IJAIR- Volume 4 Issue 7 (July 2015)

 


Sr/No/ Title Pdf
1 A review on performance characteristics Of draft tube of mixed flow hydraulic turbine
Vandana Chakrwarti, Anshul Choudhary

Abstract —This paper summarizes the field of draft tube including recent improvements and applications to the power generation processes. In this context, a focus was put on the draft tube inlet flow conditions, geometry of draft tube as well as various parameters that affect the draft tube working conditions.

Download
2 Design of parallel combination of AES, DES and blowfish Encryption for Very High Secure Communication
Apoorva Nayak, Sapana Choudhry

Abstract—AES, DES and Blowfish are the three major techniques available for data encryption. Our aims is to develop all existing designs and observe their performance and to compare them also to develop a high speed parallel combination of AES and blowfish (ABPES) like merging two techniques so to have best parameters in terms of overall throughput, the total avalanche the data conversion rate so that the design can be used as a cryptographic coprocessor in high speed network applications. The work is to design an optimised solution for secure data communication ABPES (advance blowfish parallel Encryption system) as a new standard encryption technique which will be more optimised solution for the same when the data conversion time and encryption time considers as design parameters.

Download
3 Image Encryption with DWT for Secure Data Communication
Nilesh Tiwari, Urooz jabeen

Abstract—Steganography is a type of security technique in obscurity; the art and science of hiding the available of a message between sender and intended recipient. But the techniques that are been developed in the area are based of complex and pattern based data hiding in pixels of images, later on key based approaches are also been developed, later on many combination (two different approaches cryptography and steganography working together) based method been developed. The proposed work is new concept for steganography that is analytical cum pattern based Image steganography the proposed method is been developed for achieving very high SNR and low MSE even if the size of original is less, actually the only problem with steganography is that it requires lots of data ( a full image) for transmitting few original data, so proposed work aims to reduce the size of image while maintaining the size of original data same. Proposed paper is a unique DWT and SVD based method for steganography.

Download
4 Bridge Design between Wi-Fi and Bluetooth with High Throughput
Shikha meshram, Santosh chouhan

Abstract—The performance of an overlay Bluetooth and IEEE 802.11b (WiFi) network is considered in terms of packet latency, packet error rate and throughput, in the presence of a vertical handover procedure. The objective of the overlay network is to maximize the quality of service (QoS), giving to a mobile user the possibility to switch from a network to the other, with the so-called vertical handover. The vertical handover is activated by the crossing of thresholds determined according to the user’s profile, which comprises objective values for the main QoS parameters, such as the packet error rate and the packet delay. The performance of the network is evaluated taking into account the mutual Bluetooth– WiFi interference and showing the influence of the main parameters of the network and of the handover procedure. This paper proposes a new user algorithm for handover between Bluetooth and Wifi, which combines a trigger to continuously maintain the connection and another one to maximize the user throughput. Moreover, we detail the implementation of that algorithm follow packet content transfer method and session transfer among heterogeneous deployment.


Download
5 OFDM for Inter-carrier Interference Reduction using Modified Self Cancellation Technique
Trisha Bhattacharjee, Shadma Pragi

Abstract-Orthogonal frequency division multiplexing (OFDM) is considered as a one of the best modulation schemes in wireless communications. However, OFDM suffers from the sensitivity to frequency offset. This frequency offset introduces the problem of inter-carrier interference (ICI) in OFDM system. This paper presents a new self cancellation technique (modified self cancellation technique) using the self cancellation technique with zero – gab. In terms of carrier-tointerference ratio (CIR) and bit-error rate (BER) the modified self cancellation technique gives good results compared to that using only the conventional self cancellation technique.

Download
6 Analysis of Cavitation in Pipe Flow Using CFD
Girraj sharma, M.K.agrawal

Abstract -In the industry work and every places cavitation is major problem. Cavitation is an undesirable phenomenon in the pipe layout designing, because it causes the damage of pipe which increases maintenance cost of industries. In the pipe flow, Pressure variation may occur at any region which leads to cavitation’s on pipe surface. In the present work CFD analysis has been carried out to study the cavitation’s inception for sudden reduction in cross-sectional area of pipe, Pressure, Temperature & Fluid properties. The results of the CFD simulations showed that cavitation decreases when local pressure increases and temperature decreases. It was also found that when the salinity in water increases. The reduction in cavitation was observed due to increases fluid density and viscosity.

Download
7 Semi Supervised Consensus Clustering On Gene Expression Micro Array Data Using Proximity Measures
Mahima KM, Neethu S

Abstract-Cluster examination is sometimes the primary step adopted to reveal facts from gene expression microarray data. Besides choosing a cluster algorithmic program, selecting an applicable proximity measure is of boundless importance to attain satisfactory cluster results. Within the existing system, new methodology, known as Intrinsic Biological Separation Ability (IBSA) is introduced for Clustering Gene Expression Microarray Data which may measure the contract of a proximity measure with relation to biological information extracted from the Gene Ontology (GO). With the connotation of improving the robustness, quality and accuracy of the system, an approach known as “Semi-Supervised agreement Clustering” is projected. Consensus clustering that is moreover called aggregation of cluster will alter disseminated and numerous information sources and builds use of multiple cluster criteria. Incorporating previous information in cluster method (semi supervised clustering) has been shown to boost the reliability between data partitioning and domain information. Semi-supervised consensus cluster (SSCC) algorithm integrates the consensus cluster with semi-supervised cluster for evaluating gene expression data that is an optimum methodology for raising the performance. From the experimental result it is able to conclude that our projected system yields higher cluster performance than existing scenario.

