IJAIR- Volume 3 Issue 10 (October 2014)

 


Sr/No/ Title Pdf
1 Process of sustainable project development with Rubik’s Cube using Game Theory interpretations
Fogarassy, C., Bakosné Böröcz M., Molnár S

Abstract —It is very difficult to calculate in advance the positive and negative long-term impacts of an sustainable investment, or a development venture. A serious global problem arises from the fact that numerous environmental-protection oriented private and government ventures are implemented in an incorrect manner significantly impair the conditions of both the environment and the economy (market). There is a high number of innovative energy related investments, waste and water management projects, etc. in Europe, which cause more harmful effects then was earlier. Various sustainability logics can be synchronised with the 3×3×3 Rubik’s Cube’s solution algorithms, and the relations of the cube’s sides define a planning strategy that provides a new scientific approach for investment planning. We theoretically evaluated the various solution processes, and paralell investment planning levels following the solution levels and stages of the cube. After these various level-evaluations, we made „low-carbon interpretation” summaries. According to the hypothesis on the solution algorithms of the Rubik’s Cube, the parts rotated next to each other, meaning the project attributes which have an impact on each other, have a relation system which can be defined in mathematical terms, therefore, their point of balance (e.g. Nash’s) can also be determined by Game Theory models (games of finite kind, zero sum games, oligopolistic games, etc.). In this paper, we would also like to prove that the hypothesis which states that the solution algorithm of Rubik’s Cube, namely the “Layer by layer” method, can be used to model the process of project development. Also, the correspondence system of project attributes can be represented by the proper Game Theory models. This way, the various enviro- and climate-friendly investments can be realized in a well-plannable, low-risk economic environment regarding both human resource planning and the preserving and advancement of environmental criteria.
Download
2 Dynamic Load Balancing For Cloud Computing Using Virtual Machine
Srinivas Jangapalli, sateesh Nagavarapu

Abstract—In this paper, we present a novel privacy-preserving security solution for cloud services. We deal with user anonymous access to cloud services and shared storage servers. Our solution provides registered users with anonymous access to cloud services. Our solution offers anonymous authentication. This means that users’ personal attributes (age, valid registration, successful payment) can be proven without revealing users’ identity. Thus, users can use services without any threat of profiling their behavior. On the other hand, if users break provider’s rules, their access rights are revoked. We analyze current privacy preserving solutions for cloud services and outline our solution based on advanced cryptographic components. Our solution offers anonymous access, unlinkability and the confidentiality of transmitted data. Moreover, we implement our solution and we output the experimental results and compare the performance with related solutions.
Download
3 An Active Security Solution for Privacy-Preserving Cloud Services
Srikanth Pusala, T Srikanth

Abstract—In this paper, we present a novel privacy-preserving security solution for cloud services. We deal with user anonymous access to cloud services and shared storage servers. Our solution provides registered users with anonymous access to cloud services. Our solution offers anonymous authentication. This means that users’ personal attributes (age, valid registration, successful payment) can be proven without revealing users’ identity. Thus, users can use services without any threat of profiling their behavior. On the other hand, if users break provider’s rules, their access rights are revoked. We analyze current privacy preserving solutions for cloud services and outline our solution based on advanced cryptographic components. Our solution offers anonymous access, unlink ability and the confidentiality of transmitted data. Moreover, we implement our solution and we output the experimental results and compare the performance with related solutions.

Download
4 An Energy Creative Flooding System In Mobile Ad-Hoc Networks
Deepak Gupta , Shreya Jain

Abstract— Along with the most energy-intensive operations in mobile ad-hoc networks is the network-wide packet broadcasting known as flooding, which although highly inefficient is broadly employed by routing protocols to distribute link/node state information or route-discovery requests. Among the schemes introduced to limit this inefficiency and improve network scalability, Multi-Point Relaying (MPR) stands out as one of the most flexible, applicable to both proactive and reactive routing approaches. However, its original design based on fixed-power broadcast-mode transmission, precludes it from benefiting unicast (including directional-antenna) and variable-power transmission environments. We propose a family of MPR-based protocols for such environments, and present a matter-of-fact evaluation of their energy-conserving capabilities based on simulation models that employ the same code base used in actual network nodes and accurate radio models based on the specifications of existing transceivers.


Download
5 Survey of routing algorithms for efficient design of Router in NOC
M.Deivakani, Dr.D.Shanthi

Abstract-With the need to integrate an increasing variety of Semiconductor Intellectual Property (IP) blocks in a single System on Chip (SoC), communication management becomes critical when highly diversified functions with varying latency and bandwidth requirements must be supported in an interconnect fabric. NoC (Network on Chip) technology simplifies the hardware required for switching and routing functions, allowing SoCs with NoC interconnect fabrics to reach higher operating frequencies. Routers in NOC need to have some information about network status in order to make decisions regarding how and where to send packets.In this paper we discusses various efficient routing algorithms to design router in NOC

Download
6 Design of Rectangular Slotted Spiral dual band antenna
Rajneesh kumar

Abstract -Small size antennas are fabricated on the printed circuit board is generally utilized with communication application. In this paper a Rectangular spiral shape dual band antenna is proposed for mobile-satellite communication with a wide bandwidth. The first center frequency is 1.95 GHz with the bandwidth of 161MHz and second center frequency is 1.7 GHz with the bandwidth of 102 MHz. Radiation pattern of this Antenna shows a bidirectional pattern with the voltage standing wave ratio of less than two , return loss of less than -10 dB . Antenna parameters are taken out by the computer simulation tools microwave studio. The antenna is fabricated on Fr- 4 substrate with 4.3 dielectric constant and 1.6mm of thickness. It is observed that the simulated and measured values of the parameters of the antenna are quite close to each other.

Download
7 Availability Of Skilled Manpower On Site In Chambal Region
Richa, Saurabh Mittal

Abstract-Construction industry is depend on three basic resource such as Man, Money and Machines. These are known as 3-M resource. Manpower can further divide in skilled manpower and unskilled manpower. Obviously skilled manpower is precious resource of construction industry. To objective of this research paper for understand available of skilled manpower in construction industry in Chambal Region. To get this aim we conduct a survey of samples companies. Result of this paper provides knowledge of availability of skilled manpower in construction industry in Chambal Region.

Download
8 Status of Agricultural Infrastructure in Uttar Pradesh: An Analysis
Aloka kumar goyal

Abstract-Uttar Pradesh is the most populous state in India and agriculture is backbone of the state economy. But economic condition is backward. Almost 50%of the districts are in the backward categories. Agriculture is the main occupation and source of livelihood for rural people. In this regard agricultural infrastructure has vital role in agricultural productivity and betterment of standard of living of rural population and sparking point for state economy and country as whole. The present paper deals with status of agricultural infrastructure...

