Sr/No/ |
Title |
Pdf |
1 |
A Study on Problems of Handloom Weavers
R.Jayachitra
Abstract —The Government of India is aware about the
constraints/problems being faced by the handloom
weavers throughout the country primarily due to low
productivity, stiff competition from power loom and
mill sector, inadequate inputs supply and marketing
facilities as well as insufficient credit flow from
institutional sources. For the overall development of
handloom sector and welfare of handloom weavers, the
Government of India has taken policy initiatives ad
schemes interventions like cluster approach,
technological up-gradation, marketing promotion,
revival of viable and potentially viable societies through
loan waiver and recapitalization assistance, availability
of subsidized yarn and credit, besides, providing health
and life insurance cover to the handloom weavers. This
study tries to identify the problems faced by handloom
workers.
|
Download
|
2 |
Light Weight Secure Protocol in IOV Network for
RSU –Internet of things
R. Hemalatha, M. Ganesan
Abstract—A Roadside Unit (RSU) Cloud, a Vehicular
Cloud, as the operational backbone of the Vehicle
Grid in the Internet of Vehicles (IoV). The
architecture of the proposed RSU Cloud consists of
traditional and specialized RSUs employing Software
Defined Networking (SDN) to dynamically
instantiate, replicate and, or migrate services. We
then present a detailed reconfiguration overhead
analysis to reduce reconfigurations, which are costly
for service providers. VANET has been a core
networking technology to provide safety and comfort
to drivers in vehicular environments. Emerging
applications and services, however, require major
changes to its underlying computing and networking
models, which demand new network planning for
VANET with encryption of data and provide
malicious attack from third party.
|
Download
|
3 |
Storing chemical equation, images in database and generating report
Vaishnavi Kokitkar, Gauravi Patil, Charles Varghese, Asst Prof. Nayana Vaity
Abstract—In the current industrial world, the use and extend of database is on the rise. Database plays an important role in managing the entire data of the firm. It is always necessary to segregate data properly to be stored in the database. This document focuses on furnishing the storage of data batch wise and in presentable way so that report generation is made easy and provides a way for better user interface. Report generation is done based on the user’s requirement. Along with this, the feature of storing chemical equations and images is implemented. Major aim is to store the data in a proper format and batch wise along with storing the chemical equations and images in the database.
|
Download
|
4 |
A five-level single-phase grid-connected
Converter for renewable distributed systems
M.Santhosh Reddy, Dr.V.Balakrishna Reddy
Abstract—In low-power renewable systems, a singlephase
grid-connected converter is usually adopted.
This paper deals with a novel five-level converter
topology that follows this trend. A review of the state
of the art of the five-level topologies and a theoretical
power loss comparison with the proposed solution is
realized. The proposed converter architecture is
based on a full-bridge topology with two additional
power switches and two diodes connected to the
midpoint of the dc link. Since the two added levels
are obtained by the discharge of the two capacitors
of the dc link, the balancing of the midpoint voltage
is obtained with a specific pulse width modulation
(PWM) strategy. This solution is designed for
renewable energy systems, where unity power factor
operations are generally required. Never the less, a
variation of the proposed topology which allows
four-quadrant operations.
|
Download
|
5 |
Designing of PV Cell and Analysis of It Under Rapid
Irradiance Changing Conditions
K.Narender Reddy, R.Shashi Kumar Reddy, M.S.Teja
Abstract—As we all know photovoltaic cell (PV cell) is the basic
building block of solar panel. In literature we are provided
with many circuits to design PV cell. This proposed paper
discuss about the basic design circuit of typical PV and its
dependence on temperature and irradiation. This paper also
analysis the operation of PV cell under partial shading and
basic circuits for overcoming partial shading are discussed.
This paper summarizes the various circuits used under partial
shading and algorithms are also provided. The concept is
evaluated using Matlab-Simulink simulation and proven using
an experimental test rig. The performance of the proposed
circuit is analyzed when PV arrays are subjected to rapid
changing conditions. The results showed the variation of power
with respect to changes in irradiance.
|
Download
|
6 |
Modern Exploitation of Minerals, Precondition of
Capitalism of Mineral Resources
Rafet Zeqiri, Shyqri Kelmendi, Izet Zeqiri, Muhamedin Hetemi, Gzim Ibishi
Abstract—Mining technology, in the last 15 years has dramatically
changed in the region and world in general. Globalization of
Mining Industry, determine the change in technology and
Mining methods too. In every stage of mining production the
work is mechanized, highly productivity and electro-hydraulics
machineries are required. Underground mining workshops,
regardless of mining methods, most of the cases are required
previous prepared access deposits which are specified from the
easy and fast access of mechanism in the working place. For
Metal Mines in Kosovo, application and usage of ramp is
becoming useful to make it easy to access in different workshops.
Ore bodies in Mines of Kosovo have their own specifics. We deal
with large, medium and small ore bodies, which are followed by
instable head roofs. This sometimes makes it impossible to focus
on modern exploitation techniques, so this fashion of exploitation
offers possibilities to increase mining intensity. In this paper we
are focused on access deposits and planning exploitation, drilling
mechanism, blasting, safety at working place, primary
transportation and horizontal transportation.
|
Download
|
7 |
PV Module Traction and Monitoring the Power Generation
Using Embedded System
V.Mahesh,M.Banupriya,R.Deepika,T.Sathyaran
Abstract— As the energy demand and the environmental
problems increase, the natural energy sources have become very
important as an alternative to the conventional energy sources.
The renewable energy sector is fast gaining ground as a new
growth area for numerous countries with the vast potential it
present environmentally and economically. Solar energy plays
an important role as a primary source of energy, especially for
rural area. This paper aims at the development of process to
track the sun and attain maximum efficiency using Arduinouno
and LabVIEW for real time monitoring. The project is divided
into two stages, which are hardware and software development.
In hardware development, four light dependent resistor (LDR)
has been used for capturing maximum light source. Two DC
motors have been used to move the solar panel at maximum
light source location sensing by LDR. The GUI is constructed by
using LabVIEW. The performance of the system has been
tested and compared with static solar panel. This paper
describes the design of a low cost, solar tracking system.
|
Download
|
8 |
Copairable Graphs
Selvam Avadayappan, M. Bhuvaneshwari and R. Sountharya
Abstract—Let G(V,E) be a connected graph. For a vertex v, in V
the set of all adjacent vertices of v is called an open neighbourhood
of v and is denoted by N(v). The neighbourhood complement of v is
denoted by N(v)c , the set of all non-adjacent vertices of v along
with v itself. The closed neighbourhood of v is defined by N[v] =
N(v) {v}. Any two adjacent vertices u and v in G is said to be
pairable, if N[u] = N[v]. A copairable graph is defined as a graph in
which for any vertex uV, there exists a vertex v in V, such that a
vertex w in V is adjacent to u if and only if it is not adjacent to v. In
this paper, we study about this new family of graphs.
|
Download
|
9 |
Design and Implementation of Black Box in Car using GSM
and GPS Tracker
T.Sureshbabu, R.Prasanth, M.Rajkumar, N.Vizhal
Abstract—Our research has been targeted towards building an
integrated system for emergency rescue services in the event of
a road accident. The project focuses on building an
infrastructure which vehicle safety authorities can implement
to enhance the reporting of vehicle crashes, provide post-crash
analysis using motion sensors, record of the event in images
and reduce the time it takes for emergency rescue to arrive at
the crash location. We have achieved this using existing cellular
network infrastructure already in place and also using GPS to
pinpoint the exact location of the crash and send that data to
an emergency rescue authority (such as Hospital, Fire
Department, Police) using GSM text service. Our target was to
build a low cost device that everyone can afford and use in
their vehicles.
|
Download
|
10 |
Automation of Sugarcane Feeding System Using Wireless
Sensor Network
S.Arulmurugan, S.Chitra, V.Padma priya, G.Sathiya
Abstract—To design the Automation of sugarcane feeding
system (ASF) with the help of a sensor network. ASF system
introduces the large-scale sugarcane stripper with automatic
feeding. It contains the automatic feeding module, collecting
module and control module. In this system when sugarcane is
loaded to the feeder, it will start to shift the sugarcane from
automatically feeder to conveyer. When the conveyer section
reached maximum sugarcane weight then ASF system will
automatically stop the feeder section at the same time when the
conveyer section \have high amount of sugarcane, it will
automatically slow down the transfer belt of the feeder section.
ASF system is automatically control the feeding module and
collecting module.
|
Download
|
11 |
Effect of Nano additive on properties, performance and
emission of CI engine fuelled with diesel, biodiesel and its
blends- A Review
Miss. Pallavi V. Ghogare, Dr. N. W Kale
Abstract—The various environmental and economic benefits has
made the biodiesel preferable as compare to diesel in diesel
engine, in past two decades. There is a lot of scope for further
improvement in the performance and emission reduction with
biodiesel as the fuel. The emission reduction properties of
biodiesel have gained the importance to increase the
performance of a diesel engine. Further to these inclusive
properties of biodiesel; several efforts are being made to improve
the properties of biodiesel in recent years. It includes the use of
nanoparticles as additives in diesel improve the thermo physical
properties, such as high surface area-to-volume ratio, thermal
conductivity, and mass diffusivity, when dispersed in any base
fluid medium. As per the experimental result available in
literature it has been found that use of Nano additives with
diesel, Biodiesel and its blends improves the kinematic viscosity,
flash point, fire point and other properties depending upon the
proportionate use of Nano additives. In the present work a
review has been made to study the effect of dispersion of various
Nano additives on the enhancement of the performance and
emission reduction characteristics of a CI engine fuelled with
diesel, biodiesel, and its blends and a summary of the observation
based on the literatures are reported in the conclusion.
|
Download
|
12 |
An Implementation on Integer DCT Architectures for
HEVC with Error Compensation
Dr.B.B.M.KrishnaKanth
Abstract—In this paper, we present area- and powerefficient
architectures for the implementation of integer
discrete cosine transform (DCT) of different lengths to
be used in High Efficiency Video Coding (HEVC).We
show that an efficient constant matrix multiplication
scheme can be used to derive parallel architectures for
1-D integer DCT of different lengths. We also show that
the proposed structure could be reusable for DCT of
lengths 4, 8, 16, and 32 with a throughput of 32 DCT
coefficients per cycle irrespective of the transform size.
