IJAIR- Volume 5 Issue 4 (April 2016)

 


Sr/No/ Title Pdf
1 Modelling And Analysis Of Metal Matrix Composite Of Connecting Rod By Finite Element Analysis
B. Velliyangiri, S. Arun, S. Azarutheen, P. Jegadeesh

Abstract — Composite materials are now a days widely used in the engineering field. The general characteristics possessed by the composite materials are greatly found to be the reason for using it in the automotive applications. The objective of the project is to design and analysis the stress and strain of metal matrix composite (MMC) connecting rod. The connecting rods are commonly used in the IC engines and are forced to millions of varying stress cycles leading to fatigue failure. But the MMC connecting rods are lighter and may offer better compressive strength, stiffness when compared to conventional connecting rod and it's design still represents a major technical challenge. In this project both the standard steel alloy and composite connecting rods are modelled and analysed using SolidWorks 2016. A comparative study was undertaken to predict the structural behaviour of connecting rods using three dimensional finite element stress, and is determined for the most cost effective modelling and analysis approach. The finite element results proves that the performance is similar as that of standard steel connecting rod. The stress and fatigue analysis of the MMC connecting rods is observed to be better than that of the standard connecting rod.

Download
2 Design and Analysis of Internal Expanding Drum Brake with Collet & Wedge Mechanism
M. Senthil Prabhu, M.Vinoth Kumar, C.Navaneethan, S.Sathish, N.Vivekanandan

Abstract—The drum brake uses friction caused by a set of shoes or pads that press outward against a rotating cylindershaped part called a brake drum. When shoes press on the inner surface of the drum the braking occurs. In cam operated brake the intensity of pressure acting in the contact area between the drum and the pad is low in the portion that is nearer to the pivot end. This also results in the excessive wear at the portion of a friction pad nearer to the cam end. To overcome this drawback, we have used collet and wedge for equal expansion of brake shoe with more area of frictional contact which provides equal intensity of pressure to the brake drum. This results in the better braking efficiency.

Download
3 A review on bagasse fiber reinforced composites with polyester and epoxy Resin matrices
B. Velliyangiri, S. Santhoshkumar, M. Sasidhar, N. Srinivasan, T. Vinesh kumar

Abstract— Bio composite is a material produced by a matrix and a reinforcement of natural fibers like Jute, Coir, Sisal, Pineapple, Ramie, wicker, Banana and Bagasse, etc. Such natural fibers composites are low-cost fibers with high specific property, low density and green. The development of sophisticated bio composite materials made is increasing worldwide. It will be an another way to build up the bio composites which can be particularly used for daily needs of common people whether it is house embrace furniture, house, fencing, deck, floor covering, and light weight car parts or sports equipments. This effort to develop a bio composite material with improved performance for global applications is a continuous ongoing process. Thousands of tons bagasse is created but most of their wastes do not have any useful utilization. This bagasse waste can be used to set up fiber reinforced polymer composites for commercial use. This work discusses the development of bagasse fiber reinforced polymer composite, types of matrix, processing methods, and any alteration of the fiber and its applications.
<Download
4 Experimental Study of Corrosion Behavior of Aluminum Coating on Mild Steel by Friction Surfacing: A Technical Review
D. Rajprathap, M. Prakash, R. Poovendiran, P. kabilan, M. Sengottaiyan

Abstract—Friction surfacing is a promising new technology for solid state metallic coating. Mostly, friction surfacing used to repair of engineering worm out parts and corrosion protection. The variety of materials combination in friction surfacing has successfully investigated in past decades. The present review paper describes the detailed description of alloy types and process parameter. Even though, successful alloy combination has been carried out, the control of process parameter is the promising challenge to the new research seekers.

Download
5 Influence of Extreme Temperature on Electricity Demand in Madhya Pradesh (India)
Akanksha Dubey, Dr. A. K. Sharma

Abstract—The climate is defined as ‘the general or average weather conditions of a certain region, including temperature, rainfall, and wind’. The earth’s climate is most affected by latitude, the tilt of the Earth's axis, the movements of the Earth's wind belts, and the difference in temperatures of land and sea, and topography. Human activity, especially relating to actions relating to the depletion of the ozone layer, is also an important factor. Urban centers heavily depend upon electricity for their existence, with increase in temperature electricity demand for space cooling also increases. Climate Change induced temperature rise also affect electrical generation at power plants. Due to excessive cooling demand many cities in India has to overdraw the electrical power from the grid, while the other not so important has to bear the power cuts due to increased demand by others. Urban areas are continuously growing larger creating huge demand of electricity for their smooth functioning; Rapid urbanization and improved lifestyle also adds further increase in the electrical demand of the city. This study attempts to improve upon an existing forecasting model indicating a quadratic Relationship between temperature and peak electricity demand whereby peak electricity load increases exponentially with increasing temperature based on previous analysis.

Download
6 Opinion Mining Using Polarity Classification Algorithm
K.Sandhya, V.Lavanya Rani, P.Padma Kumari, U.Mounika

Abstract—Sentiment analysis is a broad research area in academic as well as business field. The term sentiment refers to the feelings or opinion of the person towards some particular domain. Hence it is also known as opinion mining. It leads to the subjective impressions towards the domain, not facts. It can be expressed in terms of polarity, reviews or previously by thumbs up and down to denote positive and negative sentiments respectively. Sentiments can be analyzed using Natural Language Processing(NLP), statistics or machine learning techniques. The primary issues in previous techniques are classification accuracy, data sparsity and sarcasm, as they incorrectly classify most of the feeds with a very high percentage of feeds incorrectly classified as neutral. To overcome this we propose an algorithm called Polarity Classification Algorithm for feeds classification based on a hybrid approach. The proposed method includes various preprocessing steps before feeding the text to the classifier. Experimental results show that the proposed technique overcomes the previous limitations and achieves higher accuracy when compared to similar techniques.

Download
7 Study on prediction of Network Security: Ethics and Privacy
Parveen Kumar

Abstract— Network security refers to protecting the websites domains or servers from various forms of attack. Network security is important in every field of today’s world such as military, government and even in our daily lives. Having the knowledge of how the attacks are executed we can better protect ourselves. The architecture of the network can be modified to prevent these attacks, many companies use firewall and various polices to protect themselves. Network security has a very vast field which was developed in stages and as of today, it is still in evolutionary stage. To understand the current research being done, one must understand its background and must have knowledge of the working of the internet, its vulnerabilities and the methods which can be used to initiate attacks on the system.

Download
8 Optimizing Gtaw Process Parameters On Mechanical Properties Of Aluminium Alloy 5052-6061 Weldments
M.Bala kumaran, K.Gowthaman, K.Gopalakrishnan, V.Gokulnath, T.Jeevananthan

Abstract—GTAW is an arc welding process that uses a non-consumable tungsten electrode to produce the weld. The work is based on the mechanical properties of 5052-6061 aluminium alloys in GTAW is rarely found in the literature collection and dissimilar metal shows comparatively better strength than similar metal.In GTAW welding current range, gas flow rate and the filler rod diameter play major role in deciding the joint characteristics. By using response surface methodology (RSM) in minitab software optimal range of values can be found. After finding the optimum range of values welding process is carried out. To find the strength of weldjoints tensile strength, Yield strength (YS) and hardness test were established for each set of optimal values and analyzing the best result.

Download
9 Efficient Power Management for Group Tour Guide by RFIDs in Wireless Sensor Networks D.Dinesh, Dr.T.Sasilatha

Abstract—Energy management in sensor networks is essential to prolong the network lifetime. The group guiding services based on RFIDs and wireless sensor network has a sensing field mixed with multiple independent tourist groups, each with a leader and several members. Sensor nodes have to track leaders’ locations and maintain following paths from members to leaders. In order to manage the power in this scheme, EGGSS protocol (Efficient group guiding sleep scheduling protocol) is proposed. The protocol applies the TDMA based sleep scheduling to enable reliable group guiding at low cost, low traffic load and at low power.

Download
10 Identification of Suitable Parameters for Predicting Handoff in Real Time Mobile Network Technologies
Aditi Singh, Neeta Nathani

Abstract—Future wireless networks will consist of multiple heterogeneous access technologies such as Universal Mobile Telecommunications Service (UMTS), Global System for Mobile Communication (GSM), Long Term Evolution (LTE) and Worldwide Interoperability for Microwave Access (Wi-Max). The main challenge in these networks is to provide users with a wide range of services across different radio access technologies through a single mobile terminal. The mobile users are demanding access to the wireless networks at anytime and anywhere. To ensure the service continuity and to maintain the promising Quality of Service (QoS), the decision regarding handoff is to be taken appropriately. The most common criteria for handoff is the Received S ignal S trength (RS S ). Now a day’s integration of different wireless access technologies has become more important so that the user is made available to get access without any discontinuity. In such integrated environment to provide seamless mobility, Vertical Handoff (VHO) is one of the major issues which need to be addressed for providing better QoS. The vertical HO scenario introduces issues related to QoS which affects the connections as well as the applications. This paper identifies different parameters which are responsible for a fruitful handoff process by comparing handoffs in different mobile networks like UMTS, GSM, WiMAX, and LTE. The paper also discusses about the path traversed by the HO decision process and find out the parameters which are useful to make accurate HO decision.

Download
11 Audio Denoising Algorithm by Adaptive Block Thresholding using Short Time Fourier Transform
Shivam Tiwari, Rashika Gupta, Ravimohan

Abstract—In this paper, an adaptive bock algorithm with modified threshold using STFT for denoising of audio signals is proposed. The signal is first segmented into multiple blocks depending upon the minimum mean square criteria in each block, and then thresholding methods are applied for each block. All the obtained blocks after denoising of individual block are then concatenated in order to get the denoised signal. The Short Time Fourier Transform provides more coefficients than the Discrete Wavelet Transform (DWT), representing additional timefrequency details of the signal. STFT gives more degree of freedom in terms of time-frequency resolution of audio signals. When an audio signal corrupted with Additive White Gaussian Noise (AWGN) is processed by using this algorithm, we obtained higher Signal to Noise Ratio (SNR). Hence, the proposed algorithm out-performs the other algorithms. Also the obtained denoised signal with this algorithm is close to the original signal.

