Sr/No/ |
Title |
Pdf |
1 |
Phenotypic Diversity of Acer ginnala (Aceraceae)
Populations in Shanxi
Jing Li, Yiling Wang
Abstract — Acer ginnala is the important economic plant, of which
gallic acid from leaf has significant anti-liver virus activity. To
understand the phenotypic diversity, the systemic investigation
on A. ginnala populations was carried out. 22 phenotypic traits
for 154 individuals from 8 A. ginnala populations were analyzed
to assess phenotypic variation and their relationship with
environment. Variance analysis, nested analysis, correlation
analysis and cluster analysis were used in this study. The present
results showed that phenotypic traits were variation significantly
different among these populations. The mean phenotypic
differentiation coefficient among populations was 74.42%, which
was far more than that of within populations with 25.58%.
Phenotypic variation coefficient ranged from 1.33% to 27.49%,
and the average value of variation coefficient of leaf, fruit, and
seed were 18.25%, 13.13% and 7.09%, respectively. Principal
component analysis showed the total of the first 4 principal
components was 87.30% , the contribution rates was as follow:
leaf rate > fruit rate > seed rate. Latitude was negative correlated
to key fruit traits of A. ginnala, while slope and aspect were
negative correlated to the leaf length and leaf width. 8 A. ginnala
populations could be divided into three groups based on the
cluster analysis. Understanding the phenotypic diversity of A.
ginnala and their relationship with its geographical environment,
it is most important to the further genetic diversity improvement
and protecting.
|
Download
|
2 |
Optimization of Heat Transfer Rate of Helical Fin-Tube
Heat Exchanger with Different Fin Pitch using CFD
Analysis
Ashok sahu, Anita Ahirwar, Ravi Vishwakarma
Abstract — The demand for effective and compact heat exchangers
are continuously increasing in the automotive industry,
refrigeration and air-conditioning applications has necessitated
the use of various interrupted surfaces to augment air-side heat
transfer. Fins are normally used to increase heat transfer
coefficient and increasing efficiency of heat exchanger. We are
using computational fluid dynamics (CFD) suitable software for
analyse the heat transfer rate of heat exchanger with different
boundary conditions, we can analyse easily all data as compared
to experimental setup. And find out best feasible solution by CFD
analysis. The objective of this study was to numerically simulate
the heat transfer and flow characteristics for a helical fin-tube
heat exchanger for different fin pitch (p) and different Reynolds
no.(Re) using CFD analysis software Ansys FLUENT . The
computational domain consists of air and copper pipe with
external helical fins of copper material. The air inlet temperature
are taken as constant & outlet air temperature , pressure drop ,
heat transfer coefficient , nusselt number , friction factor are
calculated subsequently with respect to different Reynolds
number. .In this study we numerically simulate the heat transfer
rate of helical fin of helical fin-tube heat exchanger for different
fin pitch (p) and different Reynolds no.(Re) using CFD analysis
software Ansys FLUENT.
|
Download
|
3 |
Optimal Solutions of Mean-Field Games Models &
Applications
G.sasikala, Dr.S.Kumara ghuru
Abstract — Mean – field Games are studied by means of reference
case applications. In this article, we provide reference case in
two main reasons. One is simple for explicit resolution, based on
Bellman functions are Quadratic and Stationary measures.
Secondly, inspire of its simplicity, the case is rich enough in
terms of more complex models that may not be as tractable as
this one. The stability can be deal with explicitly using Hermit
Polynomials.
|
Download
|
4 |
Modification of A57-Strategic Bomber Aircraft
Hariramakrishnan.L, David.V, Rishi Kumar.S
Abstract — A57–Strategic bomber aircraft combines of
unsymmetrical airfoil in cross section as well as with
NACA 23012 1935 inverted airfoil to improve the
performance of the vehicle .Compound delta wing is
embedded to decrease shockwaves and reach
transonic to supersonic (Mach no: 2.5). Five
afterburning turbojet engines were installed between
twin inward-tilted fins, providing up to 130,000kg of
thrust. After a brief background on the development
of the , A57 – strategic bomber aircraft And
previous research ventures, we including forward
swept wing (30degrees) to improve additional lift
forces and also to reduce drag forces. In addition to
that new install of forward swept wing to reduce
wing tip vortices. Future work involves new
inclusion of flaps in certain angle to permit
additional lift force and also to easy take off at
shorter distance itself. To attain specified work is
designed by “CATIA” and analyzed by “CFD”.
