for small sized sheet metal products. Conventionally for production of these products large machines are used which are not cost economical. Also there is a loss of energy due to friction. The objective of this project is to reduce the energy consumption, cost and to perform the various forming operations on a single machine. The solution is obtained with the implementation of ‘Electromagnet’. Since the actuation is electrically assisted the operation is friction less and accurate. The punching force is controlled by varying current using ‘DIMMER’ circuit. The power is consumed only during the punching stroke resulting into efficient operation. After successful fabrication, the set up was tested and optical testing is done for any defects in the punched samples.
S.No.: 340
Title : Provide an approach to development and security preparation Farnzyky
Authors Name: Reza Sadeghi Rashed, Mohammad BagherMohammadi Lame
Authors Affilation: University of Shiraz
Volume & Issue No.: Volume5Issue4
Abstract: In the world, despite the efforts sparse for the use of information and communication technologies in some industries and businesses carried out, due to the lack of capacities and infrastructure required, preparation Farnzyky, causing a sharp drop in the performance of investments undertaken and the lack of benefits of ICT and mistrust and insecurity in And the vulnerability of information assets. In this regard Farnzyky preparation assessment models provide the most help in understanding the status quo. Elements such as access mechanism, event tags, structure, communication systems and operating systems, intrusion detection systems, standards for data collection run by technical and non-technical factors affect protection of witnesses and the time this location. In this paper, according to the progress of society in the field of computer networking vacuum talk Farnzyk and preparedness in this area due to the emergence of e-government, there is discussed that requires the review process liable to digital evidence is in case any thing happened to information assets to risk losing assets and lowered consumer expenditure in this area to ensure future Farnzyky assets.
S.No.: 341
Title : Knowledge Management In E-Learning: A Critical Analysis
Authors Name: Jui Pattnayak and Sabyasachi Pattnaik
Authors Affilation: Fakir Mohan University
Volume & Issue No.: Volume5Issue4
Abstract: The integration of knowledge management (KM) and e-learning (EL) become inevitable day by day. KM applications focus in providing institutions with tools to enrich knowledge, while the EL focuses on managing the delivery of academic knowledge. But integration of both the areas is far more behind in research. This research proposed a KM model to provide 24x7 hours synchronous collaborative learning. Requirement of KM in EL is the focus of this paper by creating a new approach of KM and emphasizing on various processes accompanying. Several Artificial Intelligence (AI) tools and technologies such as big data, linked data, semantic web, 3D visualization, etc. are incorporated hypothetically to achieve the collaborative learning environment.
S.No.: 342
Title : A hybrid modelling and Artificial Neural Network validation of plastic strain variation with workpiece average roughness
Authors Name: Y. Ech-charqy1, 2, H.Gziri2, M.Essahli1
Authors Affilation: 1University Hassan 1, Laboratory of Applied Chemistry and Environment, BP 577 Settat, Morocco 2University Hassan 1, Laboratory of mechanic, industrial management and innovation, BP 577 Settat, Morocco.
Volume & Issue No.: Volume5Issue4
Abstract: Many theoretical models for surface roughness assume that the plastic strain for a workpiece is influenced by cutting parameters, lubrications, machine vibration and other phenomena. The effect of the surface roughness is usually neglected in the investigation about plastic strain, the reason is the difficulty of modeling analytically the average roughness. In this work, the average roughness Ra is taken into account in order to predict the plastic strain ε, and the material behavior in turning. The analytical model for ε is developed as a function of three parameters, namely average roughness Ra, Poisson ratio υ, and a dimensional parameter Cd. For this modelling, the theory of beam was combined with Ernst- Merchant Theory, and Piispanen Model Card. The Results indicate that average roughness have a linear correlation with plastic strain. So, the impact of material properties in model is showed by Poisson ratio. Finally, the validity of model is tested by empirical and intelligent analysis
S.No.: 343
Title : Automated Timetable Generation using Genetic Algorithm
Authors Name: Mithila Shetye, Anusha Pai, Cassandra Dias
Authors Affilation: P.C.C.E.
Volume & Issue No.: Volume5Issue4
Abstract: Timetable generation is a very burdensome and time consuming task. This is usually done ‘by hand’, taking several days or weeks of iterative repair. Timetable generation is the NP-hard problem, which is very difficult to solve using conventional methods. A highly constrained timetabling problem can also be solved by evolutionary techniques. We must determine an acceptable assignment of the time slots and rooms to the courses based on a variety of their requirements. This project will try to reduce the difficulties of generating timetable by using Genetic Algorithm. By using Genetic algorithm, the time required to generate time table will be reduced and the generated timetable will be more accurate, precise and free of human errors. Main goal is to minimize the number of conflicts in the timetable. System generates timetable for each class and faculty, in keeping with the availability calendar of teachers, availability and capacity of physical resources (such as classrooms, laboratories and number of computers) and rules applicable at different classes, semesters, faculty and subjects level. Project results will possibly show that the genetic algorithm improves the fitness of the population for each generation, and it returns a feasible solution, even for the most constrained benchmarks.
S.No.: 344
Title : A Survey on Ensemble computing Method for Rainfall Prediction in different regions of Chhattisgarh
Volume & Issue No.: Volume5Issue5
Abstract: India is an agricultural country and most of economy of India depends upon the agriculture. Rainfall plays an important role in agriculture so early prediction of rainfall is necessary for the better economic growth of our country. Rainfall Forecasting is one of the most challenging topics across the globe. Unlike traditional methods, modern Weather forecasting involves a combination of knowledge of trends and patterns and computer models. Using these methods, accurate forecasting could be done. Forecasting System is based on any architecture or technology such as Artificial Neural Network Forecasting, Sensor-Based, Numerical weather prediction model, Fuzzy sub-system or a used friendly web based system. The weather predictions in advance of 2-8 days are also possible. Forecasting could be carried out globally or region based. This paper represents a review of different rainfall prediction techniques for the early prediction of rainfall prediction of rainfall. It also focuses on giving different ways to forecast the weather in different regions. The paper presents the review of Rainfall Forecasting using different techniques and studies the benefit of using them. It provides a survey of available literatures of some techniques given by different researchers. The technical success, that have been achieved by various researchers in the field of rainfall forecasting ,has been reviewed and presented in this survey paper.
S.No.: 345
Title : Classification Analysis of Student Performance usingDecision Trees and Optimization Algorithms
Authors Name: Arjun Panicker, Dipannita Panda, S. Thenmalar
Authors Affilation: SRM University
Volume & Issue No.: Volume5Issue5
Abstract: Data mining is used to extract information which can aid to knowledge building and to develop useful relationships among features stored in a large dataset. In universities, teachers are concerned about the performance of the students which is of great importance considering their career. This research based project is an attempt to select a machine learning algorithm that is more suited to classify the result of the students in their final examination. The data set has been taken from the UCI Repository and the algorithms for the classification analysis of student performance include C5.0, Random Forest and SVM (Support Vector Machines) and the language used is R language. The feature set used for training the model and testing it does not include the marks obtained by the students in their previous examinations. Our paper would be predicting the result beforehand so that the student, teacher and the parents could be prepared for the consequences of the same. We have used supervised learning to achieve higher accuracy.
S.No.: 346
Authors Name: R.JYOTHUNAIK
Volume & Issue No.: Volume5Issue5
Abstract: Due to the scarcity of conventional fuels, the crude oil the price was going up day to day and there will be no more conventional fuels in future and also increasing the environmental pollution by the usage of crude oils there is a need for the search of alternative fuel sources for the automobile applications. There are many alternate fuels we already existing like bio-diesel, bio-mass, alcoholic fuels, hydrogen, non-fossil methane and non-fossil gases (like LPG, CNG) and other bio-mass sources which were useful for different applications, out of these bio-diesels are one of the prominent alternative fuel for diesel engines. Generally bio-diesel is the renewable fuel which is derived by chemically reacting with the sources of bio diesel like vegetable oils, animal oils, plastics, and waste automobile tyres etc. The chemical reaction requires a catalyst usually a strong acid or base such as sulfuric acid, sodium or potassium hydroxide, and produces a new chemical compounds called methyl or ethyl esters of the vegetable crude oil which is called as bio-diesel. Therefore in the present investigation the oil taken is the tyre pyrolysis oil which was obtained by the pyrolysis of the waste automobile tyres.
S.No.: 347
Title : Comparitive analysis of carbon nano tube coated tool and HSS tool
Volume & Issue No.: Volume5Issue5
Abstract: This study focuses on synthesis of carbon nanotube (CNT) on HSS single point cutting tool & comparative analyses of tool-wear of non-coated and CNT coated HSS single point cutting tool in machining of EN8 steel work piece. Chemical vapor deposition method is used for synthesis of CNT on this tool. The gases used for this method is acetylene and argon which have very less cost also this coating have less cost due to this CNT coated tool can be commercially used for machining. Analysis done by computing three forces such as cutting force, feed force &thrust force with the help of dynamometer under different machining parameters. Obtained results shows that CNT coated tool have high machinability, more hardness & less tool wear.
S.No.: 348
Title : Design and Implementation of a Customized Compiler
Authors Name: Govind Prasad Arya, Neha Sohail, Pallavi Ranjan, Priya Kumari & Shabina Khatoon
Authors Affilation: Department of Computer Science & Engineering, Shivalik College of Engineering Affiliated to Uttarakhand Technical University, Dehradun
Volume & Issue No.: Volume5Issue5
Abstract: DFA (Deterministic Finite Automata) is designed for the set of customized tokens that we have taken. A grammar in compiler is a set rule that specify how sentences can be structured with the terminals, non-terminals, the set of productions and the start symbol. CFG (Context Free Grammar) is used in compiler for parsing. This paper presents the steps to convert a high level language written according to our customization into assembly language. It also presents what is a compiler, its phases and functions. Basically, the compiler passes through the six phases but here only the implementation through three phases are shown, i.e Lexical Analyzer, Syntax Analyzer and Target Code Generation. The Target Code generated here is in Assembly Language.
S.No.: 349
Title : Wireless Home Appliance Control Using IOT
Authors Name: Govind Prasad Arya, Atiya Mumtaz & Suryakant Ghildiyal
Authors Affilation: Department of Computer Science & Engineering, Shivalik College of Engineering Affiliated to Uttarakhand Technical University, Dehradun
Volume & Issue No.: Volume5Issue5
Abstract: This paper explains how with the help of mobile phone WiFi one can control various home appliance or devices. This paper is explaining How to control designed circuit of two bulbs wirelessly but according to ones need one can connect any device (sensors, Appliance etc, upto 8) to NodeMCU and can gain wireless control over it, With the help of this paper one can implement circuit and connect it with NodeMCU, Program it accordingly with the help of Arduino and control device with the help of a Smartphone. This paper is mostly helpful to those who want to work on it as their project as practical implementation in homes requires certain changes.
S.No.: 350
Title : Solar Based Three Phase Power Supply Using Seven Level Inverter
Authors Name: Pankaj Bagal
Authors Affilation: CIIT,Indore
Volume & Issue No.: Volume5Issue5
Abstract: This paper implements an efficient way to power generation system, using solar power. Solar energy system is used to collect maximum power from sun. This proposal is to use the solar panels implemented in this project more efficiently and to carry out a realistic experimental approach to enhance the solar output power. We can broadly categorize these sources as renewable and nonrenewable sources. The renewable sources include: solar energy, wind energy, biomass energy, geothermal energy, tidal energy etc. The non-renewable energy sources include fossil fuels (coal, oil, natural gas), nuclear power. While the non-renewable energy sources will get exhausted eventually in the next century. Therefore we are going for the renewable sources because they do not exhaust, they can be used for long time, freely available from nature, does not affect environment. In recent years, the interesting solar energy has risen due to surging oil prices and environmental concern. In many remote or under developed areas, direct access to an electric grid is not easily possible and therefore photovoltaic inverter system which works on solar energy would make life much simpler and more convenient. With this in mind, this project aims to design, build solar panel inverter. Multilevel inverters (MLI) are highly being used for medium voltage and high power applications due to their various advantages such as low voltage stress on the power switches, low electromagnetic interferences (EMI), low dv/dt ratio to supply lower harmonic contents in the output voltage and current. Multilevel inverters have become more popular over the years in electric high power application with the promise of very low disturbances and the possibility to function at lower switching frequencies than ordinary two-level inverters. This paper presents different topologies, emphasizing mainly on seven level inverters
S.No.: 351
Title : Carrier suppressed parametric pump for Flat Gain Raman parametric hybrid amplifier in Dense Wave Multiplexed systems
Authors Name: Dr. Gaganpreet Kaur
Authors Affilation: Thapar University, Patiala, Punjab
Volume & Issue No.: Volume5Issue5
Abstract: We demonstrate improved performance of Raman parametric hybrid amplifier for L-band amplification in Dense Wave division Multiplexed (DWDM) systems using novel parametric pump modulation. Results have been evaluated in 16 x 10 Gbps, NRZ(non-return to zero), 25 GHz DWDM system employing CSRZ (Carrier suppressed Return to Zero) modulation. Evaluated results are compare with conventional DWDM system in of gain flatness, Bit Error Ratio(BER), eye diagrams and Q factor. Gain ripple is improved by nearly 11 dB while the. Q-factor at high parametric pump powers increases by factor of 1.33 resulting in significant BER improvement when using CSRZ modulated FOPA pump. Hybrid modulation of parametric pump has been proposed to suppress the high power idlers by controlling the shape of the pump signal using hybrid modules. Due to Four Wave Mixing (FWM) the parametric gain falls near the pump vicinity. Higher the pump power more severe is the fall in the gain. This sudden fall of gain around pump region defeats the use of parametric amplifier for flat gain. Though Raman-parametric hybrid is able to improve the gain flatness by tuning Raman amplifiers in the region of parametric gain fall but gain ripple is still significant. So employing pump modulation, flat gain of 40.45 dB has been achieved with maximum gain ripple of 2.63 dB has been achieved using the proposed model when extended to 100 x10 Gbps system. The peak to peak gain variation of less than 1.2 dB has been achieved using CSRZ modulated parametric pump. Due to phase dependence of FWM, phase modulated pump show much better results confirming effective suppressing of FWM generated idlers using pump modulation.
S.No.: 352
Title : Control of Three Phase Inverter using DSP for Renewable Energy Applications
Authors Name: Vinayak Tiwari, Piyush Wankhede, Riya Verma, Dr. Ujjwala Mate
Authors Affilation: College Of Engineering, Pune - 05
Volume & Issue No.: Volume5Issue5
Abstract: Inverter is the most important device to utilize the renewable energy sources efficiently. The Sinusoidal Pulse Width Modulation (SPWM) technique is one of the most popular PWM techniques for harmonic reduction of inverters since these use three sine waves displaced in 120? phase difference as reference signals for three phase inverter. Nowadays the SPWM switching signal is generated with the help of different FPGAs, microcontrollers and microprocessors. But for these kind of devices it is necessary to do programming or coding. This paper represents the SPWM technique for harmonic reduction and shows how to generate SPWM switching signal using Digital Signal Processor for three phase pulse width modulated (PWM) voltage source inverter (VSI).
S.No.: 353
Title : A Model Approach for Verifying Outsourced Computation of Cloud for Frequent Itemset Mining
Authors Name: Umesh Borse
Authors Affilation: Smt Kashibai Navale College of Engineering, Pune.
Volume & Issue No.: Volume5Issue6
Abstract: In recent years, It has been shown that outsourcing the most expensive task in data mining process to a service provider (e.g., cloud) brings several benefits to the data owner such as cost relief and less commitment to storage and computational resources. This introduces Data mining as Service paradigm. An Outsourcing data to the server facing a critical problem of verification, whether the server returned correct and complete computation result to the client. The correctness integrity of mining results may be corrupted if the service provider is with random fault or malicious. In the case of frequent itemset mining Apriori, Eclat, FP-growth algorithms are used for a vast database which contains a large number of transactions. Merkel hash tree, Bilinear pairing, Artificial Itemset Planting(AIP) techniques are used for result verification of outsourced computation. The work introduces a new system for result verification of outsourced frequent itemset mining computation. In proposed system tree comparison is the main component used for the verification. Client formed tree from received result of outsourced computation by calculating support value for the frequent itemset, and another tree is created for the small part of the outsourced computation. By comparing these two trees verification of the outsourced computation is done.
S.No.: 354
Authors Name: Sachin Kumar
Authors Affilation: SKITM
Volume & Issue No.: Volume5Issue6
Abstract: Steganography is a sub-discipline of information hiding that focuses on concealing the existence of messages. It is the study of techniques for hiding the existence of a secondary message in the presence of a primary message. Here we embed minimum and maximum message in to the various layers of audio wave. Digital audio is stored on a computer as a sequence of 0s and 1s with the right tools, it is possible to change the individual bits that make up a digital audio file. Such precise control allows changes to be made to the binary sequence that are not discernible to the human ear. In a computer-based audio steganography system, secret messages are embedded by slightly altering the binary sequence of a sound file. We propose complete steganography on wav audio files using four stages of genetic algorithm – Encryption, Modulation, Decryption and Demodulation. We can hide any text within the layer of data structure of wav files.
