Sr/No/ |
Title |
Pdf |
1 |
Violence against women
Sonali Jhunjhunwala, Dr. Vijoy Kumar Singh
Abstract —Violence against women (abbreviated VAW) is,
collectively, violent acts that are primarily or exclusively
committed against women. Sometimes considered a hate crime,
this type of violence targets a specific group with the victim's
gender as a primary motive. This type of violence is gender-based,
meaning that the acts of violence are committed against women
expressly because they are women, or as a result of patriarchal
gender constructs. The UN Declaration on the Elimination of
Violence against Women states that:"violence against women is a
manifestation of historically unequal power relations between
men and women" and that "violence against women is one of the
crucial social mechanisms by which women are forced into a
subordinate position compared with men."Kofi Annan,
Secretary-General of the United Nations, declared in a 2006
report posted on the United Nations Development Fund for
Women (UNIFEM) website that:Violence against women and
girls is a problem of pandemic proportions. At least one out of
every three women around the world has been beaten, coerced
into sex, or otherwise abused in her lifetime with the abuser
usually someone known to her.Violence against women can fit
into several broad categories. These include violence carried out
by „individuals‟ as well as „states.‟ Some of the forms of violence
perpetrated by individuals are rape; domestic violence; sexual
harassment; coercive use of contraceptives; female infanticide;
prenatal sex selection; obstetric violence and mob violence; as
well as harmful customary or traditional practices such as honor
killings, dowry violence, and female genital mutilation, marriage
by abduction and forced marriage. Some forms of violence are
perpetrated or condoned by the state such as war rape; sexual
violence and sexual slavery during conflict; forced sterilization;
forced abortion; violence by the police and authoritative
personnel; stoning and flogging. Many forms of VAW, such as
trafficking in women and forced prostitution are often
perpetrated by organized criminal networks. The World Health
Organization (WHO), in its research on VAW, categorized it as
occurring through five stages of the life cycle: “1) pre-birth, 2)
infancy, 3) girlhood, 4) adolescence and adulthood and 5)
elderly”In recent years, there has been a trend of approaching
VAW at an international level, through instruments such as
conventions; or, in the European Union, through directives, such
as the directive against sexual harassment, and the directive
against human trafficking.
|
Download
|
2 |
Exploration of discrete information from Benchmarking
Perspective: Electronic Products Evaluation Approach
Bharti sahu, Divyanshu Rao, Ravi Mohan
Abstract—There are a number of kinds of electronic gadgets
existing in the world of gadgets for making the life of people
faster, rapid, simpler and quicker. Whenever we go to the
market we come across numerous types of newest gadgets of
different kinds and most of them are very positive, practical,
useful, productive and fruitful. The new gadgets keep
appearance to the market with latest and sophisticated
features every day in the market. In this paper we are
considering the case of selection of electronic gadget. The
important research field in decision science and operations
research is multiple attribute decision making commonly
called (MADM). The main intention of this paper is to expose
the utility of grey numbers. The case proposed here deals to
determine the preference of the electronic product in the
situation of various alternatives available or to choose the best
alternate in the multi criteria decision making platform with
the situation where the data is complex and difficult to assess
in term of quantity. A case study problem is revealed to show
advantages of the proposed model. Grey numbers
applications and uses have been suggested for finding the
optimum solution in this literature. RR model technique
based on grey numbers is used in this learning.
|
Download
|
3 |
Flow and Menace of E-Wastes and Their Adverse Implications
on Health and Environment
Bharti sahu, Divyanshu Rao, Ravi Mohan
Abstract—There has been increasing use and dependence on
electrical and electronic gadgets like mobile phone, personal
computers, laptops, server, data storage devices, photo
copying machines, TV (CRT/LED/LCD), washing machine,
refrigerators and air conditioners, etc. resulting into
generation of large quantities of E-waste. The high rates of
obsolescence of the above mentioned items coupled with
steady rise in the demand have also resulted in substantial
growth in e-waste generation. Individual demand for
electrical and electronic equipment is rising at a substantial
velocity across developing countries. Electronic wastes can
contain more than a thousand assorted substances, many of
which are fatal. These may be in form of heavy metals or
chemicals such as mercury, lead, cadmium, chromium,
magnetic properties and antimony (flame retardants),
including poly brominated biphenyls, polyvinyl chloride,
polychlorinated biphenyls, and polybrominated diphenyl
ethers. This paper have shown the empirical findings
regarding waste dumping, human health, impact of chemical
wastes and focuses on adopting a policy of Reduce –Reuse-
Recycle-Recover –Dispose during various phases of the life
cycle of the electronic instrument. The work reveled here tries
to communicate some facts and figures about the concerned ewastes.
The main objective of this study concentrates on
examining the effort applied to calculate generation and
collection of used electronics generated. This analysis provides
insights on the quantities of used electronics generated and
collected. The learning tries to frame and compute the harm
and damage shared to the environment by e-waste. This study
presses the urgent need for initiating the course of action to
tackle the Problems of the recycling and disposal of hazardous
e-waste. The key findings from this study depicts
introduction of recycling locator in the developing countries.
|
Download
|
4 |
Classification of Background Subtracted Videos Using
Neural Network-Learning Classifier
C.K.Bharathi, D.Suresh
Abstract—In this project we present the concept of effective
classification for background subtracted videos by using learning
classifier-feed forward neural network with back propagation to
conquer the open problem in the context of the complex
scenarios.eg:- while picturing the videos in some application like
cloudy (or) misty areas the object in video will be less clarity with
naked eye even after the background subtraction also. In context
of existing system the back ground subtraction is to apply the
video brick extraction at any location of the scene, which is in the
avi format. Next is to find the threshold value of bricks by using
spatial-temporal information of the video based on the intensity.
The threshold values separate the foreground and background of
the bricks by applying background subtraction. It will get rid of
the background of the each and every frame and finally run as
video. Here we proposed the effective classification for the output
video that has underwent by background subtraction & reveal
the type of the object more precisely then existing system by
using learning classifier–feed forward neural network with back
propagation.
|
Download
|
5 |
Survey of Load Balancing and Service Discovery for Mobile
Ad hoc Networks
V.Revathi, M. Buvana, R.Satheesh Kumar, K.Muthumayil
Abstract-Recently, Service Discovery protocols in MANET
have gained special attention from the research centers. In
existing method, Service discovery protocols in mobile
networks does not guarantee load balancing on routing paths
between service providers and service requesters. It does not
guarantee the performance attributes to service requesters and
service providers. It permit to satisfy some performance
attributes specified in client requests and to report on its
performance evaluation such as, Success rate, Connection rate,
Average response time, Bandwidth usage, Average load.
|
Download
|
6 |
Design of Tri-car
V. Subrahmanyam, Y. Venkateswara Rao, B. Anjani Kumar
Abstract -This is an attempt made to ease the task of internal
transportation of people like pilgrims, inspection teams, disabled
persons in public places like temples, parks, industries, airports,
hospitals etc. The tri-car to be designed is a concept vehicle
driven by hub motor placed in front wheel and is powered by
Lithium-ion battery. The vehicle is designed to be made with box
sections of mild steel and perforated GI sheets to make it lighter.
The vehicle is designed to carry three people.
|
Download
|
7 |
Design FIR digital filter Using Neural Network
Yogesh Babu Indoriya, Anil Mourya, Karuna Markam
Abstract-The paper presents the design of FIR filter using
FDA tool and compare different filter that is Bartlett
window, Chebyshev window and Kaiser window the using
algorithm that is feed-forward back propagation and feedforward
distributed time delay using neural network. As the
simulation results shows, the proposed neural based method
is capable of archiving a better performance for filter
design.
|
Download
|
8 |
Comparative Study of Noise Suppression in ECG Signal by
using different FIR Digital Filter
Anil Mourya, Arvind Ambey, R. P. Narwaria
Abstract-This paper deals with the application of the FIR digital
filter on the ECG signal. In this paper different FIR filters are
utilized. In this paper using ECG Arrhythmia data set from MITBIH
database.
|
Download
|
9 |
16 Bit×16 Bit multiprecision with operands scheduler
Rajarajeshwari.G, Praveenkumar.B, Anuinfancia.J
Abstract-The throughput of various applications such as
Fourier Transform (FT), discrete cosine transforms, digital
filtering and Digital` Signal Processing (DSPs) depends on
multiplier. Hence multipliers are the most crucial arithmetic
functional unit among these applications. If the multipliers are
too slow, the performance of entire circuits will be reduced. In
this paper we present a flexible multiprecision multiplier that
combines variable precision, Parallel Processing (PP), and
dedicated operand scheduling to provide optimum performance
for variety of operating conditions. All the building blocks such
as adders, multipliers, subtractors of proposed multiprecision
multiplier can either work as independent small precision
multiplier or work parallel to perform higher precision
multiplier. Finally the proposed flexible multiplier can further
benefit from an operand scheduler that rearranges input data,
hence reduce the number of transitions of the supply voltage and
minimize overall power consumption of the multiplier.
|
Download
|
10 |
Response Time Analysis of Mixed Messages in CAN
S. Arthy, M. Vanitha
Abstract─Controller Area Network (CAN) is a network
protocol that allows multiple processors in a system to
communicate efficiently with each other.
Microprocessors became small enough and powerful
enough to start appearing everywhere, not just inside
personal computers. A CAN system sends messages
using a serial bus network, with the individual nodes
(processors) in the network linked together in a daisy
chain. Every node in the system is equal to every other
node. Any processor can send a message to any other
processor, and if any processor fails, the other systems
in the machine will continue to work properly and
communicate with each other. In modern vehicle
technology CAN is used to reduce point to point wiring
harness for vehicle automation and for data
communication. To overcome the drawbacks of analog
vehicle driving interface, this paper presents the
development and implementation of a digital driving
system for a semi-autonomous vehicle to improve the
driver-vehicle interface. This offers increased flexibility
and expandability. This system uses sensors to measure
temperature, distance from the other car, presence of
alcohol in car, position monitoring, theft monitoring
and etc., and sends a warning signal to the driver if any
of the parameter goes out of range to avoid accidents. In
addition to this if accident occurs in any remote area
then using vibration sensor, accident is detected and
SMS is send immediately using GSM and preventing
him from potentially getting into a serious problems.
|
Download
|
11 |
Design for Test Ability in timely testing of VLSI circuits
S. Asvini, C.Nirmala
Abstract -Even though a circuit is designed error-free,
manufactured circuits may not function correctly. Since
the manufacturing process is not perfect, some defects
such as short-circuits, open-circuits, open
interconnections, pin shorts, etc., may be introduced.
Points out that the cost of detecting a faulty component
increases ten times at each step between prepackage
component test and system warranty repair. It is
important to identify a faulty component as early in the
manufacturing process as possible. Therefore, testing
has become a very important aspect of any VLSI
manufacturing system. Two main issues related to test
and security domains are scan-based attacks and misuse
of JTAG interface. Design for testability presents
effective and timely testing of VLSI circuits. The project
is to test the circuits after design and then reduce the
area, power, delay and security of misuse. BIST
architecture is used to test the circuits effectively
compared to scan based testing. In built-in self-test
(BIST), on-chip circuitry is added to generate test
vectors or analyze output responses or both. BIST is
usually performed using pseudorandom pattern
generators (PRPGs). Among the advantages of
pseudorandom BIST are: (1) the low cost compared to
testing from automatic test equipment (ATE). (2) The
speed of the test, which is much faster than when it is
applied from ATE. (3) The applicability of the test while
the circuit is in the field and (4) the potential for high
quality of test.
|
Download
|
12 |
A Survey of Clustering and Classification on Security in Data
Mining
Pradeep G, Arulprakash P, Kavitha G
Abstract-Data mining is the process that extracts classifies
andanalyzes valid and useful information from large
volumes of dataprovided by multiple sources. The data
mining has been widelyapplied into various areas, one of
which is to investigate potentialsecurity threats. In the
literature, various data mining techniquessuch as
classification and clustering have been proposed to
detectintrusions, DoS attacks, and malware. This paper
surveysdifferent data mining techniques applied to detect
securitythreats and analyzes their advantages and
disadvantages.Through comparison, we discuss open
research issues aboutsecurity
|
Download
|
13 |
Fuzzy Tree Structured Modeling Recommender system on
Business E-Services
G.MOHAMED AMEER
Abstract—In an existing proposals monitor information obtained
at, recommender systems use background data, such as historical
data consisting of ratings from users, and input data, such as
features of items or user ratings, to initiate a recommendation.
User preferences and item features have been represented as
fuzzy sets. Recommendations are made with incomplete and
uncertain information.
|
Download
|
14 |
Drift Control in High Rise Buildings
Awad Ravindra B, Prof. M.R.Wakchaure, Awad Sushma
Abstract— Drift is a dominant feature in High-Rise building due
to Lateral loads (i.e. wind or earthquake loads) are mainly responsible
for drift, which very often dictates the selection of
structural systems for high rise building. Now a day’s lot of research
work is going on in static nonlinear pushover analysis. In
present work, two multi storey buildings representing shear wall
frame structure as a Model M1 and Column Beam frame Structure
as a Model M2, both are fourteen storeys have been modeled
using software package ETABS and SAP2000 for earthquake
zone V in India. To study Drift demand based on analysis results
and compared in this results in conditions that two parameters(
i.e. wind and earthquake )satisfy for controlling Drift demand
within an allowable level are discussed.
|
Download
|
15 |
Real Time Monitoring For Drowsiness Detection
Using EEG System
E.SATHYA, G.RAJPRIYA
Abstract—Now a day’s driver drowsiness effect severe
accidents. Normally many factors are there for detecting
drowsiness such as analysis of physiological signals
Electroencephalogram (EEG), Electrocardiogram (ECG)
etc., Driver behavior monitoring. The reliable detection of
drowsiness is an important factor in this system. An
accurate Real time monitoring of driver’s drowsiness by
warning system to driver, is implemented in this paper.
Wireless and wearable EEG Dry electrode used for
recording EEG signal. If a person mentally sleeping with
eyes open for few seconds, then the level of brain signal will
get change than the normal level. EEG is used to detect the
abnormal conditions related to the electrical activities of the
brain. Eye blinking level can be monitoring by eye blink
sensor such as open or close status of eye. Object sensor
used for detecting any obstacles are there, in front of the
vehicle. Simulation result exposed in PROTEUS VSM
Software using PIC microcontroller. The signal values are
transmitted through ZigBee module. When implement,
monitoring the bio-signals and driver performance like
eyelid movement will increase the accuracy of drowsiness
detection system. These methods are very sufficient for this
drowsiness detection system.
|
Download
|
16 |
Maximizing Network Lifetime using
Energy-Efficient Methods with Modifiable
Sensing varieties in Wireless Sensor Networks
Subashini.S, Praveen Kumar
Abstract—We cram the aim of exposure problem for wireless
sensor networks where every sensor node is capable of regulating
its sensing sort. Our aspire is to amplify the network lifetime by
increasing the quantity of wrap sets as many as possible. A wrap
set is a split of all sensor nodes that can wrap each intention node.
