Sr/No/ |
Title |
Pdf |
1 |
Survey On Crop Iris Image From Facial Image
R.ArunaRani, D.M.D.Preethi
Abstract —Iris authentication is one of the
developing research fields in the biometrics. An
efficient algorithm is designed to automatically
segment the iris from the facial image. Iris
segmentation is an essential module in iris
recognition because it defines the effective image
region used for subsequent processing such as
feature extraction. Traditional iris segmentation
methods often involve an exhaustive search of a
large parameter space, which is time consuming
and sensitive to noise. The features are perfectly
extracted from eye image using the feature
extraction techniques in order to remove the noisy
data’s from the extracted image. Then the
extracted features are given to the classifier. Later
on this work will be helps to identify an individual
by comparing the feature obtained from the
feature extraction algorithm with the previously
stored feature by producing a similarity score.
This score will be indicating the degree of
similarity between a pair of biometrics data under
consideration. Depending on degree of similarity,
individual can be identified.
|
Download
|
2 |
Impedance source of five level
Cascaded multilel inverter
A. Suresh Kumar , A.Raviprasad
Abstract—This paper deals with simulation of
impedance source H-Bridge five level inverter. The
impedance network in the cascaded multilevel inverter
circuit will perform buck/boost operation. This
impedance network reduces one stage (buck-boost) of
power conversion system. Using impedance source in
multilevel inverter there is no problem of shoot
through. Using Multilevel inverter topology the voltage
stress across switching devices is reduced and the
overall harmonics profile is improved do to multilevel
output voltage. Multilevel inverter topology have an
alternative to the normal two level inverters, especially
in high power application do to above advantages.
There are several multilevel inverter topologies but the
best topology is cascaded Multilevel Inverter. such as
simple circuit layout, less components count and low
THD level in the out.
|
Download
|
3 |
Reliability Assessment of Radial Distribution
Systems with Distributed Generation
Imran Mohmmed, Ch.Bharghav
Abstract—Reliability assessment is of primary
importance in designing and planning distribution systems
that operate in an economical manner with minimal
interruption of customer loads. The power system
especially at the distribution level is prone to failures and
disturbances due to weather related issues and human
errors. Having distributed generation (DG) as a backup
source ensures the reliability of electric power supply.
Therefore, distributed generation is expected to play a key
role in the residential, commercial and industrial sectors
of the power system. In this paper, the value of DG
installed as a backup generator is quantified in terms of its
contribution to the reliability improvement of a residential
distribution network. The impact of adding one DG to
each feeder of the system, as well as the impact of placing
DG at various distance plus the amount of DG installed
are presented.
|
Download
|
4 |
Reliability Assessment of Radial Distribution
System by Using Analytical Methods
B.venu, C.Bhargava
Abstract— This paper presents basic reliability evaluation
techniques needed to evaluate the reliability of distribution
systems which are applied in distribution system planning and
operation. In this paper we consider six different alternatives and
examined on distribution system. Basically the reliability study
can also help to predict the reliability performance of the system
after quantifying the impact of adding new components to the
system. The number and locations of new components needed to
improve the reliability indices to certain limits can be identified
and studied.
|
Download
|
5 |
Magarate mitchell’s “gone with
The wind”: a saga of lost love
And unhappy marriages
Laxmikant Tripathi, Dr.Karunesh Jha, Dr. M.K. Sinha and Roshan Lal Singh
Abstract-“Gone with the wind” is a romantic epic by
Margaret Mitchell. The novel depicts the story of
the America in the years of 1861-1864, the crucial
years of American civil war and the end of slavery
system when Abraham Lincoln was the president.
The clash was not between the whites and blacks
only but rather prominently it was between the
South and North America. The novel relates the
glory and beauty of life in the days before the
abolition of slavery system in the semi feudal
society in Georgia County that produced cotton
for business purpose and for sale. The influence of
power, position and most prominently of war can
be perceived clearly in the conjugal relations and
matrimony. However the universal theme of love
has been depicted in many hues and colors in the
novel. Almost all the characters lose their loved
ones. They miss so many things that they will have
to learn to live without. But the biggest loss for
them is that of their most beloved good old days
when life was charming with its slow beauty, sense
of security, gallantry and grace.
|
Download
|
6 |
Study of Physico-Chemical Parameters and Amphibia Fauna
(Anurans) Population of Bada Talab, Parasi at Rewa (M.P.)
Dr. Ashok Kumar Mishra, Dr. Pradeep Khampariya
Dr. Neelam Patel and Dr. Hemlata Patel
Abstract -Bada Talab, Parasi at Rewa district
were studied in the present study. The pollutants
and drastic environmental variation have also
adversely effected and changed water qualities
i.e. Temperature, hardness, turbidity, alkalinity,
pH. COD, BOD and DO etc. Aquatic life, thus,
also is affected. Changes in morphology of
amphibian, like- colour, pigmentation, length,
weight mass, etc. may occur. This cannot be
ignored that the afore-mention variation may be
responsible to develop new varieties or sub
species. Unfortunately, negligible work is done
in relation to amphibian fauna of the area in
recent-past. Though, appreciable limnological
work is done, yet the amphibian fauna remained
unexplored. The fauna study is of tremendous
significance in determining population density
and specific diversity and conservation of
ecosystem in Rewa District.
|
Download
|
7 |
45 nanometer innovative NMOS Low Pass Filter as
Sample and Hold Circuit
Abhishek Singh, Vipul Awasthi, Rohit Shrivastava
Abstract-Communication system is never implemented
without a low pass filter, especially at the receiver side.
In this research work, a low pass filter has been
introduced using NMOS. These filters are implemented
as basic sample and hold circuit. It also has application
in many devices such as rectifier, in Phase Locked Loop
for providing DC input to Voltage Controlled
Oscillator. The simulation has been performed using
Multisim and layout has been generated using
Microwind 3.1. The process technology that has been
introduced is 45 nanometer.
|
Download
|
8 |
Genuine Video Steganography Validation Using
Combined Comparable Wavelet Transforms
G S Siva Kumar, M Ravi Kumar
Abstract-With the raising robustness in the technology any
statistics can be extrapolated where they show disaster. One
such affliction of the enormously developed communication
system is hacking. This paper intends to propose the possible
methods for the Genuine video copyright validation using
Steganography, invisible watermarking technique and also
comparative analysis between different wavelet transforms.