S.No.: 355
Title : Virtual Consciousness from 3D to 4D Password:A Next Generation Security System Inspiration
Authors Name: SAURABH
Volume & Issue No.: Volume5Issue6
Abstract: We have many authentication schemes presently, but they all have a few disadvantages. So recently, the 3D password paradigm was introduced. The 3D password is multi-factor authentication system as it uses a various authentication techniques such as graphical password, textual password etc. Most important part of 3D password is inclusion of 3D virtual environment. However the 3D Password is still in its initial stages. Designing various kinds of 3D virtual environments, interpreting user feedback and deciding on password spaces, and experiences from such environments will bring about upgrading and enhancing the client experience of the 3D Password. Moreover, gathering attackers from various foundations to break the system is one of the future works that will lead to system improvement and demonstrate the complexity of breaking a 3D password. This paper introduces a study of the 3D password and a way to deal with reinforce it by method for including a Fourth dimension, that that deals with time recording and gesture recognition, and that would help strengthen the authentication paradigm. Henceforth we endeavor to propose a 4D Password as a one-up technique to the 3D Password.
S.No.: 356
Authors Name: Tilahun Nigussie1*, Edessa Dribssa2, Abraham Engeda3
Authors Affilation: 1(School of Mechanical and Industrial Engineering, Addis Ababa Institute of Technology, Ethiopia) 2(School of Mechanical and Industrial Engineering, Addis Ababa Institute of Technology, Ethiopia) 3(Department of Mechanical Engineering, Michigan State University, Mechanical Engineering Department, USA),
Volume & Issue No.: Volume5Issue6
Abstract: Utilisation of Micro hydro-power as renewable energy source is of great concern now a-days. For this purpose, selected types of micro hydro turbines such as Pelton, cross flow can be designed and developed depending up on the site locations. Besides, the incorporation of computational fluid dynamics (CFD) in the design process appears to be necessary in order to improve their efficiency and cost-effectiveness beyond the traditional design practices. Thus, this paper envisions/ addresses the design, modeling and CFD simulation of a Pelton turbine for one of the selected potential site (Indris River) in South West Shewa of Ethiopia to meet the requirements of the energy demands. The site has a net head of 47 m, flow rate of 0.14 m3/s and theoretical hydropower energy of 48.123KW. The design process starts with the design of initial dimensions for the runner based on different literatures and directed towards the modeling of bucket in a 3D Cad tool called CATIA V5. The runner has been analyzed in ANSYS CFX simulation tool and ANSYS static structural testing tools under given loading conditions of the turbine. The torque calculation from CFX result was further used to calculate the hydraulic efficiency. Finally, a methodology is presented to improve further the hydraulic efficiency along with complete visualization of the computed flow field using CFD.
S.No.: 357
Title : Cybersecurity Attacks: Common Vulnerabilities in the Critical Infrastructure
Authors Name: Sohail Razi Khan, Professor Luis Borges Gouveia
Authors Affilation: University Fernando Pessoa, Computer Science Department, Porto, Portugal
Volume & Issue No.: Volume5Issue6
Abstract: The future of the digital economy relies upon the ability of cybersecurity technical solution with non-technical areas working in tandem with business units, executives, providers, and end-users to prevent any cyberattacks. In the recent many years there are multiple targeted cyberattacks carried against the critical infrastructures of a digital economy across the world. These cyberattacks have resulted in permanent or long term damage to the critical infrastructure and there is steady rise in the cyber and physical security related events that continue to raise the concerns. In this paper the attempt is made to identify the vulnerabilities that exist in the critical infrastructure that are exploited by the attacker to carry out a successful attack. The paper identifies software security vulnerabilities, poorly design networks, weak configuration vulnerabilities as a major vulnerabilities that are exploited to carry out successful attacks on the critical infrastructures. The paper identified nontechnical vulnerabilities such as talent gap, budget constraints, lack of management priority and weak cyber security mechanism across various regions for a multi-national business that is spread across the globe as common vulnerabilities that are exploited for successful attacks on the critical infrastructure.
S.No.: 358
Title : Artificial Intelligence and Bluetooth Techniques in a Multiuser M-learning Domain
Authors Name: shilpa rana
Authors Affilation: VES Institute of Technology Mumbai, Maharashtra, India
Volume & Issue No.: Volume5Issue7
Abstract: This paper present implementation of mlearning that combines Artificial Intelligence (AI) and Bluetooth (BT) techniques. The objective is to build an m-learning environment where students can work in a customized way also the system provides teachers with real-time feedback about individual and group learners and how mobile learning can aid in learning, its strengths and current challenges. Applying BT capabilities on this domain can be isolated into a classroom and used by several learners simultaneously. The student activities can be supervised by means of AI strategies (planning, scheduling and expert systems). Integrating these technologies like the whole system will be able to recognize each of the users, organize his/her work and evaluate his/her results without or little educator intervention. Developing of this technology contains an empirical analysis of students performance, perceptions, and achievements when using ALAS on mobile devices.
S.No.: 359
Title : Artificial Intelligence and Bluetooth Techniques in a Multiuser M-learning Domain
Authors Name: shilpa rana
Authors Affilation: VES Institute of Technology Mumbai, Maharashtra, India
Volume & Issue No.: Volume5Issue7
Abstract: This paper present implementation of mlearning that combines Artificial Intelligence (AI) and Bluetooth (BT) techniques. The objective is to build an m-learning environment where students can work in a customized way also the system provides teachers with real-time feedback about individual and group learners and how mobile learning can aid in learning, its strengths and current challenges. Applying BT capabilities on this domain can be isolated into a classroom and used by several learners simultaneously. The student activities can be supervised by means of AI strategies (planning, scheduling and expert systems). Integrating these technologies like the whole system will be able to recognize each of the users, organize his/her work and evaluate his/her results without or little educator intervention. Developing of this technology contains an empirical analysis of students performance, perceptions, and achievements when using ALAS on mobile devices.
S.No.: 360
Title : Design & Implementation of a DNA Compression Algorithm
Authors Name: Manju Rani, Pawan Kumar Mishra
Authors Affilation: M.Tech Scholar, UTU, Dehradun Assistant Professor - CSE Uttarakhand Technical University, Dehradun
Volume & Issue No.: Volume5Issue7
Abstract: If we talk about the DNA arrangements, we understand that it oversees only four pictures addressing four nucleotide bases {A, C, T, G}. these four pictures could have been shown as {00, 01, 10, 11} independently, where we can watch that every nucleotide base having 8 bit is made to include 2 bits, when encoded in the already said parallel shape. This could have been a champion among the most capable encoding designs, if and only if there were the same pictures in the plan, other than A, G, T and C base characters. Here, however the encoding ought to be conceivable, yet essential issue will occur in the midst of decompression as the twofold code of the unanticipated picture like N or S will organize with the matched code of A, G, T and C. An another sort of figuring used for DNA weight is Differential Direct (2D) Coding Algorithm, which can vanquish this issue by isolating between the base characters and the astounding pictures. The 2D coding computation uses the social occasion of three characters (triplets), being supplanted by some other character [28]. This calculation was essentially intended to separate between the arrangement information and the assistant images, which had many drawbacks in the Direct Coding algorithm. In this research we are presenting an improved DNA compression algorithm which is based on differential direct coding and variable length look up table.
S.No.: 361
Title : Design & Implementation of a Page Replacement Algorithm Using Block Reading
Authors Name: Ruchi Gairola, Sanjay Kumar
Authors Affilation: M.Tech Scholar, UTU, Dehradun Assistant Professor - CSE Uttarakhand Technical University, Dehradun
Volume & Issue No.: Volume5Issue7
Abstract: The software developers write programming codes of any length without concerning of primary memory available with the users. It is possible by using the concept of virtual memory. As the name implies, virtual memory is a concept of executing a programming code of any size even having a primary memory of lesser size than the size of program to be executed. The virtual memory is implemented with the help of concept called paging. The operating system allocates a number of memory frames for each and every program to be executed. The programming code is equally divided into a number of pages. The size of pages and memory frames are kept equal for the better utilization of the memory. As every process is allotted a limited number of memory frames, the need of page replacement is obvious. To overcome this limitation, a number of page replacement techniques are proposed by the researchers. In this thesis I have proposed an improved page replacement technique which is based on the concept of block reading from the secondary storage. The disc access is very slow as compared to primary memory access. Whenever there is a page fault, the required page is accessed from the secondary storage. The frequent page faults increase the execution time of process. As per the proposed methodology, a number of pages equal to the allotted memory frames are read every time when there is a page fault. After reading a block of pages, it definitely increases the possibilities of page hit and as a result it will improve the hit ratio for the processes.
S.No.: 362
Title : A Priority Based Round Robin CPU Scheduling Algorithm
Authors Name: Monika Belwal , Sanjay Kumar
Authors Affilation: M.Tech Scholar, UTU, Dehradun Assistant Professor - CSE Uttarakhand Technical University, Dehradun
Volume & Issue No.: Volume5Issue7
Abstract: Operating system is an essential part of any computer system. Scheduling is the basic paradigm of an Operating System. Process scheduling is the technique of arrangement of processes in order to execute in a defined fashion. The aim of scheduling is to make the system efficient and fast. The basic scheduling algorithms are: First Come First Serve (FCFS), Round Robin, Priority Based Scheduling, Shortest Job First (SJF) etc. Our main focus is on Round Robin Scheduling algorithm. There are various issues related to Round Robin Scheduling. One of the limitations of Round Robin Scheduling is the length of the Time Quantum. If the Time Quantum is too large, the scheduling will be similar to FCFS otherwise a smaller Time Quantum results in increased Context Switches. Our main objective is to overcome this limitation of traditional Round Robin scheduling algorithm and make maximum utilization of the CPU and make the system more efficient. In this thesis, we proposed an algorithm that categorizes the processes as High priority processes and low priority processes. The proposed scheme reduces the average waiting time of high priority process irrespective of the low priority process. The overall average waiting time will change according to the set of processes considered. Based on the average waiting time, it is justified that the proposed scheme provides reduced average waiting time of the process set than previously proposed schemes.
S.No.: 363
Title : Implementation of Mining Trajectory Patterns for various Temporal Tightness
Authors Name: 1. Ashwini Maruti Bhingare 2.Rahul.L .Paikrao
Authors Affilation: Amrutvahini college of Engineering,sangamner
Volume & Issue No.: Volume5Issue7
Abstract: Some traditional methods of UT pattern mining are inefficient as well as more complicated which only capable of identifying specific type of trajectory pattern from input dataset. We proposed UT-pattern mining framework to address the limitations of previous methods. It contains two phases to mine UT patterns such as, initial pattern mining & pattern forest construction. Clusters of various UT patterns are constructed using Traclus method. This cluster contains initial UT patterns. After pattern forest construction, patterns are classified into different categories such as, time relaxed, time constrained & time independent. Along with the UT pattern discovery & classification proposed system identifies Geographical Mobility Borders. With experimental result system demonstrates the efficiency of UT pattern framework in terms of time and memory.
S.No.: 364
Title : Patient report Retrieval Using Semantic LDA with Cosine Similarity
Authors Name: Poonam Yadav
Authors Affilation: D.A.V College of Engineering & Technology, Kanina, Haryana 123027, India
Volume & Issue No.: Volume5Issue7
Abstract: Now a day, the enlargement of information technology has altered the entire human life which includes medical and healthcare behaviors. A medical information storage and retrieval system is a precious tool used by the healthcare professionals for investigating the medical cases. Extracting the similar cases from the case database can aid the doctors to recognize the same kind of patients and their treatment details. This paper presents the case retrieval method for extracting the similar cases from the collection of patient’s reports. Initially, the patient’s details are gathered and divided into 100 reports. Then, the stop words and delimiters are removed from these reports, and each report is applied to the SLDA model. The SLDA model generates the topic keywords for the reports, and the patient-topic matrix is constructed. Then, the query report is sent to the proposed system, the stop words removal and the stemming process is performed. Then, the keywords in the query report are matched with the retrieved topic keywords, the most similar topic is extracted and the corresponding patient report is retrieved from the database. The matching process is performed by the cosine similarity. The performance of the proposed method is analyzed with the existing methods, such as LDA and LDA+CS for the performance measures DCG and fall-out. The experimental results show that the proposed method attains the higher DCG of 20.154 and the minimum fall-out 0.032 when compared to the existing methods.
S.No.: 365
Title : A Method Based on Sequential Access Patterns for Information Retrieval
Authors Name: Poonam Yadav
Authors Affilation: D.A.V College of Engineering & Technology
Volume & Issue No.: Volume5Issue7
Abstract: Extraction of relevant information from the web has become the emerging challenge as the data in World Wide Web has been progressively increased. To solve this problem, a valid method called web usage mining is used that can mine weblogs for user models and recommendations. The general recommender systems of the web mainly function on the basis of association rule mining and clustering. Apart from this, web personalization is proposed in this paper which adopts sequential access pattern mining. The recurrent sequential web access patterns are recognized through this method. Those patterns are further stored in tree structure termed as pattern-tree. The subsequent processes such as matching and producing web links for recommendation are done with these stored patterns. Finally, a valuable performance analysis is carried out to validate the proposed model.
S.No.: 366
Title : Incident Response Management
Authors Name: Dr. Digvijaysinh Rathod
Authors Affilation: Institute of Forensic Science, Gujarat Forensic Sciences University
Volume & Issue No.: Volume5Issue8
Abstract: Incident Response is an important component of an enterprise business continuity and resilience program. The increasing numbers of information security threats can damage enterprise working business and can harm enterprise information assets. A well configured Incident Response Framework can help reduce the number of Incidents.Understanding the incident and methodologies to effectively manage unexpected disruptive events with the objective of minimizing impacts and maintaining or restoring normal operations within defined time limits should be important part of any companies’ business plan. The aim and objective of this paper is to propose and configure an effective incident response management framework to detect, report and eliminate the incident. Same proposed IRM framework is configured and tested with AlienVault named ‘OSSIM’.
S.No.: 367
Title : Evaluation of best Steganography Tool using Image Features
Authors Name: Jensi Lakdawala, Jiya Rankawat, Preeti Bhatt
Authors Affilation: UKA Tarsadia University
Volume & Issue No.: Volume5Issue8
Abstract: Steganography is technique of hiding a data under cover media using different steganography tools. Image steganography is hiding of data (Text/Image/Audio/Video) under a cover as Image. This review paper presents classification of image steganography and the comparison of various Image steganography tools using different image formats. The attainment of this study is to identify the reliable and best tool available in the market for Steganography. Analysing numerous tools on the basis of Image features and extracting the best one is the main goal of this paper.
S.No.: 368
Title : Hybrid Approach of Scheduling Using BAT&CUCKO Algorithm in Parallel System
Authors Name: Sharanjeet Singh, Manisha
Authors Affilation: Asst.Prof. Deptt of Computer Science Deptt of Computer Science GNDU RC Gurdaspur GNDU RC Gurdaspur
Volume & Issue No.: Volume5Issue8
Abstract: These days, Grid computing has increased huge consideration because of its innovative progression, cost lessening and accessibility. In the Grid situations, the appropriate scheduling of the got tasks over service gives has turned into a vital and essential issue. The scheduling issue in Grid situations is a NP-hard issue. Hence, numerous heuristics have been proposed to take care of this issue up to now. In this paper, we propose another bee colony calculation to plan the tasks on service providers in the Grid conditions. The comes about exhibited that the proposed calculation has a superior operation as far as task execution time, holding up time and missed tasks.
S.No.: 369
Title : Different Methodologies for Minimizing Congestion in the Deregulated Power System: a Review
Authors Name: Naresh Kumar Yadav and Jyoti Srivastava
Authors Affilation: DCRUST
Volume & Issue No.: Volume5Issue8
Abstract: In the restructured power system, optimal power flow (OPF) in the smart grid is the important technical matter to be look upon as related to congestion management, loss in transmission lines and power network operating constraints. The power transaction increases with the increase in customer demand and to meet this demand and to satisfy it, the competition between generating companies (GENCOs) also increases. This results in the stress on transmission network due to which threat occur to voltage security, line flow limits can also get violated, line losses may also increases, requirement of reactive power also increases, threat to stability of power system and also the congestion of transmission network due to overload of the lines. This is overcome by rescheduling the generators or optimally locates the distributed generation which should be cost efficient and with minimum losses with the same operating constraints. This paper includes the review of some of the important methods and techniques such as nodal pricing technique, FACTS devices, Differential Evolution method (DE), Static Synchronous Compensator (STATCOM), Extended interior point technique (EQIP) based OPF, Unified Power Flow Controller (UPFC), Firefly Algorithm, fuzzy logic, Particle Swarm Optimization method (PSO), Mixed integer nonlinear programming (MINLP) and Genetic Algorithm method (GA) which are used for managing the problem of congestion management (CM) in Deregulated power system. Every method has its own importance and capability to deal with the problem of congestion in transmission lines in a restructured power system by rescheduling the generators.
