IJAIR- Volume 3 Issue 12 (December 2014)

 


Sr/No/ Title Pdf
1 Survey On Crop Iris Image From Facial Image
R.ArunaRani, D.M.D.Preethi

Abstract —Iris authentication is one of the developing research fields in the biometrics. An efficient algorithm is designed to automatically segment the iris from the facial image. Iris segmentation is an essential module in iris recognition because it defines the effective image region used for subsequent processing such as feature extraction. Traditional iris segmentation methods often involve an exhaustive search of a large parameter space, which is time consuming and sensitive to noise. The features are perfectly extracted from eye image using the feature extraction techniques in order to remove the noisy data’s from the extracted image. Then the extracted features are given to the classifier. Later on this work will be helps to identify an individual by comparing the feature obtained from the feature extraction algorithm with the previously stored feature by producing a similarity score. This score will be indicating the degree of similarity between a pair of biometrics data under consideration. Depending on degree of similarity, individual can be identified.

Download
2 Impedance source of five level Cascaded multilel inverter
A. Suresh Kumar , A.Raviprasad

Abstract—This paper deals with simulation of impedance source H-Bridge five level inverter. The impedance network in the cascaded multilevel inverter circuit will perform buck/boost operation. This impedance network reduces one stage (buck-boost) of power conversion system. Using impedance source in multilevel inverter there is no problem of shoot through. Using Multilevel inverter topology the voltage stress across switching devices is reduced and the overall harmonics profile is improved do to multilevel output voltage. Multilevel inverter topology have an alternative to the normal two level inverters, especially in high power application do to above advantages. There are several multilevel inverter topologies but the best topology is cascaded Multilevel Inverter. such as simple circuit layout, less components count and low THD level in the out.

Download
3 Reliability Assessment of Radial Distribution Systems with Distributed Generation
Imran Mohmmed, Ch.Bharghav

Abstract—Reliability assessment is of primary importance in designing and planning distribution systems that operate in an economical manner with minimal interruption of customer loads. The power system especially at the distribution level is prone to failures and disturbances due to weather related issues and human errors. Having distributed generation (DG) as a backup source ensures the reliability of electric power supply. Therefore, distributed generation is expected to play a key role in the residential, commercial and industrial sectors of the power system. In this paper, the value of DG installed as a backup generator is quantified in terms of its contribution to the reliability improvement of a residential distribution network. The impact of adding one DG to each feeder of the system, as well as the impact of placing DG at various distance plus the amount of DG installed are presented.

Download
4 Reliability Assessment of Radial Distribution System by Using Analytical Methods
B.venu, C.Bhargava

Abstract— This paper presents basic reliability evaluation techniques needed to evaluate the reliability of distribution systems which are applied in distribution system planning and operation. In this paper we consider six different alternatives and examined on distribution system. Basically the reliability study can also help to predict the reliability performance of the system after quantifying the impact of adding new components to the system. The number and locations of new components needed to improve the reliability indices to certain limits can be identified and studied.


Download
5 Magarate mitchell’s “gone with The wind”: a saga of lost love And unhappy marriages
Laxmikant Tripathi, Dr.Karunesh Jha, Dr. M.K. Sinha and Roshan Lal Singh

Abstract-“Gone with the wind” is a romantic epic by Margaret Mitchell. The novel depicts the story of the America in the years of 1861-1864, the crucial years of American civil war and the end of slavery system when Abraham Lincoln was the president. The clash was not between the whites and blacks only but rather prominently it was between the South and North America. The novel relates the glory and beauty of life in the days before the abolition of slavery system in the semi feudal society in Georgia County that produced cotton for business purpose and for sale. The influence of power, position and most prominently of war can be perceived clearly in the conjugal relations and matrimony. However the universal theme of love has been depicted in many hues and colors in the novel. Almost all the characters lose their loved ones. They miss so many things that they will have to learn to live without. But the biggest loss for them is that of their most beloved good old days when life was charming with its slow beauty, sense of security, gallantry and grace.

Download
6 Study of Physico-Chemical Parameters and Amphibia Fauna (Anurans) Population of Bada Talab, Parasi at Rewa (M.P.)
Dr. Ashok Kumar Mishra, Dr. Pradeep Khampariya Dr. Neelam Patel and Dr. Hemlata Patel

Abstract -Bada Talab, Parasi at Rewa district were studied in the present study. The pollutants and drastic environmental variation have also adversely effected and changed water qualities i.e. Temperature, hardness, turbidity, alkalinity, pH. COD, BOD and DO etc. Aquatic life, thus, also is affected. Changes in morphology of amphibian, like- colour, pigmentation, length, weight mass, etc. may occur. This cannot be ignored that the afore-mention variation may be responsible to develop new varieties or sub species. Unfortunately, negligible work is done in relation to amphibian fauna of the area in recent-past. Though, appreciable limnological work is done, yet the amphibian fauna remained unexplored. The fauna study is of tremendous significance in determining population density and specific diversity and conservation of ecosystem in Rewa District.

Download
7 45 nanometer innovative NMOS Low Pass Filter as Sample and Hold Circuit
Abhishek Singh, Vipul Awasthi, Rohit Shrivastava

Abstract-Communication system is never implemented without a low pass filter, especially at the receiver side. In this research work, a low pass filter has been introduced using NMOS. These filters are implemented as basic sample and hold circuit. It also has application in many devices such as rectifier, in Phase Locked Loop for providing DC input to Voltage Controlled Oscillator. The simulation has been performed using Multisim and layout has been generated using Microwind 3.1. The process technology that has been introduced is 45 nanometer.

