Sr/No/ |
Title |
Pdf |
1 |
Modelling And Analysis Of Metal Matrix Composite Of
Connecting Rod By Finite Element Analysis
B. Velliyangiri, S. Arun, S. Azarutheen, P. Jegadeesh
Abstract — Composite materials are now a days widely used in
the engineering field. The general characteristics possessed by
the composite materials are greatly found to be the reason for
using it in the automotive applications. The objective of the
project is to design and analysis the stress and strain of metal
matrix composite (MMC) connecting rod. The connecting rods
are commonly used in the IC engines and are forced to millions
of varying stress cycles leading to fatigue failure. But the MMC
connecting rods are lighter and may offer better compressive
strength, stiffness when compared to conventional connecting
rod and it's design still represents a major technical challenge. In
this project both the standard steel alloy and composite
connecting rods are modelled and analysed using SolidWorks
2016. A comparative study was undertaken to predict the
structural behaviour of connecting rods using three dimensional
finite element stress, and is determined for the most cost effective
modelling and analysis approach. The finite element results
proves that the performance is similar as that of standard steel
connecting rod. The stress and fatigue analysis of the MMC
connecting rods is observed to be better than that of the standard
connecting rod.
|
Download
|
2 |
Design and Analysis of Internal Expanding Drum Brake
with Collet & Wedge Mechanism
M. Senthil Prabhu, M.Vinoth Kumar, C.Navaneethan, S.Sathish, N.Vivekanandan
Abstract—The drum brake uses friction caused by a set
of shoes or pads that press outward against a rotating cylindershaped
part called a brake drum. When shoes press on the inner
surface of the drum the braking occurs. In cam operated brake
the intensity of pressure acting in the contact area between the
drum and the pad is low in the portion that is nearer to the pivot
end. This also results in the excessive wear at the portion of a
friction pad nearer to the cam end. To overcome this drawback,
we have used collet and wedge for equal expansion of brake shoe
with more area of frictional contact which provides equal
intensity of pressure to the brake drum. This results in the better
braking efficiency.
|
Download
|
3 |
A review on bagasse fiber reinforced composites with
polyester and epoxy Resin matrices
B. Velliyangiri, S. Santhoshkumar, M. Sasidhar, N. Srinivasan, T. Vinesh kumar
Abstract— Bio composite is a material produced by a matrix and a
reinforcement of natural fibers like Jute, Coir, Sisal, Pineapple,
Ramie, wicker, Banana and Bagasse, etc. Such natural fibers
composites are low-cost fibers with high specific property, low
density and green. The development of sophisticated bio composite
materials made is increasing worldwide. It will be an another way
to build up the bio composites which can be particularly used for
daily needs of common people whether it is house embrace
furniture, house, fencing, deck, floor covering, and light weight car
parts or sports equipments. This effort to develop a bio composite
material with improved performance for global applications is a
continuous ongoing process. Thousands of tons bagasse is created
but most of their wastes do not have any useful utilization. This
bagasse waste can be used to set up fiber reinforced polymer
composites for commercial use. This work discusses the
development of bagasse fiber reinforced polymer composite, types
of matrix, processing methods, and any alteration of the fiber and
its applications.
|
<Download
|
4 |
Experimental Study of Corrosion Behavior of
Aluminum Coating on Mild Steel by Friction
Surfacing: A Technical Review
D. Rajprathap, M. Prakash, R. Poovendiran, P. kabilan, M. Sengottaiyan
Abstract—Friction surfacing is a promising new
technology for solid state metallic coating. Mostly,
friction surfacing used to repair of engineering worm
out parts and corrosion protection. The variety of
materials combination in friction surfacing has
successfully investigated in past decades. The present
review paper describes the detailed description of alloy
types and process parameter. Even though, successful
alloy combination has been carried out, the control of
process parameter is the promising challenge to the new
research seekers.
|
Download
|
5 |
Influence of Extreme Temperature on Electricity
Demand in Madhya Pradesh (India)
Akanksha Dubey, Dr. A. K. Sharma
Abstract—The climate is defined as ‘the general or
average weather conditions of a certain region,
including temperature, rainfall, and wind’. The earth’s
climate is most affected by latitude, the tilt of the
Earth's axis, the movements of the Earth's wind belts,
and the difference in temperatures of land and sea, and
topography. Human activity, especially relating to
actions relating to the depletion of the ozone layer, is
also an important factor. Urban centers heavily depend
upon electricity for their existence, with increase in
temperature electricity demand for space cooling also
increases. Climate Change induced temperature rise
also affect electrical generation at power plants. Due to
excessive cooling demand many cities in India has to
overdraw the electrical power from the grid, while the
other not so important has to bear the power cuts due to
increased demand by others. Urban areas are
continuously growing larger creating huge demand of
electricity for their smooth functioning; Rapid
urbanization and improved lifestyle also adds further
increase in the electrical demand of the city. This study
attempts to improve upon an existing forecasting model
indicating a quadratic Relationship between
temperature and peak electricity demand whereby peak
electricity load increases exponentially with increasing
temperature based on previous analysis.
|
Download
|
6 |
Opinion Mining Using Polarity Classification Algorithm
K.Sandhya, V.Lavanya Rani, P.Padma Kumari, U.Mounika
Abstract—Sentiment analysis is a broad research area in
academic as well as business field. The term sentiment refers to
the feelings or opinion of the person towards some particular
domain. Hence it is also known as opinion mining. It leads to the
subjective impressions towards the domain, not facts. It can be
expressed in terms of polarity, reviews or previously by thumbs
up and down to denote positive and negative sentiments
respectively. Sentiments can be analyzed using Natural Language
Processing(NLP), statistics or machine learning techniques. The
primary issues in previous techniques are classification accuracy,
data sparsity and sarcasm, as they incorrectly classify most of the
feeds with a very high percentage of feeds incorrectly classified
as neutral. To overcome this we propose an algorithm called
Polarity Classification Algorithm for feeds classification based on
a hybrid approach. The proposed method includes various preprocessing
steps before feeding the text to the classifier.
Experimental results show that the proposed technique
overcomes the previous limitations and achieves higher accuracy
when compared to similar techniques.
|
Download
|
7 |
Study on prediction of Network Security:
Ethics and Privacy
Parveen Kumar
Abstract— Network security refers to protecting the websites domains
or servers from various forms of attack. Network security is
important in every field of today’s world such as military,
government and even in our daily lives. Having the knowledge of
how the attacks are executed we can better protect ourselves. The
architecture of the network can be modified to prevent these attacks,
many companies use firewall and various polices to protect
themselves. Network security has a very vast field which was
developed in stages and as of today, it is still in evolutionary stage.
To understand the current research being done, one must
understand its background and must have knowledge of the working
of the internet, its vulnerabilities and the methods which can be used
to initiate attacks on the system.
|
Download
|
8 |
Optimizing Gtaw Process Parameters On Mechanical
Properties Of Aluminium Alloy 5052-6061 Weldments
M.Bala kumaran, K.Gowthaman, K.Gopalakrishnan, V.Gokulnath, T.Jeevananthan
Abstract—GTAW is an arc welding process that uses a
non-consumable tungsten electrode to produce the weld.
The work is based on the mechanical properties of
5052-6061 aluminium alloys in GTAW is rarely found
in the literature collection and dissimilar metal shows
comparatively better strength than similar metal.In
GTAW welding current range, gas flow rate and the
filler rod diameter play major role in deciding the joint
characteristics. By using response surface methodology
(RSM) in minitab software optimal range of values can
be found. After finding the optimum range of values
welding process is carried out. To find the strength of
weldjoints tensile strength, Yield strength (YS) and
hardness test were established for each set of optimal
values and analyzing the best result.
|
Download
|
9 |
Efficient Power Management for Group Tour Guide
by RFIDs in Wireless Sensor Networks
D.Dinesh, Dr.T.Sasilatha
Abstract—Energy management in sensor networks is
essential to prolong the network lifetime. The group
guiding services based on RFIDs and wireless sensor
network has a sensing field mixed with multiple
independent tourist groups, each with a leader and
several members. Sensor nodes have to track leaders’
locations and maintain following paths from members
to leaders. In order to manage the power in this scheme,
EGGSS protocol (Efficient group guiding sleep
scheduling protocol) is proposed. The protocol applies
the TDMA based sleep scheduling to enable reliable
group guiding at low cost, low traffic load and at low
power.
|
Download
|
10 |
Identification of Suitable Parameters for Predicting Handoff
in Real Time Mobile Network Technologies
Aditi Singh, Neeta Nathani
Abstract—Future wireless networks will consist of multiple
heterogeneous access technologies such as Universal Mobile
Telecommunications Service (UMTS), Global System for Mobile
Communication (GSM), Long Term Evolution (LTE) and
Worldwide Interoperability for Microwave Access (Wi-Max).
The main challenge in these networks is to provide users with a
wide range of services across different radio access technologies
through a single mobile terminal. The mobile users are
demanding access to the wireless networks at anytime and
anywhere. To ensure the service continuity and to maintain the
promising Quality of Service (QoS), the decision regarding
handoff is to be taken appropriately. The most common criteria
for handoff is the Received S ignal S trength (RS S ). Now a day’s
integration of different wireless access technologies has become
more important so that the user is made available to get access
without any discontinuity. In such integrated environment to
provide seamless mobility, Vertical Handoff (VHO) is one of the
major issues which need to be addressed for providing better
QoS. The vertical HO scenario introduces issues related to QoS
which affects the connections as well as the applications. This
paper identifies different parameters which are responsible for
a fruitful handoff process by comparing handoffs in different
mobile networks like UMTS, GSM, WiMAX, and LTE. The
paper also discusses about the path traversed by the HO
decision process and find out the parameters which are useful to
make accurate HO decision.
|
Download
|
11 |
Audio Denoising Algorithm by Adaptive Block
Thresholding using Short Time Fourier Transform
Shivam Tiwari, Rashika Gupta, Ravimohan
Abstract—In this paper, an adaptive bock algorithm with
modified threshold using STFT for denoising of audio
signals is proposed. The signal is first segmented into
multiple blocks depending upon the minimum mean square
criteria in each block, and then thresholding methods are
applied for each block. All the obtained blocks after
denoising of individual block are then concatenated in order
to get the denoised signal. The Short Time Fourier
Transform provides more coefficients than the Discrete
Wavelet Transform (DWT), representing additional timefrequency
details of the signal. STFT gives more degree of
freedom in terms of time-frequency resolution of audio
signals. When an audio signal corrupted with Additive
White Gaussian Noise (AWGN) is processed by using this
algorithm, we obtained higher Signal to Noise Ratio (SNR).