The watermarked (N-1) th frame is segregated with
compressed sensing algorithm from the rest of the video and
the certification of pre-generated robust authentication is
carried on in to which watermarking bits are engraved with
the low frequency Daubechies transform. Simulation results
show that the algorithm has better detection ability and
detection accuracy than invertible semi-fragile watermarking
algorithm distinguishing compression from malicious
manipulation of the algorithm. Robust watermarks are
detectable even after some image processing operations has
been performed on the watermarked image such as image
scaling, bending, and cropping, and so on which is not shown
in the remaining two techniques of fragile and semi fragile
watermarking.
|
Download
|
9 |
CFD analysis of Fluid Flow in a capillary
tube using R-22 and R-12 Refrigerant
Pradeep Nagesh, Prashant Sharma
Abstract-In the past several years a number of new
alternative refrigerant have been discovered to replace
the existing refrigerants used in refrigerating
equipment for improvement of performance. In order
to study these refrigerants extensively an in-depth
knowledge of their single-phase heat transfer
characteristics, thermodynamic properties as well as
simulation analysis is needed. This paper provides an
analysis which has been conducted on single phase
flow for alternative refrigerants, addresses a number
of relations for determining the thermo dynamic
properties of these alternative refrigerants with
computational fluid analysis using software likewise
ANSYS CFX ; and discusses their sensitivity to
uncertainty. Finally, an overview of some of the current
research that has been conducted on various
enhancements and refrigerants are provided as well.
Present paper gives a brief study about Validation and
comparison of the performance of refrigerant coil
using R22 and R12 was done using experimental and
CFD through ANSYS CFX. For this geometry is
modelled in 3D in Autodesk inventor.
|
Download
|
10 |
Tongue driven speaking wheel chair with wireless Device control
Sowmya. N, Saranya. T, Geetha.SU
Abstract─The "Tongue Drive" system is a tongueoperated
device has been developed that emulate a
computer mouse assistive technology developed for
people with severe disability with head movements,
cursor movements in these devices to control their
environment. The tongue is considered an are
controlled by tracking an infrared beam emitted or
excellent appendage in severely disabled people for
operating reflected from a transmitter or reflector
attached to the user's an assistive device. Tongue Drive
consists of an array of Hall- glasses, cap, or headband
Tilt sensors and video effect magnetic sensors mounted
on a dental retainer on the based computer interfaces
that can track a facial feature have outer side of the
teeth to measure the magnetic field generated also been
implemented. One limitation of these by a small
permanent magnet secured on the tongue. The devices
is that only those people whose head movement is sensor
signals are transmitted across a wireless link and .not
inhibited may avail of the technology. Another
limitation processed to control the movements of a
cursor on a computer is that the user's head should
always be in positions within screen or to operate a
powered wheelchair, a phone, or other that the heads or
example the controller equipment. The principal
advantage of this technology is the note device sensors
for example the possibility of capturing a large variety
of tongue movements by may not be accessible when the
user lying in bed or not processing a combination of
sensor outputs. This would sit in front of a computer.
To Provide the user with a smooth proportional
control as another category of computer access
systems operate by opposed to a switch based
on/off control that is the basis of tracking eye
movement from come reflections and most
existing technologies. We modeled the effects of
position. We built eye means. A man has a
prototype system using off-the-shelf components
and tested it the eye movement and major
limitation and successfully by developing a
graphical user interface (GUI) in they affect the
users' eyesight by requiring extra eye Lab VIEW
environment. A small battery powered wireless
movements that can interfere with users' normal
visual mouthpiece with no external component are
under development. Activities such as reading,
writing, and watching.
|
Download
|
11 |
Reducing energy consumption and independent task oriented
Scheduling approach for virtualized clouds
G.Tharanya, G.Vijayasekaran, R.Rajakumar
Abstract -Reducing energy consumption is a
major design constraint for modern
heterogeneous computing systems to minimize
electricity cost, improve system reliability and
protect environment. Conventional energyefficient
scheduling strategies developed on
these systems do not sufficiently exploit the
system elasticity and adaptability for maximum
energy savings, and do not simultaneously take
account of user expected finish time. In this
paper, we develop a novel scheduling strategy
rolling-horizon scheduling architecture for realtime
task scheduling in virtualized clouds. Then
a task-oriented energy consumption model is
given and analyzed. Based on our scheduling
architecture, we develop a novel energy-aware
scheduling algorithm named EARH for realtime,
aperiodic, independent tasks. The EARH
employs a rolling-horizon optimization policy
and can also be extended to integrate other
energy-aware scheduling algorithms.
Furthermore, we propose two strategies in
terms of resource scaling up and scaling down to
make a good trade-off between task’s
schedulability and energy conservation.