Download
9 Efficient and Robust Spatial Domain Image LSB Steganography
Divya Singh,Bhanu Prakash Lohani,Vimal Bibhu

Abstract-Steganography is the art of hiding information in some medium. Here we are using image as a means for securing information for data transmission. Spatial domain image Steganography has been used for the work because of its compatibility to images. Objective of the paper is to increase the capacity of hidden data in a way that security could be maintained. This paper discusses the concept of “Digital Image Steganography” and various techniques used in image Steganography in spatial domain. In this paper we will also discuss the difference between image Steganography and watermarking technique. Basically Steganography pay attention to the degree of invisibility while watermarking pay most of its attribute to the robustness of the message and its ability to withstand attacks of removal such as image operation (rotation ,cropping, filtering )audio operation in the case of images of audio files being watermarked respectively. Communication of secret information between two entities can be achieved through steganography. The term being derived from Greek words Steganos and graphia meaning covered writing. Steganography is an information hiding technique where the secret information to be communicated is embedded into a cover media such as image, video, audio and text files such that the hacker looking at the stego image cannot even think of the existence of the secret information and only it can be retrieved at the destination by an authorized person.

Download
10 New Bounds for the Zeros of a Polynomial
M. H. Gulzar, G. M. Wani

Abstract─In this paper we give new bounds for the zeros of a polynomial satisfying certain conditions.

Download
11 Single-Phase 13-Level Grid-Connected Inverter For Photovoltaic System
Salagala Mahesh , K. Jaya Rao, D. Mohan Rao

Abstract -This paper proposes a single-phase 13-level inverterfor grid-connected photovoltaic systems, with a novelpulsewidth-modulated (PWM) control scheme. Three referencesignals that are identical to each other with an offset thatis equivalent to the amplitude of the triangular carrier signalwere used to generate the PWM signals. The inverter is capable of producing thirteen levels of output-voltage levels (Vdc, 5Vdc/6, 2Vdc/3, Vdc/2,Vdc/3, Vdc/6, 0, −Vdc/6,−Vdc/3, −Vdc/2, −2Vdc/3, −5Vdc/6, −Vdc) from the dc supply voltage. A digital proportional–integral current-control algorithm was used to keep the current injected into the grid sinusoidal. The proposed system wasverified through simulation.

Download
12 Code-Multiplexing
K.Varalakshmi, P. Prathusha

Abstract-Code multiplexed transmitted reference (CM-TR) and code-shifted reference (CSR) have newly drawn notice in the field of ultra-wideband communication mainly because they enable noncoherent detection without requiring either a delay component, as in transmitted reference, or an analog carrier, as in frequency-shifted reference, to separate the reference and data-modulated signal reference, to separate the reference and data-modulated signals at the receiver. We propose a generalized code-multiplexing (GCM) system based on the formulation of a constrained mixed-integer optimization problem. The GCM extends the concept of CM-TR and CSR while retaining their simple receiver structure, even offering better nit-error-rate performance and a higher data rate in the sense that more data symbols can be embedded in each transmitted block. The GCM framework is further extended to the cases when peak power constraint is considered and when inter-frame interference exists, as typically occurs in high data-rate transmissions. Numerical simulations performed over demanding wireless environments corroborate the effectiveness of the proposed approach.

Download
13 Optimum Gate Location In Plastic Injection Moulding Using Computer Simulation
Madigundu Sreekanth Raghuveer, P.Hari Sankar

Abstract— Due to heavy demand in plastic products, plastic industries are growing in a fastest rate. Plastic injection moulding begins with mould making and in manufacturing of complex shapes. Optimal setting up of injection molding process variables plays a very important role in controlling the quality of the injection molded products. It is all the most important to control attribute defects like sink marks. Sink marks are basically a “designed in” problem and hence it is to be attended during designs stages. Owing to certain conditions and constraints, sometimes, it is rather ignored during design stages and it is expected to be handled by molders with only instruction to „do the best‟. Handling of numerous processing variables to control defects is a mammoth task that costs time, effort and money. Mould Flow analysis is a powerful simulation tool to minimize the sink marks and to predict the production time required at the lowest possible cost. Verification using simulation requires much less time to achieve a quality result, and with no material costs, as compared with the conventional trial-and-error methods on the production floor.

Download
14 Packet Aggregation Scheme in VOIP over WLAN For Throughput and PDR Enhancement
A.R.Paymal, K.R.Desai

Abstract— In infrastructure 802.11 WLAN networks multimedia applications need more QoS requirements which ia getting degraded due to queuing delays, transmission delays, traffic load and jitters. In this paper we have proposed new packet aggregation scheme due which throughput will get increased and will increase the QoS for multimedia or VoIP applications

Download
15 High Performance Matrix Multiplication Architecture Based on PPI-MO Techniques
Bhishm Jawarkar, Puran Gour, Braj Bhihari Soni

Abstract— Matrix multiplication is the kernel operation used in many transform, image and discrete signal processing application. We develop new algorithms and new techniques for matrix multiplication on configurable devices. In this paper, we have proposed three designs for matrix-matrix multiplication. These design reduced hardware complexity, throughput rate and different input/output data format to match different application needs. These techniques have been designed implementation on Virtex-4 FPGA. Wehave synthesized the proposed designs and the existing design using Synopsys tools. Interestingly, the proposed parallel-fixed-input and multiple-output (PPI-MO) structure consumes 40% less energy than other two proposed structures and 70% less energy than the existing structure.

Download
16 Design and Development of Portable Insulin Syringe Based on MSP430 MCU
Mr.Rajesh R.Dodake, Dr.Prof.Mrs.S. Subbaraman , Mr.Vikas.D.Patil

Abstract—This Paper gives details of the design of an ultra-low power portable insulin syringe system based on advanced microcontroller MSP430 which is capable of calculating and delivering insulin depending on sugar level. The motivation behind the project was the need for a small, portable and ultra-low power insulin delivery system that is built from commercially available electronic components, to help the research of diabetes patient caring. There are many advantages of portable insulin pumps for diabetes patients, but most of them were designed as wearable devices which must be wearing continuously. These were either never commercialised or are far too complicated to be used in academic researches. The design considers practical constraints as a portable device in a multitude of environments, aiming to satisfy developers’, researchers’, and users’ needs for reliability, power efficiency, ease-of-use, and a functional development environment. The paper starts with the specifications that point out the most important respects of the hardware and software design. It gives advantage of the capabilities of the ultra-low power chip architecture along with idea of how the whole system performs in the real environment.

