Sr/No/ |
Title |
Pdf |
1 |
Artificial Neural Network based PID Controller for Control of Dynamical Systems
PAVAN KUMAR KUSHWAH, PROF. ASHIS PATRA
Abstract—For control of various dynamical systems, an adaptive
artificial neural network (ANN) based proportional integral
derivative (PID) controller is developed. For linear time invariant
processes, conventional PID controller is suitable but they have
limitations when they are required to control the plants having
high non linearity or their parameters are changing with the
time. In order to find the parameters of PID controller,
information regarding the dynamics of the plant is essential. Ir
perturbation occurs in plant parameter(s) then PID controller
may work only if these changes are not severe. But most plants
are either non linear or their parameters changes with time and
this demands for a use of more robust type of controller and
ANN is a suitable candidate. To use the power of PID controller
and ANN, ANN based PID controller is proposed in this paper.
The benefit of this combination is that it utilizes the simplicity of
PID controller mathematical formula and uses the ANN powerful
capability to handle parameter variations and non linearity.
|
Download
|
2 |
YIELD and NUTRIENT UPTAKE of RAINFED PEARL MILLET (PENNICETUM GLAUCUM) as INFLUENCED by POST BIOMETHANATED SPENT WASH –A SUGARCANE DISTILLERY EFFLUENT
C.R.Palwe, A.L.Pharande
Abstract--Field trials were conducted on forty four farmer fields
of three Tehsils of Ahmednagar District Maharashtra, to study
the effect of post biomethanated spent wash application during
kharif with pearl millet as test crop. Application of liquid post
biomethanated effluent @ 75,000 liters per hectare prior to
sowing of crops increased the grain and straw yield of rain fed
pearl millet by 10 and 4 per cent respectively. The soil available
N,P,and k was increased by 52,2.83 and 3.77 per cent over
untreated plots respectively .The N, P and K uptake was
increased by application of post biomethanated spent wash.
|
Download
|
3 |
Power Quality Improvement of Wind farm
Connected with Grid Supply Using Intelligent Controlled UPQC
Sudhir Sharma, Shivani Mehta, Mukesh
Abstract— The emerging advancements in the modern electrical
system has increased the consumption of the electrical power to a
greater extent in the recent years than the few previous years.
This increase in the demand of electrical power has encouraged
the generation of electrical power by other non-conventional
means like solar, wind, hydro, etc. These non-conventional
sources of electrical power has enormous advantages over the
conventional sources of electrical power but the quality of power
coming from these non-conventional sources need to be
monitored because of the fact that the input supply to these non-
conventional power sources is never constant and varies
continuously. These variations in the input supply of the sources
along with the inverters and converters used in these electrical
sources leads to the distortions and harmonics in the power
system which deteriorates the power quality of the system. In this
paper the power quality issue of the system consisting of a wind
farm connected with the Grid network is studied and discussed.
An effort has been made to improve the power quality of the
system up to the desired level using an intelligent controlled
Unified Power Quality Conditioner (UPQC). The performance of
the intelligent controlled UPQC is compared with the
conventional method of controlling i.e. Proportional Integral (PI)
controlled UPQC and is found to have better results and
improved performance. The results are verified using
MATLAB/SIMULINK software.
|
Download
|
4 |
Socio-epidemiological Study of Visceral Leishmaniasis among Rural Community of East Champaran, Bihar
Navin Kumar, T.B. Singh, L. P. Meena
Abstract- Visceral Leishmaniasis (VL), also known as kala-azar.
From 2004–2008 there were an estimated 200,000–400,000cases
and 20,000–40,000 deaths per year globally. Bihar is the most
impoverished, most densely populated, and most VL-endemic
state in India, with 90% of the Indian VL cases reported there.