In this paper mainly we focus on the error
compensation by using a adder tree. Previously for this
error compensation high-throughput DCT designs have
been adopted to fit the requirements of real-time
application. Operating the shifting and addition in
parallel, an error-compensated adder-tree (ECAT) is
proposed to deal with the truncation errors and to
achieve low-error and high-speed discrete cosine
transforms (DCT) design. Instead of the 9 bits used in
previous works, 4-bit Distributed Arithmetic was
proposed. DA based DCT design with an errorcompensated
adder-tree (ECAT) is the proposed
architecture in which, ECAT operates shifting and
addition in parallel by unrolling all the words required
to be computed. Furthermore, the Error-Compensated
Circuit alleviates the truncation error for high accuracy
design. Based on low-error ECAT, the DA-precision in
this work is chosen to be 4 bits instead of the traditional
9 bits. Therefore, the hardware size and cost is reduced,
and the speed is improved using the proposed
ECAT.Also we reduces the time delay than previous
method.
|
Download
|
13 |
Economics Load Dispatch Using Particle Swarm
Optimization with Quadratic Cost Function
Ankur Saxena
Abstract—Economic load dispatch is a non linear
optimization problem which has greater value in
power system. By economic dispatch means to
know the generation of different units of plant so so
find the total fuel cost is minimum .This paper
presents the solution of economic load dispatch
problem with quadratic cost function by using
Particle Swarm Optimization (PSO). PSO
technique is useful at solving optimization
problems with both single and multiple objective
functions with discontinuous, non-convex, nondifferentiable
solution and noisy .Various factors
like optimal dispatch, total cost, and incremental
cost of delivered power are evaluated. These
methods for economic dispatch in power system
problem in power system is tested and proved on
the Nigerian Grid System.
|
Download
|
14 |
Test Cases Generated By Using UML Diagram
Satinder Kaur, Prof.Rasbir Singh
Abstract—In order to develop effective software, the main thing is
to consider that the developed software should be error free. But
the reality is that, it is impossible to develop software which is
completely free from errors. So, developers try to develop
software which may generate errors in rare cases. For this
purpose, Software Testing plays an important role in Software
development because it can minimize the development cost and
improve the system performance. In today’s world functionality
of software increases very quickly which may increase the
complexity and size of software applications, Due to this more
emphasis has been sited on object oriented design strategy to
reduce the complexity of the software which in turns reduces the
software cost and increase its performance. Also, developers
should concentrate on designing and coding of the software. An
innovative approach is to use UML models for the development
of the software, which consists of the designing and coding of the
software. Designing phase is done with the help of the UML
models. If the design is accurate then it will help in coding of the
system in an effective manner. So, the proposed approach will
focus on the UML activity diagram for the designing of the object
oriented system.
|
Download
|
15 |
Multiband Antenna using Excavated Coupling Element
Approach Design for 4G LTE Band in Handheld Terminal
NaveenKumar P#1, Dr G.A Bidakar
Abstract—This paper proposes a novel antenna design for
handheld terminal operating in LTE bands. The design involves
two antennas ,one operating in a lower band of 700-960MHz while
the other antenna incorporated in the same space operates in a
higher frequency band of 1700-2700MHz.These two antennas are
individually fed and excited demonstrating high port-to-port
isolation. A unique type of excavated coupling element is used for
lower band operation while the space availed by excavation is
used to incorporate a high band antenna which is a simple
monopole structure. The coupling element used for low band
operation couples the radiation modes of chassis and requires a
matching network comprising SMD components, monopole
structure for high band operation on the other hand is a self
resonant antenna structure modified with certain broad banding
techniques. Careful placement of high band antenna and band
stop behavior of matching network is used to establish port to
port isolation. The simulated model is further used with
approximated human head model to investigate specific
absorption rate (SAR) characteristic of the design and the entire
design process is carried out in full wave electromagnetic
simulator Ansoft HFSS.
|
Download
|
16 |
Secured Data Lineage Transmission in Malicious
Environment
R. Gayathri,K.Indumathi,P. Githanjali,V. Roobini
Abstract—In this paper contains the fulfillment of Data Lineage
in Malicious Environment. A data distributor has given precise
data to a set of supposedly trusted agents. Some of the data are
leaked and found in an unjustified place. The distributor must
assess the likelihood that the crevice data came from one or more
agents, as opposed to having been individually gathered by other
means. We propose data allocation strategies that improve the
probability of identifying crevices. These methods do not build
on alterations of the released data. In some cases, we can also
implant “realistic but fake” data records to further improve our
chances of detecting crevice and identifying the guilty party.
While sending data over the network there is lots of illegitimate
user trying to get useful information. There should be proper
security should be provided to data which is send to network.
Now a days smartphones use have been increased rapidly and the
applications used in smartphones can get easy access to our
confidential information. So for avoiding this we used the data
lineage mechanism. We give the fake information to guilty agent.
We develop and analyze a novel accountable data transfer
protocol between two entities within a malicious environment by
building upon oblivious transfer, robust Watermarking, and
signature primitives. Finally, we perform an experimental
evaluation to demonstrate the practicality of our protocol and
apply our framework to the important data leakage scenarios of
data outsourcing and social networks. In general, we consider
our lineage framework for data transfer, to be a key step towards
achieving accountability by design.
|
Download
|
17 |
Secured Data Transmission in Cloud Environment with
trusted party using authentication
A. Parkavi, R. Ramakrishnan
Abstract—Off-site data storage is an application of cloud that
relieves the customers from focusing on data storage system.
However, outsourcing data to a third-party administrative
control entails serious security concerns. Data leakage may occur
due to attacks by other users and machines in the cloud.
Wholesale of data by cloud service provider is yet another
problem that is faced in the cloud environment. Consequently,
high-level of security measures is required. In this paper, we
propose Data Security for Cloud Environment with Semi -
Trusted Third Party (DaSCE), a data security system that
provides (a) key management (b) access control, and (c) file
assured deletion. The DaSCE utilizes Shamir’s (k, n) threshold
scheme to manage the keys, where k out of n shares are required
to generate the key. We use multiple key managers, each hosting
one share of key. Multiple key managers avoid single point of
failure for the cryptographic keys. We (a) implement a working
prototype of DaSCE and evaluate its performance based on the
time consumed during various operations, (b) formally model
and analyze the working of DaSCE using High Level Petri nets
(HLPN), and (c) verify the working of DaSCE using Satisfiability
Modulo Theories Library (SMT-Lib) and Z3 solver. The results
reveal that DaSCE can be effectively used for security of
outsourced data by employing key management, access control,
and file assured deletion.
|
Download
|
18 |
Automatic Mechanical Sprocket Side Stand Retrieve
System
J. K. Singh, Roshan Malakar, Keshav Verma, Vikram Sonkar, Shitesh Nayak
Abstract—In modern developing world, automatic process plays
a major role especially in automotive technology. In spite of their
easiness of use, sometime they are prone to accidents. The two
wheeler concerned accidents occurs due to riding the vehicle
without maintaining the speed limit and forgets to lift the
side stand while riding the vehicles. The automatic
mechanical side stand retrive system can reduces the accident if
rider forgot to lift the side stand. To resolve this issue, the
systematic design of system is made with the aim to consume
very low amount of power initially for few seconds to retrieve
the stand. To achieve the objective, the power obtained from the
chain drive is transmitted to the appropriate component without
power loss. Then the power consumption does not occur after
retrieving the stand. The result of automatic mechanical
sprocket side stand retrieve system is t h a t t h e r e i s no
need of external source, no electric control required and more
customer safety. The scope of the study is to implement this
system in all types of bikes by changing small variation in size
and cost so that automatic mechanical sprocket side stand
retrieve system will be the safer and life saver.
|
Download
|
19 |
Remote Access Trojan
Snehal Sawant, Masira Shaikh
Abstract—Remote Access Trojan (RAT) allowing a
potentially malicious user to remotely control the system. A
Remote Access Trojan is remote control software that when
installed on a computer it allows a remote computer to take
control of it. A Remote Access Trojan (RAT) allows an
attacker to remotely control a computing system and
typically consists of a server invisibly running and listening
to specific TCP/UDP ports on a victim machine as well as a
client acting as the interface between the server and the
attacker. The most common means of infection is through
email attachments. The developer of the virus usually uses
various spamming techniques in order to distribute the
virus to unsuspecting users. Malware developers use chat
software as another method to spread their Trojan horse
viruses such as Yahoo Messenger and Skype. Remote Access
Trojans (RATs) are malicious pieces of code often
embedded in lawful programs through RAT-sanction
procedures. They are stealthily planted and help gain access
of victim machines, through patches, games, E-mail
attachments, or even in legitimate-looking binaries. Once
installed, RATs perform their unexpected or even
unauthorized operations and use an array of techniques to
hide their traces to remain invisible and stay on victim
systems for the long haul.
|
Download
|
20 |
Secured Data Transmission Lineage in Malicious Cloud
Environments
V. Brindha, Dr. N. Danapaquiame
Abstract—In this paper contains the fulfilment of Data Lineage
in Malicious Environment. A data distributor has given precise
data to a set of supposedly trusted agents. Some of the data are
leaked and found in an unjustified place. The distributor must
assess the likelihood that the crevice data came from one or more
agents, as opposed to having been individually gathered by other
means. We propose data allocation strategies that improve the
probability of identifying crevices. These methods do not build
on alterations of the released data. In some cases, we can also
implant “realistic but fake” data records to further improve our
chances of detecting crevice and identifying the guilty party.
While sending data over the network there is lots of illegitimate
user trying to get useful information. There should be proper
security should be provided to data which is send to network.
Now a days smartphones use have been increased rapidly and the
applications used in smartphones can get easy access to our
confidential information. So for avoiding this we used the data
lineage mechanism. We give the fake information to guilty agent.
We develop and analyze a novel accountable data transfer
protocol between two entities within a malicious environment by
building upon oblivious transfer, robust Watermarking, and
signature primitives. Finally, we perform an experimental
evaluation to demonstrate the practicality of our protocol and
apply our framework to the important data leakage scenarios of
data outsourcing and social networks. In general, we consider
our lineage framework for data transfer, to be an key step
towards achieving accountability by design.
|
Download
|
21 |
Cluster based approach for processing Voting Data
Using MapReduce Approach
R. Dhanalakshmi, S. Kalaiarasi, K. Sivagangai, J. RamyaRajalakshmi
Abstract—Big Data is the most promising research
area in the field of Cloud Computing. In areas like
social networking applications, e - commerce, finance,
health care, education, etc, huge amount of data is
being accumulated. As new data and updates are
constantly arriving, the results of data mining
applications become stale and obsolete over time.
Hence another approach is required for mining big
data. Hence in this paper, a cluster based approach is
introduced which guarantees an efficient processing
of big data. This approach is experimented with the
real time voting data of an election. Furthermore, the
performance is compared with the existing data
mining applications of big data.
|
Download
|
22 |
A Novel Based Equalization Model for Contrast
Images with Enhanced Video Processing
D.Kameshwari, R.Lakshmi@Rametha, P. Sowmmiya, P. Santhosh Kumar
Abstract—With the progress of technologies and the
popularity of imaging devices, billions of digital
images are created every day. Because of detrimental
environment, the nature of the image is not
satisfactory. As a result, image enhancement is
needed. To date, contrast enhancement process plays
an important role in enhancing image’s quality.
Several previous studies proved that contrast
enhancement techniques capable to clean up the
unwanted noises and enhance the image’s brightness
and contrast. In this paper, we combine both grey
balancing and contrast enrichment to accomplish
good tone even as preserving contrast of an image
using linearity and non-linearity functions of
histogram transform.
|
Download
|
23 |
Use of UML Activity Diagram for Generation of Test Cases
Satinder Kaur, Prof. Rasbir Singh
Abstract—Object-Oriented program have changed the scenario of
software development industry in terms of software development
and its supporting technology. UML, which supports objectoriented
technology, is widely used to describe the analysis and
design specifications of software development. UML models are
an important source of information for test case design. So, new
testing techniques and practices including international
standards for specifying how systems should work - such as
Unified Modeling Language (UML) - have been established.
Therefore, a new technique is presented for generating test cases
for object oriented system using UML models. This technique is
helpful in generating more test cases which will cover maximum
aspects of the system. With the help of test cases chances of
finding a bug is more. Means, generation of test cases is the most
important issue in the software testing. Thus test cases need to be
carefully designed. Test cases can be generated manually or
automatically. Our focus is to generate test cases automatically by
using UML Activity diagram. Activity diagrams are even more
challenging for creating test cases. The test cases thus generated
are suitable for dynamic testing of system. The proposed
approach is to automate the generation of test scenarios from
activity diagram using DFS and BFS method. By using these two
methods, the useless test paths are eliminated which in turn
reduces the time complexity. This approach also helps in
synchronization between various activities. This approach was
found to be effective in reducing the time complexity also.
|
Download
|
24 |
Dual Vector Control For Grid Interactive
Converters In Smartgrid Under Unbalanced
Conditions
T.Saravanakumar, R.Prassannakumar
Abstract—The Voltage unbalance in a three-phase
grid connected system causes performance
deterioration of a pulse-width modulation (PWM) of
Voltage source converter. It may also produce voltage
ripples in the dc link and also increase the reactive
power and have negative impact on grid current. In
order to eliminate the voltage ripple along dc link
capacitor and the dc component of the reactive
power, both positive sequence and negative sequence
currents should be controlled separately. Therefore
this paper utilizes synchronous reference frame
theory. One where the positive sequence currents are
regulated by a proportional integral (PI) controller in
a positive synchronous reference frame (SRF), and
the other negative sequence currents are regulated by
a PI controller in a negative synchronous reference
frame. The positive reference frame which rotates
counter clockwise, the positive sequence will appears
as dc, while the negative sequence appears as 100 Hz.