Download
8 Achieving Scalable and reliable multicasting in DTNS through ECSRM and Optimal Policies
M.SanghamitraDevi, D.Rammohan Reddy, Y.padma

Abstract-In order to achieve optimal transmission of packets in DTN it is challenging, because in DTN’s routes must be found over multiple unreliable, timeto- time-connected hops. This fundamental challenge has been investigated. In this paper we propose Erasure Correcting Scalable Reliable Multicast, ECSRM and WC-policies.1) Erasure/Errorcorrection and NACK-suppression for reliable multicast scalability.2) WC-policies-through which we can achieve optimal transmission.

Download
9 Implementation of Environment Monitoring and Device Control Using Arm Based Embedded Controlled Sensor Network
Gandham Srisatya Gowry

Abstract-Embedded controlled detector network is that the technology needs to implement environmental solutions effectively. Many researchers are creating makes an attempt to develop the embedded controlled device network. The present systems square measure large, terribly pricey and tough to take care of. The planned system is value effective and embedded systems within the planned system. ARM primarily based microcontroller and wireless sensors want to management the assorted devices and to watch the knowledge concerning the atmosphere exploitation zig bee. In the proposed system ARM based microcontroller and wireless sensors are used to control the various devices and to monitor the information regarding the environment using Zig bee and GSM technologies.

Download
10 GIS based Consumer Indexing and loss evaluation – A case study for Sihora Town
Jasvinder Kaur Saluja, A. K. Tiwari, M. R. Vaidya

Abstract─ This paper analyses the present scenario of power distribution systems and role of GIS in accelerating power sector reforms to restore commercial and financial viability of power distribution by uplifting and strengthening it. Consumer indexing in distribution network at Sihora town near Jabalpur using Geographical Positioning System ( GPS) and putting the data in GIS using ArcGis 9.1 software to create an authentic database of all consumers, has been discussed. All company assets, namely, Transformers, Poles, feeders, distributors and conductor etc. have also been mapped. GIS has potential to make the “ Power Sector Reforms” process, a grand success in fields like, metering, billing, revenue collection, elimination of overloading of feeders and transformers and improved decision making through MIS.

Download
11 Image Super Resolution Model Using Fuzzy Rule
T.V.Hymalakshmi, M.Praveen kumar

Abstract -A novel high-quality image zooming technique using fuzzy rule was proposed in this paper. The fundamental idea is based on that a low-resolution (LR) image patch could be generated from any of the many possible high-resolution (HR) image patches. Therefore it would be natural to assign certain fuzziness to each of the possibilities of HR patches.

Download
12 Gaussian Kernel Fuzzy Statistical for Clustering in Multispectral Images
M.Indirani, Jisha.K.R. Chimmu, Karthikha

Abstract- Due to a high number of spectral channels and a large information quantity, multispectral remote sensing images are difficult to be classified with high accuracy and efficiency by conventional classification methods, particularly when training data are not available and when unsupervised clustering techniques should be considered for data analysis. In this paper, we propose a novel image clustering method [called GKFCM] which is based on a fuzzy Statistics to extract land-cover information in multispectral imagery. GKFCM is a clustering algorithm proposed recently in the literature, which exhibits a fast execution speed and finds clusters with small error, particularly for large datasets. Fuzzy statistics can get objective estimates of how closely two pixel vectors resemble each other. The proposed method simultaneously considers all data points to be equally suitable as initial exemplars, thus reducing the dependence of the final clustering from the initialization. Results obtained for the different of multispectral images in the different dataset collection.

Download
13 Design and Simulation of FFT Algorithm for OFDM Transceivers
Deepak Rawat, Vikash Sharma, Mukesh C. Kestwal

Abstract— The current trends in wireless industry are based on multi-carrier transmission technique such as Orthogonal Frequency Division Multiplexing (OFDM). IEEE 802.11a/g/n, IEEE 802.16e and many others use the variation of OFDM, such as OFDMA and MIMO-OFDM. This paper investigates the Bit error rate using both FFT block & Optimized HDL FFT block, by using 64 Bit QAM Modulation and demodulation techniques, and the experimental results of the design are presented using MATLAB.

Download
14 Using grey relational Analysis to design and optimization of process parameters effecting TIG welded Aluminium alloy 6082
T. Venkateswarlu, B. Venkata Narayana

Abstract— In many industrial applications steel is readily replaced by nonferrous alloys, in most of the cases with aluminium alloys. Since Aluminium alloys have good mechanical strength which is comparable with structural steel, light in weight that allows a significant reduction in weight, good corrosion resistance and weld ability. Generally in aluminium alloy series 6061 is widely used but now a days it is replaced by 6082 due to its inherent properties. Among the Aluminium alloy 6000series, 6082 has high strength. Hence alloy 6082 is known as structural alloy and with excellent corrosion resistance. Mostly aluminium alloys are welded by using TIG welding. But the operator doing the welding doesn’t know where the optimum welding was obtained with suitable parameters affecting the welding. In this research work an attempt has been made to develop an empirical relationship between TIG welding variables and the mechanical properties (tensile strength, hardness) of TIG welded aluminium alloy 6082-T4. The mechanical properties were determined from GREY relational analysis, which can provide an optimum solution to the system.

Download
15 A Review on Different Steganographic Techniques Used for Information Hiding
Nilam C.Patil, V.V.Patil

Abstract— Now a days, with the rapid development of internet and communication technology, protect transmitted information becomes an important issue. Many researches work to resolve these problems, they proposed techniques that provide the security and confidential of secret data. In recent years, various steganography techniques are developed and applied to protect the transmission of hidden confidential information in a cover image. In image steganography, secrecy is achieved by embedding data into cover image and generating a stego-image. In this paper, we survey many different hiding techniques through which we can easily hide or transfer our important documents.