Download
17 An Implantable Embedded Chip For Monitoring The Immunity Levels
Sangeeth Raj A E J, Salmaan N, Usha Rani J

Abstract- In this paper our aim is to provide an accurate count of the WBC cells in our body by implanting micro-embedded chips at eight places of bone marrows and two places of right arm forearm and left arm triceps in our body. This system is used for counting the WBC’S it can perform in any places not only in Health care. Even an ordinary citizen can able to operate this embedded system. The time required for processing this system will be less within microseconds and also we can able to get a perfect output. It can be used for real time applications.

Download
18 Proposal For New Aggreagation Scheme in WLAN For Multimedia Applications
A.R.Paymal, K.R.Desai, S.P.Patil

Abstract— In infrastructure 802.11 WLAN networks multimedia applications need more QoS requirements which ia getting degraded due to queuing delays, transmission delays, traffic load and jitters. In this paper we have proposed new packet aggregation scheme due which throughput will get increased and will increase the QoS for multimedia or VoIP applications

Download
19 Effect of Yoga Training Program on the Mental Health of Female Basketball Players
Kavita Sharma

Abstract-The purpose of the present study was to know the effect of yoga training program on the mental health of the female basketball players of Delhi University. 100 female players were selected from Delhi University with minimum intercollegiate level participation from the year 2010-2014. The subjects were selected through purposively sampling method. 50 subjects were assigned to an experimental group and 50 subjects were assigned to control group. The experimental group was administered yoga training program (4 days in a week) for a period of 12 weeks. There was no practical training given to control group. Before and after training of yoga, mental health was measured by mental health questionnaire. The collected data was analyzed by Descriptive statistics, paired sample‘t’ test and independent sample‘t’ test. Results show that there was significant difference between experimental group and control group.

Download
20 Selective Jamming Attack Prevention Algorithm In Pocket Delay Networks
G Kumara swamy, S Anjaneyulu,Santhosh Kumar seelam

Abstract- This paper discusses exclusively the role of jamming at the Trans port/Network layer. The Link/Physical layer provides a sensing and jamming service. The jamming service is defined as jamming for abased attacks. In this paper we consider encrypted victim networks in which the entire packet including headers and payload are encrypted and thus the attacker can not directly manipulate any of the victim communication. We analyze the security of our methods and evaluate their computational and communication overhead.

Download
21 Experimental Evaluation Of Impact Strength Of Chemically Extracted Elephant Grass -Fibre Polyester Composites
Ch.Ramprasad, Ch.Vasantha Lakshmi, D.J.johnson, A.V.Ramana Rao

Abstract-Natural fibres have played a significant role in human civilization since pre historic times with human having depended on them for garments and simple domestic uses as well as complex uses such as land dwelling, military, marine engineering etc. The conventional applications of natural fibres in relation to the technology of synthetic fibre composites for industrial applications. The natural fibre reinforced composites have the advance of being light weight, renewable, bio-degradable, cheap and eco-friendly compared to the synthetic fibres like grass, graphite etc. So there is every need to investigate potentially of natural fibres and its composites, which can be used in highly demanding situations. However, very small contribution of research work exists in the design and fabrication of composite materials using natural fibres. An attempt has been made to explore the possible use of variety of cultivated and wild grown fibres in nature in the development of new composites for load carrying structures. The objective of the present work is Elephant grass fibre is identified as potential reinforcement for making composites. It is one of the important raw materials obtained from the Elephant grass. Unsaturated polyester resin is selected as a matrix material due to its availability, low cost and easy to mould at room temperature. The fibre is extracted by using NAOH treatment. The standard test method ASTM D 256M for impact testing has been used for preparation and testing the impact properties of unidirectional composite specimens. The impact strength of the composites increases with increase in fibre loading and is 296.9 at 0.32 volume fraction of fibre. Impact strength of the composite is 238.5 J/mt for the mass of fibre of 1.75 grams at V.F=0.27995, 200.4 J/mt for mass of fibre of 1.5 grams at V.F=0.21476, 164.0 J/mt for mass of fibre of 1.0 grams at V.F=0.17312, 110.48 J/mt for mass of fibre of 0.5 grams at V.F=0.11214.The value of impact strength of composite with out fibre is 31.62 J/mt.

Download
22 Harmonic distortion analysis of induction motor drive with advanced multilevel control strategy using photo voltaic system
Srinivas Naalla , Syed Karimulla

Abstract-This paper shows that versatile stand-alone photovoltaic (PV) systems still demand on at least one battery inverter with improved characteristics of robustness and efficiency, which can be achieved using multilevel topologies. A compilation of the most common topologies of multilevel converters is presented, and it shows which ones are best suitable to implement inverters for stand alone applications in the range of a few kilowatts. The harmonics content of the output signals are analyzed. Two types of harmonics are investigated for induction motors: space harmonics and time harmonics. Space harmonics are generated due to the different phase windings interaction when the power supply is sinusoidal and they can be reduced by applying a proper machine design. A simplified Pulse Width Modulation (SPWM) method for a multilevel inverter that supplied an induction motor is developed. The controller equations are such that the SPWM pulses are generated automatically for any number of levels.

Download
23 A Survey on Text Mining, its Techniques and Applications
Shweta Gupta, Kirti Joshi

Abstract-The process of Text mining is used to extract knowledge from large text documents. Text mining is becoming an important research field because it is necessity to extract knowledge from the huge volume of text documents available especially on the Web. Text documents can be in any form like e-mails, books, journal papers, E-libraries, news articles and so on. Although data mining and text mining seems to be similar terms but they are different at many issues, mainly, on the type of data both can handle. This review paper explains what text mining is and how data mining and text mining can be distinguished from each other. It also explains how text mining works and what are the different techniques used to implement text mining and areas where it can be applied.

Download
24 Review on the classification of emotions in Speech
Gurpreet Kaur, Abhilash Sharma

Abstract— Automatic speech emotion recognition is a process of recognizing emotions in speech. This has wide applications in the area of phsycatrics help and in robotics.the human computer interaction the challenging area of research. Any effective HCI system has two sections Training and testing. The techniques used in the system are feature extraction and classification.This paper focuses on the survey of the various classification techniques and feature extraction techniques implemented in the speaker emotion recognition.

Download
25 Performance Based Plastic Design Of RC Moment Resisting Frame
Gaurav D. Patel, Prof. Jasmin Gadhiya, Prof.hitesh Dhameliya

Abstract -In today’s era the objective of limiting excessive damage and to maintain functionality of the building after an earthquake is becoming more desirable. In order to forecast damage to a structure in an earthquake, performance based design method has been recently developed to achieve enhanced performance of earthquake resistant structures. It is based on the “STRONG COLUMN-WEAK BEAM” principle. The design concept uses pre-selected target drift and yield mechanism as performance criteria. The design base shear for selected hazard level is determined by equating the work needed to puss the structure monotonically up to target drift to the corresponding energy demand of an equivalent SDOF oscillator. Plastic design is performed to detail the frame members and connection in order to achieve intended yield mechanism and behavior.

