Sr/No/ |
Title |
Pdf |
1 |
Force Based Sound Generator by Interfacing Force
Sensor with Arduino Microcontroller
Sowbakkiyam.S, Monisha.N, Monica.R, Maheswari.T, Sathishkumar.V.S
Abstract — Stress has become a part of daily routine for
millions of people, and if not dealt with correctly, it can cause
serious health problems. Stress produces the fight-or-flight
response. When it becomes hard to find your way out of the
descending twisting caused by irresistible stress and anxiety,
try turning to music. Music has the ability to quickly shift our
attitude, affecting our subconscious awareness where pesky
negative thoughts feed on our fears and fuel the fires of stress.
Researchers now know that playing a musical instrument can
switch off the stress response, improving physical and
emotional health. Playing music is a relatively inexpensive,
quick-acting solution that’s almost always available, and it
could just save your life. Playing music is like a mega-vitamin,
engaging more areas of the human brain than any other
activity. Music is a greathealing tool to aid you get through
difficult times. A morning walk or run, or even yoga or
stretching, waiting in traffic, overtime office hours, late hour
exam studies can become easier and more enjoyable if you
have music as your personal coach and companion. Drum
pants that helps you de-stress, release tension, or lift your
spirits. Drum pants can be used to reduce stress, Eases
anxiety, Decreases depression, Promotes relaxation, Increase
focus, Increases immune system, Reduces blood pressure,
Elevates mood, Alleviates pain. The drum pant is flexible
wearable that can be attached to any type of pant, The drum
pant has number of sensors which when tapped produces the
corresponding music in the android mobile to which the
sensors are interfaced via the Bluetooth.
|
Download
|
2 |
Analysis of Passenger Car Unit (PCU), at Signalized
Intersection on Sinhgad Road, Pune
M.N. Bajad, Yogeshwari Ghule
Abstract—Now days the traffic problem become complicated
and tedious. We all familiar with a thing, that the India is
developing country and densely populated. In India traffic is a
measure problem, we have been going through. From last 30
years it has been observed that, the traffic is detrimental to
people, all over the world. Among the million plus cities in
Maharashtra, Pune has the maximum ratio of vehicles per
thousand persons. There are some basic issues of measure cities
like Pune needs awareness and solution as soon as possible so as
to maintain proper growth in terms of basic development. The
problem concern with traffic in Pune city is increasing with every
passing day. In this paper an attempt is made to find passenger
car unit (PCU) value for sinhgad road intersection. Passenger car
unit (PCU) value of each type of vehicle is very essential for any
miscellaneous traffic flow. These may be regarding traffic flow
parameters, capacity, signal design, parking lots etc. The work
holds into account the influence of mixing of traffic, speed and
headway. These PCU values (devised in developed countries)are
not suitable for Indian miscellaneous traffic conditions, where
traffic is more diverse in nature, and driver do not follow lane
discipline. This paper existing basic methods and their suitability
for Indian traffic system. This paper also establishes the gaps in
research areas which needs further research in Indian traffic
condition. In a mixed traffic condition, where different types of
vehicles share the same roadway space without any physical
separation, the amount of collaboration is expected to change
with the mix characteristics. The interaction among the vehicles
is greatest during peak period on urban roads. The common
practice to analyze mixed traffic flow is to transform all vehicles
into equivalent numbers of passenger car units (PCUs). A
mathematical equation relating PCU for a vehicle type to the
influencing variables is suggested in this paper.
|
Download
|
3 |
Gray Hole Attack on Manet: A Survey
Rohit Katoch, Anuj Gupta
Abstract— In recent years mobile ad hoc networks have
become very popular and lots of research is being done
on different aspects of MANET. Mobile Ad Hoc
Networks (MANET)-a system of mobile nodes (laptops,
sensors, etc.) interfacing without the assistance of
infrastructure (access points, bridges, etc.). There are
different aspects which are taken for research like
routing, synchronization, power consumption,
bandwidth considerations etc. This paper concentrates
on routing techniques which is the most challenging
issue due to the dynamic topology of ad hoc networks.
There are different routing protocols proposed for
MANETs which makes it quite difficult to determine
which protocol is suitable for different network
conditions .This paper provides an overview of different
attack on routing protocols proposed in literature and
also provides a comparison between them.
|
Download
|
4 |
A Review on Manet with Various Attacks on Routing
Protocol
Vipin Verma, Saurabh Sharma
Abstract—In recent years, a vast research has been seen
going on in the field of Mobile Ad Hoc Networks
(MANETs). Due to limited resources in MANETs, to
design an efficient and reliable routing strategy is still a
challenge. An intelligent routing strategy is required to
efficiently use the limited resources. Also the algorithms
designed for traditional wired networks such as linkstate
or distance vector, does not scale well in wireless
environment. Routing in MANETs is a challenging task
and has received a tremendous amount of attention
from researchers around the world. To overcome this
problem a number of routing protocols have been
developed and the number is still increasing day by day.
It is quite difficult to determine which protocols may
perform well under a number of different network
scenarios such as network size and topology etc. There
are many attack in manet network which also decrease
the performance of the network Main objective of
writing this paper is to develop a system which having
very less effect on attacks & having high network
performance.
|
Download
|
5 |
A Medium Voltage Bidirectional Dual Active Bridge
Resonant DC-DC Converter
K Palanivelrajan, K Karthika
Abstract— The DC-DC converter which is capable of
transferring the power in both the directions is proposed.
The existing system has the DC-DC converter based on
immittance network is proposed which is acting as filter
and to achieve unity power factor. This immittance
network is helpful to attain the resonant condition. It is
making the system complex and the efficiency of the
system is decreased. To overcome this proposed system
has the resonant and dual active bridge converter. It
produces the resonant condition by the system
configuration. It works in normal as well as over current
operation. In the normal operation, the converter carries
out the resonant condition by the soft switching
techniques such as ZVS and ZCS, attained by frequency
control. In the over current operation, the diode conducts
the electric current in only one direction and prevents
exceeding the reference value and across the capacitor.
This is used to protect the circuit from over current. It is
functioning partly as resonant converter and partly as
dual active bridge converter with the constant switching
frequency. Thus over current protection is afforded by
the diode clamping and the power flow analysis is done by
the boost and buck modes using the simulation software
PLEXIM.
|
Download
|
6 |
Assessment of Fluoride and Heavy Metals Concentrations
in Toothpastes Marketed in Port Harcourt Nigeria
Tubonimi J. K. Ideriah, Charles C. Obunwo, Tamuno-opubo D. Eretoru
Abstract—The concentrations of fluoride and heavy metals in
toothpastes marketed in Port Harcourt were measured using
Ion-Selective Electrode method and Atomic Absorption
Spectrophotometer respectively. The results of fluoride
concentrations were 497-1453ppm in adult toothpastes, 498ppm
in pediatric toothpaste; 1408 -1452ppm in Local toothpastes and
498-1453ppm in foreign toothpastes. The results of heavy metals
concentrations were <0.006ppm Cr in all toothpastes, <0.05 to
12.2ppm Mn in local toothpastes, <0.05 to 10.8ppm Mn in
foreign toothpastes, 0.23 to 1.62ppm Fe in local toothpastes and
<0.03 to 0.45ppm Fe in foreign toothpastes. All the adult
toothpastes and local toothpastes analyzed exceeded their
permissible limits. Statistical analysis using t-test showed
significant difference (P<0.05) between the mean fluoride
concentrations in Local and Foreign toothpastes and no
significant difference (P>0.05) between Claimed and Measured
mean fluoride concentrations. This study showed that some
toothpaste contains fluoride and heavy metals at concentrations
higher than permissible limits. Furthermore that most
manufacturers’ claims are not reliable and some toothpaste
have questionable anti-caries efficacy due to high fluoride
concentration. It was recommended that adequate fluoride
concentration not exceeding permissible limit should be added
in toothpastes and Government should sensitize and create
awareness in people on fluoride concentration limit and effects.
|
Download
|
7 |
Psychosocial wellbeing of children among families
with parental conflict: the case of selected Kebeles in
Jimma, Implication for family and marriage
counselors
Bonsa Shume, Getachew Abeshu
Abstract— Parental conflict has hindered the growth and
progress of many homes and children in Ethiopia.