Download
12 Automated Flow Measurement & Addition of Solvents with Database Management
V.A.Patil, Prachi Jadhav, Priyanka Kadam

Abstract—Effective flow management begins with timing and regulating in chemical application in a way that will satisfy the need of the liquid consumption. This involves supplying liquid according with requirements of quantity. So measuring of liquid in chemical industry is essential step. There are many processes in chemical industry like sugar factories, distilled water plant, petroleum industry we need to calculate liquid flow as well as need to add some other chemical product for final process outcome. The aim of this project to calculate water flow and add purification chemical into water for boiler system. In this project we are going to design and manage liquid flow as well as addition of other chemical product which is required in process. Here flow meters are used to measure the flow of liquid and valve is used to add other chemical product in it. The calculated output of flow meter and added quantity of product is sent to customer’s mobile and PC via GSM system. The system reduces human efforts, time and we can check the output easily on mobile.

Download
13 Multimodal Biometrics for Person Authentication using Palm print Images
V.Ananth, R.Bakkialakshmi, M.E.Farzana Begum, A.shakthipriya

Abstract—Implementation of multimodal person authentication system using single input image with efficient features. Integrating the features increases robustness of the system. Discrete Wavelet Transform (DWT) is used for feature extraction and Support Vector Machine (SVM) is proposed for classification. The final decision is made by fusion at matching score level.

<Download
14 Compressibility Behaviour of Black Cotton Soil Admixed With Lime and Rice-Husk Ash
Parimal Jha, Nisheet Tiwari

Abstract—Black cotton soil covers about one-fifth of the area of our country. Owing to its undesirable engineering properties such as high swelling and shrinkage, the soil is not good either as foundation or embankment material. To make the best use of black cotton soil, its properties are to be modified to suit the requirements in any specific case by means of stabilization. Therefore, it is necessary to properly choose the stabilizer through careful investigation to improve the strength, compressibility and permeability characteristics. At the same time, the economics of the process of the stabilization should also be considered. In this paper the results obtained by studying the compressibility behaviour of black cotton soil admixed with lime and rice-husk ash is presented. For the purpose of comparison similar studies have been carried out with admixtures such as lime and rice-husk separately.

Download
15 Review on Self Compacting Concrete by Using Mineral Additives
Hemant Sharma, Nisheet Tiwari

Abstract—Self compacting concrete (SCC) flows into place Fresh self-compacting concrete and around obstructions under its own weight. Self-compacting concrete decreases construction time, labour and equipment uses on construction,, and helps in achieving use without applying vibration in congested reinforced concrete structures characterized by difficult casting conditions. However, because it usually requires a larger content of binder and chemical admixtures compared to ordinary concrete, its material cost is generally 20–50% higher, which has been a major hindrance to a wider implementation of its use. The fresh concrete properties and compressive strength at 1, 7 and 28 days of such SCC mixtures were measured. The parameters considered in the study were the contents of cement, water- cement ratio ,Fly ash, Micro silica & Metakaolin. The responses of concrete are recorded from Slump−flow test, L−box, U-box and V−funnel.

Download
16 Review On Soil Stabilization Techniques
Satyam Tiwari, Nisheet Tiwari

Abstract— The main objective of this study is to investigate the use of waste fiber materials in soil applications and to evaluate the effects of waste polypropylene fibers on strength of unsaturated soil by carrying out different tests, such as direct shear test, unconfined compressive test on soil sample with fibers and without fibers. The results obtained are compared for the two conditions and inferences are drawn towards the usability and effectiveness of fiber reinforcement as a replacement and as a cost effective approach for increasing soil strength. This paper gives a comprehensive report on stabilization techniques for soils.

Download
17 An RTOS Based Architecture for Health Monitoring with Wireless Sensor Network
Sowmiya.P, Valarmathy.G

Abstract—An RTOS based architecture designed for the purpose of data transmission between two controlling units through WSN without collision. RTOS is used here to assign the priorities. The values are sent in the form of packets during specific time; in this transmission collision may occur to overcome this Wireless HART (Highway Addressable Remote Transducer) is used. This paper is implemented in two section as prototype. First section runs with RTOS and LPC2148 as master node and another as normal data acquisition node to which sensor are connected. Second section contains a controller. Communication between two nodes is accomplished through wireless HART. The basic view of this technique is to reduce the possibility of collision and thus increase the communication reliability. The sensing parameters can be displayed as graph in software Implementation. To do this, all the nodes must be synchronized precisely. Also, the stack designer must guarantee that the node can finish everything within the timeslot. It offers benefits in terms of product life cycle, safety, system integration complexity, performance scalability.

Download
18 Privacy Preserving For Scalable and Efficient for Dynamic Audit
M.Suganya, S.Dhanalakshmi

Abstract—Cloud computing consists a collection of computers and servers that are publicly accessible via the Internet. User accesses the data’s and will pay as per user basis. Cloud computing has four essential characteristics: elasticity and the ability to scale up and down, self-service provisioning and automatic reprovisioning, application programming interfaces (APIs), billing and metering of service usage in a pay-as-you-go model. While Cloud Computing makes these advantages more appealing than ever, it also brings new and challenging security threats towards users‟ outsourced data. Data integrity and storage efficiency are two important requirements for cloud storage. Proof of Retrievability (POR) and Proof of Data Possession (PDP) techniques assure data integrity for cloud storage. Proof of Ownership (POW) improves storage efficiency by securely removing unnecessarily duplicated data on the storage server. The cloud storage service (CSS) relieves the burden for storage management and maintenance. Fragment Structure, random sampling and index table is used to construct the Audit service. These techniques are supported provable updates to cloud outsourced data. The third party auditing allow to save time and computation resources with reduced online burden of the user. In this work, a method based on Probabilistic query and periodic verification for improving the performance of audit services and also audit system verifies the integrity.

Download
19 Remote Access TrojanA New Method for Forecasting Pulses Productivity Data Based on Fuzzy Time Series with Higher Forecast Accuracy Rate
B. Vinoth, A. Rajarathinam, S. Ranjethkumar

Abstract—The time-series models have been used to make predictions in whether forecasting, agriculture forecasting, academic enrollments, etc. Reference [7] introduced the concept the concept of fuzzy time series in 1993. Over the past 20 years, many fuzzy time series methods have been proposed for forecasting enrollments. These methods mainly focus on three factors, namely, the universe of discourse, partition of discourse and the defuzzification method. These methods have either used pulses productivity data or difference of productivity data or percentage change as the universe of discourse. And either used frequency density based portioning or ratio-based portioning as the partition of discourse. The main issue in forecasting is in improving accuracy. But the forecasting accuracy rate of the existing methods is not good enough. This paper proposed a method based on fuzzy time series, which gives the higher forecasting accuracy rate than the existing methods. The proposed method used the percentage change as the universe of discourse; mean based partitioning as the partition of discourse and proposed method for defuzzification. To illustrate the forecasting process, the pulses productivity data of Tamil Nadu is used.

Download
20 Application of Optimal Reactive Power Dispatch Using Differential Evolution for Voltage Improvement
Ekta Pandey, A.K.Wadwani

Abstract—Economic load dispatch (ELD) is the method of allocation generation from the present generation units in such a manner to fulfill the demand of load and satisfied constraints to minimized total generation price of power plant. Reactive power plays a very important role in power system. In any power system when reactive power absorbed more or less than reactive power generated, then voltage of the system decreases or increases from normal operating value. To obtain the demand at minimum cost while satisfying the constraints for easy and simplicity, the cost function for each unit in economic dispatch problems are approximately shown by a single quadratic functions and is solved using mathematical programming techniques. ELD has the objective of generation allocation to the power unit generators in such a manner that the total fuel cost is minimized and all operating constraints are satisfied reactive power dispatch (RPD) is most important role in the operation and control of power system. This paper presents a differential evolution (DE) based technique for solving optional reactive power dispatch with voltage improvement in power system the monitoring technology for voltage improvement on the L- index of load buses of power system. The main aim is to minimize the real powerless subjected to limits on generator reactive and real power outputs, transformer taps, bus voltages and shunt power control devices like SVCS The proposed algorithm applied to IEEE. 30 bus system to determine the optional reactive power control variables under safe voltage satiability limit and it is very suitable for this task to a large extent the optional reactive power allocation gives the results using differential evolution are compared with other method.

Download
21 Applications of Automation Techniques in Smart Grid Technologies
Sushil Chaudhary

Abstract—The terms smart grid, Intelligent Grid, and secure smart grid are being used today to describe technologies that automatically and rapidly isolate faults, restore power, monitor demand, and maintain and restore stability for more reliable generation, transmission, and delivery of electric power. This paper focuses on distribution-level protection and automation techniques illustrated with real-world, case study examples. Smart distribution automation not only reacts to maintain or restore stability but also evaluates all available mitigations to use “best choice automation.” A simple example includes evaluating pre- event demand and supply at all points on the system. Using this information and knowledge to predict near-term demand profile changes leads to a best choice reconfiguration strategy. This creates a solution that mitigates the fault or event and provides electricity free of sags, spikes, disturbances, and interruptions.

Download
22 Speed Control of Induction Motor Using Vector Controlled Technique Using MRAS
Jyoti Baghel

Abstract—To implement the vector control technique, the motor speed information is required. Infrared Tacho-meters, resolvers or incremental encoders are used to detect the speed. These sensors require careful mounting and alignment and special attention is required with electrical noises. Speed sensor requires additional space for mounting and maintenance and hence increases the cost and the size of the drive system .These problems are decreased by speed sensor less vector control by using model reference adaptive system(MRAS). Model reference adaptive system is a speed estimation method having two models namely reference and adaptive model .The error between two models determines induction motor speed. This paper proposes a Model Reference Adaptive System (MRAS) for estimation of speed of induction motor. An Induction motor is developed in stationary reference frame and Space Vector Pulse Width Modulation (SVPWM) is used for inverter design. PI controllers are designed controlling for this purpose. It has good tracking and attains steady state response very quickly which is shown in simulation results by using MATLAB7.8/SIMULINK.