Download
8 Genuine Video Steganography Validation Using Combined Comparable Wavelet Transforms
G S Siva Kumar, M Ravi Kumar

Abstract-With the raising robustness in the technology any statistics can be extrapolated where they show disaster. One such affliction of the enormously developed communication system is hacking. This paper intends to propose the possible methods for the Genuine video copyright validation using Steganography, invisible watermarking technique and also comparative analysis between different wavelet transforms. The watermarked (N-1) th frame is segregated with compressed sensing algorithm from the rest of the video and the certification of pre-generated robust authentication is carried on in to which watermarking bits are engraved with the low frequency Daubechies transform. Simulation results show that the algorithm has better detection ability and detection accuracy than invertible semi-fragile watermarking algorithm distinguishing compression from malicious manipulation of the algorithm. Robust watermarks are detectable even after some image processing operations has been performed on the watermarked image such as image scaling, bending, and cropping, and so on which is not shown in the remaining two techniques of fragile and semi fragile watermarking.

Download
9 CFD analysis of Fluid Flow in a capillary tube using R-22 and R-12 Refrigerant
Pradeep Nagesh, Prashant Sharma

Abstract-In the past several years a number of new alternative refrigerant have been discovered to replace the existing refrigerants used in refrigerating equipment for improvement of performance. In order to study these refrigerants extensively an in-depth knowledge of their single-phase heat transfer characteristics, thermodynamic properties as well as simulation analysis is needed. This paper provides an analysis which has been conducted on single phase flow for alternative refrigerants, addresses a number of relations for determining the thermo dynamic properties of these alternative refrigerants with computational fluid analysis using software likewise ANSYS CFX ; and discusses their sensitivity to uncertainty. Finally, an overview of some of the current research that has been conducted on various enhancements and refrigerants are provided as well. Present paper gives a brief study about Validation and comparison of the performance of refrigerant coil using R22 and R12 was done using experimental and CFD through ANSYS CFX. For this geometry is modelled in 3D in Autodesk inventor.

Download
10 Tongue driven speaking wheel chair with wireless Device control
Sowmya. N, Saranya. T, Geetha.SU

Abstract─The "Tongue Drive" system is a tongueoperated device has been developed that emulate a computer mouse assistive technology developed for people with severe disability with head movements, cursor movements in these devices to control their environment. The tongue is considered an are controlled by tracking an infrared beam emitted or excellent appendage in severely disabled people for operating reflected from a transmitter or reflector attached to the user's an assistive device. Tongue Drive consists of an array of Hall- glasses, cap, or headband Tilt sensors and video effect magnetic sensors mounted on a dental retainer on the based computer interfaces that can track a facial feature have outer side of the teeth to measure the magnetic field generated also been implemented. One limitation of these by a small permanent magnet secured on the tongue. The devices is that only those people whose head movement is sensor signals are transmitted across a wireless link and .not inhibited may avail of the technology. Another limitation processed to control the movements of a cursor on a computer is that the user's head should always be in positions within screen or to operate a powered wheelchair, a phone, or other that the heads or example the controller equipment. The principal advantage of this technology is the note device sensors for example the possibility of capturing a large variety of tongue movements by may not be accessible when the user lying in bed or not processing a combination of sensor outputs. This would sit in front of a computer. To Provide the user with a smooth proportional control as another category of computer access systems operate by opposed to a switch based on/off control that is the basis of tracking eye movement from come reflections and most existing technologies. We modeled the effects of position. We built eye means. A man has a prototype system using off-the-shelf components and tested it the eye movement and major limitation and successfully by developing a graphical user interface (GUI) in they affect the users' eyesight by requiring extra eye Lab VIEW environment. A small battery powered wireless movements that can interfere with users' normal visual mouthpiece with no external component are under development. Activities such as reading, writing, and watching.

Download
11 Reducing energy consumption and independent task oriented Scheduling approach for virtualized clouds
G.Tharanya, G.Vijayasekaran, R.Rajakumar

Abstract -Reducing energy consumption is a major design constraint for modern heterogeneous computing systems to minimize electricity cost, improve system reliability and protect environment. Conventional energyefficient scheduling strategies developed on these systems do not sufficiently exploit the system elasticity and adaptability for maximum energy savings, and do not simultaneously take account of user expected finish time. In this paper, we develop a novel scheduling strategy rolling-horizon scheduling architecture for realtime task scheduling in virtualized clouds. Then a task-oriented energy consumption model is given and analyzed. Based on our scheduling architecture, we develop a novel energy-aware scheduling algorithm named EARH for realtime, aperiodic, independent tasks. The EARH employs a rolling-horizon optimization policy and can also be extended to integrate other energy-aware scheduling algorithms. Furthermore, we propose two strategies in terms of resource scaling up and scaling down to make a good trade-off between task’s schedulability and energy conservation. Extensive simulation experiments injecting random synthetic tasks as well as tasks following the last version of the Google cloud trace logs are conducted to validate the superiority of our EARH by comparing it with some baselines. The experimental results improve the scheduling quality and effectively enhance the system elasticity.

Download
12 Influence of stack material and buffer volume on pressure amplitude on a standing wave thermoacoustic prime mover
Swetha .G. N, Dr. Nagaraja. N

Abstract-An experimental investigation on standing wave thermoacoustic prime mover (SWTAPM) was carried out using brass screen mesh punching as a stack and heat exchanger matrix due to its small pore size. Investigation is to study the pressure amplitude for basic model with varying buffer volume for different operating pressure and compare with DeltaEc results. Maximum pressure amplitude was recorded for buffer space length 250mm at 12 bar as 1.985bar, using nitrogen as a working gas.