Many factors could be indicative for this disappointing
situation. The study, therefore, focused on identifying
psychosocial wellbeing of children among parents with
marital conflict in selected kebeles of Jimma town. A
descriptive research method was adopted for the study.
A total number of seventy six (76) respondents were
selected from Ginjo Guduru and Awetu Mendera
Kebeles’ of Jimma town using purposive sampling
technique with the use of Focus Group discussion and
interview guide to collect information from respondents
who participated in the study. The data collected were
carefully analyzed using narration. The finding of this
study has revealed that there are six major factors for
parental conflict. i.e. Money, Value conflict, Unsolved
past conflict, Power struggle between husband and wife,
Drug use /Bad Habit by one or both of the couple and
Announcement of laws permitting marital dissolution.
It was also discovered that children of parents with
extreme conflict were prone to difficulties to form
relation with others, poor academic achievements, lack
self-confidence. It is, recommended that family
counseling need to be emphasized by the stakeholders
(government, religious leaders, and counselors to
minimize the level of parental conflict in the family and
effort should be intensified to discourage conflict that
might intrude with family wellbeing.
|
Download
|
8 |
Optimization of Parameters by using of Grey-Taguchi
Approach in the Context of Fused Deposition Modeling
Vinay Singh
Abstract—Rapid Prototyping (RP) is a technology, which enables
fabrication of physical objects directly from CAD data sources.
Out of all commercially available RP processes, Fused Deposition
Modeling (FDM) uses heated thermoplastic filament which are
extruded from the tip of nozzle in a prescribed manner in a
temperature controlled environment for building the part
through a layer by layer deposition method. Simplicity of
operation together with the ability to fabricate parts with locally
controlled properties resulted in its wide spread application not
only for prototyping but also for making functional parts.
However, FDM process has its own demerits related with
accuracy, surface finish, strength etc. Hence, it is absolutely
necessary to understand the shortcomings of the process and
identify the controllable factors for improvement of part quality.
For improving dimensional accuracy of the part, Taguchi’s
experimental design is adopted and it is found that measured
dimension is oversized along the thickness direction and
undersized along the length, width and diameter of the hole. It is
observed that different factors and interactions control the part
dimensions along different directions. The Grey-Taguchi
approach has used for recommending optimal factors setting for
predicting and improving overall dimension of the considered
part.
|
Download
|
9 |
Designing of High Speed, Low Cost 32-bit Modified SQRT
Carry Select Adder in 45nm Technology
Gyanesh Savita, Vijay Kumar Chauhan, Tarkeshwar Dhote
Abstract—Digital logic circuits have became the indispensible
part for all electronics gadgets based on arithmetic and
logical operations, the complexity of designs are increasing
with each generation due to increasing need of number of
task, since all the arithmetic operation are dominated by
addition, therefore increasing the performance of the adder
will increase the performance of the whole design. In this
work, A comparison between Carry Select Adder and Square
root Carry Select Adder has been done as they provide
tradeoffs between area, power, delay (latency). By providing
schematic changes in regular design, a significant
improvement has been done in area, power, and delay. In this
work a modified basic circuit that is the core digital circuit in
design has been used, beside this a significant schematic
change has been done in half adder and Ex-OR Gate circuit
design, Entire work has been completed in 45nm CMOS
process Technology using TANNER TOOL.
|
Download
|
10 |
An Efficient and Secure DIT Technique for Image Encoding
and Compression
Sambangi Jithendra Kumar, Dr Ch. Ramesh, D.Prakasa Rao
Abstract—In addition to provide the security for data through
image, we are using the concepts of cryptography and image
processing. In this paper we are using both functionality for
security of data and image. Before transferring data we can
encrypt it by using cryptographic technique. In this paper we
are using triple DES algorithm for data encryption and
decryption. After encryption of data the cipher data can be
stored into image using LSB technique. After storing data the
image can be encrypt by using DIT (Data Inverse technique).
The completion of encryption of image the image can be
compressed by using Arithmetic compression and
decompression technique. The above architecture provides data
confidentiality and improves the performance. Now days
transferring data and image through network without losing
data integrity are a complex task to provide security of data and
image, we can use the cryptography techniques, image
encryption, and decryption and compression techniques. In this
paper we are using an efficient technique for provide more
security.
|
Download
|
11 |
A Novel Parallel Compression with Discrete Cosine
Transform
Patnala Prathyusha, Dr. Ch. Ramesh, M.Swetha Harini
Abstract—Compression of an image is always an interesting
research issue in the field of image processing. Parallel image
compression is a good solution to improve image compression
rate. In this paper we propose a secure and parallel image
compression technique over images. Initially image can be
segmented and performs parallel image compression with
Discrete Cosine Transform (DCT).Our proposed model gives
more efficient results than traditional approaches.
|
Download
|
12 |
Seismic Analysis of Multi-storied RCC Building with
Soft-storey: A Critical review
Vedant Mishra
Abstract—It’s the todays need to have a multi-storeyed building
which can give a parking and other type of services like shops,
marriage hall, commercial spaces etc. But these buildings with
open ground and other floors at different levels are fundamentally
vulnerable to breakdown due to earthquake. The main reason
behind the collapse of this type of building consisting soft storey is
drift created during earthquake. Thus this paper is to review its
behaviour during earthquake and to establish detail concepts of
building with soft-storey. According to past records soft-storey
buildings have regularly shown bad performance during past
earthquakes across the world for example during Kobe -1995,
Chi-Chi Earthquakes -1999, Turkey -1999, Taiwan -1999, Bhuj-
Gujrat earthquake -2001, Algeria -2003, and Nepal earthquake -
2003. As we know that main cause of failure of soft-storey is sway
mechanism during earthquake causing localized failure at the
soft-storey level and ultimately resulting complete building
failure. This is mostly due to the abrupt change in stiffness of a
soft-storey with respect to upper stiffed storey. Thus the analysis
of soft-storey is the todays need to control the failure particularly
in higher seismic zone IV and V mostly Northern and Eastern
part of India where Earthquake frequency is too much.
|
Download
|
13 |
Quad-copter using The Flight Controller
Prof. R. H. Nangare, Prof.S.M.Herur, Sonal Patil, Kartika Devar, Akash Kamble
Abstract—This is the research paper which represents
remotely operated Quad-copter system. The multi-rotor
helicopter also known as a quad rotor or quad copter is
designed with four rotors to create lift. Quod-copter is
controlled through a flight controller and RF transmitter and
receiver. There are two modes for operating the quad-copter
which are X-mode and + mode. The X-mode gives good
stability and balancing of the quad-copter. And, the
developed system is able to cope with load disturbance up to
250 g during the hover position. We are using Mode 2
transmitter which have 6 channels. We are using 2200 mAh
Lipo battery. Maximum battery time of Quad-copter is ten
minutes in indoor and 8 minutes in outdoor.
|
Download
|
14 |
On -Separation axioms in Topological
Spaces
V. Kokilavani, P.R. Kavitha
Abstract—In the present paper, we introduce, study
and investigate the following separation axioms:
- spaces (for i=0,1,2). Moreover, some of
special results and properties, which belong to them,
are studied.
|
Download
|
15 |
Performance Evaluation and Improvement in Academic
Abilities Using Prediction Analysis
Ravi Kumar V G, Vinay M G
Abstract—The education performance is a turning point for all
the students in academics. The data stored in educational
database contain hidden information for evaluation and
improvement of students’ performance. The ability to predict a
students’ performance is very important in educational
environments. A very promising tool to achieve this prediction is
Data Mining. The academic performance of a student is based
upon diverse factors like personal, social, psychological and other
environmental variables. The University/Institution will have the
ability to predict the students’ performance, so that, they can
manage and prepare necessary resources for the new students.