In same manner the negative sequence reference
frame, which rotates clockwise, where the negative
sequence appears as dc, while the positive sequence
components appears as 100 Hz. So by eliminating
100-Hz AC components using an Anti -resonant filter
in each SRF, one can measure positive sequence and
negative sequence currents separately. The two
controllers have been designed for controlling current
separately. The demonstration and the effectiveness
of the proposed control scheme are established by
using simulation.
|
Download
|
25 |
Platform Invocation Services Using
Virtual Machines
Mrs.Sadhana Kodali, Muraharirao Mani Sankar Akhil Kumar, Bora Varalakshmi, Messala Ramesh, Basava Chandra Sekhar
Abstract—Cloud computing is a paradigm which offers services
to most of the users worldwide. Pervasive applications from
customers are hosted by large-scale Data Centres. In traditional
Data Centres numbers of services are run onto the dedicated
physical servers. Most of the time, these Data Centres do not use
their full capacity in terms of resources. Here comes the
virtualization concept. Virtualization is the key aspect for this
paradigm in which resources are utilized by running virtual
machines on a physical host [1]. A virtual machine placement in
cloud computing approach will be implemented in our project
by enhancing security to the existing approach and we also
choose to dynamically allocate cloud services to a group of users
by restricting the number of users who join in the group
dynamically by providing a web interface for effective
utilization of software resources.
|
Download
|
26 |
Zero –Free Regions of Analytic Functions with
Restricted Coefficients
M.H. Gulzar, A.W.Manzoor
Abstract—In this paper we find bounds for the zeros of
an analytic function by putting certain conditions on its
coefficients.
|
Download
|
27 |
Audio Denoising using STFT
Shivam Tiwari , Rashika Gupta, Ravimohan
Abstract— In this paper different audio denoising
techniques are discussed. Most of the audio denoising
techniques reduce Gaussian white noise from audio
signals. Diagonal estimation techniques and nondiagonal
estimation techniques are discussed.
Different audio denoising techniques and noises are
shown through the taxonomy. Removing noise from
audio signals requires a non-diagonal processing of
time-frequency coefficients to avoid producing
``musical noise''. State of the art algorithms perform
a parameterized filtering of spectrogram coefficients
with empirically fixed parameters. Use of STFT gives
a free hand for more time or frequency resolution as
it is required. A block thresholding estimation
procedure adjusts all parameters adaptively to signal
property by minimizing a Stein estimation of the risk.
Musical noise is an artifact that can be often heard in
audio signals after denoising.
|
Download
|
28 |
Consistency and Privacy based Replication
System in Cloud Sharing Framework
S. Sindhuja, K. Suriya Prakash
Abstract— The main objective of this paper is Division and
Replication of Data in the Cloud for Optimal Performance and
Security (DROPS) that collectively approaches the security and
performance issues. Firstly, the data owners are registered into
the cloud for using the cloud region and provide the secret key to
trustee parties. The data files are uploaded into the cloud region
for access the genuine users. Then the stored records are
fragmented based on the data size, fragmented data are called
data chunks. Fragments are placed in various providers using TColoring
method. In T-coloring algorithm was implemented to
measure the distance of each data, where the records are placed
in cloud system. This is used for region assignment assigns region
to the nodes, such that the channels are separated by a distance
to avoid obstruction. The genuine users can access the data from
cloud sector through cloud providers. The genuine users have
secret key defined in the cipher text can retrieve the entire data
content. It aims to allow the users with eligible key to decrypt the
entire data stored in the cloud server and it cannot limit the data
access control to the authorized users. Difficult to hack the files
from cloud storage because fragmentation and replication
placement approach. Heuristic auditing strategy (HAS)
techniques used to the chunk the given data source. Data
replication was performed to maintain the multiple copies of
same data on same server or on different servers.
|
Download
|
29 |
Some Results on degree splitting graphs
Selvam Avadayappan and M. Bhuvaneshwari
Abstract—Let G(V, E) be a graph and let Vi denote the
set of all vertices of degree i. The degree splitting
graph DS(G) of G is obtained from G, by adding a
new vertex wi for each partition Vi such that | Vi | ≥ 2
and joining wi to each vertex of Vi. In this paper, we
characterise graphs for which degree splitting graphs
are regular, biregular bipartite.
|
Download
|
30 |
A Novel Approach for FPGA Implementation of Pixel Level
Image Fusion
V.Saravanan, Mr.G.Babu
Abstract—Image fusion is a technology which has great focus on
research domain in recent years. As a result various methods of
fusion techniques are proposed in fields of medical, remote –
sensing, military and compute domains. Hardware
implementations are adopted to tackle real time processing in
different application domains. The images of various samples
from same or different scenes are taken and they are fused and
their coefficients are implemented on FPGA. Histogram
Equalizer (HE) is adopted to detect the specified disease from
scanned CT/MRI image, Adaptive Histogram Equalizer (AHE)
and Principal Component Analysis (PCA) techniques are
employed here for the fusion process, it results in clear and
accurate diagnosis of particular MRI/CT image, the resulted
fused image is implemented in FPGA for the purpose of
diagnosis in medical domain, target detection in remote sensing
and in military purpose.
|
Download
|
31 |
TF-FIU Tree Based Parallel Mining Algorithm for
Frequent Itemset Using Fi2doop framework
S.Sivaranjani, R.Rajmohan, D.Dinagaran, P.Thirugnanam, MO.Ramkumar
Abstract—Existing parallel mining algorithms for
frequent itemsets lack a mechanism that enables
automatic parallelization, load balancing, data
distribution, and fault tolerance on large clusters.
Frequent Itemsets Mining (FIM) is a core problem in
association rule mining (ARM), sequence mining, and
the like. Speeding up the process of FIM is critical and
indispensable, because FIM consumption accounts for a
significant portion of mining time due to its high
computation and input/ output (I/O) intensity. Frequent
itemsets mining algorithms can be divided into two
categories, namely, Apriori and FP-growth schemes.
Apriori is a classic algorithm using the generate -andtest
process that generates a large number of candidate
itemsets. Apriori has to repeatedly scan an entire
database. Rather than considering Apriori and FPgrowth,
we incorporate the TF-FIUT algorithm in the
design of our parallel FIM technique for reducing I/O
overhead and parallelize the traditional FIUT algorithm
for better performance. A pattern mining algorithm
called Fi2Doop is proposed by combining the TF-FIUT
Algorithm and i2 map reduce technique to optimize the
performance of load balancing among the cluster nodes
and avoid conditional pattern bases. Experiments using
real world data demonstrate that our proposed solution
is efficient and scalable.
|
Download
|
32 |
System processing using Oozie Work flow Engine in
Green Cloud Computing
R.Ranjani, Dr.S.Babu
Abstract—Cloud Computing is an evolving area of
efficient utilization of computing resources. It has
changed the model of storing and managing data for
scalable, real time, internet based applications and
resources satisfying end users’ needs. The area of
Green computing is also becoming increasingly
important in a world with limited energy resources
and an ever-rising demand for more computing
power. However, achieving an energy-efficiency
control and simultaneously satisfying a performance
guarantee have become critical issues for cloud
providers. A cost function has been developed in
which the costs of power consumption, system
congestion and server startup are all taken into
consideration. The effect of energy-efficiency controls
on response times, operating modes and incurred
costs are all demonstrated. The aim of the work is to
provide power saving policy for reducing the power
consumption in cloud datacenters. The power that
produces in idle state of server moves to sleep state of
the server. An energy efficient task scheduling
algorithm will be developed that can help to minimize
the scheduling cost and time and to improve the
system performance. An efficient green control
(EGC) algorithm is first proposed for solving
constrained optimization problems. To address the
conflict issue between performances and powersaving,
Energy Efficient Task Scheduling algorithm is
used to minimize server power consumption in cloud
servers.
|
Download
|
33 |
An Analytical Study on Image Classification Methods
Used in Remote Sensing Images
B.Sasi Prabha., Dr.T.Ramaprabha
Abstract—An image classification is a process of dividing
an image into regions and boundaries and it is used to
distinguish the foreground from the background. A
thresholding is one of the simplest and widely well know
technique used for remote sensing image classification.
This field offers various challenges for the researchers. In
this paper, we concentrate on the study of image
classification by using two threshold methods as global
Thresholding and local Thresholding. In global
thresholding, a single threshold value is assigned to whole
image. In the local Thresholding single threshold value is
assigned to each pixel to determine whether it belongs to
foreground or background pixel by using local
information about the pixel. In general, to classify the
local region or restrictions, the local Thresholding method
is more efficient, easy to implement. We get result as
quality of the image, when it is compare to global
Thresholding.
|
Download
|
34 |
Dynamic N-Cut Image Segmentation
Lokesh Sirela, K.Harika, J. Venkatesh, D.Narendra, M.Gopichand
Abstract—We propose a novel approach for solving the perceptual
grouping problem in vision.We treat image segmentation as a
graph partitioning problem and propose a novel global criterion,
The Dynamic normalized cut, for segmenting the graph. We
show that an efficient computational technique for calculating
the number of segments dynamically. We have applied this
approach to segmenting static images and found the results to be
very encouraging.
|
Download
|
35 |
Surveillance Robot Using Zigbee
Prabhu.P, Ragavi.K, Priyanka.E
Abstract—Disasters like earthquakes, tsunami, bomb explosion
and floods often cause loss of precious human lives. Rescue
operations are performed mostly by human often in very
dangerous and risky conditions. Hence, to make the rescue
operation more safe and effective, mobile robots have been
proposed which detect live human beings and wirelessly
communicate with the rescue team. This work aims to develop an
economical robot, which works using human detecting and
obstacle sensors. It can be used in areas where rescue is needed.
The robot senses the human body temperature using PIR sensor
and alarm/indicator indicates the signal when it detects live body
and the message is sent to enable rescue operation using zigbee.
Additionally a wireless camera will be fixed in the robot which
can capture the environment and it can be viewed by audio video
receiver.
|
Download
|
36 |
Treatment of Paraplegia using Electric Current Based on
Weight Distribution
Dr.M.C.Jobin Christ, G.Asha, S.Pavithra
Abstract—Paralysis is a nervous disorder which damages the
nervous system especially spinal cord. The main aim of this
paper is to measure the weight distribution with using load cell,
since it bears the large balances. Load cell is designed to
automatically regulate the balancing pressure. This paper also
provides therapy for patient who is suffering from paraplegia by
using electrical current stimulation technique. The detection has
been done by using two foot plates. Both the foot plate s are
designed with load cells. The detected weight may fed to the
microcontroller and the output is displayed in LCD. Depending
on weight obtained therapy can be used.
|
Download
|
37 |
Providing Trust as a Service by Feedback Analysis to Cloud
Services
Santoshi Ravali Dantuluri, Dhanarekha Doddi, Ananth Kale, Bhagavan G, Mr. B. A. Swamy
Abstract—Offering Trust to consumers of cloud services is the
main obstacle for the endorsement of cloud computing. The
cloud service’s dynamic nature makes it even more difficult and
challenging for providing Security, Privacy. Protecting Privacy
of cloud service user and pro viding security to user’s data is a
critical job for a cloud service provider as a lot of crucial
information is included in interaction between user and the
trust management system. Defending service provider from
their malicious users is one of the challenging issues as Attacks
are performed on cloud service providers by its malicious users.
