IJAIR- Volume 6 Issue 4 (April 2017)

 


Sr/No/ Title Pdf
1 PLC Based Bottle Filling Capping Labelling & Counting
Kolekar Yogesh D, Mane Vijay B, Patil Aniket s, Thombare Rachana

Abstract — Automation plays an increasingly important role in the world economy. One of the important applications of automation is in the soft drink and other beverage industries, where a particular the field of automation has had a notable impact in a wide range of industries beyond manufacturing. Automation is the use of control systems and information technologies to reduce the need for human work in the production of goods and services. In the scope of industrialization, automation is a step beyond mechanization. Whereas mechanization provides human operators with machinery to assist them with the muscular requirements of work, automation greatly decreases the need for human sensory and mental requirements as well. Liquid has to be filled continuously. For these kinds of applications. The trend is moving away from the individual device or machine toward continuous automation solutions. Totally Integrated Automation puts this continuity into consistent practice. Totally Integrated Automation covers the complete production line, from receipt of goods, the production process, filling and packaging, to shipment of goods.

Download
2 Survey on Cluster Analysis
Arun Marx.M, Pavithra.T, Praveena.V

Abstract — Data analysis plays a vital role for understanding various phenomena. Cluster analysis is a challenging field of research in which its potential applications pose their own special necessities. Clustering is used to group the similar objects in the datasets and further precede these clustering data to perform other data analysis techniques. This paper deals with the types of clustering techniques and the type of data used in each clustering technique. And the efficiency of clustering technique over classification is given in this paper. Several clustering techniques are discussed here to find out the suitable technique for different datasets.

Download
3 Self-Employment through Skill Development Initiative
S.Uma Maheswari, Dr.B.Mythili

Abstract — In Indian Economy there is a drastic changes occurred due to skill development of an individuals. Recent trends in the composition of employment indicate a migration from the work on the basis of Agricultural to the Industrial based & Service Sectors. India has one of the country deals with young & energetic with high potentialities of people for ensuring the inclusive Economic Growth. In this context this paper highlights the self employment of people through their own skill development.

Download
4 Design of Jitter Spectral Shaping as Robust with various oversampling techniques in OFDM
Alasapuri Ramya Sri , B. Nagarjuna , Guduru Kalyani , G.Pavani

Abstract — Deformation caused by the jitter acts as a limiting factor for the performance of the OFDM system in high data rate. The letter says that oversampling is used to reduce jitter noise. Two types of techniques, fractional oversampling and integral oversampling are considered. The simulation results are compared with the theoretical results of phase jitter analysis showing very precise obligations. Oversampling results in 3 dB reduction of jitter noise for every doubling of the sampling frequency.

Download
5 Design and Analytical Investigation of Disk Brake
Nitin A Patil , Ajay Mahawadiwar

Abstract — Each single system has been studied and developed in order to meet safety requirement. Instead of having air bag, good suspension systems, good handling and safe cornering, there is one most critical system in the vehicle which is brake systems. Without brake system in the vehicle will put a passenger in unsafe position. Therefore, it is must for all vehicles to have proper brake system. In this paper carbon ceramic matrix disc brake material use for calculating normal force, shear force and piston force. And also calculating the brake distance of disc brake. The standard disc brake two wheelers model using in Ansys and done the Thermal analysis and Modal analysis also calculate the deflection and Heat flux, Temperature of disc brake model. This is important to understand action force and friction force on the disc brake new material, how disc brake works more efficiently, which can help to reduce the accident that may happen in each day.

Download
6 Mechanization of bricks manufacturing
C.Prasanth kumar reddy, B. Lokesh kumar, Sathish kumar V S

Abstract — The provision of shelter is one the most basic demand of a Man all over the World. It is one the most important challenges a man faces in his life. The problem of good shelter varies from place to place. A good shelter provides, first and foremost Security and Privacy. It is an undisputed fact that shelter is one of the basic human necessities. However, irrespective of the importance of shelter, most people do not have access to good shelter, most especially in developing countries. Now a days time is more precious so people want to complete the work in less time so in building shelter bricks are the vital components that cannot be replaced by any another subsidiaries. Thus, the machine is very affordable for small scale enterprise (SME). In other words, bricks or blocks produced by using this machine are relatively cheap and affordable for those in the rural areas and for low income earners.