Download
26 Missing People Identification Using Online Social Networks
Mr. N Ramojirao, Mr. R Anilkumar, Mr. B Srinivas, Dr. P. Satheesh

Abstract—Disaster management is the initiative for any mishap that generally occurs. People aim in attempting different methodologies for finding their beloved ones, who are missing during mishap. Missing in general, may occur for many reasons. Disaster may not be the only reason for all the cases that has been recorded under missing. The advent effort of the social networks has been taken as a promising aspect for this management. The present paper proposes the advent usage of different levels of searching algorithms at different stages on par of information that one persist regarding the person who is claimed to have been missing. The first stage correlates to the usage of certain string algorithm like Tuned Boyer-Moore (TBM), which has been used to match person information either on basis of first or last names. The next stage hails with the aspect of dealing with certain effigy based algorithm like Linear Discriminant Analysis (LDA), which works on the image of the person that is present in the information that has been quoted on the social network.

Download
27 ARM Based Research of Roots Flow Meter using Zigbee Technology
B.Chitanya, A.Suvir Vikram

Abstract-This paper introduces an intelligent roots flow meter based on ARM Cortex-M3 processor and C/OS-II embedded real-time operating system. ARM Cortex-M3 processor is an industry-leading 32-bit processor with lower power consumption and higher performance than other 8-bit or 16-bit processors. In roots flow meter gas flow, pressure of the flowing gas and temperature is sensed using corresponding sensors. Sensor continuously monitor at the effect of the different pressure of gas flow. Then the gas flow is expelled from the little space continuously Then the data is processed by the ARM processor at the instantaneous flow rate, temperature and integrated pressure is display on the LCD screen Using the C/OS-II embedded real-time operating system, it will compensate the temperature and pressure of the roots flow meter more instantly. What's more, it makes communication and networking easier by using ZigBee technology.

Download
28 An Advanced Secret Sharing Method for Authentication of Gray Scale Document Images with the Use of PNG Image and Self Repair Capability
S.Yallamandaiah, B.Baloji Naik, B.Vagya Naik

Abstract- Digital images are mostly used to protect confidential & important information. But the problem is providing authentication and integrity to these digital images is a very challenging task. Therefore using this paper a new efficient authentication method is proposed to provide for grayscale document images using the Portable Network Graphics (PNG) image with verification and data self repair capability. In this concept an authentication signal generated by each block of a grayscale document image and then using Shamir secret sharing scheme grayscale document image authentication signal and binarized block content is combined and transformed into several shares. These several binarized block content shares are then combined into an alpha channel plane then the PNG image is built from combining the grayscale image with alpha channel plan. The authentication signal measured from the current block content does not match that extracted from the shares embedded in the alpha channel plane then that image block is tampered. If the authentication process fails then repairing is done in each tampered block, after collecting two shares from unmarked block using reverse Shamir scheme. Security of data provided by sharing of data in the alpha channel and encrypting the stego image. Then using reverse Shamir scheme, two shares from unmarked blocks are collected and then data repairing is applied. Finally simulation results are provided to prove the concept of proposed method.

Download
29 An optimised implementation of steganography with two level of security
Lokesh Vishwakarma, Shivam Khare

Abstract—Steganography is a kind of security technique present days; the way and art of hiding the existence of a message between sender and dedicated recipient. Steganography has widely used to hide secret data in various types of files, may be audio, digital images or video. The three most defined parameters for audio or image steganography are imperceptibility, robustness and its payload[3]. Various applications have their specific requirements for the steganography approach used. This paper aims to give an new method of image cum audio steganography, its applications and techniques. Paper work is an presentation of Audio and Image Steganography for the some plaintext, paper work also uses three isolated key and three layer of data protection, the overall avalanche in plaintext is very high in present paper work.

Download
30 Design and Implementation of Speed Efficient MAC Unit Based on Ancient Vedic Multiplication Technique
Mr. Yogesh Kumar, Mr. Kanak Kumar, Mr. Santosh Yadav

Abstract—This research work is devoted to design high speed thirty two bit Multiply Accumulate Unit. MAC Unit is the key element of digital signal processors to perform various sophisticated tasks like as FFT, DFT, resolving various complex equations and Convolution etc. along with this it is also used in various configurations like as IIR, FIR etc. Every digital domain based technology depends upon the operations performed by MAC Unit either partially or whole. Speed is the most prominent factor of processor and controllers being used recently. That’s why it is highly required to design high speed MAC, which can enhance the efficiency of those modules which lies upon the operations performed by MAC. The speed of MAC greatly depends upon the speed of multiplier. At algorithmic and structural level there are so many multiplication algorithms exist now-a-days. After a thorough study and proper analysis we have seen that Vedic multiplication technique is the best algorithm that gives much better result in comparison to others in terms of speed. Further we have analyzed different existing Vedic multiplication hardware, and compared those with respect to speed. And found that the Vedic multiplier with Carry Save Adder gives better outcome. Then we have proposed that multiplier for the MAC unit design. This proposed MAC Unit is able to perform different arithmetic operations at high speed. All sub-modules in the MAC unit has been designed in combinatorial form. And integrated in the final module, in which we have provided the reset and clock functionality to have better control on the circuitry. To design proposed multiply accumulate unit verilog hardware description language (HDL) has been used. To design operational sub-modules data flow modeling and to integrate these modules behavioral modeling style has been used. For this design the target FPGA belongs to Spartan-3E (family), XC3S500E (device), FG320 (package) with speed grade of -5. For synthesis purpose Xilinx synthesis tool (XST) of Xilinx ISE-9.2i has been used. For the behavioral simulation purpose ISE simulator has been used.

Download
31 Intelligent Smart Grid Based Fully Automated AI System
Anil Chaudhary, Karan Kumar, Mahaveer Singh

Abstract—The conventional smart grid is based on large, centralized power stations that supply end-users via long- established, transmission and distribution systems. Over the years it has performed very well in delivering secure and reliable power. But in this time consumers have different demand profiles and generators have different volatilities. So these traditional power grids have no. of challenges. These challenges will require research within the artificial intelligence (AI) communities to make smart grid intelligent. We need an intelligent smart grid that can receive power of all qualities from all sources – both centralized and distributed – and deliver reliable supplies, on demand, to consumers of all kinds. Intelligent Smart grids will grow through evolution rather than revolution. We expect to see a gradual transformation of the systems that have served us for many years into a more intelligent, more effective and environmentally sensitive network to provide for future needs. This paper presents a vision of the smart grid in transmission and distribution system, which will be fully automated based on artificial intelligence (AI).