<Download
23 Review on High Performance Median Filter for Salt and Pepper Noise Removal
Antima Bajpai, Shweta Agrawal, Prashant Badal

Abstract—As the noise may introduced anywhere within image, a filter is the essential part of the image processing units. The noise may corrupt the desired signal which may result in degradation in quality of the image. Among the different noises, the salt and pepper noise is also the frequently occurred noise within the image due to transmission error. In order to eliminate the effect of noise within the image, a special filter called median filter is used. As the noise density increases, the conventional median filter fails to provide noise-free image. Therefore, different algorithm that uses some decision to reduce the salt and pepper noise is proposed in the literature. This paper provides a comprehensive literature review on the different median filter algorithm and architectures.

Download
24 Cloud Services & Multi site Workflows
Sonali J.Rathod

Abstract— Cloud computing is the long dreamed vision of computing as a utility, where data owners can remotely store their data in the cloud to enjoy on-demand high-quality applications and services from a shared pool of configurable computing resources. The global deployment of cloud datacenters is enabling large scale scientific workflows to improve performance and deliver fast responses.

Download
25 Impact of SCMs on Concrete
Dr. M. N. Bajad, Kothawade Ashwini Shirish

Abstract—The influence of supplementary cementations material namely sugarcane bagasse ash & lime kiln dust on the engineering properties of high strength concrete has been reviewed in this study. This paper reviews the possible use of industrial wastes as a supplementary cementations material in the production of concrete. This provides a summary of existing knowledge about the successful use of industrial wastes in concrete industry. Workability, compressibility, elastic modulus, porosity and pore size distribution were assumed in order to quantify the effects of different materials. It aim to reveal the idea of utilizing these wastes by elaborating upon their engineering, physical & chemical properties. Thus the impact of using supplementary cementations materials in concrete are discussed in this paper.

Download
26 Prepaid Metering System for Smart Grid
G.Aishwarya Lakshmi, S.Lokesh, R.Madhivanan, K.athiyasekar

Abstract—A smart grid is the evolution of grid from present electrical grid which focuses on reliability and sustainability of supply along with delivering power in an economic manner, thus it is often referred as the future of electrical system. Every home will be fitted with a smart meter which communicates with the grid computer about the status after specific intervals of time. The power consumption status of every home will be updated in the database. A provision to insert recharge card will be provided in smart meter, once card is inserted it will be recharged and the consumer can consume power until balance is left. When balance falls below a preset value alarm is raised and cautioned. Suppose balance is zero than the isolation circuit will cut off the power supply to the home.

Download
27 Enhancement of Sentiment Analysis on Twitter
A.Anantha Lakshmi, M.Iswarya, J.N.Maria Boncy, J.Parameshwari, S.Hariharan

Abstract— In this paper, we analyze social media data. Social media analytics is the practice of gathering data from blogs and social media websites and analyzing that data to make business decisions. The most common use of social media analytics is to mine customer sentiment in order to support marketing and customer service activities. And then we take twitter big data to predict named entity. In this work, it is aimed to reduce the Twitter user’s effort to access to the tweet carrying the information of interest. To this aim, a tweet recommendation method under a user interest model generated via named entities is presented. To achieve our goal, Hybrid Segmentation is generated via named entities extracted from user’s followers’ and user’s own posts. And extend our approach to analyze short text in tweets.

Download
28 A VHDL Code for Area and Delay Efficient 64-Bit Carry Skip Adder
C.Yamini, M.Krishnamurthy

Abstract— Adders are the basic element in many data processing processors. By improving a performance of the adder would advance the execution of binary operations inside a circuit. The speed of addition is limited by the time required to transmit a carry through the adder. The aim of this paper is to develop 32 bit carry skip adder architecture by the technique of replacing ripple carry adder with carry lookahead adder in the conventional structure which reduces the number of gates and delay. The delay is also reduced by carry chain optimization technique. This work uses a simple and an efficient gate-level modification in the regular structure which reduces the area and delay of the CSKA and this work estimates the performance of the proposed designs with conventional structure in terms of Area, delay and synthesis are implemented in Xilinx 14.2 of VHDL. The results are compared with proposed structure and conventional structure of CSKA.

Download
29 Study of Mechanical Properties of SIFCON Material
M.N.Bajad , Ashwini Pradeep Pawar

Abstract—Slurry Infiltrated Fiber Reinforced Concrete (SIFCON) is one of the superior material and can be reflected as special type of high performance fiber reinforced concrete (HPFRC) .SIFCON has different types of mechanical properties such as ductility, compressive, tensile, shear and especially flexural strengths. But according to outcomes ductility fails in CY system, Triaxial compression fails in stress curve pattern achieved by cubes under confining pressure level. This paper aims the study of various properties of SIFCON .From study of results, SIFCON is used in CY system.

Download
30 Techniques For Determine Economic Load Dispatch Problem Using Particle Swarm Optimization
Ankur Saxena

Abstract—Economic load dispatch (ELD) is the method of allocating generation within all available generating units in such a way the it fulfill the load demand and satisfied constraints to minimized total generation cost of the thermal power plant. Economic load dispatch is a common task in operational planning of power system that require is to be optimized. This paper presents overview of most reliable and very effective particle swarm optimization technique for economic load dispatch. These results have been shown for ELD of three and six unit test systems or generator systems with and without losses. All the final results obtained using PSO will compare with conventional quadratic programming techniques and found to be most convenient.

Download
31 A Review on Cyber Crime
Poonam Gupta, Vikas Sannady

Abstract— The growing danger from crimes committed against computers, or against information on computers, is beginning to claim attention in national capitals. In most countries around the World, however, existing laws are likely to be unenforceable against such crimes. This lack of legal protection means that businesses and governments must rely solely on technical measures to protect themselves from those who would steal, deny access to, or destroy valuable information. Cyber attacks can come from internal networks, the Internet, or other private or public systems. In this manuscript we deal with the survey reports of India and also statistics of cyber crime in India as well as cyber user in world.

Download
32 Efficient signalling technique for free space optics using auto-correlation OFDM
Vinay Dewangan, Shikha Singh

Abstract—This document develops auto-correlated optical OFDM as a frame- work to implement OFDM on optical intensity channels. The drawbacks of conventional methods are mitigated in auto-correlated optical OFDM. Contrary to ACOOFDM and DC-biased OFDM, the proposed technique uses all the available bandwidth for data modulation and does not require reserved subcarriers. Simulation results verify that auto-correlated optical OFDM has gain in Bit Error Rate as compared to conventional optical OFDM schemes.

Download
33 Utilization of Waste Autoclaved Aerated Concrete
M.N.Bajad, Dipti.A.Kate

Abstract—The rapid progress in construction industry is also influencing to the equivalent construction materials. Autoclaved aerated concrete (AAC) is one of the construction waste materials. Thus to elucidate the dumping problem of AAC the waste AAC can be reused in an effective way to achieve sustainability. The Autoclaved aerated concrete particles (AACP) are used as bio filter carriers in biological aerated filters for waste water treatment. The natural materials used in green roofs are substituted by granular AAC. This review targets at studying the features of AAC and its reuse in advance waste water treatment and in green roofs.

Download
34 Mining Suspicious Messages in Online Forums
Priyanka, Poorani, Bhavani, Kamalameena, Hariharan

Abstract—Now-a-days there is an increasing dependency on web applications, ranging from individuals to large organizations. The security motivation of web application especially online social network is a great concern. Therefore in this paper a system is proposed which is an automated system, called Filtered Wall (FW), able to filter unwanted messages from OSN user walls. We exploit Machine Learning (ML) text categorization techniques to automatically assign with each short text message a set of categories based on its content. The major efforts in building a robust short text classifier (STC) are concentrated in the extraction and selection of a set of characterizing and discriminate features. The solutions investigated in this paper are an extension of those adopted in a previous work by us from whom we inherit the learning model and the elicitation procedure for generating reclassified data. The original set of features, derived from endogenous properties of short texts, is enlarged here including exogenous knowledge related to the context from which the messages originate. In addition, the system provides the support for user-defined Blacklists (BLs), that is, lists of users that are temporarily prevented to post any kind of messages on a user wall.

Download
35 Image Segmentation Using K-means Algorithm
Vivek Barwat, Rutesh Lonkar

Abstract—Clustering performance of the K-means greatly relies upon the correctness of the initial centroids. Usually the initial centroids for the K-means clustering are determined randomly so that the determined centroids may reach the nearest local minima, not the global optimum. This paper proposes a new approach to optimizing the designation of initial centroids for Kmeans clustering. This approach is inspired by the thought process of determining a set of pillars’ locations in order to make a stable house or building. We consider the pillars’ placement which should be located as far as possible from each other to withstand against the pressure distribution of a roof, as identical to the number of centroids amongst the data distribution. Therefore, our proposed approach in this paper designates positions of initial centroids by using the farthest accumulated distance between them. First, the accumulated distance metric between all data points and their grand mean is created. The first initial centroid which has maximum accumulated distance metric is selected from the data points. The next initial centroids are designated by modifying the accumulated distance metric between each data point and all previous initial centroids, and then, a data point which has the maximum distance is selected as a new initial centroid. This iterative process is needed so that all the initial centroids are designated. This approach also has a mechanism to avoid outlier data being chosen as the initial centroids. The experimental results show effectiveness of the proposed algorithm for improving the clustering results of Kmeans clustering.