As an alternative of maintenance of all the sensor nodes dynamic
at once, network lifetime can be extended by generating a number
of wrap sets that will examine the network sequentially. We
extend two polynomial time algorithms that utilize an efficient
contribution procedure on spherical lists of sensor nodes for
structure a diversity of wrap sets. Our proposed algorithms locate
greatest number of wrap sets and devour as low power as possible
for each sensor node. Our simulation results exhibit that the
future algorithms better existing MRSW [1] algorithm in terms of
number of wrap sets while conserving major amount of energy
among the sensor nodes.
|
Download
|
17 |
Design and implementation of Circularly
Polarized Square Loop- Antenna
Sanjay Kumar, S.Bashyam, E.Siva Kumar, Samar Jeet Shukla
Abstract-A circularly polarized (CP) square-loop antenna is
designed and discussed. It is shown that improved return loss and
voltage standing wave ratio (VSWR) can be achieved by adding a
parasitic loop inside the original loop. The accepted value of
return loss is less than -10dB and the range of voltage standing
wave ratio are 1 to 2. Antenna is fed by a microstrip transmission
line called microstrip line feed. Square – loop antenna are usually
used as linearly polarized antennas. Square-loop antenna can
also radiate a circularly polarized wave if a gap is introduced on
the loop.
|
Download
|
18 |
A Secure Scheme for Monitoring Safety in
Vehicular Adhoc Network
Anitha.N, Banumehala.R, Chrislin Reni.V.S, Devika.M
Abstract— Vehicle ad-hoc networks has significantly used
in automobiles for an effective communication with one
another. The de-centralized nature of this network
provides an extensive range of applications which
makes passenger safety and comfort. Providing security
in a physical environment is considered to be the main
issue to cope with. Vehicle-to-vehicle communication is
the wireless transmission of data between the vehicles.
It is more efficient and it enables 360 degree awareness
of the surrounding threats. To overcome this issue a
popular approach is recommended in VANET, is that
cars are connected together via V2V,which are able to
share data with one another, so that there is, less
possibility of collision and other mischievous behavior
i.e. drunken drive. Although there are many proposed
solutions for improving securities in VANET but
security still remains a delicate research subject. The
main objectives of this paper are to improve the
security issues in VANET.
|
Download
|
19 |
Confinement and the coordination for Acoustic
Movable Submarine Networks
T.Jennifer, P.Sudhandhira Devi, Mary Joseph, M.B.Prasanth Yokesh
Abstract-Submarine confinement is a key element in most
underwater communication application. Acoustic
communication of movable submarine networks face with
many unmatched inquisitive like long arch, high
communication power consumption and convergence mobility.
Unrushed signal enlargement allows multiple packets to
coordinate travel through the submarine channel, which is
harsh to improve the overall throughput. Since GPS signals are
highly extremely thin in water, accurate ranging based
techniques for localization has to be developed. Confinement
algorithm and Sequential algorithm for time-coordination and
localization in the underwater acoustic channel is made to
resolve the problem. Relying on the assumption that nodes are
equipped with self-navigation systems and that these systems
are accurate for use in short periods of time.
|
Download
|
20 |
Self-Defense for Fire Fighters using Automatic and Robust
Multilateral Breadcrumb System
SUVEDHA.K, ANAND JOSEPH DANIEL.D, KARTHICK.P, RAJINI GIRINATH.D
Abstract- This project describes the design, characteristics
and implementation of an automatic and robust multiuser
breadcrumb system for firefighter applications. A new reliability
model that consists of an optimized redundancy degree for
breadcrumbs, a decision support system for wireless link
estimation, a height effect solver to handle the gap in link quality
after breadcrumbs drop from the dispenser, and an adaptive
transmission power control to handle link quality variation
problems in harsh environments have been proposed.
|
Download
|
21 |
An Efficient Comparator Architecture Based Franklin Majority
Logic Technique
Saranya R, Thanga Selvi E
Abstract-A digital comparator or magnitude comparator is a
hardware electronic device that takes two numbers.
Comparators are used in the central processing units and
microcontrollers. Quantum dot cellular automata referred to
simply the high performance technology in digital circuits. In
general Regular comparators are optimaized based on the
majority gate process. This scheme designed to contraption in
QCA the novel equations proved. The design difficulty of the
comparators perceived is reported in terms of number of MGs
and inverters need in the general designs. To use the Franklin
logic in majority gate technique, thereby reduce the complexity
level of the comparator. the Franklin majority logic technique is
to reduce the gate pattern count in the majority gate. Franklin
logic is to optimize the general Boolean equation of the majority
gate logic. The QCA modules are designed using the Franklin
majority logic architecture, Which is developed in VHDL
language.
|
Download
|
22 |
Literature Review on Case study of Business Process
Reengineering
Ashok Jagtap, T Q Quazi
Abstract-The business Process reengineering is an tool to
achieve dramatic output for any business. The main focus is to
controlling of the process related with time, where time has been
more important element to control the process. This paper has
related to survey of a BPR tool used for dramatic changes in the
business.
|
Download
|
23 |
Wi-Fi Offloading Model for Increasing Per-User
throughput using MAPR Protocol in Heterogeneous
Networks
Thiyagarajan C, Balakrishnan G
Abstract-Now-a-days, internet services have become
typical through which people can able to adore anytime
and anywhere internet (broadband) wireless
communication services. With the growth of smart
phones, laptops and tablets, network traffic has
exponentially increased. Offloading the network traffic
through various other devices such as Wi-Fi access
points have been conceived to be frequent remedy for
this problem. Therefore, in this paper, we examine the
Wi-Fi Access Points (Wi-Fi AP) deployment in a
metropolitan network area for better offloading of Wi-
Fi network traffic and proposed a protocol named Multi
Access Point Routing (MAPR). MAPR increases the per
user throughput and network coverage as well. In
network simulation, we introduce offloading ratio, per
user throughput, network coverage that our proposed
algorithm can attain with multiple access points (APs).
The simulation results show that our proposed MAPR
protocol provides better performance when compared
to other Existing protocol in terms of increased per user
throughput and coverage.
|
Download
|
24 |
Auditing Cloud Consistency
Nireka C, Saraswathi M
Abstract— Cloud storage services are used throughout
worldwide. Cloud service provider (CSP) maintains data cloud
on CaaS model; it maintains multiple replicas for each data on
distributed servers. Here the drawback is that due to multiple
replication technique it does not provide strong consistency. We
use Consistency as a service (CaaS) model with large data cloud
and multiple audit cloud. In audit cloud we propose two level
auditing architecture with loosely synchronized clock.
In this paper, we propose an algorithm to reduce the violations
on the storage system. We finally propose a heuristic auditing
strategy (HAS) technique to avoid from violations and staleness.
Using real cloud deployment to verify the heuristic auditing
strategy (HAS).
|
Download
|
25 |
A New Hybrid PAPR Reduction Scheme Using Amplitude
Clipping and PTS
Akshay Gupta, Dr. Sarita Singh Bhadauria
Abstract -OFDM technique is comprehensively assumed in
varied modern way communication systems due to its high data
rate transmission capability and toughness to the multipath
blurring channel. One noteworthy detriment of the OFDM signal
is towering PAPR. Huge diversity of magnitude of OFDM signal
represents a major drawback for strengthening of signal in
mobile communication systems. This paper reveals a hybrid
PAPR lessening using PTS and amplitude clipping .This paper
identifies a thought regarding lessening of PAPR as far as its
CCDF.
|
Download
|
26 |
Automated Number Plate Recognition System
using MATLAB
A.Vijayalakshmi
Abstract—Number Plate Recognition finds a numerous
application such as paid parking airport, railway station
etc. By making the recognition automated, we can reduce
man power, time & cost and also we can increase
reliability and efficiency of the system. India we can
easily develop an automated number plate recognition
system for all weather conditions. It is intended to use
segmentation algorithms for locating number plate and
segment the character. It is intended to use pixel value
projection & number plate calibration and optical
character recognition as some of the tools to recognize
number plate.
|
Download
|
27 |
Virtualization of Applications and Automation of Services
in Cloud Environment
Geetha.B.G, Tamil Iniyan.S, Raguram.T.J, Santhiya.S
Abstract—The use of cloud computing has been increased
rapidly in modern technology. Cloud computing provides many
major benefits in terms of low cost, virtualization of resource and
accessibility of data. Ensuring the virtualization of resources is a
major factor in the cloud environment, as users often store
important information with cloud storage providers but these
providers may be untrusted. Due to the lack of trustiness among
the cloud provider we are going to build our own private cloud
environment. In this cloud environment we virtualize the
applications which are deployed in cloud server using Xen server.
Due to large number of concurrent user of cloud environment
which leads to failure in server. This failure is overcome by load
balancing concept.
|
Download
|
28 |
Metamaterial based Antenna for Performance
Enhancement and Bandwidth Improvement for WLAN
Application at 5.2 GHz Frequency
Hitesh Joshi, Vivek Bajpai, Umesh Barhadia
Abstract—Microstrip patch antennas are mostly known for
their versatility in terms of possible geometries that makes
them applicable for many different situations. The
lightweight construction and the suitability for integration
with microwave integrated circuits are two more of their
numerous advantages. Patch antenna has a narrow
bandwidth so it has a complexity in tunings, so there is a
requirement to increase the bandwidth of patch antenna and
increase directivity of antenna and reduces return loss by
new proposed triangular cut I shaped antenna which work
on 5.2GHz frequency. In This paper simple rectangular
microstrip patch antenna with DNG metamaterial to enhance
bandwidth 170.8 MHz at 5.2 GHz. Directivity of SRMPA is
7.17dbi and directivity of proposed antenna is 10.1dbi simple
rectangular microstrip patch antenna which works on IEEE
802.11b and IEEE 802.11g standard applications. This
antenna is mounted on rectangular patch with air gap to
enhance bandwidth for WLAN applications. Simulations are
completed utilizing 3D EM Simulator Computer Simulation
Technology Microwave Studio (CST-MWS). MATLAB is
used for the verification of Double Negative properties of the
proposed DNG structure.
|
Download
|
29 |
The Spectrum Handoff for Cognitive Radio Ad Hoc
Networks
Yuvaraj.T , Sangeetha.K.K
Abstract—In cognitive radio networks (CRN) unlicensed
users may observe heterogeneous spectrum availability. We
consider unlicensed users are not aware of network
topology, spectrum availability and time synchronization
information. Thus, it is extremely challenging that
broadcasts can be successfully conducted without knowing
the spectrum availability information in advance. In
addition, since broadcast collisions often lead to the waste of
network resources, they should be efficiently mitigated in
multi hop scenarios. QB2IC is proposed with the aim of
having a high success rate and short broadcast delay.
|
Download
|
30 |
Dynamic Key Generation and Prevent Link from
Adversary in Wireless Communication
M.SOWBHAKYAWATHI, P.KALYANASUNDARAM, Dr.T.GNANASEKARAN
Abstract—Integrating information network into power system for
vision of smart grid, but also introduces many security problems.
The presence of adversary is detected by the intrusion detection
system. The packets transmission is protected from it by
breaking the link in the network. The smart meter and the
control center are equipped with intrusion detection.
|
Download
|
31 |
Cluster Based Routing Protocol in Heterogeneous
Wireless Sensor Networks
G.V.M.Vasuki, M.RatnaVardhini, M.Aswini, K.Saranya, G.Pranathi
Abstract—Wireless Sensor Networks abide of hundreds
of tiny, inexpensive, ability accountable sensor nodes.
Acquisition is a arduous assignment in such ambiance
mainly due to the different constraints the wireless
sensor networks ache from. LEACH and PEGASIS
assumes a akin administration of sensor nodes in the
accustomed area. Leach’s Clustering advice algorithm
will ends up by allotment added array affiliate nodes
.This could accomplish array arch nodes a bound active
out of energy. PEAGSIS reduces activity burning if
compared to bleed but it will not advance the
arrangement lifetime .To Achieve a bigger able
arrangement by abbreviation activity burning and
convalescent arrangement lifetime we proposed
Clustering Based Acquisition Protocol. It is a LEACH
based acquisition agreement advised for assiduity
arrangement lifetime. In this Scheme, array based
acquisition agreement based aloft the LEACH
algorithm, balance activity of sensor nodes is advised to
abstain asymmetric activity burning of the sensor bulge
and to extend the all-embracing arrangement lifetime
after achievement degradation. To access the lifetime of
network, the proposed algorithm uses a anticipation
function.
|
Download
|
32 |
Enhancing Security and Privacy Protection in Information
Brokering In Distributed Database
Saradha.S, Balakrishnan G
Abstract—Integrated databases are the collection of
different kinds of databases; it allows several databases
to work as a single article and allows applications to
look at data in a more amalgamated way without
having to duplicate it. Here the components/systems
interact with each other in order to attain a common
goal. In droopily coupled user's liability is to create and
maintain the confederacy and there is no control
enforced by the federated system and its administrators.