Download
32 QoS improvement in Mesh networks using Adaptive Channel Assignment, Scheduling and Routing protocols
G. Sunil Dayakar, G. Srinivasrao

Abstract—In wireless mesh networks (WMNs) the most widely used random channel access mechanisms are IEEE 802.11 DCF and EDCA. These two mechanisms are based on CSMA/CA and inefficient to eliminate effectively hidden terminal and exposed terminal problems. In this paper, we propose a set of efficient multi-radio multi-channel (MRMC) assignment, scheduling and routing protocols based on Latin squares for WMNs with MRMC communication capabilities, called ‘‘M4’’, i.e., the Multiple access scheduling in Multi-radio Multi-channel Mesh networking. M4 uses nodal interference information to form cliques for inter-cluster and intra-cluster in WMNs, and then applies Latin squares to map the clique-based clustering structure to radios and channels for communication purposes. The M4 again uses Latin squares to schedule the channel access among nodes within each cluster in a collision-free manner. We also design the corresponding MRMC routing to support M4 communication. Simulation results show that M4 achieves much better performance than other channel access control protocols.

Download
33 Throughput and end to end delay analysis of UMA using WiFi
Mr. R. D. Bhosale, Mr. A. R. Nigavekar

Abstract—Making voice calls for faster information exchange is showing its increasing demands day by day. IP telephony is sensible in the view to provide such platform. IP telephony in heterogeneous network environments can prove its dominating characteristics while working on IP platform as compared with circuit switched network. Interface using SGGN gateway for IP telephony, to provide channel to all WiFi users to make voice calls to GPRS mobile user, can provide ultimate solution for the need. In the existing EPBX system this can be used as add-on feature. Data traffic on existing GPRS networks have proved reliability in terms of less delays and cheaper way of information exchange. At the same time VoIP on WiFi network is showing increasing demand for corporate VPNs today. Interconnecting these two will provide more reliable and single device-multi interface platform and add more flexibility to its users. Unlicensed mobile access using WiFi can provide such integration of different networks together. The analysis has been done by simulating unlicensed mobile access (UMA) on NS2. Analysis indicates that the system can perform better for maximum number of users with less end to end delays and optimum throughput.

Download
34 Performance comparison of Wind Energy Conversion System fed to Back-to-Back Converter and Matrix Converter
B.Sunil, J.Nagarjuna Reddy, and B.M Manjunatha

Abstract—Normally the output of the wind energy conversion system is directly connected to load or grid. For this purpose, we use power electronic converter circuits. In this paper, we use a matrix converter connected to the wind energy conversion system which helps in improving the terminal voltage and frequency control in induction generator, for all wind velocities. For enhancing the power captured from the wind, the shaft need to be controlled. Power electronic converters are used to interface the induction generator with the grid and maximize the power captured from the wind. The wind energy conversion system is compared using the topologies; back-to-back converter and matrix converter. The simulation results of wind energy conversion system are compared when connected with the back-to-back converter and matrix converter.

Download
35 Closed Loop Control Of Ac-Dc Converter Using Single Switch
P. Divya, L. Bhanu Ganesh

Abstract—This paper presents a transformer less ac/dc converter which can be used in voltages between 90- 230 Vrms. Instead of a transformer, this topology consists of a buck dc/dc converter and a buck boost dc/dc converter. By the absence of transformer, reduce the complexity of converter and it is cost effective. Buck dc/dc converter keeps o/p voltage below the line voltage; limit the leakage current. By controlling the circuit with feedback, we can increasing the efficiency and reduce total harmonic distortion. Output voltage is 40 V with THD 12.36%. And output current is near 4 A. For further modification a feedback PI controller is used. After using PI controller THD is reduced to 6.231%.Thus using controlled circuit harmonic content is reduced and efficiency is improved. Working of the proposed circuit and verification by simulation results are discussed in this paper. Simulation is done in MATLAB.

Download
36 Fpga Design Of Low Power High Performance Architecture For Motion Estimation
T. Suganya Thevi, C. Chitra

Abstract—The existing methodology provides low power consumption and will not tolerate errors in the computation of SAD (sum of absolute difference) process. The EDDR (Error detection and data recovery ) architecture is proposed based on residue –and- quotient (RQ) code and integrated with motion estimation engine in order to reduce error rate and power consumption. The error in PEs which is the key component in motion estimation can be detected and recovered effectively by the proposed EDDR design. Motion estimation explores the temporal redundancy, which is inherent in video sequences, and it represents a basis for lossy video compression. Other than video compression, motion estimation can also be used as the basis for powerful video analysis and video processing.

Download
37 A Survey on Routing Protocols in Wireless Sensor Network
Vishal Chhabra, Gunjan Gandhi

Abstract—In wireless sensor networks (WSNs), the deployment of massive numbers of small, inexpensive, low energy sensor nodes are random in nature. Therefore energy consumption reduction is very important. Wireless Sensor Networks with hundred to thousand of sensor nodes can gather information from unattendant environment transmit the gathered information to the specific user depending on the user end application. Information transmitted from one node to another node using different routing protocols. So routing protocol has now become one of the hot research in wireless sensor networks. In this paper we present a survey of state-of-the-art routing protocols in WSNs along with architecture of the wireless sensor network. Further we categorize routing protocols according to some factors and summarize on their mode of operation. At the end, we go through a comparative study on these protocols.

Download
38 Automatic News Extraction Using Hierarchical Clustering
Anish Gupta,Bhanu Prakash Lohani,Pradeep Kumar Kushwaha

Abstract—In today’s era, web newspapers are a rich source of information. User’s need is to find the specific information content. But users sometimes may not exactly know what they are looking for. In order to find the interesting news article from the large database, various studies have been devoted to data mining, text mining, web news mining and various other knowledge discovery techniques in the past years. To benefit more from the available information, term mining techniques are also applied. With the increasing amount of number of news sources, utilizing extracted information in deciding about the relevant news becomes increasingly urgent and difficult. Frequent term clustering [2] can be used to cluster large sets of news articles. The well-known methods of clustering do not really address the special problems of clustering: very high dimensionality of the data, very large size of the databases and understandability of the cluster description. This paper will discuss the novel approach of hierarchical clustering algorithm for frequent term based clustering. Hierarchical clustering organizes news (clusters) into a tree or a hierarchy. The parent-child relationship among the nodes in the tree can be viewed as a topic-subtopic relationship.

Download
39 Visual Tracking With Sapatio-Temporal Context Model
Shipra Vats, Sandeep Gupta

Abstract—Visual tracking is a challenging problem, because the target frequently changes its appearance, randomly move its location and get occluded by other objects in unconstrained environments. Moving object or target in the video changes it state continuously in space with time. Also, other factor i.e. brightness, color intensity and multiple objects heavily effects the moving target tracking task. There are many existing methods and algorithm which tracks the object but not robust to above mentioned factors. So, there is a need to design an algorithm that must be robust to these problems. . In this paper we discuss about various tracking techniques and a robust technique is presented which is based on space time context model. Tracker based on this model completes the tracking task in unconstrained environments.