These malicious users conspire together and give multiple
deceptive feedbacks on a specific cloud service to endorse or
damage the cloud service pro vider’s esteem. In this paper effort
is made to provide trust as a service by cloud service user’s
feedback analysis to cloud services and to preserve the cloud
service provider’s stature from malicious behaviour.
|
Download
|
38 |
Bluetooth Wireless Communication
Gazala AM Siddiqui, Vinita N Bhoir, Murlidhar Dhanawade
Abstract— Bluetooth is an open standard for short-range digital
radio to interconnect a variety of devices Cell phones, PDA,
notebook computers, modems, cordless phones, pagers, laptop
computers, printers, cameras by developing a single -chip, lowcost,
radio-based wireless network technology. A Bluetooth ad
hoc network can be formed by interconnecting piconets into
scatternets. The constraints and properties of Bluetooth
scatternets present special challenges in forming an ad hoc
network efficiently. Bluetooth has client-server architecture; the
one that initiates the connection is the client, and the one who
receives the connection is the server. Bluetooth is a great protocol
for wireless communication because it's capable of transmitting
data at nearly 1MB/s, while consuming 1/100th of the power of
Wi-Fi. We discuss criteria for different types of scatternets and
establish general models of scatternet topologies. This paper
highlights the Bluetooth wireless communication.
|
Download
|
39 |
Design and development of fixture for adapted flange
In industrial application
B.Velliyangiri, M.E.Kavinbharathi, D.Mohankumar, S.Balamurali
Abstract—Fixtures are designed for hold, support, and locate the
component, which is to be machined within the specified limits.
Various areas related to design of fixtures are very well
described by various authors, but there is need to apply all these
research works into an industrial application. This research
paper describes the design and manufacturing of fixture for real
industrial component. The component is adapted flange
GD_SM53P56Z005 is weighing 100kg made of mild steel and is
mainly used in horizontal milling center. Major operations to be
performed are milling, drilling, counter boring, tapping, and
reaming using the designed fixture. The designed fixture is
specifically for circular components. The research work includes
the 3D assembled and exploded view of fixture and fixture
component by using solid works and Auto CAD 2014 in addition
to assembly and detailed drawing of fixture.
|
Download
|
40 |
Gene Expression Analysis Using Fuzzy K-Means Clustering
K.Sathishkumar, Dr. V. Thiagarasu, Dr. E. Balamurugan, Dr. M. Ramalingam
Abstract—A microarray measures the expression levels of
thousands of genes at the same time. Clustering helps to analyse
microarray gene expression data. In this paper, have
implemented a biclustering algorithm to identify subgroups of
data which shows correlated behaviour under specific
experimental conditions. In the process of finding biclusters,
Fuzzy K-means clustering is used to cluster the genes and
samples with maximum membership function. Both
dimensionality and reducing the gene shaving are done using
principal component analysis & gene filtering with the function
respectively. This method obtains highly correlated sub matrices
of the gene expression dataset. Biclustering is a NP-hard problem
therefore which is implemented biclustering in multi -core
parallel environment to reduce the computational time of the
algorithm. Besides have compared the results with other parallel
& sequential algorithm to show the effectiveness of the
algorithm.
|
Download
|
41 |
Oxidation Kinetics and Mechanistic Study of Some
Aliphatic Aldehydes
Dinesh Solanki, Dr. Dharmendra Dwivedi
Abstract—Aliphatic aldehydes play a vital role in
various chemical functions. A suitable mechanism
consistent with the experimental results was proposed.
Linearity of Exner’s plot and constancy in ΔG≠ values
imply the operation of a similar type of mechanism in
all amino acids. A rate law deciphering all the observed
experimental facts was derived. The kinetics of
oxidation of norfloxacin (NRF) by sodium Nchlorobenzene
sulphonamide (Chloramine-B, CAB) has
been studied in aqueous hydrochloric acid medium at
303 K. The reaction is first order with respect to [CAB]
and [HCl], fractional order on [NRF]. Activation
parameters were evaluated from the kinetic data at
different temperatures. Negative entropy of activation
indicated the involvement of a rigid complex in the
activated state. The dielectric constant of the medium
has a small effect on the rate. Ionic strength and the
reaction product benzenesulphonamide have no effect
on the reaction rate. The solvent isotope effect is
studied. The reaction products are identified by spectral
(IR and NMR) data. Rate equation is derived to account
for the observed kinetic data and a probable mechanism
has been proposed.
|
Download
|
42 |
Clustering Web service Data Using Artificial Bee Colony
(ABC) Algorithm
B.Bhavana, D.Varun Kumar, K.Satya, M.Madan Mohan Malavya
Abstract—Data clustering is one of the most popular techniques
in data mining. Clustering high-dimensional data is the cluster
analysis of data which have anywhere from a few dozen to many
thousands of dimensions. Such high-dimensional data spaces are
often encountered in areas. There are many Web service
companies which provide their services to society contain the
data i.e., high dimensional data. Different optimization
techniques have been applied to investigate the optimal
solution for clustering problems but the accuracy is low when
applied to high dimensional data. Swarm intelligence (SI) is one
such optimization technique whose algorithms have successfully
been demonstrated as solutions for different data clustering
domains with high dimensions. Artificial bee colony algorithm
(ABC) is an optimization algorithm obtained from SI. It based on
the intelligent foraging behaviour of honey bee swarm. We
analyze the algorithm which had given the optimised solution.
|
Download
|
43 |
Wireless Based Visual Prosthesis System Using
Artificial Silicon Retina
Arjunan.K, Karthik.D, Kavitha.S, M.Manojprabu
Abstract—According to a recent survey done on the
number of visually impaired people in the world, it is
found that about 285 million people in the world are
blind of which 246 million have low vision and 39
million people in the world are completely blind due to
the diseases such as macular degeneration, retinitis
pigmentosa and glaucoma. Medical treatments are
available to slow down the process of these diseases but
there is no complete cure for regaining the lost vision.
This paper is about visual prosthesis system where the
blind is enabled to see the world virtually.
|
Download
|
44 |
Sentimental Analysis of Twitter Feeds for Stock
Market Predictions
Priyanka Malpekar,Aishwarya Dudgol,Aparna Sawant,Amit Panpatil,Mrs. Varsha Bodade
Abstract—Twitter messages, or tweets, can provide an
accurate reflection of public sentiment on when taken
in aggregation. We propose a novel approach to label
social media text using significant stock market events
(big losses or gains). Since stock events are easily
quantifiable using returns from indices or individual
stocks, they provide meaningful and automated
labels. We will extract significant stock movements
and collect appropriate pre, post and
contemporaneous text from social media sources (for
example, tweets from twitter). Subsequently, we
assign the respective label (positive or negative) for
each tweet. We train a model on this collected set and
make predictions for labels of future tweets. We
aggregate the net sentiment each day (amongst other
metrics) and show that it holds significant predictive
power for subsequent stock market movement.
Additionally, we apply extracted twitter sentiment to
accomplish two tasks. We first look for a correlation
between twitter sentiment and stock prices. Secondly,
we determine which words in tweets correlate to
changes in stock prices by doing a post analysis of
price change and tweets. We accomplish this by
mining tweets using Twitter’s search API and
subsequently processing them for analysis.
|
Download
|
45 |
People’s Corner
Sushmita S Jadhav, Hemlata Patel, Pragati Mhatre, Priyanka Jagdale, Prof Varsha Bodade
Abstract—The App Works as a Smart System in Handling
incoming Complains , Sorting them Department Wise and help
the Government to reduce time taken in Decision Making as all
data is in Database sheet Format and thus can be retrieved using
Simple steps. People’s Corner App provides an effective
Complaints Management System for Various Departments of
Government to identify recurring problems and allow various
Government Departments to improve service delivery in a city.
People’s Corner is an Android Application cum website model
which has potential for delivering government services through
Internet. This mobile android application serves as a single point
delivery platform. The aim of this Android App is to outline an
effective enterprise architecture framework and an innovative
technological solution that can serve as the common platform for
government services to the citizens. People’s Corner App helps
the citizen to register their complaints about day to day problems
in their ward through a mobile application. People’s corner App
will provide four departments BMC, RTO, POLICE, and FIRE.
Also the complainant will be able to track the status of Complain
using the Complain ID. This application provides an interface to
register one’s complained and follow it up also let the concerned
authorities of Respective departments to address the issue. This
interface provide a camera module which help clicking up a
picture of any generalized problem that people are facing and
will upload this image along with the complaint. The location of
complaint is tracked by Global Positioning System (GPS). This
module provides exact location of that particular spot.
Complaint, once registered, will be redirected to specific
department. For Example; a complaint about damaged road will
be redirected to PWD department of BMC ward. The
Application designed will be User Friendly and will work on all
the Handsets Supporting Android Operating System.
|
Download
|
46 |
Low Power Binary Comparator Design for Better Operated
Portable Devices
Meenu Shrivastava, Shweta Agrawal
Abstract—The low power efficient devices must have very
convenient functioned for portable devices. It has
applications in communication and calculation areas. The
main intention of this paper is to provide a new binary
comparator that gives significant reduction in the power
and area. The effectiveness of the proposed technique over
the existing is evaluated by coding in Verilog, synthesized
and simulated on Xilinx tool chain and design metrics are
evaluated. The simulation results on FPGA show that the
proposed comparator provides more than 2.56%
reduction in power over the best-known comparator.
|
Download
|
47 |
Travel Strategy Prediction using APIs in AI
Mr.P.Jagannadha Varma, Vamsy Kiran Maruvada, E.Vaishali, CH.Sireesha, G.Suryanarayana
Abstract—Weather conditions around the many cities in the
world are severe which creates travelling issues to the
travellers to finish their journey in optimal time and a safer
travel. Today's environment is playing a crucial role in several
fields like transportation, travel planning. The purpose of this
paper is to provide a real time forecasting of weather to the
user along their travel path between sources to destination.
|
Download
|
48 |
Role of Venture Capital in Indian Economy
Pallvi Rani, Dr. Hitesh Katyal
Abstract—The Venture capital is the life blood of new industry in
the financial market today. Venture capital is the money provided
by professionals who invest alongside management in young,
rapidly growing companies that have the potential to develop into
significant economic contributors. Venture capital is an important
source of equity for start-up companies. Venture capital can be
visualized as “your ideas and our money” concept of developing
business. Venture Capital financing has seen a sea change over the
past few years. Venture funding initially started with the aim of
supporting talented entrepreneurs and assisting them in
strengthening their growing business and providing them with the
much needed financing which otherwise was not available to them.