Download
7 A Survey of Various Algorithms to Achieve Fault Tolerance in Wireless Sensor Networks
S.Puvaneswari, S.hemalatha, B.Sangeetha

Abstract — We survey various algorithms for tolerating permanent and transient failures in Wireless Sensor Networks. These algorithms attempt to provide low-cost solutions to fault tolerance, graceful performance degradation, and load shedding in such systems by exploiting tradeoffs between space and/or time redundancy, timing accuracy, and quality of service. Here we describe various algorithms which are used to achieve fault-tolerant and increase the performance of a system. The algorithms are dynamic scheduling, off-line or static scheduling, and scheduling, a technique which is used the concepts of mathematical optimization to allocate tasks on the processors and derive fault tolerant and fault aware feasibility and diskless check pointing approach.

Download
8 IoT-On Demand based Location Aware System for Smart Museum
S.Gnanapriya, A.Karthik, N.AjayKumar

Abstract — In Existing system, today, museums and art galleries usually provide visitors either with paper booklets or with audio guides. Visits at museums are often considered boring. It is hard for museum’s curators to catch the attention of tourists. In particular, it is difficult to define in advance a tour for all the visitors, because interests may vary from person to person. To overcome all these a Cloud environment is maintained by the admin to store the details of the art work, a wearable device given to the user which acts as the camera, BLE is used to obtain the location of the user, camera sends the specific frames to the processing center and checks for the frame if the frame is been matched then the cloud content (audio, video, text) is been retrieved and sent to the user mobile phone.

Download
9 Efficient Multicast Authentication
B.Sangeetha, S.Puvaneswari, S.Hemalatha

Abstract — Conventional block-based multicast authentication protocols overlook the heterogeneity of receivers in mobile computing by letting the sender choose the block size, divide a multicast stream into blocks, associate each block with a signature, and spread the effect of the signature across all the packets in the block through hash or coding algorithms. They suffer from some drawbacks. First, they require that the entire block with its signature be collected before authenticating every packet in the block. This authentication latency can lead to the jitter effect on real-time applications at receivers. Second, the block-based approach is vulnerable to packet loss in mobile computing in the sense that the loss of some packets makes the other packets unable to be authenticated, especially when the block signature is lost. Third, they are also vulnerable to DoS attacks caused by the injection of forged packets. In this article we propose a novel multicast authentication protocol based on an efficient cryptographic primitive called a batch signature. Our protocol supports the verification of the authenticity of any number of packets simultaneously and avoids the shortcomings of the block-based approach.

Download
10 Energy Efficient Communication In Wireless Sensor Network
P.Nalayini

Abstract — Energy efficiency is the most promising approach for addressing the wireless sensor network in communication networks for wireless big data. In wireless sensor network the sensors are powered by battery that drains sooner or later and will have to be taken out and then replaced or recharged. In the existing system nodes have utilized same amount of energy for communication regardless of their distances. To deal with issue the proposed algorithm focused on efficient utilization of an energy based on the node distance. Maintaining the lowest transmission power in wireless sensor network is vulnerable to the interference fluctuations because of the bad signal-to interference-plus-noise-ratio (SINR). The proposed method is to harvest energy from radio frequency. The exact distance between the nodes can be calculated and obtained by RSSI measurement. The parameter of measurement model is determined by anchor nodes, and further corrects the measurement data, which can reduce the measurement error. Each node dynamically adjusts the transmission power and the received signal strength (RSS) target; hence the optimal energy is used for the transmission.

Download
11 Scientific Workflows Using Dynamic and Fault- Tolerant Clustering
R.Ranitha, A.Monika, L.Marutharasi

Abstract — In this project, we conduct a theoretical analysis of the impact of transient failures on the runtime performance of scientific workflow executions. We propose a general task failure modelling framework that uses a maximum likelihood estimation-based parameter estimation process to model work flow performance. Task clustering has proven to be an effective method to reduce execution overhead and to improve the computational granularity of scientific workflow tasks executing on distributed resources. However, a job composed of multiple tasks may have a higher risk of suffering from failures than a single task job. We further propose three fault-tolerant clustering strategies to improve the runtime performance of workflow executions in faulty execution environments. Experimental results show that failures can have significant impact on executions where task clustering policies are not fault-tolerant, and that our solutions yield makespan improvements in such scenarios. In addition, we propose a dynamic task clustering strategy to optimize the workflow’s make span by dynamically adjusting the clustering granularity when failures arise.

Download
12 A Comparative Study of the Customer Satisfaction between Postal Services and Nationalised Banking Services
Reshma S

Abstract — People have a propensity of saving out of their income to secure their future as future cannot be predicted. To be financially secure, people prefer saving scheme offering maximum return with minimum risk. Saving attitude offers safety net during emergency situations. The major banks in India are increasingly providing services through electronic channels such as ATMs, internet banking, Tele-banking and mobile banking. One of the biggest problems in banking today is the large and ever increasing population of the unbanked those who are not gaining the benefits of the regulated banking system and must rely on high cost fringe lenders to do simple transactions like cash their pay checks. The primary objective of the study is to compare the satisfaction level of customer between postal and nationalised bank. The significance of the study in the recent scenario is due to take in high service charge by the nationalised bank. So this study reveals that the customers trend of postal banking services.

Download
13 Collaboration Complexity Reducing Strategy in Cloud Computing
R. Priya, R. Jeevidha, V. Sowmiya, K. Kiruthiga

Abstract — Cloud computing is an innovative technology that has been applied to business. The cloud collaboration software industry is a rapidly developing sector with new key players breaking into the market each year looking to how we work and communicate. The project management process and its paradigm are changing. With Information and Communication Technologies it’s possible to work together with heterogenic teams, geographically spread, using web-based project management software. In these teams, the most important are the process by which the project is carried out. The collaborative project is associated with a virtual team that is a team with a real distance between their members compelled by a purpose. But a good virtual team relies on the inputs brought, the results produced, and the process to pass from the first to the second ones. All the process is held with trust, cohesion, relationship, communication, and coordination. The management process can face difficulties. So to face the difficulty it’s necessary to build trust between team members which rarely or never cross each other and consolidates all the tasks assigned to personally across projects and teams, and sorts them by priority. Hence the work based on multiple projects can be done easily without any collaboration complexities.

Download
14 Intelligent Decision Support System Towards Managing Production Of Firm
Akshay Kumar Sahu, Pradeep Sahu

Abstract — In last decade, each firm has begun to establish the production with rapid rate due to rich demand of goods with best quality. Many firm perceived the necessity to balance the production chain of organization. In the presented research work, a centroid approach merged with fuzzy set is applied on constructed G-F-A-L-R supply chain module for identifying a sick and strong chief driver of a firm; so that managers could hike their firm’s performance up to standard level in case of non wanted performance. An empirical case research of assumed gear and shaft manufacturing firm is presented; proposed DSS is active for tracing the GF- A-L-R supply chain’s sick and strong chief drivers.

Download
15 Intelligent Decision Support System Towards Measuring Performance Of Firm
Akshay Kumar Sahu, Pradeep Sahu

Abstract — In present era, it is realized in order to respond the production activities of individual firm in accordance with customer demand. It became necessitate to keep the various modern supply chains well. G-F-A-L-R (Green-Flexibility-Agility-Leanness- Resilient) SC strategies of SC worked influential to answer production of firms. In the presented research work, a multi criterion decision making performance appraisement module (consist of green flexibilityagility- leanness-resilient activities corresponding to their interrelated metrics) coupled with Fuzzy Performance Index mathematical model has been proposed to assess the overall performance of individual firm.

Download
16 A Study on Assessment of Nutritional Status of Housemaids and Its Effect on Their Health in Mumbai City
Nikita Waghere, Rekha Battalwar

Abstract — To assess the nutritional status of the housemaids and its effect on their health in Mumbai City.

