IJAIR- Volume 5 Issue 3 (March 2016)

 


Sr/No/ Title Pdf
1 A Study on Problems of Handloom Weavers
R.Jayachitra

Abstract —The Government of India is aware about the constraints/problems being faced by the handloom weavers throughout the country primarily due to low productivity, stiff competition from power loom and mill sector, inadequate inputs supply and marketing facilities as well as insufficient credit flow from institutional sources. For the overall development of handloom sector and welfare of handloom weavers, the Government of India has taken policy initiatives ad schemes interventions like cluster approach, technological up-gradation, marketing promotion, revival of viable and potentially viable societies through loan waiver and recapitalization assistance, availability of subsidized yarn and credit, besides, providing health and life insurance cover to the handloom weavers. This study tries to identify the problems faced by handloom workers.

Download
2 Light Weight Secure Protocol in IOV Network for RSU –Internet of things
R. Hemalatha, M. Ganesan

Abstract—A Roadside Unit (RSU) Cloud, a Vehicular Cloud, as the operational backbone of the Vehicle Grid in the Internet of Vehicles (IoV). The architecture of the proposed RSU Cloud consists of traditional and specialized RSUs employing Software Defined Networking (SDN) to dynamically instantiate, replicate and, or migrate services. We then present a detailed reconfiguration overhead analysis to reduce reconfigurations, which are costly for service providers. VANET has been a core networking technology to provide safety and comfort to drivers in vehicular environments. Emerging applications and services, however, require major changes to its underlying computing and networking models, which demand new network planning for VANET with encryption of data and provide malicious attack from third party.

Download
3 Storing chemical equation, images in database and generating report
Vaishnavi Kokitkar, Gauravi Patil, Charles Varghese, Asst Prof. Nayana Vaity

Abstract—In the current industrial world, the use and extend of database is on the rise. Database plays an important role in managing the entire data of the firm. It is always necessary to segregate data properly to be stored in the database. This document focuses on furnishing the storage of data batch wise and in presentable way so that report generation is made easy and provides a way for better user interface. Report generation is done based on the user’s requirement. Along with this, the feature of storing chemical equations and images is implemented. Major aim is to store the data in a proper format and batch wise along with storing the chemical equations and images in the database.

Download
4 A five-level single-phase grid-connected Converter for renewable distributed systems
M.Santhosh Reddy, Dr.V.Balakrishna Reddy

Abstract—In low-power renewable systems, a singlephase grid-connected converter is usually adopted. This paper deals with a novel five-level converter topology that follows this trend. A review of the state of the art of the five-level topologies and a theoretical power loss comparison with the proposed solution is realized. The proposed converter architecture is based on a full-bridge topology with two additional power switches and two diodes connected to the midpoint of the dc link. Since the two added levels are obtained by the discharge of the two capacitors of the dc link, the balancing of the midpoint voltage is obtained with a specific pulse width modulation (PWM) strategy. This solution is designed for renewable energy systems, where unity power factor operations are generally required. Never the less, a variation of the proposed topology which allows four-quadrant operations.

Download
5 Designing of PV Cell and Analysis of It Under Rapid Irradiance Changing Conditions
K.Narender Reddy, R.Shashi Kumar Reddy, M.S.Teja

Abstract—As we all know photovoltaic cell (PV cell) is the basic building block of solar panel. In literature we are provided with many circuits to design PV cell. This proposed paper discuss about the basic design circuit of typical PV and its dependence on temperature and irradiation. This paper also analysis the operation of PV cell under partial shading and basic circuits for overcoming partial shading are discussed. This paper summarizes the various circuits used under partial shading and algorithms are also provided. The concept is evaluated using Matlab-Simulink simulation and proven using an experimental test rig. The performance of the proposed circuit is analyzed when PV arrays are subjected to rapid changing conditions. The results showed the variation of power with respect to changes in irradiance.

Download
6 Modern Exploitation of Minerals, Precondition of Capitalism of Mineral Resources
Rafet Zeqiri, Shyqri Kelmendi, Izet Zeqiri, Muhamedin Hetemi, Gzim Ibishi

Abstract—Mining technology, in the last 15 years has dramatically changed in the region and world in general. Globalization of Mining Industry, determine the change in technology and Mining methods too. In every stage of mining production the work is mechanized, highly productivity and electro-hydraulics machineries are required. Underground mining workshops, regardless of mining methods, most of the cases are required previous prepared access deposits which are specified from the easy and fast access of mechanism in the working place. For Metal Mines in Kosovo, application and usage of ramp is becoming useful to make it easy to access in different workshops. Ore bodies in Mines of Kosovo have their own specifics. We deal with large, medium and small ore bodies, which are followed by instable head roofs. This sometimes makes it impossible to focus on modern exploitation techniques, so this fashion of exploitation offers possibilities to increase mining intensity. In this paper we are focused on access deposits and planning exploitation, drilling mechanism, blasting, safety at working place, primary transportation and horizontal transportation.

Download
7 PV Module Traction and Monitoring the Power Generation Using Embedded System
V.Mahesh,M.Banupriya,R.Deepika,T.Sathyaran

Abstract— As the energy demand and the environmental problems increase, the natural energy sources have become very important as an alternative to the conventional energy sources. The renewable energy sector is fast gaining ground as a new growth area for numerous countries with the vast potential it present environmentally and economically. Solar energy plays an important role as a primary source of energy, especially for rural area. This paper aims at the development of process to track the sun and attain maximum efficiency using Arduinouno and LabVIEW for real time monitoring. The project is divided into two stages, which are hardware and software development. In hardware development, four light dependent resistor (LDR) has been used for capturing maximum light source. Two DC motors have been used to move the solar panel at maximum light source location sensing by LDR. The GUI is constructed by using LabVIEW. The performance of the system has been tested and compared with static solar panel. This paper describes the design of a low cost, solar tracking system.

Download
8 Copairable Graphs
Selvam Avadayappan, M. Bhuvaneshwari and R. Sountharya

Abstract—Let G(V,E) be a connected graph. For a vertex v, in V the set of all adjacent vertices of v is called an open neighbourhood of v and is denoted by N(v). The neighbourhood complement of v is denoted by N(v)c , the set of all non-adjacent vertices of v along with v itself. The closed neighbourhood of v is defined by N[v] = N(v)  {v}. Any two adjacent vertices u and v in G is said to be pairable, if N[u] = N[v]. A copairable graph is defined as a graph in which for any vertex uV, there exists a vertex v in V, such that a vertex w in V is adjacent to u if and only if it is not adjacent to v. In this paper, we study about this new family of graphs.

Download
9 Design and Implementation of Black Box in Car using GSM and GPS Tracker
T.Sureshbabu, R.Prasanth, M.Rajkumar, N.Vizhal

Abstract—Our research has been targeted towards building an integrated system for emergency rescue services in the event of a road accident. The project focuses on building an infrastructure which vehicle safety authorities can implement to enhance the reporting of vehicle crashes, provide post-crash analysis using motion sensors, record of the event in images and reduce the time it takes for emergency rescue to arrive at the crash location. We have achieved this using existing cellular network infrastructure already in place and also using GPS to pinpoint the exact location of the crash and send that data to an emergency rescue authority (such as Hospital, Fire Department, Police) using GSM text service. Our target was to build a low cost device that everyone can afford and use in their vehicles.

Download
10 Automation of Sugarcane Feeding System Using Wireless Sensor Network
S.Arulmurugan, S.Chitra, V.Padma priya, G.Sathiya

Abstract—To design the Automation of sugarcane feeding system (ASF) with the help of a sensor network. ASF system introduces the large-scale sugarcane stripper with automatic feeding. It contains the automatic feeding module, collecting module and control module. In this system when sugarcane is loaded to the feeder, it will start to shift the sugarcane from automatically feeder to conveyer. When the conveyer section reached maximum sugarcane weight then ASF system will automatically stop the feeder section at the same time when the conveyer section \have high amount of sugarcane, it will automatically slow down the transfer belt of the feeder section. ASF system is automatically control the feeding module and collecting module.

Download
11 Effect of Nano additive on properties, performance and emission of CI engine fuelled with diesel, biodiesel and its blends- A Review
Miss. Pallavi V. Ghogare, Dr. N. W Kale

Abstract—The various environmental and economic benefits has made the biodiesel preferable as compare to diesel in diesel engine, in past two decades. There is a lot of scope for further improvement in the performance and emission reduction with biodiesel as the fuel. The emission reduction properties of biodiesel have gained the importance to increase the performance of a diesel engine. Further to these inclusive properties of biodiesel; several efforts are being made to improve the properties of biodiesel in recent years. It includes the use of nanoparticles as additives in diesel improve the thermo physical properties, such as high surface area-to-volume ratio, thermal conductivity, and mass diffusivity, when dispersed in any base fluid medium. As per the experimental result available in literature it has been found that use of Nano additives with diesel, Biodiesel and its blends improves the kinematic viscosity, flash point, fire point and other properties depending upon the proportionate use of Nano additives. In the present work a review has been made to study the effect of dispersion of various Nano additives on the enhancement of the performance and emission reduction characteristics of a CI engine fuelled with diesel, biodiesel, and its blends and a summary of the observation based on the literatures are reported in the conclusion.

Download
12 An Implementation on Integer DCT Architectures for HEVC with Error Compensation
Dr.B.B.M.KrishnaKanth

Abstract—In this paper, we present area- and powerefficient architectures for the implementation of integer discrete cosine transform (DCT) of different lengths to be used in High Efficiency Video Coding (HEVC).We show that an efficient constant matrix multiplication scheme can be used to derive parallel architectures for 1-D integer DCT of different lengths. We also show that the proposed structure could be reusable for DCT of lengths 4, 8, 16, and 32 with a throughput of 32 DCT coefficients per cycle irrespective of the transform size. In this paper mainly we focus on the error compensation by using a adder tree. Previously for this error compensation high-throughput DCT designs have been adopted to fit the requirements of real-time application. Operating the shifting and addition in parallel, an error-compensated adder-tree (ECAT) is proposed to deal with the truncation errors and to achieve low-error and high-speed discrete cosine transforms (DCT) design. Instead of the 9 bits used in previous works, 4-bit Distributed Arithmetic was proposed. DA based DCT design with an errorcompensated adder-tree (ECAT) is the proposed architecture in which, ECAT operates shifting and addition in parallel by unrolling all the words required to be computed. Furthermore, the Error-Compensated Circuit alleviates the truncation error for high accuracy design. Based on low-error ECAT, the DA-precision in this work is chosen to be 4 bits instead of the traditional 9 bits. Therefore, the hardware size and cost is reduced, and the speed is improved using the proposed ECAT.Also we reduces the time delay than previous method.