In India it was initially started by the Financial Institutions and
Government agencies, viz., SIDBI. In other parts of the world, it
was being done more in electronic, medical, data processing and
computer related industry and hence was more known as
technology finance. Unlike the overseas counterparts where the
investors were the private sector one who not only provided funds
but also guidance and mentoring to the entrepreneurs, the India
Venture Capitalists were large financial institutions which had
been set up to finance only. Their intervention was limited to the
financial aspect.
|
Download
|
49 |
A Survey Study: Assessment of physical wellbeing of
women
Suman Lata, Poonam Sheoran
Abstract—Woman's health is an issue which has been
taken up by many feminists, especially where
reproductive health is concerned. Woman's health is
positioned within a wider body of knowledge cited by,
among others, the World Health Organisation, which
places importance on gender as a social determinant of
health. Objective: The objective of present study was to
assess the physical wellbeing of women, for the present
study it includes assessment of BMI, Anemia, Random
Blood Sugar, Hypertension, Breast examination among
108 women attending OPD at MMIMS&R by using
convenient sampling technique. Result: It reveals that out
of 108 women 37 were found to be moderately anemic and
36 women were having severe anemia. Majority of the
women were found to be in the normal range (34.25%) of
BMI. Majority 50% of the women were having normal
blood pressure. Woman's breast finding were normal
where as 7.40 % of woman's breast was tender followed
by painful right breast and least 1.8 % of woman's breast
was found having palpable lymph node and breast
engorgement. The calculated r value is found to be Weak
positive correlation with BMI and RBS, SBP, DBP.
|
Download
|
50 |
A Non Invasive Method for Monitoring Cardiac
Activities
C.Sathish Kumar, S.Divya, J.Hema, D.Nisha
Abstract—Over the past few decades, heart diseases has been
increased due to the physical inactivity, diet and stress. Latest
survey on cardiac disease in India reveals that there are roughly
30 million heart patients and 2 lakh surgeries are being
performed every year. In order to reduce this problem
continuous monitoring of cardiac parameters is necessary.
Therefore, in this project Electrocardiogram, Seismocardiogram
and Heart sound are measured which offers the monitoring of
heart failure patients and general population. ECG is acquired
through single lead ECG sensor, with the help of accelerometer
the micro vibrations are measured and microphone is used to
pick up the heart sounds. The Embedded system design
methodology enables the monitoring of three parameters and is
transmitted through zigbee for continuous monitoring.
|
Download
|
51 |
Non Invasive Remote Health Monitoring Using Li-Fi
Communication System
Mrs.S.Madhumadhi, Ashly Shaji, V.Chidhanandha
Abstract—Recent advancements in the fi e ld of light emitting
diode (LED) has spurred the interest to use LED for
illumination and data transmission. This has resulted in the
growth of visible light communication (VLC) system, with
ongoing research to utilize VLC in a variety of appl ications. This
paper presents a n o n - i n va s i ve r e mo t e health monitoring
system, where biomedical signals are transmitted via the Li -Fi
communication sys tem. A heart rate sensor and temperature
sensor are used to obtain ECG signal and temperature from our
body respectively, which are boot into Arduino board. Li-Fi
module is used to transmit these signals wirelessly to computer.
Li-Fi is a part of the Visible Light Communications (VLC) PAN
IEEE 802.15.7 standard. Li-Fi module, which uses visible light of
range 350nm to 800nm for data transmission, is usually
implemented using white LED light bulbs. These devices are
commonly used for illumination by applying a constant current
through the LED. on the other hand, by high-speed and slight
variations of the current, the optical output can be made to vary
at extremely high speeds. Invisible by the human eye, this
dissimilarity is used to carry speedy data. This allows for a more
precise and exact monitoring and diagnosis. The data packet size
is carefully designed in such a way to transmit data in a minimal
packet error rate.
|
Download
|
52 |
Long Term Monitoring System of Aged People Using
Radar Technology in Home Environment
S. Sola Subbu, G. Dhivya Bharathi, M. Keerthana
Abstract—The aged members of the society over 60 years of age
are consistently increasing worldwide. This whereabouts resulted
in a growing need for routine long-term home monitoring. In this
paper, radar technique is used for fall detection of aged people.
Contactless device is placed for health monitoring in home
environment. It is the combination of heart beat, radar, wireless
communication, data processing and microcontroller. Zigbee is
used for data transfer to the physician in order to provide a
prompt alert in the event of emergencies. In this radar technique,
ultrasonic sensor is user because it works in any lighting
conditions, making this a good choice to supplement infrared
object detector and non-contact distance measurement.
|
Download
|
53 |
Adaptive STBC Encoder for Rayleigh fading reduction
with noise free OFDM Communication: A review
Ashish nadoniya, Prof. Papiya dutta
Abstract—OFDM is very popular now a days because of its
demand in high speed wireless data communication, it will
be correct if we gave the whole credit of using 3G and 4G
technology just because of OFDM. This technique is already
very good and standardized, but still there are some
important concerns which are still hot topics around
researchers that reduction of Rayleigh fading, Reduction of
BER and achieving fully orthogonal communication for
more than two antennas with rate-1. Proposed work gives a
new solution for reduction of Rayleigh fading and removing
noise with a new adaptive STBC encoder and a adaptive
RMS filter. The whole concepts is just because the signals is
a thing which continuously changing and we are using same
approach for type of signals. An adaptive filter and Encoder
can be consider as some intelligent system which follows
some algorithms and make decision.
|
Download
|
54 |
Steganography Methods with unique DWT and SVD
for Secure Communication
Shanu Suryawanshi, Prof Mukesh Tiwari
Abstract—As known there are many possible type for
stenographic methods already been developed.
Steganography is getting much popular then
cryptography due to its advantages over
cryptography. however techniques that are been
developed in area are based for complex & pattern
based data hinging in pixels for images, later on key
based approaches are also been developed, later on
many combination (two various approaches
cryptography & steganography working together)
based procedure been developed. proposed work is
new theory for steganography that is analytical cum
pattern based Image steganography proposed
procedure is been developed for achieving very high
SNR & low MSE even if size for original is less,
actually only problem with steganography is that it
nessesory many for data ( a full image) for
transmitting few original data, so proposed work
aims to increase size of data while maintaining size
for image same. In proposed approach stego image
produce is for acceptable level with good PSNR & less
BER as compared to other cover image with various
methods & enhance overall security.
|
Download
|
55 |
An area efficient and high Throughput 32 bit DSP Processor
Design
Sapana tiwari, Prof. Sunil Shah
Abstract—Proposed thesis work concept comes after thinking
and deep study of all these methods of enhancing processor
performance and proposing a new DSP microprocessor
architecture and it has FSM and some instruction set (big
instruction set which better for various applications) and RISC
kind of feature like executing every instruction in one cycle.
Thesis work has use Xilinx ISE 12.2 ISE software for designing
all modules and each module has been tested and verified with
all possible instruction which are been supported by proposed
design. The proposed architecture of processor requires less
area and higher speed as compare with the existing
architecture available, it has certain limit that cannot work
with medium or sophisticated scale application or it can say it
is not suitable for OS based application. As the design core
processor is been for small scale non OS based applications
which are very common in Microcontroller.
|
Download
|
56 |
A Review on Various Audio signals Filtering
Procedures for Hearing aids
Shivani Tiwari, Prof. Rakesh Patel
Abstract—Long distance communicated audio signal
recordings may contain unwanted noise that can impair
source recognition, speech recognition, and other audio
signal method requirements. In this paper several
custom analysis/synthesis algorithms are presented
based on a time-varying spectral representation of noisy
signal. Enhancement method adapts to instantaneous
signal behaviour and alters noisy signal so that
enhanced output signal is higher in quality than method
noisy input signal. A compound of Ramez exchange
method filter in order to frequency filtering and
discrete wavelet Transform base noise filtering is likely
to be design in near future in order to retain features
that are attributable to desired signal, such as human
speech, while detach features that are more likely to be
due to noise in long distance contamination.
|
Download
|
57 |
A Unique fusion of Audio filter for Hearing problems
Siddhartha, Prof Amit Mishra
Abstract—Audio enhancement became important when
noise in signals causes loss of actual information. Many
filters have been developed and still improving. A
highly optimized core discrete Remez part of the Parks-
McClellan (PM) filter along with wavelet type discrete
symlet filter been proposed in the paper. The proposed
algorithm DWT-REA is experimented for two speech
signals and efficiency is checked with calculation of
MSE. Performance is also evaluated for different value
of noise level. Proposed Algorithm is also compared
with simple REA for seeing the improvement in
recovered signal. Proposed algorithm can easily
applicable in the field of speech enhancement.
|
Download
|
58 |
Advanced safety braking system by using
Controlled fluid flow
K.Pradeep Kumar, C.Sridhar, M.Somanathan, D.Sivasankaran, R.Srinath
Abstract—Our project is to prevent the slipping effect
during brake been applied. When we go on the bike in
very high speed, at sudden time the brake applied in the
bike will be change to uncontrolled condition. Due to
uncontrolled condition the accident will be occurs and it
leads to death, these drawbacks are minimized in our
project to control the speed in bike at any speed without
slipping. The drawbacks are minimized by using ECM
(Electric Control Module), Tacho s ensors, Flow contol
valves. And also the inertia force is created by using
electromagnetic force.
|
Download
|
59 |
Review of Three Way Unloading Mechanism in
Trailer
P.Sampath kumar, J.Palanivel, A.Sakthikavin, M.Vinoth kumar, Mr.R.Jeya kumar
Abstract—Trailer had many of applications in day to day life.
In industrial and domestic uses, trailer can transfer a variety of
products including, rice, bricks, sand, fertilizer, wood, rocks,
etc. By considering wide scope of the topic, it is necessary to
study and project on the topic of trailer mechanism in order to
make it more economical and efficient. In existing system,
trailer can unload one side only by using hydraulic jack. By this
project we can apply three way unloading mechanism, it is easy
for the driver during unload the material and also it decreases
time and fuel consumption. This paper has mainly focused
current difficulty in unloading mechanism.
|
Download
|
60 |
Effects of Aerobic Exercise on Insulin Sensitivity
and Glycaemic Control in Type 2 Diabetic Males
Dr.P.Anandhan
Abstract—The purpose of present study was to find out
the effect of aerobic exercise to change the insulin
sensitivity and glycaemic control in type 2 diabetic
males. The purpose of this study, eighteen type 2
diabetic males were randomly selected subject from
working in various faculties of Annamalai University,
India and volunteered to participate in this study.
The selected subjects were age, height and weight
ranged was 45 ± 7 years, 164 ± 9 cm and 75 ± 13 kg
respectively. The Selected subjects were divided into
two groups and each group contained nine subjects.
This study was consisted of Group I experimental
group underwent aerobic exercise and Group II act
as control group. The duration of aerobic exercise
was given from about 30 to 45 minutes per day. The
program included warming-up phase for 5 minutes of
stretching exercises, 30 minutes run, stationary run,
short kick, knee-ups, syncopated leap, alternate leap,
jumping jacks, lateral pendulum, marching, the
grapevine maneuver and heel touch at 40-65% of
maximum heart rate and cooling down phase for 5
minutes of stretching, three times a week for 8 weeks.
The data were analyzed using the SPSS statistical
package. The data collected from the two groups
before and after the training period were statistically
examined to find out the significant improvement
using the analysis of covariance. P values of <0.05
were considered statistically significant. After 8
weeks, significant change was observed in
glycosylated hemoglobin, fasting glucose and fasting
insulin level (p<0.05). The result of study shows that
aerobic exercise have significantly decreased on
glycosylated hemoglobin, fasting glucose and fasting
insulin level in type 2 diabetic males. This study
supports the value of an exercise program in the
management of type 2 diabetes.
|
Download
|
61 |
Electronic Waste: A Growing Concern in Today’s
Environment: Survey
Geenu Raheja
Abstract—Electronic waste or e-waste is one of the most
popular growing issues of the world. The term e-waste
is for the collection of old discarded computers, TVs,
Refrigerators,, radios – basically any electrical or
electronic appliance that has reached its end-of-life.