Hence, the proposed algorithm out-performs the other
algorithms. Also the obtained denoised signal with this
algorithm is close to the original signal.
|
Download
|
12 |
Automated Flow Measurement & Addition of Solvents
with Database Management
V.A.Patil, Prachi Jadhav, Priyanka Kadam
Abstract—Effective flow management begins with timing
and regulating in chemical application in a way that will
satisfy the need of the liquid consumption. This involves
supplying liquid according with requirements of
quantity. So measuring of liquid in chemical industry is
essential step. There are many processes in chemical
industry like sugar factories, distilled water plant,
petroleum industry we need to calculate liquid flow as
well as need to add some other chemical product for
final process outcome. The aim of this project to
calculate water flow and add purification chemical into
water for boiler system. In this project we are going to
design and manage liquid flow as well as addition of
other chemical product which is required in process.
Here flow meters are used to measure the flow of liquid
and valve is used to add other chemical product in it.
The calculated output of flow meter and added quantity
of product is sent to customer’s mobile and PC via GSM
system. The system reduces human efforts, time and we
can check the output easily on mobile.
|
Download
|
13 |
Multimodal Biometrics for Person Authentication using
Palm print Images
V.Ananth, R.Bakkialakshmi, M.E.Farzana Begum, A.shakthipriya
Abstract—Implementation of multimodal person
authentication system using single input image with efficient
features. Integrating the features increases robustness of the
system. Discrete Wavelet Transform (DWT) is used for
feature extraction and Support Vector Machine (SVM) is
proposed for classification. The final decision is made by
fusion at matching score level.
|
<Download
|
14 |
Compressibility Behaviour of Black Cotton Soil
Admixed With Lime and Rice-Husk Ash
Parimal Jha, Nisheet Tiwari
Abstract—Black cotton soil covers about one-fifth of
the area of our country. Owing to its undesirable
engineering properties such as high swelling and
shrinkage, the soil is not good either as foundation or
embankment material. To make the best use of black
cotton soil, its properties are to be modified to suit the
requirements in any specific case by means of
stabilization. Therefore, it is necessary to properly
choose the stabilizer through careful investigation to
improve the strength, compressibility and
permeability characteristics. At the same time, the
economics of the process of the stabilization should
also be considered. In this paper the results obtained
by studying the compressibility behaviour of black
cotton soil admixed with lime and rice-husk ash is
presented. For the purpose of comparison similar
studies have been carried out with admixtures such as
lime and rice-husk separately.
|
Download
|
15 |
Review on Self Compacting Concrete by Using
Mineral Additives
Hemant Sharma, Nisheet Tiwari
Abstract—Self compacting concrete (SCC) flows into
place Fresh self-compacting concrete and around
obstructions under its own weight. Self-compacting
concrete decreases construction time, labour and
equipment uses on construction,, and helps in
achieving use without applying vibration in congested
reinforced concrete structures characterized by
difficult casting conditions. However, because it
usually requires a larger content of binder and
chemical admixtures compared to ordinary concrete,
its material cost is generally 20–50% higher, which
has been a major hindrance to a wider
implementation of its use. The fresh concrete
properties and compressive strength at 1, 7 and 28
days of such SCC mixtures were measured. The
parameters considered in the study were the contents
of cement, water- cement ratio ,Fly ash, Micro silica
& Metakaolin. The responses of concrete are
recorded from Slump−flow test, L−box, U-box and
V−funnel.
|
Download
|
16 |
Review On Soil Stabilization Techniques
Satyam Tiwari, Nisheet Tiwari
Abstract— The main objective of this study is to
investigate the use of waste fiber materials in soil
applications and to evaluate the effects of waste
polypropylene fibers on strength of unsaturated soil
by carrying out different tests, such as direct shear
test, unconfined compressive test on soil sample with
fibers and without fibers. The results obtained are
compared for the two conditions and inferences are
drawn towards the usability and effectiveness of fiber
reinforcement as a replacement and as a cost effective
approach for increasing soil strength. This paper
gives a comprehensive report on stabilization
techniques for soils.
|
Download
|
17 |
An RTOS Based Architecture for Health Monitoring
with Wireless Sensor Network
Sowmiya.P, Valarmathy.G
Abstract—An RTOS based architecture designed for
the purpose of data transmission between two
controlling units through WSN without collision.
RTOS is used here to assign the priorities. The values
are sent in the form of packets during specific time; in
this transmission collision may occur to overcome this
Wireless HART (Highway Addressable Remote
Transducer) is used. This paper is implemented in two
section as prototype. First section runs with RTOS and
LPC2148 as master node and another as normal data
acquisition node to which sensor are connected. Second
section contains a controller. Communication between
two nodes is accomplished through wireless HART.
The basic view of this technique is to reduce the
possibility of collision and thus increase the
communication reliability. The sensing parameters can
be displayed as graph in software Implementation. To
do this, all the nodes must be synchronized precisely.
Also, the stack designer must guarantee that the node
can finish everything within the timeslot. It offers
benefits in terms of product life cycle, safety, system
integration complexity, performance scalability.
|
Download
|
18 |
Privacy Preserving For Scalable and Efficient for Dynamic
Audit
M.Suganya, S.Dhanalakshmi
Abstract—Cloud computing consists a collection of computers and
servers that are publicly accessible via the Internet. User accesses
the data’s and will pay as per user basis. Cloud computing has
four essential characteristics: elasticity and the ability to scale up
and down, self-service provisioning and automatic
reprovisioning, application programming interfaces (APIs),
billing and metering of service usage in a pay-as-you-go model.
While Cloud Computing makes these advantages more appealing
than ever, it also brings new and challenging security threats
towards users‟ outsourced data. Data integrity and storage
efficiency are two important requirements for cloud storage.
Proof of Retrievability (POR) and Proof of Data Possession
(PDP) techniques assure data integrity for cloud storage. Proof of
Ownership (POW) improves storage efficiency by securely
removing unnecessarily duplicated data on the storage server.
The cloud storage service (CSS) relieves the burden for storage
management and maintenance. Fragment Structure, random
sampling and index table is used to construct the Audit service.
These techniques are supported provable updates to cloud
outsourced data. The third party auditing allow to save time and
computation resources with reduced online burden of the user.
In this work, a method based on Probabilistic query and periodic
verification for improving the performance of audit services and
also audit system verifies the integrity.
|
Download
|
19 |
Remote Access TrojanA New Method for Forecasting Pulses Productivity
Data Based on Fuzzy Time Series with Higher
Forecast Accuracy Rate
B. Vinoth, A. Rajarathinam, S. Ranjethkumar
Abstract—The time-series models have been used to make
predictions in whether forecasting, agriculture forecasting,
academic enrollments, etc. Reference [7] introduced the
concept the concept of fuzzy time series in 1993. Over the
past 20 years, many fuzzy time series methods have been
proposed for forecasting enrollments. These methods
mainly focus on three factors, namely, the universe of
discourse, partition of discourse and the defuzzification
method. These methods have either used pulses
productivity data or difference of productivity data or
percentage change as the universe of discourse. And either
used frequency density based portioning or ratio-based
portioning as the partition of discourse. The main issue in
forecasting is in improving accuracy. But the forecasting
accuracy rate of the existing methods is not good enough.
This paper proposed a method based on fuzzy time series,
which gives the higher forecasting accuracy rate than the
existing methods. The proposed method used the
percentage change as the universe of discourse; mean
based partitioning as the partition of discourse and
proposed method for defuzzification. To illustrate the
forecasting process, the pulses productivity data of Tamil
Nadu is used.
|
Download
|
20 |
Application of Optimal Reactive Power Dispatch Using
Differential Evolution for Voltage Improvement
Ekta Pandey, A.K.Wadwani
Abstract—Economic load dispatch (ELD) is the method of
allocation generation from the present generation units in
such a manner to fulfill the demand of load and satisfied
constraints to minimized total generation price of power
plant. Reactive power plays a very important role in power
system. In any power system when reactive power absorbed
more or less than reactive power generated, then voltage of
the system decreases or increases from normal operating
value. To obtain the demand at minimum cost while
satisfying the constraints for easy and simplicity, the cost
function for each unit in economic dispatch problems are
approximately shown by a single quadratic functions and is
solved using mathematical programming techniques. ELD
has the objective of generation allocation to the power unit
generators in such a manner that the total fuel cost is
minimized and all operating constraints are satisfied
reactive power dispatch (RPD) is most important role in
the operation and control of power system. This paper
presents a differential evolution (DE) based technique for
solving optional reactive power dispatch with voltage
improvement in power system the monitoring technology
for voltage improvement on the L- index of load buses of
power system. The main aim is to minimize the real
powerless subjected to limits on generator reactive and
real power outputs, transformer taps, bus voltages and
shunt power control devices like SVCS The proposed
algorithm applied to IEEE. 30 bus system to determine the
optional reactive power control variables under safe
voltage satiability limit and it is very suitable for this task
to a large extent the optional reactive power allocation
gives the results using differential evolution are compared
with other method.
|
Download
|
21 |
Applications of Automation Techniques in Smart Grid
Technologies
Sushil Chaudhary
Abstract—The terms smart grid, Intelligent Grid, and secure smart
grid are being used today to describe technologies that
automatically and rapidly isolate faults, restore power, monitor
demand, and maintain and restore stability for more reliable
generation, transmission, and delivery of electric power. This
paper focuses on distribution-level protection and automation
techniques illustrated with real-world, case study examples.
Smart distribution automation not only reacts to maintain or
restore stability but also evaluates all available mitigations to use
“best choice automation.” A simple example includes evaluating
pre- event demand and supply at all points on the system. Using
this information and knowledge to predict near-term demand
profile changes leads to a best choice reconfiguration strategy.
This creates a solution that mitigates the fault or event and
provides electricity free of sags, spikes, disturbances, and
interruptions.
|
Download
|
22 |
Speed Control of Induction Motor Using Vector
Controlled Technique Using MRAS
Jyoti Baghel
Abstract—To implement the vector control technique, the motor
speed information is required. Infrared Tacho-meters,
resolvers or incremental encoders are used to detect the speed.
These sensors require careful mounting and alignment and
special attention is required with electrical noises. Speed sensor
requires additional space for mounting and maintenance and
hence increases the cost and the size of the drive system .These
problems are decreased by speed sensor less vector control by
using model reference adaptive system(MRAS). Model
reference adaptive system is a speed estimation method having
two models namely reference and adaptive model .The error
between two models determines induction motor speed. This
paper proposes a Model Reference Adaptive System (MRAS)
for estimation of speed of induction motor. An Induction motor
is developed in stationary reference frame and Space Vector
Pulse Width Modulation (SVPWM) is used for inverter design.