Extensive simulation experiments injecting
random synthetic tasks as well as tasks following
the last version of the Google cloud trace logs
are conducted to validate the superiority of our
EARH by comparing it with some baselines. The
experimental results improve the scheduling
quality and effectively enhance the system
elasticity.
|
Download
|
12 |
Influence of stack material and buffer volume on pressure amplitude on a standing wave thermoacoustic
prime mover
Swetha .G. N, Dr. Nagaraja. N
Abstract-An experimental investigation on standing wave thermoacoustic prime mover (SWTAPM) was carried out using brass screen mesh punching as a stack and heat exchanger matrix due to its small pore size. Investigation is to study the pressure amplitude for basic model with varying buffer volume for different operating pressure and compare with DeltaEc results. Maximum pressure amplitude was recorded for buffer space length 250mm at 12 bar as 1.985bar, using nitrogen as a working gas.
|
Download
|
13 |
Life Span Improvement of Aircraft’s Wing Box through Displacement, Stress and Vibration Analysis
DeepRani.K, Dr.S.SambuPrasad, D.J.Johnson
Abstract—This project deals with the displacement and vibration analysis of aircraft wing box. The aim of the project is to find the suitable material to improve the strength of aircraft wing box. By using Pro-E crio 1.0 2Ddrawings are drafted and further analysis is carried out by using ANSYS 11.0. During the flight aircraft wings experience so many forces due to drag, gravitation, and some disturbances like vibrations and fuel load. The strength and life span of the air wing depends on these forces. So to increase the life span and strength of the wing box, we replace the existing materials with high strength materials. Displacement and vibration analysis is done on the aircraft wing box both in static and dynamic conditions. Analysis is conducted when the fuel tank is completely filled with fuel and using five materials i.e., Wrought aluminium alloy 2014, Wrought aluminium alloy 2124, Wrought aluminium-magnesium alloy 5052, Wrought aluminium-magnesium-silicon alloy 6061, Wrought aluminium-zinc-magnesium alloy 7075.
|
Download
|
14 |
Double Input Z-Source DC-DC Converter Fed
with Separately Excited DC Motor
Shobhan babu.B, B.Sreenu
Abstract— The Z-source converter employs a unique
impedance network (or circuit) to couple the converter
main circuit to the power source, thus providing unique
features that cannot be obtained in the traditional
voltage-source and current-source converters where a
capacitor and inductor are used, respectively. The Zsource
converter overcomes the conceptual and
theoretical barriers and limitations of the traditional
voltage-source converter and current-source converter
and provides a novel power conversion concept.
The project deals with double input z-source dc-dc
converter fed with separately excited dc motor. The
proposed converter, the input dc voltage can be boosted
and also input dc sources can deliver power to the load
individually or simultaneously, so combination of a
battery with one of the new energy sources such as solar
array, wind turbine or fuel cell can be used as input
sources. Different states of double input Z-source dc-dc
converter are analyzed, steady state operation of
converter is explained and modeling of separately
excited dc motor is explained in detail. The simulation
is done using MATLAB/SIMLINK. Finally, the
simulation results are presented to confirm the
theoretical analysis.
|
Download
|
15 |
A Study On Congestion Control Techniques In Wireless Multimedia Sensor Networks
: A Survey
R.Sangeetha, M.Balasubramani
Abstract— In recent years, sensor nodes are capable of capturing multimedia content and this information is used for developing real time applications for wireless multimedia sensor networks. Congestion is one of the challenging problem of wireless multimedia sensor networks which reduces energy efficiency compared to traditional wireless sensor networks. While transmitting the high quantity of multimedia contents like audio, video etc, congestion occurs which degrades the performance of the network.This paper provides a survey on congestion problems that occurs during multimedia transmission over wireless multimedia sensor networks. The various routing strategies for congestion control are examined and the different techniques and strategies used for controlling congestion are also discussed.
|
Download
|
16 |
A Survey on IVR Based Human Computer
Interaction for Blind People Using Normal Keyboard
A.Venkatesh, S.K.V.Jayakumar, K.Shanmugapriyan
Abstract—In this paper we describe about the
technologies that can adapt advantages of the IVR systems to
access the personal computer by visually impaired person.Here
we utilize the emerging technologies of CHI (Computer-Human-
Interaction) to provide a virtual interface for the completely
blind people to control and perform some operations on their
PC.Our aim is to collaborate the techniques followed by the IVR
systems along with the methods which enables the visually
challenged people to access the computer like a normal user
without any special training which normally they need in other
methods.
|
Download
|
17 |
Design and Implementation of Maximized Efficiency and Power
Factor of Electronic Ballast for Fluorescent Lighting Application
C. Sowmiya, S. Rajeshwari, S. Dhanalakshmi
Abstract- Electronic Ballast is used for the Compact fluorescent
lamp (CFL).The present work focus on development of
Electronic Ballast having almost unity power factor (UPF)
improved power quality. The electronic ballast consists of a PFC
(power factor corrected) Boost converter, which operates in
discontinuous conduction mode (DCM), and a high frequency
DC-AC inverter. It overcomes the drawback of operating the
boost converter in open loop by operating the boost converter in
closed loop to provide constant power to the load within in the
specified ratings irrespective of the changes in the load. It uses
less number of inductors and capacitors which reduces the cost
of the total equipment, especially at high voltage ratings
capacitor and inductor cost becomes more and overcomes the
drawback of high cost at higher voltage ratings. HID lamps are
sensitive to voltage supply fluctuations producing an effect on
human visual perception, known as flicker. The fluctuations are
typically caused by the repetitive variation in the power
consumed by loads, or by the connection and disconnection of
significant loads.
|
Download
|
18 |
Pattern Recognition methods : A Review
K.Kaviarasan , R.Ramachandiran, Dr. K. Suresh Joseph
Abstract— Pattern Recognition is associate degree rising space that has been in varied analysis areas like a machine learning approach because of its wide unfold application. The appliance space includes medication, communications, automations, military intelligence, data processing, bioinformatics, document classification, speech recognition, business and plenty of others. In this review paper varied approaches of Pattern Recognition are bestowed and their pros-cons, application specific paradigm has been shown. On the idea of survey, pattern recognition techniques are classified into six components. These embody applied mathematics Techniques, Structural Techniques; guide Matching, Neural Network Approach, Fuzzy Model and Hybrid Models.
|
Download
|
19 |
DNA Comparison using Smith-Waterman Algorithm
Swaroopa S.Kulkarni, Dr. T.B. Mohite-Patil, Smita A.Patil, Megharani B. Chougule
Abstract-This paper gives a brief description of various papers
regarding concepts of DNA and DNAs comparison. The content
of these papers is summarised in the literature review. After that
the proposed system to overcome the drawbacks of previous
work is explained. The methodology of implementation is also
stated. The expected results will be tested by functional
simulation. Then the system will be realised using hardware.