Download
13 Economics Load Dispatch Using Particle Swarm Optimization with Quadratic Cost Function
Ankur Saxena

Abstract—Economic load dispatch is a non linear optimization problem which has greater value in power system. By economic dispatch means to know the generation of different units of plant so so find the total fuel cost is minimum .This paper presents the solution of economic load dispatch problem with quadratic cost function by using Particle Swarm Optimization (PSO). PSO technique is useful at solving optimization problems with both single and multiple objective functions with discontinuous, non-convex, nondifferentiable solution and noisy .Various factors like optimal dispatch, total cost, and incremental cost of delivered power are evaluated. These methods for economic dispatch in power system problem in power system is tested and proved on the Nigerian Grid System.

Download
14 Test Cases Generated By Using UML Diagram
Satinder Kaur, Prof.Rasbir Singh

Abstract—In order to develop effective software, the main thing is to consider that the developed software should be error free. But the reality is that, it is impossible to develop software which is completely free from errors. So, developers try to develop software which may generate errors in rare cases. For this purpose, Software Testing plays an important role in Software development because it can minimize the development cost and improve the system performance. In today’s world functionality of software increases very quickly which may increase the complexity and size of software applications, Due to this more emphasis has been sited on object oriented design strategy to reduce the complexity of the software which in turns reduces the software cost and increase its performance. Also, developers should concentrate on designing and coding of the software. An innovative approach is to use UML models for the development of the software, which consists of the designing and coding of the software. Designing phase is done with the help of the UML models. If the design is accurate then it will help in coding of the system in an effective manner. So, the proposed approach will focus on the UML activity diagram for the designing of the object oriented system.

Download
15 Multiband Antenna using Excavated Coupling Element Approach Design for 4G LTE Band in Handheld Terminal
NaveenKumar P#1, Dr G.A Bidakar

Abstract—This paper proposes a novel antenna design for handheld terminal operating in LTE bands. The design involves two antennas ,one operating in a lower band of 700-960MHz while the other antenna incorporated in the same space operates in a higher frequency band of 1700-2700MHz.These two antennas are individually fed and excited demonstrating high port-to-port isolation. A unique type of excavated coupling element is used for lower band operation while the space availed by excavation is used to incorporate a high band antenna which is a simple monopole structure. The coupling element used for low band operation couples the radiation modes of chassis and requires a matching network comprising SMD components, monopole structure for high band operation on the other hand is a self resonant antenna structure modified with certain broad banding techniques. Careful placement of high band antenna and band stop behavior of matching network is used to establish port to port isolation. The simulated model is further used with approximated human head model to investigate specific absorption rate (SAR) characteristic of the design and the entire design process is carried out in full wave electromagnetic simulator Ansoft HFSS.

Download
16 Secured Data Lineage Transmission in Malicious Environment
R. Gayathri,K.Indumathi,P. Githanjali,V. Roobini

Abstract—In this paper contains the fulfillment of Data Lineage in Malicious Environment. A data distributor has given precise data to a set of supposedly trusted agents. Some of the data are leaked and found in an unjustified place. The distributor must assess the likelihood that the crevice data came from one or more agents, as opposed to having been individually gathered by other means. We propose data allocation strategies that improve the probability of identifying crevices. These methods do not build on alterations of the released data. In some cases, we can also implant “realistic but fake” data records to further improve our chances of detecting crevice and identifying the guilty party. While sending data over the network there is lots of illegitimate user trying to get useful information. There should be proper security should be provided to data which is send to network. Now a days smartphones use have been increased rapidly and the applications used in smartphones can get easy access to our confidential information. So for avoiding this we used the data lineage mechanism. We give the fake information to guilty agent. We develop and analyze a novel accountable data transfer protocol between two entities within a malicious environment by building upon oblivious transfer, robust Watermarking, and signature primitives. Finally, we perform an experimental evaluation to demonstrate the practicality of our protocol and apply our framework to the important data leakage scenarios of data outsourcing and social networks. In general, we consider our lineage framework for data transfer, to be a key step towards achieving accountability by design.

Download
17 Secured Data Transmission in Cloud Environment with trusted party using authentication
A. Parkavi, R. Ramakrishnan

Abstract—Off-site data storage is an application of cloud that relieves the customers from focusing on data storage system. However, outsourcing data to a third-party administrative control entails serious security concerns. Data leakage may occur due to attacks by other users and machines in the cloud. Wholesale of data by cloud service provider is yet another problem that is faced in the cloud environment. Consequently, high-level of security measures is required. In this paper, we propose Data Security for Cloud Environment with Semi - Trusted Third Party (DaSCE), a data security system that provides (a) key management (b) access control, and (c) file assured deletion. The DaSCE utilizes Shamir’s (k, n) threshold scheme to manage the keys, where k out of n shares are required to generate the key. We use multiple key managers, each hosting one share of key. Multiple key managers avoid single point of failure for the cryptographic keys. We (a) implement a working prototype of DaSCE and evaluate its performance based on the time consumed during various operations, (b) formally model and analyze the working of DaSCE using High Level Petri nets (HLPN), and (c) verify the working of DaSCE using Satisfiability Modulo Theories Library (SMT-Lib) and Z3 solver. The results reveal that DaSCE can be effectively used for security of outsourced data by employing key management, access control, and file assured deletion.

Download
18 Automatic Mechanical Sprocket Side Stand Retrieve System
J. K. Singh, Roshan Malakar, Keshav Verma, Vikram Sonkar, Shitesh Nayak

Abstract—In modern developing world, automatic process plays a major role especially in automotive technology. In spite of their easiness of use, sometime they are prone to accidents. The two wheeler concerned accidents occurs due to riding the vehicle without maintaining the speed limit and forgets to lift the side stand while riding the vehicles. The automatic mechanical side stand retrive system can reduces the accident if rider forgot to lift the side stand. To resolve this issue, the systematic design of system is made with the aim to consume very low amount of power initially for few seconds to retrieve the stand. To achieve the objective, the power obtained from the chain drive is transmitted to the appropriate component without power loss. Then the power consumption does not occur after retrieving the stand. The result of automatic mechanical sprocket side stand retrieve system is t h a t t h e r e i s no need of external source, no electric control required and more customer safety. The scope of the study is to implement this system in all types of bikes by changing small variation in size and cost so that automatic mechanical sprocket side stand retrieve system will be the safer and life saver.

Download
19 Remote Access Trojan
Snehal Sawant, Masira Shaikh

Abstract—Remote Access Trojan (RAT) allowing a potentially malicious user to remotely control the system. A Remote Access Trojan is remote control software that when installed on a computer it allows a remote computer to take control of it. A Remote Access Trojan (RAT) allows an attacker to remotely control a computing system and typically consists of a server invisibly running and listening to specific TCP/UDP ports on a victim machine as well as a client acting as the interface between the server and the attacker. The most common means of infection is through email attachments. The developer of the virus usually uses various spamming techniques in order to distribute the virus to unsuspecting users. Malware developers use chat software as another method to spread their Trojan horse viruses such as Yahoo Messenger and Skype. Remote Access Trojans (RATs) are malicious pieces of code often embedded in lawful programs through RAT-sanction procedures. They are stealthily planted and help gain access of victim machines, through patches, games, E-mail attachments, or even in legitimate-looking binaries. Once installed, RATs perform their unexpected or even unauthorized operations and use an array of techniques to hide their traces to remain invisible and stay on victim systems for the long haul.

Download
20 Secured Data Transmission Lineage in Malicious Cloud Environments
V. Brindha, Dr. N. Danapaquiame

Abstract—In this paper contains the fulfilment of Data Lineage in Malicious Environment. A data distributor has given precise data to a set of supposedly trusted agents. Some of the data are leaked and found in an unjustified place. The distributor must assess the likelihood that the crevice data came from one or more agents, as opposed to having been individually gathered by other means. We propose data allocation strategies that improve the probability of identifying crevices. These methods do not build on alterations of the released data. In some cases, we can also implant “realistic but fake” data records to further improve our chances of detecting crevice and identifying the guilty party. While sending data over the network there is lots of illegitimate user trying to get useful information. There should be proper security should be provided to data which is send to network. Now a days smartphones use have been increased rapidly and the applications used in smartphones can get easy access to our confidential information. So for avoiding this we used the data lineage mechanism. We give the fake information to guilty agent. We develop and analyze a novel accountable data transfer protocol between two entities within a malicious environment by building upon oblivious transfer, robust Watermarking, and signature primitives. Finally, we perform an experimental evaluation to demonstrate the practicality of our protocol and apply our framework to the important data leakage scenarios of data outsourcing and social networks. In general, we consider our lineage framework for data transfer, to be an key step towards achieving accountability by design.

Download
21 Cluster based approach for processing Voting Data Using MapReduce Approach
R. Dhanalakshmi, S. Kalaiarasi, K. Sivagangai, J. RamyaRajalakshmi

Abstract—Big Data is the most promising research area in the field of Cloud Computing. In areas like social networking applications, e - commerce, finance, health care, education, etc, huge amount of data is being accumulated. As new data and updates are constantly arriving, the results of data mining applications become stale and obsolete over time. Hence another approach is required for mining big data. Hence in this paper, a cluster based approach is introduced which guarantees an efficient processing of big data. This approach is experimented with the real time voting data of an election. Furthermore, the performance is compared with the existing data mining applications of big data.

Download
22 A Novel Based Equalization Model for Contrast Images with Enhanced Video Processing
D.Kameshwari, R.Lakshmi@Rametha, P. Sowmmiya, P. Santhosh Kumar

Abstract—With the progress of technologies and the popularity of imaging devices, billions of digital images are created every day. Because of detrimental environment, the nature of the image is not satisfactory. As a result, image enhancement is needed. To date, contrast enhancement process plays an important role in enhancing image’s quality. Several previous studies proved that contrast enhancement techniques capable to clean up the unwanted noises and enhance the image’s brightness and contrast. In this paper, we combine both grey balancing and contrast enrichment to accomplish good tone even as preserving contrast of an image using linearity and non-linearity functions of histogram transform.

Download
23 Use of UML Activity Diagram for Generation of Test Cases
Satinder Kaur, Prof. Rasbir Singh

Abstract—Object-Oriented program have changed the scenario of software development industry in terms of software development and its supporting technology. UML, which supports objectoriented technology, is widely used to describe the analysis and design specifications of software development. UML models are an important source of information for test case design. So, new testing techniques and practices including international standards for specifying how systems should work - such as Unified Modeling Language (UML) - have been established. Therefore, a new technique is presented for generating test cases for object oriented system using UML models. This technique is helpful in generating more test cases which will cover maximum aspects of the system. With the help of test cases chances of finding a bug is more. Means, generation of test cases is the most important issue in the software testing. Thus test cases need to be carefully designed. Test cases can be generated manually or automatically. Our focus is to generate test cases automatically by using UML Activity diagram. Activity diagrams are even more challenging for creating test cases. The test cases thus generated are suitable for dynamic testing of system. The proposed approach is to automate the generation of test scenarios from activity diagram using DFS and BFS method. By using these two methods, the useless test paths are eliminated which in turn reduces the time complexity. This approach also helps in synchronization between various activities. This approach was found to be effective in reducing the time complexity also.