This helps the teacher to improve the student’s performance and
decides on those students who need special attention. This helps
in identifying the slow learners and to take actions at the right
time. Bayesian classification method is used on student database
to predict the present student’s performance.
|
Download
|
16 |
Short Term Load Forecasting using Artificial Neural
Network
Pragya Sharma, Sulochana Wadhawani
Abstract— Development of artificial neural network for short
term load forecasting is presented in this paper. Load
forecasting is the process for prediction of electric load.
Accurate load forecasting affects the economic operation and
reliability of system up to great extent. If the generation is not
adequate to accomplish the demand, it will lead the problem
of unbalanced supply and in case of surplus generation the
generating company will have to bear loss .For the optimal
power system operation and planning appropriate evaluation
of present and future electric load is needed. Many electrical
utilities are routinely forecasting load power based on
conventional methods. However, since the relationship
between load power and factors influencing load power is
non-linear, it is difficult to identify its non- linearity by using
conventional methods. To overcome these problems load
forecasting method using Artificial Neural Network (ANN)
with adaptive learning rate is being used in this paper. The
ANN model was trained by Levenberg Marquardt. The data
used for training is collected from Gwalior region of MPSEB.
The model for short term load forecasting was design and
implemented with MATLAB. The result was calculated by
Mean Absolute Percentage Error (MAPE) of 3.329 for the
forecasted day.
|
Download
|
17 |
Fault detection and classification in electrical power
transmission system using Impedance and artificial neural
network
Chetan. P Patil, Ajit. P Chaudhari, Rajesh.C Patil
Abstract—Transmission lines, among the other electrical power
system components, suffer from unexpected failures due to
various random causes. These failures interrupt the reliability
of the operation of the power system. When unpredicted faults
occur protective systems are required to prevent the
propagation of these faults and safeguard the system against
the abnormal operation resulting from them. The functions of
these protective systems are to detect and classify faults as
well as to determine the location of the faulty line as in the
voltage and/or current line magnitudes then after the
protective relay sends a trip signal to a circuit breaker(s) in
order to disconnect (isolate) the faulty line. This paper
presents the use of back-propagation (BP) neural network
architecture as an alternative method for fault detection,
classification and isolation in a transmission line system. The
main goal is the implementation of complete scheme for
distance protection of a transmission line system. In order to
perform this, the distance protection task is subdivided into
different neural networks for fault detection, fault
identification (classification) as well as fault location in
different zones. Three common faults were discussed; single
phase to ground faults, double phase faults and Double phase
to ground faults. The result provides a reliable and an
attractive alternative approach for the development of a
protection relaying system for the power transmission
systems.
|
Download
|
18 |
Design IIR digital filter Using Neural Network
Yogesh Babu Indoriya1, Prof. Karuna Markam
Abstract—The paper presents the design of IIR filter
using FDA tool and compare different filter that is
Chebyshev type 1,chebyshev type 2 and Elliptic the
using algorithm that is feed-forward back propagation
using neural network. As the bsimulation results shows,
the proposed neural based method is capable of
archiving a better performance for filter design.
|
Download
|
19 |
Performance Evaluation and Improvement in Academic
Abilities Using Prediction Analysis
Ravi Kumar V G, Vinay M G
Abstract—The education performance is a turning point for all
the students in academics. The data stored in educational
database contain hidden information for evaluation and
improvement of students’ performance. The ability to predict a
students’ performance is very important in educational
environments. A very promising tool to achieve this prediction is
Data Mining. The academic performance of a student is based
upon diverse factors like personal, social, psychological and other
environmental variables. The University/Institution will have the
ability to predict the students’ performance, so that, they can
manage and prepare necessary resources for the new students.
This helps the teacher to improve the student’s performance and
decides on those students who need special attention. This helps
in identifying the slow learners and to take actions at the right
time. Bayesian classification method is used on student database
to predict the present student’s performance.
|
Download
|
20 |
Performance and Emission Characteristics of 4 Stroke
Single Cylinder Diesel Engine Using Vegetable Bio Diesel
Blends With Diesel
Mahesh babu C, Nagendra prasad S, Shwetha C, Chaithra M C, Balasubramaniam N S
Abstract—In current scenario, there are continuously increasing
the number of automobiles and correspondingly increasing the
fuel consumption as well as fuel prices. Many researches are
looking forward to find an alternative source of renewable
energy. One such alternative to diesel fuel is bio diesel .Bio diesel
can be defined as fuel comprising of mano alkyl ester of long
chain of fatty acid derived from vegetable oil or animal fat. The
paper will discuss the use of diesel with VEGETABLE bio diesel
blends in four stroke diesel engine. This alternative fuel contains,
VEGETABLE bio diesel is blended with diesel. The scope of the
project is to investigate the effect of injection pressures on a
blend of 25%, 50%, 80% of vegetable bio diesel with DIESEL
and compare with pure DIESEL on the study of performance
and emission characteristics of the diesel engine. Four tested
fuels were used during experiment like 100% diesel and a blend
of 25%, 50%, 80% VEGETABLE biodiesel mixing in the diesel.
For those mixtures the brake specific fuel consumption (BSFC),
mechanical efficiency, brake thermal efficiency, mean effective
pressure are calculated. The gas emissions of oxides of nitrogen
(NOX), carbon-di-oxide (CO2), carbon-mono –oxide (CO), hydro
carbons (HC) are being measured by the use of AVL smoke
meter. The performance test was conducted at constant speed
with variable load. The experimental work is conducted on four
stroke single cylinder water cooled diesel engine.
|
Download
|
21 |
Congestion Control Using a Tri-level Marking
Algorithm in Multi-Hop Wireless Environment
N. Monisha, S.Sowbakkiyam
Abstract—With the growth of multi-hop wireless network,
an excessive demand for the limited network resources
results in more congestion. Gateway congestion control
under existing standard active queue management (AQM)
experiences performance degradations due to multiple
packet losses, high queuing delay and low link utilization, in
addition to that AQM’s require tuning of more parameters.