PI controllers are designed controlling for this purpose. It has
good tracking and attains steady state response very quickly
which is shown in simulation results by using
MATLAB7.8/SIMULINK.
|
<Download
|
23 |
Review on High Performance Median Filter for Salt and
Pepper Noise Removal
Antima Bajpai, Shweta Agrawal, Prashant Badal
Abstract—As the noise may introduced anywhere within
image, a filter is the essential part of the image processing units.
The noise may corrupt the desired signal which may result in
degradation in quality of the image. Among the different noises,
the salt and pepper noise is also the frequently occurred noise
within the image due to transmission error. In order to
eliminate the effect of noise within the image, a special filter
called median filter is used. As the noise density increases, the
conventional median filter fails to provide noise-free image.
Therefore, different algorithm that uses some decision to
reduce the salt and pepper noise is proposed in the literature.
This paper provides a comprehensive literature review on the
different median filter algorithm and architectures.
|
Download
|
24 |
Cloud Services & Multi site Workflows
Sonali J.Rathod
Abstract— Cloud computing is the long dreamed vision of
computing as a utility, where data owners can remotely store
their data in the cloud to enjoy on-demand high-quality
applications and services from a shared pool of configurable
computing resources. The global deployment of cloud datacenters
is enabling large scale scientific workflows to improve
performance and deliver fast responses.
|
Download
|
25 |
Impact of SCMs on Concrete
Dr. M. N. Bajad, Kothawade Ashwini Shirish
Abstract—The influence of supplementary cementations material
namely sugarcane bagasse ash & lime kiln dust on the
engineering properties of high strength concrete has been
reviewed in this study. This paper reviews the possible use of
industrial wastes as a supplementary cementations material in
the production of concrete. This provides a summary of existing
knowledge about the successful use of industrial wastes in
concrete industry. Workability, compressibility, elastic modulus,
porosity and pore size distribution were assumed in order to
quantify the effects of different materials. It aim to reveal the
idea of utilizing these wastes by elaborating upon their
engineering, physical & chemical properties. Thus the impact of
using supplementary cementations materials in concrete are
discussed in this paper.
|
Download
|
26 |
Prepaid Metering System for Smart Grid
G.Aishwarya Lakshmi, S.Lokesh, R.Madhivanan, K.athiyasekar
Abstract—A smart grid is the evolution of grid from present
electrical grid which focuses on reliability and sustainability
of supply along with delivering power in an economic manner,
thus it is often referred as the future of electrical system.
Every home will be fitted with a smart meter which
communicates with the grid computer about the status after
specific intervals of time. The power consumption status of
every home will be updated in the database. A provision to
insert recharge card will be provided in smart meter, once
card is inserted it will be recharged and the consumer can
consume power until balance is left. When balance falls below
a preset value alarm is raised and cautioned. Suppose balance
is zero than the isolation circuit will cut off the power supply
to the home.
|
Download
|
27 |
Enhancement of Sentiment Analysis on Twitter
A.Anantha Lakshmi, M.Iswarya, J.N.Maria Boncy, J.Parameshwari, S.Hariharan
Abstract— In this paper, we analyze social media data. Social
media analytics is the practice of gathering data from blogs and
social media websites and analyzing that data to make business
decisions. The most common use of social media analytics is to
mine customer sentiment in order to support marketing and
customer service activities. And then we take twitter big data to
predict named entity. In this work, it is aimed to reduce the
Twitter user’s effort to access to the tweet carrying the
information of interest. To this aim, a tweet recommendation
method under a user interest model generated via named entities
is presented. To achieve our goal, Hybrid Segmentation is
generated via named entities extracted from user’s followers’
and user’s own posts. And extend our approach to analyze short
text in tweets.
|
Download
|
28 |
A VHDL Code for Area and Delay Efficient 64-Bit Carry
Skip Adder
C.Yamini, M.Krishnamurthy
Abstract— Adders are the basic element in many data
processing processors. By improving a performance of the
adder would advance the execution of binary operations inside
a circuit. The speed of addition is limited by the time required
to transmit a carry through the adder. The aim of this paper is
to develop 32 bit carry skip adder architecture by the
technique of replacing ripple carry adder with carry lookahead
adder in the conventional structure which reduces the
number of gates and delay. The delay is also reduced by carry
chain optimization technique. This work uses a simple and an
efficient gate-level modification in the regular structure which
reduces the area and delay of the CSKA and this work
estimates the performance of the proposed designs with
conventional structure in terms of Area, delay and synthesis
are implemented in Xilinx 14.2 of VHDL. The results are
compared with proposed structure and conventional structure
of CSKA.
|
Download
|
29 |
Study of Mechanical Properties of SIFCON Material
M.N.Bajad , Ashwini Pradeep Pawar
Abstract—Slurry Infiltrated Fiber Reinforced Concrete
(SIFCON) is one of the superior material and can be reflected as
special type of high performance fiber reinforced concrete
(HPFRC) .SIFCON has different types of mechanical properties
such as ductility, compressive, tensile, shear and especially
flexural strengths. But according to outcomes ductility fails in
CY system, Triaxial compression fails in stress curve pattern
achieved by cubes under confining pressure level. This paper
aims the study of various properties of SIFCON .From study of
results, SIFCON is used in CY system.
|
Download
|
30 |
Techniques For Determine Economic Load Dispatch
Problem Using Particle Swarm Optimization
Ankur Saxena
Abstract—Economic load dispatch (ELD) is the method of
allocating generation within all available generating units
in such a way the it fulfill the load demand and satisfied
constraints to minimized total generation cost of the
thermal power plant. Economic load dispatch is a common
task in operational planning of power system that require
is to be optimized. This paper presents overview of most
reliable and very effective particle swarm optimization
technique for economic load dispatch. These results have
been shown for ELD of three and six unit test systems or
generator systems with and without losses. All the final
results obtained using PSO will compare with
conventional quadratic programming techniques and
found to be most convenient.
|
Download
|
31 |
A Review on Cyber Crime
Poonam Gupta, Vikas Sannady
Abstract— The growing danger from crimes committed against
computers, or against information on computers, is beginning to
claim attention in national capitals. In most countries around the
World, however, existing laws are likely to be unenforceable
against such crimes. This lack of legal protection means that
businesses and governments must rely solely on technical
measures to protect themselves from those who would steal, deny
access to, or destroy valuable information. Cyber attacks can
come from internal networks, the Internet, or other private or
public systems. In this manuscript we deal with the survey
reports of India and also statistics of cyber crime in India as well
as cyber user in world.
|
Download
|
32 |
Efficient signalling technique for free space optics using
auto-correlation OFDM
Vinay Dewangan, Shikha Singh
Abstract—This document develops auto-correlated optical
OFDM as a frame- work to implement OFDM on optical
intensity channels. The drawbacks of conventional methods are
mitigated in auto-correlated optical OFDM. Contrary to ACOOFDM
and DC-biased OFDM, the proposed technique uses all
the available bandwidth for data modulation and does not
require reserved subcarriers. Simulation results verify that
auto-correlated optical OFDM has gain in Bit Error Rate as
compared to conventional optical OFDM schemes.
|
Download
|
33 |
Utilization of Waste Autoclaved Aerated Concrete
M.N.Bajad, Dipti.A.Kate
Abstract—The rapid progress in construction industry is also
influencing to the equivalent construction materials. Autoclaved
aerated concrete (AAC) is one of the construction waste
materials. Thus to elucidate the dumping problem of AAC the
waste AAC can be reused in an effective way to achieve
sustainability. The Autoclaved aerated concrete particles
(AACP) are used as bio filter carriers in biological aerated filters
for waste water treatment. The natural materials used in green
roofs are substituted by granular AAC. This review targets at
studying the features of AAC and its reuse in advance waste
water treatment and in green roofs.
|
Download
|
34 |
Mining Suspicious Messages in Online Forums
Priyanka, Poorani, Bhavani, Kamalameena, Hariharan
Abstract—Now-a-days there is an increasing dependency on
web applications, ranging from individuals to large
organizations. The security motivation of web application
especially online social network is a great concern. Therefore
in this paper a system is proposed which is an automated
system, called Filtered Wall (FW), able to filter unwanted
messages from OSN user walls. We exploit Machine Learning
(ML) text categorization techniques to automatically assign
with each short text message a set of categories based on its
content. The major efforts in building a robust short text
classifier (STC) are concentrated in the extraction and
selection of a set of characterizing and discriminate features.
The solutions investigated in this paper are an extension of
those adopted in a previous work by us from whom we inherit
the learning model and the elicitation procedure for
generating reclassified data. The original set of features,
derived from endogenous properties of short texts, is enlarged
here including exogenous knowledge related to the context
from which the messages originate. In addition, the system
provides the support for user-defined Blacklists (BLs), that is,
lists of users that are temporarily prevented to post any kind
of messages on a user wall.
|
Download
|
35 |
Image Segmentation Using K-means Algorithm
Vivek Barwat, Rutesh Lonkar
Abstract—Clustering performance of the K-means greatly relies
upon the correctness of the initial centroids. Usually the initial
centroids for the K-means clustering are determined randomly
so that the determined centroids may reach the nearest local
minima, not the global optimum. This paper proposes a new
approach to optimizing the designation of initial centroids for Kmeans
clustering. This approach is inspired by the thought
process of determining a set of pillars’ locations in order to make
a stable house or building. We consider the pillars’ placement
which should be located as far as possible from each other to
withstand against the pressure distribution of a roof, as identical
to the number of centroids amongst the data distribution.
Therefore, our proposed approach in this paper designates
positions of initial centroids by using the farthest accumulated
distance between them. First, the accumulated distance metric
between all data points and their grand mean is created. The first
initial centroid which has maximum accumulated distance metric
is selected from the data points. The next initial centroids are
designated by modifying the accumulated distance metric
between each data point and all previous initial centroids, and
then, a data point which has the maximum distance is selected as
a new initial centroid. This iterative process is needed so that all
the initial centroids are designated. This approach also has a
mechanism to avoid outlier data being chosen as the initial
centroids. The experimental results show effectiveness of the
proposed algorithm for improving the clustering results of Kmeans
clustering.
|
Download
|
36 |
Statistical Analysis of Heat Transfer and Fluid Flow
Features of Solar Air Heater
Rajwansh Pandit, Pankaj k. Pal, Ravi Vishwakarma
Abstract—The application of artificial roughness in the form of
fine wires or ribs of different geometry on the heat transfer
surface has been recommended to increase the heat transfer
coefficient by several investigators. The use of artificial
roughness on the underside of the absorber plate disturbs the
viscous sub-layer of the flowing medium. It is well known that in
a turbulent flow a sub-layer exists in the flow in addition to the
turbulent core. The purpose of the artificial roughness is to make
the flow turbulent adjacent to the wall in the sub-layer region.