Download
36 Statistical Analysis of Heat Transfer and Fluid Flow Features of Solar Air Heater
Rajwansh Pandit, Pankaj k. Pal, Ravi Vishwakarma

Abstract—The application of artificial roughness in the form of fine wires or ribs of different geometry on the heat transfer surface has been recommended to increase the heat transfer coefficient by several investigators. The use of artificial roughness on the underside of the absorber plate disturbs the viscous sub-layer of the flowing medium. It is well known that in a turbulent flow a sub-layer exists in the flow in addition to the turbulent core. The purpose of the artificial roughness is to make the flow turbulent adjacent to the wall in the sub-layer region. The present work was undertaken with the objectives of extensive investigation on the 90° shaped ribs as artificial roughness on the surface of duct. Experimental setup for heat transfer and pressure loss has been design and developed. Data were collected for local heat transfer and pressure loss of these artificially roughened ducts. Results of artificially roughened duct have been compared with those of a smooth duct under similar flow condition to determine heat transfer and friction factor..

Download
37 Design and VLSI Implementation of High Performance Median Filter
Antima Bajpai, Shweta Agrawal, Prashant Badal

Abstract—The exponential use of the portable devices exhibiting multimedia applications is the result of advancement in the VLSI technology. Image and video processing applications are the primarily used in these devices which demands higher performance processing units. As the noise may introduced anywhere within image, a filter is the essential part of the image processing units. As the Salt and pepper noise is occurred due to incorrect computations with there is special kind of filter used to remove this noise is known as median filter. In this paper different algorithms for the median filters are explored and analyzed. A novel median filter algorithm is proposed in this paper that reduces the complexity of the filter significantly. The proposed filters is implemented and simulated with benchmark inputs. The simulation results show that proposed median filter reduces area and delay by 5.9% and 48.8% respectively over the conventional median filter architecture.

Download
38 Study On the Classification Algorithms for Prediction of Diseases
P.Radha, R.Divya

Abstract—Data mining is the extraction of information from a large database. Huge amount of data related to healthcare are available but information is not extracted from the huge data. There is a less amount of effective analysis tool to discover the hidden information and trends in data. In health care department data mining is mainly used for disease prediction. There are many data mining techniques present for predicting the disease like association rules, classification, clustering. In this paper, the study is done on the prediction of diseases etc based on the classification algorithms and the best classification algorithm is found. In this paper comparison of accuracy of the prediction of diseases is also done.

Download
39 Simulation of Signal and Transfer Function on XCOS simulator
Garima Jain, Nasreen Noorani, Kavita Hedau

Abstract—In this paper we are familiar with the XCOS Palette browser and Identify the block for designing of signals and transfer function. now a day’s open source software are popular for simulation and synthesis, XCOS is a free graphical editor and simulator based toolbox on Scilab which provide helps to design physical systems such as electrical, mechanical, automotive, hydraulics, using a graphical user interface based on a block diagram approach.

Download
40 Stereo pair Image Compression process using the effective Extended Block Truncation Coding Algorithm
Dr.T.Ramaprabha

Abstract—Stereopsis is the ability to perceive three dimensions by integrating two slightly different views of the same scene. A stereo image is produced by taking photographs of the identical scene from two slightly different positions. The distance between these positions is called the stereo base. Many cameras have the ability to stereoscopically image by sequentially taking two images. Stereo images provide an improved sense of presence, and have been found to be operationally useful in responsibilities requiring remote manipulation or judgment of spatial relationships. A stereo system with a single leftright pair needs twice the raw data as a monoscopic imaging system. As a result there has been increasing attention given to image compression methods specialized to stereo pairs. In the general concept of stereo image compression method, first compress the reference (left image) image only, after that the block matching algorithm is applied between left and right image to identify the disparity values and they are encoded separately rather than compressing the whole right image. In this paper I wish to illustrate the effectiveness of stereo pair image compression Algorithm using Extended Block Truncation Coding with higher image quality after decompression.

Download
41 A Fast and Scalable Tool towards Collaborative Data Mining in Mobile Computing Environments
G.Jagatheeshkumar, N.Anbazhagan, S.Selva brunda

Abstract—Systems that construct classifiers are one of the commonly used tools in data mining. new term describing collaborative mining of streaming data in mobile and distributed computing environments. Proposed using mobile software agents. The proposes a new architecture that prototyped for realizing the significant applications in this area. With the continuous advances in handheld mobile devices including smart phones, PDAs (Personal Digital Assistants) and smart sensors, there is an unpreceded opportunity to perform significantly useful data analysis.

Download
42 Design and Implementation of Low Complexity Sharpening Filter for Image Scaling Applications
Nitin Singh, Shweta Agrawal

Abstract—There is significant use of portable devices in recent years that employ multimedia applications. The image processing has become a prominent part in several applications from medical to entertainment. In order to improve the efficiency of these application hardware implementation of core computational unit is required. As the cost of the device increases with increasing complexity, low complexity architecture is the prime requirement. In this paper, new sharpening filter architecture is proposed that can be effectively utilized in the different portable devices. The proposed design is implemented in the MATLAB and Verilog to compute the quality and design metrics respectively and compared over the existing architectures. The simulation results show the proposed sharpening filter reduces area and delay by 0.787X and 47.7% respectively over the conventional sharpening filter.

Download
43 VLSI Implementation of A Novel Low Complexity Image Scalar Architecture
Nitin Singh, Shweta Agrawal

Abstract—The modern portable devices such as smart phones have been employing huge number of image/video applications in recent years. This results in exponential rise in the design complexity of these devices. Moreover, the advancement in the VLSI technology with nano-scale transistors dimensions further increases the complexity of these devices. The highly complex devices consume significant amount of energy while processing the signal. Further, the cost of the device increases with increasing complexity. Therefore low complexity architecture is the prime requirement. In several image processing applications image scaling is the commonly used operation to fit the image into the device display having different sizes. In several applications such as medical imaging, image scalar is commonly employed in the medical devices to see the image capture with different resolution device. This paper proposed low complexity image scalar and then design is implemented and evaluated. The simulation results show that the proposed image scalar reduces area by 12% and delay by 19.95% over the existing well-known architecture.

Download
44 Analysis and Investigation of Solar Vapour Absorption Refrigeration System
M. Shanmugam, K.Satheesh kumar, S.Pradeep, P.Ravikumar, S.Suresh

Abstract—The conventional refrigeration technologies as they affect the ozone layer and increase the global warming. The ordinary refrigerator contains the CFCs or HFCs. This is the environmentally destructive and causes the greenhouse effect. It leads to increases the demand of energy consumption. The commercial refrigerator operates in a compression refrigeration cycle, in which the compressor is used to compressing the refrigerant liquid for cooling purpose. In conventional type the compressor is run by using electricity it increases the demand of power consumption. To over the above demand, the compression cycle is replaced by absorption cycle. In this type the generator is receive the heat from solar energy (Renewable energy). This paper deals with the analyze of ammonia solar vapour absorption refrigeration for a single flat plate collector. This technique is combined with vapour absorption refrigeration system to increase the refrigeration effect.

Download
45 Analysis of Web Log Files Using Map Reduce Algorithm
J. Ilanchezhian, S. Dhilipkumar, A. Saravanan, P.Shanmugavel

Abstract—Big Data is a collection of a huge and complex data that it becomes extremely tideous to capture, store, process, retrieve and analyze it with the help of on Relational database management tools or traditional data processing techniques. To store and process such a big data hadoop technology is used. Hadoop is an open source framework that allows to store and process big data in distributed environment across clusters of computers using simple programming models. It is intended to scale up from single server to thousands of machines, each offering local computations and storage. In this paper, we propose incremental MapReduce, the most used framework for mining bigdata. Incremental MapReduce 1) performs key-value pair level incremental processing, 2) supports iterative computation, which is widely used in data mining applications. That means incremental MapReduce processes big data in a less time and stores it in a more optimized form.

Download
46 A Review paper Study on Sinkhole Attacks in Wireless Ad hoc Networks
Mandeep Kaur, Khushboo Bansal, Neha Soni

Abstract—The Mobile Ad hoc Network is a modern Wireless Base communication system is most important and popularly used communication. The Major attack faced by this network is sinkhole attack which can heavily attract the resources available in the network. It has to be prevented to make the energy of the network is available for all resources. Different kinds of attack that can be introduced in wireless network. So security is an essential requirement in mobile ad hoc network (MANETs). There is different various types of attacks that can be introduced in wireless network. This paper studies sinkhole attack and different routing protocol.

Download
47 A Review paper on study of collaborative attack on Mobile ADHOC network in MANET
Gurpreet Kaur, Deepinder Kaur Dhaliwal, Neha Soni

Abstract—Wireless networks are become more popular now days because of the increase in the demand of wireless network by the users. In a manet there a no of attack wireless network. In such a way collaborative attack is a security threat or an active type of attack in which the malicious nodes can read the data packets falsely claiming the fresh route these can nodes reads the various routing protocols for having the path from source to destination.in this review paper we can review the various attacks like wormhole attack on manet.

Download
48 Analysis of heat transfer and Fluid flow of rectangular tube using CFD
Pankaj k. Pal, Rajwansh Pandit, Ravi Vishwakarma

Abstract—The present investigation is concerned with evaluating heat transfer and friction characteristics of an artificial roughed solar duct using combination of rough surface on various relative roughness height and range of parameter studied are Reynolds number from 3000-14000. A computational analysis of heat transfer and flow characteristics with artificial roughness in the form of different types of ribs, heated wall of rectangular duct for turbulent flow has been carried out with k-e turbulence model is selected by comparing the predictions of different turbulence models with experimental results available in literature. This study evaluates, heat transfer and fluid flow behavior in a rectangular duct with square roughened ribs mounted on one of the principal wall (solar plate) by computational fluid dynamics software ANSYS (Fluent 6.3.26 Solver). In this study, The Reynolds-Averaged Navier–Stokes analysis is used as a numerical technique and the k-e model with near-wall treatment as a turbulent model. The results predicts a significant enhancement of heat transfer in comparison to that of for a smooth surface with different e/Dh. The performance evaluation in Terms of thermo hydraulic performance has been carried out for various value of Reynolds number for some selected artificial roughness geometries, in the absorber plate of solar air heater duct. Three roughness geometries as per the order of relative roughness height (e/Dh) 0.0471, 0.078, 0.083 are used to create turbulence, and a smooth plate to compare the result of roughened plates. The range of Reynolds number is 3000 to 14000, Relative Roughness height (e/Dh) .0471mm, .078mm, .083mm Rib and Heat flux 800 W /m2. The Result has been compared with smooth duct under similar flow and boundary condition. The co-relation for heat transfer and friction factor developed by respective investigators has used to calculate the thermo hydraulic performance. It is found that artificial roughness on absorber surface effectively increases the thermo hydraulic performance and friction factor and efficiency in comparison to smooth surface.