The associations of these types of databases are done by
Information Brokering Systems (IBSs) via a brokering
overlay and the brokers have the responsibility to make
course-plotting decisions to direct client queries to the
requested data servers. The brokering overlay is the
responsibility for global resource management and
managing allocation of services. IBSs believe that
brokers are trusted and to limit the control and access
to host systems for the defense of transmitted data is
done only in server-side. But privacy of data location
and data consumer can still derived from metadata such
as query and access control rules exchanged within the
IBS, in this paper a PPIB emerge has been proposed to
preserve privacy of several persons routing decision
among a chosen set brokering servers in the IBS.
|
Download
|
33 |
Privacy Protection in Personalized Web Search Using
Exponential Ratio
Poornima S, Shunmugha vel V
Abstract—This paper presents a scalable way for users to
repeatedly build rich user profiles. These profiles
summarize a user’s welfare into a hierarchical
organization according to specific welfare. Two
parameters for specifying privacy requirements are
designed to help the user to choose the comfortable and
degree of detail of the profile in order that is exposed to
the search engine. Experiments showed that the user
profile improved search quality when compared to
regular MSN rankings. More outstandingly, results
verified our proposition that an important development
on search quality can be achieved by only sharing some
higher-level user profile information, which is
potentially less responsive than detailed personal
information.
|
Download
|
34 |
Predictive Analytics of a Large Scale Model Using
Computational Approach
Dr.S.Prabakaran,T.Soundarya
Abstract—This work presents a new predictive
analysis and suggests an automatic classification
approach which uses a new statistical model to
automatically predict the classification to the web
log events. This method uses Apriori algorithm for
generating frequent item sets, uses KNN clustering
approach for clustering frequent item sets and
implements SVM classification technique to
automatically predict the web log events.
|
Download
|
35 |
Variation of Static and Dynamic head at Different
Discharge using Venturimeter
Saiful Islam, Mohd Kafeel
Abstract—In this study, tests were performed to determine the
effects of Variation of Discharge on Static Head, Dynamic Head
as well as total head at different diameter of Venturimeter. The
results showed by Venturi meters validate Bernoulli’s Principle.
|
Download
|
36 |
A New Mathematical Model for Finding the Mean IGF-I
Concentrations in GHD Patients
Dinesh Kumar A, Vasuki M, Sanjoop Lal K, Pranav M K
Abstract—The purpose of the study was designed to
evaluate the effect of GH replacement on bone
mineralization in post pubertal GHD patients who had
been treated with GH until final height. The purpose of
this work was to evaluate, by using standard Brownian
motion process with sojourn times, mean IGF-I
concentrations in male and female GHD patients.
|
Download
|
37 |
Examination Anxiety among school Students in
Relation to their School Environment
Tina
Abstract—This study was conducted to evaluate
examination anxiety among school students in
relation to their school environment. The
objectives of the study were to study the
difference in examination anxiety of school
students in relation to different dimensions of
school environment & to study the relationship
between examination anxiety and school
environment. Descriptive survey method was
used in this study to obtain pertinent and precise
information. The sample of this study included
100 school students by using simple random
sampling from the district of Hoshiarpur. The
two standardized tools were used by the
investigator to evaluate the examination anxiety
among school students in relation to their school
environment. For the purpose of drawing out
the results the investigator used statistical
techniques like t- test, mean and correlation. The
conclusions of the study are there exists no
significant difference in examination anxiety of
school students receiving high and low creative
stimulation, there exists significant difference in
examination anxiety of school students receiving
high cognitive encouragement and less cognitive
encouragement, there exists no significant
difference in examination anxiety of school
students under high permissiveness and low
permissiveness, there exists no significant
difference in examination anxiety of school
students receiving high acceptance and low
acceptance, there exists no significant difference
in examination anxiety of highly rejected
students and students with low rejection, there
exists no significant difference in examination
anxiety of students under high control and low
control, there exists no significant relationship
between examination anxiety and school
environment.
|
Download
|
38 |
Design and development of Very High Secure
Encryption (VHSE) method for secure Communication
Tulika pandey, Devyanshu rao
Abstract—To enhance the security of user Signal
in the transmission, we present an adaptive and
dynamic data encryption method to encrypt
user signal in the devices itself. Firstly, the
adopted signal encryption algorithm is not static
and uniform. For each encryption, this
algorithm is adaptively and dynamically works
and develops encryption system. Basically the
work proposed a new method which is greatly
depends on the Digital Signal Processing and
method adopted use if FIR filters to develop
cipher signal, for secure signal communication it
is requires the cipher the signal and generate
ciphered signal with the help of key. The
measurement of encryption can be done by
Cipher observation of avalanche of output. The
proposed VHSE method is an appropriate
solution for highly secure with less hardware
requirement and high throughput data
transmission.
|
Download
|
39 |
Underwater Image Enhancement using Image Dehazing
Wavelength Compensation (IDWC) method
Soniya shrivastava, Devyanshu Rao
Abstract—Underwater environments generally cause colour
cast or colour scatter while photography. Colour scatter is due
to haze effects appearing when light reflected from thing
which absorbed or may be scattered several times by particles
of water. This cause lowers the visibility and less contrast of
the image.
|
Download
|
40 |
An efficient adaptive RNS filter design on high speed FPGA
Divyansh namdev, Rakesh Patel
Abstract—Over the past few years Digital Signal Processing
has gained in popularity in the field of communication. The
rise in the popularity of digital signal processing is due to the
many advantages it possesses, such as high noise immunity,
low cost, high speed, and flexibility. In recent times, many
innovative methods are being developed to make
communication devices as small and portable as possible.
Hence efficient hardware implementation plays a key role in
making communication devices more portable. FIR filters
are the basic components used to manufacture
communication devices. The hardware implementation of the
RNS filter can be done using Look-Up-Table (LUT) in the
block RAM's in FPGA's of the Xilinx Virtex FPGA's. The
RAMs generated by the core generator are used for this
purpose. The implementation was done on an example filter,
to compare it with other implementations. The result of this
thesis is a highly efficient hardware realization of the desired
FIR filter. The implementations of the Digital FIR filter in
Residue umber System. CLBs are the basic building block of
the FPGA. Residue Number System implen1entation utilizes
the block RAMs present around the FPGA chip, which are
generally not used by the communication circuitry. The
hardware savings is obtained by using Block RAMs to
implement the filter instead of CLBs. Conventional methods
of implementations are faster than Residue Number System
implementation, but that is the trade-off to the savings in
hardware.
|
Download
|
41 |
Current Trends of Advanced Data Structures in Real Time
Manas Kumar Yogi, V.Arthi
Abstract— This paper presents four advanced data
structures which are used in various applications for
technological needs as well as for researching the time
needed for efficient storage and retrieval of data. We
discuss the data structures which are not primitive but use
the principles of primitive data structures like trees. Our
intention is to create awareness among data structures
enthusiasts the indispensible advantages of such data
structures like tries, treaps, bloom filters, ropes.
|
Download
|
42 |
Original Article: Modified Lord’s Operation for
Hydrocele: Comparative Analysis
Rajesh Narayan
Abstract—Idiopathic vaginal hydrocele is the most
common type of hydrocele. Lord’s plication is
indicated in small hydroceles. Jaboulay’s eversion of
sac is indicated in large hydrocele with or without
thick sac. Excision of sac is advocated for thickened
sac. In this study plication was carried in 100 cases
and comparative analyzed with 100 cases of control
(eversion of sac+ excision of sac) Postoperative
hematoma, Infection, fever and wound abscess were
assessed. Plication, in comparison to eversion of sac
and excision of sac, is the easier, simpler technique
and takes smaller incision and lesser operating time is
undertaken. The post-operative hematoma is mainly
due to stripping of the hydrocele sac from the
surrounding tissues which results in the generalized
oozing. Modified Lord’s operation in which the
surrounding tissues is not opened up eliminates the
causation of post-operative hematoma.
|
Download
|
43 |
A Novel Fuzzy Clustering Algorithm for Text Processing
B.Srikanth, M.Deepthi, K.Haripriya, S.B.S.S.Eeswari, B.Srilakshmi
Abstract—In comparison with hard clustering methods, in which a
pattern belongs to a single cluster, fuzzy clustering algorithms
allow patterns to belong to all clusters with differing degrees of
membership. The objective of text summarization is to extant
the most significant information in a shorter form of the
original text while keeping its foremost content and
assistances the user to rapidly understand huge volumes of
information. Text summarization statements together the
problem of choosing the most significant units of text and
the problem of generating coherent summaries. This
procedure is suggestively different from that of human
based text summarization since human can seizure and
relates deep connotations and themes of text documents
while automation of such ability is very problematic to
implement.
|
Download
|
44 |
Area and speed efficient Floating point unit
implementation on Hybrid FPGAs
Ankita Dixit, Atuliika Shukla, Ravi Mohan Sairam
Abstract—Proposed design an Area and Speed optimized FPU
for modern computing of advance processors, as we aware
that in most of the DSP (Digital Signal Processors) We have
proposal to merge Mitchell & Wallace techniques for
designing FM & FA sub-modules and to design top module of
design hierarchy including coarse grain logic modules WB’s
along with FA & FM. There top module is a 16 bit FPU
module.
|
Download
|
45 |
Improving Network Performance through RWA in
Optical Networks
Priyadarshini R K, Arunachalam M
Abstract— In optical WDM networks, data streams are
transmitted along with light paths for fast transmission.
The light path must be routed through a path with
minimum blocking probability at the same time the
wavelength selection ought to be taken into account as it
is a major issue in resource management. This paper
deals with the study of various wavelength assignment
strategies and analysis of their performance and
blocking probability. Existing algorithms leads to
increased blocking ratio due to unbalanced wavelength
utilization concern. This letter also proposes a new
algorithm to attain minimum blocking probability that
maximizes the throughput.
|
Download
|
46 |
A Classification Approach Of Meteorological Data For
Detecting Severe Weather Patterns
N.Niharika, E.Poovammal
Abstract—The Early detection of possible occurrences of
severe convective events would be useful in order to
control, the environmental and socio- economic damages
which are affected by natural calamities. However, the
enormous volume of meteorological data available
becomes difficult, for analysis by the meteorologists. An
approach for the classification of meteorological data has
been introduced which is based on the frequency of
occurrence of the values of different variables provided
by a weather forecast model by implementing Decision
Tree Algorithm, KNN algorithm and SVM Algorithm
and getting the relevant values for the same dataset for
the mentioned three algorithms. It is possible to identify
patterns that may be associated to severe convective
activity. Hence, the information attributes are variables
which results from the weather forecast model Eta,
whereas the decision attribute is given by the density of
occurrence of cloud-to-ground atmospheric electrical
discharges which are usually referred to the level of
detecting the activity.
|
Download
|
47 |
Education of Tribal Children in India
A case study
G.Anbuselvi, P.John Leeson,
Abstract—Tribes are the people with different way of
living and community life. They are living in definite
geographical area. They have their own culture,
customs, religious belief etc which make them
different from other tribal community. The literacy
scenario of the Scheduled tribes in general is below
the literacy rate of the general population of the
country. As per 2001 census the literacy rate among
tribal (47.10%) is found to be far below the over all
literacy of the country (64.84%). This paper focuses
the education of tribal children and the hurdles they
faces.
|
Download
|
48 |
VLSI Implementation of Modified Guided
Filter for Edge Preservation
V.Monika, P.Prem Kumar
Abstract—Filtering is widely used in the image and
video processing application for various technologies.
Field Programmable Gate Array (FPGA) technology
has become a viable target for the implementation of
real time algorithms is suitable for the video image
processing applications In this paper a explicit image
filter called guided filter is proposed to remove the
noise in images smoothing and sharpening of images
.We proposed the systolic array architecture for
modified guided filter. The guided filter is derived
from the local linear model computing the filtered
output by considering the content of guided image can
be the input image or different image. The guided
filter can be using as the edge preserving smoothing
operator. Transfer the structure of filtering image to
the filtering output enabling and filtering application
like dehazing and guided feathering. Computer vision
and computer graphics applications, include edgeaware
smoothing, HDR compression, image matting.
Avoid halo effect by using the weighted least square
filter. FPGA can be used to implement any logical
function that an ASIC could perform. VLSI
Implementation for modified guided filter to achieve
the high speed, low power consumption and reduce
area.
|
Download
|
49 |
Performance Evaluation of DSR Protocol in VANETs and
MANETs Using NS2
Y.Sameera, V.Muralikrishna, S.Lakshmi, S.Sravani, M.Diwakar
Abstract—In this project we are analyzing a reactive protocol
Dynamic Source Routing in VANETS as well as VANETS.
Though a Vehicular Ad-hoc Network is a type of Mobile Ad-hoc
Network that is used to provide communications between vehicles
which are within the transmission range, using onboard units and
also between fixed infrastructure and vehicles using road side units.
Routing protocols differ in their functionality and does not give
unique results in both the scenarios due to different traffic
conditions. We are simulating three performance metrics using
network simulator they are throughput and end-to-end delay. The
differences between characteristics and architectures have been
studied and using these results a comparative analysis can be made
between VANETS and MANETS.
|
Download
|
50 |
Wireless Sensor Networks to Transmit Data across
Various Intermediaries
AJ.Gowtham kumar, V.Arun, A.Ragavan
Abstract—Secure data transmission is a critical issue for
wireless sensor networks (WSNs). Clustering is an
effective and practical way to enhance the system
performance of WSNs. In this paper, we study a secure
data transmission for cluster-based WSNs (Wireless
sensor network), where the clusters are formed
dynamically and periodically.
|
Download
|
51 |
Threats and weakness in TCP/OBS networks
& overcoming land attack
Ratna Praveen Almanda, M.Sampath kumar, S.Jhansi Rani
Abstract—Optical Internet has become a strong development
and its commercial use is growing quickly. Due to clearness/open
honesty and virtual sharing they provide transmission of data
with ultra-fast data rate with the help of optical burst switching
technology, which transmits data in the form of bursts. But it has
some security problem. Like if, one of the OBS nodes in the
optical network is damaged/is broken into, it causes the
weakness. This purpose is to identify the weakness named as
burst hijacking attack and provide prevention. TCP/OBS
networks are networks for communication over internet in
future and Optical Burst Switching (OBS) is providing solutions
for this network. In these networks the data move is moved in
the form of bursts. Even though OBS has an advantage of
moving data with good speed, it suffers from security
weaknesses. For bursty traffic, OBS is the best as it switches at
the packet level effectively when compared with the other
switching ways of doing things. We also try to discover the
weakness in the TCP/OBS networks and their countermeasures
for the same is dealt separately using the ns2 machine for test
run and checking of the security limits/guidelines. Improving the
internet traffic is always an important research issue in the field
of network traffic classification, although different approaches
are available for the traffic over heads during the network
traffic, they are not best. In this paper we propose a muchimproved
classification approach for internet traffic by carefully
studying the behavior of the nodes for allowing or this
connection of the incoming node by figuring out and calculating
the probabilities of the factors with respect to the node.
|
Download
|
52 |
Secure Key Generation Scheme Is Used For Data
Transmission in DNA Cryptography
B.Abinaya
Abstract—Cryptography is the art of writing in secret code in
such a way that no one can understand except the intended
viewer. The information can be encoded in a DNA sequence
and computed. DNA stores huge amount of information and
perform immense parallel computation, DNA can process large
number of problems in a fraction of second. Original plaintext
is converted to American Standard Code for Information and
placed in a 4 * 4 matrix. Matrix manipulation operation is
performed in cycle. Left to right flipping operation is
performed in the first step. Up to down flipping operation is
performed in the second step of the manipulation cycle. An
Exclusive OR operation is done with the resultant matrix and
the initial key. Generated key is then Exclusive OR with the
result of matrix manipulation to generate mini cipher. Base 4
conversions are done with the mini cipher text that forms the
sequence of 0, 1, 2, 3. Reshaping operation is performed to
modify the data sequence. DNA digital coding is done with
reshaped data by replacing 0, 1, 2, 3 as DNA bases Adenine,
Cytosine, Thymine, Guanine that gives the cipher text. DNA
computing is very difficult to decode the data without precise
knowledge of the key and gives high security layer.