The present work was undertaken with the objectives of
extensive investigation on the 90° shaped ribs as artificial
roughness on the surface of duct. Experimental setup for heat
transfer and pressure loss has been design and developed. Data
were collected for local heat transfer and pressure loss of these
artificially roughened ducts. Results of artificially roughened
duct have been compared with those of a smooth duct under
similar flow condition to determine heat transfer and friction
factor..
|
Download
|
37 |
Design and VLSI Implementation of High Performance
Median Filter
Antima Bajpai, Shweta Agrawal, Prashant Badal
Abstract—The exponential use of the portable devices
exhibiting multimedia applications is the result of
advancement in the VLSI technology. Image and video
processing applications are the primarily used in these devices
which demands higher performance processing units. As the
noise may introduced anywhere within image, a filter is the
essential part of the image processing units. As the Salt and
pepper noise is occurred due to incorrect computations with
there is special kind of filter used to remove this noise is
known as median filter. In this paper different algorithms for
the median filters are explored and analyzed. A novel median
filter algorithm is proposed in this paper that reduces the
complexity of the filter significantly. The proposed filters is
implemented and simulated with benchmark inputs. The
simulation results show that proposed median filter reduces
area and delay by 5.9% and 48.8% respectively over the
conventional median filter architecture.
|
Download
|
38 |
Study On the Classification Algorithms for Prediction of
Diseases
P.Radha, R.Divya
Abstract—Data mining is the extraction of information from a
large database. Huge amount of data related to healthcare are
available but information is not extracted from the huge data.
There is a less amount of effective analysis tool to discover the
hidden information and trends in data. In health care
department data mining is mainly used for disease prediction.
There are many data mining techniques present for predicting
the disease like association rules, classification, clustering. In this
paper, the study is done on the prediction of diseases etc based on
the classification algorithms and the best classification algorithm
is found. In this paper comparison of accuracy of the prediction
of diseases is also done.
|
Download
|
39 |
Simulation of Signal and Transfer Function on XCOS
simulator
Garima Jain, Nasreen Noorani, Kavita Hedau
Abstract—In this paper we are familiar with the XCOS Palette
browser and Identify the block for designing of signals and
transfer function. now a day’s open source software are popular
for simulation and synthesis, XCOS is a free graphical editor and
simulator based toolbox on Scilab which provide helps to design
physical systems such as electrical, mechanical, automotive,
hydraulics, using a graphical user interface based on a block
diagram approach.
|
Download
|
40 |
Stereo pair Image Compression process using the effective
Extended Block Truncation Coding Algorithm
Dr.T.Ramaprabha
Abstract—Stereopsis is the ability to perceive three
dimensions by integrating two slightly different views of the
same scene. A stereo image is produced by taking
photographs of the identical scene from two slightly
different positions. The distance between these positions is
called the stereo base. Many cameras have the ability to
stereoscopically image by sequentially taking two images.
Stereo images provide an improved sense of presence, and
have been found to be operationally useful in
responsibilities requiring remote manipulation or judgment
of spatial relationships. A stereo system with a single leftright
pair needs twice the raw data as a monoscopic imaging
system. As a result there has been increasing attention given
to image compression methods specialized to stereo pairs. In
the general concept of stereo image compression method,
first compress the reference (left image) image only, after
that the block matching algorithm is applied between left
and right image to identify the disparity values and they are
encoded separately rather than compressing the whole right
image. In this paper I wish to illustrate the effectiveness of
stereo pair image compression Algorithm using Extended
Block Truncation Coding with higher image quality after
decompression.
|
Download
|
41 |
A Fast and Scalable Tool towards Collaborative
Data Mining in Mobile Computing Environments
G.Jagatheeshkumar, N.Anbazhagan, S.Selva brunda
Abstract—Systems that construct classifiers are one of the
commonly used tools in data mining. new term describing
collaborative mining of streaming data in mobile and
distributed computing environments. Proposed using mobile
software agents. The proposes a new architecture that
prototyped for realizing the significant applications in this
area. With the continuous advances in handheld mobile
devices including smart phones, PDAs (Personal Digital
Assistants) and smart sensors, there is an unpreceded
opportunity to perform significantly useful data analysis.
|
Download
|
42 |
Design and Implementation of Low Complexity
Sharpening Filter for Image Scaling Applications
Nitin Singh, Shweta Agrawal
Abstract—There is significant use of portable devices in
recent years that employ multimedia applications. The image
processing has become a prominent part in several
applications from medical to entertainment. In order to
improve the efficiency of these application hardware
implementation of core computational unit is required. As the
cost of the device increases with increasing complexity, low
complexity architecture is the prime requirement. In this
paper, new sharpening filter architecture is proposed that can
be effectively utilized in the different portable devices. The
proposed design is implemented in the MATLAB and Verilog
to compute the quality and design metrics respectively and
compared over the existing architectures. The simulation
results show the proposed sharpening filter reduces area and
delay by 0.787X and 47.7% respectively over the conventional
sharpening filter.
|
Download
|
43 |
VLSI Implementation of A Novel Low Complexity Image
Scalar Architecture
Nitin Singh, Shweta Agrawal
Abstract—The modern portable devices such as smart phones
have been employing huge number of image/video
applications in recent years. This results in exponential rise in
the design complexity of these devices. Moreover, the
advancement in the VLSI technology with nano-scale
transistors dimensions further increases the complexity of
these devices. The highly complex devices consume significant
amount of energy while processing the signal. Further, the
cost of the device increases with increasing complexity.
Therefore low complexity architecture is the prime
requirement. In several image processing applications image
scaling is the commonly used operation to fit the image into
the device display having different sizes. In several
applications such as medical imaging, image scalar is
commonly employed in the medical devices to see the image
capture with different resolution device. This paper proposed
low complexity image scalar and then design is implemented
and evaluated. The simulation results show that the proposed
image scalar reduces area by 12% and delay by 19.95% over
the existing well-known architecture.
|
Download
|
44 |
Analysis and Investigation of Solar Vapour
Absorption Refrigeration System
M. Shanmugam, K.Satheesh kumar, S.Pradeep, P.Ravikumar, S.Suresh
Abstract—The conventional refrigeration technologies
as they affect the ozone layer and increase the global
warming. The ordinary refrigerator contains the
CFCs or HFCs. This is the environmentally
destructive and causes the greenhouse effect. It leads
to increases the demand of energy consumption. The
commercial refrigerator operates in a compression
refrigeration cycle, in which the compressor is used to
compressing the refrigerant liquid for cooling
purpose. In conventional type the compressor is run
by using electricity it increases the demand of power
consumption. To over the above demand, the
compression cycle is replaced by absorption cycle. In
this type the generator is receive the heat from solar
energy (Renewable energy). This paper deals with the
analyze of ammonia solar vapour absorption
refrigeration for a single flat plate collector. This
technique is combined with vapour absorption
refrigeration system to increase the refrigeration
effect.
|
Download
|
45 |
Analysis of Web Log Files Using Map Reduce Algorithm
J. Ilanchezhian, S. Dhilipkumar, A. Saravanan, P.Shanmugavel
Abstract—Big Data is a collection of a huge and complex data
that it becomes extremely tideous to capture, store, process,
retrieve and analyze it with the help of on Relational database
management tools or traditional data processing techniques. To
store and process such a big data hadoop technology is used.
Hadoop is an open source framework that allows to store and
process big data in distributed environment across clusters of
computers using simple programming models. It is intended to
scale up from single server to thousands of machines, each
offering local computations and storage. In this paper, we
propose incremental MapReduce, the most used framework for
mining bigdata. Incremental MapReduce 1) performs key-value
pair level incremental processing, 2) supports iterative
computation, which is widely used in data mining applications.
That means incremental MapReduce processes big data in a less
time and stores it in a more optimized form.
|
Download
|
46 |
A Review paper Study on Sinkhole Attacks in Wireless
Ad hoc Networks
Mandeep Kaur, Khushboo Bansal, Neha Soni
Abstract—The Mobile Ad hoc Network is a modern Wireless
Base communication system is most important and popularly
used communication. The Major attack faced by this network is
sinkhole attack which can heavily attract the resources available
in the network. It has to be prevented to make the energy of the
network is available for all resources. Different kinds of attack
that can be introduced in wireless network. So security is an
essential requirement in mobile ad hoc network (MANETs).
There is different various types of attacks that can be
introduced in wireless network. This paper studies sinkhole
attack and different routing protocol.
|
Download
|
47 |
A Review paper on study of collaborative attack on
Mobile ADHOC network in MANET
Gurpreet Kaur, Deepinder Kaur Dhaliwal, Neha Soni
Abstract—Wireless networks are become more popular now days
because of the increase in the demand of wireless network by
the users. In a manet there a no of attack wireless network. In
such a way collaborative attack is a security threat or an active
type of attack in which the malicious nodes can read the data
packets falsely claiming the fresh route these can nodes reads
the various routing protocols for having the path from source to
destination.in this review paper we can review the various
attacks like wormhole attack on manet.
|
Download
|
48 |
Analysis of heat transfer and Fluid flow of rectangular tube
using CFD
Pankaj k. Pal, Rajwansh Pandit, Ravi Vishwakarma
Abstract—The present investigation is concerned with evaluating
heat transfer and friction characteristics of an artificial roughed
solar duct using combination of rough surface on various
relative roughness height and range of parameter studied are
Reynolds number from 3000-14000. A computational analysis of
heat transfer and flow characteristics with artificial roughness in
the form of different types of ribs, heated wall of rectangular
duct for turbulent flow has been carried out with k-e turbulence
model is selected by comparing the predictions of different
turbulence models with experimental results available in
literature. This study evaluates, heat transfer and fluid flow
behavior in a rectangular duct with square roughened ribs
mounted on one of the principal wall (solar plate) by
computational fluid dynamics software ANSYS (Fluent 6.3.26
Solver). In this study, The Reynolds-Averaged Navier–Stokes
analysis is used as a numerical technique and the k-e model with
near-wall treatment as a turbulent model. The results predicts a
significant enhancement of heat transfer in comparison to that of
for a smooth surface with different e/Dh. The performance
evaluation in Terms of thermo hydraulic performance has been
carried out for various value of Reynolds number for some
selected artificial roughness geometries, in the absorber plate of
solar air heater duct. Three roughness geometries as per the
order of relative roughness height (e/Dh) 0.0471, 0.078, 0.083 are
used to create turbulence, and a smooth plate to compare the
result of roughened plates. The range of Reynolds number is
3000 to 14000, Relative Roughness height (e/Dh) .0471mm,
.078mm, .083mm Rib and Heat flux 800 W /m2. The Result has
been compared with smooth duct under similar flow and
boundary condition. The co-relation for heat transfer and
friction factor developed by respective investigators has used to
calculate the thermo hydraulic performance. It is found that
artificial roughness on absorber surface effectively increases the
thermo hydraulic performance and friction factor and efficiency
in comparison to smooth surface.
|
Download
|
52 |
Multiparty Access Control for Image Sharing in
Facebook
T.Sivaranjini, S.Kavitha
Abstract—Online Social Networking (OSN) has
experienced a tremendous growth in recent years.