S.No.: 370
Title : Assessment and Enhancement of Available Transfer Capability under Deregulated Environment: A Review
Authors Name: Naresh Kumar Yadav and Anju bala
Authors Affilation: Deenbandhu Chhotu Ram University of Science & Technology, Sonipat, India.
Volume & Issue No.: Volume5Issue8
Abstract: In deregulated power markets, to intimate ATC by Independent System Operator (ISO) is a prime concern. For all companies, Independent Power Producers (IPPs), retailers, transmitters, distributors and customers, the prime important indication is ATC, to participate in the commercial transaction of electricity. ATC communicates between remaining transfer capability over and above already committed use in a competitive power markets for trading. This paper reviews the literature survey analogous to assessment and enhancement of ATC in deregulated power markets.
S.No.: 371
Authors Name: Dr. T Nancharaiah
Authors Affilation: Bapatla Engineering College, Bapatla
Volume & Issue No.: Volume5Issue8
Abstract: Friction Stir Welding (FSW) is solid state welding process. This process is widely used in now a day because it produces sound welds and does not have common problems such as solidification and liquefaction cracking associated with fusion welding techniques. Using Taguchi design of experiments, at different levels of identical process parameters, orthogonal array is selected based on the orthogonal array the test specimens are to be prepared using FSW process. The present work aims to determine the feasibility to weld aluminium alloy AA6061 by FSW process and study the effect of process parameters on the mechanical properties of welded joint. By using MINITAB17 analyzed the results and plotted the S/N ratio and mean graphs. Special welding fixture fixed on conventional milling machine has been conducted to attempt this welding. Finally, the mechanical properties of welded joints were investigated using destructive testing.
S.No.: 372
Authors Name: V.Balaji, P.Sathyaseelan, D. Rajesh
Authors Affilation: aAssistant Professor, Department of Mechanical Engineering, VEL TECH Dr.RR & Dr.SR University, Avadi, Chennai
Volume & Issue No.: Volume5Issue8
Abstract: Brake squeal noise has been under investigation by automotive manufacturers for decades due to consistent customer complaints and high warranty costs. Brakes generally develop large and sustained friction-induced oscillations, referred to brake squeal. Brake squeal is considered a serious operational braking problem in passenger cars and commercial vehicles. This project involves an approach to discover the main causes of disc brake squeal occurrence using finite element methods (FEM). The application of complex eigenvalue analysis in a finite element model of a disc brake system is used to extract unstable modes. The effect of the operational parameters (friction coefficient, braking pressure and angular velocity) and contact stiffness on the dynamic stability of the brake system is done. Using Abaqus version 6.10 the complex eigen value are extracted and examining its real part will identify the squeal frequency
S.No.: 373
Title : Improved Image Steganographic System by using Multiple Encryption and DWT
Authors Name: Manoj Kumar Ramaiya, Dr. Dinesh Goyal , Dr. Naveen Hemrajani
Authors Affilation: Suresh Gyan Vihar University , Jaipur, Rajasthan
Volume & Issue No.: Volume5Issue8
Abstract: The protection of data over unsecure transmission network has continually a key concern in the consideration of investigators or cyber professionals. With the fast promising practice of the internet in all personnel and professional drives, the distress for the unauthorized entrance by an intruder and the valuable information will be later exploitation, has further put pressure on the industry or researchers for developing methods and techniques to protect the information from intruders involves in unlawful activities or cybercrime. Cryptography is the art which deal with the transmuting a valuable and confidential information into inaudible forms. This unintelligible information might produce mistrustful in the observance of opponents when it transfers on open or unsafe communication networks and only legitimate receiver can only understand it meaning by decoding it. Conversely, Steganography embed confidential information or secrete message in to a cover image and hides its existence. As a common practice, hiding of secrete data into other media is apply in communication on text, image or multimedia contents for the purpose of digital signature, intellectual property protection and authentication. Both Cryptographic and Steganographic methods delivers the adequate amount of security but are susceptible to intruder’s attacks when information flow over unsafe communication channel. Efforts to combines these techniques i.e. Steganography and Cryptography, gives the ultimate results in security enhancement. The steganographic techniques currently used mainly emphasis on embedding mechanism with fewer attention to pre-processing of valuable information. Pre-processing of data offer robustness, high security level and flexibility. The suggested hybrid mechanism is exclusive method for image steganography based on multiple encryption using Triple Data Encryption Algorithm (TDEA) improving the security over unsecure transmission channel.
S.No.: 374
Title : Out-of-plane effect of stacking sequences on crack resistance and energy absorption of glass fiber vinyl ester composite: Experimental
Authors Name: Arnauld Robert Tapa, Wang Ji Hui
Authors Affilation: School of Materials Science and Engineering, Wuhan University of Technology, China
Volume & Issue No.: Volume5Issue8
Abstract: The laminate stacking sequences are considered in fiber composites manufacturing, as one of the most complex design parameters affecting the overall properties of the final parts. However, due to the big number of fibers, matrix, and parts geometries; and the number of possible combinations, there is still a need of data on the effect of stacking sequences, on crack resistance and energy absorption capability of fiber composites. Many works have been done so far to understand this effect; with most using whether carbon or glass fibers combined with epoxy or polyester resin, but very few involve the vinyl ester resin, very popular in industries, but used mostly in the case of filament winding process instead of vacuum assisted resin infusion (VARI) process, or hand layup process as it is the case for epoxy and polyester resin. In this work, we will investigate the out-of-plane effect of stacking sequences, on crack resistance and energy absorption capability of short-beam, made of unidirectional glass fiber vinyl ester composite. The investigation is conducted experimentally under three-point-bending test, with samples of composite manufactured using the VARI process, and according to the following stacking sequences: [0]16, [01/903]2S, [02/902]2S, [03/901]2S, [90]16, [901/03]2S, [902/02]2S and [903/01]2S. This work can be used as database in case of research on out-of-plane behavior of thin-walled structures, made of unidirectional glass fiber vinyl ester composites.
S.No.: 375
Title : Comprehensive observation of Different Underwater Sensor Network Protocols
Authors Name: Ms.Shaveta,Mr.Pawan Luthra, Er.Gagandeep
Authors Affilation: Shaheed Bhagat Singh State Technical Campus, Ferozepur
Volume & Issue No.: Volume5Issue8
Abstract: Wireless Sensor Network (WSN) in serous channel also known as Underwater Acoustic Sensor Network (UASN) is noteworthy owing to its encircling environment. This domain of research is draw the concern of many investigators and has enabled a immense range of applications including assembling of information, assisted observing, mine inspection, observation of equipment, catastrophe prohibition, under sea scrutiny and surrounding observation [6]. In this paper we implement the differential routing protocols like Vector Based Forwarding, VBVF and DBR in an underwater architecture. The comparison among protocols is based on the simulation results, i.e Energy Consumption, Average Throughput, Residual energy ,Average End to End Delay and Packet Delivery Ratio are analyzed. Aqua-Sim, an NS2 based underwater simulator is used for carrying out the simulations and the evaluation results confirm that DBR can achieve better performance than other discussed protocols.
S.No.: 376
Title : skew detection techniques for printed documents of various scripts :A survey
Authors Name: Er balwinder singh,Er amanpreet kaur
Authors Affilation: Yadavindra college of Engineering, Talwandi Sabo
Volume & Issue No.: Volume5Issue9
Abstract: Various problems may get introduced during document scanning, which may decrease the overall accuracy of optical character recognition system. These problems are skewness, noise, unequal intensity etc. Skewness is frequently occurring phenomenon due to non-alignment of image border with scanner. Various techniques have been developed to detect and correct the skew in different type of documents. The commonly used techniques are based on identification of baseline, projection profile, Hough transformation, nearest neighbor, morphological, cross correlation. Each technique has its own pros and cons. In this paper, literature survey of skew detection methods for printed document of various scripts has been carried out.
S.No.: 377
Title : Segmentation and Analysis of Renal Biopsies and Histological Images of Diabetic Nephropathy Using Otsu’s Method.
Authors Name: Yogini B.Patil, Seema Kawathekar
Authors Affilation: Department of Computer Science and Information Technology, Dr. Babasaheb Ambedkar Marathwada University, Aurangabad (M.S.), India
Volume & Issue No.: Volume5Issue9
Abstract: Diabetic nephropathy is a significant cause of chronic kidney disease and end-stage renal failure globally. Much research has been conducted in both basic science and clinical therapeutics, which has enhanced understanding of the path physiology of diabetic nephropathy and expanded the potential therapies available. The computational technology enhanced towards medical research, substantial research work has been done towards analysis of Diabetic nephropathy. It is a challenging task as 100% detection of Nephropathy disease with the regular pathological procedure is not possible [1]. We propose a solution to the problem of segmentation of the renal Biopsies images for the analysis. This research work examined the analysis of diabetic nephropathy in the context of the Otus image segmentation approach. The quality of proposed image segmentation is evaluated using SNR and PSNR statistical measure. SNR is 90%. The PSNR based quality of segmentation is 100%. The rate of recognition can be further improved by increasing the size of the database and by considering the better statistical measure.
S.No.: 378
Title : Segmentation and Analysis of Renal Biopsies and Histological Images of Diabetic Nephropathy Using Otsu’s Method
Authors Name: Yogini B.Patil, Seema Kawathekar
Authors Affilation: Research student, **Assistant Professor Department of Computer Science and Information Technology, Dr. Babasaheb Ambedkar Marathwada University, Aurangabad (M.S.), India
Volume & Issue No.: Volume5Issue9
Abstract: Diabetic nephropathy is a significant cause of chronic kidney disease and end-stage renal failure globally. Much research has been conducted in both basic science and clinical therapeutics, which has enhanced understanding of the path physiology of diabetic nephropathy and expanded the potential therapies available. The computational technology enhanced towards medical research, substantial research work has been done towards analysis of Diabetic nephropathy. It is a challenging task as 100% detection of Nephropathy disease with the regular pathological procedure is not possible [1]. We propose a solution to the problem of segmentation of the renal Biopsies images for the analysis. This research work examined the analysis of diabetic nephropathy in the context of the Otus image segmentation approach. The quality of proposed image segmentation is evaluated using SNR and PSNR statistical measure. SNR is 90%. The PSNR based quality of segmentation is 100%. The rate of recognition can be further improved by increasing the size of the database and by considering the better statistical measure.
S.No.: 379
Title : A Faster Approach for Emergency Message Dissemination in VANETs
Authors Name: Prativa Das, Prof. Satish Chand, Anamika Maurya
Authors Affilation: Jawaharlal Nehru University, New Delhi, India
Volume & Issue No.: Volume5Issue9
Abstract: Nowadays, transportation systems face diverse complexities because of the increasing passenger mobility, air pollution, road accidents etc. VANETs are effective in ensuring passengers’ protection from road accidents and guiding the drivers how to ride carefully. Effectively broadcasting emergency messages is an important issue in VANETs. An efficient approach for disseminating basic safety-associated message among vehicles is broadcasting to attain cooperative driving in VANETs. Yet, this approach undergoes from numerous major challenges like broadcast storm problem, hidden node terminal, link unreliability and message redundancy etc., that reduces the performance of the network significantly. A distance based multi-hop broadcast protocol enhanced DSAB (Dynamic Search-Assisted Broadcast) protocol is proposed for resolving such problems in inter-vehicle communications. In this paper, DSAB protocol is improved using V2R (vehicle to road site units) communication. In DSAB only V2V (vehicle to vehicle) communication is allowed for which the rate of circulation of an emergency message in a particular area is comparatively lower. The penetration rate in the network has improved due to V2R communication in enhanced DSAB. Some mathematical analysis on the probability of vehicles in a segment is done to support the proposed protocol in different vehicle densities. Simulations of the proposed protocol are carried out in ns-2 simulator. Analysis of the simulation results shows that the performance of the proposed protocol enhanced DSAB has a significant performance against the related work end to end delay and packet delivery ratio as compared to the other considered broadcast techniques.
S.No.: 380
Title : Issues and challenges in handoff management
Authors Name: Pooja Dhand, Parwinder Kaur Dhillon
Authors Affilation: Apeejay College of Fine Arts, Jalandhar
Volume & Issue No.: Volume5Issue10
Abstract: Mobility management is very essential component for the next generation Wireless networks. Today research studies are focusing on customer satisfaction and user preferences. As Technology will grow further handoff process to handle mobility in heterogeneous networks becomes of utmost importance. In this paper, a wide range of algorithms are being explored and a comprehensive survey has been presented to explore the various issues remaining. The paper discusses underline concepts of handoff and few algorithms based on various methods such as fuzzy logic, genetic algorithms, neural networks, etc. This paper also focuses on issues still remaining and need to be focused for building up of an efficient algorithm for handoff management.
S.No.: 381
Title : Analysis of Feature Extraction Methods for the Classification of Brain Tumor Detection
Authors Name: A.Harshavardhan, Dr. Suresh Babu,Dr. T. Venugopal
Authors Affilation: Research Scholar, Department of Computer Engineering, JNTUH & Asst. Prof. Dept of CSE, SREC, Wgl, India
Volume & Issue No.: Volume5Issue10
Abstract: Diagnosing Brain tumor cancer is a difficult task for Urologists, Radiologists, and Oncologists. Ultrasound imaging is one of the hopeful techniques used for early detection of Brain tumor cancer. The aim of this article is to focus on current and presented brain tumor detection and classification methods from MRI brain images. A brain tumor is a collection, or mass, of irregular cells in brain. Skull, which covers brain, is very stiff. Any development inside such a restricted space can cause troubles. Brain tumors can be cancerous (malignant) or noncancerous (benign). When benign or malignant tumors develop, they can cause the force inside skull to increase. In this paper, the assessment of texture features is significant for several image handing out applications. The performance of the features pull out from the various texture methods such as histogram, Gray Level Cooccurrence Matrix (GLCM), Gray-Level Run-Length Matrix (GRLM), are analyzed separately. In this paper, it is proposed to combine histogram, GLRLM and GLCM in order to study the performance. The Support Vector Machine (SVM) is used to classify the extracted features into benign or malignant. The performance of texture methods are assessed using a variety of statistical performance measurements such as sensitivity, specificity and accuracy. The comparative analysis has been performed over 5500 digitized images of Brain tumor.
S.No.: 382
Volume & Issue No.: Volume5Issue10
Abstract: The retinal image diagnosis is an important methodology for diabetic retinopathy detection and analysis. In the scope of image processing, segmentation of the optic disc, blood vessels and macula in retinal images is important for the research area of medical image analysis. It is used to efficiently implement the diagnostic evaluation and taken as a basis of the cure to illness of patient. In this paper, the morphological operations are used to detect and segment the blood vessels from the retinal image. The eye is very unique part in human body where the vascular conditions are directly observed in vivo. The different approaches have been developed for blood vessel and optic disc detection; few of the approaches are discussed in this paper. The blood vessel identification is performed on the basis of blood vessel characteristics such as blood vessels orientation, cross-sectional area, surface shapes, and abnormal regions volumes. The detection of this at an early stage can aid the person from vision loss. The examination of retinal blood vessel structure can help to detect the disease, so segmentation of retinal blood vessel vasculature is important and is appreciated by the ophthalmologists. In this work, we present the approach of blood vessel segmentation using computer intelligence by edge based segmentation and vessel detection using morphological processing. A computer aided fundus image analysis provides an immediate detection and properties of retinal features prior to specialist inspection. The image segmentation algorithms play an important role in numerous biomedical imaging applications such as diagnosis, localization opathology, treatment planning, anatomical structure and treatment planning. In addition to diagnosis of Diabetic Retinopathy (DR), two graphical user interfaces(GUI’s) were also developed during this work, this first is for collection of lesion data information and was used by the ophthalmologist in marking images for database while the second GUI is for automatic diagnosing and displaying the diagnosis result in a friendlier user interface and is as shown later. In this work, some retinal images taken form STARE, DIARECT-DB0 database for glaucoma detection and retinopathy analysis. The algorithm is tested with a separate set of 400 images. These works using fuzzy-c-means, k-means provides Sensitivity (classify abnormal fundus images as abnormal) and specificity (classify normal fundus image as normal) was calculated for the algorithm almost 90% and 80%. The scheme has been applied in analyzing images acquired from standard retinal image databases. Results have showed that the algorithm achieve better accuracy for image base classification of abnormalities due to Diabetic Retinopathy and Glucoma Detection of fundus images.
S.No.: 383
Title : Analysis and Comparison of Software Testing Tools
Authors Name: Dr.M.Kannan, K.Lokeshwari
Authors Affilation: SCSVMV UNIVERSITY
Volume & Issue No.: Volume5Issue10
Abstract: Software Testing is the series of actions to seeking the error defects in the software. It mean, a probe carry with comprehensive information of the quality of software underneath the test. Software Testing tools allow the developer and tester to proceed the work in a way of effortlessly which gives the path as computerize practice of difficult in the software progress. Generally, testing arises as manual or automated where the comparison is passes between the expected results with the actual result. In these days, Automated Software testing is high ranking for software projects so as to naturally validate and verify numerous process of the project. The goal of this scrutiny is to assess and reconcile the automated software testing tools such as QTP, Selenium and Load Runner to dig out their usability, performance, legibility. This study helps the developer and tester to select the apt tool depends on their needed.