|
Download
|
53 |
Review on Singer Identification Technique Using
ANN
Shruti, Bharti Chhabra
Abstract—sThe voice recognition system is most prominent
technique of identification of human voice. This is used
for security purposes. Recent research concentrates on
developing systems that would be much more robust
against variability in environment, speaker and
language. The unique qualities of a singer’s voice make it
relatively easy to identify a song of particular artist. The
identity of a singer can be identified automatically using
Automatic Singer Identification System. The acoustic
features extracted from songs in a database of popular
music. This paper focus on the basic concept of the
feature extraction and classification in speech
identification system. This paper also focuses on the
previous research work done in the area of speech
recognition and singer identification system.
|
Download
|
54 |
Original Article: Composition of Urinary Calculi by
X-Ray Diffraction
Rajesh Narayan
Abstract—Urinary calculi are an age-old anguish of the
human race. Accurate knowledge of the qualitative and
quantitative composition of the urinary calculi is vital for
understanding their etiology and for development of
prophylactic measures.
|
Download
|
55 |
A Cluster Based Scalable and Efficient Group Key
Management Scheme in Multicast Networks
Kiruthikaa K V, Sathis Kumar K
Abstract—Key management is the base for providing common
security services such as data secrecy, authentication and
integrity for group communication to work in dynamic network
environments. A group key management supports protected
communication between members of a secure group. The group
membership may vary over time. A group key management
ensures that only members of a secure group can gain access to
group data and can authenticate group data. The proposed work
identifies a scalable and an efficient key management scheme by
the comparison of these key management schemes. This scheme
provides the new research directions in group key management
by making use of variable key lengths in order to reduce the
computation cost and communication cost.
|
Download
|
56 |
Securing Broker-Less Publish/Subscribe Systems
Using Identity-Based Encryption
M.Muthuraj, Mr.R.Mohankumar
Abstract—Identification approach to provide authentication
and confidentiality in a broker-less and confidentiality are the
main objective of any distributed system the pub/sub system.
Our approach allows subscribers to maintain credentials
according to their subscriptions. Private keys assigned to the
subscribers are labeled with the credentials. A publisher
associates each encrypted event with a set of credentials. We
adapted identity-based encryption (IBE) mechanisms 1) to
ensure that a particular subscriber can decrypt an event only if
there is a match between the credentials associated with the
event and the key; and 2) to allow subscribers to verify the
authenticity of received events. 1) Extensions of the
cryptographic methods to provide efficient routing of encrypted
events by using the idea of searchable encryption, 2) “Multicredential
routing” a new event dissemination strategy which
strengthens the weak subscription confidentiality, and 3) a
thorough analysis of different attacks on subscription
confidentiality.
|
Download
|
57 |
Analysis of Various Treatments of Obesity Using
Fuzzy Vikor Method
A. Sahaya Sudha, M. Thenmozhi
Abstract—The aim of this paper is to control the obesity in
different types of treatment. Obesity is a leading preventable
cause of death worldwide, with increasing rates in adults and
children. Dieting and Exercising are the main treatment for
obesity. In this paper, the weights are assumed by using linguistic
variables and then the fuzzy numbers are converted into crisp
values, and finally the ranking order is determined by VIKOR
METHOD.
|
Download
|
58 |
A Neighbor Based Dynamic Estimate Rebroadcasting
Approach for Efficient Routing In Mobile Adhoc
Networks
P.Divya Bharathi, Mr.V.Shunmugavel
Abstract—Broadcasting in MANET is an effective
mechanism for route discovery, but the routing
overhead associated with the broadcasting can be quite
large, especially in high dynamic networks. The
proposed new dynamic estimate rebroadcasting
algorithm is able to ensure a correct reception of
transmitted information on dynamic links and to
determine efficient routes to reach the desired
destinations. In fact, to reach the challenge of
responding to time and space variations of mobile
environments, efficient powerful dynamic routing
protocols must be designed with an aim of enhancing
the overall system performance and reduce the time
delay. The proposed routing protocol estimates the
Route discovery along with Neighbor knowledge
summarized with following benefits Minimum hop and
delay to destination while broadcasting, 2) Fast
adaptability to link changes, 3) dynamic routes
selection based on distance, 4) Distributed operation, 5)
Loop avoidance 6) Calculate the delay by random
selection approach 7) Routing table calculation to avoid
routing overhead.
|
Download
|
59 |
A Novel Secure Mining of Association Rules with
Subgroup Discovery in Vertically Distributed Databases
K.Kokilavani, V.Nandhini, V.Mohan Aravinth, T.Kalaikumaran
Abstract— We propose a protocol for secure mining of
association rules in vertically distributed databases. The
current protocol is that of Kantarcioglu and Clifton two
protocols to be used. In Our protocols, are based on the Fast
Distributed Mining (FDM) algorithm of Cheung et al. In
order to improve the performance of the system, proposed
the subgroup detection concept in this system. In this
setting, all sites use the same set of attributes and the
quality of every subgroup depends on all databases. The
approach finds patterns in the union of the databases,
without disclosing the local databases. To the best of our
knowledge, this is the first secure approach that tackles any
of the supervised descriptive rule discovery tasks. In
proposed scenario we will do the vertical distributed
database which is nothing but different columns of a table
distributed to different sites.
|
Download
|
60 |
Improving the Efficiency of Itemset Mining Using K-Means
Clustering Techniques
N. Megala, R. Krishnakumari, N. Raj Kumar, S. Raja Ranganathan
Abstract—Sets of items that occur together is called itemsets.
Discovering the high efficiency itemsets from a large set of data
base refers to discovery of itemsets. The proposed work is to find
frequently used items and infrequently used items from the large
database. It is planned to identify strong rules discovered in
databases using different measures of interestingness. Finding
infrequent items are more interesting than finding frequent ones.
The proposed system describes the complete process of
identifying the frequently used and infrequently used products in
an organization. K-means clustering algorithm is used efficiently
to retrieve the frequent products and infrequent products from
the large set of database. The knowledge database consists of
huge data items. Mining the set of items is a challenging task.
The key role in web mining is clustering and retrieving the most
efficient itemsets.
|
Download
|
61 |
Small Delay Testing and Characterization using
Adaptive Frequency with AC-Plus Scan Method
Suganya P, Thanga Selvi E
Abstract—In this paper, we propose a new methodology
called AC-plus scan method, to detect the Small Delay
Defect. Small delay defects could cause a device to
malfunction in the field due to escaping traditional
delay testing. It is often necessary to detect. To solve this
problem, the three test modes are proposed called ACplus
scan. All-digital phase locked loop is used to
generate test clock on the chip. AC-plus scan can be
executed on an in-house wireless test platform called
HOY system. The proposed AC-scan system to detect
the small delay defects in a circuit. It used three modes
to detect the SDD in circuit under test. First test mode
provides a way to detect longest path delay; it could
greatly reduce the test time by 81.8%. Second test mode
is designed for volume production test and it could
detect Small Delay Defect effectively. Third test mode is
used to extract waveform structure of the circuit.
|
Download
|
62 |
Rapid Prototyping of Wireless Augmentative &
Alternative Communication System for Speech and
Hearing Impaired Subjects
Asha Rani.N, Venkateshappa, Naveen H
Abstract—Helping the deaf and dumb to communicate has
traditionally been the province of those whose interests lie in the
fields of speech and hearing. However, the deaf and dumb have
learned to substitute the medium of vision for the more difficult or
impossible. Various degrees of deafness are recognized. Some
authors prefer to use the term “hearing-impaired” rather than
“deaf” to indicate that they are concerned with a wider class than
the profoundly deaf. Deaf and dumb people have developed a
complex and ingenious language of signs and finger-spelling,
together with an ability to infer spoken words from lip movements.
Engineers in the field of television and picture coding can
therefore be of direct help to the deaf and dumb in enabling them
to communicate at a distance. Here In this paper attention is given
to the requirement of picture communication system which enables
the deaf and dumb people to communicate over distances. Based
on the combination of advanced RISC microprocessor (ARM),
touch screen with graphical LCD module and text to speech
converter is adopted herein.
|
Download
|
63 |
A Detailed Review of Error Correction Codes for Reliable
and Efficient Memory Chips against Multiple Cell Upset
Nisha C, Karthikeyan S
Abstract—This paper reviews the error correction
techniques for the detection of MCUs (Multiple Cell
Upset) in SRAM memory designs. Radiation particles
can impact registers or memories generating soft errors.
These errors can modify greater than one bit causing a
MCU which consists of errors in registers or memory
cells that are physically close. These MCUs produces
adjacent bit errors which may affect a single word,
Hamming codes are commonly used to protect
memories or registers from soft errors. But, when
multiple errors occur, a Hamming code will not detect
them. The novel decimal matrix code (DMC) based on
divide-symbol improves memory reliability with lower
delay overhead. DMC is compared to well-known codes
such as the existing Hamming, BCH, MC codes. Here
DMC utilizes decimal algorithm to obtain the maximum
error detection capability.
|
Download
|
64 |
Automatic Control Access and Failure Detection for
Irrigation Using WSN
M.Meena Sundari, S.M.Uma
Abstract—This project presents Automatic Control
Access and Failure Detection for Irrigation Using WSN.
In Controller, LCD display is used to view sensor data,
connected to power system. After getting data from the
sensor, the controller checks it with required soil
moisture value, that amount of Water is automatically
irrigated to the Field by using Smart Neural Network.
Corresponding Feedback Message is send to registered
mobile phone. Using Behavior Based Adaptive
algorithm, if any damage in Sensor, Controller, Water
Pump and Warning Message will automatically send to
the User’s Mobile. If water is filled more than required
level of soil moisture, water is automatically released
from the Field by using Outlet Pump. In case of signal
problem, message will deliver slowly User can remote
accessing and controlling of the irrigation motor using
Steepest Descent Algorithm of Response Surface
Methodology for Automation and view the information
in the system connection of internet in Home. Systems
propose Remote Access of the motor and also access
that irrigation process by system through internet of
web interface.
|
Download
|
65 |
Curriculum and Professional Development
Adnan Omar, Muhammed Miah, Emmanuel Nkabyo
Abstract—Information technologies (IT) are developing rapidly
and industry leaders depend on the educational system for a
qualified workforce. Educators have the responsibility of
designing curricula and practical activities that prepare students
for the corporate world. Understanding today’s work
requirements as well as the effects of curriculum on student’s
professional readiness is essential in achieving this goal. This
research, based on survey analyses of work experiences of alumni
and current industry data investigates how well the Computer
Information Systems (CIS) program of a four year institution
prepares its graduates for the requirements of the IT industry.
More than one-third (36.7%) of the participants had positions
related to managing information, and 3.3% were involved in
software development, which has the highest job growth
projection. From a list of technical skills, 6% of respondents
were involved in cyber security which ranked highest, 88% in
hiring priority of IT employers. The results serve as a baseline
for improving student learning outcomes.
|
Download
|
66 |
Social Network for Course Delivery: A Case Study
On Facebook
Muhammed Miah, Adnan Omar
Abstract—The 21st century continues to usher in technological
advances that change the nature of communication, socialization,
and private versus public information. One such change is the
prominence that social networking currently enjoy, especially
among the younger generations. Social networking has been
defined as online spaces where individuals present themselves,
articulate their social networks, and establish or maintain
connections with others. While there are numerous types and
variations of social networking web sites, the most widely used is
Facebook. Online social networking sites such as Facebook is
extremely popular as indicated by the numbers of members and
visits to the sites. It allows students to connect with users with
similar interests, build and maintain relationships with friends,
and feel more connected with their campus. The foremost
criticisms of online social networking are that students may open
themselves to public scrutiny of their online personas. This
research is aimed at educators working with students within
schools, colleges, universities; work based learning, and formal
and informal learning settings. It looks at the way in which
Facebook can be used as a tool to: support subject teaching
across the curriculum, supports out of school hours learning,
encourage informal social learning, enable easy communication
between students, teachers and parents; and support the
development of digital citizenship skills. This research aims to be
practical and hands on. Innovative uses of Facebook as a course
delivery media are studied. A Facebook page used to deliver
course materials and students are surveyed to find out the
effectiveness of using social network after they use that Facebook
page for their courses. The survey results are analyzed and
recommendations made to make is useful.
|
Download
|
67 |
Power Optimization of Dual Voltage FPGA Using
Body Biasing Method
B.sankar, Mr.C.N.Marimuthu
Abstract—Proposed method could be developed by using Dual
Mode Logic Switches and Body Biasing with voltage FPGA method
to reduce the furthermore power reduction ratio.
|
Download
|
68 |
An Overview of Mobile Cloud Computing
Pratik Sheshrao Yawale
Abstract—A various applications based on mobile cloud
computing have been developed and served to users, such as
Google’s Gmail, Maps and Navigation systems for Mobile, Voice
Search, and some applications on an Android platform,
MobileMe from Apple, Live Mesh from Microsoft, and MotoBlur
from Motorola.
|
Download
|
69 |
Drowsy and Distracted Driver Alert System Using
Neural Network
R.Pragadeeswari, R.Sugantha Lakshmi
Abstract—Drowsy Driving-a combination of
sleepiness and driving has become a worldwide problem
that leads to severe accidents. A real time non-intrusive
method for detecting the drowsiness of driver has been
described in this project. The system uses the webcam to
capture the video images of the driver in order to detect
the drowsiness. Computer vision and machine learning
algorithms are used to monitor and detect whether the
driver is drowsy or not. Visual feature like eye which
characterizes the drowsiness of the driver is detected
with the help of image processing techniques. In such
a case when drowsy is detected, the warning signal is
issued to alert the driver. A neural network based
algorithm is used to determine the level of drowsiness
by measuring the eye opening and closing and warns the
driver accordingly.
|
Download
|
70 |
Cluster Based Revocation Scheme to Improve
QoS in Wireless Sensor Networks
M.Meena, R.Kumaran, S. Mathan Kumar, A.Jayanthi
Abstract—In general, QoS is the quality of service that a network
offers to the user or application. From the network perspective,
it has been measured as how to provide QoS constrained sensor
data while optimally utilizing sensor resources. Providing QoS in
networks is an important research area. In the existing system, to
provide QoS constraints in data transfer, Efficient QoS aware
Geographic Opportunistic Routing Protocol prioritizes the
candidates in the path from source to destination with respect to
energy, latency and time complexity. But it didn’t satisfy the
delay constrained and also there is a data loss while transferring
the data. To overcome this we proposed Cluster based
Revocation scheme to detect and revoke the authority given to
those nodes which loses the data because of energy loss by
maintaining the list of accusing and accused nodes through Area
Head invention. This significantly improves energy efficiency
and latency.
|
Download
|
71 |
Structural Monitoring and Fault Detection in Wind
Turbine Using WSN
A.Noorul Rishwana Begum, J.Jegan
Abstract—Wind turbine has the monstrous potential to
produce the renewable energy without reliance on any
fossil fuel technology. In this paper practical monitoring
system of wind turbine is proposed. Which is used to
averts the unplanned downtime because of the
component failure, used to avoid the unwanted
accidents due to the inefficient monitoring of faulty
mechanical parts in wind turbine, also used to detect the
intrusion occurrence in wind turbine from that can
prevent valuable asserts from theft. Flexible and less
expansible Wi-MMS sensor is injected in to the turbine
structure for conditional monitoring. GMM algorithm
is used to find the faults in the mechanical parts of wind
turbine. Modified genetic algorithm which is used to
detects both the structural issues and intrusion
occurrence in wind turbine. In this paper the sensed
information by the sensors from turbines are processed
efficiently from that structural issues, faulty parts and
intrusion occurrence in wind turbine is identified.