Download
16 DTMF Based Cell Phone Operated Land Rover
B.Mahesh, K.Bharathikannan, T.Venkatesh

Abstract— Most probably they are remote controlled (either IR or RF) or they may be automatic guided vehicles (AGV). This device is also remote controlled land rover but as a remote control one can use his cell phone that means he can move the land rover by sending different commands from his cell phone, not only that, he can control it from anywhere in the world (of course where GSM / CDMA network is available). Also this technology does not require the vehicle to be limited by the length of the cable or in direct line of sight with controller (as with infrared set up) and also well known BLUETOOTH is still expensive and short range to be commercially viable. We did a massive field work before starting this project and we found that this device provides a nice platform to be used in the field of surveillance, scientific research, and of course in search and rescue operation.

Download
17 MANET Network with GRP Routing Protocol
Jasleen Kaur, Farminder Singh, Ankur Thakur

Abstract-Ad-hoc networks are a new paradigm of wireless communication for mobile hosts where node mobility causes frequent changes in topology. Ad hoc networks are self-configurable and autonomous systems consisting of routers and hosts, which are able to support movability and organize themselves arbitrarily. Moreover, other characteristics such as frequent changes of the topology, nodes limitations like energy resource, storage device, CPU and communication channel limitations like bandwidth, reliability add extra challenges. Mobile ad hoc networks aimed to propose solutions to some fundamental problems, such as routing, coping with the new challenges caused by networks and nodes features without taking the security issues into account. Hence, all these solutions are vulnerable to threats. Any node under attack in ad hoc network exhibits an anomalous behaviour called the malicious behaviour.

Download
18 An Empirical Analysis of Events / Situations Which Leads to Stress and its Significant Impact on Personal and Professional Life of Mumbai Police Force (MPF)
Jai Singh Chandramani, Chandrahauns R.Chavan

Abstract— In this paper the researcher identified the events / situations which leads to stress among Mumbai Police Force (MPF). The researcher personally collected the data through structured questionnaire from Mumbai and Suburban at constable, head constable, Police Sub Inspector, and Inspector levels. During the research study, the researcher identifies the number of situations / events which leads to causes of stress among Mumbai Police Force, which are stated that outdated promotional system, extended duty hours, internal investigation, biased media, superior’s behaviors, and political interference etc. The researcher collected the statistics of these all situation / events which have significant impact on personal and professional life of Mumbai Police Force (MPF).

Download
19 Study of Stress among Mumbai Police Force and Its Impact on Their Personal and Professional Life
Jai Singh Chandramani, Chandrahauns R.Chavan

Abstract-This is research paper is based on organizational stressors are also called as job related stressors. Some of the important job related causes of stress are as follows Role conflict, Role ambiguity, Organizational structure, Working conditions, Rotating shifts, Work overload, Work under load , Lack of participation in Decision making, Organizational leadership, Poor performance of the organization. The stress can have effect on the individual, the group, organization and even the family members. The degree of effect depends upon: Duration – The length of period of stress, Strength - The degree of stress, Individual Characteristics – Physical and psychological features to cope up with stress. Normally, prolonged exposure to stressful produces serious physical, psychological and behavioral effects. The effects of stress are as follows: Effects on physical health, Psychological health, and Alcoholism and drug addiction, Burnout, Effect of stress on organization behavior. The researcher tried to cover all aspect of the research study to emphasized that the impact of research among Mumbai Police Force‘s personnel and professional life.

Download
20 Research Article: Cardiff’s Repair of Vertical Laparotomy Wound
Rajesh Narayan

Abstract- Wound dehiscence is a postoperative complication encountered following adnominal surgery. A prospective randomized study was conducted to compare the incidence of wound dehiscence with a delayed absorbable and a nonabsorbable suture material in the mass closure for vertical laparotomy wounds by Cardiff repair.

Download
21 Original Article: Decoding Fournier’s Gangrene: 10 Years Bihar Experience
Rajesh Narayan

Abstract-Fournier’s gangrene is a fulminating form of infective necrotizing fasciitis of the perineal, genital or perianal regions which commonly affects men but can also occur in women and children. Case series have shown a mortality rate of 20% to 40% with an incidence of as high as 88% in some reports. This study was aimed to share my experience in the mangment of Fournier’s gangrene and to identify the risk factors that affect mortality.

Download
22 The Study of Effect of Temperature on Cavitation
Girraj sharma, M.K.agrawal

Abstract-Concerned in the industry work and every places cavitation is most important problem. Cavitation causes the injury of pipe which increases maintenance charge of industries. Temperature variation may occur at any region which leads to cavitations on pipe surface. This paper includes CFD analysis, which has been carried out to study the cavitation’s inception for sudden reduction in cross-sectional area of pipe & Temperature. The results of the CFD simulations showed that cavitation decreases when temperature decreases. To apply the effect of temperature the vaporization pressure of water has been taken from steam table with respect to water temperature.

Download
23 Fuzzy in Traffic Signal Control
M. Balkees, S. Durairaj

Abstract-Traffic signal control is one of the fields in which the application of fuzzy gives creditable results. Here a systematic approach to fuzzy traffic signal control is obtained by using the linguistic control rules. The traffic signal program is splitted into two separate units. First is the choice and sequencing of the signal stages to be used and the second is the optimization of this relative lengths of these stages. Here the rule bases for both the stages are described fully. The final results are promising implying the effectiveness over the past methods.