|
Download
|
20 |
Qos based routing using admission
Control and load balancing in MANET
P.Deepika , S.Pushpalatha
Abstract- In the design of routing protocols and algorithms, the
knowledge of Quality of Service parameters such as residual
energy and bandwidth availability is required. In order to
support reliable routing, link stability of the nodes should also be
considered in the mobile environment. In this proposed system a
Multi-objective optimization based admission control in routing
is proposed to choose the desired path with sufficient energy,
bandwidth and link stability for real time data transmissions in
the Mobile Ad Hoc Network. Quality of service based admission
control leads to load balancing in the network because the
bandwidth is reserved before the data transmission. Hence there
is no chance of overloading in the network. Thus the proposed
system increases the throughput of the routing protocol.
|
Download
|
21 |
An improved joint statistical texture
Distinctiveness method for melanoma
Detection
S.Priyanka , S.K.Somasundaram
Abstract-Melanoma is a leading cause of cancer
mortality in most of the countries, resulting in one people
dying every 60 mins. Earlier day’s dermatology was user
to detect melanoma. Due to cost expense on screening
every patient, there is a need for an automated system to
assess a patients risk of melanoma using images of their
skin damages captured using a standard digital camera. In
existing systems, Segmentation algorithm using the
concept of TD is proposed. The entire framework is tested
by using the illumination corrected image as an input to
the texture based segmentation algorithm and compared
with the state-of-art algorithm. A novel improved
statistical texture based algorithm is proposed. A set of
training sets are learned from illumination corrected
image and calculate each distribution with the use of
improved joint statistical texture algorithm. It can be
tested by comparing lesion segmentation results and
melanoma classification result to result using other state of
art algorithm. The proposed algorithm can be used to find
the dense and stage of melanoma. The proposed
framework prunes to possess accuracy compared to all
other existing algorithms for melanoma detection.
|
Download
|
22 |
A Survey on Dynamic Channel Allocation in Mobile
Ad Hoc Network
Swati A. Patel, Dhaval Patel, Jignesh Patel
Abstract-Mobile Ad-hoc network (MANET) is a collection of
mobile nodes that are dynamically and arbitrarily located in
such a manner that interconnections between the nodes are
capable of changing on continuous basis. In this paper, different
channel allocation schemes are studied and how they are
implemented in mobile ad hoc network and cellular network. We
also studied all features of all channel allocation techniques. MHTRACE
and DCA-TRACE are two MAC layer protocols used
for fixed channel allocation (FCA) and dynamic channel
allocation (DCA) respectively. Dynamic channel allocation
scheme proves more advantageous over all other channel
allocation schemes. This technique also has some problems like
interference and inefficiency under heavy load. So we have to
improve these problems by using some mechanism. Spectrum
sensing is such kind of mechanism which we use for sensing the
free channels and reducing interference. So we can minimize the
level of interference between the channels.
|
Download
|
23 |
Emerging trends in banking technology
For financial inclusion in INDIA
Shabna Mol TP
Abstract-Technology is the key for financial
inclusion because that is the only way to
reduce the cost significantly and reach the
masses. Financial Inclusion is delivery of
basic banking services at an affordable
cost to the vast sections of disadvantaged
and low income groups. It includes access
to formal financial system such as
financial institutions, markets and
instruments, like savings, loans,
remittances and insurance services, at
affordable prices. The study identified the
major trends in banking technologies for
achieving inclusive growth .Technology
can play an important role in reducing
operating cost of providing banking
services, particularly in the rural and
unbanked areas. ATM, Mobile banking, Ebanking,
core banking solutions, Debit
card, Credit card, smart card and Tbanking
are the innovative and creative
banking technologies which are introduced
by the banks for including excluded people
into formal financial system.These
innovative technologies that could drive
the growth in financial inclusion and help
to achieving inclusive growth in the
country.
|
Download
|
24 |
Recent Developments of Solar cells with the
Application of Nanotechnology
K.Sivakumar, A.Thiyagarajan
Abstract— Power generation using photovoltaic (PV) systems is
being an important role among the renewable energy sources.
Presently, solar cells are not enough efficient and more
expensive. The efficiency of a PV system depends on the
absorbing capacity of the semiconductor. Nanotechnology can be
used to improve the efficiency of PV and the most assured
application of this reduction of manufacturing cost. The
absorption of PV can be increased by using stack of thin film
semiconductors with band gaps of different energies. By using
nanotechnology, solar cell would protect the environment with
low cost. This paper discusses an overview of the recent solar cell
technologies with the application of nanotechnology.
|
Download
|
25 |
A Novel Password Protected Key Exchange Protocol
Ravi Kiran Labhala, Santosh Naidu P
Abstract -Exchanging messages are more common thing lately. More number of people connects with each other in the network and (verifies someone's identity) each other while sharing their data. So users following so many rules of conduct for providing security to their data and the servers which they are storing their data. Due to all data storing in the single server, there is a chance to hack server data to be told (to people). This paper presents a solution to this problem such as (verifying someone's identity) process has to share by two servers. Client has to (verify someone's identity) in two servers like two step checking (for truth). It also includes (related to secret computer codes) ways of doing things to provide security for the data stored in the servers.
|
Download
|
26 |
Congestion Control Technique for Wireless Mesh
Networks
Bhavika Patel, Avani Jadeja
Abstract—Wireless Mesh Networks are believed to be a highly
promising technology and will play an increasingly important
role in future generation wireless mobile networks. The growing
popularity of wireless networks has led to cases of heavy
utilization and congestion. Since TCP alone does not explicitly
account for this congestion over such networks. So there are
different techniques are used for controlling the congestion in
Wireless Mesh Networks. Here in this paper we study about
different Congestion control techniques for Wireless Mesh
Networks.