WSN technologies are used to provide information
to practical monitoring system.
|
Download
|
72 |
Monitoring of control system with PLC using
Wireless sensor networks
G.SATHISHKUMAR, K.KOKILAVANI, M.PRABU
Abstract—A main aim of proposed system is to monitor and
control a PLC based system wirelessly for an industry with
wired PLC, it can be achieved using GSM & Zigbee module. In
some cases no person is required to do the process manually.
Person can need only to send the reply about the process that is
to be carried out and PLC will check the status of the SMS sent
by person and take the action according to it. Status of field is
sent to user by PLC via ZIGBEE module based on the input
status of the sensors that are placed at the field an these
simulation of this project will be carried out by using
INTOUCH HMI. To verify the functionality and monitor the
temperature and humidity sensor levels INTOUCH HMI
symbol factory tool is used and these system designs is
implemented in windows scripts with C language can be
generated by using INTOUCH HMI. For implement this
project I am going to use GSM SIM300 module, DVP 10SX
PLC, Switches as a sensors, Motors as an output and RS485 to
RS232 converter.
|
Download
|
73 |
Detecting Malicious Node in Wireless Mesh Network
Using EAMMNET Ack Technique
V.Kanimozhi, V.Meena, S.Rajasekar, S.Stewart Kirubakaran
Abstract—An AMMNET is a mesh-based
infrastructure that ahead data for mobile clients. The
mobile mesh node of an AMMNET is to follow the
mesh clients in the application environment to
guarantee connectivity for both intra and intergroup
communications. In existing system network
partitioning occurred and distributed client tracking
algorithm is the solution to deal with forceful nature
of client mobility. In AMMNET there is a possibility
for malicious attack in the node so the technology
called Enhanced Autonomous Mesh Network
(EAMMNET) has been introduced using AODV
algorithm and ACK scheme for increasing the
throughput for all clients.
|
Download
|
74 |
Image Denoising Using Fully Synchronized
Adaptive Filter
S. Swathi, V.Magudeeswaran
Abstract—Interest in adaptive filters continues to grow as
they begin to find real-time applications such as, echo
cancellation, channel equalization, noise cancellation and
many other adaptive signal processing applications.
Adaptive filtering is one of the most precious areas in
digital signal processing to remove background noise
and distortion.. In this paper, a fully synchronized
adaptive filter has been implemented for real time image
denoising based on Register Transfer Level (RTL) and
we are using kernel based processing, i.e. the processing
of the entire filter window can be done at one pixel clock
cycle. It is supported by arrangement of input data into
groups. So that the interior clock of the design is a
multiple pixel clock which have given in the targeted
system. Finally, the performance of a fully synchronized
adaptive filter is evaluated in terms of PSNR (Peak
Signal to Noise Ratio) and MSE (Mean Square Error)
and calculated the Area, Power, and Speed. The
performance of Adaptive filter is better than the other
filter and it improves the Image Quality and Speed.
|
Download
|
75 |
Growth, Optical, Thermal and Mechanical Studies of
L-lysine Doped Sodium Acid Phthalate Crystal
M. Lawrence, J. Felicita Vimala
Abstract—L-lysine doped sodium acid phthalate (SAP) is
a semi organic crystal which was grown by slow
evaporation method at room temperature using water
as solvent. The grown crystal was subjected to various
characterisation studies. The single crystal X-ray
diffraction study shows the crystal belongs to
orthorhombic system. The FTIR spectrum was taken to
analyse the presence of functional groups qualitatively.
The optical absorption spectrum reveals that the crystal
has good transparency in the entire visible region. The
TA/DTA curves show the thermal stability of the grown
sample. The mechanical hardness of the material was
measured by micro-hardness tester. The SHG efficiency
of the grown crystal confirmed its NLO behaviour and
photo electronic applications.
|
Download
|
76 |
Survey on Fault Dependency Matrix Construction
Using Ontology Based Text Mining
J.Jenifa, T.Balachander
Abstract—Fault dependency (D)-matrix is a systematic diagnostic
model to capture the hierarchical system-level fault diagnostic
information. It is constructed to find the dependency between the
symptoms, failures and the faults in automobiles. In automotive
domain, overwhelming volume of textual data is recorded in the
form of repair verbatim collected during the fault diagnosis
process. Here, the aim of knowledge discovery using text mining
task is to discover the best-practice repair knowledge from millions
of repair verbatim enabling accurate FD. However, the complexity
of text mining problem is to identify and recover several types if
noises. An ontology-based text mining system is proposed, which
uses the diagnosis ontology for annotating key terms. The stemmed
terms are extracted in different formats, which are used to identify
the field anomalies. The extracted data are further used by the FP
growth algorithm to cluster the repair verbatim data such that the
best-practice repair actions used to fix commonly observed
symptoms associated with the faulty parts can be discovered.
Finally a matrix is constructed to analyze the faults by arranging
the symptoms, faults and failures in rows and column.
|
Download
|
77 |
Security based data transfer and privacy storage through
watermark detection using DWT process
Gowtham.T, Pradeep Kumar.G
Abstract—Digital watermarking has been proposed as a
technology to ensure copyright protection by embedding an
imperceptible, yet detectable signal in visual multimedia
content such as images or video. In every field key aspect is
the security—Privacy is a critical issue when the data owners
outsource data storage or processing to a third party
computing service. Several attempts has been made for
increasing the security related works and avoidance of data
loss. Existing system had attained its solution up to its level
where it can be further able to attain the parameter
refinement. In this paper improvising factor been made on the
successive compressive sensing reconstruction part and Peak
Signal-to-Noise Ratio (PSNR).Another consideration factor is
to increase (CS) rate through de-emphasize the effect of
predictive variables that become uncorrelated with the
measurement data which eliminates the need of (CS)
reconstruction.
|
Download
|
78 |
Evaluation of Fuzzy Performance Measures for Single
and Multiple Working Vacations
K Julia Rose Mary, Francinaa C
Abstract—The main aim of this paper is to construct a
membership function of a performance measure for a
single working vacation and multiple working vacations
queues when the inter-arrival time and service time are
fuzzy numbers. The basic idea is to reduce queue into a
family of crisp queues by applying the α-cut approach
and Zadeh’s extension principle. A pair of parameteric
program is formulated to describe the family of crisp
queues, through which the membership function is
derived.
|
Download
|
79 |
Analysis of Hadoop Performance by Data Partioning
Techniques
M.Dhivya, Mr. Balachander
Abstract—The existing hadoop environment faces few
impinge like remote read, skew, process slow down
and spoil time which are adverse effects of poor data
splitting mechanism. Performance of hadoop
environments is highly influenced by data partition
technique. This paper analyses three data splitting
mechanism that can be a measure of the entire above
mentioned de scopes. Locality based data partition
mechanism splits data from same node into same split
such that remote read process slow down and spoil
time can be given rid off. Skew based partition is
exercised so that based on the histogram value data
with same median value is put into same cluster so
that data skew, computation skew, record skew can
be eradicated. The third approach is round robin
based partition in which partition is based on priority
so that process slowdown is snuffed off.
|
Download
|
80 |
Face Detection and Authentication Using Local
Directional Number Pattern and Neural Network
R.Catherine kezia, D. Malathi
Abstract—Face detection and authentication is a
challenging problem in computer vision and it is widely
used in fields such as biometrics and human-computer
interactions. In this paper, we have used a local
directional number pattern and neural network to detect
and recognize faces. A feature descriptor called the Local
Directional Number Pattern (LDN) can also be used for
face and expression recognition. The LDN is a gray scale
texture pattern code which is assigned to each pixel of an
input image. It represents the spatial structure of the
texture and its intensity transitions. LDN uses directional
information which is more stable against noise. In this
method a compass mask has been used – Kirsch mask. It
is used to extract the directional information for face and
expression recognition. We have proposed a Forward
Feature Selection (FFS) algorithm to extract the features
from the face. Back propagation algorithm is used to
train the neural network with extracted features.
|
Download
|
81 |
Comparative Study to design and implement highly efficient 640x480
pixels based Image Compression Unit
Mr. Shubhdeep Bhatt, Dr. Vinod Kapse, Mr. Abhishek Gupta
Abstract—Image Compression Unit is a digital co-processor that
compresses bmp or jpg images in form of jpg to jpg or bmp to
jpg to jpg.JPEG Encoder plays a key role in digitized image
compression unit, being used in many places such as for sending
of multiple images through email, multiple-images disk storage
etc. Among many parameters speed is the most prominent factor
for JPEG Encoder being used recently. So it’s imperative to have
a very high speed Encoder that can enhance efficiency of those
modules which are truly dependent upon JPEG Encoder to
perform image compression operations. After deep study and
thorough analysis we have seen that speed of this unit can be
enhanced by enhancing speed of buffer being used to store data.
At algorithmic level Ping-Pong buffer provides much better
result in comparison to other conventional buffer. Furthermore
2-D DCT provides much better results in comparison to other
transformations such as F.T., D.W.T. with respect to speed. We
also found that the 2-D DCT with Ping-Pong buffer provides
better outcome. Then 2-D DCT with Ping-Pong buffer has been
proposed for the JPEG Encoder unit design that is able to
perform image compression operation at high speed.
|
Download
|
82 |
A Review on CBIR Unit Implementation Using
Combination of Local and Global Variables for
Feature Extraction
Mr. Abhishek Gupta, Ms. Arpita
Abstract—In current scenario due to rapid growth of multimedia,
internet and availability of large image archives has attracted to
put efforts in providing a tool for efficient, effective and accurate
search, retrieval and management of visual data using visual
contents of the image data or information to segment, index and
retrieve most relevant images from the image database. For this
purpose a most common approach which is used called as
Content-Based Image Retrieval (CBIR) systems. Main objective
of these systems is to operate on image database and, in response
to input visual queries, similar images get retrieved. Application
potential of CBIR for fast and effective retrieval of images is
enormous, expanding use of computer technology to a
management tool. In this review paper after introducing CBIR
method we have proposed a new approach to have more accurate
and reliable outcome in form of retrieved images.
|
Download
|
83 |
A Review on Designing and Implementation of Speed
optimized Arithmetic Execution Unit for Digital
Processors
Mr. Abhishek Gupta, Mr. Praveen Tiwari
Abstract—This proposed work is devoted to design high speed
Arithmetic Execution Unit that would be able to perform not
only arithmetic operations like addition, subtraction, and
multiplication, square and square-root but also Multiplyaccumulate
operations. As all of us know that MAC Unit is a
digital co-processor which can performs multiply then
accumulate operation. MAC Unit is the key element of digital
signal processors to perform various sophisticated tasks like as
FFT, DFT, resolving various complex equations and Convolution
etc. along with this it is also used in various configurations like as
IIR, FIR etc. Every digital domain based technology depends
upon the operations performed by MAC Unit either partially or
whole. Similarly Arithmetic unit (AU) is the heart of Central
Processing Units (CPUs), to perform various general purpose
operations. Speed is the most prominent factor of processor and
controllers being used recently. To meet this major concern of
“speed” we need particular high speed MAC and AU. That’s
why it is highly required to design high speed MAC and AU,
which can enhance the efficiency of those modules which lies
upon the operations performed by MAC and AU. The speed of
MAC and AU greatly depends upon the speed of multiplier. At
algorithmic and structural level there are so many multiplication
algorithms exist now-a-days. After a thorough study and proper
analysis till date we have seen that Vedic multiplication
technique is the best algorithm that gives much better result in
comparison to others in terms of speed. Further we have
analyzed different existing Vedic multiplication hardware, and
compared those with respect to speed. And found that the Vedic
multiplier with Carry Save Adder gives better outcome. We are
still seeking for other methods which can provide the better
result than this Vedic multiplier with Carry Save Adder. So our
research work would mainly bias towards designing very high
speed multiplication unit. On that basis we will deploy other
modules of proposed Arithmetic Execution Unit, that is mainly
combination of AU and MAC unit so that a single execution unit
can work in all cases either it is digital signal processing or
general purpose works in better way. This proposed Arithmetic
Execution Unit would be able to perform different arithmetic
operations at high speed.
To design proposed arithmetic execution unit verilog
hardware description language (HDL) will be used. For synthesis
purpose Xilinx synthesis tool (XST) of Xilinx ISE-9.2i would be
used. For the behavioral simulation purpose ISE simulator will
get used.
|
Download
|
84 |
A Review on Security in Cloud Using High Performance AES and OTP
Approach
Ms. Anshita, Mr. Abhishek Gupta
Abstract—Now-a-days Cloud computing become requirement of
each organization. As it provides a Virtual platform to
consumers to acquire most tedious and complex software services
on one by one basis, which in past required a high level of
maintenance at customer’s end considered as SAAS (Software As
A Service), that is one of the main service provided by cloud
computing it has a feature of multi tenancy that virtually
provides the services on one by one basis but physically all user
utilize the services at same time. But also there is another face of
coin which is related to the security concerns, which is decreasing
the trust of organizations and individual customers to avail
benefits of Cloud Computing. Many organizations may still be
hesitant to introduce SaaS mainly because of the trust and
security concerns, they may observe more risks than benefits in
introducing this service. As if any software is being used then
data must be shared by consumer in many cases either in the
form of storage or communication. This data can be a very
sensitive in nature. Hence it’s imperative to work upon security
concerns of this.