In this paper, a new proactive queue management algorithm
is proposed that supports end-to-end transmission control
protocol (TCP) congestion control through triple packet
marking. From the simulation results we have proved that
MLM has zero packet loss due to queue overflow and
improves the queuing delay by 0.1% with that of existing
standard AQM’s such as RED, DT, REM, and BLUE.
|
Download
|
22 |
An Overview of Data Warehousing and Design
Methodology
Manisha D. Rakhonde, Namrata R. Borkar
Abstract—A data warehouse is a “subject-oriented,
integrated, time varying, non-volatile collection of data that is
used primarily in organizational decision making and
reporting with computing”. Data warehouses are central
repositories of integrated data from one or more disparate
sources. They store current and historical data and are used
for creating analytical reports for knowledge workers
throughout the enterprise. Examples of reports could range
from annual and quarterly comparisons and trends to
detailed daily sales analysis. The data stored in the warehouse
is uploaded from the operational systems (such as marketing,
sales, etc.). The data may pass through an operational data
store for additional operations before it is used in the Data
Warehouse for reporting. This paper presents a roadmap of
data warehousing technologies, focusing on the special
requirements that data warehouses place on database
management systems (DBMSs) also type design
methodologies.
|
Download
|
23 |
Prediction and Visualization of Shopping Trends
in E-commerce using Data Mining Techniques
Ashwini S
Abstract—Data Mining is the process of discovering
interesting patterns from large datasets. Prediction of the
current shopping trends can be done using frequent
pattern mining technique. The algorithm such as Aproiri
and FP-tree has no visualization of the frequent patterns
and also consumes more time for analyzing large datasets.
Works reported until now have reduced the time
consumption for analyzation but does not visualize the
generated patterns. This paper presents the visual
exploration of frequent patterns for prediction of
shopping trends using Boyer-Moore and Aproiri
algorithm. The generated frequent patterns are visualized
into different graphs- Month Wise, Support vs Patterns,
Confidence vs Patterns and Profit vs Patterns.
|
Download
|
24 |
Kinetics of Oxidation of 2-Pentanone by Nicotinium
Dichromate
Rajesh Kumar Sharma, H.P. Dwivedi, Deeksha Shrivastav, Shikha Mishra
Abstract—Now-a-days Nicotinium dichromate (NDC)
has drawn the attention to several laboratories and is of
academic interest due to its vast and wide application in
allyl alcohols, kinetic and Non-kinetics oxidations of
compounds. Nicotinium dichromate (NDC) is nonhazardous
and easy to handle. The most important
advantageous feature of this oxidant is that the
potential of this industrial oxidants is about + 1.101 V
being a moderate strong oxidant, it consumes little time,
gives maximum products yields. The advantage to
employ NDC in oxidation kinetics, its easy preparation
and stable nature has leaded us to choose for the
present investigation as an oxidant. Owing to possessing
of reactive carbonyl group and tautomer phenomenon
ketones are the subject of the interest. The relevant
literature pertaining to the undertaken 2-butanone
reveal that oxidations carried out by an NDC is very
rare and scanty and none of the researcher acclaimed
the use of NDC in probing the oxidation kinetics of 2-
pentanone with it, thus the author has chosen NDC as
an oxidant for kinetics study of ketones. The tautomer
equimolecular ketoenol dynamic equilibrium creates
complication and interesting mechanism due to
structural change such as methyl etc. in presence of
electron releasing and electron attracting groups with
the enol from of the substrate. In this equilibrium
shifting of α-halogen atom takes place to carbonyl
oxygen to produce reacting enol and lengthening of the
straight chain will enable me to take above text of task
for study in view of explaining the kinetics of 2-
pentanone.
|
Download
|
25 |
Modeling and Simulation of Routing Packet Using
Dijkstra Algorithm to Achieve the Shortest Routing
Path
Ilo S.F, Igbajar Abraham, Paul Kingsley Okah
Abstract—For a large number of interconnected
autonomous systems consisting of a distinct domain to
communicate to different nodes to forward information,
routing is a means of doing that, but in order to
determine the shortest routing part we need to examine
and simulate with Djikstra algorithm. Though there are
other algorithm but the advantages of Dijkstra
algorithm is that router computes routes independently
using the same original status data; they do not depend
on the computation of intermediate machines. Because
link status messages propagated unchanged, it is easy to
debug problems. Because routers perform the route
computation locally, it is guaranteed to converge.
Finally, because link status messages only carry
information about the direct connections from a single
router, the size does not depend on the number of
networks in the networks in the internet. Thus, Dijkstra
algorithms scale better than distance vector algorithms.
|
Download
|
26 |
Experimental Investigations and Production of
Methyl Ester Using Mahua Oil and their
Performance in CI Engine
Lohith A.G, S.S.Prabhakara , Santhosh B
Abstract—This paper is mainly concerned with an experimental
investigations carried out on performance of biodiesel obtained
from Mahua oil and its blends with diesel from 15%, 25%, 35%
& 45% by volume for running a diesel engine. The properties of
these blends were found to be comparable to diesel and
confirming to the American standards. Engine performance, (
brake specific fuel consumption, brake thermal efficiency, total
energy consumption& total fuel consumption ) Exhaust Gas
Temperature emissions & emissions (CO, HC, NOx & CO2 )
were measured to evaluate and compute the behaviour of the
diesel engine running on biodiesel at injection pressures 200 bar
& CR 17.5:1. The increase in power output, brake thermal
efficiency and reduction in brake specific fuel consumption were
observed. Injection pressure and compression ratios were found
to have significant effects on engine performance parameters.
The power output decreased with increase in the concentration
of Mahua methyl ester in diesel. The reductions in exhaust
emissions and brake specific fuel consumption together with
increase brake power, brake thermal efficiency made the blend
of biodiesel in between MB15 to MB25 is found suitable
alternative fuel for diesel and thus could help in controlling air
pollution.
|
Download
|
27 |
Experimental Investigation on Performance and Emission
Characteristics of KOME in CI Engine
Santhosh B, S.S.Prabhakara , Lohith A.G
Abstract—This paper is mainly concerned with an experimental
investigation to study the performance and emission
characteristics using non edible - karanja oil methyl ester
(KOME). Biodiesel is a fatty acid alkyl ester which is renewable,
biodegradable and non-toxic fuel which can be derived from any
vegetable oil by transesterification process. In the present
investigation, karanja oil based methyl ester (biodiesel) is
produced by using calcinated calcium oxide, a heterogeneous
base catalyst by transesterification process. The produced
KOME is blended with diesel were tested for their use as a
substitute fuel for diesel engine. Experiments were conducted for
Injection pressures of 200bar and 225bar, keeping compression
ratio of 24:1 as constant, to study the performance and emission
characteristics of a direct injection diesel engine using blends of
karanja methyl esters with diesel on a 10, 20, 30, 40 and 50%
volume basis, respectively. The properties of these blends were
found to be comparable to diesel and confirming to the American
standards. Engine performance, (brake specific fuel
consumption, brake thermal efficiency, total energy
consumption& total fuel consumption) Exhaust Gas
Temperature emissions & emissions (CO, HC, NOx & CO2) were
measured to evaluate and compute the behavior of the diesel
engine.
|
Download
|
28 |
Evolution of Channel Profile with Seepage
Harish Patel, Bimlesh Kumar
Abstract—Most of the stable channel predictors are empirical or
semi-empirical in nature except Lane’s (1953). Lane (1953) has
derived the stable channel parameters analytically by solving
various forces those can act on the sediment-water flow. It has been
noticed that existing stable channel predictors or Lane’s (1953)
theory do not account seepage as independent parameters. Seepage
flow from the alluvial channel modifies the channel hydrodynamics,
which may result in new equilibrium state other than Lane’s
geometric profile. Experimentation shows that channel based on
Lane’s geometric profile remains stable in case of no movement of
water from channel in downward direction. In case of downward
movement of water, channel attains a new equilibrium state, which
is very much different from the Lane’s geometric Profile.
|
Download
|
29 |
A Survey on Challenges and Security Aspects of
Mobile Cloud Computing
G.N.K.Suresh Babu, M.Kumarasamy
Abstract—Mobile Cloud Computing (MCC) integrates
mobile computing and cloud computing and it becomes
one of the frequently used term in software industries.