S.No.: 384
Title : Evolutionary Algorithm Based Optimization of Hybrid Renewable Energy System in Hosapete,India
Authors Name: Dr.S B Shivakumar, Sampathkumar.V.Patil
Authors Affilation: 1Principal,Department of Electrical Engineering,PDIT,Hosapete 2Research Scholar,Department of Electrical Engineering,VTU,Belagavi
Volume & Issue No.: Volume5Issue10
Abstract: This paper demonstrates the use of Hybrid Power System in HospetTaluk of Karnataka State ,Indian Country.Themeterological Data of solar radation and wind speed from NASA surface and solar energy database have been taken (latitude 15.27°N and longitude 76.39°E).Presently many Hybrid Resources using Diesel generator as a backup source,where we again depend on fossil fuel or coal which is exhaustible,but in these paper we are completely demonstrating use of Hybrid wind/PV in Hospet for around 160 family of approx. 1200 People community and based on wind speed ,solar energy and available components,the optimization of Hybrid system is done and lastly demonstrated the economic advantages like cost,paypback period, compared to Conventional energy source.The cost Reduction is around 70% compared to Conventional Energy source.Finally the Hybrid RES reliability and power quality is improved using Optimization of Energy Management System(EMS) through PID Parameter tuning ,where PID parameter is tuned through different Evolutionary Algorithm approaches like Adaptive Genetic Algorithm and Particle Swarm Optimization.
S.No.: 385
Title : Energy Saving Through Home Automation and Data Mining Technique
Authors Name: [1]Rahul Gaikwad, [2]Amol Joglekar
Authors Affilation: Mithibai College, Mumbai
Volume & Issue No.: Volume5Issue10
Abstract: We build on electricity to power our appliances, and electronic devices in our home. As we consume more electricity in our homes, our electricity bills rise. Efficient products and energy-saving strategies can help us to save money and energy at home. Therefore there is a need of home automation system which would be a very good choice for energy saving and comfort. In the proposed paper a home automation system is proposed using and integration of Arduino UNO, Raspberry Pi 3 and sensors. The model will be developed using the concepts of data-mining techniques for the analysis so that one can cut the cost of the electricity bill. The system has features like computing, control, and connectivity. The integration of the system with an Android app makes it possible to analyze the data and saves the electrical energy.
S.No.: 386
Title : Essential subhypermodules and their properties
Authors Name: Behnam Talaee
Authors Affilation: Department of Mathematics, Faculty of Basic Sciences, Babol Noshirvani University of Technology, Shariati Ave., Babol, Iran Post Code: 47148-71167
Volume & Issue No.: Volume5Issue10
Abstract: Abstract Let R be a hyperring (in the sense of [8]) and M be a hypermodule on R. In this paper We will introduce and study a class of subhypermodules of M. We will study on intersection of this kind of subhypermodule a give some suitable results about them. We will proceed to give some interesting results about the complements, direct sums and independency of this kind of subhypermodules.
S.No.: 387
Title : Development and Fabrication of Military surveillance robot
Authors Name: VEERESH H
Volume & Issue No.: Volume5Issue11
Abstract: Military Robot is developing to get used in the defence lands, Instead of rescuing soldier’s lives on battlefield; this can be used to oppose the opponents. Surveillance is the monitoring of the behaviours, activities, managing and directing the robot through a camera. It is provided to the robot, so that operator can estimate the situation in war-field from his control room. On detecting any militants on the field, firing can be done with help of gun provided to the robotic arm. This robot can ascend any obstacles en-tacked through step climbing mechanism. The main objective of the project is to provide an efficient surveillance where ever high level security is needed. The proposed system is an embedded based robotic module with effective and robust design. With proposed system; soldiers can get helpful and can experience automation to the maximum.
S.No.: 388
Title : Securing E-banking transactions by OTP (one time password) method (Look at SMS Technology)
Authors Name: Syed Masaid Zaman , Dr. Manoj Kumar , Dr. Qamar Parvez Rana
Authors Affilation: (Ph.D Scholar of(Department of IT) Shrivenkateshwara University Gajraula, U.P-INDIA),
Volume & Issue No.: Volume5Issue11
Abstract: There are a continuously rising number of customers who use electronic banking because of its expediency. But the security and privacy of Information may be one of the prime concerns to the Electronic banking users. The issue with Electronic banking applications is that they send information straightforwardly to customer in plain text form compromising with security. The solutions to the security issues require the use of software-based solutions that occupy the use of encryption algorithms. For this we suggest a challenge/response -based short-time password authentication methods using Symmetric cryptography in mixture with Software Security model. In this conceals bank hides clients transaction data is secure SMS using IDEA symmetric cryptographic algorithm and propel it to customer application supported handset. Customer application decodes information in secure manner the encryption and decryption are characterized by a secret key that the legal parties have to posses. So, in face of the present security issues and the developing number of attacks and consequent frauds, new internet banking systems ought to be planned as to given better authentication and identification.
S.No.: 389
Title : A study on Big Data and its Security challenges
Authors Name: Dr.B.Ben Sujitha , V. Devi Surya, C.Soumiya
Authors Affilation: Kalasalingam University
Volume & Issue No.: Volume5Issue11
Abstract: Increasing web services day by day and huge volume of data is also increasing exponentially. Processing a large amount of data efficiently can be a substantial problem. Currently, the method for processing a large amount of data comprises adopting machine learning techniques. Big data is an all-encompassing term for any collection of data sets so large and complex that it becomes difficult to process them using traditional data processing applications. The challenges comprise analysis, capture, creation, search, sharing, storage, transfer, visualization, and privacy violations. This paper provides the brief note on the security challenges in big data.
S.No.: 390
Title : Remote vehicle shut off system for controlling Vehicle Ramming Attacks
Authors Name: Mr. Ranvir Anand Ghate, Mr. Sunil Pandit Mahajan, Mr. Nadaf S.K. and Mr. Madhukar Malhari Wakhare
Authors Affilation: 4MIT College of Arts Commerce and Science, Alandi (D), Pune, Maharashtra, 412105
Volume & Issue No.: Volume5Issue12
Abstract: The main goal of this paper is to propose a low cost and efficient system which will control vehicle ramming attacks. Nowadays, the vehicle ramming attacks are mostly used by terrorist and became an important security threat to the world. So, this paper presents the system in which the transmitter, real-time monitoring module will send the commands remotely and the receiver section will perform the necessary actions to shut off the engine of a specific vehicle using GSM, GPS, and Microcontroller.
S.No.: 391
Title : A Novel Framework for Digital Image Steganalysis using Statistical Features
Authors Name: G.R Suryawanshi, Dr.S.N.Mali
Authors Affilation: 1Research Scholar, DYPIT Pune, Suryawanshi.rs@gmail.com, 2Principal, DYPIT, Pune
Volume & Issue No.: Volume5Issue12
Abstract: As the modern world is gradually becoming internet and computer savvy with huge amount of information stored and exchanged over the internet through digital images for covert communication. There are different methods to hide information in digital images in different domain. First part of this paper gives concise information about different approaches for exiting steganalysis techniques for information detection in images. The objective of this paper is to know limitation of exiting Steganalysis techniques and proposed a Universal Steganalysis technique with the help of prominent statistical features of digital images through which the presence of information will be detected. There are lot of techniques for features extraction and classification. All techniques treat different images as same, therefore the different statistical properties of different images are considered for prominent feature selection. Second part consist of proposed model for universal Steganalysis
S.No.: 392
Title : Direct Torque Control Of Dual Star Induction Motor Based On Space Vector Modulation Using A Neuro Fuzzy Speed Controller
Authors Name: Bouziane Meliani1, Abdelkader Meroufel2
Authors Affilation: 1Departement of Electrical Engineering University Centre of Relizane Algeria 2 Djilali Liabès University of Sidi Bel-Abbès(DLUSBA) Algeria
Volume & Issue No.: Volume5Issue12
Abstract: A direct torque control (DTC) based on space vector modulation (SVM) strategy with closed loop torque control for dual three-phase induction motor drives (DSIM) is discussed in this paper .After modeling the machine, the voltage source inverter and the DTC-SVM technique applied to DSIM are defined and described. To control the speed of a dual star induction motor driven by the DTC-SVM and in the objective to cancel the static error and to reduce the time response while preserving the system stability, the proportional integral corrector PI used is replaced with a neuro fuzzy controller. Simulation results are given to show the effectiveness of the proposed control approach.
S.No.: 393
Title : A Homogenous Secure Message Transmission in Mobile Ad Hoc Networks using Enhanced Homomorphic Encryption Scheme
Authors Name: Inderpreet kaur, Dr.A.L.N Rao
Authors Affilation: Mewar university ,chittorgarh Rajasthan India
Volume & Issue No.: Volume6Issue1
Abstract: - In MANETs the nodes are capable of roaming independently. The node with inadequate physical protection can be easily captured, compromised and hijacked. Due to this huge dependencys on the nodes, there are more security problems. Therefore the nodes in the network must be prepared to work in a mode that trusts no peer. In this paper we look at the current scheme to transmit the data in MANETs. We then propose a new scheme for secure transmission of message in MANETs as Alternative scheme for DF’s new Ph and DF’s additive and multiplicative PH. Here we also provide the computational cost of the homomorphic encryption schemes. We also provide the implementation issues of our new scheme in MANETs. For the entire message to be recoverd by the attacker, the attacker needs to compromise atleast g nodes, one node from each group g and know the encryption keys to decrypt the message. The success rate of our proposed new scheme is 100% if there are more number of active paths in each group of the network.
S.No.: 394
Authors Name: Kapil Jairath, Sunil Thakur, Dr, Navdeep Singh
Authors Affilation: Assistant Professor (Physics), D.A.V College, Jalandhar, Punjab
Volume & Issue No.: Volume6Issue1
Abstract: A contemporary design of wideband w-shaped patch antenna with defected ground structure for X band and KU band applications is presented. The presented antenna consists of w shaped patch with air gap of 1 mm. The presented antenna is designed with FR4 substrate having dielectric constant (?_r) 4.4 and thickness 3 mm .The presented antenna resonates in X-Band (9.05 to 12 GHz) and KU-Band (12 to 14GHz) applications at resonant frequencies of 9.46 GHz and 11.92 GHz respectively. The proposed antenna is simulated using FEM based software. Furthermore, parametric study is done to facilitate the antenna design and investigate the characteristic parameters (return loss, bandwidth, gain, vswr, radiation patterns) of antenna.
S.No.: 395
Title : An Empirical Review on Vowel Onset Point Detection
Authors Name: S.Poovarasan,Dr.E.Chandra
Authors Affilation: Bharathiar University
Volume & Issue No.: Volume6Issue1
Abstract: Tamil Language is one of the ancient Dravidian languages spoken in many places in India. Tamil language has 12 vowels and 18 consonants which are classified as Mutual Elutukkal (Primary letters) owing to the truth that these can operate without the required of any other letter. The vowels are termed as uyir elutukkal and the consonants are called mei elutukkal. Detection of vowel onset points (VOPs) is important for spotting subword units in Tamil language. In Tamil language, CV pattern occurs in the beginning, middle and end of a word. VOPs are identified by combining the complementary evidence from spectral peaks, excitation source and modulation spectrum. The vowel onset point is the moment at which the vowel part starts in a Consonant Vowel (CV) utterance. VOP plays a lively function in different applications of language processing, such as syllable detection, speaker verification, duration modification, language recognition, etc. The syllable-like CV utterances are essential units for both language production and speech recognition process.
S.No.: 396
Title : Accident control using music psychology of Driver through Auto-tuned FM channel in vehicle on Highways.
Authors Name: Mr. Bhalchandra B. Pawar, Mr. Ranvir A. Ghate and Mr. Madhukar Wakhare
Authors Affilation: MIT Arts, Commerce and Science College, Alandi (D), Pune,412105.
Volume & Issue No.: Volume6Issue1
Abstract: The research in now a day’s examined the effect of loud music on driving performance, and mental effort on driver psychology. It is found that loudness and tempo of music increases driving risks, leading to increased number of highway accidents. This paper proposes a solution over this problem by introducing an electronic system which makes use of a simple RFID based Switching circuit in a vehicle music system. A dedicated Radio station is proposed in this paper, which transmits only slow tempo and soothing music. Switching circuit implemented in music system of vehicle enables and auto tunes this station and leaves no choice for the driver of choosing other kind of music.
S.No.: 397
Title : Indirect Approaches to Minimize Environmental Emissions from Coal based Thermal Power Plants
Authors Name: Kishor B. Porate, Ghanashyam L.Bodhe, Dhanashree K. Porate
Authors Affilation: Priyadarshini College of Engineering, Nagpur, Maharashtra, India
Volume & Issue No.: Volume6Issue1
Abstract: Traditionally, many developing countries have been generating electric power using fossil fuels in which major share are of coal. Coal based power generation contribute to major environmental emissions i.e Carbon dioxide (CO2), Sulphur dioxide (SO2), Nitrogen oxides (NOx), and Suspended Particulate Matter (SPM) etc. These emissions not only degrade the air quality but also are responsible for global warming, acid rain etc. This paper deals with Economical load dispatch (ELD) implicating static compensation (STATCOM) to transmission lines and operation of thermal power plant in combination with wind generators as an indirect approach for minimization of environmental emissions. Indirect approach reduces system power losses and generation from thermal power plant, consequently resulting reduction in fuel cost and coal requirement. Programming and simulations implemented in MATLAB is used as an effective tool to evaluate environmental pollution implications of thermal power plant in combination with wind generators.
S.No.: 398
Title : A Critical Analysis on Network Layer Attacks in Wireless Sensor Network
Authors Name: Swathi B H and Gururaj H L
Authors Affilation: Vidyavardhaka College of Engineering
Volume & Issue No.: Volume6Issue1
Abstract: There are several arriving trends in the field of networks, among those Wireless Sensor Networks(WSNs) are gaining importance recent years due to its impact on cost, ability to cope up with node and communication failure, capability to withstand harsh environmental condition, mobility and ease of use. WSNs have widespread applications in the areas of medicine, environment monitoring, military, battlefield awareness, home application management etc. WSNs performs information gathering and processing in real time. In general, these networks are deployed in hostile and remote environment. Hence they are vulnerable to various security threats that adversely affect performance. The information in sensor network needs to be protected against various attacks. Attackers may employ various security threats making the WSNs system vulnerable and unstable. A detailed analysis of Network Layer attacks are done. A comparative study of the attacks are made based on the vulnerability, nature of attacks and security services.
S.No.: 399
Title : Design of Shredder and textile waste clothes recycling machine
Authors Name: Assist. Prof.Dr.Jassim Mohammad Abdulkarim¹, Shadi Bakr Ahmed²
Authors Affilation: Sulaimani Polytechnic University/ College of Technical Engineering-mechanical engineering department
Volume & Issue No.: Volume6Issue1
Abstract: Abstract: Recycling is one the most important actions that have both environmental and economic benefits and recycling waste clothes is the one type of material recycling. This paper presents the design of Shredder and textile waste clothes recycling machine that used to convert waste and old clothes to a new product that it can be used again. Our design consists of three parts, the first part is shredder machine that cut waste clothes, and is consist of the three main parts; they are system drive, a shaft with seven blades rotating cutter and hopper. The second part is flat belt conveyor that used to transfer cut waste clothe from shredder to the textile machine, and the capacity of the belt depend on the area, volume, and density. The third part is textile machines that textile cut clothes to a useful product such as (fabric, nonwoven, fibre, yarn, rag, and etc…) by cylindrical card or (taker-in) roller that consists of many teeth, the quality and size of the final product depend on the teeth angle. Therefore calculations for our design were done for all part in each machine. Also, safety factor was found four shredder machines, and all of the machine parts are displayed by 2D, 3D drawing.
S.No.: 400
Title : Design shredding magnetic and non-magnetic materials
Authors Name: Assist. Prof. Dr. Jassim Mohammad Abdulkarim¹, Paiman Sidiq Salih²
Authors Affilation: Sulaimani Polytechnic University- College of Technical Engineering- Sulaimani – IRAQ
Volume & Issue No.: Volume6Issue1
Abstract: Abstract Our present work aims the study of designing a shredder machine which is combined to a belt conveyor through a hopper, then by using a magnetic drum, magnetic materials are insulated from the non-magnetic material which later can be used in other application. The shredder machine consists of the hopper, twine shafts, three hooks blade, double row spherical roller bearing, spur gear, vee pulley, busher, electric motor, and it can cut material scraps to smaller parts after that these crushed materials transfer through the belt conveyor which is the drive, rubber belt, and driven. Also, the isolating process occurs by using a magnetic drum which is magnetic drum separator with plate magnet. The final isolated material can be useful in different applications such that (reinforce steel, rod, tub, and bar, etc….). This will be effective in increasing production rate by reusing these scrubbed materials in other forms. Finally, the safety factor of the machine was found for both bending and torsion and the results were (1.75 and 16) respectively.