Download
13 Life Span Improvement of Aircraft’s Wing Box through Displacement, Stress and Vibration Analysis
DeepRani.K, Dr.S.SambuPrasad, D.J.Johnson

Abstract—This project deals with the displacement and vibration analysis of aircraft wing box. The aim of the project is to find the suitable material to improve the strength of aircraft wing box. By using Pro-E crio 1.0 2Ddrawings are drafted and further analysis is carried out by using ANSYS 11.0. During the flight aircraft wings experience so many forces due to drag, gravitation, and some disturbances like vibrations and fuel load. The strength and life span of the air wing depends on these forces. So to increase the life span and strength of the wing box, we replace the existing materials with high strength materials. Displacement and vibration analysis is done on the aircraft wing box both in static and dynamic conditions. Analysis is conducted when the fuel tank is completely filled with fuel and using five materials i.e., Wrought aluminium alloy 2014, Wrought aluminium alloy 2124, Wrought aluminium-magnesium alloy 5052, Wrought aluminium-magnesium-silicon alloy 6061, Wrought aluminium-zinc-magnesium alloy 7075.

Download
14 Double Input Z-Source DC-DC Converter Fed with Separately Excited DC Motor
Shobhan babu.B, B.Sreenu

Abstract— The Z-source converter employs a unique impedance network (or circuit) to couple the converter main circuit to the power source, thus providing unique features that cannot be obtained in the traditional voltage-source and current-source converters where a capacitor and inductor are used, respectively. The Zsource converter overcomes the conceptual and theoretical barriers and limitations of the traditional voltage-source converter and current-source converter and provides a novel power conversion concept. The project deals with double input z-source dc-dc converter fed with separately excited dc motor. The proposed converter, the input dc voltage can be boosted and also input dc sources can deliver power to the load individually or simultaneously, so combination of a battery with one of the new energy sources such as solar array, wind turbine or fuel cell can be used as input sources. Different states of double input Z-source dc-dc converter are analyzed, steady state operation of converter is explained and modeling of separately excited dc motor is explained in detail. The simulation is done using MATLAB/SIMLINK. Finally, the simulation results are presented to confirm the theoretical analysis.

Download
15 A Study On Congestion Control Techniques In Wireless Multimedia Sensor Networks : A Survey
R.Sangeetha, M.Balasubramani

Abstract— In recent years, sensor nodes are capable of capturing multimedia content and this information is used for developing real time applications for wireless multimedia sensor networks. Congestion is one of the challenging problem of wireless multimedia sensor networks which reduces energy efficiency compared to traditional wireless sensor networks. While transmitting the high quantity of multimedia contents like audio, video etc, congestion occurs which degrades the performance of the network.This paper provides a survey on congestion problems that occurs during multimedia transmission over wireless multimedia sensor networks. The various routing strategies for congestion control are examined and the different techniques and strategies used for controlling congestion are also discussed.

Download
16 A Survey on IVR Based Human Computer Interaction for Blind People Using Normal Keyboard
A.Venkatesh, S.K.V.Jayakumar, K.Shanmugapriyan

Abstract—In this paper we describe about the technologies that can adapt advantages of the IVR systems to access the personal computer by visually impaired person.Here we utilize the emerging technologies of CHI (Computer-Human- Interaction) to provide a virtual interface for the completely blind people to control and perform some operations on their PC.Our aim is to collaborate the techniques followed by the IVR systems along with the methods which enables the visually challenged people to access the computer like a normal user without any special training which normally they need in other methods.

Download
17 Design and Implementation of Maximized Efficiency and Power Factor of Electronic Ballast for Fluorescent Lighting Application
C. Sowmiya, S. Rajeshwari, S. Dhanalakshmi

Abstract- Electronic Ballast is used for the Compact fluorescent lamp (CFL).The present work focus on development of Electronic Ballast having almost unity power factor (UPF) improved power quality. The electronic ballast consists of a PFC (power factor corrected) Boost converter, which operates in discontinuous conduction mode (DCM), and a high frequency DC-AC inverter. It overcomes the drawback of operating the boost converter in open loop by operating the boost converter in closed loop to provide constant power to the load within in the specified ratings irrespective of the changes in the load. It uses less number of inductors and capacitors which reduces the cost of the total equipment, especially at high voltage ratings capacitor and inductor cost becomes more and overcomes the drawback of high cost at higher voltage ratings. HID lamps are sensitive to voltage supply fluctuations producing an effect on human visual perception, known as flicker. The fluctuations are typically caused by the repetitive variation in the power consumed by loads, or by the connection and disconnection of significant loads.

Download
18 Pattern Recognition methods : A Review
K.Kaviarasan , R.Ramachandiran, Dr. K. Suresh Joseph

Abstract— Pattern Recognition is associate degree rising space that has been in varied analysis areas like a machine learning approach because of its wide unfold application. The appliance space includes medication, communications, automations, military intelligence, data processing, bioinformatics, document classification, speech recognition, business and plenty of others. In this review paper varied approaches of Pattern Recognition are bestowed and their pros-cons, application specific paradigm has been shown. On the idea of survey, pattern recognition techniques are classified into six components. These embody applied mathematics Techniques, Structural Techniques; guide Matching, Neural Network Approach, Fuzzy Model and Hybrid Models.

Download
19 DNA Comparison using Smith-Waterman Algorithm
Swaroopa S.Kulkarni, Dr. T.B. Mohite-Patil, Smita A.Patil, Megharani B. Chougule

Abstract-This paper gives a brief description of various papers regarding concepts of DNA and DNAs comparison. The content of these papers is summarised in the literature review. After that the proposed system to overcome the drawbacks of previous work is explained. The methodology of implementation is also stated. The expected results will be tested by functional simulation. Then the system will be realised using hardware.

