Sr/No/ |
Title |
Pdf |
1 |
Experimental Response of Glass Reinforced Plastic
Cylinders under Axial Compression Test
V.Paranthaman
Abstract —This paper presents the results of buckling
tests on laminated composite cylinders made from glass
fibre reinforced plastic (GFRP). The laminates used are
of type DF1400Õ consisting of woven glass fibre roving
within a polyester resin matrix. In total, six cylinders
constructed from two-ply laminates, in which the main
variable is the laminate orientation, were tested under
axial compression. The specimen details, experimental
set-up and loading arrangements are described, and a
detailed account of the test results is given. The results
include thickness and imperfection mapping, and
displacement, load and strain measurements. Use was
made of an automated laser scanning system, which was
developed for measuring the initial geometric
imperfections as well as buckling deformations during
various stages of loading. The results of this
experimental study demonstrate the influence of
laminate orientation on the buckling strength of
composite cylinders, and provide detailed information
necessary for analytical and design investigations.
|
Download
|
2 |
A Review on “Influence of Extreme Temperature on
Electricity Demand in Madhya Pradesh” (India)
Akanksha Dubey, Dr. A. K. Sharma
Abstract—The climate is defined as „thegeneral or
average weather conditions of a certain region,
including temperature, rainfall, and wind‟. The earth‟s
climate is most affected by latitude, the tilt of the
Earth's axis, the movements of the Earth's wind belts,
and thedifference in temperatures of land and sea, and
topography. Human activity, especially relating to
actions relating to the depletion of the ozone layer, is
also an important factor. Urban centers heavily depend
upon electricity for their existence, with increase in
temperature electricity demand for space cooling also
increases. Climate Change induced temperature rise
also affect electrical generation at power plants. Due to
excessive cooling demand many cities in India has
tooverdraw the electrical power from the grid, while the
other not so important has to bear the power cuts due to
increased demand by others.Urban areas are
continuously growing larger creating huge demand of
electricity for their smooth functioning; Rapid
urbanization and improved lifestyle also adds further
increase in the electrical demand of the city. This study
attempts to improve upon an existing forecasting model
indicating a quadratic Relationship between
temperature and peak electricity demand whereby peak
electricity loadincreases exponentially with increasing
temperature based on previous analysis.
|
Download
|
3 |
SQL-Injection
A hazard to databases security via web application
Jagjit Kaur, Amrita, Mankiran
Abstract—Databases are the first target of the hackers.
Weak authentication is one of biggest reason that for
which we lose our confidential data. We usually share
our sensitive information such as Debit/ credit card
numbers, SSN etc without caring of the fact that
when our system will interact in the internet through
the WWW environment, huge amount of data is being
created which may have user’s personal information.
It may cause a break in the user’s privacy, if this data
is fetched by any unauthorized party. Hence, the big
question is that how can we ensure the database
security against cyber-attacks. In recent times, SQL
Injection attacks have emerged as a major threat to
database security. SQL Injection Attack has been
around for over a decade. It allows attackers to
obtain unauthorized access at the back-end database
to change the intended application-generated SQL
queries. Such attacks target to databases through web
frontend layer take advantage of flaws happens at
user end. For the purpose of security, we have
surveyed various SQL injection techniques which
cause threat to database security. We will discuss
various technical methods, terminologies used to
handle these attacks.
|
Download
|
4 |
Multiple Destination Map with Services
Prathemesh Bandbe, Shital Shetye, Manasi Jorkar, Ankita Surve
Abstract—The main objective of the web application MULTIPLE
DESTINATION MAP AND SERVICES is to provide the users
with the facility to input multiple destinations in a single tour. It
enables the users to choose shortest path among its multiple
given choices. In addition to this user will get the services that
they need while travelling such as hospitals, mechanics, gas
stations, accommodations etc. on one click. The web services
provide the users with the add-on facility of saving and printing
the map output as per the desired input by users. Even the users
have the facility of sharing the map with the other users too so
that it would be easy for them to make their route even much
better and can even plan their return journey also. User friendly
UI having Auto complete drop down location list, toggle
destination buttons, quick buttons for various other features will
make the use of b application very handy. As it’s an online
Application it is developed using Google services API, PHP and
JavaScript whereas Xampp database is used as a data
warehouse.
|
Download
|
5 |
Security Requirements and Mechanisms in Vehicular
ADHOC Networks (VANET)
M.Newlin Rajkumar, M.Nithya, M.Krithika
Abstract—In recent years, Vehicles are becomes the
more intellectual system which is operated with the help
of radio communications. Thus the vehicles are formed
the network for communications called as Vehicular
Adhoc Network(VANET) which depends on Mobile
Adhoc Network(MANET).However in Vehicular Adhoc
Networks (VANET),the security will make an big issue,
due to communication development, because of
dynamically changing protocols, high mobility of
vehicles and also high partitioned network. In this
paper we address the security requirements of vehicles
and needed mechanisms to avoid the threats and
attacks in VANET.