While e-waste contains both valuable materials such as
gold, palladium, silver and copper, it also contains
harmful metals like lead, cadmium and mercury. In the
absence of suitable techniques and protective measures,
recycling e-waste can result in toxic emissions to the air,
water and soil and pose a serious health and
environmental hazard. In India, e-waste is mostly
generated in large cities like Delhi, Mumbai and
Bangalore. In these cities a complex e-waste handling
infrastructure has developed mainly based on a long
tradition of waste recycling. But the problem is that
these recycling processes are extremely harmful and
have negative impacts on the worker‟s health and the
environment. There is no generally accepted definition
of e-waste, in most cases, e-waste comprises of relatively
expensive and essentially durable products used for
data processing, telecommunication or entertainment in
private households and businesses. Public perception of
e-waste is often restricted to a narrower sense,
comprising mainly of end-of-life information and
telecommunication equipment and consumer
electronics. The world is consuming more and more
electronic products every year. This has caused a
dangerous explosion in electronic scrap containing toxic
chemical and heavy metals that cannot be disposed of or
recycled safely. So the concept is that how this e-waste
should prevent fully recycled so that there should be
prevention on environmental damage. E-waste is
assuming serious proportions in India and urgent steps
need to be taken to mitigate this problem. The present
study focuses on the effect of usage, dumping and
recycling of the electronic waste on the natural
environment.
|
Download
|
62 |
Wearable Robust Controller for Tremor Suppression and
Heartbeat Sensing with Wireless Technique
A.Margret vinnarasi, A. Saraswathi, S. Madhumathi
Abstract—The rhythmical and unintentional oscillatory
movement of a body part is called tremor. Tremor is a
musculoskeletal level involuntary vibration and one of the most
frequent movement disorders. Instead of medication or surgery
or drug consumption to use this orthotic devices have been under
exploration as noninvasive tremor suppression. Assess and
attenuating the tremor motion without impeding the patient’s
intentional motion is the challenge in musculoskeletal tremor
suppression. In this project the robust tremor suppression
algorithm was derived for patient with pathological tremor in the
upper limbs. At first the tremor frequency range is calculated by
using a high-pass filter. Then by applying back stepping method
the correct amount of torque is estimated to impel the output of
the estimator toward zero. This is equivalent to an assessment of
the tremor torque and shown that the orthotic device control
system is stable. A human arm joint stimulator, efficient of
emulating tremor motion of a human arm joint was used to
appraise the proposed suppression algorithm. The device is
designed as wearable and personal equipment using wireless
communication. Heartbeat and tremor is continuously monitored
with help of sensor. Sensor output is given to controller which is
used to control the valve with help of driver circuit for
controlling tremor action and heartbeat is monitored. Non return
valve is used to arrest the air pressure in the valve. The above
functions are monitored. SMS to the physician and relatives
using GSM modem automatically if the heartbeat is high and
tremor is not controlled by maximum times of suppression.
|
Download
|
63 |
Design of Template for Measuring Airgap along the
Circumference of Stretch Reducing Mill Rolls
M.Sugumar, S.Meiyalagan., L.Mayilswamy, S.Manikandan
Abstract—In the application, Bharat Heavy Electrical
Limited Trichy-14.Every industry faces its own type of
problems per product in manufacturing. The solution of
the problems may be simple but solving them gives us
the credit. Most of the problem can be overcome with
designing skills. The company that we entered faced a
problem on rolls in 28 stand stretch reducing mill
(SRM) at hot mill in seamless steel tube production
plant (SSTP). The circumference of the roll in SRM unit
is not uniform, so it leads to uneven air gap between the
rolls. Due to this there is a “line marks" on the finished
tubes. In previous method the template used for
measuring the air gap is not proper and is so difficult.
As these tubes are used in high pressure and high
temperature application, to overcome these problems
we have designed a template along with stand that is
portable to measure the circumference of the rolls in
SRM unit. By doing this we will able to control the air
gap between the rolls. Ultimately, as a result of this
approach the “line marks” of the tube will be
minimized.
|
Download
|
64 |
Management of Student Activities Using
Web Application
Akshaya.B, Harisudhan.T, Karthikeyan.R, S.Karthik
Abstract—This system’s vision is to establish Student
management system for educational institution which is of
greater concern. This web application is created in such a way
that, it can be utilized by overall college or for distinct
department. This Application is used to oversee Attendance, on
duty and Internal marks of the students. Student Activity
Management is created in such a way that the details are visible
and available to all the students. The present way of managing
student activity follows very old fashioned method that has
enormous time and space complexity. Hence the proposed system
would be able to overcome the conflicts of the traditional
method.
|
Download
|
65 |
Secure Image Encryption Based On
DNA Algorithm
Ms.N.Suneetha, Boora Namratha Varshini, Jagarapu JayaDeepika, Gampa Hema Aparna, Devarasetty Nirmal Sai
Abstract—In our project, we propose a novel image encryption
algorithm which uses the advantages of both image permutation
and DNA based encryption. In the present day scenario it is
known that, in the increasing of information threats it is really a
challenging task for a user to transfer sensitive data over a
unsecure channel. By keeping this in mind we had encrypted or
proposed this technique. This provides multilevel security for
the image. In the early stages we perform pixel permutation and
then mathematical operations followed by DNA encoding for
performing DNA encryption. Here DNA is built from four
nucleic bases. They are A(adenine), C(cytosine), G(guanine),
T(thymine).AT and CG are complemented to each other. Their
values can be 00 10 01 11 respectively. a particular pixel
intensity value is considered and converted into binary form
and for that DNA coding is done where we will get the DNA
sequence .In the second stage, for the DNA sequence random
numerical values are assigned to each codon. For this,
encryption is done using play fair cipher through which
encrypted image is produced.
|
Download
|
66 |
Evaluation and Performance Analysis of Cryptography
Algorithms
B.Sandhya, K. Pratyusha, G.Devi priya, D.Sagar
Abstract—In today’s world most of the communication is done
using electronic media. Data security plays a major role in
communication; hence there is a need to protect our data from
malicious attacks .This can be achieved by using cryptography,
which is an algorithmic process of converting the plain text into
chipper text. It is based on the algorithm that both the sender
and receiver know the key and message can be returned into its
original plain text form. There are number of algorithms for
performing encryption and decryption but they differ in time
complexity and space complexity. The algorithms are classified
based upon the number of keys that are employed for encryption
and decryption like secret key cryptography, public key
cryptography and hash functions. Encryption algorithm plays a
major role in the information security while on the other side
these algorithms put additional CPU load and consume battery
fast. The main] objective of our paper is to compare and analyse
Different algorithms such as DES, 3DES, AES, BLOWFISH,
IDEA, SERPENT on the basis of encryption time with the
variation of various file like plain text, image of data different
sizes.
|
Download
|
67 |
Biomass Gasification of Agro-Waste:- A Potential
Assessment For Jabalpur, Region
Arti Raulwar, Dr Abhay Kumar Sharma
Abstract—A study was conducted for the use of thermochemical
biomass gasification for producing bio fuels as
the energy potential for the Jabalpur district. The
downstream processes for gasification considered for
the analysis are similar to other biomass processing
methods. Present study was carried out to find the
availability of methane and hydrogen gas in three major
crops residue i.e. wheat, rice and maize for Jabalpur
district MP through downdraft gasification process.
During the analysis ultimate and proximate analysis
were carried out which shows a rich potential as a
gasification feedstock. For the above analysis CFD
based tool is being used and it has been found that
methane yields more in rice husk and less in maize
stalks and average yields was 1 ton per 2.76 tons of
biomass residue. The CFD tools also suggest that
around 4 % of methane and 10% of hydrogen by
volume fraction is available in gas produced by these
crop residues. The result will be helpful for
academicians and person involved in energy generation
through Gasification from biomass.
|
Download
|
68 |
Text Processing Using Support Vector Machine
P.Samba sivarao, CH.Prasannalaksmi, G.Sowmyasree, J.Ramyakeerthi, M.Jayataruni
Abstract—In this present trend Authentic plays a very crucial
role.our project is a blend of SVM. SVM could produce pool
based active learning.Our theme is to access to a pool of
unlabeled instances and can request the labels for some number
of them. In the above instance, if the classification categories are
not approximately equally represented. We propose an efficient
method based on active learning strategy to retrieve large text
categories. At each feedback step, the system optimizes the text
presented to the user in order to speed up the retrieval . Here we
use SVM method to make our project different from normal text
Processing. Support vector machines (SVM) have met with
significant success in numerous real -world learning tasks.
However, like most machine learning algorithms, they are
generally applied using a randomly selected training set classified
in advance. We introduce a new algorithm for performing active
learning with support vector machines, i.e., an algorithm for
choosing which instances to request next. We provide a
theoretical motivation for the algorithm using the notion of a
version space our active learning method can significantly reduce
the need for labelled training instances in both the standard
inductive and transductive settings. One of the most critical
problems for machine learning methods is over fitting. The over
fitting problem is a phenomenon in which the accuracy of the
model on unseen data is poor where as the training accuracy is
nearly perfect. This problem is particularly severe in complex
models that have a large set of parameters. In this paper, we
propose a deep learning neutral network model that adapts the
support vector data description (SVDD). The SVDD is a variant
of the SVM, which has high generalization performance by
acquiring a maximal margin in one class classification problems.
The proposed model strives to obtain the representational power
of deep learning. Generalization performance is maintained
using the SVDD. The experimental results showed that the
proposed model can learn multiclass data without severe over
fitting problems.
|
Download
|
69 |
Predictive Analytics for Power Consumption in Home
appliances Using Computational Intelligence
Ch.Samyuktha, M.S.L., M.V.Srikanth, K.V.Sravya
Abstract—Predictive analytics encompasses a variety of
statistical techniques from predictive modelling, machine
learning, and data mining that analyse current and historical
facts to make predictions about future, or otherwise unknown,
events. The model is to perform optimized prediction on power
consumption. We propose an optimized model using
computational intelligence and it is a step by step method that
follows an integrated approach which can solve several complex
problems in predictive analytics. It uses multilayer perceptron
Adaline feed forward neural network to predict the next values
of power consumption. As an integrated method, the model uses
multilayer perceptron algorithm as first step to check the data
optimization, since the data is considered as an important
element in data analytics. The optimized data is extracted using
multilayer perceptron adaline feed forward neural network for
making the prediction.
|
Download
|
70 |
Pre-Estimation of Concrete Cracking
Dr.M.N.Bajad , Mr.S.D.Gaikwad
Abstract—In this paper we are going to model early age concrete
cracking. These accounts for hydration of cement in the
constitutive modelling at macro-level of material description and
assume cracks as geometrical discontinuities and for the
heterogeneous nature of concrete conditioning. Cracking can be
the result of one or a combination of factors such as drying
shrinkage, thermal contraction, restraint (external or internal) to
shortening, subgrade settlement, and applied loads. Cracking
cannot be prevented but it can be significantly reduced or
controlled when the causes are taken into account and
preventative steps are taken. We also recall the thermodynamic
framework of concrete framework allows to identify the
hydration degree and the affinity as internal state variable and
conjugated forces, respectively, from mass conservation
considerations and thermodynamics of porous media, direct at
the macro-level of material description. We thus model concrete
cracking and thus we can guess the crack patterns, crack width
and placing by just a few parameters.
|
Download
|
71 |
Fabrication Of Electromagnetic Gear Changer
In Two Wheelers (Button Operated)
– A Review
M.Senthil Prabhu, M.Anbalagan, S.Kesavan, J.Augustin Antony Raj, Alan Dominic
Abstract—The main objective of this project is to apply the gear
by using automotive electromagnetic system in automobiles.
This is an innovative model mainly used for the vehicles. In
this project, we designed the button operated electromagnetic
gear changing method in two wheeler by using the D.C guns.