Download
20 Qos based routing using admission Control and load balancing in MANET
P.Deepika , S.Pushpalatha

Abstract- In the design of routing protocols and algorithms, the knowledge of Quality of Service parameters such as residual energy and bandwidth availability is required. In order to support reliable routing, link stability of the nodes should also be considered in the mobile environment. In this proposed system a Multi-objective optimization based admission control in routing is proposed to choose the desired path with sufficient energy, bandwidth and link stability for real time data transmissions in the Mobile Ad Hoc Network. Quality of service based admission control leads to load balancing in the network because the bandwidth is reserved before the data transmission. Hence there is no chance of overloading in the network. Thus the proposed system increases the throughput of the routing protocol.

Download
21 An improved joint statistical texture Distinctiveness method for melanoma Detection
S.Priyanka , S.K.Somasundaram

Abstract-Melanoma is a leading cause of cancer mortality in most of the countries, resulting in one people dying every 60 mins. Earlier day’s dermatology was user to detect melanoma. Due to cost expense on screening every patient, there is a need for an automated system to assess a patients risk of melanoma using images of their skin damages captured using a standard digital camera. In existing systems, Segmentation algorithm using the concept of TD is proposed. The entire framework is tested by using the illumination corrected image as an input to the texture based segmentation algorithm and compared with the state-of-art algorithm. A novel improved statistical texture based algorithm is proposed. A set of training sets are learned from illumination corrected image and calculate each distribution with the use of improved joint statistical texture algorithm. It can be tested by comparing lesion segmentation results and melanoma classification result to result using other state of art algorithm. The proposed algorithm can be used to find the dense and stage of melanoma. The proposed framework prunes to possess accuracy compared to all other existing algorithms for melanoma detection.

Download
22 A Survey on Dynamic Channel Allocation in Mobile Ad Hoc Network
Swati A. Patel, Dhaval Patel, Jignesh Patel

Abstract-Mobile Ad-hoc network (MANET) is a collection of mobile nodes that are dynamically and arbitrarily located in such a manner that interconnections between the nodes are capable of changing on continuous basis. In this paper, different channel allocation schemes are studied and how they are implemented in mobile ad hoc network and cellular network. We also studied all features of all channel allocation techniques. MHTRACE and DCA-TRACE are two MAC layer protocols used for fixed channel allocation (FCA) and dynamic channel allocation (DCA) respectively. Dynamic channel allocation scheme proves more advantageous over all other channel allocation schemes. This technique also has some problems like interference and inefficiency under heavy load. So we have to improve these problems by using some mechanism. Spectrum sensing is such kind of mechanism which we use for sensing the free channels and reducing interference. So we can minimize the level of interference between the channels.

Download
23 Emerging trends in banking technology For financial inclusion in INDIA
Shabna Mol TP

Abstract-Technology is the key for financial inclusion because that is the only way to reduce the cost significantly and reach the masses. Financial Inclusion is delivery of basic banking services at an affordable cost to the vast sections of disadvantaged and low income groups. It includes access to formal financial system such as financial institutions, markets and instruments, like savings, loans, remittances and insurance services, at affordable prices. The study identified the major trends in banking technologies for achieving inclusive growth .Technology can play an important role in reducing operating cost of providing banking services, particularly in the rural and unbanked areas. ATM, Mobile banking, Ebanking, core banking solutions, Debit card, Credit card, smart card and Tbanking are the innovative and creative banking technologies which are introduced by the banks for including excluded people into formal financial system.These innovative technologies that could drive the growth in financial inclusion and help to achieving inclusive growth in the country.

Download
24 Recent Developments of Solar cells with the Application of Nanotechnology
K.Sivakumar, A.Thiyagarajan

Abstract— Power generation using photovoltaic (PV) systems is being an important role among the renewable energy sources. Presently, solar cells are not enough efficient and more expensive. The efficiency of a PV system depends on the absorbing capacity of the semiconductor. Nanotechnology can be used to improve the efficiency of PV and the most assured application of this reduction of manufacturing cost. The absorption of PV can be increased by using stack of thin film semiconductors with band gaps of different energies. By using nanotechnology, solar cell would protect the environment with low cost. This paper discusses an overview of the recent solar cell technologies with the application of nanotechnology.

Download
25 A Novel Password Protected Key Exchange Protocol
Ravi Kiran Labhala, Santosh Naidu P

Abstract -Exchanging messages are more common thing lately. More number of people connects with each other in the network and (verifies someone's identity) each other while sharing their data. So users following so many rules of conduct for providing security to their data and the servers which they are storing their data. Due to all data storing in the single server, there is a chance to hack server data to be told (to people). This paper presents a solution to this problem such as (verifying someone's identity) process has to share by two servers. Client has to (verify someone's identity) in two servers like two step checking (for truth). It also includes (related to secret computer codes) ways of doing things to provide security for the data stored in the servers.

Download
26 Congestion Control Technique for Wireless Mesh Networks
Bhavika Patel, Avani Jadeja

Abstract—Wireless Mesh Networks are believed to be a highly promising technology and will play an increasingly important role in future generation wireless mobile networks. The growing popularity of wireless networks has led to cases of heavy utilization and congestion. Since TCP alone does not explicitly account for this congestion over such networks. So there are different techniques are used for controlling the congestion in Wireless Mesh Networks. Here in this paper we study about different Congestion control techniques for Wireless Mesh Networks.