|
Download
|
6 |
Exploratory Analysis of Big Data Applications for
Personalized Healthcare
Seshathiri D, Mohammed Abdullah A
Abstract—The notion that the purely phenomenological
knowledge that we can extract by analyzing l a r g e amounts
of data can be functional in healthcare seems to challenge the
desire of VPH researchers to construct detailed mechanistic
models for individual patients. But to carry out no model is
ever entirely phenomenological or entirely mechanistic. We
suggest in this arrangement paper that big data analytics can
be successfully combined with VPH technologies to make
robust and effective in silicon medicine solutions. In organize
to do this, big data technologies must be further developed to
cope with some precise requirements that emerge from this
application. Such requirements are: working with sensitive
data; analytics of multifaceted and heterogeneous data spaces,
together with nontextual information; distributed data
management under security and performance restraints;
specialized analytics to integrate bioinformatics and systems
biology information among clinical observations at tissue,
organ and organisms levels; and specialized analytics to define
the “physiological envelope” all through the day by day life of
every patient. These domain-specific requirements suggest a
call for for targeted funding, in which big data technologies
designed for in silicon medicine becomes the research priority.
|
Download
|
7 |
A Feedback Network Based High Step-Up Dc–Dc
Converter for AC Photovoltaic Module Application
S.Lala Eswara Reddy, A.V.Suresh, O.V.S.Srinivasa Prasad
Abstract— Within the photovoltaic (PV) power-generation
market, the ac PV module has shown obvious growth. However,
a high voltage gain converter is essential for the module’s grid
connection through a dc–ac inverter. This paper proposes a
converter that employs a floating active switch to isolate energy
from the PV panel when the ac module is OFF; this particular
design protects installers and users from electrical hazards.
Without extreme duty ratios and the numerous turns-ratios of a
coupled inductor, this converter achieves a high step-up voltageconversion
ratio; the leakage inductor energy of the coupled
inductor is efficiently recycled to the load. These features explain
the module’s high-efficiency performance. The detailed
operating principles and steady-state analyses of continuous,
discontinuous, and boundary conduction modes are described. A
15 V input voltage, 230 V output voltage, prototype circuit of the
proposed converter has been implemented; its maximum
efficiency is up to 95.3% and full-load efficiency is 92.3%.
|
Download
|
8 |
A Study on Optimizing the Coupling Metric in Object
Oriented Systems
J.Phani Prasad, Murlidher Mourya
Abstract—In the Object Oriented paradigm of systems, the
design criteria is most important and it plays a vital role.
With the incremental activity of Object Orientation the
design scheme is becoming poor due to lack of
concentration on design among larger systems. Also the
interdependency between the classes (coupling) is
increasing in this regard. Lot of research articles had been
proposed up to now on coupling. In the present work we
are taking a graph based model to show the importance of
coupling by minimizing the coupling aspect to some extent.
|
Download
|
9 |
Removal of High Density Impulse Noise using Efficient
Median Filter for Digital Image
Prateek Agrawal, Prof. Dharmendra Sharma
Abstract—An Efficient Median Filter (EMF) algorithm for
removal or enhancement of gray scale images are highly
corrupted impulse noise is proposed in this paper. Noise in
image are represent the pixel value 0’s and 255’s are ensures
that black and white dot in image. In proposed algorithm take
an image and select 3x3 size window and target or center pixel
value check if its value is 0’s or 255’s then image is corrupted
otherwise noise free image. If image is noisy and target pixels
neighboring pixel value is between 0’s and 255’s then we replace
pixel value with the median value and if target pixels
neighboring pixel value is 0’s or 255’s then we replace pixel
value with the mean value. Else increased the window size and
again repeat this process until image is denoised. The proposed
filter algorithm shows better simulation result as compare the
existing algorithms. The simulation result shows better and
efficient performance of PSNR and MSE and computation time.
|
Download
|
10 |
Slope Failure Risk Assessment using FEM
Saiful Islam, Zarghaam Rizvi
Abstract—Finite element stability analysis of slope stability is
carried out. Site investigation (SI) for Geological profile and
laboratory testing are performed defining the soil conditions.
The slope and the soil beneath are consist of firm to stiff
embankment debris, salty clays, limestone’s and sandstones. The
water table (WT) is observed not to vary too much and lies at the
surface of the limestone/sandstone layer. The concept of sliding
planes are defined and implemented in the FE analysis. For the
considered WT conditions, residual friction angles φR = 11° and
φR = 14° are respectively evaluated for minimum equilibrium
condition. The measured values vary from φR = (9 – 13)°. On
these conditions four different engineering measures such as a
small embankment at toe, rows of cast-in-place piles,
combination of anchors and pile are proposed are analyzed as a
measure to stabilize the movement in the slope.
|
Download
|
11 |
Implementation of Green House Environment Controlling
and Monitoring System Based on Android Mobile Platform
A. S. Mali, V. V. Sutar, P. V. Sakharpe
Abstract—The embedded system we have proposed is real time
controlling of the greenhouse parameter and monitoring using
Android mobile through wireless network. The android mobile
connected to the hardware using internet and GPRS shield. The
green house environment parameters such as temperature,
humidity, and moisture, light are monitored and controlled as
per requirement. It has three sensors at input side and it has four
devices at the output side to control the greenhouse parameters.