OSN has millions of users spread throughout the
world. OSN mainly relies on business networking.
The networking is done for different purpose
depending on the user’s interest. OSN allows people
communication between family and friends
throughout the network. Though this OSN establishes
many networking facilities, it also raises security and
privacy issues. The proof of concept Facebook is
taken and the users of Facebook are restricted to
share their image in their page. When the user shares
the image, the notification is send to their friend list.
Thus when some private data is needed to be shared
the user is unable to share. There may be some users
who try to hurt others with the comments. This must
be prevented in Social Networks since many people
can view this comments. To overcome these issues the
MultiParty Access Control (MPAC) is used. MPAC
creates a block when sharing image and posting
comments. When the user shares image, the
authorized users are only allowed to view it. A
database is maintained in the system which has the
list of hurting words, when user comments, the
comments are checked with the database and the
comment never be posted when the word is present in
the database. Thus MPAC helps in secure sharing of
images and secure posting of comments.
|
Download
|
53 |
Six Sense Technologies: Multi-technology & Multiapplication
Era
Simmi Bagga, Satinder Kaur
Abstract—Nowadays, Sixth Sense Technology is a new era.
It has mini-projector which is integrated with a camera
and a cellphone—which acts as the computer connected to
the internet. Sixth Sense can also scan hand gestures. It is
the latest technology based on sensors and computers. The
Camera can scans objects around a person instantly while
the micro-projector can display the information on any
surface, including the object itself or even hand also. It is
multi application field. One can make a call by extending
hand on front of the projector and numbers will be
appeared for clicking. One can know the time by drawing
a circle on wrist and a watch will be shown. One can take a
snap by just make a square with fingers, highlighting what
one wants to frame, and the system will make the photo.
The small device which has a huge number of applications
is portable and easy to carry as one can wear it in neck.
This paper discusses the different technologies used to
implement Six Sense technology. It also discusses its major
application fields.
|
Download
|
54 |
A Novel fault tolerant based cluster routing using
DST approach
S. Nivetha, R. Raju
Abstract—A Roadside Unit (RSU) Cloud, a Vehicular
Cloud, as the operational backbone of the Vehicle
Grid in the Internet of Vehicles (IoV). The
architecture of the proposed RSU Cloud consists of
traditional and specialized RSUs employing Software
Defined Networking (SDN) to dynamically
instantiate, replicate and, or migrate services. We
then present a detailed reconfiguration overhead
analysis to reduce reconfigurations, which are costly
for service providers. VANET has been a core
networking technology to provide safety and comfort
to drivers in vehicular environments. Emerging
applications and services, however, require major
changes to its underlying computing and networking
models, which demand new network planning for
VANET with avoiding intruder of data and provide
malicious attack from third party.
|
Download
|
55 |
Effective Inter Cluster Routing Model in VANET
V. Seethalakshmi, N. Pazhani Raja
Abstract—VANET is an emerging technology to
achieve inter-vehicle communications, for improving
the road safety, alerts messages, accessing and sharing
the information and entertainments. Vehicular Ad hoc
Network (VANET), a subclass of mobile ad hoc
networks (MANETs), is a promising approach for the
intelligent transportation system (ITS). The design of
routing protocols in VANETs is important and
necessary issue for support the smart ITS. Although
rich literature in ad hoc networks exists, the scale,
availability of realistic traffic data and vehicle
equipments motivate researchers to study the unique
characteristics of VANET. The aim to survey the paper
and compare literature on the characterization and
existing routing protocol of VANET.
|
Download
|
56 |
A Survey on Adaptive Algorithms for Noise Cancellation
in Speech Signals
G.Amjad Khan, Dr.K.E.Sreenivasa Murthy
Abstract—The contamination of a signal of interest by other
undesired signals (noise) is a problem encountered in many
applications. The conventional linear digital filters with fixed
coefficients exhibit a satisfactory performance in extracting the
desired signal when the signal and noise occupy fixed and
separate frequency bands. However, in most applications, the
desired signal has changing characteristics which requires an
update in the filter coefficients for a good performance in the
signal extraction. Since the conventional digital filters with
fixed coefficients do not have the ability to update their
coefficients, adaptive digital filters are used to cancel the noise.
The parameters of adaptive filters are mean square error
(MSE) ,signal to noise ratio(SNR) ,convergence and
computation time ,Misadjustment are the various techniques
which gives the performance of the adaptive filters.
|
Download
|
57 |
Visually Lossless Compression in Digital Image
Forensics
Sowmiya N,Sadish Kumar S.T
Abstract—The digital image processing is to be used in
Visually lossless compression in of digital image
forensics. Fingerprints are one of those irregular twists
of nature. The fingerprints are used for authentication
and identification processes in forensic tasks such as
detection of digital forgeries. Forensic tasks can to be
performed in device identification problem, device
linking problem, fingerprint matching problem. For
random projections the compression technique is to be
required with no information loss and to be measured
by PRNU values. Fingerprint matching is still a
challenging problem for reliable person authentication
because of the complex distortions involved in two
impressions of the same finger.
|
Download
|
58 |
A Review on Use of Metakaolin and OP Concrete
Shashikant Dewangan
Abstract—Concrete is the most commonly used
material for construction. The worldwide production
of cement has greatly increased since 1990.Production
of cement results in a lot of environmental pollution
as it involves the emission of CO2 gas. Supplementary
cementations materials (SCM) are finely ground
solid materials that are used to replace a portion of
the cement in a concrete mixture. These
supplementary materials may be naturally occurring,
manufactured or man- made waste. Various types of
pozzolanic materials that improve cement properties
have been used in cement industry for a long time.
Metakaolin is a dehydroxylated aluminium silicate. It
is an amorphous non crystallized material,
constituted of lamellar particles. From the recent
research works using Metakaolin, it is evident that it
is a very effective pozzolanic material and it
effectively enhances the strength parameters of
concrete. This paper reviews the use of metakaolin as
supplementary cementitious material in concrete. A
detailed literature survey is carried out and presented
here.
|
Download
|
59 |
Review on Use of Waste Material in Concrete
Yogesh Soni
Abstract— Concrete is a mixing of different raw
material like binding material (cement+ fly ash), fine
aggregate, coarse aggregate and water. Concrete is
normally used in all the types of structure. Use of
concrete is huge and all the structure are made with
this material so availability of this raw material is
reduced day by day so cost and requirement of this
material is increased. Due to this limitation of
availability of natural material we are trying to
partially replaced cement by different waste material
for this we conducted survey of different paper which
gives the idea about effect of different waste material
on properties of concrete. The primary objective of
this study is to select the waste material which gives
proper properties with concrete. This study includes
review of different paper published in national and
international journals or in conferences.
|
Download
|
60 |
Link Stability Using Rbmrp On Vehicular Ad Hoc
Network
R. Ravina, N. DurgaDevi, K. Dhivya, T. Kavitha, K. Ganeshan
Abstract—VANET is an emerging technology to
achieve inter-vehicle communications, for improving
the road safety, alerts messages, accessing and sharing
the information and entertainments. Vehicular Ad hoc
Network (VANET), a subclass of mobile ad hoc
networks (MANETs), is a promising approach for the
intelligent transportation system (ITS). The design of
routing protocols in VANETs is important and
necessary issue for support the smart ITS. Although
rich literature in ad hoc networks exists, the scale,
availability of realistic traffic data and vehicle
equipments motivate researchers to study the unique
characteristics of VANET. The aim to survey the paper
and compare literature on the characterization and
existing routing protocol of VANET.
|
Download
|
61 |
Link layer LSP in Internet Of Vehicle Network for
RSU in IOT
K. Preethi, A. Sharmila, I. Sujitha, K. Ganeshan
Abstract—A Roadside Unit (RSU) Cloud, a Vehicular
Cloud, as the operational backbone of the Vehicle
Grid in the Internet of Vehicles (IoV). The
architecture of the proposed RSU Cloud consists of
traditional and specialized RSUs employing Software
Defined Networking (SDN) to dynamically
instantiate, replicate and, or migrate services. We
then present a detailed reconfiguration overhead
analysis to reduce reconfigurations, which are costly
for service providers. VANET has been a core
networking technology to provide safety and comfort
to drivers in vehicular environments. Emerging
applications and services, however, require major
changes to its underlying computing and networking
models, which demand new network planning for
VANET with encryption of data and provide
malicious attack from third party.
|
Download
|
62 |
Comparative Analysis of Wavelet Domain Techniques
for Image Steganography
Paramvir Rathi1 Neeraj, Shalu Garg
Abstract—It is now becoming increasingly well known
that signal and image processing are getting great
improvements in performance by using various wavelet
based methods. In order to achieve better
understanding of wavelet based methods, Haar ,
daubechies, symlet, and Biorthogonal wavelets are
discussed. Image is decomposed into four sub bands
using DWT. Secret image is hidden by alpha blending
technique in the corresponding sub bands of the
original image. During embedding, secret image is
dispersed within the original image depending upon the
alpha value. Extraction of the secret image varies
according to the alpha value.The proposed transforms
are compared using different levels in DWT based
image steganography by using statistical parameters
such as peak-signal-to-noise-ratio (PSNR) and mean
square error (MSE). The experimental results
demonstrate that the watermarks generated with the
proposed algorithm are invisible and the quality of
watermarked image and the recovered image are
improved.
|
Download
|
63 |
Implementation of Motion Controlled Virtual Robot for
Military Application
Chethan N, Abhilasha S T,Deepthi S,Gangadhar B,Vibha Raj Nag
Abstract—This project aims to build an automated robot which
can effectively function in the military unit for the purpose of
commanding and location accessing. The idea is to design a robot
whose operations are controlled remotely with the help of
accelerometer and flex sensors. It can be used to give the voice
command output from the commander to the military unit
which may be under the enemy attack or to spy the enemy area
secretly.