Download
27 A Study to Enhance Total Productivity in Building Industry by Material Waste Management
Sheikh Mohd. Tausif, Milind M. Darade

Abstract-In Construction industry Material, Manpower, Money, and Machine play a crucial persona. They are called 4Ms. There are many problems in the construction industry to enhance total productivity such as material waste. This paper delineate the consequence of research studies carried out in Pune (Maharashtra) that investigated the loss of total productivity due to happening of material waste at five building sites located in different locations of the Pune in Maharashtra. From this it is reasoned out that total productivity can be enhanced by efficient & strict control over supervision of site labours, supervisors and flow of construction materials. Material waste has been acknowledged as a major issue in the construction industry. The main reasons for loss in total productivity is the wastage and essential remedial measures for reducing wastage and enhancing total productivity it are discussed in this paper.

Download
28 Three Phase RV-Multilevel Inverter Fed Induction Motor for PV systems
N Devipriya, Rama Kumar, G Madhu Sagarbabu

Abstract- A multilevel inverter can provide near sinusoidal output waveform compared with two-level inverter. Though the multilevel inverters hold attractive features, usage of more switches in the conventional configuration poses a limitation to its wide range application. Therefore a symmetric multilevel inverter structure, Reversing Voltage Multilevel Inverter(RVMLI) is introduced incorporating the least number of unidirectional switches and gate trigger circuitry, thereby compensating the disadvantages such as increased number of components, complex pulse width modulation control method,switching losses, size of inverter and installation cost. This topology is well suited for drives and renewable energy applications, hence PV based RVMLI is designed. The performance quality in terms of THD of 9-level MLI is compared with conventional cascaded MLI using carrier-based PWM (PDPWM) technique. Finally in this paper the results of PV based 3- Phase RVMLI fed induction motor are validated using MATLAB/SIMULINK.

Download
29 A Survey on Web Usage Mining and Pattern Discovery(A Review)
Neha Soni

Abstract—Data Mining is the process used by Companies to turn raw data into useful information. Web usage mining is the application of data mining techniques which is used by Business or Website administrator to extract the usage patterns of user. The Pattern information is extracted in the form of the web server logs, proxy server logs, browser logs, user profiles..This paper deals with web log record or user information and details on the Pattern matching.

Download
30 Research on Functional Modification of Waterborne Polyurethane Coatings
Zhong-feng Zhang, Zi-xiang Chen

Abstract—This paper provides an overview of characteristics and applications of functional waterborne polyurethane coatings, summarizes the functional modification of waterborne polyurethane coatings, including flame retardant, waterproof, corrosion protection, mildewproof and sterilization, anti-graffiti, as well as transparency and heat insulation, describes future development trend of nanomaterials applied to functional modification of waterborne polyurethane coatings.

Download
31 Human Iris Recognition in Unconstrained Environments
Parvin Shikalgar, Prasad Yadav, Hemant Pawar

Abstract—The demand for an accurate biometric system that provides reliable identification and verification of an individual has increased over the years. A biometric system that provides reliable and accurate identification of an individual is an iris recognition system. This reliability is provided by unique patterns of human iris which differs from person to person up to an extent of identical twins having different iris patterns. This paper presents a human iris recognition system in unconstrained environments in which an effective method is proposed for localization of iris inner and outer boundaries. In this method, after pre-processing stage, circular Hough transform was utilized for localizing circular area of iris inner and outer boundaries. Also, through applying linear Hough transform, Localization of boundaries between upper and lower eyelids occluding iris has been performed. In comparison with available iris segmentation methods, not only has the proposed method a relatively higher precision, but also compares with popular available methods in terms of processing time. Experimental results on images available in CASIA database show that the proposed method has an accuracy rate of 97.50%.

Download
32 Design of Novel 2D Gaussian Smoothing Filter
Dileep Singh Kushwah , Vijay Kumar Magraiya , Abhay Khedkar

Abstract—The complexity of today’s design is very high which result in high power and delay in the present devices and it is growing with increasing functionality on the same device. In order to develop energy efficient designs, the complexity of design has to be reduced which is a very challenging task. There are several applications where the approximate results are acceptable such as image/video processing. We can leverage this relaxation on the accuracy to reduce the complexity of the designs. In this paper, we propose a novel 2D Gaussian smoothing filter which provides approximate result at very high speed than the convention Gaussian smoothing filter for these applications. The proposed Novel 2D Gaussian smoothing filter provides improvement in delay, power and area at the cost of small loss in accuracy. Simulation result shows improvement in delay, power and area by 2.26%, 3.34%, and 5%, respectively, over existing approximate Gaussian smoothing filter.

Download
33 Proofs For Data Integrity In Cloud Storage
Kanmani.P, Anusha.S

Abstract—Cloud computing provides the genuine solution to the rising storage costs of IT Enterprises. Enterprises and individual users find it difficult to frequently update their hardware due to increasing costs of data storage and rapid increase in data rate. Data outsourcing to the cloud also helps in reducing the maintenance apart from reduction of storage costs. Cloud storage moves the user’s data to large data centres that are remotely located, on which user does not have any control. However, this unique feature of the cloud poses many new security challenges which need to be clearly understood and resolved. One of the important concerns is data integrity as the data is physically not accessible to the user the cloud should provide a way for the user to check if the integrity of his data is maintained or is compromised. In this paper a scheme is provided to obtain a proof of data integrity in the cloud which the customer can employ to check the correctness of his data in the cloud. This proof can be agreed upon by both the cloud and the customer and can be incorporated in the Service level agreement (SLA).