|
Download
|
27 |
A Study to Enhance Total Productivity in Building
Industry by Material Waste Management
Sheikh Mohd. Tausif, Milind M. Darade
Abstract-In Construction industry Material, Manpower,
Money, and Machine play a crucial persona. They are
called 4Ms. There are many problems in the construction
industry to enhance total productivity such as material
waste. This paper delineate the consequence of research
studies carried out in Pune (Maharashtra) that investigated
the loss of total productivity due to happening of material
waste at five building sites located in different locations of
the Pune in Maharashtra. From this it is reasoned out that
total productivity can be enhanced by efficient & strict
control over supervision of site labours, supervisors and
flow of construction materials. Material waste has been
acknowledged as a major issue in the construction
industry. The main reasons for loss in total productivity is
the wastage and essential remedial measures for reducing
wastage and enhancing total productivity it are discussed in
this paper.
|
Download
|
28 |
Three Phase RV-Multilevel Inverter Fed Induction
Motor for PV systems
N Devipriya, Rama Kumar, G Madhu Sagarbabu
Abstract- A multilevel inverter can provide near sinusoidal
output waveform compared with two-level inverter. Though the
multilevel inverters hold attractive features, usage of more
switches in the conventional configuration poses a limitation to its
wide range application. Therefore a symmetric multilevel
inverter structure, Reversing Voltage Multilevel
Inverter(RVMLI) is introduced incorporating the least number
of unidirectional switches and gate trigger circuitry, thereby
compensating the disadvantages such as increased number of
components, complex pulse width modulation control
method,switching losses, size of inverter and installation cost.
This topology is well suited for drives and renewable energy
applications, hence PV based RVMLI is designed. The
performance quality in terms of THD of 9-level MLI is compared
with conventional cascaded MLI using carrier-based PWM (PDPWM)
technique. Finally in this paper the results of PV based 3-
Phase RVMLI fed induction motor are validated using
MATLAB/SIMULINK.
|
Download
|
29 |
A Survey on Web Usage Mining and Pattern
Discovery(A Review)
Neha Soni
Abstract—Data Mining is the process used by Companies to turn
raw data into useful information. Web usage mining is the
application of data mining techniques which is used by Business
or Website administrator to extract the usage patterns of user.
The Pattern information is extracted in the form of the web
server logs, proxy server logs, browser logs, user profiles..This
paper deals with web log record or user information and details
on the Pattern matching.
|
Download
|
30 |
Research on Functional Modification of Waterborne
Polyurethane Coatings
Zhong-feng Zhang, Zi-xiang Chen
Abstract—This paper provides an overview of characteristics
and applications of functional waterborne polyurethane
coatings, summarizes the functional modification of waterborne
polyurethane coatings, including flame retardant, waterproof,
corrosion protection, mildewproof and sterilization, anti-graffiti,
as well as transparency and heat insulation, describes future
development trend of nanomaterials applied to functional
modification of waterborne polyurethane coatings.
|
Download
|
31 |
Human Iris Recognition in Unconstrained
Environments
Parvin Shikalgar, Prasad Yadav, Hemant Pawar
Abstract—The demand for an accurate biometric system
that provides reliable identification and verification of
an individual has increased over the years. A biometric
system that provides reliable and accurate identification
of an individual is an iris recognition system. This
reliability is provided by unique patterns of human iris
which differs from person to person up to an extent of
identical twins having different iris patterns. This paper
presents a human iris recognition system in
unconstrained environments in which an effective
method is proposed for localization of iris inner and
outer boundaries. In this method, after pre-processing
stage, circular Hough transform was utilized for
localizing circular area of iris inner and outer
boundaries. Also, through applying linear Hough
transform, Localization of boundaries between upper
and lower eyelids occluding iris has been performed. In
comparison with available iris segmentation methods,
not only has the proposed method a relatively higher
precision, but also compares with popular available
methods in terms of processing time. Experimental
results on images available in CASIA database show
that the proposed method has an accuracy rate of
97.50%.
|
Download
|
32 |
Design of Novel 2D Gaussian Smoothing Filter
Dileep Singh Kushwah , Vijay Kumar Magraiya , Abhay Khedkar
Abstract—The complexity of today’s design is very high
which result in high power and delay in the present devices
and it is growing with increasing functionality on the same
device. In order to develop energy efficient designs, the
complexity of design has to be reduced which is a very
challenging task. There are several applications where the
approximate results are acceptable such as image/video
processing. We can leverage this relaxation on the accuracy to
reduce the complexity of the designs. In this paper, we
propose a novel 2D Gaussian smoothing filter which provides
approximate result at very high speed than the convention
Gaussian smoothing filter for these applications. The
proposed Novel 2D Gaussian smoothing filter provides
improvement in delay, power and area at the cost of small loss
in accuracy. Simulation result shows improvement in delay,
power and area by 2.26%, 3.34%, and 5%, respectively, over
existing approximate Gaussian smoothing filter.
|
Download
|
33 |
Proofs For Data Integrity In Cloud Storage
Kanmani.P, Anusha.S
Abstract—Cloud computing provides the genuine solution
to the rising storage costs of IT Enterprises. Enterprises
and individual users find it difficult to frequently update
their hardware due to increasing costs of data storage and
rapid increase in data rate. Data outsourcing to the cloud
also helps in reducing the maintenance apart from
reduction of storage costs. Cloud storage moves the user’s
data to large data centres that are remotely located, on
which user does not have any control. However, this
unique feature of the cloud poses many new security
challenges which need to be clearly understood and
resolved. One of the important concerns is data integrity
as the data is physically not accessible to the user the cloud
should provide a way for the user to check if the integrity
of his data is maintained or is compromised. In this paper
a scheme is provided to obtain a proof of data integrity in
the cloud which the customer can employ to check the
correctness of his data in the cloud. This proof can be
agreed upon by both the cloud and the customer and can
be incorporated in the Service level agreement (SLA).