Download
24 A Survey on Image Fusion and its techniques
Suruchi Goyal, Rupinder Wahla

Abstract— Image fusion combines multiple images of the same scene into a single image which is suitable for human perception and practical applications .Image fusion is done to reduce amount of data, retain important information and to create new image that is more suitable for further processing tasks.

Download
25 Online Verification Signature on Touch Devices
Nikita Thawkar

Abstract -In this paper explains the significance of online systems and presents the survey of various approaches related to online signature confirmation systems. Extend this paper provides the relationships of those approaches along with characteristic used, to help the researchers working in this field. There are a variety of Biometric systems which help in personal identification, amongst that verification system; one system is signature verification system.

Download
26 Identification of Diabetic Maculopathy Stages Using Fundus Images
A.Hazarathaiah, S.K.Nadiya

Abstract—Diabetic retinopathy is one of the leading disabling chronic diseases, and one of the leading causes of preventable blindness in the world [1]. It is an ocular disease and progressive by nature. It is characterized by many pathologies, namely microaneurysms, hard exudates, soft exudates, hemorrhages, etc., among them presence of exudates is the prominent sign of nonproliferative DR [2]. Both hard and soft exudates play a vital role in grading DR into different stages. Hence classification of hard and soft exudates using k-means clustering plays a vital role [3]. But Digital Fundus Images has multiple contrast and illumination problems which makes enhancement a necessity. Consequently, DFI must be enhanced to allow for better visualization in order to facilitate ophthalmologists to carry out their diagnosis [4]. Finally, the exudates are classified as hard and soft exudates based on their edge energy and threshold.

Download
27 Time Motion Planning For Operational Control of an Automated Guided Vehicle in a Flexible Manufacturing System
Henrietta Udeani, Tochukwu Chiagunye, Chioma Oleka

Abstract—There is the necessity for more intelligent vehicles able to tackle problems being imposed with the demand for more effective, reliable, faster, collision and deadlock free and efficient Automated Guided Vehicle (AGVs) required for today’s flexible manufacturing system (FMS). This work Centered on flexible AGV system for FMS, which aim at resolving the complex issue concerning collision and deadlock avoidance with minimum time motion planning pertaining to operational control of AGVs in a flexible manufacturing system. Given a number of AGVs and a set of transportation request, the main problem tackled by this research is to frame an agent-neural network algorithm for scheduling and routing control of AGVs with a view to avoiding collisions and deadlocks and achieving minimum journey motion times in FMS. The model of the FMS for which control is being designed consists of multiple agents inside a factory floor.

Download
28 Modeling a Neural Network-Based Intelligent Flexible Manufacturing System using Automated Guided Vehicle Scheme
Henrietta Udeani, Tochukwu Chiagunye,Hyacinth Inyiama

Abstract—To achieve flexibility in manufacturing systems, the concept of an autonomous decentralized flexible manufacturing system (AD-FMS) is very vital. Agent technology supported by neural network form the basis of the computing structure that drives the design presented. Modeling a flexible manufacturing system consisting of machine cells, Automated Guided Vehicle guide path and shop floor control system was presented in this research. This is in order to analyze how implementation of the intelligent AGV control system can improve the efficiency of the FMS. Given a number of AGVs and a set of transportation request, the main problem tackled by this research was to frame an agent-neural network algorithm for scheduling and routing control of AGVs with a view to avoiding collisions and deadlocks and achieving minimum journey motion times in FMS.

Download
29 Automatic Speed Control of Vehicle Using Eye Blink Sensor
DeekshaV, BhupathiChinmayee, Keerthi G Reddy

Abstract—Driver fatigue resulting from sleep is an important factor in increasing number of accidents on today’s roads. In recent times drowsiness is one of the major causes for highway accidents. The drowsiness is identified by the eye blink closure and blinking frequency through infrared sensor worn by driver by means of spectacles frame. If the driver drowsiness is detected the driver seat is vibrated to alert the driver, gas leakage in the system is detected and alerted by voice. If the driver is drowsy, then the system will give buzzer signal and the speed of the vehicle is reduced and the obstacle sensor will senses the adjacent vehicle to avoid collision with that, and if there is no vehicle in left adjacent side then the vehicle move to the left end of the road by auto steering and controlling and vehicle will be parked with prior indications.

Download
30 Bike Info: Complete Description of Bikes in Indian Market Using Android
A Vinay Kumar

Abstract—Google already has its Android Market where applications are offered and, as happens with every popular media, is prone to misuse. The expansion of the mobile application market has made it difficult for smartphone users to find applications that fit their needs. A malware writer may insert a malicious application into this market without being noticed. Indeed, there are already several cases of Android malware within the Android Market. This paper provides the complete information of the bikes that are available in the market. This saves the time of the user and performance can be effectively measured.

Download
31 FPGA Implementation of Folded Architecture for Two Level (SISO/TITO/MIMO) DWT Architecture
G.Nagarjuna Reddy, K.Sambasiva Rao

Abstract—Images are to be transmitted without loss of information. That can be achieved by transforming using Discrete Wavelet Transform (DWT). The discrete wavelet transform (DWT) is being increasingly used for image coding. This is due to the fact that DWT supports features like progressive image transmission (by quality, by resolution), ease of transformed image manipulation, region of interest coding, etc.Hence, there is a need of design efficient & fast architecture for DWT. This paper is introducing an efficient architecture to enhance speed of DWT Computation. The Discrete Wavelet Transform (DWT) is based on time-scale representation, which provides efficient multiresolution. The introduced architecture increases levels ofDWT architecture to achieve lower computational complexity and reduced memory. As the DWT traditionally been implemented by convolution which demands both a large number of computations and a large storage features that are not desirable for either highspeed or low-power applications. This paper describes Lossless 2- D DWT (Discrete Wavelet Transform) using Lifting Scheme Architecture to reduce computational overheads. The behavior of designed DWT architecture is modeled using the Verilog HDL and functionality could be verified using the Modelsim simulation tool.