Download
24 Dual Vector Control For Grid Interactive Converters In Smartgrid Under Unbalanced Conditions
T.Saravanakumar, R.Prassannakumar

Abstract—The Voltage unbalance in a three-phase grid connected system causes performance deterioration of a pulse-width modulation (PWM) of Voltage source converter. It may also produce voltage ripples in the dc link and also increase the reactive power and have negative impact on grid current. In order to eliminate the voltage ripple along dc link capacitor and the dc component of the reactive power, both positive sequence and negative sequence currents should be controlled separately. Therefore this paper utilizes synchronous reference frame theory. One where the positive sequence currents are regulated by a proportional integral (PI) controller in a positive synchronous reference frame (SRF), and the other negative sequence currents are regulated by a PI controller in a negative synchronous reference frame. The positive reference frame which rotates counter clockwise, the positive sequence will appears as dc, while the negative sequence appears as 100 Hz. In same manner the negative sequence reference frame, which rotates clockwise, where the negative sequence appears as dc, while the positive sequence components appears as 100 Hz. So by eliminating 100-Hz AC components using an Anti -resonant filter in each SRF, one can measure positive sequence and negative sequence currents separately. The two controllers have been designed for controlling current separately. The demonstration and the effectiveness of the proposed control scheme are established by using simulation.

Download
25 Platform Invocation Services Using Virtual Machines
Mrs.Sadhana Kodali, Muraharirao Mani Sankar Akhil Kumar, Bora Varalakshmi, Messala Ramesh, Basava Chandra Sekhar

Abstract—Cloud computing is a paradigm which offers services to most of the users worldwide. Pervasive applications from customers are hosted by large-scale Data Centres. In traditional Data Centres numbers of services are run onto the dedicated physical servers. Most of the time, these Data Centres do not use their full capacity in terms of resources. Here comes the virtualization concept. Virtualization is the key aspect for this paradigm in which resources are utilized by running virtual machines on a physical host [1]. A virtual machine placement in cloud computing approach will be implemented in our project by enhancing security to the existing approach and we also choose to dynamically allocate cloud services to a group of users by restricting the number of users who join in the group dynamically by providing a web interface for effective utilization of software resources.

Download
26 Zero –Free Regions of Analytic Functions with Restricted Coefficients
M.H. Gulzar, A.W.Manzoor

Abstract—In this paper we find bounds for the zeros of an analytic function by putting certain conditions on its coefficients.

Download
27 Audio Denoising using STFT
Shivam Tiwari , Rashika Gupta, Ravimohan

Abstract— In this paper different audio denoising techniques are discussed. Most of the audio denoising techniques reduce Gaussian white noise from audio signals. Diagonal estimation techniques and nondiagonal estimation techniques are discussed. Different audio denoising techniques and noises are shown through the taxonomy. Removing noise from audio signals requires a non-diagonal processing of time-frequency coefficients to avoid producing ``musical noise''. State of the art algorithms perform a parameterized filtering of spectrogram coefficients with empirically fixed parameters. Use of STFT gives a free hand for more time or frequency resolution as it is required. A block thresholding estimation procedure adjusts all parameters adaptively to signal property by minimizing a Stein estimation of the risk. Musical noise is an artifact that can be often heard in audio signals after denoising.

Download
28 Consistency and Privacy based Replication System in Cloud Sharing Framework
S. Sindhuja, K. Suriya Prakash

Abstract— The main objective of this paper is Division and Replication of Data in the Cloud for Optimal Performance and Security (DROPS) that collectively approaches the security and performance issues. Firstly, the data owners are registered into the cloud for using the cloud region and provide the secret key to trustee parties. The data files are uploaded into the cloud region for access the genuine users. Then the stored records are fragmented based on the data size, fragmented data are called data chunks. Fragments are placed in various providers using TColoring method. In T-coloring algorithm was implemented to measure the distance of each data, where the records are placed in cloud system. This is used for region assignment assigns region to the nodes, such that the channels are separated by a distance to avoid obstruction. The genuine users can access the data from cloud sector through cloud providers. The genuine users have secret key defined in the cipher text can retrieve the entire data content. It aims to allow the users with eligible key to decrypt the entire data stored in the cloud server and it cannot limit the data access control to the authorized users. Difficult to hack the files from cloud storage because fragmentation and replication placement approach. Heuristic auditing strategy (HAS) techniques used to the chunk the given data source. Data replication was performed to maintain the multiple copies of same data on same server or on different servers.

Download
29 Some Results on degree splitting graphs
Selvam Avadayappan and M. Bhuvaneshwari

Abstract—Let G(V, E) be a graph and let Vi denote the set of all vertices of degree i. The degree splitting graph DS(G) of G is obtained from G, by adding a new vertex wi for each partition Vi such that | Vi | ≥ 2 and joining wi to each vertex of Vi. In this paper, we characterise graphs for which degree splitting graphs are regular, biregular bipartite.

Download
30 A Novel Approach for FPGA Implementation of Pixel Level Image Fusion
V.Saravanan, Mr.G.Babu

Abstract—Image fusion is a technology which has great focus on research domain in recent years. As a result various methods of fusion techniques are proposed in fields of medical, remote – sensing, military and compute domains. Hardware implementations are adopted to tackle real time processing in different application domains. The images of various samples from same or different scenes are taken and they are fused and their coefficients are implemented on FPGA. Histogram Equalizer (HE) is adopted to detect the specified disease from scanned CT/MRI image, Adaptive Histogram Equalizer (AHE) and Principal Component Analysis (PCA) techniques are employed here for the fusion process, it results in clear and accurate diagnosis of particular MRI/CT image, the resulted fused image is implemented in FPGA for the purpose of diagnosis in medical domain, target detection in remote sensing and in military purpose.

Download
31 TF-FIU Tree Based Parallel Mining Algorithm for Frequent Itemset Using Fi2doop framework
S.Sivaranjani, R.Rajmohan, D.Dinagaran, P.Thirugnanam, MO.Ramkumar

Abstract—Existing parallel mining algorithms for frequent itemsets lack a mechanism that enables automatic parallelization, load balancing, data distribution, and fault tolerance on large clusters. Frequent Itemsets Mining (FIM) is a core problem in association rule mining (ARM), sequence mining, and the like. Speeding up the process of FIM is critical and indispensable, because FIM consumption accounts for a significant portion of mining time due to its high computation and input/ output (I/O) intensity. Frequent itemsets mining algorithms can be divided into two categories, namely, Apriori and FP-growth schemes. Apriori is a classic algorithm using the generate -andtest process that generates a large number of candidate itemsets. Apriori has to repeatedly scan an entire database. Rather than considering Apriori and FPgrowth, we incorporate the TF-FIUT algorithm in the design of our parallel FIM technique for reducing I/O overhead and parallelize the traditional FIUT algorithm for better performance. A pattern mining algorithm called Fi2Doop is proposed by combining the TF-FIUT Algorithm and i2 map reduce technique to optimize the performance of load balancing among the cluster nodes and avoid conditional pattern bases. Experiments using real world data demonstrate that our proposed solution is efficient and scalable.

Download
32 System processing using Oozie Work flow Engine in Green Cloud Computing
R.Ranjani, Dr.S.Babu

Abstract—Cloud Computing is an evolving area of efficient utilization of computing resources. It has changed the model of storing and managing data for scalable, real time, internet based applications and resources satisfying end users’ needs. The area of Green computing is also becoming increasingly important in a world with limited energy resources and an ever-rising demand for more computing power. However, achieving an energy-efficiency control and simultaneously satisfying a performance guarantee have become critical issues for cloud providers. A cost function has been developed in which the costs of power consumption, system congestion and server startup are all taken into consideration. The effect of energy-efficiency controls on response times, operating modes and incurred costs are all demonstrated. The aim of the work is to provide power saving policy for reducing the power consumption in cloud datacenters. The power that produces in idle state of server moves to sleep state of the server. An energy efficient task scheduling algorithm will be developed that can help to minimize the scheduling cost and time and to improve the system performance. An efficient green control (EGC) algorithm is first proposed for solving constrained optimization problems. To address the conflict issue between performances and powersaving, Energy Efficient Task Scheduling algorithm is used to minimize server power consumption in cloud servers.

Download
33 An Analytical Study on Image Classification Methods Used in Remote Sensing Images
B.Sasi Prabha., Dr.T.Ramaprabha

Abstract—An image classification is a process of dividing an image into regions and boundaries and it is used to distinguish the foreground from the background. A thresholding is one of the simplest and widely well know technique used for remote sensing image classification. This field offers various challenges for the researchers. In this paper, we concentrate on the study of image classification by using two threshold methods as global Thresholding and local Thresholding. In global thresholding, a single threshold value is assigned to whole image. In the local Thresholding single threshold value is assigned to each pixel to determine whether it belongs to foreground or background pixel by using local information about the pixel. In general, to classify the local region or restrictions, the local Thresholding method is more efficient, easy to implement. We get result as quality of the image, when it is compare to global Thresholding.

Download
34 Dynamic N-Cut Image Segmentation
Lokesh Sirela, K.Harika, J. Venkatesh, D.Narendra, M.Gopichand

Abstract—We propose a novel approach for solving the perceptual grouping problem in vision.We treat image segmentation as a graph partitioning problem and propose a novel global criterion, The Dynamic normalized cut, for segmenting the graph. We show that an efficient computational technique for calculating the number of segments dynamically. We have applied this approach to segmenting static images and found the results to be very encouraging.

Download
35 Surveillance Robot Using Zigbee
Prabhu.P, Ragavi.K, Priyanka.E

Abstract—Disasters like earthquakes, tsunami, bomb explosion and floods often cause loss of precious human lives. Rescue operations are performed mostly by human often in very dangerous and risky conditions. Hence, to make the rescue operation more safe and effective, mobile robots have been proposed which detect live human beings and wirelessly communicate with the rescue team. This work aims to develop an economical robot, which works using human detecting and obstacle sensors. It can be used in areas where rescue is needed. The robot senses the human body temperature using PIR sensor and alarm/indicator indicates the signal when it detects live body and the message is sent to enable rescue operation using zigbee. Additionally a wireless camera will be fixed in the robot which can capture the environment and it can be viewed by audio video receiver.

Download
36 Treatment of Paraplegia using Electric Current Based on Weight Distribution
Dr.M.C.Jobin Christ, G.Asha, S.Pavithra

Abstract—Paralysis is a nervous disorder which damages the nervous system especially spinal cord. The main aim of this paper is to measure the weight distribution with using load cell, since it bears the large balances. Load cell is designed to automatically regulate the balancing pressure. This paper also provides therapy for patient who is suffering from paraplegia by using electrical current stimulation technique. The detection has been done by using two foot plates. Both the foot plate s are designed with load cells. The detected weight may fed to the microcontroller and the output is displayed in LCD. Depending on weight obtained therapy can be used.