By using this system, we can easily control the vehicle and also
avoid the wear and tear of the gear.
|
Download
|
72 |
Visible Display Hiding Process Using Natural Plant
Extracts Filters
Vidyullatha pesaru, Santhosh kumar seelam
Abstract—New leaf extract filters for colour image processing
are introduced and analysed in this paper. The proposed
methodology constitutes unifying and powerful bio-chemicals to
DISPLAY HIDING TECHNIQUES. Using the proposed
methodology, colour image hiding techniques are treated from a
global viewpoint that readily yields and unifies previous,
seemingly unrelated, results. The new leaf extracts filters can
absorb all colors of local data in the color DISPLAY. The
principles behind the new filters are explained in detail.
Simulation studies indicate that the new METHOD are
computationally attractive and have excellent performance.
|
Download
|
73 |
Behavioural Study of Buildings with Vertical Irregularity
Dr. M.N. Bajad, Dharme Ashutosh S.
Abstract—Symmetrical and regular structures are usually
recommended for an effective design of earthquake-resistant
structures; however, various irregularities in buildings are
imposed by town bylaws and various occupational aspects. In the
past, several major earthquakes have exposed the shortcomings
in buildings, which had caused them to damage or collapse. It
has been found that regular shaped buildings perform better
during earthquakes. The irregularities cause non-uniform load
distribution in various members of a building. A gap in effective
transmission of forces results in failure of structure. In recent
past, various studies have been carried out to evaluate the
response of irregular buildings. In this paper, the various effects
on structure due to Vertical Irregularities are found out using
Response Spectrum analysis on ETABS software.
|
Download
|
74 |
What is role of SDN (Software Defined Network) in
Wireless 5G Network?
Drishti Dubey, Dr.Neeraj Shrivastava
Abstract—In this paper study in SDN, network control data
transmission and separate layers used in this network
services. at this each technology infrastructure & how to
used installation in network for each devices control, this
architecture decouples the network controlling and
forwarding functions enabling the network control to
become directly programmable and under line
infrastructure to be abstract for application and Network
(nodes) services, at this technology continuous researchers
have to work, implements then after path computation
element 2004, at this most recently Ethane.
|
Download
|
75 |
Design of DC/DC Converter for Charging Series Hybrid
Electric Vehicle Traction Battery
D.Sujatha, J.E Moshe Dayan
Abstract—This paper presents the design of DC to DC converter
for charging the traction battery of series hybrid electric vehicle.
To design a DC to DC converter for high power applications size,
losses and cost of the components are very important.
Considering these factors a simple interleaved buck converter
with fuzzy logic controller is implemented to charge the battery.
Because of its minimized inductor ripple current and extent stepdown
transformation ratio this converter is applicable for high
power applications with high step down transformation ratio.
The simulink model of the series hybrid electric vehicle traction
battery of 48v is charged with the input voltage of 60v using the
MATLAB/SIMULINK.
|
Download
|
76 |
The Study Of Mass Irregular Rc Structure With Various
Arrengements Of Steel Bracings
Dr.M.N. Bajad, Shirke Amol P
Abstract—From past earthquakes it is proved that many of
structure are totally or partially damaged due to earthquake. So,
it is necessary to determine seismic responses of such buildings.
There are different techniques of seismic analysis of structure.
Like Seismic Coefficient method, Response Spectrum method,
Time History method etc. From this 'Response Spectrum
analysis' is one of the important techniques for structural seismic
analysis. Bracing system is one of the retrofitting techniques and
it provides an excellent approach for strengthening and stiffening
existing building for lateral forces. In this project work seismic
analysis of 9 storey RCC buildings assumed to be situated at
seismic zone IV as per the seismic zone map of India with mass
irregularity at 3rd and 8th floor levels are carried out. Seismic
analysis of RC building frames with X, V, Inverted V and
Diagonal type bracing are done. ISHB 250 were utilized as
bracing members. This paper highlights the effect of different
lateral bracing system on mass irregular structure with
'Response Spectrum' analysis done by using ETABS software.
|
Download
|
77 |
Evaluation of Potentials of Dissotis Rotundifolia, Centrosema
Pubescens and Allium Cepa Extracts as Indicator for Acid-
Base Titration
A. O. Odiongenyi, A.E. Akpakpan, I. S. Enengedi and E. I. Ekpo
Abstract—This work investigates the potentials of methanol and
acetone extracts of leaves Dissotis rotundifolia, Centrosema
pubescensand Allium cepa bulb as indicators for acid-base
titration. Each extract was used in the titration of H2SO4 vs
NaOH, H2SO4 vs NH4OH, CH3COOH vs NaOH, and CH3COOH
vs NH4OH. Standard indicator (phenolphthalein) was also used
separately for each titration. Each titration was carried out in
triplicate. The results obtained revealed that the extracts of these
plants have sharp colour changes in acidic and basic medium.
Both the methanol and acetone extracts of some of these plants
have titre values close to the one obtained when using standard
indicator, though some discrepancies were observed with some of
the titre values for weak acid /strong base and weak acid/weak
base. The titre values of the methanol extracts of Allium cepa
(20.93ml) and acetone extracts of Allium cepa (22.67ml) and
centrosema pubescens (26.20ml) deviated remarkable from that
of the standard commercial indicator for weak acid /strong base
titration and for the titration of weak acid/weak base; only the
methanol and acetone extracts of Dissotis rotundifolia compared
favourably with that of the standard indicator. However
methanol and acetone extracts of Dissotis rotundifolia,
Centrosema pubescens and Allium cepa bulb can be used as
indicators for acid-base titration and hence can serve as suitable
replacement for the commercial indicators.
|
Download
|
78 |
Design & Simulation of Network Devices using Cisco Packet
Tracer
Ranjeet R Suryawanshi
Abstract—In today’s computer network plays an important role
for exchange of information between end users. Emails, online
banking, chats and other important services provided by the
internet are becoming prominent features of computer network.
For interconnectivity between end users, network topology
describe the physical and logical appearance and interconnection
between arrangement of computers, cables and other component
in a data communication network and how to be used for taking
a packet from one device and sending it through the network to
another device on a different network. So we can say computer
network, along with transportation networks, have become
essential infrastructure in every society that allows the flow of
people information and goods.
So in this paper, i am designing a network using a network
simulator tool i.e. Cisco packet tracer. This network will deal
with how packets can be send from one network device to other
network device and will help us to understand the concept of IP
configuration, Network devices, Network cables and Topology
etc
|
Download
|
79 |
Latency Measurement Using Lossy Difference Aggregator
Mrs.Sailaja, Koilada Kyathi, Buddharaju Shiva Venkata Syamala Devi, Chalapaka Krishna Babu, Appurubothu Ganesh
Abstract—An increasing number of datacenter network
applications, including automated trading and highperformance
computing, have stringent end-to-end latency
requirements where even microsecond variations may be
intolerable. Latterly we use two techniques called the SNMP
and Net Flow but it is not efficient Detecting and localizing
latency-related problems at router and switch levels is an
important task to network operators as latency-critical
applications in a data center network become popular. The
resulting fine-grained measurement demands cannot be met
effectively by existing technologies, such as SNMP, NetFlow, or
active probing. Instrumenting routers with a hash-based
primitive has been proposed that called as Lossy Difference
Aggregator (LDA) to measure latencies down to tens of
microseconds even in the presence of packet loss. Because LDA
does not modify or encapsulate the packet, it can be deployed
incrementally without changes along the forwarding path.
|
Download
|
80 |
Cryptographic Techniques Using extracts undisclosed
Image
K.Thamaraiselvi, K.Dineshkumar, A.Mummoorthy
Abstract—Modern world visual cryptographic techniques
is used for data hiding and other specific scenario’s, uses
the characteristics of normal encryption and decryption
levels of many digital images[11]. Generally, technology
that uses images needs neither cryptography knowledge
nor complex computation techniques. For that also it
assures that cyberpunks cannot perceive any idea about
the visual image in which the information is hidden[9].
The use of cryptography mainly targets binary
images(BPCS) because by using the basic level of image
i.e., using binary image (black & white) only we can the
technique of cryptography; This piece of cryptogram
proposes three sub sects for visual cryptography (VC)
based on binary i.e., black and white images of gray-level
and color images. There are many methods such as
halftone, Visual Cryptography, etc. Many of techniques
use noise-like random pixels on shares to hide secret
images.
|
Download
|
81 |
Design and Implementation of Smart Home Power
Management System Based on WSN
D.Sivasankari, K.Ramamoorthy
Abstract—Wireless mechatronic systems consist of
numerous spatially distributed sensors with limited
data collection and processing capability to monitor the
environmental situation. A smart monitoring and
controlling system for household electrical appliances in
real-time has been reported in this paper. The system
principally monitors the electrical parameters of
household appliances such as voltage, current and
subsequently calculates the power consumed. The
controlling mechanism of appliances is based on traffic
condition during peak demands. The developed system
is a low costand flexible in operation and thus can save
the electricity expense of the consumers.
|
Download
|
82 |
LTE- 3GPP Uplink and Downlink Transmission
L.Kanchana, DR.G.Athisha
Abstract—LTE (Long Term Evolution) is fusion of
both radio and core network.3GPP is (3rd generation
partnership project). LTE is the new standard
specified by the fourth generation (4G) wireless
communication. Uplink and downlink transmission is
analyzed by LTE transceiver and hence the
simulations results are obtained by the KEYSIGHT
SYSTEMVUE .And also measure the parameters
such as Throughput, Bit Error Rate (BER), and
Frame Error Rate (FER) by the simulation
configuration.
|
Download
|
83 |
Analysis of Sliding Mode Controller for PV Array Fed
SEPIC Converter
P.Alageswari, S.K.Nandhakumar
Abstract—This work deals with the application of Maximum
Power Point Tracking (MPPT) Algorithm like Sliding mode
controller for photovoltaic (PV) applications using
MATLAB/SIMULINK. These algorithms are applied to a Single
Ended Primary Inductor Converter (SEPIC) using a mathematical
model. The proposed methodology algorithm can be expanded to a
various class of converters which is capable for photovoltaic
applications. The SEPIC converter provides the close loop
characteristics. The mentioned algorithms i.e. Sliding mode
controller had been analysised for the proposed Single Ended
Primary Inductor Converter.
|
Download
|
84 |
Apriori based Frequent Itemset Mining
A.Meiappane, P.Ganesh Guru Teja, Meganathan.I, Nilavazhagan.K
Abstract—Tremendous amount of data is getting generated
daily. The storage, retrieval, processing are becoming a great
challenge. In order to process huge data and get preferred results
there is no efficient algorithm and there exists many data mining
algorithms which do consume long time to mine the huge
datasets in order to get the patterns that are interesting to the
user. So we propose an algorithm in this paper to implement the
apriori based frequent itemset mining algorithm. we also has
implemented this algorithm with normal apriori algorithm.
|
Download
|
85 |
Image and Annotation Retrieval via Image Contents
and Tags
D.D.Pukale, S.G.Bhirud
Abstract—There are many search engines that uses tags and
keywords for Image retrieval. Tags are primarily a precise and
brief description of an image. Tag-based image retrieval increase
the performance of retrieving images with help of low level
feature image database. In this paper, we describe combination
of tags and low level features like color, shape & texture. Low
level feature extraction of color, shape and texture, we used HSV
color model, Sobel with mean and median filter, Framelet
texture respectively.For the accurate image search and retrieval
manual tags must be better, but previous work shows that the
manual tagging to the images are inconsistent and inefficient to
finding appropriate image. Missing and ambiguous tags
decreases the accuracy of TBIR, so to recover that problem, we
include completion of tags to image database. The objective is to
automatically fill in the missing tags and correct noisy tags for
given images. Basically features are computed using thesethree
methods and then they are combined for similarity matching
using hybrid graph between images in the database and query
image. The system is able to retrieve the images related to the query
as wel l as annotating the query image.
|
Download
|
87 |
Real Time Face selection with Camera Motion
using Open CV
Vikas.D.Patil, Veeresh.P.M,.P.S.Mali
Abstract—Continuous monitoring and surveillance
system is playing an important role in security
whereby the recent demand for installation of
security camera system had been increased
dramatically. However, increasing of camera
installation in both indoor and outdoor
environment such as streets, parks, building, and
stores arise problem of deciding position, direction,
and visual angle of camera. In order to cover all the
area by minimum of camera and at the same time
used to track the activity done by am selected user,
we propose real time face selection with camera
motion control system used in continuous tracking
of selected user by a single camera. The purpose of
this device is to select a face and monitor it through
a camera motion control system. This will help in
monitoring a particular selected face. It is having
capability to move around 360º. So that it will be
possible to monitor the face in all directions.
|
Download
|
88 |
Flexural Behavior of Concrete Beams with Composite
Reinforcement
Bharathi.K.M, Abdul Hameed.A
Abstract—This paper describes the properties and
behavior of RC beams with composite reinforcement.