Download
17 Automatic Scrap Segregation using PLC
Mangesh B. Nagapure, R. M. Deshmukh

Abstract — This paper deals with the problems faced while segregation of waste in urban and rural areas. Rapid surge in bulk and different types of metal and nonmetal scrap is serious issue due to urbanization and industrialization in the countries. Hence, we have segregate the scrap materials into metal and nonmetal categories using PLC mechanism. Also the aim of using PLC mechanism or any other type of separation of waste on a machine is to perform work. This system describes an Automated Scrap Segregation; we are developing a prototype for separating out metal and nonmetal particles using Programmable Logic Controller. In this system the scrap will be fed to the conveyor belt. Object Sensors will detect the Scrap material on the conveyor belt and start the rotation of conveyor belt. After this, metal Sensors which are clamped below the conveyor belt, will sense the metal particles and in turn stop the conveyor belt. A robotic arm attached to the system will extract the metal and will deposit it into a metal bin. The scrap material will be carried on further once the metal is extracted and dumped into a metal bin.

Download
18 Neighbor Position Verification Protocol for Non Line of Sight using Multiple Road Side Units in VANET
J.Shiny Susan, P.Chitra

Abstract — Vehicular Ad hoc Networks (VANETs) is a form of Mobile Ad-hoc Network (MANET), that provide communication and exchange of information among nearby vehicles, between vehicles and nearby fixed equipment, usually described as Road Side Unit (RSU). The information among vehicles is being exchanged through direct communication within each vehicle’s radio communication range .In reality, the radio frequency signals are susceptible to interference and the direct communication may be restricted by certain topographic features, man- made structures and other moving vehicles that are of different sizes and shapes. VANET environment is not only concerned on fixed obstacles like trees and buildings but also on moving objects on the road that causes the signal block. Obstacles create a Non-Line of Sight (NLOS) state that could prevent a vehicle from receiving consistent updates and Location information from its neighbors. To overcome NLOS condition rather than relying on Tall Vehicles for the choosing them as next hop relay candidates, Neighbor Position Verification Protocol(NPVP) is used in cooperative neighboring vehicles to provide optimal solutions in all possible ways. In order to prevent the vehicles from NLOS state the Location of the vehicles are identified by considering many scenarios in the road environment using a Common vehicle or a Road Side Unit (RSU). It will help to maintain localization services integrity and reliability. It prevents traffic jam and provides accident control.

Download
19 Bluetooth Enabled Energy Meter for Smart Housing and Smart Cities
M. Nandini Swami, Srividya Dyaram

Abstract — This research work primarily focused on energy meter reading, processing and transmitting information of energy consumed by a consumer. This work is based on application of Bluetooth technology embedded system development. Design is well focused on its flexibility, faster data transfer, low power consumption, cost effectiveness, data security, small size and light weight. In this work, an embedded controller is interfaced with the digital energy meter to get consumed power information in digital form. Then processes these pulses to calculate number of units consumed. The consumer will be able to check the consumption displayed on the LCD screen and also on the devices paired with the smart energy meter for continuous operation. The exponential increase in smarter and better metering, billing and payments systems rising is demand. We proved a solution for a smart energy metering system for future upcoming Internet of Things ( IoT) era WiFi enebled smart cities.

Download
20 A Novel Low Complexity Logic Encryption Technique for Secure Design
Deeksha Sharma, Shweta Agrawal

Abstract — Several applications demand secure devices to prevent loss of data or leak of information. The use of untrusted intellectual property (IP) and foundry may cause IP theft, IC overproduce, counterfeit and or insert malicious functionality called hardware Trojan.The logic encryption technique hides the functionality by inserting additional circuitry such that the design functions correctly with valid key and provides wrong output with invalid key. This work reviews existing insertion based techniques and then presents a new low overhead logic encryption technique. Designs are implemented on Tanner and simulated with 45nm technology file. Simulation results show that proposed techniques technique provides small area, power and delay over the existing logic encryption techniques.

Download
21 Review on Logic Encryption Technique for Secure Hardware Design
Deeksha Sharma, Shweta Agrawal

Abstract — Secure hardware is the prime requirement for the modern applications such as medical, finance and defense. The economic constraint and time criticality results in use of untrusted intellectual property (IP) and foundry which may cause IP theft, IC overproduce counterfeit and or insert malicious functionality called hardware Trojan. The logic encryption technique hides the functionality using additional circuitry such that the design functions correctly with valid key only. Several encryption techniques are proposed in the literature. This work reviews existing insertion based techniques and then presents comparative analysis. Designs are implemented on Tanner and simulated with 45nm technology file. Simulation results provide comparative analysis of different design metrics.

Download
22 Shape optimization of Primary Air Duct of Thermal Power Plant Using CFD
N.J. Mohamad afshar farhan, M. Masi, P. Meenakshi sundaram, V.J. Mathan, S. Maniamramasamy

Abstract — Generally simple shape ducts are used in thermal power plants to ease of manufacturing however modification has to be done in order to accommodate interfacing of equipments which are associated with plant operation leading to higher pressure drop, higher power consumption and flow misdistribution zones having higher or lower velocity. To readdress this situation, baffles, guide vanes and other internals components are used to smoothen the flow through ducts especially in bend. The basic disadvantage in using baffles get punctured/eroded due to impact of high velocity ash particles in flue gas ducting and the effectiveness of baffles is lost in short duration. So using guide vanes and deflector plates will be more efficient in coal handling. We have optimized primary air duct to overcome the above disadvantages, the bend of the duct is filleted and guide vanes are attached in the middle of the duct bends in such a way that a more streamlined flow is maintained across any cross-section.

Download
23 A Study on Production and Marketing Constrains of Farmers in Coimbatore District – Tamil Nadu
P. Kanaka Durga Devi

Abstract — India is basically an agrarian society where sole dependence has been on agriculture since time immemorial. In the olden days, the agricultural produce was fundamentally barter by nature where farmers exchanged goods for goods and also against services. Gradually the scenario changed with the changing times and agriculture produce began being sold with an element of commercial value. Trading of agriculture produce began for exchange of money. And from trading to marketing of agricultural produce began although mostly it is a way of traditional selling. The marketing as a term is broader than traditional trading. And agricultural marketing as a concept is still evolving in the Indian agrarian society. Mahatma Gandhi the father of the nation, who always stressed upon ―self sufficient villages‖ as the building blocks for making India a strong nation. Hence, the present study is a modest attempt to throw the more light on the farmers’ problems in marketing of their produce in the study area. The study also gives various recommendations to solve the above said problems. you can type your own text.

Download
24 Gaseous Emission in Electronic Fuel Injection system- A Review
Sathish M, Loganathan V N, Sugumar M

Abstract — This review paper includes introduction to Electronic fuel injection and working principles of it. Now a days all automobile manufacturer are very much concern in making less emission vehicles inorder to meet the emission norms. By using carburettor version, automobile manufacturer cant able to achieve the emission norms. Hence there is new technology implemented where carburettor version vehicle are replaced by Electronic Fuel injection vehicle. Where the fuel injection is totally controlled by Electronic Control Unit (ECU).

Download
25 Analysis of Karanja Alternate Fuel-A Review
M.Balakrishnan, M.Sugumar

Abstract — Now a days there has been an increasing demand for fuels which has been a challenge for today’s scientific workers. The availability of fossil fuel resources are reducing day by day and there has also been an increase in price level. Bio-Diesel seems to be a solution for future. It is an environmental viable fuel. The main purpose of a our project is to reduce the emission level of exhaust gas(i.eNOx, HC and CO) like a nitrogen oxide, hydro carbon, and carbon monoxide. There are many alternate fuels are available like soy bean, castor, jatropha, neem, undi and moha. In this project we choose karanja oil. The main reason for we choose of this oil is non-edible and non-toxic. The catalysts are KOH, NaOH.

Download
26 Tactile and Kinesthetic Stimulation for the Babies Born Too Soon: A Review
Umarani J, Sharadha Ramesh, Prakash Saldanha, Rohan Dilip Mendonsa, Kayalvizhi

Abstract — Premature infants face many challenges which are not faced by the full-term babies. As they are born prematurely they are not exposed to the same cuddling, holding, and feeding patterns as of the full-term, healthy newborns. They are often isolated in incubators and deprived of much of the mechano sensory stimulation they would otherwise receive. In the Neonatal Intensive Care Units the infants are exposed to continuous, noise and bright lights and also lacking the human touch they would otherwise experience in the hands of the mother. The advent technologies in the medical field save the lives of many infants born prematurely. Tactile stimulation is a form of massage which improves the well being of the neonates by activating the nerve signals under the skin. Studies showed that preterm neonates who were massaged cried less, slept better, gained weight and had lower levels of stress hormones and also the intervention improved the interaction between mother and infant compared to the infants who were not given massage. This article reveals the methods and the research studies evidenced the benefits of tactile and kinesthetic stimulation.

Download
27 Broken Rotor Bar Fault Detection of Induction Motors Based on Fast Fourier Transform
Siddharth Jain, Dr. A.K. Wadhwani

Abstract — Induction motors play a key role in the industrial field. Therefore, continuous monitoring and online diagnostic system are essential to guarantee the seamless operation of modern industrial facilities. Condition monitoring and fault detection of induction motors are of great importance in production lines. It can significantly reduce the cost of maintenance and the risk of unexpected failures by allowing the early detection of potentially catastrophic faults. This paper proposes a study of broken rotor bar current signal analysis of motor using Fast Fourier Transform (FFT) algorithm for fault detection. The experimentations are implemented in a 1.5-kw, 2- Hp, 3-phase, 415-Volt, 1420-rpm, 4-pole, star connected squirrel cage induction motor. The experimental results show the variation of the fault indication signal while the motor is operated under the broken rotor bar conditions. Motor Current Signature Analysis (MCSA) is a condition monitoring technique used to detection problems in induction motors. It is the technique used to analyse and monitor the trend of dynamic energized systems.

Download
28 Design and Performance Anaysis of Sequential Circuit Using Clocking Techniques
M.Lavanya angelin, M.Thiruveni

Abstract — The major issue of the VLSI design are area,cost,performance and reliability.But in the last few years power in the circuit is the major problem which is being faced by the very large scale integration industries.The power dissipation usually increased by the clocking system which includes the clock distribution system and sequential element(Flip-flop and Latches).The amount of power dissipation by clocking system in any chip is about 30% to 60% of the total chip power dissipation.So a new paradigm is introduced for clock distribution that uses current rather than voltage to distribute a global clock signal with reduced power consumption.So a new high performance current mode pulsed clock gate enable(CMPCGE)is designed using 45nm CMOS technology in tanner EDA tool.

Download
29 A Study on Organizational Climate with Special Reference to Patspin India Ltd, Ponneri, Udumalpet
C.Boopathi, P.John Leeson

Abstract — Organizational climate tends to be shared by all or most members of some social group; is something that older members usually try to pass on to younger members; shapes behavior and structures perceptions of the world. Climate are often studied and understood at a national level, such as the American or French climate. Climate includes deeply held values, beliefs and assumptions, symbols, heroes, and rituals. Climate can be examined at an organizational level as well. The main distinction between organizational and national climate is that people can choose to join a place of work, but are usually born into a national climate. The organizational context in which people work is characterized by numerous features (e.g., leadership, structure, rewards, communication) subsumed under the general concepts of organizational climate and culture

Download
30 Tongue Diagnosis by Image Segmentation
RinishaBagaria, SulochanaWadhwani

Abstract — Tongue image analysis is a key component in clinical medicine. Tongue diagnosis is unique and important area in diagnosing for most of the diseases. Tongue diagnosing is vast area which helps by processing the tongue images, but the processing of tongue image is not easy task to carry out. But difficulties strikes due to the irregular shape and size of the tongue, here interference of lip also occur with the tongue etc. In this paper, we proposed the K-means clustering image segmentation method for processing the tongue image. The method has some phases such as first, shape detection phase, second, colour extraction and third, texture extraction etc. For shape extraction we use region growing algorithm with an edge detector and it also helps in the pimple detection and cracks detection, for colour extraction we use colour intensity method and for texture extraction we use Local Gabor XOR Pattern it is well known as LGXP method, which is very efficient technique in finding texture from an image. The main aim of this segmentation of tongue image is to reduce the complexity as much as possible.

Download
31 Effect of Intermittent Curing on Compressive Strength of Concrete
Honey Gaur

Abstract — Curing is essential if concrete is to perform the intended function over the design life of the structure while excessive curing time may lead to the escalation of the construction cost of the project and unnecessary delays. The parameters of the study include the curing period [ 7, 14, 21 and 28 day], curing method [Atmosphere curing, Membrane curing, Fulltime curing, without curing, under water] and the type of cement [Portland pozzolo Cement(PPC) 43 grade,].In this study specimens i.e. cube were cast and cured under different conditions before testing. The study demonstrates that the method and duration of curing greatly affects the strength characteristics of concrete. Hence quality control for proper field curing is of the almost importance. Studies of the effects upon strength of the various curing periods of alternate dry and wet curing at different air temperatures were done.