|
Download
|
64 |
Working Capital Management
Dr.C.Boopathi
Abstract—Working capital represents the amount of
current assets which would remain if all current
liabilities were paid. Both the concepts of working
capital have their own points of importance. "If the
objectives are to measure the size and extent to which
current assets are being used, 'Gross concept' is
useful; whereas in evaluating the liquidity position of
an undertaking 'Net concept' becomes pertinent and
preferable.It is necessary to understand the meaning
of current assets and current liabilities for learning the
meaning of working capital, which is explained below.
|
Download
|
65 |
Factors Influence Performance of PEM Fuel Cell – A Review
J.Dinesh a, M.Sugumar
Abstract—The review paper includes introduction of the PEM
fuel cell and Description of water management problem in PEM
fuel cell. The consideration are based on exclusion of water
management problem by proper design of fuel cell. The paper
shows a variety of types of efficiency, divergence characteristics
and power characteristics. It also describes the various
parameters (pressure, temperature and humidity) which affect
the performance of fuel cell, its optimum range in which fuel cell
function safely and efficiently. This paper shows the recent work
done for improvement of the performance of PEM fuel cell. Fuel
cell performance is improved by proper water management on
the membrane. Basic parameter which performs the fuel cell
performance is Relative humidity, Flow field design,
Temperature. With the help of this studies, we observe that the
fuel cell performance develop by Increasing the relative
humidity, temperature, pressure and using the serpentine flow
field. The aim of this study is to explore the factors influence
performance of PEM fuel cell.
|
Download
|
66 |
Design of highly secure data Encryption technique with
AES cum IDEA encryption
Apoorva Nayak, Sapna Choudhary, Rohan Rajoriya
Abstract—It is highly required to develop technique that is
hard to even recognize with transform or other recursive
mathematical solutions. Paper work is to design AES cum
IDEA encryption is an optimized solution to secure data
communication as compare with individual IDEA
(International Data Encryption algorithm) & AES
encryption. PAIE technique which will be much
optimized solution to same when data conversion time &
encryption time considers as design parameters. AES,
DES & IDEA are three major techniques available to
data encryption. Our aims is to develop all existing
designs & observe their performance & to compare them
also to develop a high speed parallel combination to AES
& IDEA like merging two techniques so to have best
parameters in terms to overall throughput, total
avalanche data conversion rate so that design may be
used as a cryptographic coprocessor in high speed
network applications.
|
Download
|
67 |
Design and Simulation of Microcode based Built-In Self
Repair for Embedded Memories to Enhance Fault Coverage
Mohammed Arif, Ankita Gupta
Abstract—In recent time, it has been surveyed that the System-on-
Chips (SoCs) are moving from logic dominant chips to memory
dominant chips in order to deal with todays and future
application requirements. These changing of technologies give
rise to new defects and new fault models, for which there is a
need for new algorithms which are defined to detect and
eliminate these new defects. These new fault models are used to
develop new high coverage test and diagnostic algorithms. The
higher the fault detection and localization coverage, the higher
the repair efficiency, hence higher will be the obtained yield.
Memory repair becomes important, since only detecting the
faults is not only sufficient for SoCs. March BLC algorithm is a
newly developed test algorithm which deals with detecting some
recently developed static and dynamic fault models. In order to
use this algorithm new microcode BIST architecture is presented
here which is capable of employing these new algorithms. A
word-oriented BISR array is used to detect the faulty memory
locations and repair those faulty memory locations by routing
them to the redundant array.
|
Download
|
68 |
Analysis on the effect of change in inset feed length of a
circular patch antenna on return loss and current
distribution
Deepa Dubey, Deepak Dekate
Abstract—This paper presents a circular microstrip antenna
resonant at S-Band. Operating frequency (2.4 GHz) fed using
transmission line model. The position of Microstrip line feed is
varied and their effect on the current distribution and return
loss has been observed. The antenna is of the radius of 17 mm.
The substrate is of rectangular shape with dimensions 60 mm
by 50 mm. Maximum gain of the antenna reaches above 5 dB.
It is observed that the position of feed has a significant effect
on return loss, gain and forward distribution. Height of the
substrate is 1.6 mm and dielectric constant of the substrate
material is 4.4 (FR4_Epoxy). The length of the inset feed is
varied as 12 mm, 13 mm and 14 mm.
|
Download
|
69 |
Design of a high bandwidth Ku-band patch antenna
with double-L shaped parasitic components and loaded
with superstrate
Jagdeesh Ahirwar, Deepak Dekate
Abstract—This paper presents a microstrip antenna resonant at
Ku-Band. Operating frequency (11.81 GHz – 18.47 GHz)
covers the complete Ku-band. The antenna maximum
dimensions are 30 mm by 30 mm. Patch footprints are 6.4 mm
x 7.1 mm. Antenna successfully manages to attain quite good
gain and very high bandwidth of about 45%. The antenna is
designed and simulated using HFSS 11.1.1. Ku band is
primarily used for satellite communications, most notably for
fixed and broadcast services, and for specific applications such
as relay satellites for both space shuttle and space station
communications.
|
Download
|
70 |
OSTBC Encoder design with less BER on FPGA
Pankaj Shingh Kshatriya, Vivek dubey
Abstract—An orthogonal space-time block code (OSTBC)
along with a minimum-BER and high SNR is Proposed and
analyzed. the aim is to reduce the BER with new fully
orthogonal fading matrix . The total number of branches that
is being used for processing at the receiver is compared and
computed. This paper works with Field Programmable Gate
Array (FPGA) designing of an entire digital wireless
communication for baseband system. The proposed BER
tester also can be said BERT integrates the modules of a
conventional communication system along with an AWGN
channel into a FPGA. The BER is calculated for a 4x4
MIMO system.
|
Download
|
71 |
Design of High Secure and Maximum Data Hiding
Technique Using Wavelet Transform
Priyanka Agrawal, Mahendra Rai
Abstract—Proposed work is a unique DWT based method for
steganography. The Covering image is divided into four sub
bands using transform technique DWT. Data is been hidden
inside HH, HL and LH sub-bands with a new fix mode of
data hiding process. Proposed work reduces the detectable
distortion in a joint photographic experts group (JPEG) file
during data hiding process, by introducing new region
selection rule. The new region selection rule considers three
factors, i.e., the horizontal difference (HD), vertical
difference (VD) and region size (RS). The JPEG image will
be split into number of blocks and each pixel in it will be
examined to calculate the variations. Depends upon the
variation, the amount of secret information will be hide in an
image. This proposed method of information hiding will help
to solve the security issues in computer networks.
|
Download
|
72 |
A Survey on Web Clustering Engine
Bhavana R.potrajwar
Abstract—World Wide Web is a very large distributed digital
information space. The ability to search and retrieve information
from the Web efficiently and effectively is an enabling technology
for realizing its full potential. Current search tools retrieve too
many documents, of which only a small fraction are relevant to
the user query. Web clustering engine greatly simplifies the
effort of the user from browsing e large set of search results by
reorganizing them into smaller clusters. It organizes search
results by topic, thus offering a complementary view to the flatranked
list returned by conventional search engines. This paper
highlight the main characteristics of a number of existing Web
clustering engines and also discuss how to evaluate their retrieval
performance.
|
Download
|
73 |
Deposition of AA5083 on Mild steel by Friction Surfacing:
Hardness and Wear Characterization
N.Navaneethakrishnan, V.N.Loganathan
Abstract—Friction surfacing (FS) is a solid state coating
technique with application of rehabilitation of worn out parts
and act as corrosion barrier. It is suitable to process aluminium
alloys as it does not require the fusion of neither coating nor
substrate, relying on solid state diffusion bonding mechanism.
The present study addresses the use of FS to deposit AA5083 on
mild steel, with emphasis on hardness and wear
characterization. Wear rate can be examined by Pin-On-Disk
method. Hardness of the coating can be determined by vicker’s
hardness survey. An improved coating hardness and wear
performance was observed while compared to previous results.
|
Download
|
74 |
A Quasi Z-Source Inverter with Battery for PV Power
Generation System
F.X.Edwindeepak, D.Sivapriya
Abstract—The Demand of renewable energy sources for power
production is rising from the period of time. Solar power plants
are play vital role in supplying increased power challenge. PV
array with battery based quasi z source inverter makes more
reliable under PV fluctuations. The energy storage device is
integrated to ZSI topology with no requirement for an extra
charging circuit. This modified system obtains the operating
characteristics from the conventional ZSI, with ability of
operating under low renewable (PV) power conditions. In order
to work below this circumstance, an energy storage device
capable of managing the load demand for a period of time is
required. A way to add the energy storage device is to install a
charger circuit that integrates it to the DC voltage rail of
inverter. However, this proposed system presents another way
to integrate the energy storage device without an extra charger
circuit.
|
Download
|
75 |
Predicting Distance and Time by using Mobile Phone Based
Participatory Sensing
K.Balachander
Abstract—A vehicular ad hoc network (VANET) use cars as
mobile nodes in Vehicular to create a network. A VANET
contain a number of vehicle communicate to the network in a
coverage area. The vehicle has a On Board Unit (OBU) that
transmit the information about vehicle or data sharing in any
process network communication process in done by this through
the wireless network. The proposed RSS is better than past
evaluation. The proposed of interference detection algorithm of
OBU to perform the high RSS in VANET. The OBU has a high
received power and increase the hop communication range. The
hop represent the communication between the source to
destination. The OBU deploying the better relaying in a network
to communicate and predict the vehicle status in coverage area.
|
Download
|
76 |
Towards Differential Query Services in
Cost-Efficient Clouds
D.Nagarajan, J.Ambika
Abstract—Cloud computing as an emerging technology is
expected to reshape information technology processes in the near
future. The basic idea of EIRQ is to construct a privacy
preserving mask matrix that allows the cloud to filter out a
certain percentage of matched files before returning to the ADL.