Download
34 Hierarchical segmentation of images using Graph laplacian energy: a survey
P.Kavitha, S.Vinoth Kumar, S. Karthik

Abstract—Image Mining is the process of semi automatically analyzing the large database to find useful patterns. Image mining technology has been considered an advanced field for discovering information related to the images. The demand of image mining increases as the need of image data is growing day by day. There are many techniques developed in the earlier researches and eventually these techniques can reveal useful information according to the human requirements, but Image Mining still require more development especially in the area of web images. Image mining task can also be categorized into classification, clustering, association rule mining, and characterization based summarization. This paper presents a survey on various image mining techniques.

Download
35 Tank Water Level Control System using Radio Frequency Communication
M.Praveen Kumar, G.Mahesh

Abstract—Water scarcity is the serious issue in major cities. It is a common problem which is faced by every house owner, that when his tank is empty he has to switch on the motor and switch the motor off when it is full. Due to the busy life it is common that the tank usually overflows without notice. One has to keep on observing his tank water level to switch off the motor once it is switched on. And sometimes this also can happen that the motor coil burns because of absence of water in the sump. So these are the everyday problem that motivated us in coming up with an affordable, wireless automatic water level control system that doesn’t need any attention once it is installed. In this paper we have discussed about design and implementation of water level control system which is wireless, automatic, cost effective and reliable. It uses two Radio Frequency transceivers along with a controller each installed at the tank and sump. Radio Frequency transceivers are used for wireless communication. It is completely automated with the help of a micro controller. The system doesn’t need any attention of the user unless the sump is empty. Installation cost is reduced since the system is wireless. It is reliable because it has no problems arising after installation such as breakage of wire.

Download
36 Wireless Controlled Communication and Control System for Limited Mobility Individuals using Bluetooth Technology
M.Praveen Kumar, G.Mahesh

Abstract—Design improvements to a remotely controlled system for patients with limited mobility are described. This system provides communication and control of the room environment with mouse control that can be adapted to the functional need of the user. Analysis is provided on the selection and integration of components within the system as well as an overview of the simulated access times for several key components. Transition to an open source Android operating system is discussed for long-term use in the home environment. Prototype configurations for use in the hospital and home environment are introduced.

Download
37 Numerical Studies on the Effect of Span wise Position of Maximum Blade Chord on the Aerodynamic Performance of an MAV Propeller
Sreenath.N, Mr.Kalyan Yadav.S, Mr.Subbaramu. S

Abstract—In recent times the aerospace industry has taken increasing interest in micro air vehicle (MAV) technology. Growing interest in micro-air-vehicles has created the need for improved understanding of the relevant aerodynamics. The very challenging task is, design of propeller for low Reynolds number applications with proper matching of propeller characteristics with that of small, light weight electric motors with appreciable increase in efficiency. The flight regime of micro-aircraft poses numerous challenges for aerodynamic analysis and design, but little experimental or computational work exists for aerodynamic surfaces operating at ultra-low Reynolds numbers. This paper involves the performance evaluation of a mav propeller through cfd analysis. The steady state flow analysis was carried out using the commercial cfd solver fluent14 for obtaining results, plots and contours. The cfd results were validated using experimental values of the literature. Later the baseline geometry of micro propeller was modified by changing the position of maximum chord in span wise position and then compared in terms of efficiency, torque coefficient and thrust coefficient against advance ratio with base line.

Download
38 Improving Tracking Efficiency of Photovoltaic System by Using Ant Colony and Particle Swarm Optimization Algorithms
V. Nivetha, A.Elamathy, G.Vijayagowri

Abstract—there are some changes in temperature and irradiation when operating under partial-shading conditions and the power–voltage characteristics of photovoltaic panel (PV) have a non-linear output. So, the MPPT system is needed to sample the output of the cells and it will apply the proper resistance (load) to obtain maximum power for any given environmental conditions. A novel method is implemented to track the global MPP, which is based on Ant Colony Optimization (ACO) combined with Particle Swarm Optimization (PSO) that controlling a DC-DC converter connected at the output of PV array, such that it maintains a constant input-power load. This model indicates the DC-DC converter is an interleaved boost converter topology which will increase the efficiency and reduce the ripple factor which is easily control and greater stability can be achieved. By using this model we get very low conduction and switching losses then switching frequency is improved and size of the system also reduced. The proposed method has the advantage that it can be applied in either standalone or grid-connected PV systems comprising PV arrays with unknown electrical characteristics and does not require knowledge about the PV modules configuration.

Download
39 Image Morphing: A survey
Vimal Singh,Poonam Sharma

Abstract—Image morphing deals with the metamorphosis of an image to another image. The metamorphosis generates a sequence of in between images in which an image gradually changes into another image over time. The idea is to get a sequence of intermediate images which when put together with the original images would represent the change from one image to the other.The problem of image morphing is basically to generate an in-between image from two given images. A natural in-between image can be derived by properly interpolating the positions of features between two images and their shapes and colors. An image morphing technique first establishes the correspondence of features between two images. The correspondence is then used to compute warps for the images so that the distorted images match the positions and shapes of features. A crossdissolve of colors at each pixel of the distorted images finally gives an in-between image.

Download
40 Multiport DC-DC Interleaved Boost Converter Fed to Induction Motor using Hybrid Different Capacities of PV/Battery Power System
A.Elamathy

Abstract—Contained a multiport DC-DC converter fed to three phase induction motor using by a Hybrid Distributed Generation System (HDGS). The HDGS is consists of two different capacities of photovoltaic (PV) module and one battery to supply a fixed power for driving a three phase induction motor. Amultiport interleaved DC boost converter utilizing DG sources of HDGS in a unified structure .In this structure, each switching cycle of proposed interleaved boost converter is divided into five switching periods that introduce five different duty ratios. Utilizing these duty ratios result in regulating the PV/battery powers and constant electrical power for the three phase induction motor is achieved. Due to constant the power three phase induction motor will be able to run at its nominal power in different environmental conditions. Incremental conductance algorithm (IC) has been used to regulate the PI parameter of speed controller in order to realize better dynamic response. Reducing ripple content in multiport converter interleaved switches is used. The proposed system is suitable for application of agricultural water pumping systems.