Download
37 Providing Trust as a Service by Feedback Analysis to Cloud Services
Santoshi Ravali Dantuluri, Dhanarekha Doddi, Ananth Kale, Bhagavan G, Mr. B. A. Swamy

Abstract—Offering Trust to consumers of cloud services is the main obstacle for the endorsement of cloud computing. The cloud service’s dynamic nature makes it even more difficult and challenging for providing Security, Privacy. Protecting Privacy of cloud service user and pro viding security to user’s data is a critical job for a cloud service provider as a lot of crucial information is included in interaction between user and the trust management system. Defending service provider from their malicious users is one of the challenging issues as Attacks are performed on cloud service providers by its malicious users. These malicious users conspire together and give multiple deceptive feedbacks on a specific cloud service to endorse or damage the cloud service pro vider’s esteem. In this paper effort is made to provide trust as a service by cloud service user’s feedback analysis to cloud services and to preserve the cloud service provider’s stature from malicious behaviour.

Download
38 Bluetooth Wireless Communication
Gazala AM Siddiqui, Vinita N Bhoir, Murlidhar Dhanawade

Abstract— Bluetooth is an open standard for short-range digital radio to interconnect a variety of devices Cell phones, PDA, notebook computers, modems, cordless phones, pagers, laptop computers, printers, cameras by developing a single -chip, lowcost, radio-based wireless network technology. A Bluetooth ad hoc network can be formed by interconnecting piconets into scatternets. The constraints and properties of Bluetooth scatternets present special challenges in forming an ad hoc network efficiently. Bluetooth has client-server architecture; the one that initiates the connection is the client, and the one who receives the connection is the server. Bluetooth is a great protocol for wireless communication because it's capable of transmitting data at nearly 1MB/s, while consuming 1/100th of the power of Wi-Fi. We discuss criteria for different types of scatternets and establish general models of scatternet topologies. This paper highlights the Bluetooth wireless communication.

Download
39 Design and development of fixture for adapted flange In industrial application
B.Velliyangiri, M.E.Kavinbharathi, D.Mohankumar, S.Balamurali

Abstract—Fixtures are designed for hold, support, and locate the component, which is to be machined within the specified limits. Various areas related to design of fixtures are very well described by various authors, but there is need to apply all these research works into an industrial application. This research paper describes the design and manufacturing of fixture for real industrial component. The component is adapted flange GD_SM53P56Z005 is weighing 100kg made of mild steel and is mainly used in horizontal milling center. Major operations to be performed are milling, drilling, counter boring, tapping, and reaming using the designed fixture. The designed fixture is specifically for circular components. The research work includes the 3D assembled and exploded view of fixture and fixture component by using solid works and Auto CAD 2014 in addition to assembly and detailed drawing of fixture.

Download
40 Gene Expression Analysis Using Fuzzy K-Means Clustering
K.Sathishkumar, Dr. V. Thiagarasu, Dr. E. Balamurugan, Dr. M. Ramalingam

Abstract—A microarray measures the expression levels of thousands of genes at the same time. Clustering helps to analyse microarray gene expression data. In this paper, have implemented a biclustering algorithm to identify subgroups of data which shows correlated behaviour under specific experimental conditions. In the process of finding biclusters, Fuzzy K-means clustering is used to cluster the genes and samples with maximum membership function. Both dimensionality and reducing the gene shaving are done using principal component analysis & gene filtering with the function respectively. This method obtains highly correlated sub matrices of the gene expression dataset. Biclustering is a NP-hard problem therefore which is implemented biclustering in multi -core parallel environment to reduce the computational time of the algorithm. Besides have compared the results with other parallel & sequential algorithm to show the effectiveness of the algorithm.

Download
41 Oxidation Kinetics and Mechanistic Study of Some Aliphatic Aldehydes
Dinesh Solanki, Dr. Dharmendra Dwivedi

Abstract—Aliphatic aldehydes play a vital role in various chemical functions. A suitable mechanism consistent with the experimental results was proposed. Linearity of Exner’s plot and constancy in ΔG≠ values imply the operation of a similar type of mechanism in all amino acids. A rate law deciphering all the observed experimental facts was derived. The kinetics of oxidation of norfloxacin (NRF) by sodium Nchlorobenzene sulphonamide (Chloramine-B, CAB) has been studied in aqueous hydrochloric acid medium at 303 K. The reaction is first order with respect to [CAB] and [HCl], fractional order on [NRF]. Activation parameters were evaluated from the kinetic data at different temperatures. Negative entropy of activation indicated the involvement of a rigid complex in the activated state. The dielectric constant of the medium has a small effect on the rate. Ionic strength and the reaction product benzenesulphonamide have no effect on the reaction rate. The solvent isotope effect is studied. The reaction products are identified by spectral (IR and NMR) data. Rate equation is derived to account for the observed kinetic data and a probable mechanism has been proposed.

Download
42 Clustering Web service Data Using Artificial Bee Colony (ABC) Algorithm
B.Bhavana, D.Varun Kumar, K.Satya, M.Madan Mohan Malavya

Abstract—Data clustering is one of the most popular techniques in data mining. Clustering high-dimensional data is the cluster analysis of data which have anywhere from a few dozen to many thousands of dimensions. Such high-dimensional data spaces are often encountered in areas. There are many Web service companies which provide their services to society contain the data i.e., high dimensional data. Different optimization techniques have been applied to investigate the optimal solution for clustering problems but the accuracy is low when applied to high dimensional data. Swarm intelligence (SI) is one such optimization technique whose algorithms have successfully been demonstrated as solutions for different data clustering domains with high dimensions. Artificial bee colony algorithm (ABC) is an optimization algorithm obtained from SI. It based on the intelligent foraging behaviour of honey bee swarm. We analyze the algorithm which had given the optimised solution.

Download
43 Wireless Based Visual Prosthesis System Using Artificial Silicon Retina
Arjunan.K, Karthik.D, Kavitha.S, M.Manojprabu

Abstract—According to a recent survey done on the number of visually impaired people in the world, it is found that about 285 million people in the world are blind of which 246 million have low vision and 39 million people in the world are completely blind due to the diseases such as macular degeneration, retinitis pigmentosa and glaucoma. Medical treatments are available to slow down the process of these diseases but there is no complete cure for regaining the lost vision. This paper is about visual prosthesis system where the blind is enabled to see the world virtually.

Download
44 Sentimental Analysis of Twitter Feeds for Stock Market Predictions
Priyanka Malpekar,Aishwarya Dudgol,Aparna Sawant,Amit Panpatil,Mrs. Varsha Bodade

Abstract—Twitter messages, or tweets, can provide an accurate reflection of public sentiment on when taken in aggregation. We propose a novel approach to label social media text using significant stock market events (big losses or gains). Since stock events are easily quantifiable using returns from indices or individual stocks, they provide meaningful and automated labels. We will extract significant stock movements and collect appropriate pre, post and contemporaneous text from social media sources (for example, tweets from twitter). Subsequently, we assign the respective label (positive or negative) for each tweet. We train a model on this collected set and make predictions for labels of future tweets. We aggregate the net sentiment each day (amongst other metrics) and show that it holds significant predictive power for subsequent stock market movement. Additionally, we apply extracted twitter sentiment to accomplish two tasks. We first look for a correlation between twitter sentiment and stock prices. Secondly, we determine which words in tweets correlate to changes in stock prices by doing a post analysis of price change and tweets. We accomplish this by mining tweets using Twitter’s search API and subsequently processing them for analysis.

Download
45 People’s Corner
Sushmita S Jadhav, Hemlata Patel, Pragati Mhatre, Priyanka Jagdale, Prof Varsha Bodade

Abstract—The App Works as a Smart System in Handling incoming Complains , Sorting them Department Wise and help the Government to reduce time taken in Decision Making as all data is in Database sheet Format and thus can be retrieved using Simple steps. People’s Corner App provides an effective Complaints Management System for Various Departments of Government to identify recurring problems and allow various Government Departments to improve service delivery in a city. People’s Corner is an Android Application cum website model which has potential for delivering government services through Internet. This mobile android application serves as a single point delivery platform. The aim of this Android App is to outline an effective enterprise architecture framework and an innovative technological solution that can serve as the common platform for government services to the citizens. People’s Corner App helps the citizen to register their complaints about day to day problems in their ward through a mobile application. People’s corner App will provide four departments BMC, RTO, POLICE, and FIRE. Also the complainant will be able to track the status of Complain using the Complain ID. This application provides an interface to register one’s complained and follow it up also let the concerned authorities of Respective departments to address the issue. This interface provide a camera module which help clicking up a picture of any generalized problem that people are facing and will upload this image along with the complaint. The location of complaint is tracked by Global Positioning System (GPS). This module provides exact location of that particular spot. Complaint, once registered, will be redirected to specific department. For Example; a complaint about damaged road will be redirected to PWD department of BMC ward. The Application designed will be User Friendly and will work on all the Handsets Supporting Android Operating System.

Download
46 Low Power Binary Comparator Design for Better Operated Portable Devices
Meenu Shrivastava, Shweta Agrawal

Abstract—The low power efficient devices must have very convenient functioned for portable devices. It has applications in communication and calculation areas. The main intention of this paper is to provide a new binary comparator that gives significant reduction in the power and area. The effectiveness of the proposed technique over the existing is evaluated by coding in Verilog, synthesized and simulated on Xilinx tool chain and design metrics are evaluated. The simulation results on FPGA show that the proposed comparator provides more than 2.56% reduction in power over the best-known comparator.

Download
47 Travel Strategy Prediction using APIs in AI
Mr.P.Jagannadha Varma, Vamsy Kiran Maruvada, E.Vaishali, CH.Sireesha, G.Suryanarayana

Abstract—Weather conditions around the many cities in the world are severe which creates travelling issues to the travellers to finish their journey in optimal time and a safer travel. Today's environment is playing a crucial role in several fields like transportation, travel planning. The purpose of this paper is to provide a real time forecasting of weather to the user along their travel path between sources to destination.

Download
48 Role of Venture Capital in Indian Economy
Pallvi Rani, Dr. Hitesh Katyal

Abstract—The Venture capital is the life blood of new industry in the financial market today. Venture capital is the money provided by professionals who invest alongside management in young, rapidly growing companies that have the potential to develop into significant economic contributors. Venture capital is an important source of equity for start-up companies. Venture capital can be visualized as “your ideas and our money” concept of developing business. Venture Capital financing has seen a sea change over the past few years. Venture funding initially started with the aim of supporting talented entrepreneurs and assisting them in strengthening their growing business and providing them with the much needed financing which otherwise was not available to them. In India it was initially started by the Financial Institutions and Government agencies, viz., SIDBI. In other parts of the world, it was being done more in electronic, medical, data processing and computer related industry and hence was more known as technology finance. Unlike the overseas counterparts where the investors were the private sector one who not only provided funds but also guidance and mentoring to the entrepreneurs, the India Venture Capitalists were large financial institutions which had been set up to finance only. Their intervention was limited to the financial aspect.