Download
32 VLSI Implementation of a Flexible and Synthesizable FFT Processor
G.Nagarjuna Reddy, K.Sambasiva Rao

Abstract— In this paper, we propose a portable hardware design that implements a Fast Fourier Transform oriented to its reusability as a core. The design has parameterized the number of samples and the number of the data’s bits. The module has been developed using radix-2 and radix-4 and radix-8 decimation in time algorithm of n-point samples. There exist Fast Fourier transform (FFT) algorithms, called dimensionless FFTs, is the work independent of dimension.

Download
33 Development of Pedestrian Level of Service Criteria for Urban Hilly Regions of India using K-means Clustering Technique
Ranjan Kumar Swain, Raman Parti

Abstract—The capability to measure the performance of a transportation framework could be a very important part in outlining these frameworks. Provisions of pedestrian facilities are not any special case and later numerous performance measures are created. Evaluations of pedestrian facilities are very important to ensure the significance of walkways for pedestrian travel, also helps in assessing the requirements of existing walkways for more development. Assessment of pedestrian Level of Service (LOS) is the widely known method to analyse the standard of operations of pedestrian facilities. The target of this study is to access the suitable approach to assess pedestrian LOS for urban hilly regions of Shimla and Mandi towns of India. Characterizing the level of service criteria for pedestrian walkways is basically clustering issues. Cluster analysis makes an array of objects based on the knowledge found within the data depicting their similarity. Three pedestrian service measures i.e. average pedestrian speed, average pedestrian space and flow rate has been analysed to develop pedestrian LOS. Finally, these service measures are characterised into six pedestrian LOS classes (A-F) that are having dissimilar ranges of values with the help of K-means clustering technique.

Download
34 Secure Access Control in Cloud Computing Using Adaptive Identity (Aid) Technique
P.Ramachandran, M.Rajeswari, M.Yuvapprriya

Abstract—Cloud computing is an emerging technology to integrate IT field. Here in this technology many public and private concerns want to store sensitive data with pay per on demand service. Using cloud service the customer can entrust and store their files and documents etc. But the main problem is security control because the third party user can access the data without permission. To overcome those problems in this work we propose Adaptive Identity technique with combination of Hierarchical Attribute Based Encryption technique. Also we add key revocation mechanism to enhance the security. This revocation method key value could be retrieved from user. It provides the constant security and restricts the third party illegal accessing of data owner outsourcing data. Finally the adaptive Identity concepts improve the security and successfully revoke the key values from the user effectively.

Download
35 Obtaining Efficiency in Delay and Area by Using DLMS Adaptive Filter
M.N.Sravani Reddy, K.Nagi Reddy

Abstract—This paper presents an efficient architecture for the implementation of a delayed least mean square Adaptive filter. For achieving lower adaptation-delay and area-delay- power, we use an novel partial product generator and propose an optimized balanced pipelining across the time-consuming combinational blocks of the structure [1]. From synthesis results, it is find that the proposed design with less area-delay product(ADP)and less energy delay product(EDP) than the best of the existing systolic structures, for various filter lengths [2]. We propose an efficient fixed-point implementation scheme in the proposed architecture. We present here the optimization of design to reduce the number of pipeline delays along with the area, sampling period, and energy consumption. The proposed design is found to be more efficient in terms of the power delay product (PDP) and energy delay product (EDP) compared to the existing structures.

Download
36 Secure Key Distribution in Cloud Environment during Information Sharing PDV
Madhuri makode, Sanjay Gupta

Abstract—Now a day Cloud computing is the hottest topic for the research work. Cloud computing is used widely in our daily life say for the example of cloud is Face book, Gmail, etc. some author say a cloud computing is used when we require its facilities. The Cloud Computing and its work simple working concept is Document, software, program, information etc. all are uploading in cloud server for sharing to other. These data are accesses by other user at any time or in any place in a very secure manner. In a simple word we can say that cloud stored data , information , is fetch by more than one user when they require .when document or information is store in cloud storage server or cloud data center. In This paper I am are proposed a new approach for key generation and key sharing in cloud environment for the Auditing task.

Download
37 FIR Filter Design Using CSD Technique
Apurva Gupta, Surender Kumar

Abstract—Now a day people prefer to use digital devices in day to day life instead of paper media for communication. Digital devices are easy to operate and handle as compared to paper media. For this design of low power signal processing circuit is an important part of the digital devices. All devices used for communication purposes consist of filters. A digital filter reduces the power consumption in the devices. In the presented work, it is proposed to design and analyze a FIR filter based on canonical signed digits in order to minimize the power consumption and fast implementation of the filter. The designed FIR filter is proposed to implement using SIMULINK tool and to be tested on high speed communication signal.

Download
38 Study on Flexural Behaviour of Fiber Reinforced Ferrocement Beams under Monotonic and Repeated Loading
Naveen G M, Madhusudhan C A, Shilp Rani

Abstract—Ferrocement is an environment friendly comprehensive technology and holds excellent unique properties such as good tensile strength, developed toughness, water tightness, lightness, fire resistance, resistance to cracking and cost, time and material effective construction technology. The present work is concentrated on two major aspects, (i) Effect of fibers on first crack & ultimate strength and (ii) Behavior of fibers reinforced ferrocement beams under Monotonic & Repeated flexural loading. The first part of the present study has been focused on the effect of fibers on First crack & Ultimate Strength with replacement of fibers by 0%, 0.5%, 1%&1.5% and second part of the work focusing the behavior of fiber reinforced ferrocement beams under monotonic & repeated loads with increased load. The results obtained from this work is expected to be useful in determining the strength and behaviour of fiber reinforced ferrocement beams subjected to similar types of forces and thus will help toward designing ferrocement beams to withstand monotonic and Repeated flexural loading.