Download
41 Design and Implementation of Testable Reversible Sequential Circuits and Garbage Output
M.Preetha, P.Amuthini

Abstract— The conservative reversible gates are used to designed reversible sequential circuits. The sequential circuits are flip flops and latches. The conservative logic gates are Feynman, Toffoli, and Fredkin. the design of two vectors testable sequential circuits based on conservative logic gates. All sequential circuit based on conservative logic gates can be tested for classical unidirectional stuck-at faults using only two test vectors. The two test vectors are all 1s, and all 0s. The designs of two vectors testable latches, master-slave flip-flops and double edge triggered (DET) flipflops are presented. We also showed the application of the proposed approach toward 100% fault coverage for single missing/additional cell defect in the quantum- dot cellular automata (QCA) layout of the Fredkin gate. The conservative logic gates are in terms of complexity, speed and area.

Download
42 A Data Mining Approach for User Search Goals with Hybrid Evolutionary Approach
S.L.M.Deepthi, R.G. Chaitanya Nath

Abstract-Search engine optimization is an interesting research arena in the field of data search for retrieving users desired results at the stroke of their keywords. Understanding, satisfying and meeting the user search goal for a specific query is a complicated task, as there is surplus amount of related and unrelated data available over the Internet. Therefore, In this paper, we proposed an pragmatic model of search mechanism with FP (Frequent Patterns) Tree for finding frequent and sequential use of patterns (Urls) obtained from the Click through rate and evolutionary algorithms for prime results with efficient feedback sessions (based on query clicks) which are obtained and simulated from user click-through logs and can efficiently reflect the information needs of users thus reducing the unrelevant results for a specific search.

Download
43 Comparing Study of Transport Layer Protocols SCTP with TCP and UDP
Pradip G. Vanparia , Dr. Yogesh. R. Ghodasara

Abstract-One of the main requirements of 4G systems is that the users should not feel any difference between a wired and a wireless network and they should have multiple options for connectivity over heterogeneous networks. In other words, it needs a new adaptive, reliable, and efficient TCP that is able to fulfill these requirements. The direct approach to enhance the performance of TCP for the new generation networks is to modify the TCP itself because TCP still represents one of the major causes of poor performance in a wireless environment. The transport layer’s primary role is to provide endto- end communications service between two or more applications running on different hosts. The transport layer can also perform sophisticated actions such as flow control, error recovery, and reliable delivery, which might be necessary. TCP (Transmission Control Protocol) has been around for quite some time and it has provided us with the protocol to move data from one point to another in our computer networks. TCP is a connection-oriented protocol, a connection can be made from client to server, and from then on any data can be sent along that connection. Despite its success, TCP also has many limitations. UDP stands for User Datagram Protocol. It is a minimal message-oriented transport layer protocol. It enables two hosts to connect and send short messages to one another. Unlike Transmission Control Protocol (TCP), it does not guarantee that data is received or that it is received in the order in which it was sent. SCTP (Stream Control Transmission Protocol) does everything that TCP does while adding new features that TCP doesn’t have. SCTP is, in many ways, superior to TCP. SCTP Stands for Stream Control Transmission Protocol. SCTP is connection oriented protocol. But due to our long term use of TCP, it is quite hard to transition to the superior one.

Download
44 A Survey Paper On Vertical Handoff Algorithm For WLAN And 3G
Bindal Patel

Abstract-Communication services anywhere and anytime is driving an accelerated technological development towards the integration of various wireless access technologies such as WLAN, 3G and etc. MTs (Mobile Terminal) must be able to seamlessly transfer to the “best” access link among all available candidates with no perceivable interruption to an ongoing data, voice or video conversation. Such ability to handover between heterogeneous networks is referred to as vertical handovers. VHD (Vertical Handoff Decision) algorithm can be classified in to different four category 1) RSS (Received Signal Strength) based 2) Freq. based 3) cost based 4) combination. These algorithms need to be designed to provide the required Quality of Service (QoS) and different parameter to a wide range of applications while allowing seamless roaming among a multitude of access network technologies.

Download
45 An intelligent system for effective fire detection in Video: an image processing approach
Saurabh Shrivastava, Prof. Shivam Khare, Prof. Richa shrivastava

Abstract-In this paper, we propose a real-time fire-detector that combines foreground object information with color pixel statistics of fire. Simple adaptive background model of the scene is generated by using three Gaussian distributions, where each distribution corresponds to the pixel statistics in the respective color channel. The foreground information is extracted by using adaptive background subtraction algorithm, and then verified by the statistical fire color model to determine whether the detected foreground object is a fire candidate or not. A generic fire color model is constructed by statistical analysis of the sample images containing fire pixels. The first contribution of the paper is the application of real-time adaptive background subtraction method that aids the segmentation of the fire candidate pixels from the background. The second contribution is the use of a generic statistical model for refined firepixel classification. The two processes are combined to form the fire detection system and applied for the detection of fire in the consecutive frames of video sequences.