S.No.: 401
Title : Design a system for making pomegranates to juice at faster way
Authors Name: Yad F.Tahir , Jassim M.Jaff
Authors Affilation: engineering colleage/ mechanical engineering/production engineering form polytechnic university of Sulaymaniyah/Iraq
Volume & Issue No.: Volume6Issue1
Abstract: Pomegranate juice is important for health and medical care for humans. The best way, and cleanest way to produce a pomegranates juice is by automatic machine, which help workers to save the huge amount of times that spending it on making pomegranates juice by manually. Our concept focus on faster way to produce pomegranates juice with minimum work at minimum time. So the pomegranate machine capable to produce a juice at cleanest way. Include five step to produce nature juice. The first step is by transferring the pomegranate to the cutting machine by using belt conveyor system, and from this step, the pomegranate washed by spray nozzle, then it will passing throw anther belt conveyor in this step, the pomegranate will prepared for cutting by the cutting pomegranate workers check the quality of the product. If the pomegranate pass the inspection part, it will continue to the deseeding machine. Since the seeds extracted from pomegranate peel. It will enter to the small holes, which provided in the rotational disk. After that, the seeds went to the rectangular container box in order to press the seeds by pressure plate, which is act like piston of the car, principle of the movement return to lead screw concept, which is very easy to adjust the pressure plate forward and backward. Finally, the unwanted seeds will throw away from the gate by manually, so the juice pumped it to the storage tank after filtration process. Our work can reduce the time for producing juice from pomegranate, and besides that, it is cleanest way to having juice automatically rather that manually. Our mechanism can produce near 100-150 liters per hours. This system can help the factories to minimize the process instead of huge design of the system that produce a juice from fruits especially those fruit that have seeds. Keywords: Mechanism of cutting, deseeding pomegranate, pressing seeds, conveyor belt.
S.No.: 402
Title : secure key pairing transmission using secret agreement in multi hope wireless sensor network
Authors Name: Prabhakar A
Authors Affilation: SCSVMV Deemed University, Enathur,Kanchipuram,Tamilnadu -631561
Volume & Issue No.: Volume6Issue2
Abstract: There is no need for the key generating terminals to obtain correlated observations in channel. So, we build a secret agreement protocol between the Nodes. Source and Designation can communicate with Each other with Relay as the Intermediate Medium. Source and Designation Share their Primary and Secondary Keys to the Relay. Both the Keys are added together and made secret key by server and transmit the Corresponding Keys to both of them. This Key is used for Communication. Source selects the routes for data transmission to Designation based on checking neighbor node capacity. After key assignment and route selection, Source gives data with first half key to relay. If the keys are match means, relay sends the encrypted data to Source based on Digital Signature Algorithm. Source splits the data to three parts and sends the encrypted data to Designation through neighbor nodes on multiple routes. Designation sends the encrypted data with second half key to server. Then server check second half key of designation if both keys are match means, server sends the decrypted data to Designation. Suppose Hacker node receives and forwards the encrypted data to server for view the original data means, server checks the keys if both are mismatch means, it easily identify the Hacker node.
S.No.: 403
Title : The Impact of Crisis Management Strategy on the Performance of the Employees of Arab Potash Company "an Applied Study"
Authors Name: Dr. Amal Yassin Al-Majali, Dr. Hamza Farhan Tamimi
Authors Affilation: Associate Professor / Balqa Applied University jordan
Volume & Issue No.: Volume6Issue2
Abstract: The study aimed at recognizing the crisis management strategy and its impact on in the performance of employees of Arab Potash company . The problem with the study is that the Arab Potash Company is under internal and external pressure can lead to a real crisis affecting the performance of employees and the resulting disruption of production and lower profits. To achieve the aim of the study self administrated questionnaire was used to collect the data . it was developed and disrributed to asample of (248) individuals. However, 8 copies were excluded for not being suitable for statistical analysis, so that the number of questionable questionnaires eligible for statistical analysis equal (240) copies. This data has been analyzed using SPSS 16. The study concluded many conclusions from them, potash company management teams used to work as a management methods to solve the problems they face, draw upon the companys management strategy change course when faced by crises is clear-cut, with the companys management is convinced that the tactical reserve strategy necessary to respond to crises. The study many of the recommendations, including, the need for concerted government and private efforts to reach appropriate solutions to mitigate the crises facing the Jordanian companies, the need to provide a center for the preparation of leaders and managers of companies, and equip them with the necessary capacity to deal with crises. The study suggested a more specialized in the field of crisis management studies.
S.No.: 404
Title : An Experimental Investigation on ICT related avenues penetration among Rural College Students in Kanchipuram Town
Authors Name: Mrs.Sujatha J & Dr.N.R.Anathanarayanan
Authors Affilation: Arulmigu Meeankshi Amman College of Engineering Vadamavandal, Namandi Post Thiruvanamalai District-604410,Tamilnadu Department of Computer Science and Application Sri Chandrasekhrendra Saraswathi Viswa Mahavidyalaya, SCSVMV Enathur, Kanchipuram, Tamilnadu
Volume & Issue No.: Volume6Issue2
Abstract: Abstract The study on ICT related avenues penetration among the rural college students in college located near Kanchipuram,Thiruvannamalai District,Tamilnadu, India involved in an experimental design by considering the ICT avenues like internet, mobile and social media. The study focused the aspects like ICT support for academic, general awareness, competency development for students who are studying in rural college background. The design of the study covered the students belong to engineering and computer application course related background. There were 75 students belong to the different branches of engineering courses and computer application both from graduation and post-graduation level chosen as sample unit for the study. The selected respondents were given exposure of learning and observing through the internet, mobile and social media sources about their academic, general awareness and competency for career related zones continuously for the selected period of time. The outcome of their learning was measured through scoring system by conducting written test. The results of score before exposure and after exposure were measured for its mean and standard deviation, in addition to that through the application of paired T-test, the existence of significant was tested for the penetration of ICT avenues on their learning and understanding process. Keywords : ICT, Penetration, paired T- test
S.No.: 405
Authors Name: B. M. Vijayalakshmi1, Dr.N.R.Ananthanarayanan2
Authors Affilation: 1M.Phil Research Scholar, Dept of CSA, SCSVMV , Enathur, Kanchipuram. TamilNadu, India –631561 Email:bmvcomputer1980@yahoo.co.in 2Associate Professor, Dept of CSA,SCSVMV , Enathur, Kanchipuram. TamilNadu, India –631561
Volume & Issue No.: Volume6Issue2
Abstract: Data mining methodology is considered as an important contribution in researches related to extraction of the hidden knowledge and information from a given set of data. Data mining is interrelated with developing and enhancing methods to discover knowledge from data. This paper deals with the concept of categorizing students based on grade, in order to improve their education studies and to measure their academic performances. This paper implements the educational data mining techniques to develop ‘students’ performance by applying appropriate algorithms and see the overall accuracy of the students.
S.No.: 406
Title : Simulation Analysis of SVPWM and THIPWM for Induction Machine Drive Without Filter
Authors Name: Manoj Kumar Chaurasia1, Dr Lata Gidwani2
Authors Affilation: RTU KOTA
Volume & Issue No.: Volume6Issue2
Abstract: PWM Converters are a powerful converter in the medium-voltage high-power range. Inside this family of converters, the Space Vector Pulse Width Modulation (SVPWM) and Third Harmonics Injection Pulse Width Modulation (THIPWM) converter have its own importance. The main control methods associated with this converter are the carrier-based PWM with added harmonic components and the space vector PWM. Two of the most important features of the THIPWM are less output voltage harmonics and current gain at the output voltage spectrum. Both control methods efficiently manage the two characteristics. This paper presents a simulation-based comparison between these two issues and shows that the two methods produce almost the same results; the choice between one and the other should be made according to other requirements.
S.No.: 407
Authors Name: E. Sivagamasundari1, Dr.N.R.Ananthanarayanan2
Authors Affilation: 1M.Phil Research Scholar, Dept of CSA, SCSVMV,Enathur, Kanchipuram. TamilNadu, India –631561 Email:sivagami_2011@yahoo.com 2Associate Professor, Dept of CSA, SCSVMV,Enathur, Kanchipuram. TamilNadu, India –631561 Email:nrananthanarayanan@kanchiuniv.ac.in
Volume & Issue No.: Volume6Issue2
Abstract: In recent years it is been observed that analysis and evaluation of students? performance and retaining the standard of education has become an important aspect in all the educational institutions. This paper is analyzing and evaluating the school students? performance using data mining classification algorithms with the help of weka tool. Data mining tool is globally accepted as a decision making tool to ease better resource use in terms of student’s performance. Some of the classification algorithms available are Random Forest, J48, Multilayer Perceptron, Decision Table and IB1 are being implemented in this paper. The results of such classification model deals with confusion matrices, accuracy level and also execution time.
S.No.: 408
Title : MapReduce: Insight Analysis of Big data via Parallel Data Processing using Java programming, Hive and Apache Pig
Authors Name: Dr. Ujjwal Agarwal
Authors Affilation: Lecturer (I.T.), Salalah College of Technology, Salalah, Oman
Volume & Issue No.: Volume6Issue2
Abstract: Digital data which come from different sources like office, school, hospital, social media or machine generated data. Apache Hadoop is a software framework to store and process this enormous amount of data. Hadoop is using HDFS and MapReduce to store and process this huge volume of data. MapReduce is a programming model initiated by Google which can be written in different programming languages like Java, Python and Ruby. The main objective of this paper is to describe the concepts of MapReduce and showing the operation by using Java Program, Apache Pig and Hive. Hive and Apache Pig working on top layer of Hadoop ecosystem and provide the level of abstraction to run the MapReduce jobs. We write MapReduce program in Java to find anagram words from input files, group them together and save the result in output file. At the end we perform the operation in HiveQL (Hive query language) and Pig Latin Script and showing the backend process in MapReduce job.
S.No.: 409
Authors Name: K. Chinnathambi, Dr.M. Punithavalli, R.Beulah
Authors Affilation: 1Ph.D Research Scholar Department of Computer Applications, Bharathiar University
Volume & Issue No.: Volume6Issue2
Abstract: Rainwater is one of the important natural resource of our mother earth. Many forms of land-based life depend on fresh water, which comes from rain. Only precipitation can enhance the echelon of Groundwater. In our mounting country few peoples are conscious inadequate ground water availability and ground water convenience and fresh water availability. Rapid urbanization is one of major part for affect the groundwater availability and accessibility and supply of water for domestic purpose and other needs. In metro city like Coimbatore is Manchester of Tamilnadu where rapidly urbanization place pushing up problems of housing, transport congestion, and solid waste disposal, directly impacts water resources and its quality endangering supply and sustainability. Artificial groundwater recharge it is based on collection of rainwater from surface such roof top water in urban areas. Rainfall prediction helps in the Artificial Recharge of Ground water. Soil is imperative source for storing water into groundwater recharge. Compares the groundwater availability and accessibility based for rapid populations and number of buildings so we compare that rainfall prediction and identify soil types in wasteland to install groundwater and then we compare groundwater availability accessibility for artificial groundwater recharge.
S.No.: 410
Title : Retrieving unrecognized objects using hyperspectral imaging
Authors Name: Mariadas Ronnie C P
Authors Affilation: SSTM
Volume & Issue No.: Volume6Issue2
Abstract: This paper deals with the analysis for retrieving unrecognized objects from an image using Hyper spectral camera and high-resolution image. Retrieving unrecognized objects from an image is made possible using spectral analysis and spatial analysis. The method proposed to retrieve unrecognized object from a high-resolution image is more efficient in comparison with the other image retrieval techniques. To identify objects in an image, it should be detected and the detection technique to identify objects in an image is accomplished in two steps: anomaly detection based on the spectral data and the classification phase, based on spatial analysis. During the classification phase, the detected points of the searched object are projected on to the high-resolution images through registration algorithms. After that, each detected point is classified using linear discrimination functions and decision surfaces based on spatial features. The two detection steps possess spectral and spatial information. In order to overcome the problems associated with the smoothness of the edges of an image, Transcoding technique is used using filter arrays.
S.No.: 411
Authors Name: Siamala Devi, Shivaani, Shreedevi and Sowdhanya
Authors Affilation: Sri Krishna College Of Technology
Volume & Issue No.: Volume6Issue2
Abstract: The shrewd vehicular ad-hoc network is the system that comprises of vehicles for smooth development and better administration of the vehicular availability over the given system The proposed calculation utilizes kinematic predictive control which is for the most part to solve the way following issue of earthbound self-sufficient vehicles. The autonomous obstacle avoidance system utilizes dynamic security advances to avoid car crashes by applying brake, as well as by guiding control. The proposed framework keeps the vehicle from slamming into a moving deterrent like person on foot bouncing out from the roadside. The framework at that point controls the vehicle self-sufficiently by the joined control of braking and directing frameworks. A cooperative collision warning system (CCW) makes utilization of information got from different vehicles, and furthermore imparts between vehicles, to upgrade vehicle security and to caution drivers about conceivably perilous conditions. The viability of the framework can be appeared from the outcomes acquired through re-enactment, utilizing test systems.
S.No.: 412
Title : A Trust Based Approach for Security and User Confidence in Pervasive Computing Systems
Authors Name: S.Sivakumar, V.Anuratha
Authors Affilation: Ph.D Research Scholar, Head, PG Department of Computer Science Sree Saraswathi Thiyagaraja College Sree Saraswathi Thiyagaraja College, Pollachi, TN,India-642 107
Volume & Issue No.: Volume6Issue3
Abstract: Cloud computing has turned into a piece of the focused market today. Numerous associations make utilization of cloud administrations. As the cloud computing administrations is developing and picking up prominence, the dread about the use of cloud administrations is as yet an open issue. Different issues are distinguished in the writing; one of which is security. Security hazards in the territory of cloud computing has pulled in consideration since its start. New conventions and instruments are dependably sought after to improve the safety effort by a cloud computing administration. Different cloud computing specialist co-ops are accessible with their administrations in the cloud condition. These administrations have different determinations, highlights and techniques for accomplishing security. Strategies received by different suppliers to accomplish security are of fluctuating nature. A cloud client may choose an administration in view of his prerequisite and level of security gave by the administration. To break down a specific administration in view of its different security properties is a test. Measure of security and believing a cloud benefit is a test. A trust display measures the security quality and figures confide in esteem. Trust esteem is a measure of different parts of security like validation, approval and so forth that are vital for estimating security. Trust esteem speaks to different parameters that are critical measurements along which security of cloud administrations can be estimated. These parameters rely upon sub-parameters and functionalities that are quantifiable. Since this model depends on moderately static data, for example, sort of encryption calculation utilized, this trust demonstrate gives static esteems. Cloud benefit particulars and highlights are removed to compute the security of an administration as far as static parameters and named as static trust.
S.No.: 413
Title : Personal Assistant System based on Voice Recognition and Location
Authors Name: Ahmed Ismail
Authors Affilation: Munich, Germany,
Volume & Issue No.: Volume6Issue3
Abstract: There are many researchers worked on navigation technologies for the blind People, tackling challenges ranging from interface design to sensory substitution. The proposed system is a naive playback of spoken text with voice recognition to help the person to get the direction based on navigations. The proposed system is an intelligent system taking advantage of the mobility of smartphones to be used in recognition of the end user. The proposed system is an application on mobile phone used to help blindness people to communicate with his smart phone for help. The system plays a role in facilitating the interactions between the user and the smart phone to know his position now. The system uses a dynamic time warping a machine learning model to match the user’s input to online database to recognize the user voice order and tell him to know his position. The proposed system is a flexible system, which allows it to adapt to fit the unique needs of each user’s unique communication needs. We propose a system which depend on recognition of user order to help him to get directions till his target place. The proposed system may help the blind people to increase self-confidence, independence actions, as well. The system uses google maps with voice recognition to be a user an assistance.
S.No.: 414
Title : Design of Hybrid Cryptographic Technique to Provide Data Security & Best of Both the Worlds
Authors Name: Jayashree Bodkhe, V. Kapoor
Authors Affilation: Information Technology Department, Institute of Engineering & Technology, Devi Ahilya University, Indore Madhya Pradesh, India
Volume & Issue No.: Volume6Issue3
Abstract: The requirement of information security on a network has become extremely challenging. As significant amount of data is transmitted over the network, it is preliminary to secure all types of data before sending them. A cryptographic technique must address the necessary elements for secure communication such as privacy, confidentiality, key exchange, authentication, integrity and non-repudiation. In order to accomplish this best of both the worlds (Symmetric and Asymmetric cryptography) is needed. Fast encryption and decryption speed in addition to high security are the most desirable features. But these two features (speed and security) are mutually reverse in nature i.e. in order to satisfy one feature other gets disturbed .So in order to address this problem our proposed work represents the hybrid encryption scheme which combines symmetric algorithm (AES) with asymmetric algorithm (RSA) along with hash function in order to achieve the speed and security. In addition for enhancing the security of the proposed hybrid cryptographic technique, a new key generation technique is used with integrity check technique at receiver end.