Download
40 Speed Control Of Induction Motor Drive Using Seven Level Diode Clamped Inverter
K.Hari, K.Kishore Reddy

Abstract—The main aim of this paper is to control the speed of an induction motor by using seven level diode clamped inverter. To obtain quality of sinusoidal output voltage with reduced THD. The proposed Scheme for seven level inverter is multicarrier SPWM control. Speed control can be achieved by using constant V/ƒ method. This constant V/ƒ method can be implemented by changing the supply voltage and frequency applied to the induction motor at constant ratio. This system is replacement for the conventional method which has high THD and high switching losses, it results a poor drive performance. This simulation result shows the effectively control the motor speed. The performance of the drive can be validated using SPWM technique in terms of Total Harmonic Distortion (THD). The effectiveness of this system is verified through using MATLAB Simulink.

Download
41 Feedback Collision Detection By Multiuser Diversity In Wireless Network Using Recurrent Cluster Rifting (RCR) Algorithm
C.Chitra, Mr.S.Venkateswaran, K.M.Fathima Jahanas

Abstract— An ultimate goal in wireless network is to detect the feedback collision occurred in the multiuser environment. Though it is difficult to detect the feedback collision,we proposed an algorithm called Recurrent Cluster Rifting (RCR).In this we fix a threshold value (constant value) based on the number of users in the multiuser environment.This value is otherwise known as feedback threshold.If nouser in the multiuser environment send the feedback,there will be some adjustment in the threshold value(i.e.)this algorithm will lower the value.Therefore if there is any feedback collision occurs in the multiuser environment there will be no change in this value but this algorithm will rift the users recurrently to detect the collision and find the certified user involved in this collision.After detecting the collision we use two schemes namely Bandwidth Efficient Scheme(BES) and Switching Efficient Scheme (SES) to avoid the collision occurred during retransmission of data with lower bandwidth in this environment.

Download
42 Topology Manage With Cellular Ad Hoc Sites Along With Cooperative Communications
Bammidi Divyajyothi, P.K.Sahu

Abstract-Cooperative connection has acquired incredible attention regarding wi-fi systems. Nearly all active performs with cooperative communications usually are dedicated to link-level actual physical layer concerns. Consequently, the influences involving cooperative communications with network-level top layer concerns, including topology handle, direction-finding along with circle volume, usually are mainly overlooked. In this posting, we all offer any Capacity-Optimized Cooperative (COCO) topology handle plan to enhance the circle volume with MANETs through collectively thinking of equally top layer circle volume along with actual physical layer cooperative communications. By way of simulations, we all display that will actual physical layer cooperative communications get substantial influences around the circle volume, along with the pro-posed topology handle plan can substantially improve the circle volume with MANETs having cooperative communications.

Download
43 A Review on Security Challenges of Big Data
A V S M Adiseshu, S Lavanya Reddy, P Hasitha Reddy, Roshini K

Abstract-Innovations in technology and greater affordability of digital devices have presided over today’s Age of Big Data, an umbrella term for the explosion in the quantity and diversity of high frequency digital data. These data hold the potential as yet largely untapped to allow decision makers to track development progress, improve social protection, and understand where existing policies and programmes require adjustment. Big data implies performing computation and database operations for massive amounts of data, remotely from the data owner’s enterprise. Since a key value proposition of big data is access to data from multiple and diverse domains, security and privacy will play a very important role in big data research and technology. Hence Big Data faces security issues and challenges for controlled and assured sharing for efficient direct access. The objective of this paper is to make effective use of big data requires access from any domain to data in that domain, or any other domain it is authorized to access with security is a challenge.

Download
44 Queueing Concepts On Health Care Analysis
P.Swamynathan, G.Eswara Prasad, V.S.Mathu Suresh

Abstract-A multi-server queuing situation in health care center is considered. The arrival and service patterns of patients in two different units are discussed. The expected number of patients waiting for service and the probabilities of waiting time are computed numerically and the curves are exhibited.

Download
45 Design of Speed and Area Efficient 16-bit pipelined RISC with Harvard Architecture
Mrs. Varsha Pandey,Mr. Utsav Malviya, Prof. Vinod Kapse, Mr. Abhishek Gupta

Abstract-This thesis work is devoted to design speed and area optimized fully functional 16-Bit 5 phased pipelined harvard RISC processor. All of us know that there are two types of processors mainly available in the market; those are RISC (Reduced Instruction Set Computer) and CISC (Complex Instruction Set Computer). RISC and CISC processors were always the hot topics of debate, but still no conclusion has been drawn till now, that which one better is than another. RISC is advantageous in many aspects than the CISC processor as it uses reduced or small number of instructions to perform any action than CISC processors does. RISC processor is a digital processor which is called as the heart of the many digital devices. By optimizing speed and area of this processor, overall efficiency of those digital devices can be enhanced which are mainly based upon this processor. RISC processor works upon harvard architecture. In harvard architecture program and data are separated so that different data width can be chosen. Along with this digital signal processors can execute most instructions in one clock cycle. This is due to the strong, additional parallelism in the hardware structure maintained using pipelining. But there is always a problem of stalling in pipeling with RISC that is resolved using Harvard register Architecture (also having minimal structural and data flow hazards). To remove this issue a LIFO stack (8bit width) is inserted, which in the routine receives the data prior to the entry (subroutine interrupt). Another method that has been used is to save the register and the jump address when a subroutine call or an interrupt request occurs. We also have used register shadowing to save register. To design proposed RISC Processor VHDL hardware description language (HDL) has been used. To design operational sub-modules data flow modeling and to integrate these modules behavioral modeling style has been used. For this design the target FPGA belongs to Spartan-3E (family), XC3S500E (device), PQ208 (package) with speed grade of -5. For synthesis purpose Xilinx synthesis tool (XST) of Xilinx ISE-9.2i has been used. For the behavioral simulation purpose ISE simulator has been used.

Download
46 Quick Review on Channel State Estimation in Cognitive Radio System
Mr. Om Prakash Mishra,Mr. Sanjay Sharma

Abstract-After a thorough study we have seen that Now-a-days problem of spectrum scarcity increased due to tremendous growth of new players in wireless base system by the evolution of the radio communication. This problem occurs because there are many areas of the radio spectrum that are occupied by authorized user/primary user (PU), which are not fully utilized. Cognitive Radio is an emerging concept to resolve this problem, which proves as the next generation wireless communication system that proposed as a way to reuse this under-utilized spectrum in a non-interfering and opportunistic basis. A CR is an entity in a wireless communications environment that senses its tracks changes, environment, and reacts upon its findings and frequently exchanges information with the networks for secondary user (SU). However, CR facing collision problem with tracks changes i.e. reallocating of other empty channels for SU while PU arrives. In this paper we have discussed different approaches followed to perform Channel Estimation. Our main research objective is to utilize spectrum hole efficiently for data transmission and reception, which is an opportunity for unlicensed user (as a Secondary User) under licensed user as a Primary User). In this work channel state estimation is observed by energy detection (as opposed to feature detection—requires prior knowledge of the PU’s Signal and transmission or reception is carried out in a multiple spectrum hole for lower probability of communication loss.