Download
46 PAPR Reduction techniques for OFDM systems
Prof. Dhruv Thakur, Senior Prof. Manish Saxena, Pravina Suryavanshi

Abstract-OFDM is very popular technique for huge data transmission but the major limitation is PAPR (Peak to average power ratio). Peak-to-Average Power Ratio (PAPR) is an important variable for the evaluation of orthogonal frequency division multiplexing (OFDM) signals in wireless network. OFDM is used in parallel transmission which split the overall bandwidth into subcarriers. This paper presented an overview of PAPR reduction techniques which are different from each other.

Download
47 Qr code watermarking algorithm Based on wavelet transform
P.Sunil Kumar, G.Reddi Basha, T.Lalith Kumar

Abstract-In the digital world copyright protection and authentication have become more significant; in order to achieve this digital different watermarking techniques are introduced for the security. We propose an algorithm in wavelet domain using wavelet transformation for a digital invisible watermarking is to embedded into a QR code image. In our method we embed a binary image logo considered as watermark embedded into one of selected wavelet sub band. The experimental results show that our method has more robustness to attacks in different considerations and it can achieve a viable copyright protection and authentication.

Download
48 Automation of Assembly Modelling Systems with IoT and Cloud Computing
Rajkumar.S, Raseena.A.K

Abstract-BUSINESS markets have been globalized, and interand intra enterprises connections become forcefully attached. Within an enterprise, the departments like assembly, manufacturing, and marketing work concurrently to optimize products and manufacturing processes at the system level. Outside an enterprise, inter-enterprise collaborations aggregate all possible resources to make composite products. After the technologies of personal computers and the Internet, Internet of Things is the latest information technology that is systematically changing business paradigms. Many manufacturing paradigms, such as agile manufacturing and sustainable manufacturing, have been projected to meet these challenges. The functioning of a new paradigm relies on the infrastructure of information technology. IoT’s influence in the manufacturing sector has yet been fully look at. Existing computer aided software tools complexity, dynamics, and uncertainties in their applications of contemporary enterprises. To attain this aim, the development of manufacturing system paradigms to identify the requirements of decision support systems in dynamic and dispersed environments. The present progress in IT overviews the next generation manufacturing paradigms and the relation of IT infrastructure and ESs is explored to spot the technological gaps in adopting IoT as an IT infrastructure of ESs. The acceptance of IoT and cloud computing in enterprise systems would overcome the complexity of existing model. IoT and cloud computing are planned to help a conventional assembly modeling system change into a complex system, which is able to deal with difficulty and changes routinely. To accomplish this goal, an assembly modeling system is automated, and the planned system include innovations like the modularized architecture to make the system robust, reliable, flexible, and expandable, the integrated objectoriented templates to make easy interfaces and reuses of system components and the automated algorithms to get back relational assembly matrices for assembly planning.

Download
49 A Mahalanobis Distance Approach To Record De-Duplication
V.Rhytthika

Abstract-Nowadays, performance of data mining is depends on the data and data mining functions. Various problems occur due to duplication and error in the data and it affect the mining quality. The main objective of this paper is to improve the quality of the database for any kind of DBMS where it increases the performance of data mining operations. Earlier approaches discussed in the literature surveyed to provide solution for anomaly detection and error correction in a DBMS. In this paper data duplication is to find and remove using the TPR-[True Positive Ratio], Error in data is to find and rectify using the FNR – [False Negative Ratio] obtained from Mahalanobis Distance Method.

Download
50 An Efficient Secured Data Acquisition and hand over scheme in service oriented VANET
P.Sathya, S.Pushpalatha

Abstract-Vehicular ad hoc networking is an important component of Transportation Systems. Vehicular Ad hoc Networks (VANETs) which comprises of vehicles like cars as their mobile communication points used in MANET to produce a mobile network. It enables vehicular communication using Road Side Units (RSU). However, a peculiar case of VANETs endures service oriented VANET include various services like internet access, video streaming, etc. communication over service oriented VANET publically accessible so there is need to maintain confidentiality and integrity of data over service oriented VANET without affecting the system performance. So we proposed a framework for the secure and efficient data acquisition in VANET. It encrypts each and every packet sent over the network using the different packet key and HARDY algorithm for packet key generation. The generation of packet key may affect the system in certain scenarios like heavy traffic. The session key is used in proposed approach with HARDY for encrypting data sent over the network. Thus the key generation time will decrease and increase the system performance. The proposed system performance is evaluated using the ns2 software. We are comparing its feasibility and efficiency to another system.

Download
51 A Study of Variation of the Probability of M/D/c Deterministic Queueing Model
Tabi Nandan Joshi

Abstract- Study a variation of the probability of M/D/c queueing model in which service time of customers is deterministic. The number of server channel modified depending on the length of queue. Specifically, apart from the regular number of server, we can increase the number of server. The model represents situations such as when the system requires a new server depending on the length of the queue can be provided, so that the waiting time can be reduce.

Download
53 Evaluation of Diabetic Macular Edema From Color Retinal Images
Haris Naveena.C, S.Dhanapriya, M.Muruganandam

Abstract- Diabetic Macular Edema (DME) is a retinal health disease which is caused due to the diabetis and leads to irreversible vision loss. For the detection and classification of DME severity from color fundus images a two-stage methodology is proposed in this paper. DME detection is carried out via a supervised learning approach using the normal fundus images. To capture the global characteristics of the fundus images a feature extraction technique is introduced and discriminate the normal from DME images. Disease severity is assessed using a rotational asymmetry metric by examining the symmetry of macular region. The performance of the proposed methodology and features are evaluated against several publicly available datasets. The detection performance has a sensitivity of 100% with specificity between 74% and 90%. For severe cases the DME is detected with a sensitivity of 100% and specificity of 97%. The severity classification accuracy is 81% for the moderate case and 100% for severe cases. These results establish the effectiveness of the proposed solution.

Download