In this proposal work we have discussed
about security constraints to enhance the security in SAAS layer
using OTP and AES for communication and security prospects
respectively, which can help to regain more trust of individuals
and organizations.
|
Download
|
85 |
A Review on Information Security in Cloud Computing
Mr. Abhishek Gupta, Ms. Unnati
Abstract—Cloud computing is a platform through which
information can be placed and accessed from anywhere remotely,
and this provides a more flexibility than any-other traditional
database. Apart from that cost cutting is also an advantageous
part as it’s not required to spend capital to maintain and update
infrastructure. But information security is the main threat for
cloud service consumers as they don’t know where their data has
been placed in cloud, only because of that most of the
enterprenurers and organizations doesn’t prefer to use cloud to
place their sensitive information. So it’s imperative to maintain
proper security concerns co-related to information, to regain
trust of potential customers. In this paper work we have
discussed about information security and then proposed a new
approach to increase level of information security.
|
Download
|
86 |
A Review on Design and Implementation of Speed
efficient Advanced Encryption Standard using Ancient
Vedic Multiplication Technique
Mr. Abhishek Gupta, Ms. Aakanksha Namdeo
Abstract—This research work is devoted to design high speed
Advanced Encryption Standard. AES is a digital algorithm based
device which ultimately provides secure transactions in banking
and co-related areas, where ever secured transactions are
required. Nowadays, as majority of secure transactions occurs on
smart phones and other handheld devices, it’s imperative to have
an algorithm that consumes less area and that without
compromising with overall performance. At algorithmic and
structural level there are so many techniques persists, but after a
thorough study work we have analyzed that AES is one of the
best algorithm. Apart from that we have seen that Vedic
multiplier with CSA gives much better result in comparison to
other conventional multipliers and so that we have proposed to
use this Vedic multiplier with CSA to enhance the AES speed
further.
|
Download
|
87 |
A Review on Security in data storage for IaaS Layer in
Cloud
Mr. Abhishek Gupta, Ms. Rachna Raghuwanshi
Abstract—Cloud computing is a platform that provides a very
convenient way for on-demand network access to a shared pool
of configurable computing resources that can be rapidly
deployed with minimal management overhead and great
efficiency. But issue with cloud that, it’s an insecure computing
platform from the perspective of the cloud consumers, for which
the system must design mechanisms which not only protect
sensitive information using encrypted data based on enabling
computations, but also protect consumers from malicious
behaviours via enabling the validation of the computation result.
That’s why we are working towards designing of these aspects to
have better security in data storage of cloud.
|
Download
|
88 |
A Review on Designing and Implementation of High
Performance Automated System for Tumor Detection
Mr. Abhishek Gupta, Ms. Priyanka Jain
Abstract—Tumor is an uncontrolled growth of tissues in any part
of body. Different types of tumors have different Characteristics
treated differently accordingly. Out of different types of tumors,
brain tumor is inherently serious and life-threatening because of
its character in the limited space of the intracranial cavity (space
formed inside the skull). After a deep study and analysis we have
found that in most of developed countries the number of people
who have brain tumors were died due to the fact of inaccurate
detection of brain tumor. MRI or CT scan that is directed into
intracranial cavity produces a complete image of brain that is
visually examined by physicians for detection & diagnosis of
brain tumor. But this detection method resists the accurate
determination of stage & size of tumor. To avoid that, it’s
imperative to have computer aided methods for segmentation
(detection) of brain tumor. In this review paper we have
discussed current issues being faced for brain tumor’s size and
dimension. During our research we will work in this area to
enhance the accuracy of malignant tumor detection.
|
Download
|
89 |
A Review on Design and Implementation of Highly Energy Efficient Protocol for
Wireless Sensor Networks
Mr. Abhishek Gupta, Ms. Deepali Sahu
Abstract—Wireless network contains of a large number of nodes
and consecutive links to connect them so that whenever a data
packet is being transmitted from one node to another node it
goes through multiple links/paths. Furthermore WSN generally
consists of a huge amount of distributed nodes which organizes
them in form of a multi-hop wireless network. Among many
problems that persists in WSN, out of them a major concern is
co-related with energy as every node is operated by battery. As
each Node composed of small battery so the energy associated
with this node is very less. To have large network life time every
node need to minimize their energy consumption that’s why
replacing and refilling of battery is very costly and cumbersome
in nature. So it’s imperative to work upon some techniques and
algorithms through which the energy associated with each node
can be conserved. This work of energy conservation work can be
performed by proper control of transmission power of every
node. In this proposal work based review paper first we have
introduced about wireless sensor networks and then showcased
our proposal work to implement a protocol to enhance the
performance of the protocol in sensor network.
|
Download
|
90 |
A Review on Design and Implementation of Energy
efficient Virtual Machine Management in Cloud
Computing Environment
Mr. Abhishek Gupta, Ms. Anamika
Abstract—This research work is devoted to provide energy
efficient Virtualization Machine Management in the Cloud
Computing Environment. As all of us know that Cloud
Computing is a platform which ultimately provides a place
where any enterprenurers or organization can place their data,
software and other things virtually using updated infra provided
by cloud service provider. In which Virtualization Machine
Management is the key element of Cloud Computing, which is
used by many enterprenurers or organization, to manage those
virtual machines which is being used to perform above
maintained operation. Energy/Power is the most prominent
factor of this Virtualization Machine Management being used
recently. To meet this major concern of “Energy/Power” we need
particular energy efficient Energy/Power efficient Virtualization
Machine Management algorithms. That’s why it is highly
required to design Energy/Power efficient Virtualization
Machine Management algorithms, which can enhance the
efficiency of cloud servers being used to manage hosted
applications. Now-a-days at algorithmic and structural level
there are so many algorithms exists, which we will study during
our research work and after implementing those algorithms we
will further analyze that which algorithm provides better
outcomes at practical grounds and then we will investigate that
what can be done to further enhancing efficiency of that
algorithm. To implement algorithms for analysis we will use the
Cloud hypervisor.
|
Download
|
91 |
Improved 2ACK Scheme Using Credit-Based
Approach
V.Vijayalakshmi, T.Vigneshwaran, J. Anandaraj
Abstract—A MANET (Mobile Adhoc Network) could be
an assortment of individual mobile nodes that
communicate with one another via wireless link. In
some cases the node that refuses to share its resources
with the opposite for its own advantages square
measure referred to as self-loving or misbehaving
nodes. Attributable to these nodes in MANETS
performance of the network gets affected like scarcely
accessible batter-based energy and node misbehaviors
might exist. In this paper we tend to use improved
2ACK theme is employed to spot these misbehaving
nodes in MANETS. It sends two-hop acknowledgement
packets in opposite aspect of the routing path. Here
we'll be victimization the AODV (Ad Hoc On-Distance
Vector Routing) protocol. The projected improved
2ACK theme conjointly reduces the overhead of ACK’s
caused by 2ACK theme (older version).Analytical and
simulation results square measure conferred to judge
the performance of the projected theme.
|
Download
|
92 |
Prevention and Seriousness Estimation of Automotive
Accidents
T.Yazhmozhi, Mrs.K.Abhirami
Abstract—Latest communication technologies are incorporated
into modern vehicles that provides a chance for the salvage of
people, who are wounded in the traffic accidents. To develop the
overall rescue process, a fast and exact estimation of the severity
of the accidents is essential. This is a key point to help emergency
services for better estimate the required resources. Our proposed
system uses a novel intelligent system, which is able to
automatically discover road accidents, alert them through GSM
modem, and also has the prevention mechanism to manage the
speed of the vehicle in accident situation. If suppose any accident
occurs then the SMS alert will be send to the police control room.
Accident severity is estimated based on the concept of data
mining and knowledge inference. Our system considers the most
related variables that includes the vehicle speed, the type of
vehicles involved, the impact speed, and the status of the airbag
that can characterize the severity of the accidents. As a result, a
complete Knowledge Discovery in Databases (KDD) process, with
a sufficient selection of applicable features, that permits
generating estimation models, which is used to predict the
severity of new accidents.
|
Download
|
93 |
Performance Analysis of Real Data Communication
System Using Digital Modulation Schemes through
Wimax Physical Layer over AWGN Channel
Aastha Hajari, Devesh Kishore, Prof Pratibha Nagich
Abstract—This paper investigates several modulation
techniques for WiMAX based OFDM system including BPSK,
QPSK, 8PSK and various levels of QAMs. The system
performance is gained by dynamically choosing the
modulation technique based on the channel conditions. The
performance of OFDM system is accessed by using computer
simulations performed using MATLAB r2012a 7.14.0.739.
|
Download
|
94 |
A Review of Vision Based Fire Detection Techniques
Supriya Bhargava, Anand Vardhan Bhalla, Rajendra Patel
Abstract—In this paper a survey of various fire detection
methods based on image processing is highlighted. Till today
several methods have been developed to detect fire. Traditional
methods use the chemical properties of fire like Heat,
temperature, Smoke to generate the output based on the decision
made. This sensor based fire detection method has many
drawbacks which hinders the fire detection at earlier stages.
With the development in the field of image processing various
methods making use of visual properties of fire for fire detection
have been developed. These image processing methods has
proved to be much more efficient in fire detection at earlier
stages, due to which they had replaced the traditional methods of
fire detection at most of the places.
|
Download
|
95 |
Rain Streaks Detection and Removal from Color -
Image Video Using Multi-Set Feature
B. Anandhalakshmi, G. Mathurambigai
Abstract—Rain streaks detection and removal from
color image-video is a challenging problem. The rain
streak removal is considered as image denoising task.
The dictionary learning can be also used for removal
of rain streaks for the succeeding frames in the clip,
which is useful to both reduce the computational
complexity and maintain the temporal consistency of
the video. The proposed Color image-video based rain
streaks removal framework based on the sparse
representation. Then the high frequency part was
decomposed into rain and non-rain component by
using the learning sparse representation based
dictionaries. To separate a rain streaks from high
frequency part using the muti set feature.The multi set feature, including HOG (Histogram
Oriented Gradients), DOF (Depth of Field), and eigen
color. The high frequency part and muti set features
is applied to remove the most rain streaks. The DOF
feature is used to help to identify the main subjects to
preserve in a rain image. The rain streaks are usually
neutral color, where the eigen color feature is used to
analyse the key features of the rain streaks. The both
DOF and Eigen color features are used to identify and
separate the non-rain component from the
misidentified rain component of an image. Rain
removal is a very useful and important technique in
applications such as security surveillance, audio/video
editing and investigations.
|
Download
|
96 |
Segmenting Color Images Using FIDTRS FCM
Ms.M.Monica, Mrs.G.Mathurambigai
Abstract—Segmentation divides digital image into
multiple regions in order to analyze the image and also
used to differentiate different objects in an image. A
new approach for color image segmentation is
developed by combining Fuzzy interval decision
theoretic roughest model with fuzzy C means algorithm.
The FCM algorithm has the limitation that it requires
the initialization of cluster centroids and the number of
clusters. In order to have good segmentation results the
pre-segmentation technique is necessary so adopt the
Turbopixel algorithm to split the color image into many
small regions called super pixels. Based on color image
color histogram feature extraction use Bhattacharyya
coefficient to measure the similarity between super
pixels, which is in preparation for clustering validity
analysis. It is the main focus that to obtain cluster
centroids and the number of clusters. The approach is
according to the hierarchical clustering validity analysis
algorithm using FIDTRS model. The FCM algorithm is
utilized to achieve the result of color image
segmentation.
|
Download
|
97 |
Identification of Malware Nodes in Heterogeneous
Network Using EAACK
Sasikala V,Aghila R
Abstract—Mobile Ad hoc Network (MANET) is a
collection of mobile nodes equipped with both wireless
transmitter and receiver that communicates with each
other via bidirectional wireless links either directly or
indirectly. As malware attacks becomes more
frequently in mobile networks, deploying an efficient
defense system to protect against infection and recover
the infected nodes from spreading and outbreaks. The
technical challenges are mobile devices are
heterogeneous in terms of operating system; the
malware infects the targeted system. This work is aimed
to investigate the problem of how optimally distribute
the content-based signatures of malware, which helps to
detect the corresponding malware and disables further
propagation, to minimize the number of infected nodes.
The Proposed scheme uses an Encounter based
distributed algorithm that achieves optimal solution
and performs efficiently in realistic environments.
|
Download
|
98 |
Sleep scheduling algorithm in energy efficient
routing scheme with improvement in performance
for wireless ad hoc networks
S. Linksha Veni, R. Karthick, K.Nivash, A.Chandrasekar
Abstract—A wireless mobile ad hoc
network (MANET) is a decentralized type of wireless
network. A mobile ad hoc network is structure-less
network of mobile devices connected without wires.