The values of proposed green house environment parameters are
represented graphically with latest value highlighted. These
values are displayed on thingspeak.com website.
|
Download
|
12 |
Efficient Method for Reducing ICI in OFDM Systems
Velisetti Haritha, Kanagala Sindhu, Durai Sarath , P. Gayathri
Abstract—Inter Carrier Interference (ICI) caused by the
Carrier Frequency Offset (CFO) and Doppler shifts, highly
disgrace the performance of OFDM system. For OFDM
communication system which is a promising technique for
high data rate transmission, the theoretical BER and CIR are
difficult to obtain in presence of ICI. The BER of the received
signals are very sensitive to Doppler shifts and frequency
offsets (reasons of ICI). This paper presents an efficient and
improved ICI Self-Cancellation technique. The proposed
technique improves the system throughput and reduces the
BER. The performance comparison results show that
proposed technique has better BER and improved CIR than
standard OFDM and existing sc scheme.
|
Download
|
13 |
Recent Trends For Physically Challenged People
Dr.M.Newlin Rajkumar, M.Lavanya, J.Juslin sega
Abstract—Neuro sky and sign language are used to
communicate with the deaf and dumb people. It can
resolve the obstacle among the physically challenged
people. The aim of the project is to classify the signals
based on electroencephalogram. In this project emotion
and intention can communicate with human beings. If
the frequency is matched it displayed on the LCD and
the words automatically converted into audible signals.
|
Download
|
14 |
#s*g-closed sets in Topological Spaces
V.R.Karuppayal, K.kamakshi
Abstract—This paper deals with a new class of sets namely #s*gα-
closed sets in topological spaces and derive the properties of
#s*gα-closed sets. Also we find the relationship between #s*gα-
closed sets and the other existing sets. Moreover with the help of
these sets, we introduce three new spaces, #s*gαTb spaces, αgTb
spaces, sTb** spaces.
|
Download
|
15 |
s*g - totally continuous functions in topological spaces
V.R.Karuppayal, N.Nandhini
Abstract—In this paper we introduced s*g - totally
continuous functions and investigate their properties.
Also we derive some basic properties of s*g - totally
continuous functions and three new class s*g -T1, s*g-T2, s*g -T0.
|
Download
|
16 |
A Review on “Performance Analysis of Thermal
Power Plant for getting Maximum Efficiency”
Narendra Sahu, Prof. K.K.Jain, Dr. R. K. Dave
Abstract—About 70% of India's energy generation
capacity is from fossil fuels, with coal accounting for
40% of India's total energy consumption followed by
crude oil and natural gas at 24% and 6%
respectively. India is largely dependent on fossil fuel
imports to meet its energy demands by2030; India's
dependence on energy imports is expected to exceed
53% of the country's total energy consumption. In
2009-10, the country imported 159.26 million tonnes
of crude oil which amounts to 80% of its domestic
crude oil consumption and 31% of the country's total
imports are oil imports. The growth of electricity
generation in India has been hindered by domestic
coal shortages and as a consequence, India's coal
imports for electricity generation increased by 22% in
2015. In view of this situation, the project seeks to
increase output from the Power Stations (PS) in the
process closing down on the power shortages now and
in the future through effective and efficiency
improvement. This paper presents a review of the
methodology to evaluate the performance of coal
based thermal power plant. The main aim of the
study is to identify areas where energy losses are
occurring and develop them for efficient and effective
improvement in a thermal power station.
|
Download
|
17 |
A Review on “Performance Analysis of Thermal
Power Plant for getting Maximum Efficiency”
Narendra Sahu, Prof. K.K.Jain, Dr. R. K. Dave
Abstract—Sanjay Gandhi thermal power station,
Birsinghpur is situated in the district of Umaria
(M.P). The total Capacity of the plant is 1340MW
(4X210MW+1X500MW). The purpose of the project
is to assess the major power consumption by
auxiliaries and suggesting cost saving alternatives in
terms of energy saving. In this study the Energy audit
of unit -3 along with Coal Handling Plant have been
conducted for main auxiliaries of thermal power
plant like Boiler, Turbine, Condenser vacuum system,
Coal handling plant, performance evaluation of Air
preheater, DM water consumption. Various
parameters from Control room and Chemical wings
has been taken and it was found that the efficiency of
boiler is 87.51% which we can improve up to 89.63%
by reducing dry flue gas losses. There is a lot of
wastage of DM water in the plant, There is a huge
amount of water passing in Boiler Feed Pump
recirculation line, after carrying out the various
calculation on Boiler Feed Pump, it is observed that
the anticipated saving of approximately Rs. 27.30
Lakhs per year with an investment of Rs.5.0 Lakhs by
replacement of valves. Motor Driven Boiler Feed
Pump is the main power consuming auxiliaries in
thermal power plant; it takes 3.5 MW per Boiler Feed
Pump. We can replace Motor Driven Boiler Feed
Pump by Turbo Driven Boiler Feed Pump and
approximately we can save 2772 Lakhs per year with
an investment of Rs. 1000 Lakhs. In Coal Handling
Plant most of the motors (Conveyers and Crushers)
are running under low load and a lot of power is
wasting. Therefore by adopting some precautions and
recommendations we can reduce the power
consumption. The total anticipated saving will be
4108 Lakhs. per annum with an investment of
Rs.2592 lakhs and payback period is 7.5 months. The
study conducted clearly shows that the preventive
maintenance, overhauling and re-assessment of
operating conditions of aging plant imparts a major
role in keeping a power plant an energy efficient
utility.
|
Download
|
18 |
Fault Detection and Classification in Transmission
Lines: An ANFIS Approach
Noopur Pandey, PROF. Arti Bhandakkar
Abstract—An overhead transmission line is one of the
main components in electric power system. The
transmission line is exposed to different types of faults
such as phase-to-earth fault, two-phase-to-earth fault,
phase to-phase fault, three phase fault. The fault
detection and classification for the transmission line is
an important issue since identifying accurate fault
detection can facilitate repairing the damage and
restoring the transmission line rapidly. The time needed
to detect the fault will affect the quality of the power
delivery. Therefore, accurate fault detection on the line
is an important requirement for a permanent fault. This
paper presents an application of ANFIS approach for
automated fault disturbance detection and classification
in transmission lines using measured data from one
terminal of the transmission line. The ANFIS design
and implementation are aimed at high-speed processing
which can provide selection real-time detection and
classification of faults. The Training and Testing of
ANFIS is done using MATLAB version7, R2010a.
|
Download
|
19 |
Virtual Mobile System
Sameer Chauhan, Sankalp Narayan
Abstract—In general paradigm today, it can be safe to say that
the current mobile systems are huge consumers of an
overwhelming amount of resources, both physical and virtual.