Download
47 Channel State Estimation in Cognitive Radio System Using Energy Detection Scheme
Mr. Om Prakash Mishra,Mr. Sanjay Sharma, Mr. Abhishek Gupta

Abstract-Recently, spectrum sensing and channel estimation has been intensively studied as a key technology in realizing the cognitive radio. Many researchers and scientists has worked upon it and presented multiple techniques, to improve the performance of spectrum sensing and channel estimation. After a deep study we have seen that for implementation of CR System, any transceiver’s Energy Detection unit can be used and that would be much efficient and reliable. We have worked upon energy detection schemes, to measure these attributes use of Region Of Curvature has been proposed by us. In this paper, we have discussed various aspects of Cognitive radio systems, after which we have proposed the channel estimation based on Energy detection, in which the un-utilized channels and utilized channels are compared and discriminated based on their energy levels on real time basis. Then we have given the code summary and simulation results for our proposed work.

Download
48 Smart Card System with High Authentication Technology
Jamuna.P, Sivasangari.G, Tamilselvan.K

Abstract- The Paper develops the Automatic Teller Machines process. Now a day’s usage of banking sector is essential to the people with a help of ATM Cards. In the Proposed systems multiple ATM cards are merge into a one card is smart Card. ARM7 plays a vital source and execute a certain task in a Efficient Process. The Ethernet standards comprise several wiring and signaling variants of the OSI physical layer in use with Ethernet. Host computer is user side. Packets are transfer server to domain with a help connection establishment.LED display improve the clarity of color contrast. Efficiency of These display improve the quality. And reduce the power consumption. Vein authentication system is a type of security system.

Download
49 SOFT #gα-CLOSED Sets And SOFT #gα-CONTINUOUS Functions
Dr.V.Kokilavani, D.Sindu , M.Vivek prabu

Abstract-We introduce a new class of soft sets namely soft #gα-closed sets and study some of their properties in soft topological spaces. We introduce a new space namely soft T#a space using soft #gα-closed sets. We also investigate the concept of soft #gα-continuous functions and soft #gα-irresolute functions.

Download
50 Analysis of Fuzzy Queues with Bulk Service
Dr. G. Easwara Prasad, D. Jayalakshmi

Abstract-This paper proposes a general procedure to construct the membership functions of the performance measures in fuzzy queuing systems with bulk service when the interarrival time and service time are fuzzy numbers. The basic idea is to reduce a fuzzy queue into a family of crisp queues[11] by applying the -cut approach. A Mathematical investigation has been made of a simple queueing process in which customers arrive at random, form a single queue in order of arrival, and are served in batches, the size of each batch having a fixed maximum. Triangular fuzzy numbers are used to demonstrate the validity of the proposal. Numerical examples are illustrated successfully.

Download
51 Investigations on VoIP for a mobile WiMAX Communication Network
Manjotinder Singh Grewal, Rupinder kaur Gurm

Abstract-Voice over internet protocol refers to the transmission of telephone traffic over IPbased networks. Voice transmission over internet is also called internet protocol (IP) telephony. IP telephony has gained wide popularity and has become an important services on the internet. The use of IP telephony became real due to the high bandwidth available on the internet and its low implementation cost. Digital form of communication has further led to its vital use. Due to above reasons, voice communications using the IP, is also called Voice over IP or VoIP, has become attractive. The simultaneous transport of voice and data over the internet has already been demonstrated using 3G networks. This paper presents the performance evaluation of a WiMAX network. In this paper only dynamic conditions for the application voice over IP has been considered.

Download
52 A Distant Diagnostic and Therapeutic Technique for Patients’ Away from Doctors
Ganesh Babu. P, Abdul Salam Rasmi. A, Arun Pakash. K, Christo Baby, Dinesh Kumar. V

Abstract- Recently, telecommunication has become one of major useful system for transmitting data’s. This research mainly deals with the transmission of data’s from the patients’ towards the Doctor Therefore this study includes collections of signals and all Health care information’s to help the doctor analyze the patient .This proposed technique also uses GPRS, sensors and embedded systems, Through which this technique adopts continuous collections ofvarious information mainly ECG signal, BP, SPO2 and also relayed on abnormal pulse generation for chronic diseases. A prototype is also implanted which can offer high healthcare standard with major source of cost reduction.Also through which the conditions of the patients can be transmitted instantly towards the patients’ family.

Download
53 A Novel Efficient Technique for Contention Reduction In Wide Fan-In Dynamic OR Gate
Jai Krishna Goswami, Anshul Jain

Abstract- Register file structures in modern microprocessors usually employ wide fan-in dynamic CMOS OR gates. Weak keepers have been traditionally used to resolve the low noise margin problem of dynamic CMOS design. Aggressive scaling trends in CMOS design have reduced the effectiveness of this weak PMOS keeper. On the other hand large sized PMOS keeper used in wide fan-in dynamic OR gate results in contention between the pull down network (PDN) and the keeper. As a consequence of contention there is an unnecessary increase in power dissipation and loss in performance. In this paper a new keeper design is proposed which is capable of reducing the contention between the keeper and PDN and hence capable of reducing the power dissipation and delay. Simulation results at 50nm shows that the power dissipation and delay have been reduced by 40% and 35% respectively as compared to the wide fan-in dynamic OR gate with conventional keeper.

Download
54 ON SOFT g#α-SEPARATION AXIOMS
Mrs.V.R.Karuppayal, M.Malarvizhi

Abstract- In this paper, we introduce soft g#α-closed sets in soft topological spaces and discuss some of its properties. We also introduce four new type of spaces namely soft Ta , soft Tb, soft Tc, soft Td spaces and soft g#α-continuous functions and soft g#α-irresolute functions and study some of their properties.

Download
55 Characteristic Evaluation of Wear Properties of NiTiAl Based Shape Memory Alloys for different Composition
Babu K N, Mallikarjuna Biradar, Dr. N G S Udupa, Rudra Naik M, Santhosh N

Abstract- Alloying constituents have a remarkable effect on the shape memory effect of Ni-Ti (Nitinol) based Shape memory alloys that have a rear distinction of having extremely effective characteristics as compared to other shape memory alloys. The transformational behavior of these shape memory alloys are unique and found to have an impact on biomedical applications. In our Present work the wear characteristics of Ni-Ti-Al based shape memory alloys were effectively studied for different compositions and the specific wear rate, hardness values were noted for as cast and heat treated samples. The results of the work has shown remarkable increase in hardness and wear characteristics of the shape memory alloys subjected to heat treatment and subsequent aging.