S.No.: 415
Title : “ Review Paper on Implementation of Automatic Money Counting and Sorting System”
Authors Name: Mr. Shyam D. Bawankar[1], Ms. Rakhi R. Katole[2], Ms. Amruta R. Golghate[3], Ms. Shweta D. Kakade[4] Ms. Pragati N. pande [5] , Mr. Ashwin M Baraskar[6]
Authors Affilation: DEPARTMENT OF ELECTRONICS ENGINEERING D.M.I.E.T.R. Sawangi (Meghe), Wardha (M.S.)
Volume & Issue No.: Volume6Issue3
Abstract: Money counting has been an issue for temple. Long ago, before the arrival of money counting machine, man has to count the money manually, and it is time consuming and tedious for those who handle the counting work. Mistakes on counting happen most of time due to many reasons: eyes tiredness, losing focus, and again new currency and previous currency of some notes causes confusion while sorting and etc. Alternative money-counting method can appear to be essential because an accurate money-counting is able to provide a quantitative output and time saving. In this paper, color sensor is used for detection of particular note. We are using At mega 328 microcontroller and various components like IR sensors, UV sensor, color sensor, dc motors and LCD display. Note is inserted into the system i.e. paper picking roller mechanism which is used in printer. First IR sensor will be used for detection of notes and then Color sensor will be used for detection of color of notes. Second IR sensor will be used for sorting mechanism. First motor will accept the note and note will be given for sorting mechanism. If in case note is fake then this will be detected by using UV sensor, then it will be given to the faulty compartment. For better output purpose we are using LCD display monitor so that we can get all the information simultaneously and in steady format. In short because of this project donation system will be easier
S.No.: 416
Title : Investigating the relationship between emotional intelligence components and Erosmatic leadership
Authors Name: Davood Salmani-Jafar Ghafari-Hesam Teymouri Athar
Authors Affilation: University of Tehran-School of Management
Volume & Issue No.: Volume6Issue3
Abstract: Originality: There have always been certain conditions for achieving organizational success. Findings of research demonstrate that benefiting from suitable leadership style and process under different circumstances is among the most important conditions which must be considered by managers. Without a doubt, choosing the right way involves different components and is affected by different factors. For instance, emotional intelligence of the managers is one factor. Failing to make a balance between managers’ emotional intelligence and the existing situation of the organization, will make achieving organizational goals and receiving the determined strategies impossible. Purpose: This article aims to analyze the relation between “EQ components” and managers’ “Erosmatic leadership”. Findings: The results suggest a meaningful relation between 4 out of 5 components of emotional intelligence and Erosmatic leadership. It also revealed a strong relationship between people’s emotional intelligence and their tendency to Erosmatic leadership. Among the components of EQ, empathy plays the major part in creating the relation. According to findings of the research, the managers with high emotional intelligence are more likely to take up Erosmatic leadership style. Methodology: The research method used in this study is descriptive correlation and statistical population comprises executive, middle and top managers of Tax Affairs Organization of Ardebil province.
S.No.: 417
Authors Affilation: Department of mathematics University of Tlemcen Tlemcen Algeria
Volume & Issue No.: Volume6Issue3
Abstract: The non standard modeling allow us to describe the di§usion and vibration phenomenon better than the classical one. To this end we shall use point-like representation of functions instead of continous one. The fundamental notions used are those of shadow and averaging. The discrete formulation of the wave equation reveals an original phenomena. For example the ìhalfîof the wave equation we have the following situation: an initial vibration of inÖnitely small amplitude can at some time later concentration all its energy in one point. we have than a more simple theory with more informations.
S.No.: 418
Title : A Comparative Analysis on the Evaluation of Classification Algorithms in the Prediction of Diabetes
Authors Affilation: Babasaheb Ambedkar Marathwada University, Aurangabad
Volume & Issue No.: Volume6Issue3
Abstract: Data mining techniques are applied in many applications as a standard procedure for analyzing the large volume of available data, extracting useful information and knowledge to support the major decision-making processes. Diabetes mellitus is a continuing, general, deadly syndrome occurring all around the world. It is characterized by hyperglycemia occurring due to abnormalities in insulin secretion which would in turn result in irregular raise of glucose level. In recent years, the impact of Diabetes mellitus has increased to a great extent especially in developing countries like India. This is mainly due to the irregularities in the food habits and life style. Thus, early diagnosis and classification of this deadly disease has become an active area of research in the last decade. Numerous clustering and classifications techniques are available in the literature to visualize temporal data to identify trends for controlling diabetes mellitus. This survey presents an experimental study of several algorithms which classifies Diabetes mellitus data effectively. The existing algorithms are analysed thoroughly to identify their advantages and limitations. The performance assessment of the existing algorithms is carried out to determine the best approach.
S.No.: 419
Title : Rule-Based Text Summarization for Marathi Text
Authors Name: Gaikwad Deepali K., C. Namrata Mahender
Authors Affilation: Dept. of Computer Science and Information Technology, Dr. Babasaheb Ambedkar Marathwada University, Aurangabad (MS), India
Volume & Issue No.: Volume6Issue3
Abstract: Text summarization is process of selecting important information of source document or data and produce short summary. Manually summarize large document is very difficult. Summarization has been done in various Indian regional languages. But, not much work has been done for Marathi language. The present research paper, represent Marathi text summarization with rule based approach using question generation system. The rule based approach of abstractive text summarization is used for generate question on Marathi text for this Rule based POS tagger, Named Entity Recognition and Rule based stemmer techniques are applied for generate the question. After generating questions, question are classify and then questions are rank the according to frequency or noun priority and answer of the higher ranked and noun priority group together is summary of given input.
S.No.: 420
Title : Online marketing: Analyzing the effect of demographics of the internet userson perception towards pop-up advertising
Authors Name: Dr.RuhiBakhare
Authors Affilation: Assitant Professor, DAIMSR, Nagpur
Volume & Issue No.: Volume6Issue3
Abstract: Most of the literature which we have come across in the area of trends in internet marketing is focusing on company perspective, consumer perspective and 3rd party perspective individually. But there was a gap in these approaches. The perception of the companies about internet marketing trends need is not similar with the perception of consumers or 3rd party agencies. Consumer awareness could play an important role in their interests to pursue internet marketing. It would be valuable for companies and 3rd party agencies to understand the minds of the consumers, as consumers are the ones who would eventually drive internet marketing in a big way. This study has been undertaken in order to examine the efficacy of online advertising from the consumers perspective. This study will examine how pop-up advertisement affects the demographics of the consumers and attitudes toward or intentions to avoid Internet advertising.
S.No.: 421
Title : hello
Authors Name: hoe
Authors Affilation: nnh
Volume & Issue No.: Volume6Issue3
S.No.: 422
Title : The entrepreneurship ventures from former participants in the Kuyasa Clean Development Mechanism renewable energy project.
Authors Name: Thembinkosi Maphosa¹; Abdullah Bayat²; Philip J Lloyd³
Authors Affilation: Thembinkosi Maphosa¹ Department of Economic Management Science, University of the Western Cape Abdullah Bayat² Department of Economic Management Science, University of the Western Cape Philip J Lloyd³ Energy Institute, Cape Peninsula University of Technology
Volume & Issue No.: Volume6Issue4
Abstract: Abstract Background: The Kuyasa project in Khayelitsha township of South Africa retrofitted 2 309 Reconstruction and Development Program houses with 110litre solar water heaters, insulated ceilings and 14watts compact fluorescent lights. The project idea generation was in 1999 and conclusion of the project was in 2010. The project employed 87 community members. These employees were initially trained in carpentry, steelwork, electrical wire fittings, plumbing and administration. The training was conceptualized as leading to employability and did not picture them as potential entrepreneurs. Aim: The study’s main objective was to investigate if there had been any entrepreneurship ventures by former Kuyasa employees as a result of the training and participation in the CMD project. And it found out that at least 9 out of the formerly employed 87 community members are embarking in renewable-energy related entrepreneurship ventures. Other employees secured jobs in other renewable energy projects and organisations. Setting: The main research question was; what entrepreneurial ventures have been embarked upon by recipients of training and participation in the Kuyasa project since its completion? Methodology: In the study the researchers employed a qualitative approach. A questionnaire with 27 qualitative and 4 demographic questions was used to solicit opinions and information from Kuyasa community former employees. Conclusion and recommendations to the study: The findings were that some entrepreneurs are now carpenters, plumbers, electricians and involved in steel work as a beneficiary of skills gained from the project. At the same time, these entrepreneurs are positively contributing to the three pillars of sustainability, namely economic growth, environmental conservation and social development. One of the recommendations from the findings was that training must encourage entrepreneurship in the South African renewable energy industry. The study uses as a metaphor, the enterprising activities of the male weaver bird, as a way to think about how to implement the recommendations. The bird has the ability to attract female birds to its intricately woven nest. Key words: Entrepreneurship, SouthSouthNorth, 87 Kuyasa community former employee, lessons.
S.No.: 423
Title : Automated Glaucoma Detection from Fundus Images using Clustering and Ellipse-Fitting
Authors Name: Asmita Sarkar, Soumya Kanta Sarkar, Akash Nag
Authors Affilation: Department of Information Technology, University Institute of Technology, The University of Burdwan, Burdwan, WB, India
Volume & Issue No.: Volume6Issue4
Abstract: ABSTRACT Glaucoma is one of the leading causes of blindness across the world and early diagnosis is crucial for preventing progression of the disease. In this paper, we examine how glaucoma detection can be automated by analyzing the optic-cup to disc ratio (CDR) in retinal fundus images. We have applied the K-Medians clustering algorithm to automatically determine the cup and disc regions, followed by fitting an ellipse to compute the CDR. The CDR is then checked against a threshold value to determine whether or not the patient is suffering from glaucoma. We have applied our algorithm to test 455 fundus images from a standard set of normal and glaucomatous images, and have achieved an accuracy of 61%. Keywords: glaucoma, CDR, k-medians, clustering, ellipse-fitting
S.No.: 424
Title : Detection and Measuement of Power Quality Parameter
Authors Name: Ms.shraddha raut, Prof.A.B.Jagdale,Prof.S.H.Gidde
Volume & Issue No.: Volume6Issue4
Abstract: In recent years, power quality problems are increasing to all field because of increasing the number of electric sensitive loads. Poor power quality affecting sensitive loads so causing instability, loss of data and great loss of economy. This paper Detect power quality problem occurring in power system and there is needs to improve power quality. This paper presents a low cost hardware to detect and measure most occurring power quality parameters in the power system such as voltage sags, voltage spikes, voltage swell, harmonic distortion, voltage fluctuation, voltage unbalance, noise etc. Using PICmicrocontroller16F877A. Microcontroller which senses voltage and detect the problem and gives output through LCD display. This system consists of voltage sensing unit, signal conditioning system, PIC microcontroller 16F877A, LCD display, LED as well as personal computer. LED is used to showing power quality problem and voltage values.
S.No.: 425
Authors Name: Dhruvi D. Gosai, Himangini J. Gohil, Hardik S. Jayswal
Authors Affilation: Chandubhai S. Patel Institute of Technology, Charusat University, Anand, Gujarat, India
Volume & Issue No.: Volume6Issue4
Abstract: In today’s world communication is done on vast area along with growth of Internet. Communication and human interaction is carried out using social sites, applications etc. in textual form. Emotion plays a vital role in human day-to-day life conveying their feelings and situation in their life. Emotions can be expressed using speech, gestures facial expression, or text. The Ekman model includes happy or joy, sad, disgust, anger, fear and surprise as basic emotion. Emotion Detection from textual source can be done using concepts of Natural Language Processing. In this paper emotion detection using NLP and its naive algorithm are described.
S.No.: 426
Title : The Way to Centralized Logging: A Survey
Authors Name: Gaurav Bhatia, Krati Dadheech
Authors Affilation: Sardar Patel University of Police, Security and Criminal Justice, Jodhpur, India
Volume & Issue No.: Volume6Issue4
Abstract: As we know logs are the one of the most important part of any forensics investigation. With time as the demand of new technology is increasing, maintaining logs at one particular location is getting difficult. This paper mainly focuses upon how the way to centralized logging as changed with time due to rapid development of new technologies like Cloud Computing, Dockerization1 etc. Also we will try to propose a small model using the concept of ‘Rsyslog’ for fast log processing at centralized location.
S.No.: 427
Title : Feature extraction and Land Use Land Cover for Urban and agriculture area In Al-Ulaa: Saudi Arabia
Authors Name: Omar M.S. Al-kouri
Authors Affilation: Department of GIS and Mapping, Taibah University, Almadinah almnwarah, Saudi Arabia
Volume & Issue No.: Volume6Issue4
Abstract: Remote sensing softwares and GIS provide a power full tool for land use land cover feature detection, its help to classification for urban and agriculture coverage area. In particularly the classification of IKNOS satellite image (Al-Ulaa area) provide land cover information which need to divide and calculate the classes area of land cover land use separately (class by class) to get more accurate accounted for each type of feature area. Thus temporal IKNOS image base on supervised classification approach were used to extraction of urban and agriculture over the study area, Al-Ulaa area. Remotely sensed data were analyzed and processed using feature extraction based image processing techniques. Urbanization has a largest class on the study area which is increasing over the time to 20.76. This extensive and expansion change of agricultures due to fast development of urbanization.
S.No.: 428
Title : Smart Farming using Internet of Things
Authors Name: Hardik S. Jayswal, Rathinkumar H. Kothiya, Karan L.Patel
Authors Affilation: Chandubhai S. Patel Institute of Technology
Volume & Issue No.: Volume6Issue4
Abstract: Over the last decade, there has been an immense progress in science and technology. This has poured a great interest among scientists and researchers about designing smart farming system. Smart farming system can benefit us in various ways such as increase in production, water conservation, real time data and production insight, lowered operation costs, increase in quality of production, accurate farm and field evaluation, remote monitoring, equipment monitoring etc. Internet of Things have provided farmer better ways to install various sensors and are also provided with numerous data. But as these technologies are unable to reach majority of the farmers, they are unware of this useful and efficient techniques for farming. In this paper a smart farming model is constructed which is based on Internet of Things (IOT). This proposed model is equipped with various sensors for measuring environmental parameters required for the crops. It includes node MCU and various sensors for executing the whole process. The various features of this system is to collect all the environmental data and give to the farmers so that they can take an accurate decision about farming. The system will execute the tasks such as soil moisture sensing, temperature and humidity sensing, indicating water level, detecting an intruder in the field and switching an electric motor on/off manually and automation is also provided. The system which is proposed has been tested, readings have been monitored and obtained satisfying results will enables this system to be very useful in smart farming.
S.No.: 429
Title : Embedded Based Dielectric Constant Measurement System
Authors Name: K. Krishnaveni, Dr. S.A.K. Jilani, Dr. R. Padma Suvarna
Authors Affilation: Research Scholar, JNTU, College of Engineering, Anantapuramu
Volume & Issue No.: Volume6Issue4
Abstract: Measurement of AC Conductivity of solids is one of the important studies performed in electrical and electronic device manufacturing industries. Though different AC conductivity measuring techniques are available using AC bridge they require many components. The proposed technique exploits frequency measurement to determine the capacitance of the sample using astable multivibrator and embedded system to measure dielectric constant. The proposed work is an attempt to develop an inexpensive and easily available embedded board for the measurement of capacitance and dielectric constant of the solid sample under different physical conditions.
S.No.: 430
Title : Comparison of performance of memory augmented neural network model with long-short term memory model
Authors Name: Adarsh L, Bhavana S, Varsha G
Authors Affilation: Sri Jayachamarajendra college of engineering
Volume & Issue No.: Volume6Issue4
Abstract: A lot of breakthroughs have happened in deep neural networks over a period of time. Traditional gradient-based networks require a lot of data to train and learn. When new data is encountered, the models must inefficiently relearn their parameters to effectively learn the new information without any major interference. Neural Turing Machines(NTMs)which have augmented memory capacities, offer the ability to quickly learn and retrieve new information, and hence can potentially remove the disadvantages of conventional models. Here, we demonstrate the ability of a memory-augmented neural network to rapidly assimilate new data, and use this data to make accurate predictions after only a few samples(One shot). We also introduce a new method for accessing an external memory that focuses on memory content (content-based addressing), unlike previous methods that additionally use memory location based focusing mechanisms. We have also compared accuracy and learning loss of the MANN (Memory Augmented Neural Networks)with LSTM (Long-Short Term Memory)to show which model is a better choice.
S.No.: 431
Title : Foreground detection algorithms: A survey
Authors Name: Kritika Singh, Vishal Gupta
Authors Affilation: Guru Gobind Singh Indraprastha University, New Delhi.