Download
49 A Survey Study: Assessment of physical wellbeing of women
Suman Lata, Poonam Sheoran

Abstract—Woman's health is an issue which has been taken up by many feminists, especially where reproductive health is concerned. Woman's health is positioned within a wider body of knowledge cited by, among others, the World Health Organisation, which places importance on gender as a social determinant of health. Objective: The objective of present study was to assess the physical wellbeing of women, for the present study it includes assessment of BMI, Anemia, Random Blood Sugar, Hypertension, Breast examination among 108 women attending OPD at MMIMS&R by using convenient sampling technique. Result: It reveals that out of 108 women 37 were found to be moderately anemic and 36 women were having severe anemia. Majority of the women were found to be in the normal range (34.25%) of BMI. Majority 50% of the women were having normal blood pressure. Woman's breast finding were normal where as 7.40 % of woman's breast was tender followed by painful right breast and least 1.8 % of woman's breast was found having palpable lymph node and breast engorgement. The calculated r value is found to be Weak positive correlation with BMI and RBS, SBP, DBP.

Download
50 A Non Invasive Method for Monitoring Cardiac Activities
C.Sathish Kumar, S.Divya, J.Hema, D.Nisha

Abstract—Over the past few decades, heart diseases has been increased due to the physical inactivity, diet and stress. Latest survey on cardiac disease in India reveals that there are roughly 30 million heart patients and 2 lakh surgeries are being performed every year. In order to reduce this problem continuous monitoring of cardiac parameters is necessary. Therefore, in this project Electrocardiogram, Seismocardiogram and Heart sound are measured which offers the monitoring of heart failure patients and general population. ECG is acquired through single lead ECG sensor, with the help of accelerometer the micro vibrations are measured and microphone is used to pick up the heart sounds. The Embedded system design methodology enables the monitoring of three parameters and is transmitted through zigbee for continuous monitoring.

Download
51 Non Invasive Remote Health Monitoring Using Li-Fi Communication System
Mrs.S.Madhumadhi, Ashly Shaji, V.Chidhanandha

Abstract—Recent advancements in the fi e ld of light emitting diode (LED) has spurred the interest to use LED for illumination and data transmission. This has resulted in the growth of visible light communication (VLC) system, with ongoing research to utilize VLC in a variety of appl ications. This paper presents a n o n - i n va s i ve r e mo t e health monitoring system, where biomedical signals are transmitted via the Li -Fi communication sys tem. A heart rate sensor and temperature sensor are used to obtain ECG signal and temperature from our body respectively, which are boot into Arduino board. Li-Fi module is used to transmit these signals wirelessly to computer. Li-Fi is a part of the Visible Light Communications (VLC) PAN IEEE 802.15.7 standard. Li-Fi module, which uses visible light of range 350nm to 800nm for data transmission, is usually implemented using white LED light bulbs. These devices are commonly used for illumination by applying a constant current through the LED. on the other hand, by high-speed and slight variations of the current, the optical output can be made to vary at extremely high speeds. Invisible by the human eye, this dissimilarity is used to carry speedy data. This allows for a more precise and exact monitoring and diagnosis. The data packet size is carefully designed in such a way to transmit data in a minimal packet error rate.

Download
52 Long Term Monitoring System of Aged People Using Radar Technology in Home Environment
S. Sola Subbu, G. Dhivya Bharathi, M. Keerthana

Abstract—The aged members of the society over 60 years of age are consistently increasing worldwide. This whereabouts resulted in a growing need for routine long-term home monitoring. In this paper, radar technique is used for fall detection of aged people. Contactless device is placed for health monitoring in home environment. It is the combination of heart beat, radar, wireless communication, data processing and microcontroller. Zigbee is used for data transfer to the physician in order to provide a prompt alert in the event of emergencies. In this radar technique, ultrasonic sensor is user because it works in any lighting conditions, making this a good choice to supplement infrared object detector and non-contact distance measurement.

Download
53 Adaptive STBC Encoder for Rayleigh fading reduction with noise free OFDM Communication: A review
Ashish nadoniya, Prof. Papiya dutta

Abstract—OFDM is very popular now a days because of its demand in high speed wireless data communication, it will be correct if we gave the whole credit of using 3G and 4G technology just because of OFDM. This technique is already very good and standardized, but still there are some important concerns which are still hot topics around researchers that reduction of Rayleigh fading, Reduction of BER and achieving fully orthogonal communication for more than two antennas with rate-1. Proposed work gives a new solution for reduction of Rayleigh fading and removing noise with a new adaptive STBC encoder and a adaptive RMS filter. The whole concepts is just because the signals is a thing which continuously changing and we are using same approach for type of signals. An adaptive filter and Encoder can be consider as some intelligent system which follows some algorithms and make decision.

Download
54 Steganography Methods with unique DWT and SVD for Secure Communication
Shanu Suryawanshi, Prof Mukesh Tiwari

Abstract—As known there are many possible type for stenographic methods already been developed. Steganography is getting much popular then cryptography due to its advantages over cryptography. however techniques that are been developed in area are based for complex & pattern based data hinging in pixels for images, later on key based approaches are also been developed, later on many combination (two various approaches cryptography & steganography working together) based procedure been developed. proposed work is new theory for steganography that is analytical cum pattern based Image steganography proposed procedure is been developed for achieving very high SNR & low MSE even if size for original is less, actually only problem with steganography is that it nessesory many for data ( a full image) for transmitting few original data, so proposed work aims to increase size of data while maintaining size for image same. In proposed approach stego image produce is for acceptable level with good PSNR & less BER as compared to other cover image with various methods & enhance overall security.

Download
55 An area efficient and high Throughput 32 bit DSP Processor Design
Sapana tiwari, Prof. Sunil Shah

Abstract—Proposed thesis work concept comes after thinking and deep study of all these methods of enhancing processor performance and proposing a new DSP microprocessor architecture and it has FSM and some instruction set (big instruction set which better for various applications) and RISC kind of feature like executing every instruction in one cycle. Thesis work has use Xilinx ISE 12.2 ISE software for designing all modules and each module has been tested and verified with all possible instruction which are been supported by proposed design. The proposed architecture of processor requires less area and higher speed as compare with the existing architecture available, it has certain limit that cannot work with medium or sophisticated scale application or it can say it is not suitable for OS based application. As the design core processor is been for small scale non OS based applications which are very common in Microcontroller.

Download
56 A Review on Various Audio signals Filtering Procedures for Hearing aids
Shivani Tiwari, Prof. Rakesh Patel

Abstract—Long distance communicated audio signal recordings may contain unwanted noise that can impair source recognition, speech recognition, and other audio signal method requirements. In this paper several custom analysis/synthesis algorithms are presented based on a time-varying spectral representation of noisy signal. Enhancement method adapts to instantaneous signal behaviour and alters noisy signal so that enhanced output signal is higher in quality than method noisy input signal. A compound of Ramez exchange method filter in order to frequency filtering and discrete wavelet Transform base noise filtering is likely to be design in near future in order to retain features that are attributable to desired signal, such as human speech, while detach features that are more likely to be due to noise in long distance contamination.

Download
57 A Unique fusion of Audio filter for Hearing problems
Siddhartha, Prof Amit Mishra

Abstract—Audio enhancement became important when noise in signals causes loss of actual information. Many filters have been developed and still improving. A highly optimized core discrete Remez part of the Parks- McClellan (PM) filter along with wavelet type discrete symlet filter been proposed in the paper. The proposed algorithm DWT-REA is experimented for two speech signals and efficiency is checked with calculation of MSE. Performance is also evaluated for different value of noise level. Proposed Algorithm is also compared with simple REA for seeing the improvement in recovered signal. Proposed algorithm can easily applicable in the field of speech enhancement.

Download
58 Advanced safety braking system by using Controlled fluid flow
K.Pradeep Kumar, C.Sridhar, M.Somanathan, D.Sivasankaran, R.Srinath

Abstract—Our project is to prevent the slipping effect during brake been applied. When we go on the bike in very high speed, at sudden time the brake applied in the bike will be change to uncontrolled condition. Due to uncontrolled condition the accident will be occurs and it leads to death, these drawbacks are minimized in our project to control the speed in bike at any speed without slipping. The drawbacks are minimized by using ECM (Electric Control Module), Tacho s ensors, Flow contol valves. And also the inertia force is created by using electromagnetic force.

Download
59 Review of Three Way Unloading Mechanism in Trailer
P.Sampath kumar, J.Palanivel, A.Sakthikavin, M.Vinoth kumar, Mr.R.Jeya kumar

Abstract—Trailer had many of applications in day to day life. In industrial and domestic uses, trailer can transfer a variety of products including, rice, bricks, sand, fertilizer, wood, rocks, etc. By considering wide scope of the topic, it is necessary to study and project on the topic of trailer mechanism in order to make it more economical and efficient. In existing system, trailer can unload one side only by using hydraulic jack. By this project we can apply three way unloading mechanism, it is easy for the driver during unload the material and also it decreases time and fuel consumption. This paper has mainly focused current difficulty in unloading mechanism.

Download
60 Effects of Aerobic Exercise on Insulin Sensitivity and Glycaemic Control in Type 2 Diabetic Males
Dr.P.Anandhan

Abstract—The purpose of present study was to find out the effect of aerobic exercise to change the insulin sensitivity and glycaemic control in type 2 diabetic males. The purpose of this study, eighteen type 2 diabetic males were randomly selected subject from working in various faculties of Annamalai University, India and volunteered to participate in this study. The selected subjects were age, height and weight ranged was 45 ± 7 years, 164 ± 9 cm and 75 ± 13 kg respectively. The Selected subjects were divided into two groups and each group contained nine subjects. This study was consisted of Group I experimental group underwent aerobic exercise and Group II act as control group. The duration of aerobic exercise was given from about 30 to 45 minutes per day. The program included warming-up phase for 5 minutes of stretching exercises, 30 minutes run, stationary run, short kick, knee-ups, syncopated leap, alternate leap, jumping jacks, lateral pendulum, marching, the grapevine maneuver and heel touch at 40-65% of maximum heart rate and cooling down phase for 5 minutes of stretching, three times a week for 8 weeks. The data were analyzed using the SPSS statistical package. The data collected from the two groups before and after the training period were statistically examined to find out the significant improvement using the analysis of covariance. P values of <0.05 were considered statistically significant. After 8 weeks, significant change was observed in glycosylated hemoglobin, fasting glucose and fasting insulin level (p<0.05). The result of study shows that aerobic exercise have significantly decreased on glycosylated hemoglobin, fasting glucose and fasting insulin level in type 2 diabetic males. This study supports the value of an exercise program in the management of type 2 diabetes.