Mobile cloud computing becomes part of mobile users
daily life transactions. Mobile devices with Internet
capabilities have increased the use of mobile clouding
computing. Due to hardware limitations in mobile
devices, these devices can't install and run applications
require heavy CPU processing or extensive memory.
Cloud computing allows mobile users to synchronize
their data with remote storage and utilize applications
require heavy CPU processing or extensive memory
such as Microsoft Office or Adobe Photoshop, as they
run in a desktop computer. Further, Mobile cloud
computing refers to the incorporation of the elements of
mobile networks and cloud computing that offers
optimal services for mobile users. It offers on-demand
network access to a shared pool of configurable
computing resources (e.g., networks, servers, storage,
applications, and services) that can be rapidly
provisioned and released with minimal management
effort or service provider interaction. The more and
more information is placed into the cloud by individuals
and enterprises, security issues begins to grow and
raised. In this paper the author discusses the different
security issues that arise about how safe the mobile
cloud computing environment is.
|
Download
|
30 |
An Efficient Technique to Recognize License Plate
Using Morphological Edge Detection and Optical
Character Recognition
Saranya .S
Abstract—Basically video surveillance system is
used for security purpose as well as monitoring
systems. But Detection of moving object is a
challenging part of video surveillance. Video
surveillance system is used for Home security,
Military applications, Banking /ATM security,
Traffic monitoring etc. Now a day’s due to
decreasing costs of high quality video surveillance
systems, human activity detection and tracking has
become increasingly in practical. Accordingly,
automated systems have been designed for
numerous detection tasks, but the task of detecting
illegally parked vehicles has been left largely to the
human operators of surveillance systems. The
detection of Indian vehicles by their number plates
is the most interesting and challenging research
topic from past few years. It is observed that the
number plates of vehicles are in different shape and
size and also have different colour in various
countries. This work proposes a method for the
detection and identification of vehicle number plate
that will help in the detection of number plates of
authorized and unauthorized vehicles.This paper
presents an approach based on simple but efficient
morphological operation and Sobel edge detection
method. This approach is simplified to segmented
all the letters and numbers used in the number
plate by using bounding box method. After
segmentation of numbers and characters present
on number plate, template matching approach is
used to recognition of numbers and characters. The
concentrate is given to locate the number plate
region properly to segment all the number and
letters to identify each number separately.
|
Download
|
31 |
Surface Roughness Analysis In Machining Of
Aluminium Alloys(6061 & 6063)
S.Ramesh, P.Elangovan
Abstract—Surface is one of the most significant
requirements in metal machining operations. In order to
attain enhanced surface quality, the appropriate setting of
machine parameters is important before the cutting
operation take place. The objective of this research is to
analyze the effect of machining parameters on the surface
quality of aluminum alloy in CNC milling operation with
HSS tool. A multiple regression model developed with
spindle speed, feed rate and depth of cut as the independent
variable and surface roughness parameter ‘Ra’ as the
dependent variable. The prediction ability of the model has
been tested and analyzed using ‘Mini Tap’ and it has been
observed that there is no significant different between the
mean of ‘Ra’ values of theoretical and experimental data at
5% level of significance. In addition to that, they are going
to use Box-Behnken designs method which analyze the
surface roughness and it designs when performing nonsequential
experiments. That is, performing the experiment
once. These designs allow efficient estimation of the first
and second-order coefficients. Because box-behnken
designs have fewer design points, they are less expensive to
run than central composite designs with the same number
of factors.
|
Download
|
32 |
Infected Fruit Identification Using Watershed And
Support Vector Machine Technique
M.Rekha
Abstract—Nowadays, overseas commerce has
increased drastically in many countries. Plenty fruits are
imported from the other nations such as oranges, apples
etc. Manual identification of defected fruit is very time
consuming. This work presents a novel defect
segmentation of fruits based on color features with
Watersheld segmentation algorithm. We used color
images of fruits for defect segmentation. Defect
segmentation is carried out into two stages. At first, the
pixels are clustered based on their color and spatial
features, where the clustering process is accomplished.
Then the clustered blocks are merged to a specific
number of regions. Using this two step procedure, it is
possible to increase the computational efficiency avoiding
feature extraction for every pixel in the image of fruits.
Although the color is not commonly used for defect
segmentation, it produces a high discriminative power
for different regions of image. This approach thus
provides a feasible robust solution for defect
segmentation of fruits. We have taken apple as a case
study and evaluated the proposed approach using
defected apples. The experimental results clarify the
effectiveness of proposed approach to improve the defect
segmentation quality in aspects of precision and
computational time. The simulation results reveal that
the proposed approach is promising.
|
Download
|
33 |
Reactive Power Compensation of Hybrid Renewable
Energy System Using Pq Theory
L. Surya, P. Umamaheshwari
Abstract—The purpose of studied industry nowadays.
The intensive use of power converters and nonlinear
loads has contributed for the deterioration of power
quality, and this affects critical processes, resulting in
substantial economic losses. Therefore, the development
of equipment that can mitigate the problems that affect
electrical installations is of great interest. One such
equipment is obtained by the combination of a series
active filter and a shunt passive filter called as a Hybrid
Filter. This paper proposes a new hybrid filter to
improve the quality of power. It presents new technique
based on the instantaneous power theory which
represents instantaneous powers in time domain.
MATLAB/SIMULINK has been used to simulate the
proposed system. The simulation results reveal that the
proposed method yields better solution for improving
power quality.
|
Download
|
34 |
An Advanced Approach to Power Quality Issues by Using
Unified Power Quality Conditioner
Habeeb Mohammed K.K, S.Ramkumar
Abstract—In this paper presents an advanced approach to
power quality issues by using unified power quality
conditioner (UPQC) connected to three phase four wire
system (3P4W). In the fourth wire for the 3P4W system
uses the neutral of series transformer and it will be at
virtual zero potential during all operating conditions. A
four-leg voltage source inverter topology is used for shunt
part to compensate the neutral current flow toward
transformer neutral point. By connecting nonlinear load to
3P4W system with Unified Power Quality conditioner there
exist many power quality problems, mainly unbalanced
voltage and current. We can compensate the current
unbalance present in the load currents by expanding the
concept of single phase P-Q theory. This theory applied for
balanced three phase system and for each phase of
unbalanced system independently. Based on unit vector
template generation a new control strategy is proposed to
the control algorithm for series APF. The functionality of
the UPQC is provided the MATLAB/Simulink based
simulations.
|
Download
|
35 |
Energy efficient modified partial
Product generator for redundant binary multipliers
S.Geethamani
Abstract—Due to its high modularity and carry-free
addition, a redundant binary (RB) representation can be
used when designing high performance multipliers. The
conventional RB multiplier requires an additional RB
partial product (RBPP) row, because an error-correcting
word (ECW) is generated by both the radix-4 Modified
Booth encoding (MBE) and the RB encoding. This incurs
in an additional RBPP accumulation stage for the MBE
multiplier. In this paper, a new RB modified partial
product generator (RBMPPG) is proposed; it removes the
extra ECW and hence, it saves one RBPP accumulation
stage. Therefore, the proposed RBMPPG generates fewer
partial product rows than a conventional RB MBE
multiplier. Simulation results show that the proposed
RBMPPG based designs significantly improve the area
and power consumption when the word length of each
operand in the multiplier is at least 32 bits; these
reductions over previous NB multiplier designs incur in a
modest delay increase (approximately 5%). The powerdelay
product can be reduced by up to 59% using the
proposed RB multipliers when compared with existing RB
multipliers.