|
Download
|
34 |
Hierarchical segmentation of images using
Graph laplacian energy: a survey
P.Kavitha, S.Vinoth Kumar, S. Karthik
Abstract—Image Mining is the process of semi
automatically analyzing the large database to find
useful patterns. Image mining technology has been
considered an advanced field for discovering
information related to the images. The demand of
image mining increases as the need of image data
is growing day by day. There are many techniques
developed in the earlier researches and eventually
these techniques can reveal useful information
according to the human requirements, but Image
Mining still require more development especially
in the area of web images. Image mining task can
also be categorized into classification, clustering,
association rule mining, and characterization
based summarization. This paper presents a
survey on various image mining techniques.
|
Download
|
35 |
Tank Water Level Control System using
Radio Frequency Communication
M.Praveen Kumar, G.Mahesh
Abstract—Water scarcity is the serious issue in
major cities. It is a common problem which is
faced by every house owner, that when his tank is
empty he has to switch on the motor and switch
the motor off when it is full. Due to the busy life it
is common that the tank usually overflows without
notice. One has to keep on observing his tank
water level to switch off the motor once it is
switched on. And sometimes this also can happen
that the motor coil burns because of absence of
water in the sump. So these are the everyday
problem that motivated us in coming up with an
affordable, wireless automatic water level control
system that doesn’t need any attention once it is
installed. In this paper we have discussed about
design and implementation of water level control
system which is wireless, automatic, cost effective
and reliable. It uses two Radio Frequency
transceivers along with a controller each installed
at the tank and sump. Radio Frequency
transceivers are used for wireless communication.
It is completely automated with the help of a
micro controller. The system doesn’t need any
attention of the user unless the sump is empty.
Installation cost is reduced since the system is
wireless. It is reliable because it has no problems
arising after installation such as breakage of wire.
|
Download
|
36 |
Wireless Controlled Communication and
Control System for Limited Mobility
Individuals using Bluetooth Technology
M.Praveen Kumar, G.Mahesh
Abstract—Design improvements to a remotely
controlled system for patients with limited mobility
are described. This system provides communication
and control of the room environment with mouse
control that can be adapted to the functional need of
the user. Analysis is provided on the selection and
integration of components within the system as well as
an overview of the simulated access times for several
key components. Transition to an open source
Android operating system is discussed for long-term
use in the home environment. Prototype
configurations for use in the hospital and home
environment are introduced.
|
Download
|
37 |
Numerical Studies on the Effect of Span
wise Position of Maximum Blade Chord on
the Aerodynamic Performance of an MAV
Propeller
Sreenath.N, Mr.Kalyan Yadav.S, Mr.Subbaramu. S
Abstract—In recent times the aerospace industry has
taken increasing interest in micro air vehicle (MAV)
technology. Growing interest in micro-air-vehicles
has created the need for improved understanding of
the relevant aerodynamics. The very challenging task
is, design of propeller for low Reynolds number
applications with proper matching of propeller
characteristics with that of small, light weight electric
motors with appreciable increase in efficiency. The
flight regime of micro-aircraft poses numerous
challenges for aerodynamic analysis and design,
but little experimental or computational work exists
for aerodynamic surfaces operating at ultra-low
Reynolds numbers. This paper involves the
performance evaluation of a mav propeller through
cfd analysis. The steady state flow analysis was
carried out using the commercial cfd solver fluent14
for obtaining results, plots and contours. The cfd
results were validated using experimental values of
the literature. Later the baseline geometry of micro
propeller was modified by changing the position of
maximum chord in span wise position and then
compared in terms of efficiency, torque coefficient
and thrust coefficient against advance ratio with base
line.
|
Download
|
38 |
Improving Tracking Efficiency of Photovoltaic
System by Using Ant Colony and Particle Swarm
Optimization Algorithms
V. Nivetha, A.Elamathy, G.Vijayagowri
Abstract—there are some changes in temperature and
irradiation when operating under partial-shading conditions and
the power–voltage characteristics of photovoltaic panel (PV) have
a non-linear output. So, the MPPT system is needed to sample the
output of the cells and it will apply the proper resistance (load) to
obtain maximum power for any given environmental conditions.
A novel method is implemented to track the global MPP, which is
based on Ant Colony Optimization (ACO) combined with
Particle Swarm Optimization (PSO) that controlling a DC-DC
converter connected at the output of PV array, such that it
maintains a constant input-power load. This model indicates the
DC-DC converter is an interleaved boost converter topology
which will increase the efficiency and reduce the ripple factor
which is easily control and greater stability can be achieved. By
using this model we get very low conduction and switching losses
then switching frequency is improved and size of the system also
reduced. The proposed method has the advantage that it can be
applied in either standalone or grid-connected PV systems
comprising PV arrays with unknown electrical characteristics
and does not require knowledge about the PV modules
configuration.
|
Download
|
39 |
Image Morphing: A survey
Vimal Singh,Poonam Sharma
Abstract—Image morphing deals with the metamorphosis of
an image to another image. The metamorphosis generates a
sequence of in between images in which an image gradually
changes into another image over time. The idea is to get a
sequence of intermediate images which when put together
with the original images would represent the change from
one image to the other.The problem of image morphing is
basically to generate an in-between image from two given
images. A natural in-between image can be derived by
properly interpolating the positions of features between
two images and their shapes and colors. An image
morphing technique first establishes the correspondence of
features between two images. The correspondence is then
used to compute warps for the images so that the distorted
images match the positions and shapes of features. A crossdissolve
of colors at each pixel of the distorted images
finally gives an in-between image.
|
Download
|
40 |
Multiport DC-DC Interleaved Boost Converter Fed to Induction Motor
using Hybrid Different Capacities of PV/Battery Power System
A.Elamathy
Abstract—Contained a multiport DC-DC
converter fed to three phase induction
motor using by a Hybrid Distributed
Generation System (HDGS). The HDGS is
consists of two different capacities of
photovoltaic (PV) module and one battery
to supply a fixed power for driving a three
phase induction motor. Amultiport
interleaved DC boost converter utilizing
DG sources of HDGS in a unified structure
.In this structure, each switching cycle of
proposed interleaved boost converter is
divided into five switching periods that
introduce five different duty ratios.