Download
52 Multiparty Access Control for Image Sharing in Facebook
T.Sivaranjini, S.Kavitha

Abstract—Online Social Networking (OSN) has experienced a tremendous growth in recent years. OSN has millions of users spread throughout the world. OSN mainly relies on business networking. The networking is done for different purpose depending on the user’s interest. OSN allows people communication between family and friends throughout the network. Though this OSN establishes many networking facilities, it also raises security and privacy issues. The proof of concept Facebook is taken and the users of Facebook are restricted to share their image in their page. When the user shares the image, the notification is send to their friend list. Thus when some private data is needed to be shared the user is unable to share. There may be some users who try to hurt others with the comments. This must be prevented in Social Networks since many people can view this comments. To overcome these issues the MultiParty Access Control (MPAC) is used. MPAC creates a block when sharing image and posting comments. When the user shares image, the authorized users are only allowed to view it. A database is maintained in the system which has the list of hurting words, when user comments, the comments are checked with the database and the comment never be posted when the word is present in the database. Thus MPAC helps in secure sharing of images and secure posting of comments.

Download
53 Six Sense Technologies: Multi-technology & Multiapplication Era
Simmi Bagga, Satinder Kaur

Abstract—Nowadays, Sixth Sense Technology is a new era. It has mini-projector which is integrated with a camera and a cellphone—which acts as the computer connected to the internet. Sixth Sense can also scan hand gestures. It is the latest technology based on sensors and computers. The Camera can scans objects around a person instantly while the micro-projector can display the information on any surface, including the object itself or even hand also. It is multi application field. One can make a call by extending hand on front of the projector and numbers will be appeared for clicking. One can know the time by drawing a circle on wrist and a watch will be shown. One can take a snap by just make a square with fingers, highlighting what one wants to frame, and the system will make the photo. The small device which has a huge number of applications is portable and easy to carry as one can wear it in neck. This paper discusses the different technologies used to implement Six Sense technology. It also discusses its major application fields.

Download
54 A Novel fault tolerant based cluster routing using DST approach
S. Nivetha, R. Raju

Abstract—A Roadside Unit (RSU) Cloud, a Vehicular Cloud, as the operational backbone of the Vehicle Grid in the Internet of Vehicles (IoV). The architecture of the proposed RSU Cloud consists of traditional and specialized RSUs employing Software Defined Networking (SDN) to dynamically instantiate, replicate and, or migrate services. We then present a detailed reconfiguration overhead analysis to reduce reconfigurations, which are costly for service providers. VANET has been a core networking technology to provide safety and comfort to drivers in vehicular environments. Emerging applications and services, however, require major changes to its underlying computing and networking models, which demand new network planning for VANET with avoiding intruder of data and provide malicious attack from third party.

Download
55 Effective Inter Cluster Routing Model in VANET
V. Seethalakshmi, N. Pazhani Raja

Abstract—VANET is an emerging technology to achieve inter-vehicle communications, for improving the road safety, alerts messages, accessing and sharing the information and entertainments. Vehicular Ad hoc Network (VANET), a subclass of mobile ad hoc networks (MANETs), is a promising approach for the intelligent transportation system (ITS). The design of routing protocols in VANETs is important and necessary issue for support the smart ITS. Although rich literature in ad hoc networks exists, the scale, availability of realistic traffic data and vehicle equipments motivate researchers to study the unique characteristics of VANET. The aim to survey the paper and compare literature on the characterization and existing routing protocol of VANET.

Download
56 A Survey on Adaptive Algorithms for Noise Cancellation in Speech Signals
G.Amjad Khan, Dr.K.E.Sreenivasa Murthy

Abstract—The contamination of a signal of interest by other undesired signals (noise) is a problem encountered in many applications. The conventional linear digital filters with fixed coefficients exhibit a satisfactory performance in extracting the desired signal when the signal and noise occupy fixed and separate frequency bands. However, in most applications, the desired signal has changing characteristics which requires an update in the filter coefficients for a good performance in the signal extraction. Since the conventional digital filters with fixed coefficients do not have the ability to update their coefficients, adaptive digital filters are used to cancel the noise. The parameters of adaptive filters are mean square error (MSE) ,signal to noise ratio(SNR) ,convergence and computation time ,Misadjustment are the various techniques which gives the performance of the adaptive filters.

Download
57 Visually Lossless Compression in Digital Image Forensics
Sowmiya N,Sadish Kumar S.T

Abstract—The digital image processing is to be used in Visually lossless compression in of digital image forensics. Fingerprints are one of those irregular twists of nature. The fingerprints are used for authentication and identification processes in forensic tasks such as detection of digital forgeries. Forensic tasks can to be performed in device identification problem, device linking problem, fingerprint matching problem. For random projections the compression technique is to be required with no information loss and to be measured by PRNU values. Fingerprint matching is still a challenging problem for reliable person authentication because of the complex distortions involved in two impressions of the same finger.

Download
58 A Review on Use of Metakaolin and OP Concrete
Shashikant Dewangan

Abstract—Concrete is the most commonly used material for construction. The worldwide production of cement has greatly increased since 1990.Production of cement results in a lot of environmental pollution as it involves the emission of CO2 gas. Supplementary cementations materials (SCM) are finely ground solid materials that are used to replace a portion of the cement in a concrete mixture. These supplementary materials may be naturally occurring, manufactured or man- made waste. Various types of pozzolanic materials that improve cement properties have been used in cement industry for a long time. Metakaolin is a dehydroxylated aluminium silicate. It is an amorphous non crystallized material, constituted of lamellar particles. From the recent research works using Metakaolin, it is evident that it is a very effective pozzolanic material and it effectively enhances the strength parameters of concrete. This paper reviews the use of metakaolin as supplementary cementitious material in concrete. A detailed literature survey is carried out and presented here.

Download
59 Review on Use of Waste Material in Concrete
Yogesh Soni

Abstract— Concrete is a mixing of different raw material like binding material (cement+ fly ash), fine aggregate, coarse aggregate and water. Concrete is normally used in all the types of structure. Use of concrete is huge and all the structure are made with this material so availability of this raw material is reduced day by day so cost and requirement of this material is increased. Due to this limitation of availability of natural material we are trying to partially replaced cement by different waste material for this we conducted survey of different paper which gives the idea about effect of different waste material on properties of concrete. The primary objective of this study is to select the waste material which gives proper properties with concrete. This study includes review of different paper published in national and international journals or in conferences.

Download
60 Link Stability Using Rbmrp On Vehicular Ad Hoc Network
R. Ravina, N. DurgaDevi, K. Dhivya, T. Kavitha, K. Ganeshan

Abstract—VANET is an emerging technology to achieve inter-vehicle communications, for improving the road safety, alerts messages, accessing and sharing the information and entertainments. Vehicular Ad hoc Network (VANET), a subclass of mobile ad hoc networks (MANETs), is a promising approach for the intelligent transportation system (ITS). The design of routing protocols in VANETs is important and necessary issue for support the smart ITS. Although rich literature in ad hoc networks exists, the scale, availability of realistic traffic data and vehicle equipments motivate researchers to study the unique characteristics of VANET. The aim to survey the paper and compare literature on the characterization and existing routing protocol of VANET.

Download
61 Link layer LSP in Internet Of Vehicle Network for RSU in IOT
K. Preethi, A. Sharmila, I. Sujitha, K. Ganeshan

Abstract—A Roadside Unit (RSU) Cloud, a Vehicular Cloud, as the operational backbone of the Vehicle Grid in the Internet of Vehicles (IoV). The architecture of the proposed RSU Cloud consists of traditional and specialized RSUs employing Software Defined Networking (SDN) to dynamically instantiate, replicate and, or migrate services. We then present a detailed reconfiguration overhead analysis to reduce reconfigurations, which are costly for service providers. VANET has been a core networking technology to provide safety and comfort to drivers in vehicular environments. Emerging applications and services, however, require major changes to its underlying computing and networking models, which demand new network planning for VANET with encryption of data and provide malicious attack from third party.

Download
62 Comparative Analysis of Wavelet Domain Techniques for Image Steganography
Paramvir Rathi1 Neeraj, Shalu Garg

Abstract—It is now becoming increasingly well known that signal and image processing are getting great improvements in performance by using various wavelet based methods. In order to achieve better understanding of wavelet based methods, Haar , daubechies, symlet, and Biorthogonal wavelets are discussed. Image is decomposed into four sub bands using DWT. Secret image is hidden by alpha blending technique in the corresponding sub bands of the original image. During embedding, secret image is dispersed within the original image depending upon the alpha value. Extraction of the secret image varies according to the alpha value.The proposed transforms are compared using different levels in DWT based image steganography by using statistical parameters such as peak-signal-to-noise-ratio (PSNR) and mean square error (MSE). The experimental results demonstrate that the watermarks generated with the proposed algorithm are invisible and the quality of watermarked image and the recovered image are improved.

Download
63 Implementation of Motion Controlled Virtual Robot for Military Application
Chethan N, Abhilasha S T,Deepthi S,Gangadhar B,Vibha Raj Nag

Abstract—This project aims to build an automated robot which can effectively function in the military unit for the purpose of commanding and location accessing. The idea is to design a robot whose operations are controlled remotely with the help of accelerometer and flex sensors. It can be used to give the voice command output from the commander to the military unit which may be under the enemy attack or to spy the enemy area secretly.