This studies the comparative resulting advantages by
the in-filled steel pipes. This also discuss about
implementing of this reinforcement in construction and
the forthcoming benefits of this project. The beams
casted were tested for flexure, under two point loading
condition. Different structural parameters were
investigated.
|
Download
|
89 |
Implementation of a Proficient Multichannel Image
Codec System Using Non-Linear Fuzzyfied Discrete
Wavelet Transform
Prakash Ku. Tripathi, Raju, VikasTiwari
Abstract—The brisk expansion of advanced imaging
applications, together with desktop publishing,
multimedia, teleconferencing, and high definition
television (is that they have some unnecessary
information. Image compression HDTV) has amplified
the necessitate for valuable and standardized image
codec techniques. Among the emerging standards JPEG
and JPEG2K are for compression of still images. A
universal feature of most images is crucial to reduce the
number of bits needed to represent an image by
removing the redundancies as much as possible. One of
the most important techniques frequently used for still
image compression in the present scenario is JPEG
2000(JPEG2K). The JPEG2000 is a single channel
image compression technique, hence not able to
compress the multichannel images. But in the present
era most of the still images are the multichannel like
RGB images. However there are some techniques
available for color image compression based on
JPEG2K, but this field is still open for development of
efficient image compression techniques for color
images. This paper presents a new method of
implementation of available wavelet transform based
image compression technique for color image
compression using fuzzyfied discrete wavelet transform.
Zadah in his first paper on fuzzy, discussed that fuzzy
logic is an efficient tool for handling imprecise and
vague situations, hence fusion of fuzzy rule base with
discrete wavelet transform is the Efficient way to
achieve higher compression ratio with less error.
|
Download
|
90 |
A Review of Advanced Methods and Measurements of
Impeller Design
K. Ganesan, M.Ariharasudhan, N.Dhivakar, K.Elango, S.Haribaskar
Abstract— The most common approach for measuring the mixed
flow of a impeller is to determine the incident mixed flow the
chamber .impeller considering revaluate component of a
centrifugal pump with different position are applied. Usually
material are composite materials, utilized aluminium alloy,
iron ,steel ,bronze ,brass, which transfer energy from the motor
the pump to the mixed flow of the fluid pumped by accelerating
the fluid outwards from the centre of rotation. Therefore it is
necessary to find out the design parameters and working
conditions that yield optimal output and maximum efficiency
with lowest power consumption are considered. In this review
are indicates that Computational fluid dynamics (CFD) analysis
is being increasingly applied in the different designs of
centrifugal pumps used many applications like chemical industry,
paramedical industry, biotechnology, polymers and food
industry etc. With the aid of the measurement numerical
approach, the mixed with internal flows in unique of application
while considered of the impellers, can be well corrected less,
strengthened, vibration less to speed up the pump design
procedure. In review of the research paper carried out in this
direction especially in the content of parametric study and
optimization of centrifugal pump impeller using CFD tool and
taguchi technique. Literature surveys indicate that very unique
work has been done in this area.
|
Download
|
91 |
Model Analysis of Leaf Spring Made of Composite
Material
Dr. M. Easwaramoorthi, A. Pathri, V. S. Prasanth, S. Rajagopal, k. Sridhar
Abstract—Leaf springs are one of the oldest suspension
components they are still frequently used, especially in
commercial vehicles. The past literature survey shows
that leaf springs are designed as generalized force
elements where the position, velocity and orientation of
the axle mounting gives the reaction forces in the
chassis attachment positions. Another part has to be
focused, is the automobile industry has shown increased
interest in the replacement of steel spring with
composite leaf spring due to high strength to weight
ratio. Therefore, analysis of the composite material
becomes equally important to study the behavior of
Composite Leaf Spring. The objective of this paper is to
present modeling and analysis of composite mono leaf
spring (GFRP) and compare its results. Modeling is
done using solid works 2015and Analysis is carried out
by using ANSYS 15.0 software for better
understanding.
|
Download
|
92 |
New Approach for Design and Computational Fluid
Dynamic Analysis Catalytic Converter
R.Arjun Raj, R.Naveen, P.Navi Kumar, G.Prasanthk, S.Siva Sakthivel
Abstract—Now a days the global warming and air
pollution are big issues in the world. The 70% of air
pollution is due to emissions from an internal
combustion engine. The harmful gases like NOX, CO,
unburned HC and particulate matter increases the
global warming, so catalytic converter plays an vital
role in reducing harmful gases, but the presence of
catalytic converter increases the exhaust back pressure
due to this the volumetric efficiency will decrease and
fuel consumption is higher. So analysis of catalytic
converter is very important. The rare earth metals now
used as catalyst to reduce NOX are costly and rarely
available. The scarcity and high demand of present
catalyst materials necessitate the need for finding out
the alternatives. Among all other particulate filter
materials, knitted steel wire mesh material is Change
and selected platinum, palladium, and rhodium coated
on the surface of ceramic honeycomb structures as filter
materials in this paper. Through CFD analysis, various
models with different wire mesh grid shapes
rectangular, circular, Diamond combinations were
simulated using the appropriate boundary conditions.
The comparison of back pressure of different catalytic
converter models is made in this paper.
|
Download
|
93 |
Performance Improvement of PEM Fuel Cell with in
Serpentine Flow Channel Used in COMSOL
S.P.Venkatesan, Anand Ashokkumar, Rahul.S, Sameer A.k, A Murugan
Abstract—Proton exchange membrane (PEM) fuel cell engines
can potentially replace the internal combustion engine for
transportation because they are clean, quiet, energy efficient,
modular, and capable of quick start-up. Water generation on
cathode side is affecting performance of the Fuel Cell; the water
generation is influenced by design & operating parameters. In
this project PEM Fuel Cell with serpentine flow channel is
modelled & analyzed for various operating parameters to
enhance the performance of the fuel cell. This project presents a
comprehensive, consistent and systematic mathematical
modelling for PEM fuel cells that can be used as the general
formulation for the simulation and analysis of PEM fuel cells. As
an illustration, the model is applied to an isothermal, steady
state, three-dimensional, serpentine flow channel PEM fuel cell
at different operation voltages to investigate the fuel cells
performance parameters such as the oxygen concentration, the
velocity distribution of reactant, GDL velocity distribution,
pressure distribution, cathode current density distribution, and
polarization curve. All of the model equations are solved with
finite element method using commercial software package
COMSOL Multi physics 4.2. The results from PEM fuel cell
modeling for serpentine flow channel at different operation
voltages are then compared with each other. Best PEMFC model
will be validated experimentally.
|
Download
|
94 |
Structural Analysis of Bike Alloy Wheel
A.D.Ladha, G.satheeshkumar, R.suba sankar, T. Rajasekar
Abstract—In this project we are doing the material
optimization of two wheeler alloy wheel. This project we
are designed the 3D model of the alloy wheel by using proe
software and the analysis taken by di fferent materials of
the alloy wheel and the analysis taken by the ansys
software. This project we are analysed the rotational
velocity and force acting on the alloy wheel by the three
materials. Presently the alloy wheels are made by the
material of aluminium alloy and magnesium alloy, this
project we are testing the same load under the three
materials. The materials are thermoplastic polymer
(PEEK), carbon fiber and E glass epoxy. Then the model is
analysed for the deflection, max stress induced and strain
for all the above materials under same load.
|
Download
|
95 |
Three Dimensional Modelling Integrated Thermoelectric
Generator-Photovoltaic Thermal (Teg-Pvt) System Used
COMSOL
K. Ganesan, K. Nanthakumar, R.srinivasan, R.thiyagarajan, S.vivekanandhan
Abstract—A Three dimensional steady state heat conduction
thermo electric current model was created in COMSOL
Metaphysics to study the performance of thermoelectric
generator-photovoltaic-thermal (TEG-PVT) system. Four
different cases were studied in the paper. In case 1, PV cells
without concentrator was simulated while in case 2, concentrator
ratio range from 2 to 5 was utilized In case 3, the convection heat
transfer coefficient was varied between 6.2 and 14.2 W/m2K. The
value of thermal insulation between Photovoltaic cells and TEG
was decreased for case 4. The results indicate that having higher
concentration ration results in more power generation while
increases convection heat transfer coefficient between outside
surfaces and atmosphere and lower thermal resistance between
PV cells and TEG help keep the PV temperature at optimum
level.
|
Download
|
96 |
Analysis of Emission Control from an Exhaust Gas by Dual
Type Scrubber Technology
I.Abbas, R.Srinivasan, R.Sandeep, R.Saravanakumar, M.Sampathkumar
Abstract—In present scenario, the environmental pollution is
major problem in the world. The vehicles generate pollutants
such as unburned hydrocarbons (UHC), oxides of nitrogen
(NOX), carbon dioxide (CO2) and lead and other particulate
emissions. These pollutants are the root cause for the air
pollution. Scrubber is a device used to control the gaseous and
solid pollutants from industrial exhaust streams. In this
project dual type scrubber was designed and fabricated. After
that the setup was used in the diesel engine to reduce the
pollution by chemical absorption method. The rate of
absorption of the pollutants mainly depends on the nature of
the absorbent used. Emission rates of CO2, NOX, HC, CO of a
diesel engine had analyzed and the results were taken. The
various chemical absorbents such as Water, Potassium
hydroxide, Magnesium hydroxide are used for experimental
works. After that results were taken and compared with
actual readings. These results shows that performance of
engine was increased and emission get reduced by using the
dual type scrubber technology.
|
Download
|
97 |
Low Power Square Root Carry Select Adder
Kalaivani S, Jayachandran T
Abstract—Carry Select Adder (CSLA) is faster than any
other adders used in many data-processing processors
to perform arithmetic functions speedily. By observing
the structure of the CSLA, it is clear that there is way
for reducing the area and power consumption. This
work uses an efficient gate-level modification to
significantly reduce the area and power of the carry
select adder. Conventional carry-select adder is still
area-consuming due to the dual ripple carry adder
structure. The logic operations involved in conventional
carry select adder (CSLA) and binary to excess-1
converter BEC based CSLA are analyzed to study the
data dependency and to identify minimized logic
operations. The sum for each bit position in an
elementary adder generated sequentially only after the
previous bit position has been summed and a carry
propagated into the next position. This paper
introduces a proposed logic block as a D latch with
replacing RCA block in conventional design to evaluate
the power consumption and area. In order to minimize
area and power of 16 bit carry select adder we have
replaced a BEC with D latch.
|
Download
|