Download
39 Optimize the Search Engine Using Web Ranking and Clustering
Nisha Sharma, Charanjit Singh

Abstract—Search engine is the term where researchers and developers take a broader view of IR systems, consumers think of them more in terms of what they want the systems to do — namely search the Web, or an intranet, or a database. Clustering helps in redundancy and fault tolerance by making sure that there is no single point of failure, require scalability.

Download
40 A survey on various Routing Protocol & Quality of services in MANET
Shikha Tuli, Farminder Singh, Ankur Thakur

Abstract—In recent years, a vast research has been seen going on in the field of Mobile Ad Hoc Networks (MANETs). Due to limited resources in MANETs, to design an efficient and reliable routing strategy is still a challenge. An intelligent routing strategy is required to efficiently use the limited resources. Also the algorithms designed for traditional wired networks such as linkstate or distance vector, does not scale well in wireless environment. Routing in MANETs is a challenging task and has received a tremendous amount of attention from researchers around the world. To overcome this problem a number of routing protocols have been developed and the number is still increasing day by day. It is quite difficult to determine which protocols may perform well under a number of different network scenarios such as network size and topology etc. In this paper we provide an overview of a wide range of the existing routing protocols with a particular focus on their characteristics and functionality. Also, the comparison is provided based on the routing methodologies and information used to make routing decisions. The performance of all the routing protocols is also discussed. Further this study will help the researchers to get an overview of the existing protocols and suggest which protocols may perform better with respect to varying network scenarios.

Download
41 Effect of Inducers and glucose repression on Phenol Degradation in Waste water Samples by Phanerochaete chrysosporium
Ben Manuel Choragudi, Mownica Vemuri, Prasad J.A.

Abstract— The cultivation of Phanerochaete chrysosporium for laccase and peroxidase production and cell growth are remarkably affected by experimental conditions namely physical and chemical parameters as well as nutrient availability and inducer stimulation. When it is used for the degradation of phenolics in waste water different growth conditions are investigated in the present and work.YMD medium in contrast to PDA medium was found to be suitable for luxuriant growth of the fungus. Biomass growth was compared for PDA medium and for YMD medium in two different temperatures. There was very little growth at 280C for both media tested and YMD at 370C showed the evidence of the highest growth. It was evident that production of the enzymes is independent of growth; these enzymes seem to be produced by a secondary metabolism. In order to obtain laccase and peroxidase induction, addition of solid lignin, lignosulphonates, veratryl alcohol, and ethanol was tested in the broth cultures containing 1% waste water. The combined effect of inducer addition and simultaneously glucose suppression on the development of enzymes and concomitant degradation of phenol was studied. The increase in laccase and peroxidase activities resulted in an enhanced degradation of phenol in the broth cultures. The best result for laccase induction (550 U/L) was obtained with solid lignin, a by-product of pulp and paper industry and this higher laccase activity attained was obtained with the combined effect of lignin addition and glucose suppression.

Download
42 Improvement in Voltage Sag in Distribution System Using DVR
Gagandeep Kaur, Amarjeetkaur

Abstract—Quality of power is one of important concerns in the present time. It has become important with the introduction of electronic devices, whose performance depends on quality of power supply. Power quality problem is a change in voltage, current or frequency standards that results in failure sensitive equipments. One of the major concerns of power quality is the voltage sag. To solve this problem, custom power devices are used. One of most effective devices is the Dynamic Voltage Restorer (DVR), which is the most efficient custom power device used in power distribution networks. Its appeal includes lower cost, smaller size, and its fast dynamic response to the disturbance. This paper includes analysis and simulation of a Dynamic Voltage Restorer (DVR) using Simulink MATLAB (2010). This model of DVR consists of PI controller, Discrete PWM pulse generator, dc voltage source and universal bridge.

Download
43 Manufacturing of Paver Blocks using fly ash and limestone Powder
Rajkumar Induria, Archana Tiwari

Abstract—Huge amount of fly ash is produced as industrial waste from coal fired thermal power plants. Benefits of using fly ash are greater strength, increased durability, decreased permeability, reduced alkali silica reactivity, efflorescence and heat of hydration. Now a day concrete paver block (CPB) has extensive application at airports, shopping malls, toll plazas, zoos, container depots, etc. (CPB) is a versatile, cost effective, attractive, functional and requires little or no maintenance if correctly manufactured and it has good interlocking properties with each others for laying on the surfaces. This paper reports the results of an experimental study conducted on paver block prepared by using fly ash and limestone powder with the aim to investigate its suitability. In this experimental study concrete paver block of I-shape is prepared by replacing 30% of cement by fly ash (FA) and limestone powder (LSP). Two proportions are tried. Physical properties investigated are -compressive strength of paver block at 7, 14 and 28 days and water absorption.