Download
64 Working Capital Management
Dr.C.Boopathi

Abstract—Working capital represents the amount of current assets which would remain if all current liabilities were paid. Both the concepts of working capital have their own points of importance. "If the objectives are to measure the size and extent to which current assets are being used, 'Gross concept' is useful; whereas in evaluating the liquidity position of an undertaking 'Net concept' becomes pertinent and preferable.It is necessary to understand the meaning of current assets and current liabilities for learning the meaning of working capital, which is explained below.

Download
65 Factors Influence Performance of PEM Fuel Cell – A Review
J.Dinesh a, M.Sugumar

Abstract—The review paper includes introduction of the PEM fuel cell and Description of water management problem in PEM fuel cell. The consideration are based on exclusion of water management problem by proper design of fuel cell. The paper shows a variety of types of efficiency, divergence characteristics and power characteristics. It also describes the various parameters (pressure, temperature and humidity) which affect the performance of fuel cell, its optimum range in which fuel cell function safely and efficiently. This paper shows the recent work done for improvement of the performance of PEM fuel cell. Fuel cell performance is improved by proper water management on the membrane. Basic parameter which performs the fuel cell performance is Relative humidity, Flow field design, Temperature. With the help of this studies, we observe that the fuel cell performance develop by Increasing the relative humidity, temperature, pressure and using the serpentine flow field. The aim of this study is to explore the factors influence performance of PEM fuel cell.

Download
66 Design of highly secure data Encryption technique with AES cum IDEA encryption
Apoorva Nayak, Sapna Choudhary, Rohan Rajoriya

Abstract—It is highly required to develop technique that is hard to even recognize with transform or other recursive mathematical solutions. Paper work is to design AES cum IDEA encryption is an optimized solution to secure data communication as compare with individual IDEA (International Data Encryption algorithm) & AES encryption. PAIE technique which will be much optimized solution to same when data conversion time & encryption time considers as design parameters. AES, DES & IDEA are three major techniques available to data encryption. Our aims is to develop all existing designs & observe their performance & to compare them also to develop a high speed parallel combination to AES & IDEA like merging two techniques so to have best parameters in terms to overall throughput, total avalanche data conversion rate so that design may be used as a cryptographic coprocessor in high speed network applications.

Download
67 Design and Simulation of Microcode based Built-In Self Repair for Embedded Memories to Enhance Fault Coverage
Mohammed Arif, Ankita Gupta

Abstract—In recent time, it has been surveyed that the System-on- Chips (SoCs) are moving from logic dominant chips to memory dominant chips in order to deal with todays and future application requirements. These changing of technologies give rise to new defects and new fault models, for which there is a need for new algorithms which are defined to detect and eliminate these new defects. These new fault models are used to develop new high coverage test and diagnostic algorithms. The higher the fault detection and localization coverage, the higher the repair efficiency, hence higher will be the obtained yield. Memory repair becomes important, since only detecting the faults is not only sufficient for SoCs. March BLC algorithm is a newly developed test algorithm which deals with detecting some recently developed static and dynamic fault models. In order to use this algorithm new microcode BIST architecture is presented here which is capable of employing these new algorithms. A word-oriented BISR array is used to detect the faulty memory locations and repair those faulty memory locations by routing them to the redundant array.

Download
68 Analysis on the effect of change in inset feed length of a circular patch antenna on return loss and current distribution
Deepa Dubey, Deepak Dekate

Abstract—This paper presents a circular microstrip antenna resonant at S-Band. Operating frequency (2.4 GHz) fed using transmission line model. The position of Microstrip line feed is varied and their effect on the current distribution and return loss has been observed. The antenna is of the radius of 17 mm. The substrate is of rectangular shape with dimensions 60 mm by 50 mm. Maximum gain of the antenna reaches above 5 dB. It is observed that the position of feed has a significant effect on return loss, gain and forward distribution. Height of the substrate is 1.6 mm and dielectric constant of the substrate material is 4.4 (FR4_Epoxy). The length of the inset feed is varied as 12 mm, 13 mm and 14 mm.

Download
69 Design of a high bandwidth Ku-band patch antenna with double-L shaped parasitic components and loaded with superstrate
Jagdeesh Ahirwar, Deepak Dekate

Abstract—This paper presents a microstrip antenna resonant at Ku-Band. Operating frequency (11.81 GHz – 18.47 GHz) covers the complete Ku-band. The antenna maximum dimensions are 30 mm by 30 mm. Patch footprints are 6.4 mm x 7.1 mm. Antenna successfully manages to attain quite good gain and very high bandwidth of about 45%. The antenna is designed and simulated using HFSS 11.1.1. Ku band is primarily used for satellite communications, most notably for fixed and broadcast services, and for specific applications such as relay satellites for both space shuttle and space station communications.

Download
70 OSTBC Encoder design with less BER on FPGA
Pankaj Shingh Kshatriya, Vivek dubey

Abstract—An orthogonal space-time block code (OSTBC) along with a minimum-BER and high SNR is Proposed and analyzed. the aim is to reduce the BER with new fully orthogonal fading matrix . The total number of branches that is being used for processing at the receiver is compared and computed. This paper works with Field Programmable Gate Array (FPGA) designing of an entire digital wireless communication for baseband system. The proposed BER tester also can be said BERT integrates the modules of a conventional communication system along with an AWGN channel into a FPGA. The BER is calculated for a 4x4 MIMO system.

Download
71 Design of High Secure and Maximum Data Hiding Technique Using Wavelet Transform
Priyanka Agrawal, Mahendra Rai

Abstract—Proposed work is a unique DWT based method for steganography. The Covering image is divided into four sub bands using transform technique DWT. Data is been hidden inside HH, HL and LH sub-bands with a new fix mode of data hiding process. Proposed work reduces the detectable distortion in a joint photographic experts group (JPEG) file during data hiding process, by introducing new region selection rule. The new region selection rule considers three factors, i.e., the horizontal difference (HD), vertical difference (VD) and region size (RS). The JPEG image will be split into number of blocks and each pixel in it will be examined to calculate the variations. Depends upon the variation, the amount of secret information will be hide in an image. This proposed method of information hiding will help to solve the security issues in computer networks.

Download
72 A Survey on Web Clustering Engine
Bhavana R.potrajwar

Abstract—World Wide Web is a very large distributed digital information space. The ability to search and retrieve information from the Web efficiently and effectively is an enabling technology for realizing its full potential. Current search tools retrieve too many documents, of which only a small fraction are relevant to the user query. Web clustering engine greatly simplifies the effort of the user from browsing e large set of search results by reorganizing them into smaller clusters. It organizes search results by topic, thus offering a complementary view to the flatranked list returned by conventional search engines. This paper highlight the main characteristics of a number of existing Web clustering engines and also discuss how to evaluate their retrieval performance.

Download
73 Deposition of AA5083 on Mild steel by Friction Surfacing: Hardness and Wear Characterization
N.Navaneethakrishnan, V.N.Loganathan

Abstract—Friction surfacing (FS) is a solid state coating technique with application of rehabilitation of worn out parts and act as corrosion barrier. It is suitable to process aluminium alloys as it does not require the fusion of neither coating nor substrate, relying on solid state diffusion bonding mechanism. The present study addresses the use of FS to deposit AA5083 on mild steel, with emphasis on hardness and wear characterization. Wear rate can be examined by Pin-On-Disk method. Hardness of the coating can be determined by vicker’s hardness survey. An improved coating hardness and wear performance was observed while compared to previous results.

Download
74 A Quasi Z-Source Inverter with Battery for PV Power Generation System
F.X.Edwindeepak, D.Sivapriya

Abstract—The Demand of renewable energy sources for power production is rising from the period of time. Solar power plants are play vital role in supplying increased power challenge. PV array with battery based quasi z source inverter makes more reliable under PV fluctuations. The energy storage device is integrated to ZSI topology with no requirement for an extra charging circuit. This modified system obtains the operating characteristics from the conventional ZSI, with ability of operating under low renewable (PV) power conditions. In order to work below this circumstance, an energy storage device capable of managing the load demand for a period of time is required. A way to add the energy storage device is to install a charger circuit that integrates it to the DC voltage rail of inverter. However, this proposed system presents another way to integrate the energy storage device without an extra charger circuit.

Download
75 Predicting Distance and Time by using Mobile Phone Based Participatory Sensing
K.Balachander

Abstract—A vehicular ad hoc network (VANET) use cars as mobile nodes in Vehicular to create a network. A VANET contain a number of vehicle communicate to the network in a coverage area. The vehicle has a On Board Unit (OBU) that transmit the information about vehicle or data sharing in any process network communication process in done by this through the wireless network. The proposed RSS is better than past evaluation. The proposed of interference detection algorithm of OBU to perform the high RSS in VANET. The OBU has a high received power and increase the hop communication range. The hop represent the communication between the source to destination. The OBU deploying the better relaying in a network to communicate and predict the vehicle status in coverage area.

Download
76 Towards Differential Query Services in Cost-Efficient Clouds
D.Nagarajan, J.Ambika

Abstract—Cloud computing as an emerging technology is expected to reshape information technology processes in the near future. The basic idea of EIRQ is to construct a privacy preserving mask matrix that allows the cloud to filter out a certain percentage of matched files before returning to the ADL. Cloud computing provide cost efficient solution for efficient searching and also provide query services that allows each user retrieve the matched files and using mechanism to retrieval of efficient query services over encrypted data.

Download
77 Enhancing Security in Data Retrieval by Using Cipher- Policy Attribute Based Encryption
Prasath

Abstract—In several distributed systems a user should only be able to access data if a user possesses a certain set of credentials or attributes. In this paper we use the DTN (Distributed Tolerant Network) that is used to store and forward of data using for the users to a network in data security. This paper presenting a system for realizing complex access control on encrypted data that we use Cipher text-Policy Attribute-Based Encryption in Distributed Tolerant Network (DTN). In this, CP-ABE techniques used for encrypted data can be kept confidential even if the storage server is untrusted; moreover, the propose technique is more secure against collusion attacks.

Download
78 Hiding in the Mobile Crowd: Location Privacy through Collaboration
V.Selvakumar

Abstract—Smart phones are very effective tools for increasing the productivity of business users. The smart phones allow end users to perform several tasks and led to offering provide to search a (LBS) Location Based Services. Existing process using Bayesian classification mechanism of location base service security is low privacy and the Adversary can easily access the private information and location based services of the user. The proposed solution of the problem using Epidemic model in a centralized manner of introduce third party system and user centric approach to provide privacy of a system between the users and the LBS.

Download
79 To Implement the Frameworks to Reduce the Risks of Fragmentness & Integrity Issues In M-Commerce through Virtual Objects (VO)
S.M. Roychoudri, Dr. M. Aramudhan, Dr.K.P.N.V Satyasree, M.Sambasiva Rao

Abstract—The evolution of mobile communication technology has fostered the development of new mobile multimedia applications in various domains. One of the most important applications is mobile commerce (m-commerce), which has an increasing impact in the life of the citizens, and could represent one of the many applications that contribute to the market success of the Internet of Things (IoT). Security and privacy concerns are quite relevant in m-commerce and IoT to protect financial and personal data of the citizens. One of the main issues in mobile commerce is how to ensure the security of the information needed to complete the mcommerce transaction in a distributed environment with different security frameworks. We have to consider that the protection of the m-commerce transactions must also be done to protect the privacy of the customer. In addition, the information of the mcommerce transaction can be fragmented in different files in a distributed m-commerce application, which can undermine the integrity (another security goal) of the transaction. In this article, we describe the design ofa m-commerce framework, where these issues are addressed through a policy based approach, where the access to the m-commerce transaction is regulated by policies. The fragmentation and integrity risks are addressed through the concept of Virtual Objects (VO), which have been defined in the FP7 iCore project. Policies are associated to VOs and distributed across the m-commerce applications. This paper describes the main concepts of VO and the policy based framework and shows how these concepts are applied to m-commerce in various scenarios to evaluate their feasibility. We apply and demonstrate the benefits of the proposed design to specific multimedia use cases of mcommerce where different domains are involved. Such as mcommerce system can be seen a basic underlying payment system for a wide variety of multimedia applications.

Download
80 Logo Matching and Detection for Document Image Recognition
Dr.B.B.M.KrishnaKanth

Abstract—Graphics detection and recognition are fundamental research problems in document image analysis and retrieval. logo detection and recognition continues to be of great interest to the document retrieval community as it enables effective identification of the source of a document. We contribute, through this paper, to the design of a novel variation framework able to match and recognize multiple instances of multiple reference logos in image archives. Reference logos and test images are seen as constellations of local features (interest points, regions, etc.) and matched by minimizing an energy function mixing: 1) a fidelity term that measures the quality of feature matching, 2) a neighborhood criterion that captures feature co-occurrence geometry, and 3) a regularization term that controls the smoothness of the matching solution. We also introduce a detection/recognition procedure and study its theoretical consistency.

Download
81 Wi-Fi: Current Technology, Challenges and Future Directions
Parveen Kumar

Abstract—Wireless Networking has changed the way people communicate and share information by eliminating the boundaries of distance and location. Although Wireless Networking is regarded as Networking Future but still there are some unsolved issues which is preventing the wide adaption of Wireless Technologies. In this paper we have tried to discusses latest wireless technologies: Wi-Fi. The objective in this paper is to briefly describe the technology as well as the benefits and risks involved in their implementation.

Download
82 Performance Evaluation of Clustered Based Routing Protocol for Wireless Sensor Network
S Ravi Kumar, D Sreenivasa Rao

Abstract—In this paper performance of the clustered based routing protocols for WSN in saving energy for heterogeneous wireless sensor networks. In the sensor network considered each node transmits sensing data to the base station through a cluster-head. The clusterheads, which are elected periodically by certain clustering algorithms, aggregate the data of their cluster members and send it to the base station, from where the end-users can access the data. The cluster based protocol has been carried out using NS 2.35.

Download
83 Effect of Metal Hydroxide Nanoparticles against different isolated Bacterial Species
Akhilesh Kumar, Supriya Mishra, Madhulika Singh, Sujeet Kr. Singh

Abstract—A nanoparticle (or nano-powder or nano-crystal or nano-cluster or nano-material) is a microscopic particle with at least 1D less than 100nm.A variety of metal hydroxide nanoparticles have shown success for use as vehicles for drug delivery, targeted gene delivery, and tumour imaging. This is typically because nanoparticles have a greater surface area per weight than larger particles, which cause them to be more reactive to some other molecules. In the present project work preparation of metal hydroxide nanoparticles and toxicological study of it on isolated bacterial species was done. In this study, Zinc Hydroxide NPs, Iron Hydroxide NPs and Magnesium Hydroxide NPs were rapidly synthesized from Zinc Nitrate, Ferric Chloride and Magnesium Chloride respectively. And these prepared different metal hydroxide nanoparticles were tested for its antibacterial activity on isolated bacterial species Micrococcus Leteus and Staphylococcus Aureus, by using agar well diffusion method. The zone of inhibition was observed and recorded to determine its antibacterial activity. The inhibition of bacterial growth was tested for prepared nanoparticles on diluting it, by MIC test. The term “nanoparticles” means only solitaire nanoparticles. The maximum growth was inhibited by ferric hydroxide nanoparticles and minimum growth of bacteria inhibited by Zinc hydroxide and Magnesium Hydroxide.

Download
84 A Congestion Avoidance Scheme Based On Buffer Occupancy
Goree. Narsimhulu, Dr.D. Sreenivasa Rao

Abstract—Recently many prominent web sites face so called Distributed Denial of Service Attacks (DDoS). DDoS attacks are a virulent, relatively new type of attack on the availability of Internet services and resources. To avoid denigration most of the commercial sites do not expose that they were attacked that is the biggest challenges of the researchers. Network congestion caused by DDoS attack can be managed by AQM (Active queue Management).Random Early Detection (RED) is one of the most prominent congestion avoidance schemes in the Internet routers. To overcome the limitations of the basic RED algorithm, researchers proposed several variants of RED. For solving this problem, this paper proposes a new mechanism to improve RED algorithm, which is named BO-AURED (An Adaptive RED Algorithm Combined With Buffer Occupation and upper threshold). By matching router’s buffer occupation with wq , minth , maxth,Uth and Pmax parameter settings, to make BOAURED adapt to network environment variation automatically. Simulation is done in NS- 2.35 simulator environment. Simulation results show that our new BO-UARED algorithm gives better performance than RED and Adaptive RED. Comparisons are done in terms of total average throughput, total packet drops, and average packet drops. It will also increase adaptability of RED.

Download
85 A Review on Partial Discharge Behavior in High voltage Equipment
Jayshree Nagdev, Arti Bhandakkar

Abstract—Insulators are very important part of high voltage power equipment. There are so many types of insulators are used in high voltage power system to protect the power equipment like gases, vacuum, solid & liquid or a combination of these. It is very important to keep the insulators in a normal or healthy condition during its operation. Since insulators are always available in impure form and weak points, voids, cracks are present inside the insulators and this will create Partial discharge (PD), which in cause of time reduce the strength of insulation leading to a total or partial failure or breakdown of insulation. Therefore detection of partial discharge is very important task for electrical engineers to keep the high voltage power equipment in healthy or normal condition. Modeling of the partial discharge process allows a better understanding of the phenomena. In this paper a brief description of PD, PD mechanism, classification of PD, effect of partial discharge in insulating system.

Download
86 Android Application Development for beginners- A Review
Dipika Jain

Abstract—Android is basically an operating system for smartphones. But we find now integrated into PDAs, touch pads or televisions, even cars (trip computer) or net books. The OS was created by the start-up of the same name, which is owned by Google since 2005. Mobile users demand more functionalities and innovative mobile platform in order to customize their handset according to their personal desires. The mobile community supporters, whether they are application developers, service provider, or mobile device manufacturers, all are trying hard to fulfil the growing demands of customers. Mobile service providers want to offer value-added services to their customers in an organized and meaningful manner; Application developers want the freedom to develop more powerful, affordable, and innovative handset applications; similarly mobile device manufacturers want to produce reliable and affordable mobile devices

Download
87 Optical Fibers for mitigating EMI issues -An Overview
Uma S, MallanaGowda N

Abstract—As electronic devices become increasingly sensitive and proliferate in number, electromagnetic interference (EMI) to and from these devices is becoming increasingly important. EM1 can create several problems in electronic systems, such as ground loops, system safety, cross talk, common mode noise, and differential mode coupling. Over the years several techniques have been developed to solve these problems. However, they are cumbersome, impractical, inefficient, and expensive. The fiber optics technology offers an excellent solution to overcome EM1 problems altogether. This paper introduces the salient features of fiber optics [1], as an alternate solution to EM1 problems. This paper focuses on the fundamentals of fiber optics technology and how it can be used to eliminate EM1 from electronic systems.

Download
88 An Experimental Study on Blended Cement Concrete
Kalaiselvi Nivedha.J, Saranya.K.P

Abstract—Blended cement is now being considered superior as compared to conventional OPC category of cement. The partial replacements of cement with combination of admixture such as Fly Ash, Silica Fume are used for making blended cement concrete. This fly ash, silica Fume which is released directly into environment can cause environmental pollution. The various mix proportion used for test are 0% (conventional), 10%, 20% and 30% replacement of cement with combination of fly ash , silica fume .The mechanical properties of conventional cement concrete and blended cement concrete in R.C structures are studied. The mechanical properties of conventional cement concrete and blended cement concrete in R.C structures are compared. From the mechanical property results beam specimens are going to cast for both conventional concrete and blended cement concrete. Final results deflection and crack pattern of obtained by blended cement concrete beams are going to compared with conventional concrete beams. Deflection and crack pattern of blended cement concrete beams and conventional concrete beams are going to compare with theoretical formulas.

Download
89 Smart Air-Travel Framework
Anita Jaware, Vaibhav Dhage

Abstract—Smart Air-Travel Framework is a technological revolution that represents the future of airline travel and its development, which depends on dynamic technical innovation in a number of important fields, from RFID to bio-metrics.