Volume & Issue No.: Volume6Issue5
Abstract: The task of identifying foreground from a picture or a video is a big challenge in many computer-vision applications. Foreground detection is useful in the security surveillance systems especially in the crowded areas such as parking lots, train stations, airports, movie theaters, hospitals and other mass gatherings. The basic concept to model any background consists of capturing a background image which does not have any moving object in it. However, in many cases, the background does not remain stationary, it may change in the form of illumination changes, tree leaves waving etc. Thus, it is essential to acquire a background model which is not only robust but is also adaptive to background changes. The objective of this paper is to provide a survey of various approaches found in the foreground detection field. The paper concludes by highlighting the advantages and the limitations of these approaches.
S.No.: 432
Title : Survey of wormhole attacks in WSN
Authors Name: Umashankar Ghugar,Jayaram Pradhan
Authors Affilation: Department of Computer Science Berhampur University(Odisha)
Volume & Issue No.: Volume6Issue5
Abstract: Over the first few years, a wireless sensor network has a very important role over the networks. The primary features of WSN include satellite communication, broadcast channel, hostile environment, medical system and data gathering. There are a lot of attacks available in WSN.Wormhole attack is one of the severe attacks, which is smoothly resolved in networks but tough to observe. This survey paper is an experiment to observing threats and also focuses on some different technique to detecting wormhole attacks in wireless sensor networks.
S.No.: 433
Authors Name: Aripov M.M., Kuriyazov D.M.
Authors Affilation: Ph.D., competitor of the National University of Uzbekistan
Volume & Issue No.: Volume6Issue5
Abstract: In given article is offered a new algorithm of without key hash-function, founded on cryptographic Sponge scheme.
S.No.: 434
Title : Review of Fingerprint Recognition methods using Extended Features
Authors Name: Nikhil S. Chinchole, Sweta Suhasaria, Prachi Natu
Volume & Issue No.: Volume6Issue5
Abstract: This paper presents review of fingerprint recognition methods based on different extended features, compared to different latent and partial fingerprint database. Also, techniques used to extract features of a fingerprint as well as matching them with the database are specified in this paper. Some of the surveyed research papers have used traditional approach like minutiae based identification techniques and verification techniques. Whereas the other articles have used novel methods which combines minutiae and other extended features. To design and develop a fingerprint feature extraction method and to match them using pixel details and extended features, first of all fingerprints enhancement and thinning is done. Finally features are extracted and estimated. These estimated features are used to match with the template database using matching algorithm. The features are unique, which allows a single feature to be suitably matched with high possibility against a large database of features.
S.No.: 435
Title : A Review of Routing Protocols for Mobile Ad-Hoc NETworks (MANET) for a Design and Implementation of Reliable Wireless Network
Authors Name: VIPIN and Dr. Rajender Singh Chhillar
Authors Affilation:
Volume & Issue No.: Volume6Issue5
Abstract: The Advancement of Mobile wireless devices for present and futuristic utilisation of mobile devices has motivated the researches to increase the availability and more features of mobile wireless devices lead researchers to invent and develop a larger variety of the Mobile Ad-hoc NET working (MANET) Protocols for Advanced and Unique facility of communication provided by these mobile computing devices. Mobile computing devices have ability to communicate using the wireless spectrum in peer to peer manner, messages are routed by intermediate nodes, and working of wireless communication network and mobile computing devices produces many routing and security problems which are must be addressed before developing a MANET. In this paper we find out and investigate the range of MANET routing protocols are present and functionalities of many protocols such as DSDV to the more advanced protocols MAODV. All the research and study on protocols are done by we focused on works done by Perkins in improving and development of MANET routing. A range of literature was identified and reviewed related to the MANET routing and AODV based MANET protocols, SAODV and A-SAODV based MANET protocols for design and implementation of reliable wireless Network. The literature review identify number of trends in the research papers such as excluding key metrics from simulation results and exclusive use of the random waypoint mobility model.
S.No.: 436
Authors Name: Ojekunle Joel Ademola (Ph.D) and Owoeye Adelanke Samuel
Authors Affilation: Department of Transport Management Technology, Federal University of Technology, Minna, Nigeria.
Volume & Issue No.: Volume6Issue5
Abstract: Abstract Household travel is the major origin of traffic flow in the urban centres. Urban residents travel for various purposes; planning and managing urban travel requires that city planners and managers understand their flow pattern across the city space. This study therefore, was conducted to analyse the spatial pattern of household travel in Minna City, Nigeria. The data were collected through questionnaire administration on 1,303 respondents using Open Data Kit (ODK) package. To do this, the city was divided into four cluster zones, from which three different residential densities were selected in each of the zones. The study reveals that trip generation and attraction is significantly different among different residential densities in the city. The analysis of variance reveals there is significant difference in trip distances covered by different residential area in the city with a p-value of <0.001. The study therefore recommends that there is need to create spatial balance in the location of services needed and land use activities across the residential densities and also provide an effective and efficient public transportation system to the city residents especially along the main traffic corridors
S.No.: 437
Title : Copy Right Protection Technique in Images Based on DCT Compression and DWT
Authors Affilation: snu ranchi
Volume & Issue No.: Volume6Issue5
Abstract: Info trade over web is expanding definitely step by step. All multimedia data is in computerized framework. To shield the multimedia system information from unlawful control and give authenticity, procedures for duplicate right protection and content authentication of digital media is required. Computerized watermarking is one of the techniques for protection and identification that covers up authentic watermarks in multimedia information for example, picture, audio and video. Keeping the above given importance of steganography, DCT and DWT based method is explained. Selection of Frequency domain method having various advantages like high robustness and security of the all others methods. Proposed method having high value of PSNR and low value of BER (Bit Error Rate).
S.No.: 438
Title : Image Watermarking Using Mojette Transform
Authors Name: BENACHOUR Cheikh, HAZZAB Abdeldjebar and BASSOU Abdesselam
Authors Affilation: Tahri Mohamed University of Bechar, Algeria
Volume & Issue No.: Volume6Issue5
Abstract: Copyright protection of digitized information has become one of the challenges for researchers. For this reason, several techniques are being implemented to resolve this problem, and watermarking is the most adequate with its methods. This paper represents a new approach to digital image watermark based on the Mojette Transform. This approach is to select a pixel block of the original image, where the hidden massage insertion will be made. Each message bit is inserted into a different pixel. The results have been encouraging, especially as regards the imperceptibility, detection robustness and capacity of hidden message.
S.No.: 439
Title : A Study on Stress and Coping among Parents and Students using Statistical and Data Mining Techniques
Authors Name: V.RAMESH
Authors Affilation: Assistant Professor, Department of Computer Science & Applications, Sri Chandrasekharendra Saraswathi Viswa Maha Vidyalaya, Kanchipuram – 631 561, India
Volume & Issue No.: Volume6Issue6
Abstract: Parents are often faced with managing a busy schedule including job related responsibilities, household duties and preparing their children to school. These demands occasionally result in parenting stress. Parenting stress is associated with both parenting behaviours and child adjustment. The main objective of this study is to explore the subjective experiences of families of school going children, specifically the sources of stress and coping for these families. Interviews were conducted with families to shed light on their subjective experiences of coping and stress. This study aims to apply data mining techniques to predict the sources of parent’s stress and children’s stress. Data are received by well set of questionnaire. Attributes are selected with chi squared attribute selection and ranker algorithm. J48 and FT algorithm are used to classify the stress sources. Apriori algorithm is used to find stress sources with best rule. Parent and children data set are clustered by five groups using Simplekmeans algorithm. Attribute selection, Classification, Association and Cluster analysis are done in WEKA tool. Frequency analysis and Hypothesis testing’s done in SPSS tool. There are many coping strategies are found from this study.
S.No.: 440
Title : An Energy-Efficient Heterogeneous Ring Clustering Routing Protocol for Wireless Sensor Networks
Authors Name: S.BABU,Dr. T. NIRMALRAJ
Volume & Issue No.: Volume6Issue7
Abstract: A heterogeneous ring domain communication topology with equal area in each ring is presented in this study in an effort to solve the energy balance problem in original RPL (IPv6 Routing Protocol for Low Power and Lossy Networks). A new clustering algorithm and event-driven cluster head rotation mechanism are also proposed based on this topology. The clustering information announcement message and clustering acknowledgment message were designed according to RFC and Original RPL message structure. An Energy-Efficient Heterogeneous Ring Clustering (E2HRC) routing protocol for wireless sensor networks is then proposed and corresponding routing algorithms and maintenance methods are established. Related messages are analyzed in detail. Experimental results show that in comparison against the original RPL, the E2HRC routing protocol more effectively balances wireless sensor network energy consumption, thus decreasing both node energy consumption and the number of control messages.
S.No.: 441
Title : An Efficient Image Retrieval in Database using Database Revision Algorithm
Authors Name: S. Pramila Devi T. Nirmal Raj
Authors Affilation: Sri Chandrasekharendra Saraswathi Vishwa Mahavidhyalaya
Volume & Issue No.: Volume6Issue7
Abstract: Digital images have many applications in different fields like medical imaging and diagnostics, weather forecasting, space research, military etc. The number of images available and their wide variety increases with the ease of acquiring, storing and sharing digital images due to the advances in technology. As a result, the significance of image retrieval algorithms and systems has been considerably increased. Many researches on content-based image retrieval (CBIR) are being carried out. In this paper, a fast image retrieval algorithm called feature levels is proposed. Feature levels algorithm works with the classification of image features to different categories or levels, feature extraction in terms of levels and feature similarity comparison of the query image with database images. The system retrieves images from the associated database. The database is re-written after each level according to Database Revision (DR) algorithm. Keywords: Digital images, Feature level, Database Revision (DR) algorithm
S.No.: 442
Title : An Efficient Image Retrieval in Database using DSR
Authors Name: S. Pramila Devi T. Nirmal Raj
Authors Affilation: Sri Chandrasekharendra Saraswathi Vishwa Mahavidhyalaya
Volume & Issue No.: Volume6Issue7
Abstract: Digital images have many applications in different fields like medical imaging and diagnostics, weather forecasting, space research, military etc. The number of images available and their wide variety increases with the ease of acquiring, storing and sharing digital images due to the advances in technology. As a result, the significance of image retrieval algorithms and systems has been considerably increased. Many researches on content-based image retrieval (CBIR) are being carried out. In this paper, a fast image retrieval algorithm called feature levels is proposed. Feature levels algorithm works with the classification of image features to different categories or levels, feature extraction in terms of levels and feature similarity comparison of the query image with database images. The system retrieves images from the associated database. The database is re-written after each level according to Database Revision (DR) algorithm.
S.No.: 443
Authors Name: Yasser Gomaa , A.A. Abd El- Aziz ,Hesham Hefny ,Nermin Hamza
Authors Affilation: Dept. of Information Systems, College of computer and information sciences, jouf UNI. 2 Dept. of Information Systems & Technology, Institute of Statistical Studies and Researches (ISSR), Cairo, Egypt
Volume & Issue No.: Volume6Issue8
Abstract: Website applications are the important part of our daily life. Thus, the attack on those sites is rapidly increasing. One of the most famous attack techniques is the SQL injection attack (SQLIA). This attack is launched through user input developed. In addition, it runs when the user targets Web applications that use background databases. This attack changes the intentional query structure, so the retrieved data is not the required data. The best thing is that the user enters the data through the layer between the user and the database to prevent the user from entering any part of the SQL query directly to stop the attack. In this research, we suggest a new technique that acts as a layer between the user and the database. The proposed technology can be applied to new and existing websites.
S.No.: 444
Title : A Review on Automatic Data Fusion Techniques with Application in Big Data Analysis
Authors Name: Sufal Das
Authors Affilation: North-Eastern Hill University
Volume & Issue No.: Volume6Issue8
Abstract: The Data fusion method plays an important role in analysis of large set of data. It can be used in IoT (Internet of Things) applications as well as big data analysis. Semantic data fusion plays a vital role to handle big data where data is very large in size, dynamic in nature and heterogeneous. Multi sensor data fusion is a tool used to combine the data from various sensors and gives a more reliable and accurate output. It is the integration of data and knowledge from several sources. Big data can be considered as large, dynamic and heterogeneous dataset. Data fusion techniques play a vital role for providing integration of knowledge from different heterogeneous data sources. Aim of this paper is to provide an overview of data fusion techniques with big data perspective. In this paper, we have presented a complete comparison analysis of data fusion method proposed by different researchers with different methodologies such as Bayesian Estimation Method, Neural Networks, Self-Organized Learning algorithm, State Vector Fusion etc. Finally, we have shown that in traditional method State Vector Fusion has highest accuracy rate and in fusion using neural network, radial basis function (RBF) networks classifier has high accuracy rate. This paper is concluded with some open issues in big data fusion.
S.No.: 445
Title : Enhancing Image Compression Process using Thresholding Haar Transform for X-Ray Imaging
Authors Name: C.Rajeswari & Dr.S.Prakasam
Authors Affilation: SCSVMV University
Volume & Issue No.: Volume6Issue9
Abstract: In image enhancement, x-ray imaging is based on a peculiar approach which is haar transform. Haar transform has proven to be very effective and is used to decompose the high frequency sub images of wavelets, this helps us to extract high frequency information effectively. Thresholding is a powerful method and is to create binary images from a grayscale image. Haar transform requires only additions so the computation time is short. Thresholding haar transform model is designed for medical images to transmit images over the network , it reduce the memory size. The performance evaluation of the image quality is measured using compression ratio. It produces high compression ratio and running time is very less for different haar compression key value with good compressed image quality.
S.No.: 446
Title : Active Object Detection Model with Deep Neural Network for Object Recognition
Authors Name: Ranjana kapila, Heena Wadhwa
Authors Affilation: chandigarh engineering college
Volume & Issue No.: Volume6Issue9
Abstract: The number of the computations and feature transformations along with the normalization and automatic categorization is required by the the object classification algorithms. In this paper, the robust feature descriptor used with the active object detection method (AODM) along with the probabilistic equation enabled deep neural networks (DNN). The multi-category DNN (mDNN) has been described with the repetitious phases so that it is simple to do job with the multi-category dataset. In every iterative phase mDNN shows the training data of main class as primary class and remaining all other training data are divided as the secondary class for the supervised classification. In the object image dataset, designed model is proficient of working with the variations which are observed in the configuration of the color, texture, light, image orientation, occlusion and color illuminations. Certain analysis have been organized over the designed model for the performance calculation of the object identification system in the designed model. The results which we collected is in the shape of the various performance parameters of statistical errors, precision, recall, F1-measure and overall accuracy. In the terms of the overall accuracy The designed model has clearly outperformed the existing models. The designed model growth has been recorded higher than ten percent for all of the evaluated parameters against the existing models based upon SURF, FREAK, etc
S.No.: 447
Title : Road Map on Educational Data Mining
Authors Name: M N Quadri
Authors Affilation: Department of Computer Science Nilkantrhao Shinde Science & Arts College Bhadrawati,(M.S.) India
Volume & Issue No.: Volume6Issue9
Abstract: Educational Data mining is an important subject and research ground which are supposed taken care of the great data which are arising in the educational field. The exploring data is formed as a data set and then various computational techniques are applied to derive an interesting pattern out of it which further analysis, decisions can be done for the re-modeling of learning pattern, improvement of teaching method and also for the improvement of education organization. This paper makes a wide study about recent and relevant studies that has been gone through this area. The result of these studies will give the technical process to taking up the teaching style into the future level and gives foreshadow the students’ educational performance.
S.No.: 448
Authors Name: Anirudh A, Kayal Padmanandam
Authors Affilation: Bachelor Degree, St. Mary’s College, Yousufguda, Hyderabad
Volume & Issue No.: Volume6Issue10
Abstract: The term “Data Mining” is primarily used by statisticians, database researchers, and the business communities. Data mining is an extension of traditional data analysis and statistical approaches as it incorporates analytical techniques drawn from various disciplines like Artificial Intelligence (AI), Machine Learning and more. This paper focuses on the potential contributions that Data Mining (DM) could make for Humanity in organizations and bureaus. It first provides a basic introduction to Data Mining processes and Tasks. Next it gives a basic understanding of how statistics and Data Mining are bonded though they are discrete. Further the paper clearly details the future trends of Data Mining and how it could travel in the phase of Human life.
S.No.: 449
Title : Analysis for Ranking of Web Pages
Authors Name: Ashok Kumar, Dr. Manish Mahajan, Dr. Dheerendra Singh
Authors Affilation: 1Reseach Scholar PhD, IKG PTU Jalandhar, Punjab, India
Volume & Issue No.: Volume6Issue10
Abstract: ABSTRACT The success of the search engine depends upon its ability to rank Web pages given in the result. The objective of ranking mechanism is to arrange the results according to their relevance. There are several ranking techniques for efficient ranking of web page has been proposed. With the help of literature survey, it has been tried to know the strengths and weakness of each algorithm. Keywords: Indexing, page rank, Hidden web, surface web, term frequency, Content Ranking
S.No.: 450
Title : A implementation approach for diagnosis of diabetes type II foot ulcer using R in data mining
Authors Name: R. Christy pushpaleela
Authors Affilation: Womens christian college, chennai
Volume & Issue No.: Volume6Issue10
Abstract: Data mining approach helps to analyze patient diseases. Diabetes Mellitus is a chronic disease to affect various organs of the human body. Early prediction can save human life and can take control over the diseases. The present work emphases on analysis of diabetes through decision tree algorithm with statistical implication using R. Diabetes is a common disease with all age group on the world . The main aim of this research paper is to study and discuss about the decision tree implementation using R with different kinds of medical datasets. For classification is performed by decision trees in R. This paper will help for early detection of the complications which might help in timely treatment of individuals. For data preprocessing the real time medical data set used Manual, R Studio and WEKA tool.