The functioning happens such that, known to many, Mobile
devices use RAM (random access memory) in Gigabytes, which
consumes internet in large amounts. While downloading large
files in multiple copies, a high possibility of threats to the
already stored data can be created as a repercussion of the
same may lead to wastage of storage space and wasting CPU
timings through large processing power with low consumption.
However the entire idea of a Virtual based system has evolved
from this very fact that as more number of applications and
mobile apps are evolving with the days, there is an increasing
usage of electronic gadgets. To lessen the utilization of
unnecessary contraptions and gadgets, we have attempted to
build up a thought which will permit the client to customize the
equipment and programming prerequisites as indicated by
ones' own particular needs or utility. This paper explains the
way how the virtual mobile system will mitigate the problem of
undue amount of resource wastage and would save the
production of increasing number of gadgets these days. It will
also help to build future ready devices. This is a Cloud based
planning which centralises, manages, operates and allocates all
the resources on demand. In a nutshell, it can be understood
that this paper helps to develop a smarter user friendly way of
building a device which can replace numerous present day
devices into a single universal component unit.
It is aimed to create this device supporting all current day
applications as well as those in the upcoming times. It will
ensure saving excessive amount of electronics used in building
RAM, GPU, CPU and help save tremendous amount of
internet usage as no multiple copies are generated by using
manageable storage. Additionally, cost reduction has been one
of the major drivers into building such a virtual based system;
as it ensures availability of all the resources to every individual
at the minimal average costs which would otherwise have been
relatively very expensive to use.
|
Download
|
20 |
A Novel Multiple Non Visible and Data Publishing
with Provable Distance-Based Mining
K. Mowcika, S.P.Santhoshkumar, V.Anuradha, G.Mariya Lavanya Sangeetha
Abstract—Data exchange and data publishing are
becoming an inherent part of business and
academic practices. Data owners, nonetheless, also
need to maintain the principal rights over the
datasets that they share, which in many cases have
been obtained after expensive and laborious
procedures. This project presents a rightprotection
mechanism that can provide detectable
evidence for the legal ownership of a shared
dataset, without compromising its usability under a
wide range of machine learning, mining, and
search operations. The algorithms also preserve
important properties of the dataset, which are
important for mining operations, and so guarantee
both right protection and utility preservation. The
project considers a right-protection scheme based
on watermarking. Watermarking may distort the
original distance graph. The proposed
watermarking methodology preserves important
distance relationships, such as: the Nearest
Neighbors (NN) of each object and the Minimum
Spanning Tree (MST) of the original dataset. It
proves fundamental lower and upper bounds on
the distance between objects post-watermarking.
The application is designed using NET BEAN 6.8
as front end. The coding language used is Java 6.0.
MS-SQL Server 2000 is used as back end database.
|
Download
|
21 |
CSR and Rural Sanitation (Swachh Bharat) in India
Dr. M. Ignatius, Prof. Freek Cronjé, Ms. Suzanne Reyneke
Abstract—According to the WHO and UNICEF (2013) in terms
of human well-being and development, health and sanitation
are very important aspects for every human being. The
shortage of toilets and drainage systems in India are very
relevant in this regard. Promoting and protecting the
community is not only the government’s job but also requires
the involvement of every citizen of India, particularly the
corporations. Corporate Social Responsibility (CSR) is not
charity work; rather, it should be purely based on the
developmental oriented. CSR shares profits with all the
stakeholders in a task oriented manner. In this regard,
Swachh Bharat Abiyan was launched by the Prime Minister
of India Shri Narendra Modi on Gandhi’s 145th birth
anniversary on the 2nd of October 2014. Government believes
that corporations can join hands with them in order to help
implement the Swachh Bharat Abiyan, and therefore, CSR
can play a vital role in achieving the “Clean India” mission. In
order to carry out this research work, the researchers
adopted a descriptive research design, and selected 25
respondents for this study using the simple random sampling
lottery method. The data was collected by utilising a selfprepared
Interview schedule. The study revealed the
important role of CSR programmes in rural sanitation.
|
Download
|
22 |
Gray Hole Attack on TORA Routing Protocol with
IMEP
Amandeep Gautam, Jasdeep Singh
Abstract—The Temporary Ordered Routing Protocol
(TORA) is a distributed routing algorithm that provides
loop free routes from the source to destination. Internet
MANET Encapsulation Protocol (IMEP) is used in
TORA to avoid collision during packet transmission. In
this paper, we will study about Impact of IMEP on
TORA Routing Protocol and how gray hole attack will
be implement on TORA Routing protocol and also will
study its parameters.
|
Download
|
23 |
Rapid Modified To Order in Road Network Using
Customer Point of Interest
M. Anbu, R. Kanniyarasu, S.P. Santhoshkumar, V. Anuradha
Abstract—We present a combined structure for
dealing with exact point-of-interest (POI) queries in
dynamic continental road networks within interactive
applications. We show that partition-based
algorithms developed for point-to-point shortest path
computations can be naturally extended to handle
augmented queries such as finding the closest cafe or
the best place of work to stop on the way home,
always position POIs according to a user-defined cost
function. Our solution allows different trade-offs
between indexing effort (time and space) and query
time. Our most flexible variant allows the road
network to change regularly (to account for travel
information or modified cost functions) and the set of
POIs to be specified at query time. Even in this fully
dynamic scenario, our key is fast enough for
interactive applications on continental road networks.
|
Download
|
24 |
Effect of machining parameters in wire-electrical discharge
turning process: A review
Gajanan M Naik, S. Narendranath
Abstract—The Wire Electrical Discharge Turning (WEDT)
supports to generate cylindrical part, which is hard and difficult
to machine materials under conventional machining operation.