|
Download
|
5 |
Design and Performance Analysis of LCL Filter
in Grid Interconnected System
Kandur Prashanth Kumar, Rosaiah Mudigondla
Abstract — Aiming at the problem of filtering in the
grid-connected inverters, the mathematics models for
LCL filter are established. The values of capacitances
and inductances are calculated by analyzing the
related constraint conditions for the main parameters
of LCL filter. There are two ways to increase the
value of damping resistor of the filter capacitor. The
impacts on the stability and filtering property, in both
ways, are analyzed. The use of power converters is
very important in maximizing the power transfer
from renewable energy sources such as wind, solar, or
even a hydrogen-based fuel cell to the utility grid. An
LCL filter is often used to interconnect an inverter to
the utility grid in order to filter the harmonics
produced by the inverter. Although there is an
extensive amount of literature available describing
LCL filters, there has been a gap in providing a
systematic design methodology. Furthermore, there
has been a lack of a state-space mathematical
modeling approach that considers practical cases of
delta- and wye-connected capacitors showing their
effects on possible grounding alternatives. This
project describes a design methodology of an LCL
filter for grid-interconnected inverters along with a
comprehensive study of how to mitigate harmonics.
|
Download
|
6 |
A Perception of novel Features Selection method for
Face Recognition using linguistic techniques
T.Shanthi
Abstract — The way people describe the facial features using
quite commonly encountered descriptors such as “long nose”,
“small eyes” and also allude to their feelings according to a
specific person like “seems to be nice”, may be utilized to
enhance automatic face recognition systems. The faces are
represented using a set of key points; and then a matching
algorithm is applied to find the similar faces in the test data using
a few training faces. To address this aspect, one can engage the
linguistic descriptors and the linguistic modeling. A face
recognition approach using the SIFT features has been proposed
in that finding the subset of those features, which are more
useful for face recognition, will lead to better results for the face
recognition problem.
|
Download
|
7 |
Analysis on the effect of change in dimension of
capacitive load resonant frequency of PIFA
Yashoda Ben, Zohaib Hasan
Abstract — This paper presents a planar inverted F-antenna
which works on 900 MHz and 1800 MHz This paper analyses
the changes in resonant frequency with the change in
dimension of capacitive loading slot. It is observed that there is
an apparent shift in the resonant frequency when the length of
the slot is changed. As shown in fig. 1 the designed antenna is
about the dimension of a standard mobile phone. Largest
dimension of the antenna is 40 mm 80 mm. The patch is 8 mm
above the ground plane. Dimension of the patch is 20mm x 40
mm. The substrate used is air (dielectric constant=1.0006). The
design and simulations are done by using HFSS.
|
Download
|
8 |
Design High Speed and Area Optimised dual Key
Encryption using VHDL: A Review
Neelam Soni, Shivam Solanki
Abstract — Arrange Security and double key cryptography
in rapid systems requests for particular equipment to
coordinate with the quick system. These equipment
outlines are being created utilizing reconfigurable FPGA
innovation to bolster mass calculation. In the
cryptographic module, Dual key International Data
Encryption Algorithm (IDEA), a symmetric key piece
figure is been planned as the calculation for execution. The
plan objective is to build the information encryption rate
i.e. the throughput to a significant esteem so that the plan
can be utilized as a cryptographic processor in fast system
applications. Every one of the plans are coded utilizing
HDL dialect VHDL and are integrated utilizing Xilinx ISE
9.2i for confirming their usefulness and working. Vertex
IV ace FPGA is picked as the objective stage gadget for
acknowledgment of the proposed plan. Our work is chiefly
in view of outlining a proficient engineering (IP) for a
cryptographic module for secure information trafficking
and a system interruption identification framework for a
rapid system. The entire outlines are coded utilizing
VHDL dialect and are confirmed utilizing Xilinx-ISE test
system for checking their usefulness.
|
Download
|
9 |
Designing of Digital PID Controller for blood glucose level of Diabetic patient by using various tuning methods
Rishabh Jain, ShwetaAgrawal, Rohit Sharma
Abstract — The aim of this paper is to design the digital PID controller for injecting insulin externally to the diabetic patient for maintaining the healthy blood glucose level. We have designed PID controllers using various tuning rules for examining the best performance in terms of different time response parameters like Overshoot, Settling time & rise time etc. Various tuning methods used for designing PID in this paper are Ziegler Nichols method and IPDT method. An approximate mathematical modelling of blood glucose level is also done. Finally the designed conventional PID controller is converted into digital PID controller.
|
Download
|
10 |
Effect of Additives on the Physicochemical Properties of
Fried Groundnut Oil
Edet W. Nsi, Emmanuel J. Ukpong, Aniekan E. Akpakpan, Edidiong E.Ikpe
Abstract — Fried groundnut oil was obtained from a commercial
chin-chin seller. The same product (king’s oil) was bought from a
commercial market in Uyo, Akwa Ibom State. Air dried
additives (orange peels) were cut into chips, different quantity
were added to the fried oil and heated to 60oC for 10min. The
additive was filtered from the fried oil. The fresh oil, fried oil and
fried oil + additive were characterized using standard methods.