S.No.: 451
Title : Signal Speech Reconstruction using Convolutional Denoising Audioencoders with Neural Deep Learning
Authors Name: Houda Abouzid, Otman Chakkor, Sebastian Ventura, Oscar Gabriel Reyes
Authors Affilation: Telecommunications department ENSATE, Abdelmalek Essaadi University Tetouan, Morocco
Volume & Issue No.: Volume6Issue10
Abstract: Audio data compression is a technical model to compress signals and regenerate them at the output layer. This technique will be used in our theoretic approach and described for the blind source separation (BSS) problem. In this paper, we study the denoising autoencoder with deep learning using keras and other signal processing librairies in order to use this resulted signals after beeing analysed in blind source speech separation system. We propose a novel approach for unsupervised learning model that reconstructs audio mixture using an autoencoder for monaural speech signal based on Neural Network and deep learning. Simulation results show that the denoising autoencoder can make BSS easier to study and give more performance for the signals to be uncluded in the automated system. The advantage of this paper is the simplicity of the solution, yielding an accuracy of 81% applied on real world audio signals. Index Terms—Denoising autoencoder, Convolutional autoencoder, keras , deep learning, Neural Network, BSS.
S.No.: 452
Title : Protect Source Location Security Based Monitoring In Wireless Sensor Network
Authors Name: J Saran Ragava Jagan, C Parthasarthy
Authors Affilation: SCSVMV University, Enathur,Tamilnadu - 631561
Volume & Issue No.: Volume6Issue11
Abstract: We address the issue of keeping the surmising of relevant data in occasion driven wireless sensor network (WSNs). The issue is considered under a worldwide busybody who breaks down low-level RF transmission characteristics, for example, the quantity of transmitted parcels, between bundle times, and activity directionality, to deduce occasion area, its event time, and the sink area. We devise a general movement examination strategy for inducing logical data by associating transmission times with listening stealthily areas. Our examination demonstrates that most existing countermeasures either neglect to give satisfactory assurance, or acquire high correspondence and postpone overheads. To moderate the effect of spying, we propose asset proficient activity standardization plans. In contrast with the best in class, our techniques decrease the correspondence overhead by over half; and the end to end delay. To do as such, we segment the WSN to least associated overwhelming sets that work in a round-robin mold. This enables us to diminish the quantity of movement sources dynamic at a given time, while giving steering ways to any hub in the WSN. We additionally diminish parcel delay by freely organizing bundle handing-off, without uncovering the movement directionality.
S.No.: 453
Title : An Empirical Research on the Implication of Practical Abilities of Professional Masters in Business Schools: Deficiencies Analysis and Improvement Strategies
Authors Name: Dr. Xiaokun Guo
Authors Affilation: Director, International Relations Office, CUFE Business School Beijing, 100081, China
Volume & Issue No.: Volume6Issue11
Abstract: This article provides a new perspective for the perception and implication of the practical abilities for professional master’s in business schools and an empirical methodology to identify the indicators for practical abilities. The major deficiencies and corresponding improvement strategies were also analyzed and suggested in this article. The research findings and contribution of the research is beneficial for the development of professional masters programs in business schools.
S.No.: 454
Title : Conceal Classified Data by using Xiao Steganography
Authors Name: Ms. Shruti
Authors Affilation: School of Computer Science and Engginering Lovely Professional University, Jalandhar Punjab,India
Volume & Issue No.: Volume6Issue12
Abstract: Abstract Steganography is a science of hiding message in such a way that existing message should be invisible to anyone apart from sender and receiver. As we deal with several algorithm that accord with text encryption. There has been research carried out on encryption digital images video and audio files. In this paper, Xiao tool is used for implementing Steganography for hiding data from intruder. This tool is highly potent, because as with this secret data will be hidden in any cover image and then further it will be encrypted by using different algorithm such as SHA, DES and Triple DES . We can use hashing algorithm for encrypting secrete data. For encoding purposes password will be assigned for double security. So that genuine person will be able to access particular Data. Now at decoding end when user want to extract hidden data then this will be possible only by assigning password which is given by encoder while hiding. Other than this I m comparing different Steganography tools on the basis of some parameters which are discussed in coming section of this paper. So from all the tools S-tools is proved to be best.
S.No.: 455
Title : Mechanical Properties of Al2219-TiC Metal Matrix Composites
Authors Name: Naresh Kumar Doneti1 Assistant Professor, Mechanical Department, Debre Tabor University, Debre Tabor, Ethiopia. Spoorthi Gopagoni2 Assistant Professor, M
Authors Affilation: Assistant Professor, Mechanical Department, Debre Tabor University, Debre Tabor, Ethiopia. Assistant Professor, Mechanical Department, Dhruva Institute Of Engineering Technology,Hyderabad
Volume & Issue No.: Volume7Issue1
Abstract: The work is carried out to investigate and study the mechanical properties of TiC reinforced Al2219 alloy metal matrix composites. In the present work Al2219 alloy was taken as the base matrix and TiC particulates as reinforcement material to prepare metal matrix composites by stir casting method. For metal matrix composites the reinforcement material was varied from 0 to 6 wt. % in steps of 2 wt. %. For each composite, the reinforcement particulates were preheated to a temperature of 600ºC and dispersed into a vortex of molten Al2219 alloy. The microstructural characterization was done using scanning electron microscope. Mechanical properties like hardness, ultimate tensile strength, yield strength and percentage elongation were evaluated as per ASTM standards. Further, scanning electron microphotographs revealed that there was uniform distribution of TiC particulates in Al2219 alloy matrix. Hardness, ultimate tensile strength and yield strength increased as wt. % of TiC increased in the base matrix. Results also indicated that as wt. % of reinforcement increases, there was decrease in ductility. Keywords Al2219 alloy, TiC, Mechanical properties, Ultimate tensile strength, Hardness, Stir casting, Metal matrix composites
S.No.: 456
Title : Characteristics of Boron doped ZnO thin films Deposited on n and p-type porous silicon for an Application of H2 Gas Sensing
Authors Name: Rashid Hashim Jabbar1, Isrra Hadi Hilal2, Anwar Hussein Ali3
Authors Affilation: Ministry of Higher Education and Scientific and Technology, Baghdad, Iraq.
Volume & Issue No.: Volume7Issue1
Abstract: N and p-type of Porous silicon (PS) used as a substrate to deposition of boron doped ZnO thin films of nanostructures with doping (2, 4, 6 and 8) % deposited at 450oC by chemical spray pyrolysis (CSP) technique in (150±5 nm) thickness. The structure of nanostructure films has been found to exhibit the hexagonal wurtzite structure. The grain size decreases with the increasing of boron doping concentration, the energy band gap of the PS layer calculated from the Photoluminuce (PL) peak was (2.397 eV). The surface Morphology of the films and the porous silicon was studied by using the Scanning Electron Microscopy (SEM), Atomic Force Microscopy (AFM), and the Transmission electron microscopy (TEM), the sensitivity of the films for H2 gas increases with the increase of doping concentrations and for n-PS more than p-PS substrate.
S.No.: 457
Title : Wake effects in interaction of ions with SWCNTs and DWCNTs
Authors Name: Seham Z. Abbas and Khalid A. Ahmad
Authors Affilation: aMinicitiry of sciences & technology, Baghdad, Iraq.
Volume & Issue No.: Volume7Issue1
Abstract: The Random Phase Approximation (RPA) would be used to describe the linear response of electrons on a single-walled carbon nanotube (SWCNTs) and multi-wall carbon nanotubes (MWCNTs) to a charged particle moving paraxially inside or outside the nanotube. The expressions of the induced electron density at nanotube surface and the induced potential around the nanotube walls are evaluated. The results indicate that when the charged particle velocity exceeds a threshold value, the oscillatory wake effect develops both in the electron density perturbation on the nanotube surface and in the three-dimensional induced potential trailing the particle, but when the charged particle velocity is below a threshold value, a bell-like distribution appears for the induced electron density. Good agreement is achieved with previous work.
S.No.: 458
Title : Effectiveness and implementation of active methods for islanding prevention in single-phase grid-connected photovoltaic power systems
Authors Name: Fadila Barkat*1, Ali Cheknane1,
Authors Affilation: University Amar Telidji Laghouat
Volume & Issue No.: Volume7Issue1
Abstract: This review paper attempts to carry out a systematic study of the performance of the most common active detection methods which are active frequency drift (AFD) method, Sandia frequency shift (SFS) method and slip mode shift frequency (SMS) method. These methods are used to explain their global capability in developing a photovoltaic system that are improved by including a boost converter MPPT technique and PID controller. Their effectiveness and limits in the detection of islanding phenomenon are studied in details using Matlab/Simulink environment. In addition to that, the “no detection zone” of each method is also investigated. The implementation of these methods shows that they can work perfectly under normal/islanded modes. Moreover, the results show that islanding mode can conditionally be detected and prevented successfully using the three common active methods when adequate parameters are adapted for the local load and for the grid. Moreover, the results show that there is an interaction between the used methods at the level of detection/prevention obtained in terms of time and non-detection zone.
S.No.: 459
Title : A Tool for English to Bengali Transliteration of OOV words used in Indian Civil Aviation
Authors Name: Saptarshi Paul, Bipul Shyam Purkhyasta
Authors Affilation: Assam University, Silchar/Comuter Science Department
Volume & Issue No.: Volume7Issue2
Abstract: The Indian Civil Aviation Market has been the fastest growing market for the last 3 years. India is supposed to be the biggest aviation market in the world by 2030. Leading Aircraft manufacturers like Boeing, Airbus, ATR, Embraer have huge orders from India based Airliners. The increase of aircrafts is catalyzing the setting up of MROs and training centers to meet the demand for the ever-growing demand for manpower, which is needed to keep the aircrafts flying. By creating jobs in the field of CNS, Air Traffic Controllers, Pilots, ground force and associated domains, Civil aviation sector is becoming a lucrative career option for the job seekers of India who hail from diverse background speaking diverse languages, Bengali being one of them. The need for translation and transliteration of aviation OOV words, technical words and terminologies from English to Bengali and other local and regional languages of aviation are becoming strong. Here we have a look at what are OOV aviation terms and move into the problem of how standard translation tools are unable to translate OOV words, terminologies, abbreviations and structured English used in aviation to corresponding Bengali terms before describing how the proposed tool can bridge the gap left by Standard Translation tools like Google Translate and Microsoft Bing Translate
S.No.: 460
Title : Load Forecasting using ANN
Authors Name: Hitesh Chaudhari
Authors Affilation: Shri Ramdeobaba College of Engineering Nagpur
Volume & Issue No.: Volume7Issue2
Abstract: In this report artificial neural network technique (ANN) is used for forecasting the load curve. Algorithms using these techniques have been programmed using MATLAB 15 and applied to the case study. The efficiency of both the model is determined from the load curve and the load is predicted as a testing sample. The ANN model trains the daily load data for a set of days and then forecast the load for next day. Actual data are obtained from "Mankapur Substation" is used to validate the result.
S.No.: 461
Authors Name: Sawan Bhan
Authors Affilation: Symbiosis Centre for information technology,pune
Volume & Issue No.: Volume7Issue2
Abstract: Today, the majority of people have become completely dependent on mobile applications. These applications could be a gateway to sensitive data that attract more hackers. The Android penetration testing process helps to address security weaknesses or vulnerabilities in the Android platform. In this paper, we present different penetration tests (or pentests) for Android-based mobile applications in a very comprehensive manner. First, we explain how to set up a pentesting environment, including hardware/software requirements, USB debugging, and configuring a proxy. Next, we perform some of the most popular pentesting tools such as AFLogical, Dex2jar, JD-GUI, Apktool and Drozer by using Santoku Linux distribution. Finally, we conduct an Android repackaging attack on selected apps by using Santoku Linux distribution and then demonstrate the attack on our Android VM. This work attempts to give developers and security professionals a step-by-step guide for Android mobile application pentesting.
S.No.: 462
Authors Name: Sawan Bhan, Nisha TN
Authors Affilation: Symbiosis Centre for Information Technology,Pune,India
Volume & Issue No.: Volume7Issue2
Abstract: Today, the majority of people have become completely dependent on mobileapplications. These applications could be a gateway to sensitive data that attract more hackers. The Androidpenetrationtestingprocesshelpstoaddresssecurityweaknessesorvulnerabilities in the Android platform. In this paper, we present different penetration tests (or pentests) for Android-based mobile applications in a very comprehensive manner. First, we explain how to set up a pentesting environment, including hardware/software requirements, USB debugging,andconfiguringaproxy.Next,weperformsomeofthemostpopularpentesting tools such as AFLogical, Dex2jar, JD-GUI, Apktool and Drozer by using Santoku Linux distribution. Finally, we conduct an Android repackaging attack on selected apps byusing SantokuLinuxdistributionandthendemonstratetheattackonourAndroidVM.Thiswork attempts to give developers and security professionals a step-by-step guide for Android mobile applicationpentesting.
S.No.: 463
Title : The kinematic analysis of four degrees of freedom for a medical robot is used to inject the muscle needles in the shoulder and control it by Labview and Arduino mega2560 (simulation and implementation)
Volume & Issue No.: Volume7Issue2
Abstract: This study presents the kinematic analysis of a four-degree freedom medical robotic arm using the Matlab and the robotic-tool, the arm was designed using a solid work program, As well as details of the control of the real design of this arm using Arduino Mega 2560, The specialist enters the position to be reached by the automatic arm (injection position), Or moving the arm to any position by entering the values of the corners of the joints, In this search, we have moved the arm to the selected position Without injecting into the muscle which need another study and a medical sensor determines the amount of needle entry in the muscle, According to criteria determined by the specialist and can be added to the designed interface.
S.No.: 464
Title : Level Set Based Feature to Segment Brain Tumor Segmentation for Human Head Scans
Authors Name: T.Chithambaram, Dr.K.Perumal
Authors Affilation: 1Research scholar, Department of Computer Applications, Madurai Kamaraj University, Madurai. Tamil Nadu, India.
Volume & Issue No.: Volume7Issue2
Abstract: The research proposes a method to segment brain tumor from magnetic resonance images (MRI). The method uses artificial neural network (ANN) with novel level set and wavelet based features. Automatic brain tumor segmentation methods are very essential in many diagnostic and therapeutic applications. Existing works used more number of features but the proposed method uses only minimal number of strategic features and compared against support vector classifier (SVM). Quantitative and qualitative results of both methods compared and proved the outstanding result of the proposed method. Keywords: MRI, brain tumor, ANN, SVM, segmentation
S.No.: 465
Authors Name: Naveena M
Authors Affilation: University of Mysore
Volume & Issue No.: Volume7Issue2
Abstract: The goal of this paper is to implement a leaf classification technique using an image processing algorithm for efficient feature extraction. Morphological features like color moment features are used in this paper. Like many other methodologies different leaf images may have similar or identical color and shape values. Hence, in this paper we are using KNN (K-Nearest Neighbor) classifier to classify the leaf. Classification is a process in which individual items (objects or patterns or image regions or pixels) are grouped based on the similarity between the item and the description of the group. Classification includes a broad range of decision-theoretic approaches to the identification of images. All classification algorithms are based on the assumption that the image in question depicts one or more features (example, geometric parts in the case of a manufacturing classification system, or spectral regions in the case of remote sensing, as shown in the examples below) and that each of these features belongs to one of several distinct and exclusive classes. The classes may be specified a priori by an analyst (as in supervised classification) or automatically clustered (i.e. as in unsupervised classification) into sets of prototype classes, where the analyst merely specifies the number of desired categories.
S.No.: 466
Title : Applying Parallel Design Patterns on Molecular Dynamics Simulation
Authors Name: Nilesh Maltare, Dr. Vithal N. Kamat
Authors Affilation: Gujarat Technological University
Volume & Issue No.: Volume7Issue3
Abstract: Molecular dynamics simulates behavior of atoms and molecules. Molecular dynamics Simulation demonstrates and derives macroscopic properties by atomic interactions. In this experiment we have redesigned Molecular Dynamics (MD) Simulation by applying different parallel design pattern. Redesigned MD Simulation focuses on adaptability to different architectures and scalability to use with large number of atoms and long duration simulation. The paper also demonstrates performance of Classical MD Simulation on different architectures.
S.No.: 467
Authors Name: