Sr/No/ |
Title |
Pdf |
1 |
A review on performance characteristics
Of draft tube of mixed flow hydraulic turbine
Vandana Chakrwarti, Anshul Choudhary
Abstract —This paper summarizes the field of draft tube
including recent improvements and applications to the
power generation processes. In this context, a focus was
put on the draft tube inlet flow conditions, geometry of
draft tube as well as various parameters that affect the
draft tube working conditions.
|
Download
|
2 |
Design of parallel combination of AES, DES and
blowfish Encryption for Very High Secure
Communication
Apoorva Nayak, Sapana Choudhry
Abstract—AES, DES and Blowfish are the three major
techniques available for data encryption. Our aims is
to develop all existing designs and observe their
performance and to compare them also to develop a
high speed parallel combination of AES and blowfish
(ABPES) like merging two techniques so to have best
parameters in terms of overall throughput, the total
avalanche the data conversion rate so that the design
can be used as a cryptographic coprocessor in high
speed network applications. The work is to design an
optimised solution for secure data communication
ABPES (advance blowfish parallel Encryption
system) as a new standard encryption technique
which will be more optimised solution for the same
when the data conversion time and encryption time
considers as design parameters.
|
Download
|
3 |
Image Encryption with DWT for Secure Data
Communication
Nilesh Tiwari, Urooz jabeen
Abstract—Steganography is a type of security
technique in obscurity; the art and science of hiding
the available of a message between sender and
intended recipient. But the techniques that are been
developed in the area are based of complex and
pattern based data hiding in pixels of images, later on
key based approaches are also been developed, later
on many combination (two different approaches
cryptography and steganography working together)
based method been developed. The proposed work is
new concept for steganography that is analytical cum
pattern based Image steganography the proposed
method is been developed for achieving very high
SNR and low MSE even if the size of original is less,
actually the only problem with steganography is that
it requires lots of data ( a full image) for transmitting
few original data, so proposed work aims to reduce
the size of image while maintaining the size of original
data same. Proposed paper is a unique DWT and
SVD based method for steganography.
|
Download
|
4 |
Bridge Design between Wi-Fi and Bluetooth with
High Throughput
Shikha meshram, Santosh chouhan
Abstract—The performance of an overlay Bluetooth
and IEEE 802.11b (WiFi) network is considered in
terms of packet latency, packet error rate and
throughput, in the presence of a vertical handover
procedure. The objective of the overlay network is to
maximize the quality of service (QoS), giving to a
mobile user the possibility to switch from a network
to the other, with the so-called vertical handover. The
vertical handover is activated by the crossing of
thresholds determined according to the user’s profile,
which comprises objective values for the main QoS
parameters, such as the packet error rate and the
packet delay. The performance of the network is
evaluated taking into account the mutual Bluetooth–
WiFi interference and showing the influence of the
main parameters of the network and of the handover
procedure. This paper proposes a new user algorithm
for handover between Bluetooth and Wifi, which
combines a trigger to continuously maintain the
connection and another one to maximize the user
throughput. Moreover, we detail the implementation
of that algorithm follow packet content transfer
method and session transfer among heterogeneous
deployment.
|
Download
|
5 |
OFDM for Inter-carrier Interference Reduction
using Modified Self Cancellation Technique
Trisha Bhattacharjee, Shadma Pragi
Abstract-Orthogonal frequency division multiplexing
(OFDM) is considered as a one of the best modulation
schemes in wireless communications. However, OFDM
suffers from the sensitivity to frequency offset. This
frequency offset introduces the problem of inter-carrier
interference (ICI) in OFDM system. This paper
presents a new self cancellation technique (modified self
cancellation technique) using the self cancellation
technique with zero – gab. In terms of carrier-tointerference
ratio (CIR) and bit-error rate (BER) the
modified self cancellation technique gives good results
compared to that using only the conventional self
cancellation technique.
|
Download
|
6 |
Analysis of Cavitation in Pipe Flow Using CFD
Girraj sharma, M.K.agrawal
Abstract -In the industry work and every places cavitation is major problem.
Cavitation is an undesirable phenomenon in the pipe layout designing, because it
causes the damage of pipe which increases maintenance cost of industries. In the
pipe flow, Pressure variation may occur at any region which leads to cavitation’s on
pipe surface. In the present work CFD analysis has been carried out to study the
cavitation’s inception for sudden reduction in cross-sectional area of pipe, Pressure,
Temperature & Fluid properties. The results of the CFD simulations showed that
cavitation decreases when local pressure increases and temperature decreases. It
was also found that when the salinity in water increases. The reduction in cavitation
was observed due to increases fluid density and viscosity.
|
Download
|
7 |
Semi Supervised Consensus Clustering On Gene
Expression Micro Array Data Using Proximity
Measures
Mahima KM, Neethu S
Abstract-Cluster examination is sometimes the primary step
adopted to reveal facts from gene expression microarray data.
Besides choosing a cluster algorithmic program, selecting an
applicable proximity measure is of boundless importance to
attain satisfactory cluster results. Within the existing system, new
methodology, known as Intrinsic Biological Separation Ability
(IBSA) is introduced for Clustering Gene Expression Microarray
Data which may measure the contract of a proximity measure
with relation to biological information extracted from the Gene
Ontology (GO). With the connotation of improving the
robustness, quality and accuracy of the system, an approach
known as “Semi-Supervised agreement Clustering” is projected.
Consensus clustering that is moreover called aggregation of
cluster will alter disseminated and numerous information
sources and builds use of multiple cluster criteria. Incorporating
previous information in cluster method (semi supervised
clustering) has been shown to boost the reliability between data
partitioning and domain information. Semi-supervised consensus
cluster (SSCC) algorithm integrates the consensus cluster with
semi-supervised cluster for evaluating gene expression data that
is an optimum methodology for raising the performance. From
the experimental result it is able to conclude that our projected
system yields higher cluster performance than existing scenario.
|
Download
|
8 |
Achieving Scalable and reliable multicasting in
DTNS through ECSRM and Optimal Policies
M.SanghamitraDevi, D.Rammohan Reddy, Y.padma
Abstract-In order to achieve optimal transmission of
packets in DTN it is challenging, because in DTN’s
routes must be found over multiple unreliable, timeto-
time-connected hops. This fundamental challenge
has been investigated. In this paper we propose
Erasure Correcting Scalable Reliable Multicast,
ECSRM and WC-policies.1) Erasure/Errorcorrection
and NACK-suppression for reliable
multicast scalability.2) WC-policies-through which we
can achieve optimal transmission.
|
Download
|
9 |
Implementation of Environment Monitoring and
Device Control Using Arm Based Embedded
Controlled Sensor Network
Gandham Srisatya Gowry
Abstract-Embedded controlled detector network is that the
technology needs to implement environmental solutions
effectively. Many researchers are creating makes an attempt to
develop the embedded controlled device network. The present
systems square measure large, terribly pricey and tough to take
care of. The planned system is value effective and embedded
systems within the planned system. ARM primarily based
microcontroller and wireless sensors want to management the
assorted devices and to watch the knowledge concerning the
atmosphere exploitation zig bee. In the proposed system ARM
based microcontroller and wireless sensors are used to control
the various devices and to monitor the information regarding the
environment using Zig bee and GSM technologies.
|
Download
|
10 |
GIS based Consumer Indexing and loss evaluation – A
case study for Sihora Town
Jasvinder Kaur Saluja, A. K. Tiwari, M. R. Vaidya
Abstract─ This paper analyses the present scenario of
power distribution systems and role of GIS in
accelerating power sector reforms to restore
commercial and financial viability of power distribution
by uplifting and strengthening it. Consumer indexing
in distribution network at Sihora town near Jabalpur
using Geographical Positioning System ( GPS) and
putting the data in GIS using ArcGis 9.1 software to
create an authentic database of all consumers, has been
discussed. All company assets, namely, Transformers,
Poles, feeders, distributors and conductor etc. have also
been mapped. GIS has potential to make the “ Power
Sector Reforms” process, a grand success in fields like,
metering, billing, revenue collection, elimination of
overloading of feeders and transformers and improved
decision making through MIS.
|
Download
|
11 |
Image Super Resolution Model Using Fuzzy Rule
T.V.Hymalakshmi, M.Praveen kumar
Abstract -A novel high-quality image zooming technique
using fuzzy rule was proposed in this paper. The fundamental
idea is based on that a low-resolution (LR) image patch could
be generated from any of the many possible high-resolution
(HR) image patches. Therefore it would be natural to assign
certain fuzziness to each of the possibilities of HR patches.
|
Download
|
12 |
Gaussian Kernel Fuzzy
Statistical for Clustering in Multispectral Images
M.Indirani, Jisha.K.R. Chimmu, Karthikha
Abstract- Due to a high number of spectral channels and a large
information quantity, multispectral remote sensing images are
difficult to be classified with high accuracy and efficiency by
conventional classification methods, particularly when training data
are not available and when unsupervised clustering techniques
should be considered for data analysis. In this paper, we propose a
novel image clustering method [called GKFCM] which is based on a
fuzzy Statistics to extract land-cover information in multispectral
imagery. GKFCM is a clustering algorithm proposed recently in the
literature, which exhibits a fast execution speed and finds clusters
with small error, particularly for large datasets. Fuzzy statistics can
get objective estimates of how closely two pixel vectors resemble
each other. The proposed method simultaneously considers all data
points to be equally suitable as initial exemplars, thus reducing the
dependence of the final clustering from the initialization. Results
obtained for the different of multispectral images in the different
dataset collection.
|
Download
|
13 |
Design and Simulation of FFT Algorithm for OFDM
Transceivers
Deepak Rawat, Vikash Sharma, Mukesh C. Kestwal
Abstract— The current trends in wireless industry are based on
multi-carrier transmission technique such as Orthogonal
Frequency Division Multiplexing (OFDM). IEEE 802.11a/g/n,
IEEE 802.16e and many others use the variation of OFDM,
such as OFDMA and MIMO-OFDM. This paper investigates
the Bit error rate using both FFT block & Optimized HDL
FFT block, by using 64 Bit QAM Modulation and
demodulation techniques, and the experimental results of the
design are presented using MATLAB.
|
Download
|
14 |
Using grey relational Analysis to design and optimization of
process parameters effecting TIG welded Aluminium alloy
6082
T. Venkateswarlu, B. Venkata Narayana
Abstract— In many industrial applications steel is readily
replaced by nonferrous alloys, in most of the cases with
aluminium alloys. Since Aluminium alloys have good mechanical
strength which is comparable with structural steel, light in
weight that allows a significant reduction in weight, good
corrosion resistance and weld ability. Generally in aluminium
alloy series 6061 is widely used but now a days it is replaced by
6082 due to its inherent properties. Among the Aluminium alloy
6000series, 6082 has high strength. Hence alloy 6082 is known as
structural alloy and with excellent corrosion resistance. Mostly
aluminium alloys are welded by using TIG welding. But the
operator doing the welding doesn’t know where the optimum
welding was obtained with suitable parameters affecting the
welding. In this research work an attempt has been made to
develop an empirical relationship between TIG welding variables
and the mechanical properties (tensile strength, hardness) of TIG
welded aluminium alloy 6082-T4. The mechanical properties
were determined from GREY relational analysis, which can
provide an optimum solution to the system.
|
Download
|
15 |
A Review on Different Steganographic Techniques Used for
Information Hiding
Nilam C.Patil, V.V.Patil
Abstract— Now a days, with the rapid development of internet
and communication technology, protect transmitted information
becomes an important issue. Many researches work to resolve
these problems, they proposed techniques that provide the
security and confidential of secret data. In recent years, various
steganography techniques are developed and applied to protect
the transmission of hidden confidential information in a cover
image. In image steganography, secrecy is achieved by
embedding data into cover image and generating a stego-image.
In this paper, we survey many different hiding techniques
through which we can easily hide or transfer our important
documents.
|
Download
|
16 |
DTMF Based Cell Phone Operated Land Rover
B.Mahesh, K.Bharathikannan, T.Venkatesh
Abstract— Most probably they are remote controlled (either IR
or RF) or they may be automatic guided vehicles (AGV). This
device is also remote controlled land rover but as a remote
control one can use his cell phone that means he can move the
land rover by sending different commands from his cell phone,
not only that, he can control it from anywhere in the world (of
course where GSM / CDMA network is available). Also this
technology does not require the vehicle to be limited by the
length of the cable or in direct line of sight with controller (as
with infrared set up) and also well known BLUETOOTH is still
expensive and short range to be commercially viable. We did a
massive field work before starting this project and we found that
this device provides a nice platform to be used in the field of
surveillance, scientific research, and of course in search and
rescue operation.
|
Download
|
17 |
MANET Network with GRP Routing Protocol
Jasleen Kaur, Farminder Singh, Ankur Thakur
Abstract-Ad-hoc networks are a new paradigm of
wireless communication for mobile hosts where node
mobility causes frequent changes in topology. Ad hoc
networks are self-configurable and autonomous
systems consisting of routers and hosts, which are
able to support movability and organize themselves
arbitrarily. Moreover, other characteristics such as
frequent changes of the topology, nodes limitations
like energy resource, storage device, CPU and
communication channel limitations like bandwidth,
reliability add extra challenges. Mobile ad hoc
networks aimed to propose solutions to some
fundamental problems, such as routing, coping with
the new challenges caused by networks and nodes
features without taking the security issues into
account. Hence, all these solutions are vulnerable to
threats. Any node under attack in ad hoc network
exhibits an anomalous behaviour called the malicious
behaviour.
|
Download
|
18 |
An Empirical Analysis of Events / Situations Which Leads
to Stress and its Significant Impact on Personal and
Professional Life of Mumbai Police Force (MPF)
Jai Singh Chandramani, Chandrahauns R.Chavan
Abstract— In this paper the researcher identified the events /
situations which leads to stress among Mumbai Police Force
(MPF). The researcher personally collected the data through
structured questionnaire from Mumbai and Suburban at
constable, head constable, Police Sub Inspector, and
Inspector levels. During the research study, the researcher
identifies the number of situations / events which leads to
causes of stress among Mumbai Police Force, which are
stated that outdated promotional system, extended duty
hours, internal investigation, biased media, superior’s
behaviors, and political interference etc. The researcher
collected the statistics of these all situation / events which
have significant impact on personal and professional life of
Mumbai Police Force (MPF).
|
Download
|
19 |
Study of Stress among Mumbai Police Force and Its
Impact on Their Personal and Professional Life
Jai Singh Chandramani, Chandrahauns R.Chavan
Abstract-This is research paper is based on organizational
stressors are also called as job related stressors. Some of the
important job related causes of stress are as follows Role
conflict, Role ambiguity, Organizational structure, Working
conditions, Rotating shifts, Work overload, Work under
load , Lack of participation in Decision making,
Organizational leadership, Poor performance of the
organization. The stress can have effect on the individual,
the group, organization and even the family members. The
degree of effect depends upon: Duration – The length of
period of stress, Strength - The degree of stress, Individual
Characteristics – Physical and psychological features to cope
up with stress. Normally, prolonged exposure to stressful
produces serious physical, psychological and behavioral
effects. The effects of stress are as follows: Effects on
physical health, Psychological health, and Alcoholism and
drug addiction, Burnout, Effect of stress on organization
behavior. The researcher tried to cover all aspect of the
research study to emphasized that the impact of research
among Mumbai Police Force‘s personnel and professional
life.
|
Download
|
20 |
Research Article: Cardiff’s Repair of Vertical Laparotomy
Wound
Rajesh Narayan
Abstract- Wound dehiscence is a postoperative complication
encountered following adnominal surgery. A prospective
randomized study was conducted to compare the incidence of
wound dehiscence with a delayed absorbable and a nonabsorbable
suture material in the mass closure for vertical
laparotomy wounds by Cardiff repair.
|
Download
|
21 |
Original Article: Decoding Fournier’s Gangrene: 10 Years
Bihar Experience
Rajesh Narayan
Abstract-Fournier’s gangrene is a fulminating form of infective
necrotizing fasciitis of the perineal, genital or perianal regions
which commonly affects men but can also occur in women and
children. Case series have shown a mortality rate of 20% to 40%
with an incidence of as high as 88% in some reports. This study
was aimed to share my experience in the mangment of Fournier’s
gangrene and to identify the risk factors that affect mortality.
|
Download
|
22 |
The Study of Effect of Temperature on Cavitation
Girraj sharma, M.K.agrawal
Abstract-Concerned in the industry work and every places cavitation is most
important problem. Cavitation causes the injury of pipe which increases
maintenance charge of industries. Temperature variation may occur at any
region which leads to cavitations on pipe surface. This paper includes CFD
analysis, which has been carried out to study the cavitation’s inception for
sudden reduction in cross-sectional area of pipe & Temperature. The results of
the CFD simulations showed that cavitation decreases when temperature
decreases. To apply the effect of temperature the vaporization pressure of water
has been taken from steam table with respect to water temperature.
|
Download
|
23 |
Fuzzy in Traffic Signal Control
M. Balkees, S. Durairaj
Abstract-Traffic signal control is one of the fields in
which the application of fuzzy gives creditable results.
Here a systematic approach to fuzzy traffic signal
control is obtained by using the linguistic control
rules. The traffic signal program is splitted into two
separate units. First is the choice and sequencing of
the signal stages to be used and the second is the
optimization of this relative lengths of these stages.
Here the rule bases for both the stages are described
fully. The final results are promising implying the
effectiveness over the past methods.
|
Download
|
24 |
A Survey on Image Fusion and its techniques
Suruchi Goyal, Rupinder Wahla
Abstract— Image fusion combines multiple images of the same
scene into a single image which is suitable for human perception
and practical applications .Image fusion is done to reduce
amount of data, retain important information and to create new
image that is more suitable for further processing tasks.
|
Download
|
25 |
Online Verification Signature on Touch Devices
Nikita Thawkar
Abstract -In this paper explains the significance of online
systems and presents the survey of various approaches
related to online signature confirmation systems. Extend this
paper provides the relationships of those approaches along
with characteristic used, to help the researchers working in
this field. There are a variety of Biometric systems which
help in personal identification, amongst that verification
system; one system is signature verification system.
|
Download
|
26 |
Identification of Diabetic Maculopathy Stages Using Fundus
Images
A.Hazarathaiah, S.K.Nadiya
Abstract—Diabetic retinopathy is one of the leading
disabling chronic diseases, and one of the leading causes
of preventable blindness in the world [1]. It is an ocular
disease and progressive by nature. It is characterized by
many pathologies, namely microaneurysms, hard
exudates, soft exudates, hemorrhages, etc., among them
presence of exudates is the prominent sign of nonproliferative
DR [2]. Both hard and soft exudates play a
vital role in grading DR into different stages. Hence
classification of hard and soft exudates using k-means
clustering plays a vital role [3]. But Digital Fundus
Images has multiple contrast and illumination problems
which makes enhancement a necessity. Consequently,
DFI must be enhanced to allow for better visualization
in order to facilitate ophthalmologists to carry out their
diagnosis [4]. Finally, the exudates are classified as hard
and soft exudates based on their edge energy and
threshold.
|
Download
|
27 |
Time Motion Planning For Operational Control of an
Automated Guided Vehicle in a Flexible
Manufacturing System
Henrietta Udeani, Tochukwu Chiagunye, Chioma Oleka
Abstract—There is the necessity for more intelligent
vehicles able to tackle problems being imposed with the
demand for more effective, reliable, faster, collision and
deadlock free and efficient Automated Guided Vehicle
(AGVs) required for today’s flexible manufacturing
system (FMS). This work Centered on flexible AGV
system for FMS, which aim at resolving the complex
issue concerning collision and deadlock avoidance with
minimum time motion planning pertaining to
operational control of AGVs in a flexible manufacturing
system. Given a number of AGVs and a set of
transportation request, the main problem tackled by
this research is to frame an agent-neural network
algorithm for scheduling and routing control of AGVs
with a view to avoiding collisions and deadlocks and
achieving minimum journey motion times in FMS. The
model of the FMS for which control is being designed
consists of multiple agents inside a factory floor.
|
Download
|
28 |
Modeling a Neural Network-Based Intelligent Flexible
Manufacturing System using Automated Guided
Vehicle Scheme
Henrietta Udeani, Tochukwu Chiagunye,Hyacinth Inyiama
Abstract—To achieve flexibility in manufacturing
systems, the concept of an autonomous decentralized
flexible manufacturing system (AD-FMS) is very vital.
Agent technology supported by neural network form
the basis of the computing structure that drives the
design presented. Modeling a flexible manufacturing
system consisting of machine cells, Automated Guided
Vehicle guide path and shop floor control system was
presented in this research. This is in order to analyze
how implementation of the intelligent AGV control
system can improve the efficiency of the FMS. Given a
number of AGVs and a set of transportation request,
the main problem tackled by this research was to frame
an agent-neural network algorithm for scheduling and
routing control of AGVs with a view to avoiding
collisions and deadlocks and achieving minimum
journey motion times in FMS.
|
Download
|
29 |
Automatic Speed Control of Vehicle Using Eye Blink Sensor
DeekshaV, BhupathiChinmayee, Keerthi G Reddy
Abstract—Driver fatigue resulting from sleep is an important
factor in increasing number of accidents on today’s roads. In
recent times drowsiness is one of the major causes for highway
accidents. The drowsiness is identified by the eye blink closure
and blinking frequency through infrared sensor worn by driver
by means of spectacles frame. If the driver drowsiness is detected
the driver seat is vibrated to alert the driver, gas leakage in the
system is detected and alerted by voice. If the driver is drowsy,
then the system will give buzzer signal and the speed of the
vehicle is reduced and the obstacle sensor will senses the adjacent
vehicle to avoid collision with that, and if there is no vehicle in
left adjacent side then the vehicle move to the left end of the road
by auto steering and controlling and vehicle will be parked with
prior indications.
|
Download
|
30 |
Bike Info: Complete Description of Bikes in Indian
Market Using Android
A Vinay Kumar
Abstract—Google already has its Android Market
where applications are offered and, as happens with
every popular media, is prone to misuse. The
expansion of the mobile application market has made
it difficult for smartphone users to find applications
that fit their needs. A malware writer may insert a
malicious application into this market without being
noticed. Indeed, there are already several cases of
Android malware within the Android Market. This
paper provides the complete information of the bikes
that are available in the market. This saves the time
of the user and performance can be effectively
measured.
|
Download
|
31 |
FPGA Implementation of Folded Architecture for
Two Level (SISO/TITO/MIMO) DWT Architecture
G.Nagarjuna Reddy, K.Sambasiva Rao
Abstract—Images are to be transmitted without loss of information.
That can be achieved by transforming using Discrete Wavelet
Transform (DWT). The discrete wavelet transform (DWT) is
being increasingly used for image coding. This is due to the fact
that DWT supports features like progressive image transmission
(by quality, by resolution), ease of transformed image
manipulation, region of interest coding, etc.Hence, there is a need
of design efficient & fast architecture for DWT. This paper is
introducing an efficient architecture to enhance speed of DWT
Computation. The Discrete Wavelet Transform (DWT) is based
on time-scale representation, which provides efficient multiresolution.
The introduced architecture increases levels ofDWT
architecture to achieve lower computational complexity and
reduced memory. As the DWT traditionally been implemented by
convolution which demands both a large number of computations
and a large storage features that are not desirable for either highspeed
or low-power applications. This paper describes Lossless 2-
D DWT (Discrete Wavelet Transform) using Lifting Scheme
Architecture to reduce computational overheads. The behavior of
designed DWT architecture is modeled using the Verilog HDL
and functionality could be verified using the Modelsim simulation
tool.
|
Download
|
32 |
VLSI Implementation of a Flexible and
Synthesizable FFT Processor
G.Nagarjuna Reddy, K.Sambasiva Rao
Abstract— In this paper, we propose a portable hardware
design that implements a Fast Fourier Transform oriented to its
reusability as a core. The design has parameterized the number
of samples and the number of the data’s bits. The module has
been developed using radix-2 and radix-4 and radix-8 decimation
in time algorithm of n-point samples. There exist Fast Fourier
transform (FFT) algorithms, called dimensionless FFTs, is the
work independent of dimension.
|
Download
|
33 |
Development of Pedestrian Level of Service Criteria for
Urban Hilly Regions of India using K-means Clustering
Technique
Ranjan Kumar Swain, Raman Parti
Abstract—The capability to measure the performance of a
transportation framework could be a very important part in
outlining these frameworks. Provisions of pedestrian facilities are
not any special case and later numerous performance measures
are created. Evaluations of pedestrian facilities are very
important to ensure the significance of walkways for pedestrian
travel, also helps in assessing the requirements of existing
walkways for more development. Assessment of pedestrian Level
of Service (LOS) is the widely known method to analyse the
standard of operations of pedestrian facilities. The target of this
study is to access the suitable approach to assess pedestrian LOS
for urban hilly regions of Shimla and Mandi towns of India.
Characterizing the level of service criteria for pedestrian
walkways is basically clustering issues. Cluster analysis makes an
array of objects based on the knowledge found within the data
depicting their similarity. Three pedestrian service measures i.e.
average pedestrian speed, average pedestrian space and flow rate
has been analysed to develop pedestrian LOS. Finally, these
service measures are characterised into six pedestrian LOS
classes (A-F) that are having dissimilar ranges of values with the
help of K-means clustering technique.
|
Download
|
34 |
Secure Access Control in Cloud Computing Using
Adaptive Identity (Aid) Technique
P.Ramachandran, M.Rajeswari, M.Yuvapprriya
Abstract—Cloud computing is an emerging technology to
integrate IT field. Here in this technology many public and
private concerns want to store sensitive data with pay per on
demand service. Using cloud service the customer can
entrust and store their files and documents etc. But the main
problem is security control because the third party user can
access the data without permission. To overcome those
problems in this work we propose Adaptive Identity
technique with combination of Hierarchical Attribute Based
Encryption technique. Also we add key revocation
mechanism to enhance the security. This revocation method
key value could be retrieved from user. It provides the
constant security and restricts the third party illegal
accessing of data owner outsourcing data. Finally the
adaptive Identity concepts improve the security and
successfully revoke the key values from the user effectively.
|
Download
|
35 |
Obtaining Efficiency in Delay and Area by Using
DLMS Adaptive Filter
M.N.Sravani Reddy, K.Nagi Reddy
Abstract—This paper presents an efficient
architecture for the implementation of a delayed
least mean square Adaptive filter. For achieving
lower adaptation-delay and area-delay- power,
we use an novel partial product generator and
propose an optimized balanced pipelining across
the time-consuming combinational blocks of the
structure [1]. From synthesis results, it is find that
the proposed design with less area-delay
product(ADP)and less energy delay product(EDP)
than the best of the existing systolic
structures, for various filter lengths [2]. We
propose an efficient fixed-point implementation
scheme in the proposed architecture. We present
here the optimization of design to reduce the
number of pipeline delays along with the area,
sampling period, and energy consumption. The
proposed design is found to be more efficient in
terms of the power delay product (PDP) and
energy delay product (EDP) compared to the
existing structures.
|
Download
|
36 |
Secure Key Distribution in Cloud Environment during
Information Sharing PDV
Madhuri makode, Sanjay Gupta
Abstract—Now a day Cloud computing is the hottest
topic for the research work. Cloud computing is used
widely in our daily life say for the example of cloud is
Face book, Gmail, etc. some author say a cloud
computing is used when we require its facilities. The
Cloud Computing and its work simple working concept
is Document, software, program, information etc. all
are uploading in cloud server for sharing to other.
These data are accesses by other user at any time or in
any place in a very secure manner. In a simple word we
can say that cloud stored data , information , is fetch
by more than one user when they require .when
document or information is store in cloud storage
server or cloud data center. In This paper I am are
proposed a new approach for key generation and key
sharing in cloud environment for the Auditing task.
|
Download
|
37 |
FIR Filter Design Using CSD Technique
Apurva Gupta, Surender Kumar
Abstract—Now a day people prefer to use digital devices in day
to day life instead of paper media for communication. Digital
devices are easy to operate and handle as compared to paper
media. For this design of low power signal processing circuit is
an important part of the digital devices. All devices used for
communication purposes consist of filters. A digital filter reduces
the power consumption in the devices. In the presented work, it
is proposed to design and analyze a FIR filter based on canonical
signed digits in order to minimize the power consumption and
fast implementation of the filter. The designed FIR filter is
proposed to implement using SIMULINK tool and to be tested on
high speed communication signal.
|
Download
|
38 |
Study on Flexural Behaviour of Fiber Reinforced
Ferrocement Beams under Monotonic and Repeated
Loading
Naveen G M, Madhusudhan C A, Shilp Rani
Abstract—Ferrocement is an environment friendly
comprehensive technology and holds excellent unique
properties such as good tensile strength, developed toughness,
water tightness, lightness, fire resistance, resistance to cracking
and cost, time and material effective construction technology.
The present work is concentrated on two major aspects, (i)
Effect of fibers on first crack & ultimate strength and (ii)
Behavior of fibers reinforced ferrocement beams under
Monotonic & Repeated flexural loading. The first part of the
present study has been focused on the effect of fibers on First
crack & Ultimate Strength with replacement of fibers by 0%,
0.5%, 1%&1.5% and second part of the work focusing the
behavior of fiber reinforced ferrocement beams under
monotonic & repeated loads with increased load. The results
obtained from this work is expected to be useful in determining
the strength and behaviour of fiber reinforced ferrocement
beams subjected to similar types of forces and thus will help
toward designing ferrocement beams to withstand monotonic
and Repeated flexural loading.
|
Download
|
39 |
Optimize the Search Engine Using Web Ranking and
Clustering
Nisha Sharma, Charanjit Singh
Abstract—Search engine is the term where researchers and
developers take a broader view of IR systems, consumers think
of them more in terms of what they want the systems to do —
namely search the Web, or an intranet, or a database.
Clustering helps in redundancy and fault tolerance by making
sure that there is no single point of failure, require scalability.
|
Download
|
40 |
A survey on various Routing Protocol & Quality of
services in MANET
Shikha Tuli, Farminder Singh, Ankur Thakur
Abstract—In recent years, a vast research has been seen
going on in the field of Mobile Ad Hoc Networks
(MANETs). Due to limited resources in MANETs, to
design an efficient and reliable routing strategy is still a
challenge. An intelligent routing strategy is required to
efficiently use the limited resources. Also the algorithms
designed for traditional wired networks such as linkstate
or distance vector, does not scale well in wireless
environment. Routing in MANETs is a challenging task
and has received a tremendous amount of attention
from researchers around the world. To overcome this
problem a number of routing protocols have been
developed and the number is still increasing day by day.
It is quite difficult to determine which protocols may
perform well under a number of different network
scenarios such as network size and topology etc. In this
paper we provide an overview of a wide range of the
existing routing protocols with a particular focus on
their characteristics and functionality. Also, the
comparison is provided based on the routing
methodologies and information used to make routing
decisions. The performance of all the routing protocols
is also discussed. Further this study will help the
researchers to get an overview of the existing protocols
and suggest which protocols may perform better with
respect to varying network scenarios.
|
Download
|
41 |
Effect of Inducers and glucose repression on Phenol
Degradation in Waste water Samples by Phanerochaete
chrysosporium
Ben Manuel Choragudi, Mownica Vemuri, Prasad J.A.
Abstract— The cultivation of Phanerochaete chrysosporium for
laccase and peroxidase production and cell growth are
remarkably affected by experimental conditions namely physical
and chemical parameters as well as nutrient availability and
inducer stimulation. When it is used for the degradation of
phenolics in waste water different growth conditions are
investigated in the present and work.YMD medium in contrast to
PDA medium was found to be suitable for luxuriant growth of
the fungus. Biomass growth was compared for PDA medium and
for YMD medium in two different temperatures. There was very
little growth at 280C for both media tested and YMD at 370C
showed the evidence of the highest growth. It was evident that
production of the enzymes is independent of growth; these
enzymes seem to be produced by a secondary metabolism. In
order to obtain laccase and peroxidase induction, addition of
solid lignin, lignosulphonates, veratryl alcohol, and ethanol was
tested in the broth cultures containing 1% waste water. The
combined effect of inducer addition and simultaneously glucose
suppression on the development of enzymes and concomitant
degradation of phenol was studied. The increase in laccase and
peroxidase activities resulted in an enhanced degradation of
phenol in the broth cultures. The best result for laccase induction
(550 U/L) was obtained with solid lignin, a by-product of pulp
and paper industry and this higher laccase activity attained was
obtained with the combined effect of lignin addition and glucose
suppression.
|
Download
|
42 |
Improvement in Voltage Sag in Distribution System Using
DVR
Gagandeep Kaur, Amarjeetkaur
Abstract—Quality of power is one of important concerns in the
present time. It has become important with the introduction of
electronic devices, whose performance depends on quality of
power supply. Power quality problem is a change in voltage,
current or frequency standards that results in failure sensitive
equipments. One of the major concerns of power quality is the
voltage sag. To solve this problem, custom power devices are
used. One of most effective devices is the Dynamic Voltage
Restorer (DVR), which is the most efficient custom power device
used in power distribution networks. Its appeal includes lower
cost, smaller size, and its fast dynamic response to the
disturbance. This paper includes analysis and simulation of a
Dynamic Voltage Restorer (DVR) using Simulink MATLAB
(2010). This model of DVR consists of PI controller, Discrete
PWM pulse generator, dc voltage source and universal bridge.
|
Download
|
43 |
Manufacturing of Paver Blocks using fly ash and
limestone Powder
Rajkumar Induria, Archana Tiwari
Abstract—Huge amount of fly ash is produced as
industrial waste from coal fired thermal power plants.
Benefits of using fly ash are greater strength, increased
durability, decreased permeability, reduced alkali silica
reactivity, efflorescence and heat of hydration. Now a
day concrete paver block (CPB) has extensive
application at airports, shopping malls, toll plazas, zoos,
container depots, etc. (CPB) is a versatile, cost effective,
attractive, functional and requires little or no
maintenance if correctly manufactured and it has good
interlocking properties with each others for laying on
the surfaces. This paper reports the results of an
experimental study conducted on paver block prepared
by using fly ash and limestone powder with the aim to
investigate its suitability. In this experimental study
concrete paver block of I-shape is prepared by
replacing 30% of cement by fly ash (FA) and limestone
powder (LSP). Two proportions are tried. Physical
properties investigated are -compressive strength of
paver block at 7, 14 and 28 days and water absorption.
|
Download
|
44 |
Expansion of an Robust Multichannel Image Codec
technique Using Fuzzy Relation Based JPEG2K
Atul Kumar Singh, Rohit Miri, Raju
Abstract—The ultimate growth of digital imaging
applications, teleconferencing, high definition television
(HDTV), hypermedia, and has amplified the necessity
for active and standardized image codec techniques.
Surrounded by the emerging standards JPEG and
JPEG2K are for codec of still images. A mutual
representative of most images is that they comprise
some redundant information. Image codec is essential to
reduce the number of bits needed to represent an image
by eliminating the redundancies as much as possible.
One of the supreme important techniques often used for
still image codec in the present consequence is JPEG
2000(JPEG2K). The JPEG2000 is a single channel
image codec technique, hence not clever to compress the
multichannel images. On the other hand in the present
age most of the still images are the multichannel similar
RGB images. Yet there are particular techniques close
for color image codec based on JPEG2K, but this pitch
is still undeveloped for development of competent image
codec techniques for color images. These paper boons a
new system of employment of obtainable wavelet
transform based image codec technique for color image
codec using fuzzyfied discrete wavelet transform. Initial
paper of Zadah on fuzzy, argued that fuzzy logic is an
active tool for supervision imprecise and vague
situations, hence merging of fuzzy rule base with
discrete wavelet transform is the Competent way to
attain advanced codec ratio with less error.
|
Download
|
45 |
Hinge Loss Technique to find decision surface for Nonlinearly
separable data
G. Jaya Suma, A. Santipriya
Abstract— Support vector machines (SVM) are widely used for
the classification and regression where it classifies data-objects
based on the decision boundary defined by the hyperplane. The
important major problem of SVM depends on selecting of
decision boundary and reducing the support vectors so that it
overcomes the over-fitting problems. This paper finds slack
variables of linearly non-separable data by using soft margin
SVM. Hinge loss method is used to deal with soft margin SVM
with the given offset bias term along with the slope of the linear
decision surface in order to find the slack variables for linearly
non-separable data that reduces misclassification error rate. In
this paper with emphasis on classification tasks using SVM, we
propose supervised discretization based LIBSVM optimization
technique. The experimental results show the efficiency of the
proposed technique yields better accuracy when compared with
the existing techniques.
|
Download
|
46 |
EAnalysis of Frequency and Voltage with
Incremental Change in Load with PID Controller
Amarnath Mukherjee
Abstract— This paper deals with the classical method of
reducing transients of load frequency of a single area
power system. The load frequency of a single area
power system is studied with and without Controller. In
this paper the frequency deviation and terminal voltage
response is calculated with PID Controller. For a
practical single area power system the change in
frequency response is studied for different change in
load condition with and without controllers. The PID
controller is properly tuned in such a way that it proved
to be a better controller for change in frequency
response. With PID Controller applied to single area
power Systems the frequency transients are quenched
at much faster rates without oscillations.
|
Download
|
47 |
Analysis of Azimuth and Elevation Patterns for Log
Periodic Dipole Array in VHF range associated with
two Satellites
K. Roy, A. B. Bhattacharya
Abstract—We have analyzed azimuth and elevation
patterns for Log Periodic Dipole Array (LPDA) in
VHF range at Kalyani, West Bengal for observing
solar radio bursts. The structure is devised so as to
make it an excellent wind proof system consisting of
two logarithmic periodic dipole antennas which cross
each other and are positioned in the north-south and
east-west directions respectively. We have examined
in details the alteration of vertical along with the
horizontal azimuth patterns and gain for various
frequencies. Besides the variation of elevation
patterns at 163° and 167° azimuth along with gain for
different frequencies have been analyzed.
|
Download
|
48 |
Enhancement of power flow and voltage stability in 6 bus
system using Fact devices
APriyanka Raghuwanshi, Minal Tomar
Abstract—In modern power system voltage instability is the
measure problem. To control this problem FACT devices are
used to maintain voltage stability, power flow in transmission
system. In This paper represent the maximum power flow at a
given load and also obtain the voltage stability point by
increasing the load. For this STATCOM, SVC, SSSC, UPFC
are used to compare the better performance in 6 bus system.
Results are obtained by matlab simulation technique.
|
Download
|
49 |
A Novel Study of Elevation Patterns for LPDA in
VHF range correlated with three Satellites
K. Roy, A. B. Bhattacharya
Abstract—We have made an effort to examine the
elevation patterns for a Log Periodic Dipole Array
(LPDA) in VHF range (50 to 300 MHz) at Kalyani,
West Bengal for monitoring solar bursts. The
structure is composed of dual crossed logarithmic
periodic dipole antennas, one of them placed in northsouth
direction while the other laid in east-west
direction. The structure is built so that it develops
into a very good wind proof system. The variation of
elevation pattern and gain associated to three
significant satellites at 172°, 193° and 204° azimuth
related to the frequencies of 50 to 300 MHz are
analysed.
|
Download
|
50 |
Reliability Assessment of a Hybrid Power System using
Aggregate and Non-Aggregate Markov Models
Paleti Shirisha, T. Kavitha Reddy
Abstract—Distributed Energy Resources such as Wind, Solar,
Tidal, Biomass, Geothermal and Hydropower constitute a type of
power generation and received much attention as alternatives for
conventional power generation. Distributed Energy Resources
(DER) will help to reduce the greenhouse gases emission. In this
paper, focus is made on reliability assessment of Small
Autonomous Hybrid Power System (SAHPS).SAHPS consists of
10-kW Wind Turbine Generator (WTG), 5-kW Solar Photo-
Voltaic (PV) unit and 5-kW Pico-Hydro unit. Data Synthesizer
software is used to determine the hourly wind speed, hourly solar
irradiation, hourly water discharge and hourly load data from
the monthly data of 1 year. Markov models for the WTG, PV,
Pico-Hydro and system Load with transitions among all states
and only among contiguous states are established. Aggregate
Markov model is developed from the Markov models of
distributed resources with transitions among all states and Non-
Aggregate Markov model from the individual Markov models
with transitions only among contiguous states. In this paper,
reliability indices like Loss of Load Probability (LOLP), Loss of
Load Frequency (LOLF), Loss of Load Expected (LOLE), Loss
of Load Duration (LOLD), Expected Energy Not Supplied
(EENS) and Energy Index of Reliability (EIR) are evaluated for
Aggregate and Non-Aggregate Markov models whereas LOLP is
only computed with optimal sizing of Distributed Generators in
the literature using Genetic Algorithm. All the above analysis is
carried out in MATLAB software environment. Results for
Aggregate and Non-Aggregate Markov methods are presented
and analyzed.