The results revealed the heating/frying of oil affects the
physicochemical properties of oil. The results also revealed that
most of the chemical properties of the oil that were altered by
frying were restored by the addition of additive. However the
groundnut oil that is presently discarded as waste after frying for
several time can be utilized in the production of some industrial
products like soap, shaving cream and margarine and can also be
re-use for cooking, if suitable additive such as orange peels which
is eco- friendly, cheep and readily available is added to it.
|
Download
|
11 |
Qualitative Analysis of Oil Palm (Elaeis Guineensis) Bunch
Refuse Ashes
E. E. Ikpe, I. E. Willie, E. W NSI, E. E. Emmanuel
Abstract — The qualitative analysis carried out on the Elaeis
guineensis fruit Bunch refuse ashes showed the presence of
nitrogen, sulphur and chlorine as the major elemental
constituents. The study also proves that the material contains
Nitrogenous basic compounds. Thus primary aromatic anime is
very prominent as the material undergoes diazotization and
coupling reaction to form dye. Also the above assertions were
based on the test, observation and deductions derived from
literature and laboratory work which include Alkalinity test,
solubility test, elemental and functional group analysis.
|
Download
|
12 |
Cipher text multi level encryption using cloud
computing
Vidya.G, G.Saradhambal
Abstract — In this paper, we are discussed about the
fulfilment of Data Leakage in Malicious
Environment. A data distributor has given the actual
data to a set of allegedly trusted agents. Some of the
data are leaked. The distributor must evaluate the
possibility of the crevice data and should identify data
should came from one or more agents, as opposed to
having been individually gathered by other means.so,
we proposed a data collection strategies to improve
the probability of identifying crevices. These method
do not built on alterations of the released data. In
some cases, we can use some “realistic but fake” data
records to improve the detecting crevices and
identifying the guilty party. While sending data
through the network, some illegal users access the
data. The proper security should be provided while
sending the useful data over the network. Now a days,
the usage of smartphones has been increased. Using
some applications in smartphones, the third party can
access the data easily, due to this the confidentiality
must be affected.to avoid this kind of data leakage we
propose the data lineage mechanism. We give fake
information to the guilty agent. We develop and
analyse the novel accountable data transfer protocol
between two entities within a maliciousenvironment
by building upon oblivious transfer, robust
watermarking and signature primitives. Finally, we
apply our framework in the important data leakage
scenario and social network, to evaluate the
practicality. In general, our lineage framework for
data transfer, to be a key step towards achieving
accountability by design.
|
Download
|
13 |
Efficient multikeyword search results verification on
encrypted outsourced data
B.Abarna, A.Divya
Abstract — With the advent of cloud computing
becomes ubiquitous, more and more data owners are
annoyed to outsource their data to cloud servers for
great expediency and condensed cost in data
management. The shielding data privacy, sensitive
data have to be encrypted before outsourcing, which
performs conventional data exploitation based on
keyword based document retrieval. The majority of
existing techniques are focusing on multi-keyword
fuzzy search, converting the keyword into bigram set
that will be increases the Euclidean distance and the
vectors are be hardly ever threshold in the same bit.
A keyword transformation based on unigram, it will
be reduce the Euclidean distance between the
misspelled keyword and correct keyword. Based on
this schema, a deterrent based method, multiple data
owner are exchange the data will be verifying into the
cloud server and user will give a secret information
and construction the secret verification data buffer.
Finally, with though analysis and extensive
experiments, our schema is practically efficient and
then achieve high accuracy.
|
Download
|
14 |
Light Weight Security Protocol in IOV Network for
RSU –Internet of Vehicles
J. Bhuvaneswari
Abstract — A Roadside Unit (RSU) cloud and
Vehicular cloud are the operational backbone of
the vehicle grid in the Internet of Vehicles (IoV).
The architecture of the proposed RSU cloud
consists of traditional and specialized RSUs used
Software Defined Networking (SDN) to
dynamically instantiate , repeat and, or migrate
services. The detailed reconfiguration overhead
analysis will present to reduce the
reconfiguration which is costly for service
providers. VANET is a technology which
provide safety and comfort to devices in
vehicular environments. Emerging applications
and services, however require a computing and
networking models which demand new network
for VANET with encryption of data and provide
malicious attack from the third party.
|
Download
|
15 |
Equalization Model for Image Enhancement with
Histogram Based Analysis on Gamma Correction
D.Karthiga, D.Ragu Raman
Abstract — With the growth of technologies and the
popularity of imaging devices, billions of digital
images are created every day. Because of destructive
environment, the quality of the image is affected. To
overcome this defect image enhancement technique is
needed. This technique is used to enhance the image’s
quality. Many previous studies proved that contrast
enhancement techniques are efficient to clean up the
unwanted noises and enhance the image’s brightness
and control it. In this work, we combine both grey
balancing and contrast enrichment to achieve the
good tone even as preserving contrast of an image
using linearity and non-linearity functions of
histogram transform.
|
Download
|
16 |
Secure data transmission in cloud computing with
trusted third party using encryption/decryption
technique
S.Kavipriya, D.Jaya Kumar
Abstract — Off-site data storage is a one of the application into the
cloud that relieves the customers from focusing on data
storage system. However the outsourcing data to a
third-party organizational control entail serious
security concerns. Data leakage may occur due to attack
by other users and machines in the cloud. Since it
involves multiple steps in encryption and decryption it
will takes more time. To proposed some of the data
security for cloud environment for trusted third party
and then data security will be provides (a) key
management (b) access control, and (c) file assured
deletion. It provides variety of services over internet
such as, software, hardware, data storage and
infrastructure. We use multiple key managers, each
hosting one share of key. Multiple key managers avoid
single point of malfunction for the cryptographic keys.
|
Download
|
17 |
Efficient Similarity Search in Web Player
M.Nandhini, P.Divya
Abstract — Similarity search is promising criteria in
data mining technique which returns matching data .
To improve the similarity search, The proposed to use
top-k query matching algorithm which involves
getting multiple input from the user and produce
better similarity search over the data. According to
our algorithm it gives three kind of results based on
similarity such as exactly matched, almost matched
and moderately matched to the typed query.
Moreover we can view any kind of data through the
application such as audio, video ,pdf and other text
format data’s. And more important it gives
suggestions based on similarity. This project’s some
other skin texture and rest of the portions are
explained in below contents.
|
Download
|
18 |
A Novel Keyword Based Query Search Technique
Using Ontology Process
J.Ramya, R.Vimala
Abstract — Natural Language Processing (NLP) is an
ontology-assisted way of programming in terms of
natural language sentences, eg, English. A structured
documents with content, sections, subsections for
explanations of sentences forms NLP document that is
actually a computer program. The objective of the
paper is to reduce the response time of server using
natural language processing for multiple news article
data. The proposed system is an ontology supported
information retrieval system. The first step involved
in this system is creation of ontology structure. This
ontology system paves a way to find real-time data to
its particular domain. Using the ontology structure
user information are segregated according to their
domains. The aim of the work is, a natural language
processing system which is capable of sorting user
data automatically by ontology in order to reduce
response time while search using a keyword.
|
Download
|
19 |
Smart Way Tracking To Identify Individuals Location Using
Android System with GPS
P. Subha priya, p. Rekha, d. Srimathi, s. Harishavardhini
Abstract — As the technology grows, every device becomes
portable where mobile plays the vital role in it. It has several
applications developed for the favor of user facility. Among that,
we also have an application in which with the help of GPS it is
possible to track the selected destination of user. The concept of
using GPS satellite has spread its roots in the field of location
management. We present a new approach of using GPS in order
to spot an individual’s location if they are missed in case of any
organizational tour or outdoor visit through a smart location
tracker application deployed in Android Operating System. It
has several benefits where one can monitor the children’s
continuously without any manual effort.
|
Download
|
20 |
Detection and prevention of packets through
receiver based multicast algorithm in Manet
R.Shekinah Jaya Backyavathy, R.Parthiban
Abstract — VANET is a developing technology to
achieve inter-vehicle communications, which
improves the road safety, alert messages, accessing
and sharing information’s and entertainment.
Vehicular Adhoc Networks (VANETs) is from mobile
Adhoc Networks (MANETs) is a challenging
approach for the intelligent transportation system
(ITS). The design of routing protocols in VANET is
important and necessary issue for support the smart
ITS. Even though rich literature in adhoc network
exists, the scale, availability of realistic traffic data
and vehicle equipment’s inspire the researchers to
study the unique characteristics of VANET. The aim
of the paper is to compare the characterization and
existing routing protocols of VANET.
|
Download
|
21 |
Dual Encryption Scheme with Owner & User
Control over Cloud Data
Suriya A
Abstract — Cloud is playing an important role in the
recent years. Cloud computing is the delivery of
computing services over the network. We can store
and process data using cloud. The data should be
encrypted and stored in the cloud for the security
purpose. Due to lack of security, the attackers or
intruders may hack the data which is stored in the
cloud .In the existing system, the encrypted text key is
maintained by either cloud administrator or file
owner. The proposed method uses dual encryption
scheme, so as to give more data security. In this
concept, one key is handled by the file owner and
another key by the administrator. Here, attribute
based AES (Advanced Encryption Standard)
algorithm is used to encrypt and decrypt the data.
User can access data in cloud using the encryption
key; the key will be changed automatically once the
access is over.
|
Download
|