Cloud computing provide cost efficient solution for efficient
searching and also provide query services that allows each user
retrieve the matched files and using mechanism to retrieval of
efficient query services over encrypted data.
|
Download
|
77 |
Enhancing Security in Data Retrieval by Using Cipher-
Policy Attribute Based Encryption
Prasath
Abstract—In several distributed systems a user should only be
able to access data if a user possesses a certain set of credentials
or attributes. In this paper we use the DTN (Distributed Tolerant
Network) that is used to store and forward of data using for the
users to a network in data security. This paper presenting a
system for realizing complex access control on encrypted data
that we use Cipher text-Policy Attribute-Based Encryption in
Distributed Tolerant Network (DTN). In this, CP-ABE
techniques used for encrypted data can be kept confidential even
if the storage server is untrusted; moreover, the propose
technique is more secure against collusion attacks.
|
Download
|
78 |
Hiding in the Mobile Crowd: Location
Privacy through Collaboration
V.Selvakumar
Abstract—Smart phones are very effective tools for increasing
the productivity of business users. The smart phones allow end
users to perform several tasks and led to offering provide to
search a (LBS) Location Based Services. Existing process using
Bayesian classification mechanism of location base service
security is low privacy and the Adversary can easily access the
private information and location based services of the user. The
proposed solution of the problem using Epidemic model in a
centralized manner of introduce third party system and user
centric approach to provide privacy of a system between the
users and the LBS.
|
Download
|
79 |
To Implement the Frameworks to Reduce the Risks of
Fragmentness & Integrity Issues In M-Commerce through
Virtual Objects (VO)
S.M. Roychoudri, Dr. M. Aramudhan, Dr.K.P.N.V Satyasree, M.Sambasiva Rao
Abstract—The evolution of mobile communication technology has
fostered the development of new mobile multimedia applications in
various domains. One of the most important applications is mobile
commerce (m-commerce), which has an increasing impact in the
life of the citizens, and could represent one of the many
applications that contribute to the market success of the Internet of
Things (IoT). Security and privacy concerns are quite relevant in
m-commerce and IoT to protect financial and personal data of the
citizens. One of the main issues in mobile commerce is how to
ensure the security of the information needed to complete the mcommerce
transaction in a distributed environment with different
security frameworks. We have to consider that the protection of
the m-commerce transactions must also be done to protect the
privacy of the customer. In addition, the information of the mcommerce
transaction can be fragmented in different files in a
distributed m-commerce application, which can undermine the
integrity (another security goal) of the transaction. In this article,
we describe the design ofa m-commerce framework, where these
issues are addressed through a policy based approach, where the
access to the m-commerce transaction is regulated by policies. The
fragmentation and integrity risks are addressed through the
concept of Virtual Objects (VO), which have been defined in the
FP7 iCore project. Policies are associated to VOs and distributed
across the m-commerce applications. This paper describes the
main concepts of VO and the policy based framework and shows
how these concepts are applied to m-commerce in various scenarios
to evaluate their feasibility. We apply and demonstrate the benefits
of the proposed design to specific multimedia use cases of mcommerce
where different domains are involved. Such as mcommerce
system can be seen a basic underlying payment system
for a wide variety of multimedia applications.
|
Download
|
80 |
Logo Matching and Detection for Document Image
Recognition
Dr.B.B.M.KrishnaKanth
Abstract—Graphics detection and recognition are fundamental
research problems in document image analysis and retrieval.
logo detection and recognition continues to be of great
interest to the document retrieval community as it enables
effective identification of the source of a document. We
contribute, through this paper, to the design of a novel
variation framework able to match and recognize multiple
instances of multiple reference logos in image archives.
Reference logos and test images are seen as constellations of
local features (interest points, regions, etc.) and matched by
minimizing an energy function mixing: 1) a fidelity term that
measures the quality of feature matching, 2) a neighborhood
criterion that captures feature co-occurrence geometry, and
3) a regularization term that controls the smoothness of the
matching solution. We also introduce a detection/recognition
procedure and study its theoretical consistency.
|
Download
|
81 |
Wi-Fi: Current Technology,
Challenges and Future Directions
Parveen Kumar
Abstract—Wireless Networking has changed the way
people communicate and share information by
eliminating the boundaries of distance and location.
Although Wireless Networking is regarded as
Networking Future but still there are some unsolved
issues which is preventing the wide adaption of Wireless
Technologies. In this paper we have tried to discusses
latest wireless technologies: Wi-Fi. The objective in this
paper is to briefly describe the technology as well as the
benefits and risks involved in their implementation.
|
Download
|
82 |
Performance Evaluation of Clustered Based Routing
Protocol for Wireless Sensor Network
S Ravi Kumar, D Sreenivasa Rao
Abstract—In this paper performance of the clustered
based routing protocols for WSN in saving energy for
heterogeneous wireless sensor networks. In the sensor
network considered each node transmits sensing data to
the base station through a cluster-head. The clusterheads,
which are elected periodically by certain
clustering algorithms, aggregate the data of their
cluster members and send it to the base station, from
where the end-users can access the data. The cluster
based protocol has been carried out using NS 2.35.
|
Download
|
83 |
Effect of Metal Hydroxide Nanoparticles against different
isolated Bacterial Species
Akhilesh Kumar, Supriya Mishra, Madhulika Singh, Sujeet Kr. Singh
Abstract—A nanoparticle (or nano-powder or nano-crystal or
nano-cluster or nano-material) is a microscopic particle with at
least 1D less than 100nm.A variety of metal hydroxide
nanoparticles have shown success for use as vehicles for drug
delivery, targeted gene delivery, and tumour imaging. This is
typically because nanoparticles have a greater surface area per
weight than larger particles, which cause them to be more
reactive to some other molecules. In the present project work
preparation of metal hydroxide nanoparticles and toxicological
study of it on isolated bacterial species was done. In this study,
Zinc Hydroxide NPs, Iron Hydroxide NPs and Magnesium
Hydroxide NPs were rapidly synthesized from Zinc Nitrate,
Ferric Chloride and Magnesium Chloride respectively. And these
prepared different metal hydroxide nanoparticles were tested for
its antibacterial activity on isolated bacterial species Micrococcus
Leteus and Staphylococcus Aureus, by using agar well diffusion
method. The zone of inhibition was observed and recorded to
determine its antibacterial activity. The inhibition of bacterial
growth was tested for prepared nanoparticles on diluting it, by
MIC test. The term “nanoparticles” means only solitaire
nanoparticles. The maximum growth was inhibited by ferric
hydroxide nanoparticles and minimum growth of bacteria
inhibited by Zinc hydroxide and Magnesium Hydroxide.
|
Download
|
84 |
A Congestion Avoidance Scheme Based On Buffer
Occupancy
Goree. Narsimhulu, Dr.D. Sreenivasa Rao
Abstract—Recently many prominent web sites face so called
Distributed Denial of Service Attacks (DDoS). DDoS attacks
are a virulent, relatively new type of attack on the
availability of Internet services and resources. To avoid
denigration most of the commercial sites do not expose that
they were attacked that is the biggest challenges of the
researchers. Network congestion caused by DDoS attack can
be managed by AQM (Active queue Management).Random
Early Detection (RED) is one of the most prominent
congestion avoidance schemes in the Internet routers. To
overcome the limitations of the basic RED algorithm,
researchers proposed several variants of RED. For solving
this problem, this paper proposes a new mechanism to
improve RED algorithm, which is named BO-AURED (An
Adaptive RED Algorithm Combined With Buffer
Occupation and upper threshold). By matching router’s
buffer occupation with wq , minth , maxth,Uth and Pmax
parameter settings, to make BOAURED adapt to network
environment variation automatically. Simulation is done in
NS- 2.35 simulator environment. Simulation results show
that our new BO-UARED algorithm gives better performance
than RED and Adaptive RED. Comparisons are done in
terms of total average throughput, total packet drops, and
average packet drops. It will also increase adaptability of
RED.
|
Download
|
85 |
A Review on Partial Discharge Behavior in High
voltage Equipment
Jayshree Nagdev, Arti Bhandakkar
Abstract—Insulators are very important part of high
voltage power equipment. There are so many types of
insulators are used in high voltage power system to
protect the power equipment like gases, vacuum, solid
& liquid or a combination of these. It is very important
to keep the insulators in a normal or healthy condition
during its operation. Since insulators are always
available in impure form and weak points, voids, cracks
are present inside the insulators and this will create
Partial discharge (PD), which in cause of time reduce
the strength of insulation leading to a total or partial
failure or breakdown of insulation. Therefore detection
of partial discharge is very important task for electrical
engineers to keep the high voltage power equipment in
healthy or normal condition. Modeling of the partial
discharge process allows a better understanding of the
phenomena. In this paper a brief description of PD, PD
mechanism, classification of PD, effect of partial
discharge in insulating system.
|
Download
|
86 |
Android Application Development for beginners-
A Review
Dipika Jain
Abstract—Android is basically an operating system for
smartphones. But we find now integrated into PDAs,
touch pads or televisions, even cars (trip computer) or
net books. The OS was created by the start-up of the
same name, which is owned by Google since 2005.
Mobile users demand more functionalities and
innovative mobile platform in order to customize
their handset according to their personal desires. The
mobile community supporters, whether they are
application developers, service provider, or mobile
device manufacturers, all are trying hard to fulfil the
growing demands of customers. Mobile service
providers want to offer value-added services to their
customers in an organized and meaningful manner;
Application developers want the freedom to develop
more powerful, affordable, and innovative handset
applications; similarly mobile device manufacturers
want to produce reliable and affordable mobile
devices
|
Download
|
87 |
Optical Fibers for mitigating EMI issues
-An Overview
Uma S, MallanaGowda N
Abstract—As electronic devices become increasingly sensitive
and proliferate in number, electromagnetic interference (EMI) to
and from these devices is becoming increasingly important. EM1
can create several problems in electronic systems, such as
ground loops, system safety, cross talk, common mode noise, and
differential mode coupling. Over the years several techniques
have been developed to solve these problems. However, they
are cumbersome, impractical, inefficient, and expensive. The
fiber optics technology offers an excellent solution to overcome
EM1 problems altogether. This paper introduces the salient
features of fiber optics [1], as an alternate solution to EM1
problems. This paper focuses on the fundamentals of fiber
optics technology and how it can be used to eliminate EM1 from
electronic systems.
|
Download
|
88 |
An Experimental Study on Blended Cement Concrete
Kalaiselvi Nivedha.J, Saranya.K.P
Abstract—Blended cement is now being considered superior as
compared to conventional OPC category of cement. The partial
replacements of cement with combination of admixture such as Fly
Ash, Silica Fume are used for making blended cement concrete.