Download
61 Electronic Waste: A Growing Concern in Today’s Environment: Survey
Geenu Raheja

Abstract—Electronic waste or e-waste is one of the most popular growing issues of the world. The term e-waste is for the collection of old discarded computers, TVs, Refrigerators,, radios – basically any electrical or electronic appliance that has reached its end-of-life. While e-waste contains both valuable materials such as gold, palladium, silver and copper, it also contains harmful metals like lead, cadmium and mercury. In the absence of suitable techniques and protective measures, recycling e-waste can result in toxic emissions to the air, water and soil and pose a serious health and environmental hazard. In India, e-waste is mostly generated in large cities like Delhi, Mumbai and Bangalore. In these cities a complex e-waste handling infrastructure has developed mainly based on a long tradition of waste recycling. But the problem is that these recycling processes are extremely harmful and have negative impacts on the worker‟s health and the environment. There is no generally accepted definition of e-waste, in most cases, e-waste comprises of relatively expensive and essentially durable products used for data processing, telecommunication or entertainment in private households and businesses. Public perception of e-waste is often restricted to a narrower sense, comprising mainly of end-of-life information and telecommunication equipment and consumer electronics. The world is consuming more and more electronic products every year. This has caused a dangerous explosion in electronic scrap containing toxic chemical and heavy metals that cannot be disposed of or recycled safely. So the concept is that how this e-waste should prevent fully recycled so that there should be prevention on environmental damage. E-waste is assuming serious proportions in India and urgent steps need to be taken to mitigate this problem. The present study focuses on the effect of usage, dumping and recycling of the electronic waste on the natural environment.

Download
62 Wearable Robust Controller for Tremor Suppression and Heartbeat Sensing with Wireless Technique
A.Margret vinnarasi, A. Saraswathi, S. Madhumathi

Abstract—The rhythmical and unintentional oscillatory movement of a body part is called tremor. Tremor is a musculoskeletal level involuntary vibration and one of the most frequent movement disorders. Instead of medication or surgery or drug consumption to use this orthotic devices have been under exploration as noninvasive tremor suppression. Assess and attenuating the tremor motion without impeding the patient’s intentional motion is the challenge in musculoskeletal tremor suppression. In this project the robust tremor suppression algorithm was derived for patient with pathological tremor in the upper limbs. At first the tremor frequency range is calculated by using a high-pass filter. Then by applying back stepping method the correct amount of torque is estimated to impel the output of the estimator toward zero. This is equivalent to an assessment of the tremor torque and shown that the orthotic device control system is stable. A human arm joint stimulator, efficient of emulating tremor motion of a human arm joint was used to appraise the proposed suppression algorithm. The device is designed as wearable and personal equipment using wireless communication. Heartbeat and tremor is continuously monitored with help of sensor. Sensor output is given to controller which is used to control the valve with help of driver circuit for controlling tremor action and heartbeat is monitored. Non return valve is used to arrest the air pressure in the valve. The above functions are monitored. SMS to the physician and relatives using GSM modem automatically if the heartbeat is high and tremor is not controlled by maximum times of suppression.

Download
63 Design of Template for Measuring Airgap along the Circumference of Stretch Reducing Mill Rolls
M.Sugumar, S.Meiyalagan., L.Mayilswamy, S.Manikandan

Abstract—In the application, Bharat Heavy Electrical Limited Trichy-14.Every industry faces its own type of problems per product in manufacturing. The solution of the problems may be simple but solving them gives us the credit. Most of the problem can be overcome with designing skills. The company that we entered faced a problem on rolls in 28 stand stretch reducing mill (SRM) at hot mill in seamless steel tube production plant (SSTP). The circumference of the roll in SRM unit is not uniform, so it leads to uneven air gap between the rolls. Due to this there is a “line marks" on the finished tubes. In previous method the template used for measuring the air gap is not proper and is so difficult. As these tubes are used in high pressure and high temperature application, to overcome these problems we have designed a template along with stand that is portable to measure the circumference of the rolls in SRM unit. By doing this we will able to control the air gap between the rolls. Ultimately, as a result of this approach the “line marks” of the tube will be minimized.

Download
64 Management of Student Activities Using Web Application
Akshaya.B, Harisudhan.T, Karthikeyan.R, S.Karthik

Abstract—This system’s vision is to establish Student management system for educational institution which is of greater concern. This web application is created in such a way that, it can be utilized by overall college or for distinct department. This Application is used to oversee Attendance, on duty and Internal marks of the students. Student Activity Management is created in such a way that the details are visible and available to all the students. The present way of managing student activity follows very old fashioned method that has enormous time and space complexity. Hence the proposed system would be able to overcome the conflicts of the traditional method.

Download
65 Secure Image Encryption Based On DNA Algorithm
Ms.N.Suneetha, Boora Namratha Varshini, Jagarapu JayaDeepika, Gampa Hema Aparna, Devarasetty Nirmal Sai

Abstract—In our project, we propose a novel image encryption algorithm which uses the advantages of both image permutation and DNA based encryption. In the present day scenario it is known that, in the increasing of information threats it is really a challenging task for a user to transfer sensitive data over a unsecure channel. By keeping this in mind we had encrypted or proposed this technique. This provides multilevel security for the image. In the early stages we perform pixel permutation and then mathematical operations followed by DNA encoding for performing DNA encryption. Here DNA is built from four nucleic bases. They are A(adenine), C(cytosine), G(guanine), T(thymine).AT and CG are complemented to each other. Their values can be 00 10 01 11 respectively. a particular pixel intensity value is considered and converted into binary form and for that DNA coding is done where we will get the DNA sequence .In the second stage, for the DNA sequence random numerical values are assigned to each codon. For this, encryption is done using play fair cipher through which encrypted image is produced.

Download
66 Evaluation and Performance Analysis of Cryptography Algorithms
B.Sandhya, K. Pratyusha, G.Devi priya, D.Sagar

Abstract—In today’s world most of the communication is done using electronic media. Data security plays a major role in communication; hence there is a need to protect our data from malicious attacks .This can be achieved by using cryptography, which is an algorithmic process of converting the plain text into chipper text. It is based on the algorithm that both the sender and receiver know the key and message can be returned into its original plain text form. There are number of algorithms for performing encryption and decryption but they differ in time complexity and space complexity. The algorithms are classified based upon the number of keys that are employed for encryption and decryption like secret key cryptography, public key cryptography and hash functions. Encryption algorithm plays a major role in the information security while on the other side these algorithms put additional CPU load and consume battery fast. The main] objective of our paper is to compare and analyse Different algorithms such as DES, 3DES, AES, BLOWFISH, IDEA, SERPENT on the basis of encryption time with the variation of various file like plain text, image of data different sizes.

Download
67 Biomass Gasification of Agro-Waste:- A Potential Assessment For Jabalpur, Region
Arti Raulwar, Dr Abhay Kumar Sharma

Abstract—A study was conducted for the use of thermochemical biomass gasification for producing bio fuels as the energy potential for the Jabalpur district. The downstream processes for gasification considered for the analysis are similar to other biomass processing methods. Present study was carried out to find the availability of methane and hydrogen gas in three major crops residue i.e. wheat, rice and maize for Jabalpur district MP through downdraft gasification process. During the analysis ultimate and proximate analysis were carried out which shows a rich potential as a gasification feedstock. For the above analysis CFD based tool is being used and it has been found that methane yields more in rice husk and less in maize stalks and average yields was 1 ton per 2.76 tons of biomass residue. The CFD tools also suggest that around 4 % of methane and 10% of hydrogen by volume fraction is available in gas produced by these crop residues. The result will be helpful for academicians and person involved in energy generation through Gasification from biomass.

Download
68 Text Processing Using Support Vector Machine
P.Samba sivarao, CH.Prasannalaksmi, G.Sowmyasree, J.Ramyakeerthi, M.Jayataruni

Abstract—In this present trend Authentic plays a very crucial role.our project is a blend of SVM. SVM could produce pool based active learning.Our theme is to access to a pool of unlabeled instances and can request the labels for some number of them. In the above instance, if the classification categories are not approximately equally represented. We propose an efficient method based on active learning strategy to retrieve large text categories. At each feedback step, the system optimizes the text presented to the user in order to speed up the retrieval . Here we use SVM method to make our project different from normal text Processing. Support vector machines (SVM) have met with significant success in numerous real -world learning tasks. However, like most machine learning algorithms, they are generally applied using a randomly selected training set classified in advance. We introduce a new algorithm for performing active learning with support vector machines, i.e., an algorithm for choosing which instances to request next. We provide a theoretical motivation for the algorithm using the notion of a version space our active learning method can significantly reduce the need for labelled training instances in both the standard inductive and transductive settings. One of the most critical problems for machine learning methods is over fitting. The over fitting problem is a phenomenon in which the accuracy of the model on unseen data is poor where as the training accuracy is nearly perfect. This problem is particularly severe in complex models that have a large set of parameters. In this paper, we propose a deep learning neutral network model that adapts the support vector data description (SVDD). The SVDD is a variant of the SVM, which has high generalization performance by acquiring a maximal margin in one class classification problems. The proposed model strives to obtain the representational power of deep learning. Generalization performance is maintained using the SVDD. The experimental results showed that the proposed model can learn multiclass data without severe over fitting problems.

Download
69 Predictive Analytics for Power Consumption in Home appliances Using Computational Intelligence
Ch.Samyuktha, M.S.L., M.V.Srikanth, K.V.Sravya

Abstract—Predictive analytics encompasses a variety of statistical techniques from predictive modelling, machine learning, and data mining that analyse current and historical facts to make predictions about future, or otherwise unknown, events. The model is to perform optimized prediction on power consumption. We propose an optimized model using computational intelligence and it is a step by step method that follows an integrated approach which can solve several complex problems in predictive analytics. It uses multilayer perceptron Adaline feed forward neural network to predict the next values of power consumption. As an integrated method, the model uses multilayer perceptron algorithm as first step to check the data optimization, since the data is considered as an important element in data analytics. The optimized data is extracted using multilayer perceptron adaline feed forward neural network for making the prediction.

Download
70 Pre-Estimation of Concrete Cracking
Dr.M.N.Bajad , Mr.S.D.Gaikwad

Abstract—In this paper we are going to model early age concrete cracking. These accounts for hydration of cement in the constitutive modelling at macro-level of material description and assume cracks as geometrical discontinuities and for the heterogeneous nature of concrete conditioning. Cracking can be the result of one or a combination of factors such as drying shrinkage, thermal contraction, restraint (external or internal) to shortening, subgrade settlement, and applied loads. Cracking cannot be prevented but it can be significantly reduced or controlled when the causes are taken into account and preventative steps are taken. We also recall the thermodynamic framework of concrete framework allows to identify the hydration degree and the affinity as internal state variable and conjugated forces, respectively, from mass conservation considerations and thermodynamics of porous media, direct at the macro-level of material description. We thus model concrete cracking and thus we can guess the crack patterns, crack width and placing by just a few parameters.

Download
71 Fabrication Of Electromagnetic Gear Changer In Two Wheelers (Button Operated) – A Review
M.Senthil Prabhu, M.Anbalagan, S.Kesavan, J.Augustin Antony Raj, Alan Dominic

Abstract—The main objective of this project is to apply the gear by using automotive electromagnetic system in automobiles. This is an innovative model mainly used for the vehicles. In this project, we designed the button operated electromagnetic gear changing method in two wheeler by using the D.C guns. By using this system, we can easily control the vehicle and also avoid the wear and tear of the gear.