WEDT process is a one of the prominent machining process to
develop a turned object for specific industrial applications. This
literature review, reviews the effect of machining parameters,
such as power, time-off, voltage, servo, wire speed, wire tension,
and work piece rotational speed factors on the MRR, Surface
integrity, Roundness and published microstructures of carbide,
brass parts and high tensile steel are investigated by using
Scanning Electron Microscope (SEM) to observe crater, heat
affected zone, recast layer and bubble formation on the turned
surface. It is essential to optimize the process parameters and to
increase machinability, productivity.
|
Download
|
25 |
Circumstantial Analysis of Preferred Teaching Styles (A
Case Study of Computer University, Loikaw)
Nang Nwe Nwe Soe, April Thet Su, Poe Ei Phyu, Hlaing Htake Khaung Tin
Abstract—This Computer studies is a very important subject
in our country because of its numerous and widespread
application in addressing individual, organizational and
societal problems. The research work examined the effect of
attitudes on performance of teachers in Computer University
(Loikaw) in Kayah State, Myanmar. Teachers’ preference to a
particular or multiple teaching styles from certain inherent and
external conditions that influence their choice. The descriptive
research approach was used with a sample size of 16 teachers
from computer university, Loikaw, Kayah State, Myanmar.
This paper embarks on a circumstantial analysis of preferred
teaching styles used by computer teachers. The research
instrument that was used in the study was the questionnaire for
the teachers in the computer university. Therefore research
articles relevant to our topic were reviewed to find answers to
our research questions. Based on the findings of this study,
recommendations were made. The university should organize
seminars to upgrade and update teachers’ knowledge.
|
Download
|
26 |
Analysis of Potential Evapotranspiration of different Cities
of Kingdom of Saudi Arabia
Saiful Islam, Dr Ram Karan Singh, Roohul Abad Khan, Mohd Danish
Abstract—Potential evapotranspiration (PET) is an important
index of hydrologic budgets at different spatial scales and is a
critical variable for understanding regional biological processes.
It is often an important variable in estimating actual
evapotranspiration (AET) in rainfall-runoff and ecosystem
modelling. The Present work deals with Computation of
Potential Evapotranspiration under different climatic conditions
in Saudi Arabia using Temperature based empirical equation-
Thornthwaite method. Weather data for Riyadh representing
arid climate, Jeddah representing humid climate and Abha
representing moderate climate were analyzed. These data
contained Mean Temperature and heat index. The result shows
that Jeddah has highest evapotranspiration rate per year because
of humid climate followed by Riyadh which is having arid
climate and the least value is found for Abha city due to
moderate climate
|
Download
|
27 |
Decentralized plan-free phonological based service
composition using access point in mobile networks
R.Latha, M.Kavitha
Abstract— The inability of phonological similarity and
phonological nearness service leads to epoch engrossing
while elucidation and the dope to the neighboring bud
may leads to splintering erstwhile. The portiere
elucidation is lacking in their hauling of information.
This paper we introduce the multiple client application
to avoid the defeat of bud using Access point (Hub). The
objective of the concept is to using the access point to
funnel and inherit with neighboring bud. By using the
access point, the bud can funnel without any defeat and
no epoch engrossing. Dissemination of bud with the
neighboring bud may lack in funnel and inheriting, so
the access point will be helps to respond swiftly and
with many clients at a single time.
|
Download
|
28 |
Secure Data Retrieval through Open Control in Critical
Machine Network
Latha.R, Sarathkumar.S
Abstract— Technologies are becoming successful solutions that
allow wireless devices carried by soldiers to communicate with
each other and access the confidential information or
command reliably by exploiting external storage nodes. Some
of the most challenging issues in this scenario are the
enforcement of authorization policies and the policies update
for secure data retrieval. Ciphertext-policy attribute-based
encryption (CP-ABE) is a promising cryptographic solution to
the access control issues. However, the problem of applying
CPABE in decentralized DTNs introduces several security and
privacy challenges with regard to the attribute revocation, key
escrow, and coordination of attributes issued from different
authorities. In this paper, we propose a secure data retrieval
scheme using CP-ABE for decentralized DTNs where multiple
key authorities manage their attributes independently. We
demonstrate how to apply the proposed mechanism too
securely and efficiently manage the confidential data
distributed in the disruption-tolerant military network.
|
Download
|
29 |
Privacy-Preserving Using Multi- Keyword
Search over Encrypted Big Data Storage
R.Latha, V.Tamilarasi
Abstract—Security is a prime concern for any service
that provides big data storage. The data of an
individual should remain confidential and should be
accessed only by any authenticated person. The
required features are obtained by introducing a new
technique for providing big data storage i.e. a privacypreserving
multi keyword search over encrypted big
data storage. In this technique the latest proposal of
“Coordinate matching” i.e., “as matching keys as
prospective”, is a well-organized similarity evaluate
among such multi-keyword semantics to refine the
consequence relevance, and has been generally worn in
the plaintext Information recovery (IR) community.