Download
44 Expansion of an Robust Multichannel Image Codec technique Using Fuzzy Relation Based JPEG2K
Atul Kumar Singh, Rohit Miri, Raju

Abstract—The ultimate growth of digital imaging applications, teleconferencing, high definition television (HDTV), hypermedia, and has amplified the necessity for active and standardized image codec techniques. Surrounded by the emerging standards JPEG and JPEG2K are for codec of still images. A mutual representative of most images is that they comprise some redundant information. Image codec is essential to reduce the number of bits needed to represent an image by eliminating the redundancies as much as possible. One of the supreme important techniques often used for still image codec in the present consequence is JPEG 2000(JPEG2K). The JPEG2000 is a single channel image codec technique, hence not clever to compress the multichannel images. On the other hand in the present age most of the still images are the multichannel similar RGB images. Yet there are particular techniques close for color image codec based on JPEG2K, but this pitch is still undeveloped for development of competent image codec techniques for color images. These paper boons a new system of employment of obtainable wavelet transform based image codec technique for color image codec using fuzzyfied discrete wavelet transform. Initial paper of Zadah on fuzzy, argued that fuzzy logic is an active tool for supervision imprecise and vague situations, hence merging of fuzzy rule base with discrete wavelet transform is the Competent way to attain advanced codec ratio with less error.

Download
45 Hinge Loss Technique to find decision surface for Nonlinearly separable data
G. Jaya Suma, A. Santipriya

Abstract— Support vector machines (SVM) are widely used for the classification and regression where it classifies data-objects based on the decision boundary defined by the hyperplane. The important major problem of SVM depends on selecting of decision boundary and reducing the support vectors so that it overcomes the over-fitting problems. This paper finds slack variables of linearly non-separable data by using soft margin SVM. Hinge loss method is used to deal with soft margin SVM with the given offset bias term along with the slope of the linear decision surface in order to find the slack variables for linearly non-separable data that reduces misclassification error rate. In this paper with emphasis on classification tasks using SVM, we propose supervised discretization based LIBSVM optimization technique. The experimental results show the efficiency of the proposed technique yields better accuracy when compared with the existing techniques.

Download
46 EAnalysis of Frequency and Voltage with Incremental Change in Load with PID Controller
Amarnath Mukherjee

Abstract— This paper deals with the classical method of reducing transients of load frequency of a single area power system. The load frequency of a single area power system is studied with and without Controller. In this paper the frequency deviation and terminal voltage response is calculated with PID Controller. For a practical single area power system the change in frequency response is studied for different change in load condition with and without controllers. The PID controller is properly tuned in such a way that it proved to be a better controller for change in frequency response. With PID Controller applied to single area power Systems the frequency transients are quenched at much faster rates without oscillations.

Download
47 Analysis of Azimuth and Elevation Patterns for Log Periodic Dipole Array in VHF range associated with two Satellites
K. Roy, A. B. Bhattacharya

Abstract—We have analyzed azimuth and elevation patterns for Log Periodic Dipole Array (LPDA) in VHF range at Kalyani, West Bengal for observing solar radio bursts. The structure is devised so as to make it an excellent wind proof system consisting of two logarithmic periodic dipole antennas which cross each other and are positioned in the north-south and east-west directions respectively. We have examined in details the alteration of vertical along with the horizontal azimuth patterns and gain for various frequencies. Besides the variation of elevation patterns at 163° and 167° azimuth along with gain for different frequencies have been analyzed.

Download
48 Enhancement of power flow and voltage stability in 6 bus system using Fact devices
APriyanka Raghuwanshi, Minal Tomar

Abstract—In modern power system voltage instability is the measure problem. To control this problem FACT devices are used to maintain voltage stability, power flow in transmission system. In This paper represent the maximum power flow at a given load and also obtain the voltage stability point by increasing the load. For this STATCOM, SVC, SSSC, UPFC are used to compare the better performance in 6 bus system. Results are obtained by matlab simulation technique.

Download
49 A Novel Study of Elevation Patterns for LPDA in VHF range correlated with three Satellites
K. Roy, A. B. Bhattacharya

Abstract—We have made an effort to examine the elevation patterns for a Log Periodic Dipole Array (LPDA) in VHF range (50 to 300 MHz) at Kalyani, West Bengal for monitoring solar bursts. The structure is composed of dual crossed logarithmic periodic dipole antennas, one of them placed in northsouth direction while the other laid in east-west direction. The structure is built so that it develops into a very good wind proof system. The variation of elevation pattern and gain associated to three significant satellites at 172°, 193° and 204° azimuth related to the frequencies of 50 to 300 MHz are analysed.

Download
50 Reliability Assessment of a Hybrid Power System using Aggregate and Non-Aggregate Markov Models
Paleti Shirisha, T. Kavitha Reddy

Abstract—Distributed Energy Resources such as Wind, Solar, Tidal, Biomass, Geothermal and Hydropower constitute a type of power generation and received much attention as alternatives for conventional power generation. Distributed Energy Resources (DER) will help to reduce the greenhouse gases emission. In this paper, focus is made on reliability assessment of Small Autonomous Hybrid Power System (SAHPS).SAHPS consists of 10-kW Wind Turbine Generator (WTG), 5-kW Solar Photo- Voltaic (PV) unit and 5-kW Pico-Hydro unit. Data Synthesizer software is used to determine the hourly wind speed, hourly solar irradiation, hourly water discharge and hourly load data from the monthly data of 1 year. Markov models for the WTG, PV, Pico-Hydro and system Load with transitions among all states and only among contiguous states are established. Aggregate Markov model is developed from the Markov models of distributed resources with transitions among all states and Non- Aggregate Markov model from the individual Markov models with transitions only among contiguous states. In this paper, reliability indices like Loss of Load Probability (LOLP), Loss of Load Frequency (LOLF), Loss of Load Expected (LOLE), Loss of Load Duration (LOLD), Expected Energy Not Supplied (EENS) and Energy Index of Reliability (EIR) are evaluated for Aggregate and Non-Aggregate Markov models whereas LOLP is only computed with optimal sizing of Distributed Generators in the literature using Genetic Algorithm. All the above analysis is carried out in MATLAB software environment. Results for Aggregate and Non-Aggregate Markov methods are presented and analyzed.