Download
72 Visible Display Hiding Process Using Natural Plant Extracts Filters
Vidyullatha pesaru, Santhosh kumar seelam

Abstract—New leaf extract filters for colour image processing are introduced and analysed in this paper. The proposed methodology constitutes unifying and powerful bio-chemicals to DISPLAY HIDING TECHNIQUES. Using the proposed methodology, colour image hiding techniques are treated from a global viewpoint that readily yields and unifies previous, seemingly unrelated, results. The new leaf extracts filters can absorb all colors of local data in the color DISPLAY. The principles behind the new filters are explained in detail. Simulation studies indicate that the new METHOD are computationally attractive and have excellent performance.

Download
73 Behavioural Study of Buildings with Vertical Irregularity
Dr. M.N. Bajad, Dharme Ashutosh S.

Abstract—Symmetrical and regular structures are usually recommended for an effective design of earthquake-resistant structures; however, various irregularities in buildings are imposed by town bylaws and various occupational aspects. In the past, several major earthquakes have exposed the shortcomings in buildings, which had caused them to damage or collapse. It has been found that regular shaped buildings perform better during earthquakes. The irregularities cause non-uniform load distribution in various members of a building. A gap in effective transmission of forces results in failure of structure. In recent past, various studies have been carried out to evaluate the response of irregular buildings. In this paper, the various effects on structure due to Vertical Irregularities are found out using Response Spectrum analysis on ETABS software.

Download
74 What is role of SDN (Software Defined Network) in Wireless 5G Network?
Drishti Dubey, Dr.Neeraj Shrivastava

Abstract—In this paper study in SDN, network control data transmission and separate layers used in this network services. at this each technology infrastructure & how to used installation in network for each devices control, this architecture decouples the network controlling and forwarding functions enabling the network control to become directly programmable and under line infrastructure to be abstract for application and Network (nodes) services, at this technology continuous researchers have to work, implements then after path computation element 2004, at this most recently Ethane.

Download
75 Design of DC/DC Converter for Charging Series Hybrid Electric Vehicle Traction Battery
D.Sujatha, J.E Moshe Dayan

Abstract—This paper presents the design of DC to DC converter for charging the traction battery of series hybrid electric vehicle. To design a DC to DC converter for high power applications size, losses and cost of the components are very important. Considering these factors a simple interleaved buck converter with fuzzy logic controller is implemented to charge the battery. Because of its minimized inductor ripple current and extent stepdown transformation ratio this converter is applicable for high power applications with high step down transformation ratio. The simulink model of the series hybrid electric vehicle traction battery of 48v is charged with the input voltage of 60v using the MATLAB/SIMULINK.

Download
76 The Study Of Mass Irregular Rc Structure With Various Arrengements Of Steel Bracings
Dr.M.N. Bajad, Shirke Amol P

Abstract—From past earthquakes it is proved that many of structure are totally or partially damaged due to earthquake. So, it is necessary to determine seismic responses of such buildings. There are different techniques of seismic analysis of structure. Like Seismic Coefficient method, Response Spectrum method, Time History method etc. From this 'Response Spectrum analysis' is one of the important techniques for structural seismic analysis. Bracing system is one of the retrofitting techniques and it provides an excellent approach for strengthening and stiffening existing building for lateral forces. In this project work seismic analysis of 9 storey RCC buildings assumed to be situated at seismic zone IV as per the seismic zone map of India with mass irregularity at 3rd and 8th floor levels are carried out. Seismic analysis of RC building frames with X, V, Inverted V and Diagonal type bracing are done. ISHB 250 were utilized as bracing members. This paper highlights the effect of different lateral bracing system on mass irregular structure with 'Response Spectrum' analysis done by using ETABS software.

Download
77 Evaluation of Potentials of Dissotis Rotundifolia, Centrosema Pubescens and Allium Cepa Extracts as Indicator for Acid- Base Titration
A. O. Odiongenyi, A.E. Akpakpan, I. S. Enengedi and E. I. Ekpo

Abstract—This work investigates the potentials of methanol and acetone extracts of leaves Dissotis rotundifolia, Centrosema pubescensand Allium cepa bulb as indicators for acid-base titration. Each extract was used in the titration of H2SO4 vs NaOH, H2SO4 vs NH4OH, CH3COOH vs NaOH, and CH3COOH vs NH4OH. Standard indicator (phenolphthalein) was also used separately for each titration. Each titration was carried out in triplicate. The results obtained revealed that the extracts of these plants have sharp colour changes in acidic and basic medium. Both the methanol and acetone extracts of some of these plants have titre values close to the one obtained when using standard indicator, though some discrepancies were observed with some of the titre values for weak acid /strong base and weak acid/weak base. The titre values of the methanol extracts of Allium cepa (20.93ml) and acetone extracts of Allium cepa (22.67ml) and centrosema pubescens (26.20ml) deviated remarkable from that of the standard commercial indicator for weak acid /strong base titration and for the titration of weak acid/weak base; only the methanol and acetone extracts of Dissotis rotundifolia compared favourably with that of the standard indicator. However methanol and acetone extracts of Dissotis rotundifolia, Centrosema pubescens and Allium cepa bulb can be used as indicators for acid-base titration and hence can serve as suitable replacement for the commercial indicators.

Download
78 Design & Simulation of Network Devices using Cisco Packet Tracer
Ranjeet R Suryawanshi

Abstract—In today’s computer network plays an important role for exchange of information between end users. Emails, online banking, chats and other important services provided by the internet are becoming prominent features of computer network. For interconnectivity between end users, network topology describe the physical and logical appearance and interconnection between arrangement of computers, cables and other component in a data communication network and how to be used for taking a packet from one device and sending it through the network to another device on a different network. So we can say computer network, along with transportation networks, have become essential infrastructure in every society that allows the flow of people information and goods. So in this paper, i am designing a network using a network simulator tool i.e. Cisco packet tracer. This network will deal with how packets can be send from one network device to other network device and will help us to understand the concept of IP configuration, Network devices, Network cables and Topology etc

Download
79 Latency Measurement Using Lossy Difference Aggregator
Mrs.Sailaja, Koilada Kyathi, Buddharaju Shiva Venkata Syamala Devi, Chalapaka Krishna Babu, Appurubothu Ganesh

Abstract—An increasing number of datacenter network applications, including automated trading and highperformance computing, have stringent end-to-end latency requirements where even microsecond variations may be intolerable. Latterly we use two techniques called the SNMP and Net Flow but it is not efficient Detecting and localizing latency-related problems at router and switch levels is an important task to network operators as latency-critical applications in a data center network become popular. The resulting fine-grained measurement demands cannot be met effectively by existing technologies, such as SNMP, NetFlow, or active probing. Instrumenting routers with a hash-based primitive has been proposed that called as Lossy Difference Aggregator (LDA) to measure latencies down to tens of microseconds even in the presence of packet loss. Because LDA does not modify or encapsulate the packet, it can be deployed incrementally without changes along the forwarding path.

Download
80 Cryptographic Techniques Using extracts undisclosed Image
K.Thamaraiselvi, K.Dineshkumar, A.Mummoorthy

Abstract—Modern world visual cryptographic techniques is used for data hiding and other specific scenario’s, uses the characteristics of normal encryption and decryption levels of many digital images[11]. Generally, technology that uses images needs neither cryptography knowledge nor complex computation techniques. For that also it assures that cyberpunks cannot perceive any idea about the visual image in which the information is hidden[9]. The use of cryptography mainly targets binary images(BPCS) because by using the basic level of image i.e., using binary image (black & white) only we can the technique of cryptography; This piece of cryptogram proposes three sub sects for visual cryptography (VC) based on binary i.e., black and white images of gray-level and color images. There are many methods such as halftone, Visual Cryptography, etc. Many of techniques use noise-like random pixels on shares to hide secret images.

Download
81 Design and Implementation of Smart Home Power Management System Based on WSN
D.Sivasankari, K.Ramamoorthy

Abstract—Wireless mechatronic systems consist of numerous spatially distributed sensors with limited data collection and processing capability to monitor the environmental situation. A smart monitoring and controlling system for household electrical appliances in real-time has been reported in this paper. The system principally monitors the electrical parameters of household appliances such as voltage, current and subsequently calculates the power consumed. The controlling mechanism of appliances is based on traffic condition during peak demands. The developed system is a low costand flexible in operation and thus can save the electricity expense of the consumers.

Download
82 LTE- 3GPP Uplink and Downlink Transmission
L.Kanchana, DR.G.Athisha

Abstract—LTE (Long Term Evolution) is fusion of both radio and core network.3GPP is (3rd generation partnership project). LTE is the new standard specified by the fourth generation (4G) wireless communication. Uplink and downlink transmission is analyzed by LTE transceiver and hence the simulations results are obtained by the KEYSIGHT SYSTEMVUE .And also measure the parameters such as Throughput, Bit Error Rate (BER), and Frame Error Rate (FER) by the simulation configuration.

Download
83 Analysis of Sliding Mode Controller for PV Array Fed SEPIC Converter
P.Alageswari, S.K.Nandhakumar

Abstract—This work deals with the application of Maximum Power Point Tracking (MPPT) Algorithm like Sliding mode controller for photovoltaic (PV) applications using MATLAB/SIMULINK. These algorithms are applied to a Single Ended Primary Inductor Converter (SEPIC) using a mathematical model. The proposed methodology algorithm can be expanded to a various class of converters which is capable for photovoltaic applications. The SEPIC converter provides the close loop characteristics. The mentioned algorithms i.e. Sliding mode controller had been analysised for the proposed Single Ended Primary Inductor Converter.

Download
84 Apriori based Frequent Itemset Mining
A.Meiappane, P.Ganesh Guru Teja, Meganathan.I, Nilavazhagan.K

Abstract—Tremendous amount of data is getting generated daily. The storage, retrieval, processing are becoming a great challenge. In order to process huge data and get preferred results there is no efficient algorithm and there exists many data mining algorithms which do consume long time to mine the huge datasets in order to get the patterns that are interesting to the user. So we propose an algorithm in this paper to implement the apriori based frequent itemset mining algorithm. we also has implemented this algorithm with normal apriori algorithm.

Download
85 Image and Annotation Retrieval via Image Contents and Tags
D.D.Pukale, S.G.Bhirud

Abstract—There are many search engines that uses tags and keywords for Image retrieval. Tags are primarily a precise and brief description of an image. Tag-based image retrieval increase the performance of retrieving images with help of low level feature image database. In this paper, we describe combination of tags and low level features like color, shape & texture. Low level feature extraction of color, shape and texture, we used HSV color model, Sobel with mean and median filter, Framelet texture respectively.For the accurate image search and retrieval manual tags must be better, but previous work shows that the manual tagging to the images are inconsistent and inefficient to finding appropriate image. Missing and ambiguous tags decreases the accuracy of TBIR, so to recover that problem, we include completion of tags to image database. The objective is to automatically fill in the missing tags and correct noisy tags for given images. Basically features are computed using thesethree methods and then they are combined for similarity matching using hybrid graph between images in the database and query image. The system is able to retrieve the images related to the query as wel l as annotating the query image.