However, how to be appropriate it in the encrypted
cloud data hunt system remains a very difficult task
because of inherent protection and privacy obstacles,
including various strict necessities like the information
privacy, the index privacy, the keyword privacy with
multi storage and multi sharing mechanisms.
|
Download
|
30 |
Conflict Free Packet
Scheduling For Underwater Communication
R.Latha, E.Semmalar
Abstract—This concept has the multiparty crisis of sachet
preparation and self-localization in an underwater auditory
antenna system with arbitrarily scattered nodes. In packet
scheduling, we should concentrate to diminish the localization
instance; we consider two package transmission schemes
explicitly a clash-free of charge scheme (CFS), and a conflicttolerant
scheme (CTS). The mandatory localization moment is
formulate for these schemes, and in the course of systematic
domino effect and statistical examples and implementation are
revealed to be reliant on the conditions. When the sachet period
is diminutive (as per the result in the localization package), in the
service region is huge (above 3 km in at any rate one aspect), and
the typical prospect of packet-thrashing is not lock to zero, the
conflict-liberal scheme is originate to involve a minimum
localization instance. Simultaneously its accomplishment
intricacy is inferior to that of the conflict-free scheme, because in
CTS, the anchor works autonomously. CTS consume to some
extent more force to composition for package collision, but it is
exposed to afford a better localization precision.
|
Download
|
31 |
Multiple Transmission Techniques With Defective Cell And
Other Cell CSI
Senthilmurugan.J, Janani.K.T, Diviya.R
Abstract—CoMP transmission for LTE-Advanced systems
promises improved throughput and coverage performance,
especially for cell edge users. The concert of CoMP systems
heavily depends on the feedback feature and channel
imperfections. The collision of quantized and deferred channel
state information (CSI) on the standard feasible rate of joint
transmission (JT) and coordinated beam forming (CBF) systems.
CSI originate closed-form terminology and precise
approximations on the estimated sum rate of CoMP systems with
deficient CSI assuming small-scale Rayleigh fading, path loss
attenuation, and other-cell interference (OCI).Multiple users are
additional sensitive to CSI imperfections than single-user JT and
Coordinated multipoint or cooperative MIMO is one of the
capable concepts to progress cell edge user data rate and spectral
efficiency. Interference can be subjugated or mitigated by
assistance between sectors or different sites. Multimode
transmission system that switches among CoMP schemes to
exploit the addition rate. Finally, Multimode transmission
(MMT) policy, which enables us to identify which CoMP scheme
provides the largest throughput in each system operating regime,
depending on the normal SNR, feedback bits amount of the delay
on CSI, as well for instance on the number of antennas and users
served. This scheme adaptively switches among different CoMP
transmission modes to maximize the sum rate. Since different
path loss attenuation is considered for the users and OCI is
included in the model, several performance metrics cannot be
derived in closed form. Use a moment matching technique to
approximate the interference distribution, which is given by the
weighted sum of chi-squared random variables, by a Gamma
distribution.
|
Download
|
32 |
Segmentation of unsupervised multispectral satellite
imaginary using mean shift, minimum spanning tree
and watershed based clustering techniques
J.Senthil Murugan, A.Kavithhamani, M.keerthana
Abstract—An unsubstantiated density centered subdivision;
merging an altered mean-shift (MS) and an original tinniest
traddling tree (TST) based gathering method of the slightest bit
detected satellite metaphors has stayed projected in this
communication. The image is first preprocessed by an adapted
variety of the typical MS created dissection which conserves the
necessary discontinuities contemporary in the twin and
assurances completed separation in the productivity. An adjacent
neighbor based technique for approximating the bandwidth of the
grain mass estimator (GME) and a original closure condition
have been unified into the customary MS. Since the segmented
sections as bulges in a squat equal article interplanetary, a TST is
assembled. An unsubstantiated method to collection a presumed
MST has also been devised here. This type of amalgam dissection
procedure which collections the sections its place of twin pixels
diminishes importantly the compassion to sound and augments
the complete dissection presentation. The dominance of the
projected method has been investigated on a great set of
multispectral metaphors and associated with some well-known
fusion segmentation representations.
|
Download
|
33 |
Access Point Diversity Using Seamless Internet
Access for Moving Vehicles
M.Nishanthi, S.Sivakumar
Abstract—The cellular networks have been proven to
be insufficient for the surging amount of data from
Internet-enabled mobile devices. Due to the explosive
growth of the subscriber number and the mobile data,
cellular networks are suffering overload, and the
users are experiencing service quality degradation. In
this project implement seamless and efficient WIFIbased
Internet access from moving vehicles. In our
implementation, a group of aps are employed to
communicate with a client (called “AP diversity”),
and the transmission succeeds if any AP in the group
accomplishes the delivery with the client (called
“opportunistic transmission”). Such AP diversity and
opportunistic transmission are exploited to overcome
the high packet loss rate, which is achieved by
configuring all the aps with the same MAC and IP
addresses. With such a configuration, a client gets a
graceful illusion that only one (“virtual”) AP exists,
and will always be associated with this “virtual” AP.