Download
32 Design evaluation of industrial robot under mixed information: A multi objective optimization design evaluation approach
Vijesh Wani, Devendra Dewangan

Abstract — An industrial robot is a manipulator designed to move materials, parts and tools, and perform a variety of programmed tasks in manufacturing and production settings. Industrial robots are reshaping the manufacturing industry. They are often used to perform duties that are dangerous or unsuitable for human workers. Design evaluation of industrial robot for any industrial application is difficult tasks in real time manufacturing. Many robot design evaluation problems are considered in the context of Multi Criteria Decision Making (MCDM) in present era. In the presented research work, the authors have designed an Multi Objective Decision Making (MODM) appraisement module, which has been solved by multi objective optimization design evaluation approach.

Download
33 Developed a module towards evaluating design of industrial robot
Vijesh Wani, Devendra Dewangan

Abstract — Design evaluation of industrial robot for any industrial application is difficult tasks in real time manufacturing. Multi criteria Decision Making dealt with a set of techniques involving multiple evaluation criteria facilitating in managerial decision making. Many robot design evaluation problems are considered in the context of Multi Criteria Decision Making (MCDM) in present era. In the presented research work, the authors has designed an Multi Criteria Decision Making (MCDM) appraisement module, which undertook pertinent objective and subjective dimensions, corresponding to numerical data and fuzzy data against objective and subjective dimensions, respectively, is valid for design evaluation. Proposed module can be solved by multi objective optimization design evaluation approach, which must handle mixed information.

Download
34 Design of AXI Coherency Extensions (ACE) to APB Bridge: Review
Ashish jhariya, Deepika soni

Abstract — Microprocessor performance has improved rapidly these years. In contrast memory latencies and bandwidths have improved little. The result is that the memory access time is the bottleneck which limits the system performance. In case of larger system design which requires more number of I/O ports and more memory capacity the system designer may interface external I/O ports and memory with the system. We are using advanced microcontroller bus architecture with its advanced high performance bus. The Advanced Microcontroller Bus Architecture (AMBA) is a widely used interconnection standard for System on Chip (SoC) design. In order to support high-speed pipelined data transfers, AMBA supports a rich set of bus signals, making the analysis of AMBA-based embedded systems a challenging proposition. The goal of this is to synthesize and simulate complex interface bridge between Advanced eXtensible Interface (AXI) and Advanced Peripheral Bus (APB) known as AXI2APB Bridge. This also involves the Back notation for Synthesized of Bridge module and to perform Functional and Timing Simulation using Xilinx ISE. In this we are using ace to APB interfacing via a bridge and using parallel operations which we are divided the large program or modules into a smaller one. Here used parallel pipeline to fast operation. In the thesis we are proposing to design a very high performance ace to APB and vice versa bridge and to achieve our proposed work we have used pipelining for data transfer.

Download
35 An Efficient 32-bit Multiplier Design for High Speed Applications using Urdhav-Tiryagbhyam Algorithm
Avani Gurudeo, Dr. Vinod Kapse

Abstract — The use of Vedic mathematics lies in the fact that it reduces the typical calculation in the conventional mathematics to very simple once. This is because the Vedic formulae have been claimed to be building on the natural principles on which the human mind works. Vedic mathematics is a several effective algorithms, which has spread over to various branches of engineering such as computing. In computers, typical central processing unit devotes a considerable amount of processing time in implementing arithmetic operations, particularly multiplication operation. In this work, I have studied different multipliers, which give low power requirement and high speed, also give information of ‘urdhva-Tiryagbhyam’ algorithm of ancient Indian Vedic mathematics, which has utilized for multiplication to improve speed of multipliers. For Improving our generated result we used the concept of pipelining and design 4-bit, 8-bit, 16- bit & 32-bit pipeline Multiplier. The multiplier is implemented using Verilog HDL, targeted on Spartan-3E and Virtex-6 FPGA.