Download
87 Real Time Face selection with Camera Motion using Open CV
Vikas.D.Patil, Veeresh.P.M,.P.S.Mali

Abstract—Continuous monitoring and surveillance system is playing an important role in security whereby the recent demand for installation of security camera system had been increased dramatically. However, increasing of camera installation in both indoor and outdoor environment such as streets, parks, building, and stores arise problem of deciding position, direction, and visual angle of camera. In order to cover all the area by minimum of camera and at the same time used to track the activity done by am selected user, we propose real time face selection with camera motion control system used in continuous tracking of selected user by a single camera. The purpose of this device is to select a face and monitor it through a camera motion control system. This will help in monitoring a particular selected face. It is having capability to move around 360º. So that it will be possible to monitor the face in all directions.

Download
88 Flexural Behavior of Concrete Beams with Composite Reinforcement
Bharathi.K.M, Abdul Hameed.A

Abstract—This paper describes the properties and behavior of RC beams with composite reinforcement. This studies the comparative resulting advantages by the in-filled steel pipes. This also discuss about implementing of this reinforcement in construction and the forthcoming benefits of this project. The beams casted were tested for flexure, under two point loading condition. Different structural parameters were investigated.

Download
89 Implementation of a Proficient Multichannel Image Codec System Using Non-Linear Fuzzyfied Discrete Wavelet Transform
Prakash Ku. Tripathi, Raju, VikasTiwari

Abstract—The brisk expansion of advanced imaging applications, together with desktop publishing, multimedia, teleconferencing, and high definition television (is that they have some unnecessary information. Image compression HDTV) has amplified the necessitate for valuable and standardized image codec techniques. Among the emerging standards JPEG and JPEG2K are for compression of still images. A universal feature of most images is crucial to reduce the number of bits needed to represent an image by removing the redundancies as much as possible. One of the most important techniques frequently used for still image compression in the present scenario is JPEG 2000(JPEG2K). The JPEG2000 is a single channel image compression technique, hence not able to compress the multichannel images. But in the present era most of the still images are the multichannel like RGB images. However there are some techniques available for color image compression based on JPEG2K, but this field is still open for development of efficient image compression techniques for color images. This paper presents a new method of implementation of available wavelet transform based image compression technique for color image compression using fuzzyfied discrete wavelet transform. Zadah in his first paper on fuzzy, discussed that fuzzy logic is an efficient tool for handling imprecise and vague situations, hence fusion of fuzzy rule base with discrete wavelet transform is the Efficient way to achieve higher compression ratio with less error.

Download
90 A Review of Advanced Methods and Measurements of Impeller Design
K. Ganesan, M.Ariharasudhan, N.Dhivakar, K.Elango, S.Haribaskar

Abstract— The most common approach for measuring the mixed flow of a impeller is to determine the incident mixed flow the chamber .impeller considering revaluate component of a centrifugal pump with different position are applied. Usually material are composite materials, utilized aluminium alloy, iron ,steel ,bronze ,brass, which transfer energy from the motor the pump to the mixed flow of the fluid pumped by accelerating the fluid outwards from the centre of rotation. Therefore it is necessary to find out the design parameters and working conditions that yield optimal output and maximum efficiency with lowest power consumption are considered. In this review are indicates that Computational fluid dynamics (CFD) analysis is being increasingly applied in the different designs of centrifugal pumps used many applications like chemical industry, paramedical industry, biotechnology, polymers and food industry etc. With the aid of the measurement numerical approach, the mixed with internal flows in unique of application while considered of the impellers, can be well corrected less, strengthened, vibration less to speed up the pump design procedure. In review of the research paper carried out in this direction especially in the content of parametric study and optimization of centrifugal pump impeller using CFD tool and taguchi technique. Literature surveys indicate that very unique work has been done in this area.

Download
91 Model Analysis of Leaf Spring Made of Composite Material
Dr. M. Easwaramoorthi, A. Pathri, V. S. Prasanth, S. Rajagopal, k. Sridhar

Abstract—Leaf springs are one of the oldest suspension components they are still frequently used, especially in commercial vehicles. The past literature survey shows that leaf springs are designed as generalized force elements where the position, velocity and orientation of the axle mounting gives the reaction forces in the chassis attachment positions. Another part has to be focused, is the automobile industry has shown increased interest in the replacement of steel spring with composite leaf spring due to high strength to weight ratio. Therefore, analysis of the composite material becomes equally important to study the behavior of Composite Leaf Spring. The objective of this paper is to present modeling and analysis of composite mono leaf spring (GFRP) and compare its results. Modeling is done using solid works 2015and Analysis is carried out by using ANSYS 15.0 software for better understanding.

Download
92 New Approach for Design and Computational Fluid Dynamic Analysis Catalytic Converter
R.Arjun Raj, R.Naveen, P.Navi Kumar, G.Prasanthk, S.Siva Sakthivel

Abstract—Now a days the global warming and air pollution are big issues in the world. The 70% of air pollution is due to emissions from an internal combustion engine. The harmful gases like NOX, CO, unburned HC and particulate matter increases the global warming, so catalytic converter plays an vital role in reducing harmful gases, but the presence of catalytic converter increases the exhaust back pressure due to this the volumetric efficiency will decrease and fuel consumption is higher. So analysis of catalytic converter is very important. The rare earth metals now used as catalyst to reduce NOX are costly and rarely available. The scarcity and high demand of present catalyst materials necessitate the need for finding out the alternatives. Among all other particulate filter materials, knitted steel wire mesh material is Change and selected platinum, palladium, and rhodium coated on the surface of ceramic honeycomb structures as filter materials in this paper. Through CFD analysis, various models with different wire mesh grid shapes rectangular, circular, Diamond combinations were simulated using the appropriate boundary conditions. The comparison of back pressure of different catalytic converter models is made in this paper.

Download
93 Performance Improvement of PEM Fuel Cell with in Serpentine Flow Channel Used in COMSOL
S.P.Venkatesan, Anand Ashokkumar, Rahul.S, Sameer A.k, A Murugan

Abstract—Proton exchange membrane (PEM) fuel cell engines can potentially replace the internal combustion engine for transportation because they are clean, quiet, energy efficient, modular, and capable of quick start-up. Water generation on cathode side is affecting performance of the Fuel Cell; the water generation is influenced by design & operating parameters. In this project PEM Fuel Cell with serpentine flow channel is modelled & analyzed for various operating parameters to enhance the performance of the fuel cell. This project presents a comprehensive, consistent and systematic mathematical modelling for PEM fuel cells that can be used as the general formulation for the simulation and analysis of PEM fuel cells. As an illustration, the model is applied to an isothermal, steady state, three-dimensional, serpentine flow channel PEM fuel cell at different operation voltages to investigate the fuel cells performance parameters such as the oxygen concentration, the velocity distribution of reactant, GDL velocity distribution, pressure distribution, cathode current density distribution, and polarization curve. All of the model equations are solved with finite element method using commercial software package COMSOL Multi physics 4.2. The results from PEM fuel cell modeling for serpentine flow channel at different operation voltages are then compared with each other. Best PEMFC model will be validated experimentally.

Download
94 Structural Analysis of Bike Alloy Wheel
A.D.Ladha, G.satheeshkumar, R.suba sankar, T. Rajasekar

Abstract—In this project we are doing the material optimization of two wheeler alloy wheel. This project we are designed the 3D model of the alloy wheel by using proe software and the analysis taken by di fferent materials of the alloy wheel and the analysis taken by the ansys software. This project we are analysed the rotational velocity and force acting on the alloy wheel by the three materials. Presently the alloy wheels are made by the material of aluminium alloy and magnesium alloy, this project we are testing the same load under the three materials. The materials are thermoplastic polymer (PEEK), carbon fiber and E glass epoxy. Then the model is analysed for the deflection, max stress induced and strain for all the above materials under same load.

Download
95 Three Dimensional Modelling Integrated Thermoelectric Generator-Photovoltaic Thermal (Teg-Pvt) System Used COMSOL
K. Ganesan, K. Nanthakumar, R.srinivasan, R.thiyagarajan, S.vivekanandhan

Abstract—A Three dimensional steady state heat conduction thermo electric current model was created in COMSOL Metaphysics to study the performance of thermoelectric generator-photovoltaic-thermal (TEG-PVT) system. Four different cases were studied in the paper. In case 1, PV cells without concentrator was simulated while in case 2, concentrator ratio range from 2 to 5 was utilized In case 3, the convection heat transfer coefficient was varied between 6.2 and 14.2 W/m2K. The value of thermal insulation between Photovoltaic cells and TEG was decreased for case 4. The results indicate that having higher concentration ration results in more power generation while increases convection heat transfer coefficient between outside surfaces and atmosphere and lower thermal resistance between PV cells and TEG help keep the PV temperature at optimum level.

Download
96 Analysis of Emission Control from an Exhaust Gas by Dual Type Scrubber Technology
I.Abbas, R.Srinivasan, R.Sandeep, R.Saravanakumar, M.Sampathkumar

Abstract—In present scenario, the environmental pollution is major problem in the world. The vehicles generate pollutants such as unburned hydrocarbons (UHC), oxides of nitrogen (NOX), carbon dioxide (CO2) and lead and other particulate emissions. These pollutants are the root cause for the air pollution. Scrubber is a device used to control the gaseous and solid pollutants from industrial exhaust streams. In this project dual type scrubber was designed and fabricated. After that the setup was used in the diesel engine to reduce the pollution by chemical absorption method. The rate of absorption of the pollutants mainly depends on the nature of the absorbent used. Emission rates of CO2, NOX, HC, CO of a diesel engine had analyzed and the results were taken. The various chemical absorbents such as Water, Potassium hydroxide, Magnesium hydroxide are used for experimental works. After that results were taken and compared with actual readings. These results shows that performance of engine was increased and emission get reduced by using the dual type scrubber technology.

Download
97 Low Power Square Root Carry Select Adder
Kalaivani S, Jayachandran T

Abstract—Carry Select Adder (CSLA) is faster than any other adders used in many data-processing processors to perform arithmetic functions speedily. By observing the structure of the CSLA, it is clear that there is way for reducing the area and power consumption. This work uses an efficient gate-level modification to significantly reduce the area and power of the carry select adder. Conventional carry-select adder is still area-consuming due to the dual ripple carry adder structure. The logic operations involved in conventional carry select adder (CSLA) and binary to excess-1 converter BEC based CSLA are analyzed to study the data dependency and to identify minimized logic operations. The sum for each bit position in an elementary adder generated sequentially only after the previous bit position has been summed and a carry propagated into the next position. This paper introduces a proposed logic block as a D latch with replacing RCA block in conventional design to evaluate the power consumption and area. In order to minimize area and power of 16 bit carry select adder we have replaced a BEC with D latch.

Download