Download
90 Design of High Performance Edge Detector and Its VLSI Implementation
Vinod Rajput, Abhishek Singh Tomar

Abstract—VLSI design of the image processing cores is the main focus of the designers due to increase in image and video processing applications within most of the devices. Moreover the advancement in the VLSI technology with nano-scale transistors dimensions results in further increase in complexity of these devices. In several image processing applications edge detection is the commonly used operation to extract edge information available in the image. This information is further used to evaluate other parameters very efficiently. In this paper a novel low complexity and high performance edge detector is proposed and implemented. The proposed design is evaluated and compared over the existing architectures. The simulation results show that the proposed edge detector reduces area by 53.17% and delay by 2.04% compared to the existing architecture.

Download
91 Energy Efficient Edge Detector Design for Ultra-low Power Image Processing
Vinod Rajput, Abhishek Singh Tomar

Abstract—The image/video applications in the portable devices such as smart phones have increased exponentially in recent years. This results in exponential rise in the design complexity of these devices. Moreover the advancement in the VLSI technology with nano-scale transistors dimensions results in further increase in complexity of these devices. The highly complex devices consume significant amount of energy while processing the signal. As the power/energy is the prime concern for the portable devices, highly energy efficient architectures/circuits are required to be developed. In several image processing applications edge detection is the commonly used operation to extract edge information available in the image. This information is further used to evaluate other parameters very efficiently. This paper a novel energy efficient edge detector is proposed, implemented and evaluated. The simulation results show that the proposed edge detector reduces area by 63.5% and delay by 31.8% over the existing well-known architecture.

Download
92 Hybrid detection of malignant breast cancer detection
Jaspreet Singh Cheema, Sumandeep kaur

Abstract—Breast cancer is the most common type of disease found in women. It is the most frequent form of cancer and one in 22 women in India is likely to suffer from breast cancer [1].Breast Cancer is the leading cause of death among women in many countries. Detecting a breast cancer at the earliest stage possible has the most important impact on prognosis. Mammography is the most cost effective method to detect early signs of breast cancer [2]. Microcalcifications are calcium deposit, which can be identified as tiny areas that are slightly brighter than surrounding tissues [3]. In the current work we are performing the modified k means cluster and micro calcification technique. MATLAB has been used for the simulation of this algorithm.

Download
93 Impact of Office Ergonomics on Business Performance – (In Special Reference to Noida Region)
Ankit Garg, Vaibhav Garg, Pankaj Dutta

Abstract—In the past few decades, there has been a strong trend for corporate organizations and businesses to reconfigure the spaces of their offices in new ways and models. In addition, the shift towards more exciting and flexible workplace environment and the need to meet the diverse and growing expectations and requirements of different employees has led to the rise of debates about how and where productive work is accomplished. In a 2003 survey by Management Today magazine, virtually all (97 per cent) of respondents said that they regarded their place of work as a symbol of whether or not they were valued by their employer. Office ergonomics have been recommended by many studies as one of the key guides to equipping employees at the workplace to help produce best performance. It is the quality of the employee’s workplace environment that most impacts on the level of employee’s motivation and subsequent performance. How well they engage with the organization, especially with their immediate environment, influences to a great extent their error rate, level of innovation and collaboration with other employees, absenteeism and, ultimately, how long they stay in the job Al-Anzi (2009). This study helps to assess the impact of office ergonomics on business performance in Noida region; to analyze the office design, finishes and furnishing at the offices in Noida region, to assess the impact of office ergonomics in the design, finishes and furnishing in terms of their suitability and comfort of the employees; to identify the impact of office ergonomics on employee health, safety and security. Here in this study we use convince sampling and the target sample was from Noida region. We collect questionnaire by using questionnaire method and the analysis is done by using SPSS, correlation analysis and data was represented by using percentages, frequencies, mean, and standard deviation. The study demonstrated that office ergonomics deficiencies at the offices in this region which includes outdated office design and décor, inadequate office illumination, un-ergonomic office furniture, unsuitable office design and décor have variedly impaired the performance of an average employee by between 30 to 70 percent. The study recommends the relocation of the office to a purpose-built office facility that integrates high standards of office ergonomics, and companies should undertake post-occupancy evaluation one year after occupation of the new office.

Download
94 Simulation Studies on Flow Enhancement in Mixed Flow Pump With Modified Impeller Design Using CFD Analysis
N.Ramasamy, K.Ganesan

Abstract—Stirred tank has been the research area for many decades due to its applicability in chemical, pharmaceuticals, polymers, food and paints industries for variety of operation. Most of the energy supplied by the impeller is dissipated in the impeller region which leads to no uniformities in the energy dissipation throughout the reactor. From the survey taken from industry, it is observed that most of the industries use disc impeller. The disc impeller having major drawback of lower mixing rate and high power consumption. To overcome this, V-shape impeller is designed with various blade angles. The turbulence of the respective angle with various speeds has been analyzed by using CFD software.

Download
95 Adaptive Fuzzy Logic in TCP/IP Networks using PID controller
P. Danushapnadeesh, J.R. Thresphine

Abstract—We introduce a novel and robust active queue management (AQM) scheme based on a fuzzy controller, called hybrid fuzzy-PID controller. In the TCP network, AQM is important to regulate the queue length by passing or dropping the packets at the intermediate routers. RED, PI, and PID algorithms have been used for AQM. But these algorithms show weaknesses in the detection and control of congestion under dynamically changing network situations. In this paper a novel Fuzzybased proportional-integral derivative (PID) controller, which acts as an active queue manager (AQM) for Internet routers, is proposed. These controllers are used to reduce packet loss and improve network utilization in TCP/IP networks. A new hybrid controller is proposed and compared with traditional RED based controller. Simulations are carried out to demonstrate the effectiveness of the proposed method and show that, the new hybrid fuzzy PID controller provides better performance than random early detection (RED) and PID controllers.

Download
96 Survey on Adaptive Fuzzy Logic in TCP/IP Networks Using PID controller
P. Danushapnadeesh, J.R. Thresphine

Abstract—This paper presents a survey on active queue management(AQM) scheme, Fuzzy Explicit Marking (FEM), supporting explicit congestion notification (ECN), to provide congestion control in TCP/IP best-effort networksusing a fuzzy logic control approach. While many AQMmechanisms have recently been proposed, these require careful configuration of non-intuitive control parameters, and show weaknesses to detect and control congestion under dynamic traffic changes, and a slow response to regulate queues. The proposed fuzzy logic approach for congestion control allows the use of linguistic knowledge to capture the dynamics of nonlinear probability marking functions, uses multiple inputs to capture the (dynamic) state of the network more accurately, and can offer effective implementation. A simulation study over a wide range of traffic conditions shows that the FEM controller outperforms a number of representative AQM schemes in terms of queue fluctuations and delays, packet losses, and link utilization

Download
97 A Novel algorithm for document search in unstructured Network
Kanthimathi S, Gayathri RU VA

Abstract—Client-Server architecture is a network architecture in which each node on the network is either a client or a server. Each client is connected to a centrally located dedicated computer called server. The server must be fast and should have more storage capacity to contain all the data that needs to be shared to the clients. In peer-to-peer network, computers are connected individually such that there is no dedicated server. All the computers are equal, termed as peers. Each node on the network has the capability to share data and resources with other nodes. In another words there is no central authority that determines the network's resources sharing policy. Each user has the right to decide what he would or would not like to share. Each can act as both client and a server. The Domination set-based search algorithm is analyzed and the efficiency achieved is compared with the previous algorithms that existed earlier. More specifically, the various steps involved in searching, such as construction of a connected dominating set (CDS) and the associated reduction rules are studied. Performance results show that the Domination setbased search algorithm helps in achieving more efficiency, thus making it suitable for efficient searching of data in Peer-to- Peer networks in an effective manner.

Download
98 To Evaluate Performance of the Dynamic Source Routing Protocol for Mobile Ad-Hoc Network
Prince Sood, Jasmeet Singh Gurm

Abstract—Mobile Ad-hoc Network is considered as a new paradigm of infrastructure-less mobile wireless communication system. Routing in MANET is considered a challenging task due to the frequent and dynamic changes in the network topology. In this paper, we evaluate the performance of one of the most popular reactive routing protocols i.e. Dynamic Source Routing (DSR) using various network performance parameters.

Download
99 Data Mining Prediction in Healthcare System
Anushree Ashok Wasu, J.S.Karnewar

Abstract—Data Mining is one of the most motivating area of research that is become increasingly popular in health organization. Data Mining plays an important role for uncovering new trends in healthcare organization which in turn helpful for all the parties associated with this field The main purpose of data mining application in healthcare systems is to develop an automated tool for identifying and disseminating relevant healthcare information. The medical industries come across with new treatments and medicine every day. The healthcare industries should provide better diagnosis and therapy to the patients to attaining good quality of service. This paper explores different data mining techniques which are used in medicine field for good decision making. Neural Networks are one of many data mining analytical tools that can be utilized to make predictions for medical data. From the study it is observed that Hybrid Intelligent Algorithm improves the accuracy of the heart disease prediction system. In this paper, we have focused to compare a variety of techniques, application, advantage and disadvantage and different tools and its impact on the healthcare sector.

Download
100 Biomass Gasifier System: A Review
Rahul Lodha, Sushil Kumar Dixit

Abstract—Gasification is a thermo-chemical process which converts solid biomass into a mixture of combustible gases that can be used in several applications. A downdraft gasifier was designed and developed for running air cooled, single cylinder, 4-stroke, direct injection diesel engine developing a power of 5 kW, on dual fuel mode at a rated speed of 1500 rpm. The producer gas was introduced in the inlet manifold of engine at 81pm, 61pm and 41pm respectively. The emission and performance characteristics of the engine were studied for various gas flow rates at different loads condition. On the behalf of moisture calculation, mass flow analysis, energy flow analysis and elemental balance can improved the efficiency of downdraft gasifier.

Download