Download
36 Design and Verification of New Area Efficient RSA Algorithm: Review
Ritu, Shivam Solnki

Abstract — This paper, present a new structure to develop 64-bit RSA encryption engine on FPGA that can be used as a standard device in the secured communication system. The RSA algorithm has three parts i.e. key generation, encryption and decryption. The algorithm also requires random prime numbers so a primarily tester is also design to meet the needs of the algorithm. We use right-to-left-binary method for the exponent calculation. This reduces the number of cycles enhancing the performance of the system and reducing the area usage of the FPGA. These blocks are coded in Verilog and are synthesized and simulated in Xilinx 13.2 design suit.

Download
29 VHDL Implementation of UART with Detecting wrong bit position and Error Correction Capability
Sourabh Tiwari, Dr. Vinod Kapse

Abstract — UART is important in industrial environment which employs multiprocessor for working and in this process noise is likely to affect the data and due to which control in system is improper. Several existing UART resolve this problem by using error detecting logics which detect error, it detects error and retransmit the data which takes time which is more than two times. This paper presents a novel VLSI implementation of UART designed to include (11,4) extended hamming code that can correct up to one error and detect up to two errors. This improves the noise immunity of the system optimizing the error free reception of data. The whole design is implemented in Xilinx ISE 12.2 simulator targeted to Xilinx Spartan 6 FPGA[1].

Download
38 Triple Modular Redundant Fingerprint Recognition with high throughput: A survey
Swati Sharma, Prof. Anshuj jain

Abstract — Fingerprint recognition system design may be used for authentication of right person in real time situation however at RFID based authentication is a not reliable because it may be used by anyone. Fingerprint recognition has many of application in society form authentication; Internet banking, Identity to finding criminals. limitation of available work is to find correct person when latent prints (blur fingerprint) normally available procedure is has less recognition rate for latent figure prints also time for recognition is also very high hence it is also require to reduce time for recognition & improve throughput. Objective for this thesis is to develop an algorithm which may efficiently recognise latent figure print with high recognition rate & with high throughput. Latent fingerprint [1] have very less miniature points less information to find out correct fingerprint & that does not let us find correct fingerprint hence it is necessary to enhance Latent fingerprint [1] quality & to improve miniature points. To enhance fingerprint quality preprocessing is done in proposed work with cropping of fingerprint followed by morphological filter in cropping centre area of fingerprint & morphological filter uses erosion & dilation method enhance fingerprint quality & improve miniature points.

Download
39 Pushover Analysis of Setback Building
Honey Gaur

Abstract — Pushover analysis is a nonlinear static analysis used mainly for seismic effect on building. At the time of Earthquake or seismic vibration maximum framed and R/C building damaged and their response depends on the distribution of mass, stiffness, and strength. This effects is in one or both direction in horizontal and vertical. In multi-storey framed buildings, damage from earthquake ground motion generally initiates at locations of structural weaknesses portion like beam and column joint present in the lateral load. In this case generally irregular multi storey buildings are setback at one side. Reason behind this damage is different distribution of mass of the building. In some cases, these weaknesses may be created by discontinuities in stiffness, strength or mass between adjacent storeys. It also depends on the height of the building , this sudden variation cause many disastrous effect for the people and environment.There are many examples of failure of buildings in past earthquakes due to such vertical discontinuities (like BHUJ Earthquake 2000 in Gujrat ). A common type of vertical geometrical irregularity in building structures arises from reduction of the lateral dimension of the building at specific levels of the elevation. This building category is known as the setback building.

Download
40 Automatic Irrigation System
Kunduru Nirosha, V.Sai Niveditha, S.Vinay

Abstract — This system is designed to develop an “Automatic Irrigation System” which switches the pump motor ON/OFF on sensing the moisture content of the soil. In the field of agriculture, use of proper method of irrigation is important. The advantage of using this method is to reduce human intervention and still ensure proper irrigation.

Download
41 Intruder Detection Using Data Mining Techniques
A Srinivas, Rama Raju

Abstract — Anti-virus systems traditionally use signatures to detect malicious executables, but signatures are over fitted features that are of little use in machine learning. Other methods seek to utilize more general features, with some degree of success. Through this project, we presented a data mining approach that conducts an exhaustive feature search on a set of computer viruses. Data mining methods detect patterns in large amounts of data, and use these patterns to detect future instances in similar data. We can also use classifiers to detect malicious executables. A classifier is a rule set, or detection model, generated by the data mining approach that was trained over a given set of training data.

Download