|
Download
|
51 |
Gesture Recognition for Patient Monitoring By
Hidden Markov Models (Hmm)
Laxman Morya, R.P.Narvaria
Abstract—Facial expressions or gestures provide sensitive cues
about emotion response and play a major role in the study of
psychological phenomena and the development of nonverbal
communication. Facial expressions regulate social behavior,
signal communicative intent, and are related to speech
production. Most facial expression recognition systems focus on
only six basic expressions as suggested by FACS (facial action
coding system) experts. The use of these gestures (facial
expression) recognition systems can also be extended to the
biomedical applications like patient monitoring which is very
critical issue in a country like India where population runs to
100 billion. The facial gesture recognition system let us know
about the condition of patient i.e. whether he/she is feeling
distrust/pain. From past various other method like telemetry
has been used in patient monitoring but the development of a
computer vision system will prove as a crosscheck to these
system and will also encourage human computer
interaction(HCI).So, the objective of this is to develop a
computer vision system, including both facial feature
extraction and recognition, that automatically discriminates
amount subtly different facial expression based on facial action
coding system action units using hidden markov
models(HMMs) and can be used for patient monitoring.
|
Download
|
52 |
Analysis of the Design and Performance of a
Windproof LPDA in VHF range for detecting Solar
Radio Bursts
K. Roy, A. B. Bhattacharya
Abstract—We have designed a Log Periodic Dipole
Array (LPDA) at Kalyani, West Bengal in the Very
High Frequency (VHF) range of 50 to 300 MHz. In
this paper we are basically concerned with the design
and functional attributes of the constructed antenna
comprising of two intersected logarithmic periodic
dipole antennas, situated in the north-south and eastwest
directions respectively. We have attempted to
design an LPDA that suits the conditions and
specifications to the extent possible practically and
opted for the value of spacing factor (σ) as 0.136 and
scale factor (τ) as 0.78 to acquire our needed
directivity of the antenna. The LPDA antenna has
been developed based on the specified specifications
and the values of scale factor and spacing factor. The
LPDA is constructed by using two aluminum rods
with nine elements of distinct sizes which achieves a
moderate gain with low noise amplifier. A detailed
design, analysis, and simulation of the log periodic
antennas have been presented in this paper with some
important results .From our analysis; we find that the
LPDA is the simplest antenna with consistent
bandwidth and moderate gain.
|
Download
|
53 |
Simulation of Near Field and Far Field Radiation
Patterns of a Novel LPDA at VHF Band
K. Roy, A. B. Bhattacharya
Abstract—In the present paper the characteristics of
the near and far field radiations of the Log Periodic
Dipole Array antenna in the VHF range (50 MHz-300
MHz) have been examined and analysed. The Polar
radiation patterns in the near and far field areas for
various frequencies are computed as a function of
angle. In near as well as in far fields the antenna is
utilized to identify the radio frequency. The
description and uses of Near-Field and Far-field has
mainly been contemplated from the antenna
measurement techniques. The study of the antenna in
free space exhibits that the over estimation just takes
place in the major lobe, whereas even
underestimation can occur in all other directions. On
regarding the consequences of other radiating
elements in an array construction, it is seen that the
effective near-field pattern of a single slot in the array
is practicable. This field will be helpful in deduction
of the effective far-field patterns of each and every
array element consisting of the consequences of
mutual coupling in the existence of other radiators.
|
Download
|
54 |
Survey on LEACH Wireless Sensor Networks
Protocol
Brajesh Mishra, Sarvesh Singh Rai, Navdeep Kaur Saluja
Abstract—One of the important issues in wireless sensor
networks is the inherent limited battery power of the
network sensor nodes. The battery power in the sensor
nodes plays an important role in increasing the lifespan
of the nodes. Hierarchical routing protocols are the best
known protocols to minimize the energy consumption.
Leach is one of the fundamental protocols in the
clustering technique hierarchical routing protocols that
can be used for minimizing the energy consumed in
collecting and disseminating. We have surveyed the
state-of art of different hierarchical routing protocols
that have been developed from the LEACH. This paper
highlights some of the drawbacks and issues in LEACH
and discuss how these issues are overcomed by the
descendants of LEACH. This paper also compares the
features and performance issues of all hierarchical
routing protocols.
|
Download
|
55 |
Wearable Hand Gesture-Based Interaction Framework on
Raspberry PI
Parshi Prashanth Kumar, V.Ganesh
Abstract—Electromyography (EMG) is a technique
for evaluating and recording the electrical activity
produced by skeletal muscles. EMG is performed using
an instrument called an electromyograph, to produce a
record called an electromyogram. An electromyograph
detects the electrical potential generated by muscle cell
when these cells are electrically or neurologically
activated. The signals can be analyzed to detect medical
abnormalities, activation level, or recruitment order or
to analyze the biomechanics of human or animal
movement. In the proposed method we are using
sensors instead of camera to sense and identify the
gestures. Here we are using Accelerometers and surface
electromyography (SEMG) sensors. These two sensors
provide two potential technologies for gesture sensing.
Accelerometers can measure accelerations (ACC) from
vibrations and the gravity; therefore, they are good at
capturing noticeable, large-scale gestures.
|
Download
|
56 |
Recent Trends Towards Improved Image Enhancement
Techniques
Sharanpreet Kaur, Sukhpreet Singh, Naveen Dhillon
Abstract—Image enhancement process includes a couple of
techniques that seek to improve the visual appearance of a
graphic or to convert the image to an application better fitted
to analysis by an individual or machine. The fundamental
reasonof image enhancement is to bring out detail that is
hidden in an image that is covered up in a picture or to expand
contrast in a low contrast picture.This paper presents a
literature review on some of the image Enhancement
techniques for improving images like CLAHE, DBLA, Mix-
CLAHE, Histogram Equalization, Adaptive Histogram
Equalization etc. This paper ends up with the suitable future
directions to enhance the DBLA algorithm further.
|
Download
|