This fly ash, silica Fume which is released directly into
environment can cause environmental pollution. The various mix
proportion used for test are 0% (conventional), 10%, 20% and 30%
replacement of cement with combination of fly ash , silica
fume .The mechanical properties of conventional cement concrete
and blended cement concrete in R.C structures are studied. The
mechanical properties of conventional cement concrete and
blended cement concrete in R.C structures are compared. From the
mechanical property results beam specimens are going to cast for
both conventional concrete and blended cement concrete. Final
results deflection and crack pattern of obtained by blended cement
concrete beams are going to compared with conventional concrete
beams. Deflection and crack pattern of blended cement concrete
beams and conventional concrete beams are going to compare with
theoretical formulas.
|
Download
|
89 |
Smart Air-Travel Framework
Anita Jaware, Vaibhav Dhage
Abstract—Smart Air-Travel Framework is a
technological revolution that represents the future of
airline travel and its development, which depends on
dynamic technical innovation in a number of
important fields, from RFID to bio-metrics.
|
Download
|
90 |
Design of High Performance Edge Detector and Its VLSI
Implementation
Vinod Rajput, Abhishek Singh Tomar
Abstract—VLSI design of the image processing cores is the
main focus of the designers due to increase in image and video
processing applications within most of the devices. Moreover
the advancement in the VLSI technology with nano-scale
transistors dimensions results in further increase in
complexity of these devices. In several image processing
applications edge detection is the commonly used operation to
extract edge information available in the image. This
information is further used to evaluate other parameters very
efficiently. In this paper a novel low complexity and high
performance edge detector is proposed and implemented. The
proposed design is evaluated and compared over the existing
architectures. The simulation results show that the proposed
edge detector reduces area by 53.17% and delay by 2.04%
compared to the existing architecture.
|
Download
|
91 |
Energy Efficient Edge Detector Design for Ultra-low Power
Image Processing
Vinod Rajput, Abhishek Singh Tomar
Abstract—The image/video applications in the portable
devices such as smart phones have increased exponentially in
recent years. This results in exponential rise in the design
complexity of these devices. Moreover the advancement in the
VLSI technology with nano-scale transistors dimensions
results in further increase in complexity of these devices. The
highly complex devices consume significant amount of energy
while processing the signal. As the power/energy is the prime
concern for the portable devices, highly energy efficient
architectures/circuits are required to be developed. In several
image processing applications edge detection is the commonly
used operation to extract edge information available in the
image. This information is further used to evaluate other
parameters very efficiently. This paper a novel energy
efficient edge detector is proposed, implemented and
evaluated. The simulation results show that the proposed edge
detector reduces area by 63.5% and delay by 31.8% over the
existing well-known architecture.
|
Download
|
92 |
Hybrid detection of malignant breast cancer detection
Jaspreet Singh Cheema, Sumandeep kaur
Abstract—Breast cancer is the most common type of
disease found in women. It is the most frequent form of
cancer and one in 22 women in India is likely to suffer
from breast cancer [1].Breast Cancer is the leading
cause of death among women in many countries.
Detecting a breast cancer at the earliest stage possible
has the most important impact on prognosis.
Mammography is the most cost effective method to
detect early signs of breast cancer [2]. Microcalcifications
are calcium deposit, which can be
identified as tiny areas that are slightly brighter than
surrounding tissues [3]. In the current work we are
performing the modified k means cluster and micro
calcification technique. MATLAB has been used for the
simulation of this algorithm.
|
Download
|
93 |
Impact of Office Ergonomics on Business
Performance – (In Special Reference to Noida
Region)
Ankit Garg, Vaibhav Garg, Pankaj Dutta
Abstract—In the past few decades, there has been a
strong trend for corporate organizations and
businesses to reconfigure the spaces of their offices in
new ways and models. In addition, the shift towards
more exciting and flexible workplace environment
and the need to meet the diverse and growing
expectations and requirements of different employees
has led to the rise of debates about how and where
productive work is accomplished. In a 2003 survey by
Management Today magazine, virtually all (97 per
cent) of respondents said that they regarded their
place of work as a symbol of whether or not they were
valued by their employer. Office ergonomics have
been recommended by many studies as one of the key
guides to equipping employees at the workplace to
help produce best performance. It is the quality of the
employee’s workplace environment that most impacts
on the level of employee’s motivation and subsequent
performance. How well they engage with the
organization, especially with their immediate
environment, influences to a great extent their error
rate, level of innovation and collaboration with other
employees, absenteeism and, ultimately, how long
they stay in the job Al-Anzi (2009). This study helps
to assess the impact of office ergonomics on business
performance in Noida region; to analyze the office
design, finishes and furnishing at the offices in Noida
region, to assess the impact of office ergonomics in the
design, finishes and furnishing in terms of their
suitability and comfort of the employees; to identify
the impact of office ergonomics on employee health,
safety and security. Here in this study we use
convince sampling and the target sample was from
Noida region. We collect questionnaire by using
questionnaire method and the analysis is done by
using SPSS, correlation analysis and data was
represented by using percentages, frequencies, mean,
and standard deviation. The study demonstrated that
office ergonomics deficiencies at the offices in this
region which includes outdated office design and
décor, inadequate office illumination, un-ergonomic
office furniture, unsuitable office design and décor
have variedly impaired the performance of an
average employee by between 30 to 70 percent. The
study recommends the relocation of the office to a
purpose-built office facility that integrates high
standards of office ergonomics, and companies should
undertake post-occupancy evaluation one year after
occupation of the new office.
|
Download
|
94 |
Simulation Studies on Flow Enhancement in Mixed
Flow Pump With Modified Impeller Design Using
CFD Analysis
N.Ramasamy, K.Ganesan
Abstract—Stirred tank has been the research area
for many decades due to its applicability in
chemical, pharmaceuticals, polymers, food and
paints industries for variety of operation. Most of
the energy supplied by the impeller is dissipated in
the impeller region which leads to no uniformities
in the energy dissipation throughout the reactor.
From the survey taken from industry, it is
observed that most of the industries use disc
impeller. The disc impeller having major drawback
of lower mixing rate and high power consumption.
To overcome this, V-shape impeller is designed
with various blade angles. The turbulence of the
respective angle with various speeds has been
analyzed by using CFD software.
|
Download
|
95 |
Adaptive Fuzzy Logic in TCP/IP Networks using
PID controller
P. Danushapnadeesh, J.R. Thresphine
Abstract—We introduce a novel and robust active
queue management (AQM) scheme based on a fuzzy
controller, called hybrid fuzzy-PID controller. In the
TCP network, AQM is important to regulate the
queue length by passing or dropping the packets at
the intermediate routers. RED, PI, and PID
algorithms have been used for AQM. But these
algorithms show weaknesses in the detection and
control of congestion under dynamically changing
network situations. In this paper a novel Fuzzybased
proportional-integral derivative (PID)
controller, which acts as an active queue manager
(AQM) for Internet routers, is proposed. These
controllers are used to reduce packet loss and
improve network utilization in TCP/IP networks. A
new hybrid controller is proposed and compared with
traditional RED based controller. Simulations are
carried out to demonstrate the effectiveness of the
proposed method and show that, the new hybrid
fuzzy PID controller provides better performance
than random early detection (RED) and PID
controllers.
|
Download
|
96 |
Survey on Adaptive Fuzzy Logic in TCP/IP Networks
Using PID controller
P. Danushapnadeesh, J.R. Thresphine
Abstract—This paper presents a survey on active queue
management(AQM) scheme, Fuzzy Explicit Marking
(FEM), supporting explicit congestion notification (ECN),
to provide congestion control in TCP/IP best-effort
networksusing a fuzzy logic control approach. While many
AQMmechanisms have recently been proposed, these require
careful configuration of non-intuitive control parameters, and
show weaknesses to detect and control congestion under
dynamic traffic changes, and a slow response to regulate
queues. The proposed fuzzy logic approach for congestion
control allows the use of linguistic knowledge to capture the
dynamics of nonlinear probability marking functions, uses
multiple inputs to capture the (dynamic) state of the
network more accurately, and can offer effective
implementation. A simulation study over a wide range of
traffic conditions shows that the FEM controller outperforms
a number of representative AQM schemes in terms of queue
fluctuations and delays, packet losses, and link utilization
|
Download
|
97 |
A Novel algorithm for document search in unstructured
Network
Kanthimathi S, Gayathri RU VA
Abstract—Client-Server architecture is a network architecture
in which each node on the network is either a client or a server.
Each client is connected to a centrally located dedicated
computer called server. The server must be fast and should
have more storage capacity to contain all the data that needs to
be shared to the clients. In peer-to-peer network, computers
are connected individually such that there is no dedicated
server. All the computers are equal, termed as peers. Each
node on the network has the capability to share data and
resources with other nodes. In another words there is no
central authority that determines the network's resources
sharing policy. Each user has the right to decide what he would
or would not like to share. Each can act as both client and a
server. The Domination set-based search algorithm is analyzed
and the efficiency achieved is compared with the previous
algorithms that existed earlier. More specifically, the various
steps involved in searching, such as construction of a connected
dominating set (CDS) and the associated reduction rules are
studied. Performance results show that the Domination setbased
search algorithm helps in achieving more efficiency, thus
making it suitable for efficient searching of data in Peer-to-
Peer networks in an effective manner.
|
Download
|
98 |
To Evaluate Performance of the Dynamic Source Routing
Protocol for Mobile Ad-Hoc Network
Prince Sood, Jasmeet Singh Gurm
Abstract—Mobile Ad-hoc Network is considered as a new
paradigm of infrastructure-less mobile wireless
communication system. Routing in MANET is
considered a challenging task due to the frequent and
dynamic changes in the network topology. In this paper,
we evaluate the performance of one of the most popular
reactive routing protocols i.e. Dynamic Source Routing
(DSR) using various network performance parameters.
|
Download
|
99 |
Data Mining Prediction in Healthcare System
Anushree Ashok Wasu, J.S.Karnewar
Abstract—Data Mining is one of the most motivating area of
research that is become increasingly popular in health
organization. Data Mining plays an important role for
uncovering new trends in healthcare organization which in turn
helpful for all the parties associated with this field The main
purpose of data mining application in healthcare systems is to
develop an automated tool for identifying and disseminating
relevant healthcare information. The medical industries come
across with new treatments and medicine every day. The
healthcare industries should provide better diagnosis and
therapy to the patients to attaining good quality of service. This
paper explores different data mining techniques which are used
in medicine field for good decision making. Neural Networks are
one of many data mining analytical tools that can be utilized to
make predictions for medical data. From the study it is observed
that Hybrid Intelligent Algorithm improves the accuracy of the
heart disease prediction system. In this paper, we have focused to
compare a variety of techniques, application, advantage and
disadvantage and different tools and its impact on the healthcare
sector.
|
Download
|
100 |
Biomass Gasifier System: A Review
Rahul Lodha, Sushil Kumar Dixit
Abstract—Gasification is a thermo-chemical
process which converts solid biomass into a
mixture of combustible gases that can be used in
several applications. A downdraft gasifier was
designed and developed for running air cooled, single
cylinder, 4-stroke, direct injection diesel engine
developing a power of 5 kW, on dual fuel mode at a
rated speed of 1500 rpm. The producer gas was
introduced in the inlet manifold of engine at 81pm,
61pm and 41pm respectively. The emission and
performance characteristics of the engine were
studied for various gas flow rates at different loads
condition. On the behalf of moisture calculation, mass
flow analysis, energy flow analysis and elemental
balance can improved the efficiency of downdraft
gasifier.
|
Download
|