Download
51 Gesture Recognition for Patient Monitoring By Hidden Markov Models (Hmm)
Laxman Morya, R.P.Narvaria

Abstract—Facial expressions or gestures provide sensitive cues about emotion response and play a major role in the study of psychological phenomena and the development of nonverbal communication. Facial expressions regulate social behavior, signal communicative intent, and are related to speech production. Most facial expression recognition systems focus on only six basic expressions as suggested by FACS (facial action coding system) experts. The use of these gestures (facial expression) recognition systems can also be extended to the biomedical applications like patient monitoring which is very critical issue in a country like India where population runs to 100 billion. The facial gesture recognition system let us know about the condition of patient i.e. whether he/she is feeling distrust/pain. From past various other method like telemetry has been used in patient monitoring but the development of a computer vision system will prove as a crosscheck to these system and will also encourage human computer interaction(HCI).So, the objective of this is to develop a computer vision system, including both facial feature extraction and recognition, that automatically discriminates amount subtly different facial expression based on facial action coding system action units using hidden markov models(HMMs) and can be used for patient monitoring.

Download
52 Analysis of the Design and Performance of a Windproof LPDA in VHF range for detecting Solar Radio Bursts
K. Roy, A. B. Bhattacharya

Abstract—We have designed a Log Periodic Dipole Array (LPDA) at Kalyani, West Bengal in the Very High Frequency (VHF) range of 50 to 300 MHz. In this paper we are basically concerned with the design and functional attributes of the constructed antenna comprising of two intersected logarithmic periodic dipole antennas, situated in the north-south and eastwest directions respectively. We have attempted to design an LPDA that suits the conditions and specifications to the extent possible practically and opted for the value of spacing factor (σ) as 0.136 and scale factor (τ) as 0.78 to acquire our needed directivity of the antenna. The LPDA antenna has been developed based on the specified specifications and the values of scale factor and spacing factor. The LPDA is constructed by using two aluminum rods with nine elements of distinct sizes which achieves a moderate gain with low noise amplifier. A detailed design, analysis, and simulation of the log periodic antennas have been presented in this paper with some important results .From our analysis; we find that the LPDA is the simplest antenna with consistent bandwidth and moderate gain.

Download
53 Simulation of Near Field and Far Field Radiation Patterns of a Novel LPDA at VHF Band
K. Roy, A. B. Bhattacharya

Abstract—In the present paper the characteristics of the near and far field radiations of the Log Periodic Dipole Array antenna in the VHF range (50 MHz-300 MHz) have been examined and analysed. The Polar radiation patterns in the near and far field areas for various frequencies are computed as a function of angle. In near as well as in far fields the antenna is utilized to identify the radio frequency. The description and uses of Near-Field and Far-field has mainly been contemplated from the antenna measurement techniques. The study of the antenna in free space exhibits that the over estimation just takes place in the major lobe, whereas even underestimation can occur in all other directions. On regarding the consequences of other radiating elements in an array construction, it is seen that the effective near-field pattern of a single slot in the array is practicable. This field will be helpful in deduction of the effective far-field patterns of each and every array element consisting of the consequences of mutual coupling in the existence of other radiators.

Download
54 Survey on LEACH Wireless Sensor Networks Protocol
Brajesh Mishra, Sarvesh Singh Rai, Navdeep Kaur Saluja

Abstract—One of the important issues in wireless sensor networks is the inherent limited battery power of the network sensor nodes. The battery power in the sensor nodes plays an important role in increasing the lifespan of the nodes. Hierarchical routing protocols are the best known protocols to minimize the energy consumption. Leach is one of the fundamental protocols in the clustering technique hierarchical routing protocols that can be used for minimizing the energy consumed in collecting and disseminating. We have surveyed the state-of art of different hierarchical routing protocols that have been developed from the LEACH. This paper highlights some of the drawbacks and issues in LEACH and discuss how these issues are overcomed by the descendants of LEACH. This paper also compares the features and performance issues of all hierarchical routing protocols.

Download
55 Wearable Hand Gesture-Based Interaction Framework on Raspberry PI
Parshi Prashanth Kumar, V.Ganesh

Abstract—Electromyography (EMG) is a technique for evaluating and recording the electrical activity produced by skeletal muscles. EMG is performed using an instrument called an electromyograph, to produce a record called an electromyogram. An electromyograph detects the electrical potential generated by muscle cell when these cells are electrically or neurologically activated. The signals can be analyzed to detect medical abnormalities, activation level, or recruitment order or to analyze the biomechanics of human or animal movement. In the proposed method we are using sensors instead of camera to sense and identify the gestures. Here we are using Accelerometers and surface electromyography (SEMG) sensors. These two sensors provide two potential technologies for gesture sensing. Accelerometers can measure accelerations (ACC) from vibrations and the gravity; therefore, they are good at capturing noticeable, large-scale gestures.

Download
56 Recent Trends Towards Improved Image Enhancement Techniques
Sharanpreet Kaur, Sukhpreet Singh, Naveen Dhillon

Abstract—Image enhancement process includes a couple of techniques that seek to improve the visual appearance of a graphic or to convert the image to an application better fitted to analysis by an individual or machine. The fundamental reasonof image enhancement is to bring out detail that is hidden in an image that is covered up in a picture or to expand contrast in a low contrast picture.This paper presents a literature review on some of the image Enhancement techniques for improving images like CLAHE, DBLA, Mix- CLAHE, Histogram Equalization, Adaptive Histogram Equalization etc. This paper ends up with the suitable future directions to enhance the DBLA algorithm further.

Download