Utilizing these duty ratios result in
regulating the PV/battery powers and
constant electrical power for the three
phase induction motor is achieved. Due to
constant the power three phase induction
motor will be able to run at its nominal
power in different environmental
conditions. Incremental conductance
algorithm (IC) has been used to regulate
the PI parameter of speed controller in
order to realize better dynamic response.
Reducing ripple content in multiport
converter interleaved switches is used. The
proposed system is suitable for application
of agricultural water pumping systems.
|
Download
|
41 |
Design and Implementation of Testable Reversible Sequential
Circuits and Garbage Output
M.Preetha, P.Amuthini
Abstract— The conservative reversible gates are used to
designed reversible sequential circuits. The sequential
circuits are flip flops and latches. The conservative logic
gates are Feynman, Toffoli, and Fredkin. the design of two
vectors testable sequential circuits based on conservative
logic gates. All sequential circuit based on conservative logic
gates can be tested for classical unidirectional stuck-at faults
using only two test vectors. The two test vectors are all 1s,
and all 0s. The designs of two vectors testable latches,
master-slave flip-flops and double edge triggered (DET) flipflops
are presented. We also showed the application of the
proposed approach toward 100% fault coverage for single
missing/additional cell defect in the quantum- dot cellular
automata (QCA) layout of the Fredkin gate. The
conservative logic gates are in terms of complexity, speed
and area.
|
Download
|
42 |
A Data Mining Approach for User Search
Goals with Hybrid Evolutionary Approach
S.L.M.Deepthi, R.G. Chaitanya Nath
Abstract-Search engine optimization is an interesting
research arena in the field of data search for retrieving
users desired results at the stroke of their keywords.
Understanding, satisfying and meeting the user search
goal for a specific query is a complicated task, as there
is surplus amount of related and unrelated data
available over the Internet. Therefore, In this paper, we
proposed an pragmatic model of search mechanism
with FP (Frequent Patterns) Tree for finding frequent
and sequential use of patterns (Urls) obtained from the
Click through rate and evolutionary algorithms for
prime results with efficient feedback sessions (based on
query clicks) which are obtained and simulated from
user click-through logs and can efficiently reflect the
information needs of users thus reducing the unrelevant
results for a specific search.
|
Download
|
43 |
Comparing Study of Transport Layer Protocols
SCTP with TCP and UDP
Pradip G. Vanparia , Dr. Yogesh. R. Ghodasara
Abstract-One of the main requirements of 4G systems is that
the users should not feel any difference between a wired and a
wireless network and they should have multiple options for
connectivity over heterogeneous networks. In other words, it
needs a new adaptive, reliable, and efficient TCP that is able to
fulfill these requirements. The direct approach to enhance the
performance of TCP for the new generation networks is to
modify the TCP itself because TCP still represents one of the
major causes of poor performance in a wireless environment.
The transport layer’s primary role is to provide endto-
end communications service between two or more
applications running on different hosts. The transport layer
can also perform sophisticated actions such as flow control,
error recovery, and reliable delivery, which might be necessary.
TCP (Transmission Control Protocol) has been
around for quite some time and it has provided us with the
protocol to move data from one point to another in our
computer networks. TCP is a connection-oriented protocol, a
connection can be made from client to server, and from then on
any data can be sent along that connection. Despite its success,
TCP also has many limitations.
UDP stands for User Datagram Protocol. It is a
minimal message-oriented transport layer protocol. It enables
two hosts to connect and send short messages to one another.
Unlike Transmission Control Protocol (TCP), it does not
guarantee that data is received or that it is received in the
order in which it was sent.
SCTP (Stream Control Transmission Protocol) does
everything that TCP does while adding new features that TCP
doesn’t have. SCTP is, in many ways, superior to TCP. SCTP
Stands for Stream Control Transmission Protocol. SCTP is
connection oriented protocol. But due to our long term use of
TCP, it is quite hard to transition to the superior one.
|
Download
|
44 |
A Survey Paper On Vertical Handoff Algorithm For
WLAN And 3G
Bindal Patel
Abstract-Communication services anywhere and anytime
is driving an accelerated technological development
towards the integration of various wireless access
technologies such as WLAN, 3G and etc. MTs (Mobile
Terminal) must be able to seamlessly transfer to the “best”
access link among all available candidates with no
perceivable interruption to an ongoing data, voice or video
conversation. Such ability to handover between
heterogeneous networks is referred to as vertical
handovers. VHD (Vertical Handoff Decision) algorithm
can be classified in to different four category 1) RSS
(Received Signal Strength) based 2) Freq. based 3) cost
based 4) combination. These algorithms need to be
designed to provide the required Quality of Service (QoS)
and different parameter to a wide range of applications
while allowing seamless roaming among a multitude of
access network technologies.
|
Download
|
45 |
An intelligent system for effective fire detection in
Video: an image processing approach
Saurabh Shrivastava, Prof. Shivam Khare, Prof. Richa shrivastava
Abstract-In this paper, we propose a
real-time fire-detector that combines
foreground object information with color
pixel statistics of fire. Simple adaptive
background model of the scene is
generated by using three Gaussian
distributions, where each distribution
corresponds to the pixel statistics in the
respective color channel. The foreground
information is extracted by using
adaptive background subtraction
algorithm, and then verified by the
statistical fire color model to determine
whether the detected foreground object is
a fire candidate or not. A generic fire
color model is constructed by statistical
analysis of the sample images containing
fire pixels. The first contribution of the
paper is the application of real-time
adaptive background subtraction method
that aids the segmentation of the fire
candidate pixels from the background.
The second contribution is the use of a
generic statistical model for refined firepixel
classification. The two processes are
combined to form the fire detection
system and applied for the detection of
fire in the consecutive frames of video
sequences.
|
Download
|
46 |
PAPR Reduction techniques for OFDM systems
Prof. Dhruv Thakur, Senior Prof. Manish Saxena, Pravina Suryavanshi
Abstract-OFDM is very popular technique for huge data
transmission but the major limitation is PAPR (Peak to average
power ratio). Peak-to-Average Power Ratio (PAPR) is an
important variable for the evaluation of orthogonal frequency
division multiplexing (OFDM) signals in wireless network.