Uplink communications, when the client transmits a
packet to the virtual AP, actually multiple aps within
its transmission range are able to receive it. seamless
in the sense that any user can use it and maintain his
workspace, including all existing network connections
without manual configuration and with minimal
network overhead. In downlink, a packet destined for
a client is first pushed to a group of APs through
multicast. This AP group is maintained dynamically
to follow the moving client.
|
Download
|
34 |
Small Finding Mechanisms to Track Your Belongings
M.Sakthivel, P. Saravanan, M.Pandian
Abstract—Objective: Present a real-time way established on
Bluetooth for pursuing mechanisms to retain your
belongings safe.
Methods: The incentive of this discover is for all
kind of people who losing their belongings, can trail
their items by employing Bluetooth- Pursuing
mechanism that is PROTAG ELITE.
Findings: The Bluetooth- Pursuing mechanism that
is PROTAG ELITE is utilized to trail each kind of
your belongings. PROTAG ELITE is a sleek and
slender trust card sized Bluetooth- Pursuing
mechanism that automatically alerts you whenever
you are out of the enumerated harmless zone. You
can set the distance settings facilely via Wi-Fi
networks. Just slide this into your purse (or) wallet
and be on your way. It uses Bluetooth low power
knowledge that run on both IOS and Android periods
and its USB chargeable battery can last 18 months.
Improvements: The drawbacks are decreased in this
counseled system. Finally, examination aftermath
displayed that the counseled method provides 99%
pursuing of your belongings.
|
Download
|
35 |
Review on MRI Brain Tumor Classification Using SVM
Classifier
Aparna M. Nichat, S. A. Ladhake
Abstract—The field of medical imaging gains its importance with
increase in the need of automated and efficient diagnosis in a
short period of time. MRI is the most important technique, in
detecting the brain tumor. In this paper data mining methods are
used for classification of MRI images. A new hybrid technique
based on the support vector machine (SVM) and modified fuzzy
c-means for brain tumor classification is discussed. The purposed
algorithm is a combination of support vector machine (SVM) and
modified fuzzy c-means, a hybrid technique for prediction of
brain tumor. In this algorithm the first stage is noise reduction
using Median Filtering. Modified fuzzy c-means (FCM)
clustering is used for the segmentation of the image to detect the
suspicious region in brain MRI image. Texture based features
such as GLCM(Gray Level Co-occurrence Matrix)features is
used for extraction of feature from the brain image, after which
SVM technique is applied to classify the brain MRI images,
which provide accurate and more effective result for
classification of brain MRI images.
|
Download
|
36 |
Path Planning in Indoor and Known Environment using
BAPSO Algorithm
Mukesh Kumar Nandanwar, Dr. Rekh Ram Janghel, Dr. A.S. Zadagaonkar
Abstract—The path planning through BAPSO algorithm in
indoor and known environments is a novel approach for robotic
path planning. The BAPSO is a hybrid (BAT and PSO)
algorithm. The main challenges of robotics are its automation
and detection capability and the preliminary step of achieving
these is through optimized path establishment, formation,
flocking, and rendezvous, synchronizing and covering. Robotic
Path Planning is one of the main problems that deal with
computation of a collision-free path for the given robot, along
with the given map on which it operates. Path establishment is
possible only when the environment is known and the targets
location is estimated. This work focuses on Path planning
problem of coordinated multi-agents, target tracking and
reaching in the indoor and known environment through
obstacles avoidance. We are also showing the comparative results
for this algorithm with other state of the art techniques.
Parameters that asses these algorithms are no of node visit (move)
and time elapsed (time).
|
Download
|
37 |
Role of Advanced Building Façade System Considering
Sustanaibility & Renewabale energy Practices:
Analyzing the need of sustainibility with Technology
Ar. Farhat Ali
Abstract—The External building facade plays an essential role in
saving or consuming energy, depending on the type of the
covering and design. Architects and engineers have to study
many concerns when working with facade designs, including
ecofriendly issues, aesthetic presence, and inhabitant luxury, and
view; these aspects make the façade a sustainable component.
The purpose of this paper is to review the current practice and
development of the sustainable features for façade system and to
explore its role in the improvement of energy performance in
buildings thru renewable energy techniques. Another important
factor is the rising global stress to reduce carbon footprint and
concerns for creating sustainable environments, where an effort
are being construct innovative solutions and emerging trends in
tall building designs for environmental sustainability. This paper
discusses environmental sustainability in various buildings with
special reference to the application of renewable energy
technologies. This article presents an innovative façade system
designed to increase the thermal comfort inside building.
Renewable energy and considering sustainable aspects might
reduce the load of various mechanical energy sources.
|
Download
|
38 |
Impact of circular strength training with tapering
on selected physical and performance variables
Among handball players
S. Rameshkumar, Dr.R. Jayachandran
Abstract—The purpose of the study was to find out
the impact of circular strength training with
tapering on selected physical and performance
variables namely grip strength, maximum strength,
core strength, Explosive power, Flexibility among
male handball players. To achieve the purpose of
the study twenty eight male handball players have
been randomly selected from various colleges in the
state of Tamil Nadu, India. The age of subjects
were ranged from 18 to 25 years. The subjects had
past experience of at least three years in handball
and only who those represented their respective
college teams were taken as subjects. A series of
physical tests was carried out on each participant.