Download
56 Characterization of High performance Al 5083/SiCP/Fly ash hybrid metal matrix composite for advanced Aerospace Applications
Dr U N Kempaiah, Santhosh N, D Harshith Kumar, Amogh H Chelgeri,Vishnu P, Amogh H Chelgeri

Abstract- The present work involves the development of hybrid Metal Matrix Composite materials by combining the desirable attributes of Metals, Ceramics and Industrial waste. Usually, when at least two reinforcement phases are present, it is called a hybrid composite and our work predominantly concentrates on characterization of these hybrid composite materials. Aluminium Metal Matrix Composites with Silicon carbide particle reinforcements are finding increased applications in aerospace, automobile and underwater vehicles. In the present work, Aluminum 5083 is used as the matrix material into which SiCP and fly ash are added as the reinforced material. The results of an experimental investigation of the mechanical properties of reinforced aluminum alloy (Al 5083) composites samples, processed by stir casting route are reported in this paper. Each set chosen for our work had three types of composite samples with 3, 5 and 7% of Silicon carbide and 2% of Fly ash that was kept constant throughout. A graphite crucible and a cast iron permanent mould were used to prepare the samples. The mechanical properties studied were the tensile strength, compressive strength, ductility and hardness. It was found that the tensile strength, compressive strength and hardness of the aluminum alloy (Al 5083) composites increased with the increase in weight fraction of reinforced silicon carbide up to 5% SiCp and gradually decreased with further increase in weight fraction of reinforcement. Morphology of the composite and particle distribution were investigated by optical microscopy and scanning electron micrographs.

Download
57 Empirical mode decomposition (EMD) for Non linear signal processing
Mr. Pritam D. Desai, Dr. Mrs. S. R. Chougule

Abstract- Empirical Mode Decomposition (EMD) is a decomposition technique for the complex signals like EEG, ECG etc, with the help of Hung transformation. EMD consists of breaking down a signal without leaving the time domain. EMD filters out functions which form a complete and nearly orthogonal basis for the original signal. Completeness is based on the method of the EMD; the way it is decomposed implies completeness. It can be compared to other analysis methods like Fourier Transforms and wavelet decomposition. The process is useful for analyzing natural signals, which are most often non-linear and non-stationary. EMD obtain the functions, known as Intrinsic Mode Functions (IMFs), are therefore sufficient to describe the signal, even though they are not necessarily orthogonal. The technique of Empirical Mode Decomposition (EMD) is presented, and issues related to its effective implementation are discussed in this paper. Also how EMD is better than popular Wavelet decomposition is discussed.

Download
58 Matrix Manipulation Using High Computing Pipeline Architecture
Kirti Sharma , Anushree Gupta

Abstract- Matrix multiplication is the kernel operation used in many transform, image and discrete signal processing application. We develop new algorithms and new techniques for matrix multiplication on configurable devices. In this paper, we have proposed three designs for matrix-matrix multiplication. These design reduced hardware complexity, throughput rate and different input/output data format to match different application needs. These techniques have been designed implementation on Virtex-4 FPGA. We have synthesized the proposed designs and the existing design using Synopsys tools. Interestingly, the proposed parallel-fixed-input and multiple-output (PPI-MO) structure consumes 40% less energy than other two proposed structures and 70% less energy than the existing structure.

Download
59 Characterization of High performance Al 5083/SiCP/Fly ash hybrid metal matrix composite for advanced Aerospace Applications
Dr U N Kempaiah , Santhosh N , D Harshith Kumar , Amogh H Chelgeri , Vishnu P, Amogh H Chelgeri

Abstract- The present work involves the development of hybrid Metal Matrix Composite materials by combining the desirable attributes of Metals, Ceramics and Industrial waste. Usually, when at least two reinforcement phases are present, it is called a hybrid composite and our work predominantly concentrates on characterization of these hybrid composite materials. Aluminium Metal Matrix Composites with Silicon carbide particle reinforcements are finding increased applications in aerospace, automobile and underwater vehicles. In the present work, Aluminum 5083 is used as the matrix material into which SiCP and fly ash are added as the reinforced material. The results of an experimental investigation of the mechanical properties of reinforced aluminum alloy (Al 5083) composites samples, processed by stir casting route are reported in this paper. Each set chosen for our work had three types of composite samples with 3, 5 and 7% of Silicon carbide and 2% of Fly ash that was kept constant throughout. A graphite crucible and a cast iron permanent mould were used to prepare the samples. The mechanical properties studied were the tensile strength, compressive strength, ductility and hardness. It was found that the tensile strength, compressive strength and hardness of the aluminum alloy (Al 5083) composites increased with the increase in weight fraction of reinforced silicon carbide up to 5% SiCp and gradually decreased with further increase in weight fraction of reinforcement. Morphology of the composite and particle distribution were investigated by optical microscopy and scanning electron micrographs.

Download
60 Characteristic Evaluation of Wear Properties of NiTiAl Based Shape Memory Alloys for different Composition
Babu K N, Mallikarjuna Biradar, Dr. N G S Udupa, Rudra Naik M, Santhosh N

Abstract- Alloying constituents have a remarkable effect on the shape memory effect of Ni-Ti (Nitinol) based Shape memory alloys that have a rear distinction of having extremely effective characteristics as compared to other shape memory alloys. The transformational behavior of these shape memory alloys are unique and found to have an impact on biomedical applications. In our Present work the wear characteristics of Ni-Ti-Al based shape memory alloys were effectively studied for different compositions and the specific wear rate, hardness values were noted for as cast and heat treated samples. The results of the work has shown remarkable increase in hardness and wear characteristics of the shape memory alloys subjected to heat treatment and subsequent aging.

Download
61 Survey On Removal Of Undesirable Images In Online Social Network User Walls
M.Swapna, Dr.D.Malathi

Abstract- Most of the people use online social network for communication between different users. While regular communication they exchange contents in the form of text, image, audio and video data. To access the data, it is uncomfortable for the user. The problem is the vast number of databases and the undesirable images that cannot be controlled by the user. Till now OSNs provide few support for this issue. To solve this problem, we proposed a system to control the images automatically by the user that are posted on their wall. This solution can be obtained through the image classification that allows users to modify the filtering principle. In addition to the classification provision, the system provides a substantial rule layer utilizing an adaptable language to define Filtering Rules (FRs), by which the user can state the contents that should not be displayed on their walls. Besides that, list of users that are temporarily blocked to post any kind of images on a user wall referred to as user – defined Black Lists (BLs) is also provided by the system for the support of user.

Download