|
Download
|
36 |
Monitoring and Controlling Of Distribution Transformer
via Wireless Sensor Networks for Power Transformer Asset
Management
R.Dheivanai, P.Akshara
Abstract—Distribution transformers are one of the most
important equipment in power network. Because of, the
large number of transformers distributed over a wide area
in power electric systems, the data acquisition and
condition monitoring is a important issue. Here
transformers are damaged due to the oil damage. Oil
damage is depends on different parameters and
environmental conditions. Now in this system we are
concentrating on temperature of transformer and oil tank
level. In this system temperature and oil level monitoring
and control action is performed based on the AVR
microcontroller. After interfacing the required
components user has to develop one application program
in embedded-c. Here controller is continuously reading the
temperature and oil level, and display on the LCD and PC
via ZigBee transceiver along with the set point. Hence the
chance of damage can be prevented. This will result in high
efficiency and long life of transformer, more than that the
safety and reliability of the electrical power system will
ensure.
|
Download
|
37 |
Buckling Analysis of Woven Glass fiber/epoxy
Laminated Composite Plate
V.Paranthaman
Abstract—The ‘composites’ concept is not a human
invention. Wood is a natural composite material
consisting of one species of polymer — cellulose fibres
with good strength and stiffness — in a resinous matrix
of another polymer, the polysaccharide lignin. Nature
makes a much better job of design and manufacture
than we do, although Man was able to recognize that
the way of overcoming two major disadvantages of
natural wood — that of size (a tree has a limited
transverse dimension), and that of anisotropy
(properties are markedly different in the axial and
radial directions) — was to make the composite
material that we call plywood. Bone, teeth and mollusc
shells are other natural composites, combining hard
ceramic reinforcing phases in natural organic polymer
matrices. Man was aware, even from the earliest times,
of the concept that combining materials could be
advantageous, and the down-to-earth procedures of
wattle-and-daub (mud and straw) and ‘pide’ (heather
incorporated in hard-rammed earth) building
construction, still in use today, pre-date the use of
reinforced concrete by the Romans which foreshadowed
the pre-tensioned and post-tensioned reinforced
concretes of our own era. But it is only in the last half
century that the science and technology of composite
materials have developed to provide the engineer with a
novel class of materials and the necessary tools to
enable him to use them advantageously. In this study,
the influence of cut-out shape, length/thickness ratio,
and ply orientation and aspect ratio on the buckling
of woven glass epoxy laminated composite plate is
examined experimentally. Clamped –free -Clampedfree boundary condition is considered for all case.
Experiments have been carried out on laminated
composites with circular, square and rectangular cutouts.
The thickness of the plate was changed by
increasing the number of layers. After the buckling
experiments micro electroscopic scanning was
performed for the failed specimens. Comparisons are
made between the test results, by using two different
approaches. The results shows effect of various cut-out
shapes, orientation of fiber, aspect ratio and length
to thickness ratio on the buckling load.
|
Download
|
38 |
Design of Modified Variable Latency Han-Carlson
Adder and Its Applications
Sasireka.S, Dr.Marimuthu C.N
Abstract—The variable latency adder, the exact
arithmetic function is replaced with an approximated
one called as speculation, that is faster and gives the
correct result most of the time. A novel variable
latency speculative adder based on Han-Carlson
parallel- prefix topology is proposed in this work that
is more effective than Kogge-Stone topology and its
used in FIR filters.
|
Download
|
39 |
An Improved enhancement method for colorful image
Sharanpreet Kaur, Manit, Naveen Dhillon
Abstract—Digital image processing (DIP) entails the change of
electronic information regarding improving the particular
image characteristics with the support of computer system.
The completing helps with maximizing quality, sharpness and
details of characteristics associated with interest towards data
removal and extra analysis. Contrast is an important factor
in just about any subjective evaluation of picture quality.
Recently much work is performed in the field of images
enhancement. In this paper, modification is done by using
fuzzy fusion as well as ant colony optimization based image
enhancement further by utilizing the edge preserving
smoothing hypothesis.
|
Download
|
40 |
Brain Signal Detection Methodology for Driver Alert
System Using Brain Wave Sensor
D.Biruntha, R.Mohan Raj
Abstract—Drowsiness and lack of attention leads to accidents.
These accidents can be avoided by monitoring the driver
attention level and blinking status. So, in our proposed project
work we are analyzing the mental activities of the brain using
EEG signals from the Brain- Computer Interface (BCI)
technology. This methodology consists of BCI which is the
interface between the human brain and the level analyser
unit. EEG electrode converts the muscular action into
electrical signals and which is sensed by a brainwave sensor
and wireless device i.e., BLUETOOTH which transmits the
raw data to the MATLAB for level analyzer unit (LAU) which
analyse the entire status of the driver.
|
Download
|
41 |
Real Time Embedded System for ATM
Authentication using Wireless Module
V.Gowri, S.Hemalatha
Abstract—In this project, a real time finger vein system for a
security in ATM machine is proposed. In ATM user or
bank sector, there is no enough security for users, so
provide more security to user finger vein method is used.
The finger-vein is a biometric authentication for personal
identification in terms of its own security. Everyone has
unique finger vein, and it cannot be stolen by anyone
because finger vein is inside the body it varies for everyone.
Initially, the finger of the users is stored in the database.
User finer vein is compared with a database; if it matches
the database allow the user to the further process. And
generate the OTP password for mobile devices. If it does not
match with the database, it display not authentication
person and alert by using buzzers.
|
Download
|
42 |
Bypassing Technique Based Braun Multiplier for Low
Power Consumption with Improved Speed
Kusum Sahu, Rahul Sinha
Abstract—A multiplier is one of the key hardware blocks in
most digital and high performance systems such as FIR filters,
digital signal processors and microprocessors etc. If the power
consumption of the multiplier block reduced, then reduction of
the power consumption of various digital signal processing chips
and communication systems could be possible. In this paper
4/8/16 bit Braun multiplier has been designed using bypassing
technique and a comparative study of all bypassing techniques
on the basis of their power consumption is done. At the last stage
of the multiplier KSA (Kogge Stone Adder) and RCA (Ripple
Carry Adder) is used for high speed and the low power
consumption. The implementation of Braun multipliers and its
bypassing techniques is done using Verilog HDL Xilinx 14.4 ISE
and it is verified using the Spartan6, device xc6slx45. After
comparing, it is concluded that mixed bypass multiplier is best
suited for situations where both delay and power are low. The
number of slices & LUT used is also less when compared to other
techniques. For 16 bit Row and Column Bypassing Technique
using KSA the delay and power found to be 28.118 ns and 0.184
Watt From other two methods (Row Bypass and Column Bypass)
it is found to be (28.679ns & 0.190 Watt) and (28.518 ns and
0.184 Watt) respectively.
|
Download
|
43 |
Design and Implementation of Serializer for SERDES
Transceivers
Lochan Varshney, Dr.Vishal Ramola
Abstract—Serial interconnects are the backbone of the modern
communication, so the choice of SerDes architecture can have a
good impact on system cost and performance. With the help of
serializer and deserializer in the communication system, the
power consumption and number of interconnects in the circuit
can be reduced with respect to parallel communication. This
paper reports a design of serializer architecture with the help of
multiplexer and double edge trigger flip flop. Concept used
behind designing the block of serializer is of CMOS
Transmission Gate i.e. Pass Gate. The advantage of this
technique in which input is sampled with clock which is half of
the original clock and is distributed for the same functional
throughput, which results in power saving in clock distribution
network. This proposed Serializer architecture is designed using
GDPK- 180 CMOS Technology and simulation is done using
Cadence Virtuoso with a supply voltage of 1.8V.