OFDM is used in parallel transmission which split the overall
bandwidth into subcarriers. This paper presented an overview of
PAPR reduction techniques which are different from each other.
|
Download
|
47 |
Qr code watermarking algorithm
Based on wavelet transform
P.Sunil Kumar, G.Reddi Basha, T.Lalith Kumar
Abstract-In the digital world copyright protection and
authentication have become more significant; in order to
achieve this digital different watermarking techniques are
introduced for the security. We propose an algorithm in
wavelet domain using wavelet transformation for a
digital invisible watermarking is to embedded into a QR
code image. In our method we embed a binary image logo
considered as watermark embedded into one of selected
wavelet sub band. The experimental results show that our
method has more robustness to attacks in different
considerations and it can achieve a viable copyright
protection and authentication.
|
Download
|
48 |
Automation of Assembly Modelling Systems with
IoT and Cloud Computing
Rajkumar.S, Raseena.A.K
Abstract-BUSINESS markets have been globalized, and interand
intra enterprises connections become forcefully attached.
Within an enterprise, the departments like assembly,
manufacturing, and marketing work concurrently to optimize
products and manufacturing processes at the system level.
Outside an enterprise, inter-enterprise collaborations aggregate
all possible resources to make composite products. After the
technologies of personal computers and the Internet, Internet of
Things is the latest information technology that is systematically
changing business paradigms. Many manufacturing paradigms,
such as agile manufacturing and sustainable manufacturing,
have been projected to meet these challenges. The functioning of
a new paradigm relies on the infrastructure of information
technology. IoT’s influence in the manufacturing sector has yet
been fully look at. Existing computer aided software tools
complexity, dynamics, and uncertainties in their applications of
contemporary enterprises. To attain this aim, the development of
manufacturing system paradigms to identify the requirements of
decision support systems in dynamic and dispersed
environments. The present progress in IT overviews the next
generation manufacturing paradigms and the relation of IT
infrastructure and ESs is explored to spot the technological gaps
in adopting IoT as an IT infrastructure of ESs. The acceptance of
IoT and cloud computing in enterprise systems would overcome
the complexity of existing model. IoT and cloud computing are
planned to help a conventional assembly modeling system change
into a complex system, which is able to deal with difficulty and
changes routinely. To accomplish this goal, an assembly
modeling system is automated, and the planned system include
innovations like the modularized architecture to make the system
robust, reliable, flexible, and expandable, the integrated objectoriented
templates to make easy interfaces and reuses of system
components and the automated algorithms to get back relational
assembly matrices for assembly planning.
|
Download
|
49 |
A Mahalanobis Distance Approach To Record De-Duplication
V.Rhytthika
Abstract-Nowadays, performance of data mining is depends on the data and data mining functions. Various problems occur due to duplication and error in the data and it affect the mining quality. The main objective of this paper is to improve the quality of the database for any kind of DBMS where it increases the performance of data mining operations. Earlier approaches discussed in the literature surveyed to provide solution for anomaly detection and error correction in a DBMS. In this paper data duplication is to find and remove using the TPR-[True Positive Ratio], Error in data is to find and rectify using the FNR – [False Negative Ratio] obtained from Mahalanobis Distance Method.
|
Download
|
50 |
An Efficient Secured Data Acquisition and hand
over scheme in service oriented VANET
P.Sathya, S.Pushpalatha
Abstract-Vehicular ad hoc networking is an important
component of Transportation Systems. Vehicular Ad hoc
Networks (VANETs) which comprises of vehicles like cars as
their mobile communication points used in MANET to produce a
mobile network. It enables vehicular communication using Road
Side Units (RSU). However, a peculiar case of VANETs endures
service oriented VANET include various services like internet
access, video streaming, etc. communication over service oriented
VANET publically accessible so there is need to maintain
confidentiality and integrity of data over service oriented
VANET without affecting the system performance. So we
proposed a framework for the secure and efficient data
acquisition in VANET. It encrypts each and every packet sent
over the network using the different packet key and HARDY
algorithm for packet key generation. The generation of packet
key may affect the system in certain scenarios like heavy traffic.
The session key is used in proposed approach with HARDY for
encrypting data sent over the network. Thus the key generation
time will decrease and increase the system performance. The
proposed system performance is evaluated using the ns2
software. We are comparing its feasibility and efficiency to
another system.
|
Download
|
51 |
A Study of Variation of the Probability of M/D/c
Deterministic Queueing Model
Tabi Nandan Joshi
Abstract- Study a variation of the probability of M/D/c
queueing model in which service time of customers is
deterministic. The number of server channel modified depending
on the length of queue. Specifically, apart from the regular
number of server, we can increase the number of server. The
model represents situations such as when the system requires a
new server depending on the length of the queue can be provided,
so that the waiting time can be reduce.
|
Download
|
53 |
Evaluation of Diabetic Macular Edema From
Color Retinal Images
Haris Naveena.C, S.Dhanapriya, M.Muruganandam
Abstract- Diabetic Macular Edema (DME) is a retinal health
disease which is caused due to the diabetis and leads to
irreversible vision loss. For the detection and classification of
DME severity from color fundus images a two-stage
methodology is proposed in this paper. DME detection is
carried out via a supervised learning approach using the
normal fundus images. To capture the global characteristics of
the fundus images a feature extraction technique is introduced
and discriminate the normal from DME images. Disease
severity is assessed using a rotational asymmetry metric by
examining the symmetry of macular region. The performance
of the proposed methodology and features are evaluated
against several publicly available datasets. The detection
performance has a sensitivity of 100% with specificity between
74% and 90%. For severe cases the DME is detected with a
sensitivity of 100% and specificity of 97%. The severity
classification accuracy is 81% for the moderate case and 100%
for severe cases. These results establish the effectiveness of the
proposed solution.
|
Download
|