MANET’s are power repressed since nodes operate
with inadequate battery energy. Thus, energy
utilization is crucial in the design of new ad hoc
routing protocol. A promising routing scheme called
Sleep scheduling is used in mobile networks, in which
nodes are sleep scheduled to trim down energy
consumption of nodes, which results in the prolonged
lifetime of the network. In this paper, we focus on
sleep scheduling for geographic routing in wireless
mobile networks and propose two geographicdistance-
based connected-k neighbourhood (GCKN)
sleep scheduling algorithms.
|
Download
|
99 |
A survey on alert based link error reduction and malicious
packet dropping reduction in Wireless Ad Hoc Network
K.Pavithra, A.C.Manikandan, T.Maragatham
Abstract—Multi-hop wireless networks forwards the packet to
the destination from the source which causes the two severe
problems likely malicious packet drop and link error. In many
cases the malicious packet drop are part of route that is
comparable to the channel error rate. The impacts of lost packets
are more due to malicious drop than the link error, algorithms
that based on packet loss rate detection are not satisfactory. The
correlation between lost packets is identified to improve the
detection. The Existing system it mainly focuses on High
malicious packet dropping and the number of dropped packets is
higher than that of link error, but impact of link error are not
negligible. In this paper we propose an algorithm for detection of
selective packet drop by insider attackers that provide a truthful
and publicly verify decision statistic to support detection decision
and uses homomorphic linear authenticator (HLA)
cryptographic scheme that provides the privacy for the publicauditing
problem. Also it uses LEACH for the reduction of the
power consumption in the clusters in multi-hop wireless network.
|
Download
|
100 |
User Clustering and Item Clustering using
Collaborative Filtering Recommendation Algorithm
Sindhuja.I, P.Karthick, Rajini Girinath.D
Abstract—Personalized recommendation systems are able to assist cluster to discover exciting videos and they are universally employed with the upgrade of electronic business. Many recommendation systems utilize the collaborative filtering technology, which has been established to be one of the majority responsibility well techniques in recommender systems in recent years. With the regular increase of clients and products in electronic business systems, the time consuming nearby neighbor collaborative filtering explore of the target customer in the total customer space resulted in the not a success of ensuring the real time requirement of recommender system. At the same time, it suffers from its broke quality when the amount of the records in the user record increases. Inadequate of basis data set is the most important reason causing the broke quality. To solve the problems of scalability and inadequacy in the collaborative filtering, this paper recommend a personalized recommendation approach joins the user clustering technology and item clustering technology. Users are clustered support on users’ ratings on items, and each users cluster has a cluster interior. Based on the similarity between target user and cluster centers, the nearest neighbors of intention user can be found and smooth the calculation where necessary. Then, the proposed approach exploits the item clustering collaborative filtering to generate the recommendations. The recommendation combining user clustering and item clustering collaborative filtering is more scalable and more exact than the established one.
|
Download
|
101 |
A Survey on Source Location Privacy in Wireless
Sensor Networks
V. Gobinath, K. Bergin Shyni
Abstract—A wireless Sensor Network (WSN) consists of
a large number of sensor nodes mostly deployed in
places where monitoring the objects. In such cases the
adversaries has to be locate the monitoring objects by
using traffic information. In this paper, the various
source location privacy preserving schemes in Wireless
Sensor Networks are discussed.
|
Download
|
102 |
Low Power Test Pattern Generator Using
LT-LFSR for High Fault Coverage Based on BIST Architecture
G.Jayapoornima, Mrs.N.A.Pappathi, R.Indhumathi
Abstract—This BIST scheme which is based on LT-LFSR based
TPG is proposed. Now a day there is a dramatic increase in scale
of integration. To avoid this, use a Built-In Self-Test (BIST)
technique to provide an attractive solution to test the VLSI
circuits and systems .BIST allows at speed testing and eliminates
the necessity of high bandwidth test interaction. Other benefits of
BIST include reduced cost effective system maintenance and
product development cycle.
|
Download
|
103 |
Diverse Adaptations of Hybrid Algorithm for Optimization
M. Nandhini
Abstract—Most of the real-life applications have many
constraints to optimize the allocation of different resources. They
are considered as constrained optimization problems (COPs).
Due to the toughness of these problems, improving the quality of
solutions with an approach is finding difficult. To overcome these
and for balancing the diverse and intensive nature of solution
space while finding solutions, hybridization of any two
optimization approaches is done and is applied for the various
domain of computer science such as data mining, operating
system and networking etc. In this work, the necessity for
hybridization along with three different versions in the
adaptations of hybridizations in the recent past are surveyed and
discussed.
|
Download
|
104 |
Effect of different packaging material and storage
duration on postharvest life of tuberose (Polianthes
tuberose L.) cv. Kalyani Double
Pragnyashree Mishra
Abstract—Packaging plays an important role in
extending freshness, value addition and reducing
damage. This investigation was carried out at
NDUAT, Faizabad. After harvesting spikes are made
bundles wrapped in six different wrapping materials
and stored at 100C for 0 hour, 24 hrs and 48 hrs. After
storage the spikes were kept in distilled water for vase
life studies. Here three parameters such as days
required for 50% floret opening, wilting of lowest
floret and vase life are taken. Vase life was recorded
when 50% florets got wilted. Maximum days to
opening of 50% florets was noticed in W1S0 (4.66
days) and minimum days to opening of 50% florets
followed by W6S0 (3.52 days). No significant variation
in number of days to wilting of lowest floret was
recorded among different treatments. , maximum
days to wilting of lowest floret (4.34 days) was found
in spikes wrapped with polypropylene 200 gauge and
stored at 100C for 48 hours (W4S2). Maximum vase
life of 8.52 days was recorded in spikes packed with
polypropylene 200 gauge and stored at 100C for 48
hours (W4S2) while minimum vase life (6.34 days)
was noticed in news paper wrapping and storage for
24 hours at 100C (W6S1).
|
Download
|
105 |
Securing Cloud Using Fingerprint with Improved
Performance
M.Bahyalakshmi, S.Malarvizhi, R.Lathapriya, R.Mary Emaglet
Abstract—Cloud computing has the ultimate use of sharing the
resources with the help of internet. It concerns mainly with the
QOS (Quality of Service) and reliability issues. In this paper,
Fingerprint biometrics is integrated with cloud to secure the
data transferred or stored in the cloud. The proposed system of
security has improved performance over the existing techniques.
The fingerprint of an individual is processed to extract its
features and is matched with the input fingerprint which is
checked for authentication. In a proposed system the
combination of cross correlation and minutiae extraction
algorithm is used.
|
Download
|
106 |
Rapid Wall Technology: An Initial Step to the
Sustainable Development
Ramesh Kapse, Hemant Salunke, Upendra Saharkar
Abstract—Erection of precast construction unit is a
composite motorized operation for the uninterrupted
forum of building &induction of prefabricated
elements and factors. Precast construction has many
advantages over the conventional practice by costing
pre definite size of the members in the factory. In
this technique structural members specially made of
concrete that has been cast into form prior being
transported to its construction location for final
installation work. It satisfies demand of sustainable
housing for the population in the arising country.
Construction processes will be faster by adopting
this technology which provides high quality. This
paper states the different kinds of precast
construction system, its main characteristics,
instruments required for the construction work and
its installation process for different type of parts.
|
Download
|
107 |
An Advanced Approach for Improving Performance in Big
Data Applications Using Cache
Blessy Trencia Lincy.S.S., Mrs.Varalakshmi.K.
Abstract—Big Data is the huge volume of data that cannot be
processed by the traditional data management systems. Hadoop
is a technological solution for big data. Many big data
applications generate a large amount of intermediate data and
these information is thrown away after the completion of the
processing. Thus a cache framework can be used for big data
applications where the tasks submit their intermediate results to
the cache and cache partition is made and accordingly the results
stored here can be effectively used. The secondary cache plays a
vital role in the concept related to eviction policies. By using this
approach the duplicate computations can be avoided and the
overall computation time of the MapReduce jobs can be greatly
decreased, improving the performance of the operation done.
|
Download
|
108 |
Multi-View and Multi-Posture Human Recognition
for Video Surveillance Framework
Chairmakani.C, J.P Ananth
Abstract—Video Surveillance has been used in many
applications including elderly care, Offices, Shopping
malls, Showrooms and dwelling nursing etc. This
manuscript intends to develop an intellectual video
surveillance system to enable remote monitoring of
real time scenarios. This system introduces intelligent
analysis of single person activity to enhance the
security system in shopping malls, showrooms, offices,
home and also enriches the current video surveillance
systems through an automatic identification of
abnormal behaviour of the person. The relevant data
is recorded and alert is given to the user by calling
PHONE Calls of the owner as well as nearest police
station and also sending message or mail to the
owner. The customer can view the particular video.
This organization maintains the sanctuary situation
at bureau, retail area, home and this reduces the
incidence of burglary cases and enhances social
stability.
|
Download
|
109 |
Performance Analysis of XCP over Heterogeneous Network
Esha Sharma, A Jeyasekar
Abstract—TCP is basically designed for wired network. Hence it
needs to change when it is used over wireless network i.e.
heterogeneous network. In heterogeneous network packet loss
happens for two main reason i.e. network congestion and wireless
link error. Thus distinguishing them becomes a very important
factor. If the packet loss is due to the congestion it can
determined by probability method and threshold based method.
Here we use congestion probability method. In this method
Congestion Experienced (CE) bit sent by the intermediate node is
used for predicting the congestion. Congestion based probability
method is used by TCP variants in heterogeneous network. But
eXplicit Congestion Control Protocol (XCP) is providing better
performance than TCP variants in heterogeneous network. In
this project we try to implement probability based method in
XCP to predict the congestion in heterogeneous network.
|
Download
|
110 |
Silent Sound Technology-Speech Interaction
Ms Hrituja D. Gujar, Prof.V.N.Dhage
Abstract—In this world there is lots of technology that are tries to
reduce the noise pollution and make the environment better to live
in. But whenever we are talking on a cell phone in a crowd, then
we are yelling because of lots of disturbance and noise around us
and you will not talk properly. Now there is no need to squall to
forward your message and wasting our energy anymore. [1] For
this purpose a new technology known as the “Silent Sound
Technology” has been developed that will put an end to the noise
pollution. The Silent sound technology is a completely new
technology which can prove to be a perfect solution for those who
have lost their voice but wish to speak on mobile When this
technology is used, it decipher your every lip movement and
internally converts the electrical pulses into sounds signals by
neglecting surrounding noise and send it to another side. This
technology allow people to make silent calls without disturbing
others, thus now due to this technology we can speak anything
with our friends or family in private without anyone
eavesdropping and at the other end, the listener can hear a clear
voice.[1] Silent Sound technology aims to detect every movement of
the lips and convert them into sounds, which could help people
who lose voices to speak. [1] Such technology is very useful when
you are in important meeting and you got an urgent call or you
are in public area and want to talk some confidential things but
there is no lip reader. Silent sound technology comes forward by
using Electromyography (EMG) and Ultrasound SSI methods.
This technology works with 99% efficiency, and will be seen in the
market in another 5-10 years and once launched it will have a
drastic effect and with no doubt it will be widely used.
|
Download
|
111 |
Web Facial Images for Search Based Face Annotation
and Facial Gesture Detection
B. Indumathy, G. Mathurambigai
Abstract—In this popular World, High Mega pixel
cameras and the development of tools in media for
internet-based photo sharing have witnessed an
explosion of the vast number of digitalized photos which
are clicked and stored by consumers. A Huge part of
photos shared by users in the web are human images
mainly their faces. Many of these images were tagged
with names, but some of this were not tagged properly.
|
Download
|
112 |
Arranging a Communal of MapReduce Jobs for
Minimizing Their Makespan
S Jasmine, S Pandiaraj
Abstract—The main aim of this paper is to increase the utilization
of MapReduce clusters to minimize their cost. Cloud computing
offers option for business to rent MapReduce cluster in a suitable
size, consume resources as a service, etc. and pay only for that
particular resources which they have used. A separate analysis
for evaluating performance benefits can be done on a set of
MapReduce jobs that are executed periodically on fresh data's.
We observe that the order in which these jobs are executed can
have a significant impact on their overall completion time as well
as cluster resource utilization. Our objective is to automate the
design of a job schedule that minimizes the completion time on
such a set of MapReduce jobs. We introduce a simple technique
where each MapReduce jobs are represented as a pair of map
and reduce stage durations.
|
Download
|
113 |
Low Power Critical Path Delay Design Using Reversible
Logic Gates
V.Kavitha, R.Yamini, S.Sarmila, Anila Ramachandran
Abstract—It has been proposed to design data path with low
area. The basic gates such as AND, OR, and EXOR are not
reversible. This paper presents various designs of reversible
logic gates used for reversible operation & the applications as
carry bypass and select adder Block. These gates are then
used to design four bit Carry bypass and select Adder blocks.
Toffoli gate is much better in terms of low power dissipation.
|
Download
|
114 |
Sustaining Privacy Protection in Personalized Web
Search with Temporal Behavior
Dinesh.R, Deepa.M, Naveen.R, Naveenkumar.M
Abstract—The web search engine has long become the
most important portal for ordinary people looking for
useful information on the web. Users might
experience failure when search engines return
irrelevant results that do not meet their real
intensions. Such irrelevance is largely due to the
enormous variety of users’ contexts and backgrounds,
as well as the vagueness of texts. Personalized web
search (PWS) is a general category of search
techniques aiming at providing better search results,
which are constructed for individual user needs. User
has to collect the information and analyzed to figure
out the user intension behind the issued query. Model
user preferences as hierarchical user profiles.
|
Download
|
115 |
Power Loss Minimization Using PSO & VPSO of A
Transmission Line after Placing TCSC
Neha Jain, Aarti Bhandarkar
Abstract—In this paper PSO-based optimal power flow is proposed
on IEEE 30-Bus system. First we have taken IEEE 30 Bus,
optimized it by TCSC and checked Voltage Profile, and then PSO
is implemented on it for minimized active power. Finally
Vectorized PSO (VPSO) is applied for further improvement. PSO
based optimization has been done after, optimally placing TCSC.
A 30-bus power system was considered as a test case for
benchmarking. For Further implementation test data is used with
both the algorithms PSO and VPSO. Results shows 0.9 %
improvement with PSO (70 Iterations) and 0.8 % improvement
with VPSO (40 Iterations) in active power losses, hence overall
improvement is 1.7 % reduction in losses.
|
Download
|
116 |
MSK using OQPSK Implementation of IEEE 802.15.4
ZigBee for Throughput Calculation
Deepti Yadav, Pankaj Sahu
Abstract—ZigBee technology was developed for special wireless
networks where Bluetooth & Wi-Fi technologies are not
showing where we need to transmit low data rate information
in comparatively large area (10-100 m) [1]. We can use ZigBee
transceiver system instead of other technologies. In this paper
we have implemented Mesh topology for ZigBee. Bit Error
Rate by using OQPSK modulation is implemented & compared
with MSK modulation. Results shows BER for MSK is better
than OQPSK. PER is also calculated. In this paper, the design
methodology and simulations of ZigBee / IEEE 802.15.4 has been done by using MATLAB.
|
Download
|
117 |
Design & Simulation of Residential Grid Connected PV
system with Im proved P & O MPPT Technique
Monica Gupta, Dr. R.P. Bhatele
Abstract—This paper deals with design of a grid connected PV
system with MPP technique modified Perturb and Observe
technique which is the most suitable for grid connected
systems. This paper presents the modelling of a Photovoltaic
cell, Boost dc to dc converter, dc to ac inverter and
simulation study of a grid connected PV system. In this paper
various design strategies for grid connected PV systems with
MPPT has been implemented and a design for new grid
connected 6 cell PV systems with MPPT is proposed. Various
design parameters are calculated for MATLAB/SIMULINK
model.
|
Download
|
118 |
Modelling and Analysis of MPPT Techniques for Grid
Connected PV Systems
Monica Gupta, Dr. R.P. Bhatele
Abstract—This paper evaluates the most commonly used MPPT
techniques and finds which MPPT technique is most suitable
for grid connected systems. This paper presents the modelling
of a Photovoltaic cell, dc to dc converter, and simulation study
of a grid connected PV system. In this paper various design
strategies for grid connected PV systems with MPPT has been
surveyed and a design for new grid connected PV systems with
MPPT is proposed.
|
Download
|
119 |
Automatic License Plate Detection and Recognition
Using Neural Network
Pragya Bagwari, Swapnil Bagwari, Sumit Pundir
Abstract—Automatic Number Plate Recognition (ANPR)
is an image-processing technology and an important field
of research that identifies vehicles by their number
plates in which the number plate information is
extracted from vehicle's image. In order to reduce
problems such as low quality and low contrast in the
vehicle images, image recognition is done by the two
different methods first is OCR without neural network
and another is OCR in which the backend is neural
network and the best one is selected. ANPR consists of 4
phases: Pre-processing, number plate extraction,
character segmentation, character recognition. The
objective of this research is to explore the potential of
using the neural network for number- plate reading.