|
Download
|
44 |
Effect of IBA Concentration and Time of Plum
Cutting and Air Layering
S. N. Mozumder, M. I. Haque, Monira, S. Ahmad, S. Akter
Abstract—Experiments were conducted at the
Regional Spices Research Center, BARI, Gazipur
during January 2013 to August 2014 to evaluate effect
of IBA concentration and time of cutting and air
layering in plums. Cutting were placed with six levels
of IBA treatments Viz 0, 500, 1000, 1500, 2000 ppm
and dusting. Profuse shoot growth was observed but
no root was emerged in cuttings and all cuttings were
died after a few (25-30) days. Air layering was done in
four time (Mid-June, Mid-July, Mid-August and Mid-
September) with five levels of IBA Significant
variations on death of layers, rooting and leaf
production due to layering time with six IBA
concentrations (0, 500, 1000, 1500, 2000 ppm and
dusting). Layering time and IBA concentration
showed significant effect on rooting and success rate
of layers. The number of successful layer was
significantly higher in June (14.3, 57.33%) and July
(13.3, 53.33%) layering with 2000 ppm IBA
application and the success was nil (0.0) in September
layering without or lowest (500 ppm) concentration of
IBA.
|
Download
|
45 |
On Total Domination Polynomial in Graphs
J.Devaraj, S.Sowmya
Abstract—In this paper we find out the total domination polynomial
of Herschel graph, Bull graph , Wagners graph and for some
connected graphs such as H(n) , KS(n), ̂ ,
( ) ( ) (( ) ( ) ( )
|
Download
|
46 |
Improved Software Project Scheduling by Event Based
Optimization
J.Amala, S.Kavitha
Abstract—recent days Software development companies are
facing one of most important problem is project scheduling for
different projects. Scheduling is important that play vital role in
software project management. When the efficient project
planning is reduce the cost and time for the project management.
Some software modelling gives resource allocation and human
resource allocation even though the project managers facing
problems uncertainties in requirements, human resources. Still
there is no efficient approach yet proposed to solve uncertainty
events project scheduling. This research mainly focused about
resource plan and unexpected joining and leaving the staffing.
Some systems gives very good solutions for project scheduling
like ACO is effective approach that provide project scheduling
problems. But it is not satisfactory model to solve uncertainties
events project scheduling. This research presents improved ACO
based project scheduling algorithm to face uncertainty events in
project.
|
Download
|
47 |
Recognition of Malignant Nodes in Wireless Ad-hoc
Network based on Auto-Correlation function
Ambika V, Rummana Firdaus
Abstract—Preserving privacy of data and securing access to
data from unauthorized nodes in wireless ad hoc network have
attracted a lot of research and development effort in past few
years. In a multi-hop wireless network, nodes cooperate in
relaying traffic. An adversary can exploit this cooperative nature
to launch attacks. Malicious nodes that are part of the route
exploit their knowledge of the communication context to
selectively drop a small amount of packets critical to the network
performance. The data can be replicated by the malignant nodes
in network. The data is error prone if certainty is not assured
while packets are dropped. The common reason for packet
dropping in wireless ad hoc network is considered as the channel
error. The packet loss may also be due to malicious nodes.
Identifying if the packet loss is intentional or unintentional is
needed before computing packet loss rate. The Auto-Correlation
function based on position of packet loss is taken to account to
detect attacker. The truthfulness of detection is verified by
auditing mechanism based on Homomorphic Linear
Authenticator(HLA) cryptographic primitive. So the privacy of
data is maintained while auditing and ensures low transmission,
storage overheads and reduces resource contention. To keep
computation simple, packet-block based detection mechanism is
considered. Thus the implementation is useful to avoid packet
dropping attack in Wireless Ad hoc Network.
|
Download
|
48 |
Congestion Aware Routing Algorithm for NOC
Anshu Dhariwal, D.S.Gangwar
Abstract—Network on chip is a communication subsystem on
an integrated circuit. Network on chip has become a promising
solution for multi-core architecture now a days as NOCs are able
to scale communication links with the increasing number of cores
in the system. In this paper we use adaptive routing algorithm
for network on chip so that congestion in the network can be
reduced considerably. Adaptive routing is used as it reduces the
time for travelling the data between source and destination and
circuit will respond accordingly faster. Furthermore, adaptivity
requires a comprehensive, hardly intrusive, runtime,
observability infrastructure, i.e., monitoring components, in
order to gather data on the system.
|
Download
|
49 |
Multiple Cell Upset Correction using Decimal Matrix Code
for Enhanced Memory Reliability–A Review
Meenakshi, Atush Jain
Abstract—An important issue in the field of data storage is the
transient multiple cells upsets (MCUs) when the consideration is
reliability of memories exposed to the radiation environment.
There are many enhanced packaging techniques are offered
which defend the memory data from radiations and transients.
On the other hand, a particular packaging provides safety from a
limited variation of radiations. Owing the increasing demand in
the application in wireless communication field the devices are
exposed to surrounding switch is having a very wide range of
radiations. Subsequently, some additional data protection
techniques like Error correction codes (ECCs) are always
chosen for authenticating the data before it is processed. These
protection techniques use encoded data to be stored in memories.
An error correction code uses redundant bits to minimized delay
overhead in data correction are be stored in the memory. A
review on memory data error detection and correction code is
presented in this paper.
|
Download
|
50 |
Health Seekers Understanding Medical Terminology from
the Health Care Experts
R.Nithya, I.Anette Regina
Abstract—Recent year’s health service websites are dramatically
developed. In such health services Medical term and technical
verbal’s play vital role between the health seekers and health
care expert’s knowledge has caught up data access. To viaduct
this gap, this approach presents a scheme to label question
answer (QA) pairs by together utilizing local mining and global
learning approaches. Local mining attempts to the persons query
can be processed and replayed with healthcare experts that can
be no of experts. In local mining map all the user queries and no
more same kind of reply from experts have it in local mining.
However, it may suffer from data loss and inferior precision,
which are caused by the nonappearance of key medical concepts
and occurrence of unrelated medical terms. Information
technologies are transforming the ways healthcare services are
delivered, from patient’s passively embracing their doctor’s
orders to patient’s actively seeking online information that
concerns their health. Some time that medical terminology not
able to understandable normal health seekers. This research
presents the new approach that provides the health seekers may
convert medical terminologies into their local languages and they
can easily understand the Information.
|
Download
|
51 |
Impact of soccer training on leg strength among coastal and
Non costal soccer players
S.Tubin, M.Senthilkumar, Dr.R.Mohanakrishnan, Dr.M.Rajashekaran
Abstract—The study was designed to investigate the Impact of
Soccer Training on Leg Strength among Coastal and Non Costal
Soccer Players. To achieve the purpose of the study forty male
soccer players were selected as subjects and their ages ranged
from 18 to 23 yrs. The coastal area soccer players were selected
(n = 20) from St.Jude’s college of Arts and Science, Thoothoor
and non-costal area soccer players were selected (n = 20) from
Nesamani Memorial college of Arts and Science, Marthandam,
Kanniyakumarai district, Tamilnadu State. The duration of the
training period was restricted to twelve weeks and the number of
sessions per week was confined to three, which was considered
adequate enough to cause changes in fitness abilities and striking
skill performances of the soccer players. Leg Strength
performances were assessed before and after the experimental
period by using Leg lift with Dynamometer test. Two factor
ANOVA was used to analyze the collected data. The results of
this study showed that there was a significant difference between
coastal and Non Coastal soccer players on leg strength.
|
Download
|
52 |
VLSI Implementation of Energy Efficient Gaussian Filter:
A Survey
Shalini Upadhyaya, Shweta Agrawal
Abstract—In the modern VLSI design for the portable
gadgets, the prime concern is the power and performance.