grip strength assessed by grip dynamometer,
maximum strength assessed by1RM test, core
strength assessed by plank test, Explosive power
assessed by Seated Medicine Ball Throw, flexibility
assessed by sit and reach and performance
variables assessed by judges rating. The subjects
were randomly assigned into two groups of
fourteen each, such as experimental and control
groups. The experimental group participated in the
circular strength training with tapering for 3 days
a week, one session per day and for 8 weeks each
session lasted 45 minutes. The control group
maintained their daily routine activities and no
special training was given. The subjects of the two
groups were tested on selected variables prior and
immediately after the training period. The collected
data were analyzed statistically through analysis of
covariance (ANCOVA) to find out the significance
difference, if any between the groups. The 0.05 level
of confidence was fixed to test the level of
significance difference, if any between groups. The
results of the study showed that there was
significant differences exist between circular
strength training with tapering group and control
group. And also circular strength training with
tapering group showed significant improvement on
grip strength, maximum strength, core strength,
explosive power, flexibility and performance
compared to control group.
|
Download
|
39 |
Enhancing the Performance of Identification System Based
on Score Level Fusion
Subhash V.Thul, Anurag Rishishwar, Bhagwat Kakde
Abstract—Biometric recognition, or simply biometrics, refers to
the use of distinctive anatomical and behavioural characteristics
or identifiers (e.g., fingerprints, face, iris, voice, hand geometry)
for automatically recognizing a person. In unimodal biometric
systems the recognition accuracy has to contend with a variety of
problems such as background noise, noisy data, non-universality,
spoof attacks, intra-class variations, inter-class similarities or
distinctiveness, interoperability issues. In this paper a
multimodal biometric system that integrates multiple traits of an
individual for recognition has been described, which is able to
alleviate the problems faced by unimodal biometric system while
improving recognition performance. A multimodal biometric
system can be developed by combining iris and face at match
score level using simple sum rule. The match scores are
normalized by min-max normalization. The identification and
verification by this system is much more reliable and precise
than the individual biometric systems.
|
Download
|
40 |
Text Mining: Technique, Tools & Mining Process
Shravan Kumar, Naazish Rahim
Abstract—Text mining is a burgeoning new field that attempts to
glean meaningful information from natural language text. It may
be loosely characterized as the process of analyzing text to
extract information that is useful for particular purposes.
Compared with the kind of data stored in databases, text is
unstructured, amorphous, and difficult to deal with
algorithmically. Nevertheless, in modern culture, text is the most
common vehicle for the formal exchange of information. The
field of text mining usually deals with texts whose function is the
communication of factual information or opinions, and the
motivation for trying to extract information from such text
automatically is compelling—even if success is only partial. Four
years ago, Hearst [Hearst, 1999] wrote that the nascent field of
“text data mining” had “a name and a fair amount of hype, but
as yet almost no practitioners.” It seems that even the name is
unclear: the phrase “text mining” appears 17 times as often as
“text data mining” on the Web, according to a popular search
engine (and “data mining” occurs 500 times as often).
|
Download
|
41 |
Queue Length Based CSMA/CA Algorithm for Corn
Using Channel Allocation Algorithm
Latha.R, Sathishkumar.G
Abstract—CSMA-type random access algorithms can achieve maximum possible throughput in wireless networks. Cognitive Radio Networks allow unlicensed users access licensed spectrum opportunistically without disrupting primary user (PU) communication. Developing a distributed implementation can fully utilize the spectrum opportunities for secondary users (SUs) have so far remained elusive. We are proposing a new algorithm channel allocation algorithm. The proposed algorithm achieves the full SU capacity region while adapting to channel availability dynamics caused by unknown Primary User (PU) activity. Extensive simulation results provided to illustrate the efficacy of the algorithm.
|
Download
|
42 |
Resource Allocation Management System for
Interference Mitigation in Femtocell Networks
Latha.R, Sivaramakrishnan.S
Abstract—One of the helpful techniques of improving
the coverage and enhancing the capacity and resource
allocation in cellular wireless networks is to reduce
the cell size and transmission distances. The concept
of deploying femtocells over macro cell has recently
concerned growing interests in academic circles,
industry, and consistency forums. Various technical
challenges towards group deployment of femtocells
have been address in recent creative writing.
Interference mitigation femtocell and macro cell is
considered to be one of the major challenges in
femtocell networks because femtocells share the same
permitted frequency spectrum with macrocell the
different state-of-the-art approaches for interference
and resource management in orthogonal frequencydivision
multiple access (OFDMA)-based femtocell
networks. We develop a local searching algorithm
and pareto optimal matching algorithm for using the
project.
|
Download
|
43 |
Design and analysis of luo converter based DMPPT and
CPG for solar PV system
R.Tamilvendan, A.Balasubramaniyan
Abstract—There is increasing urgent energy issues day by day,
that’s why the world attaches great importance to begin the
development of new energy and related technology. At present,
large scale photo-voltaic power generation and scale of renewable
energy has become parts of development strategy, meanwhile it is
the way to guide the development of photo-voltaic industry.
However, because of its own characteristics different from
conventional powergeneration grid connected PV power station
and its security, stability, reliable operation become new
challenges which power grid and PV power plant need to face.
This review paper proposes a new power control concept for
grid-connected photovoltaic (PV) inverters. The new control
strategy is based on combination of a constant power generation
(CPG) control with a distributed maximum power point tracking
control (DMPPT) depending on the instantaneous available
power from the PV panels. The essence of this concept lies in the
selection of an appropriate power limit for the CPG control to
achieve an improved thermal performance and an increased
utilization factor of PV inverters. Ultimate objective is to cater
for a higher penetration level of PV systems with intermittent
nature.
|
Download
|