Experiments have been conducted for this algorithm,
and 150 images taken from various scenes were
employed, including diverse angles and different
lightening conditions. The algorithm based on neural
network which can quickly and correctly detect the
region of license plate and the license plate detecting rate
of success is 98.78%.
|
Download
|
120 |
Coding Formulation and Power Control for State Estimation
with Wireless Sensor Networks
Preethi k, Sivanranjani M, Gnanavel S
Abstract—The idea behind MDC is to create separate descriptions,
which are individually capable of reproducing a source to a specified
accuracy and, when combined, are able to refine each other [6]. For
that purpose, when using MDC, the source vector ym(k) is mapped
to Jm(k) descriptions sim(k) i ∈ {1, . . . , Jm(k)}that are
independently entropy coded and transmitted separately to the GW.
|
Download
|
121 |
Analysing Sentimental
Influence of Posts on Twitter Data
B.PremKumar, K.Varalakshmi
Abstract—The basic task in sentiment analysis is to
classify the sentiment of an input text at the document
whether the expressed comment/review is positive,
negative or neutral. It collects useful information from
the twitter website and efficiently perform sentiment
analysis of tweets.This is useful for customers who want
to research the popularity of products, or companies to
know about the reach of the product. The training data
consists of twitter messages obtained through Twitter
API. Naive Bayesian classifier is used to classify the
tweets which can achieve high accuracy when trained
using the feature vector and the publicly available
dataset. This paper also describes the preprocessing
steps of the dataset needed in order to get better results.
The main feature of this paper is the novel feature
vector of weighted unigrams.
|
Download
|
122 |
A Web Based Industrial Automation by Using
Android Application
Siraj.P.A, Dr Marimuthu C.N, G.Prabhakaran
Abstract—Household appliance control using cell
phone through global system for mobile
communication (GSM) technology is common in
nowadays. The cellular communications is essential
for such remote controlling activities. SMS (short
message service) technology can be used to control
household appliances from distance. In industrial
sector the automation is only for a particular device.
So one cannot have an access to the entire industry.
In this situation the work presented here is a solution
to the current system. The presented project builds
an application and also has a direct connection to the
World Wide Web. This allows one to work from away
by using smart phone and internet. It can be made
online for 24 hours surveillance and backing up of
activities happening inside the industry.
|
Download
|
123 |
Compressive Data Aggregation gathering Energy
Efficient for Wireless Sensor Network
M.Karkuzhali, V.Sridevi
Abstract—A clustering method that uses the hybrid
compressive sensing for sensor networks. The sensor
nodes are organized into clusters. Within a cluster,
nodes transmit data to the cluster head without using
compressive sensing. A data gathering tree spanning all
cluster heads is constructed to transmit data to the sink
by using the compressive sensing method. One
important issue for the hybrid method is to determine
how big a cluster. If the cluster size is too big, the
number of transmissions required to collect data from
sensor nodes within a cluster to the cluster head will be
very high. But the cluster size is too small, the number
of clusters will be large and the data gathering tree for
all cluster heads to transmit their collected data to the
sink will be large, which would lead to a large number
of transmissions by using the compressive sensing
method. In this regard, we first propose an analytical
model that studies the relationship between the size of
clusters and number of transmissions in the hybrid
compressive sensing method, aiming at finding the
optimal size of clusters that can lead to minimum
number of transmissions. And then we centralized
LEACH algorithm based on the results obtained from
the analytical model. Finally we present a distributed
implementation of the clustering method. Distributed
method is efficient in terms of the low communication
cost and effective in reducing the number of
transmissions.
|
Download
|
124 |
An Energy Balanced Routing Method Based On
Improved Forward Factor for Wireless Sensor
Network
P.Marimuthu
Abstract—It is well known that wireless sensor networks
(WSNs) is a self-organization wireless network system
constituted by numbers of energy-limited micro sensors
under the banner of industrial application (IA). Due to
limited energy and communication ability of sensor
nodes, it seems especially important to design a routing
protocol for WSNs so that sensing data can be
transmitted to the receiver effectively. They quantify
the forward transmission area, define forward energy
density, which constitutes forward-aware factor with
link weight, and propose a new energy-balance routing
protocol based on forward-aware factor, thus balancing
the energy consumption and prolonging the function
lifetime. The cluster head selection is done based on the
forward aware factor and received signal strength.
Furthermore, a spontaneous reconstruction mechanism
for local topology is designed additionally. We analyses
the result in NS2 simulator to increase the network life
time and avoid energy consumption for retransmission
of data in the network and latency.
|
Download
|
125 |
A pair-wise key generation for higher key
rate in multiple antennas
S.Suganthi, A. Malathi, D. Rajini Girinath
Abstract—Most of the key generation in wireless fading channels
requires a direct wireless link between genuine users so that they
can obtain interrelated observations from the mutual wireless
link. But in the proposed model the key generation problem in
the two-way relay channel, requires no direct channel between
the key generating terminals. The relay first establishes a pairwise
key by using channel link. Higher rated key is generated by
using an effective key generation scheme, so that the active
attackers do not know any information and it helps in achieving
a substantially larger key rate than that of a direct channel
mimic methodology. In addition to provide better security the
effects of an active attacker is considered for the key generation
protocol. Likewise, the establishments of maximal attacker’s
power under which the proposed scheme can still attain a
nonzero key rate.
|
Download
|
126 |
Permission Checks On Large Scale Android
Framework
K.Vasandkumar, G.K.Sandhia
Abstract—The security and integrity on Android is
maintained with the help of permissions to the resources
of Android Smartphone which has to be mentioned
explicitly by an application defined by its developer.
These permissions has to be reviewed by users before
granting the permission upon installing the applications
in their smartphone. Applications are limited with
access to the resources only which they have requested
permissions for and which are granted by users already
at the time of installation. If the application has more
permission granted than what they actually need, then
that might lead to probable malicious attacks or
intrusions. Android itself is based on a permissionbased
security framework where the methods and its
respective permissions has to be stated precisely by the
developer at the time of developing the application.
These methods and permission has to be mapped for
proper analysis on such framework which is of large
scale. An advanced class-hierarchy analysis is done to
extract the mapping of methods and permissions. The
extracted mapping is used to determine the permission
gap in the applications with both the under or overestimated
permissions in consideration. Early mapping
and determination of permission gap leads to a more
secure and fully functioning application.
|
Download
|
127 |
Relationship between Various Dimensions Of
Occupational Stress and Teacher Effectiveness among
Secondary School Teachers
Amit Kauts, Vijay Kumar Chechi
Abstract—The present study aims at studying the relationship
between various dimensions of occupational stress and teacher
effectiveness of among teachers working in secondary schools of
Jalandhar and Ludhiana districts of Punjab, India. The study
ought to bring to focus the role of occupational stress in the
effectiveness of teachers. It helps to understand and frame
remedial policies to reduce the occupational stress among
teachers. Using a multi-stage random sampling method, a
sample volume of 739 teachers was determined. Two main
instruments were used to measure the study variables: a 60-item
Occupational Role Questionnaire from Occupational Stress
Inventory Revised (OSI-R) by Samuel H Osipow, 1998 on
occupational stress (six scale: Role Overload, Role Insufficiency,
Role ambiguity, Role Boundary, Responsibility, and Physical
Environment, and a 60-item Teacher Effectiveness Scale by
Kumar and Mutha, 1985. The pearson product moment
correlation was used to establish the relationship. The study
results revealed that (a) stress contributes negatively on the
teaching effectiveness; (b) the teachers in general and
particularly high age teachers & those working in government
schools perceive that they are not able to cope up with the
workloads; (c) they become ineffective in performing the duties
of the teacher; experience and qualification does not have an
influence on relationship between teaching effectiveness and
occupational stress. The findings concludes that teachers are
stressed and it is adversely affecting their teaching effectiveness
and their overall well being, a loss that results in added costs in
training and hiring for the field of education. The government
authorities in particular shall take steps to minimize the
workload of the teachers and plan for in-service trainings at
proper intervals to take care of pre requisites for changes in
curriculum.
|
Download
|
128 |
Self-Localized Small-Sized Ground Robotic Vehicles
Devapatla Harini
Abstract—When a vehicle is performing
autonomous tasks whether it may in indoor
environment or outdoor environment it is needed
to find the real time location of the vehicle. We
are proposing and implementing a technique Self
Localized Small- Sized Ground Robotic Vehicles
which gives accurate real-time 3D positions in
any type of environments. Like other location
finding schemes it does not require any external
references, costly hardware, strict calibration,
and it is able to operate under various types of
environments. It finds the local relative
movement by a set of integrated inexpensive
sensors and by using infrequent GPSaugmentation
it corrects the localization drift.
|
Download
|
129 |
Improving Secure Data Communication in the Trusted
Environment
B. Vidhya, Mary Joseph, D. Rajini Girinath, A. Malathi
Abstract—Wireless Sensor Network (WSN) have been deployed
in many important applications like Military, civilian and
industrial applications. The major threat to WSN is security.
Securing the data transfer in the trusted environment ensures
that data completeness and integrity to be maintained
thoroughly. To secure the data from adversary, several
techniques have been proposed and that data needs to be
transferred to the destination without any modification. Data
integrity and completeness is the key for exchanging the data in
WSN communication medium. Top-k query mechanism has been
used to identify the major areas which were impacted by the
adversary. The proposed approaches which are suitable for
validating the data are aggregate signature, elliptic curve
encryption for encrypting and decrypting the content. The
techniques implemented are well suited to transfer the details in
WSN.
curriculum.
|
Download
|
130 |
A Novel Biometric Recognition Using Sclera Vein and
Finger Vein Fusion
Dharisanapriya.R, Rukumani khandhan.C
Abstract—Biometric recognition techniques are mainly used for
human identification and authentication. A comprehensive
approach for multi biometric recognition is designed by fusion of
finger vein and sclera vein. Sclera vein and finger vein is a new
parallel vein recognition method using a two-stage parallel
approach for registration and matching. The proposed method
can achieve dramatic processing speed improvement without
compromising the recognition accuracy. The proposed approach
combines finger vein approach and sclera vein approach. The
frequency based approach is used to achieve the combination of
both approaches which is based on identical biometric vector.
Two new score-level combinations, holistic and nonlinear fusion
is to be developed and investigated, then comparatively evaluate
with more popular score-level fusion approaches to ascertain
their effectiveness in the proposed system. The process offers a
state-of-the-art advancement of multi biometrics, offering an
original view point on features fusion. Consecutively, a
hamming-distance-based matching algorithm deals with the
combined homogenous biometric vector. Thus, the multimodal
system achieves interesting results with several commonly used
databases.
|
Download
|
131 |
Secured Energy Aware Route Discovery Using Neighbour
Verification Path Quality Protocol in Manet
Keerthana.M.S, Poornima.R
Abstract—A mobile ad hoc network is an autonomous collection
of mobile devices (laptops, smart phones, sensors, etc.) which
communicate with each other over wireless links and cooperate
in a distributed manner in order to provide the network
functionality. In the type of network, it is operating as a standalone
network or with one or multiple points of attachment to
cellular networks or the Internet, paves the way for numerous
new and exciting applications. Application scenarios include, but
are not limited to: emergency and rescue operations, conference
or campus settings, car networks, personal networking, etc.
Nodes are mobile, topology can be very dynamic. Nodes must be
able to relay traffic on communicating nodes might be out of
range. A MANET can be a standalone network or it can be
connected to the external networks (Internet).
|
Download
|
132 |
An Architecture model for smart city using Internet of
Things
K.Priyanka, P.Suji, R.Rajasekar
Abstract—The Emerging Internet Of Things (Iot) That
Effectively Integrates Computational Elements Controlling
Physical Entities To Create Smart Environments Will
Undoubtedly Have Excessive Amount Of Applications In The
Near Future. Meanwhile, It Is Also The Key Technological
Enables To Create Smart Cities, Which Will Provide Great
Benefits To Our Society. In This Paper, Four Different Iot
Network Architectures Of Various Smart City Applications Are
Presented And Their Corresponding Networks Quality Of
Service (Qos) Requirements Are Defined. A New Network
Paradigm, Participatory Sensing, Is Thus Discussed As A Special
Case.
|
Download
|
133 |
Survey on Cost Cut down in Cloud Computing
Sathya Sofia.A, Ganesh Kumar.P
Abstract—Businesses that are just entering the cloud
computing field would do well to rely on cloud
financial management services to get a broad
overview of the costs involved in the cloud. Many
such services offer an estimate of the possible
expenditure the company could incur on deploying
resources to public, private and hybrid clouds, as well
as those of maintaining an IT team. This information
would eventually help companies choose the most
cost-effective option for them. Data centers hosting
Cloud applications consume huge amounts of
electrical energy contributing to high operational
costs and carbon footprints to the environment.
Therefore, we need Green Cloud computing solutions
that can not only minimize operational costs but also
reduce the environmental impact. In this paper,
various cost efficient methods of cloud computing is
discussed.
|
Download
|
134 |
Application of Adaptive Filter in Noise Cancellation
System Using Least Mean Square Algorithm
R.Shofia Preethi, T.Jayachandran
Abstract—Adaptive filtering is a wide area of researcher in
present decade in the field of communication. The LMS
algorithm is the most popular method for adapting a filter.
The Least Mean Square adaptive filter is used here to
reduce area-delay product, power-delay product and this
paper also deals with cancellation of noise on speech signal
using least mean square (LMS) algorithm. As received
signal is continuously corrupted by noise where both
received signal and noise signal both changes continuously,
then this arise the need of adaptive filtering.
|
Download
|