Filter is the most commonly used processing block to filter out
the noise entered in the image/video at different level of
processing. The Gaussian filter is commonly used to remove
noise while maintains the structure of the object in the scene.
The high computation complexity is the challenge to the VLSI
designers. In this paper, an exhaustive literature review is
done and then the performance of the existing designs is
evaluated and compared. These existing designs are
implemented and simulated with benchmark input to compute
the efficacy over the existing architectures. The designs are
modeled on MATLAB and Tanner, simulated with
benchmark inputs and then quality and design metrics are
evaluated where the results show that filters provide images of
acceptable quality with different amount of error.
|
Download
|
53 |
Wireless Notice Board Using GSM for Multiusers
Shyamala C, Asha M
Abstract—Notice boards play a vital role mostly in educational
institutions. The events, occasions or any news, which has to be
passed to the students, will be written on the notice boards
present in every floor in the colleges or schools. The present
system is like, a person will be told the news and the user has to
update this news on all the notice boards present in the college
or school. This will be seen mostly during the examination
seasons. At present, when information has to be updated in a
notice board, it has to be done manually. In present electronic
systems, no matter how many displays are present, only a single
notice can be sent to all of the notice boards irrespective of their
places. To overcome this disadvantage, multiple displays along
with a decoder are used to select a particular display. The
information is sent through ATMEGA controllers by using
GSM technology.
|
Download
|
54 |
Use of Aloe Vera Juice for the Treatment of Water
Tejaswinee Anil Pawar, Sagar M Gawande
Abstract—Alum is the mostly used coagulant in the treatment of
water. But it has some carcinogenic effects. Therefore many
scientists suggested that to use natural coagulants. Natural
coagulants are the coagulants which obtained from natural
plants and animals. In this paper Aloe Vera juice has been used
to treat the water by the process of coagulation ad flocculation.
Sample collected for the treatment from Mutha River at the
station of Vitthalwadi.
|
Download
|
55 |
Image Error Reduction by Fusion Using Dual Tree
Discrete Wavelet Transform
Pragya Nema, Rajendra Patel, Anand Vardhan Bhalla
Abstract—This paper is related to an image fusion system based
on Dual Tree Discrete Wavelet Transform. This system reduces
error in the fused image. The various error parameters analyzed
are Mean Square Error (MSE), Root Mean Square Error
(RMSE), Mean Absolute Error (MAE), and Normalized
Absolute Error (NAE), Maximum Difference (MD).
|
Download
|
56 |
Segmentation Based Wavelet Compression Using
Biorthogonal Discrete Wavelet Transform
Pratishtha Jain, Megha Soni, Anand Vardhan Bhalla
Abstract—Image compression is currently a prominent topic for
both military and commercial researchers. Due to rapid growth
of digital media and the subsequent need for reduced storage and
to transmit the image in an effective manner image compression
is needed. Image compression attempts to reduce the number of
bits required to digitally represent an image while maintaining
its perceived visual quality. This work concentrates on the
compression of image based on segmentation using biorthogonal
discrete wavelet transform. The performance of this method is
compared with the available DWT compression technique. The
proposed system improves the Mean Square Error (MSE) and
Peak Signal to Noise Ratio (PSNR). Time of execution is also
reduced in the proposed system.
|
Download
|
57 |
Effect of Geometric Twist on Wind Turbine Blade
S.Sharmila, S.Anand
Abstract—Increasing need for fundamental research in rotor
aerodynamics and practical aspects, constraints were imposed on
the design. An important part of this work is to conduct a study
of the design trade-offs to determine the effect of the geometric
twist on the wind turbine and its energy capture of the rotor.
Another objective was to determine the necessary modifications
to the blade geometry and twist in aerofoil for a three-bladed
rotor configuration. This project aims to describe the approach
and process used to design a tapered/twisted blade, and to
provide performance predictions for the conventional wind
turbine blade and the updated model with geometric twist. The
aerodynamic performance of the blade with and without
geometric twist is analysed by using Computational Fluid
Dynamics and to increase the lift of the blade and to prevent over
speed of the rotor. Additionally, twisted blades tested for its stall
delaying characteristics.
|
Download
|
58 |
A Survey on various Security Mechanisms used in
Vehicular Ad-hoc Networks
Dr. A.Ranichitra, Dr. V.Lakshmi Praba
Abstract—Recent developments in wireless communication
technologies led to the evolution of Vehicular Ad hoc
Network (VANET). The main goal of VANET is to afford
communication between vehicles without negotiating
security. Adding security to VANET environment is
challenging due to the unique features of the network, such
as Dynamic topology, Mobility modelling and prediction of
the vehicles. Though security in VANET is a significant
challenge to face, identification and isolation of malicious
vehicles are very important. It is obvious that any malicious
vehicle altering or generating replay attack of the critical
messages could be ruinous to the other trusted vehicles.
Security Mechanism is a process designed to detect, prevent
or recover the communicating entities from various security
attacks. This paper discusses the various asymmetric
cryptography security mechanisms and its applicability in
various secure routing protocols of VANET.
|
Download
|
59 |
Context Aware Venue Suggestions System For
Cloud Based Architecture
Pratiksha Nagare, Nitin Shivale
Abstract—Nowadays, recommendation systems have
been significant evolution in the field of knowledge
engineering. There are many existing recommendation
systems that are based on collaborative filtering
approaches that make them easy to implement.
Performance of the existing collaborative filteringbased
recommendation system suffers due to cold start,
data sparseness, and scalability. Recommendation
problem is characterized by the presence of many
conflicting objectives or decision variables, such as user
preferences and venue closeness. This paper includes
Context Aware Venue Suggestions System for cloud
based architecture in mobile depending on their moods.
The MobiContext utilizes multi-objective optimization
techniques to generate personalized recommendations.
This system mainly depends upon the status updated by
user. Status helps to find location and with the help of
location we can trace places. In this system user can
update his status, according to that status system can
find the location of that user and system can also trace
the places nearby that location.
|
Download
|
60 |
Characterization of Ternary (Bi-Trivalent)
Polymetaphosphate Derivatives with Molecular Weight
Determination
Vishnu Kumar Khandelwal
Abstract—Ternary (bi-trivalent) polymetaphosphate derivatives
having the composition [NaxMIII
1-x/2aMII
1-x/2aPO3]n (where MII =
Mg(II), Ba(II), Ca(II), Ni(II), Cu(II), Sr(II), Zn(II), MIII =
Fe(III), La(III), Sm(III), Gd(III), x = 2/3,3/4, a = Valency of
metal ion) have been synthesized by fusion technique. Number
average molecular weights (Mn) of these derivatives have been
determined by end-group titration technique and weight
average molecular weights have been determined by intrinsic
viscosity measurement in 0.035N NaCl solution. Weight average
molecular weights (Mw) obtained by viscosity studies are higher
than number average molecular weights (Mn) values indicate
their polymeric nature.
|
Download
|