To find out the contribution of socio-epidemiological factors on
VL in the East Champaran, Bihar. A case-control study design
was used. In this study 139 visceral leishmaniasis cases and 139
healthy controls were taken. Visceral Leishmaniasis was strongly
associated with age group. 6-15 years of age group (odds ratio
[2.363], 95% CI 0.826-6.886) has higher risk of VL. Educational
status, Joint family, OBC caste, SC/ST caste, Semi-pucca houses,
kutcha houses had higher risk of VL in the East Champaran but
they were not significant. Unmarried group (odds ratio [OR]
1.788, 95% CI 1.081-2.962) and presence of domestic animals
[OR] 1.763, 95% CI 1.025-3.037) were statistically significant on
univariate analysis. In this case control study we identified
several factors associated with VL. Improper drainage system
and poor housing condition is a stronger factor; thus housing
plans lunched by the government may positive affect for
controlling of VL. In villages males were sleep outdoors and they
were higher risk of VL. Use of mosquito nets should be used to
prevent insect bite. Information, education and communication
for the awareness of the community regarding prevention of VL
should be carried out.
|
Download
|
5 |
ADVANCED ENCRYPTION STANDARD MODES OF OPERATION USING VITAL INFROMATION FOR DRIP RECOVERY WITH CLAIM
Mr. S.P.SANTHOSHKUMAR,Mr. M. PRAVEENKUMAR,Mr. T. GOWDHAMAN#3
Abstract - Side Channel Attacks (SCA) are attacks that are
based on Side Channel Information. Side channel information
is information that can be retrieved from the encryption
device that is neither the plaintext to be encrypted nor the
cipher text resulting from the encryption process. The real
threat of SCA lies in the ability to mount attacks over small
parts of the key and to collective information over different
encryptions. The threat of SCA can be dissatisfied by
changing the secret key at every run. Indeed, many
contributions in the domain of leakage resilient cryptography
tried to achieve this goal. In this paper, we propose a generic
framework of lightweight key updating that can protect the
current cryptographic standards and evaluate the minimum
requirements for heuristic SCA-security and timing
attack.Then, we propose a complete solution to protect the
implementation of any standard mode of Advanced
Encryption Standard (AES) using vital information for drip
recovery with claim.
|
Download
|
6 |
Design of an Improved Positive Output Super-Lift LUO Converter using
Drift Free Technique for Photovoltaic Applications
Integrated with
Single Phase Grid Connected Photo Voltaic System (GCPS)
Babul Kumar, S. Amirtharaj
Abstract: An audio watermark is a unique
electronic identifier embedded in an audio signal,
typically used to identify ownership of copyright.
This thesis considers desired properties and possible
applications of audio watermarking algorithms. This
thesis describes the different methods involves in
process of audio watermarking also it describe the
available methods developed by researchers for
audio watermarking. This thesis also describes the
problems associate with audio watermarking and
problems in available work. Proposed work is a new
method of audio watermark hiding inside another
bigger cover standard audio cover. The method
includes ‘harr’ wavelet based DWT decomposition
of frequencies hence the audio samples of
watermark gets hidden only those parts of cover
audio where human ears are less sensible according
to HAS. Proposed method also includes the SVD
decomposition which is required for making our
method robust against the various communication of
processing attacks like compression, filtering, fading
or noise addition. Proposed work is also using the
concept of angular modulation which initially
modifies the audio watermark in to provide extra
security and also extra robustness in communication.
The design is been develop on MATLAB 2013b
version and verification of design o the same.
|
Download
|
7 |
A STUDY ON MIST AND MALACHI ALGORITHM FOR ACCOUNT RECOVERY PROCESS IN CLOUD COMPUTING
R.ABINAYA, DR.T.RAMAPRABHA
ABSTRACT-Cloud computing is emerging as a new thing and many of the organizations are moving towards the cloud
but lacking due to security reasons. Security is one of the major issues which reduces the growth of cloud computing and
complications with data privacy and data protection continue to plague the market. The security algorithms introduced in
this paper, the MIST and Malachi are two new algorithms to protect user data through account security. In the MIST
algorithm, when a user logs in for the very first time, they are prompted with three questions and for each of those, they
can choose very specific multiple choice answers. After the user provides answers to all given questions, a cloud system is
using the MIST algorithm for password recovery.Malachi is a developing algorithm which takes an entirely different
approach to account security. Instead of using click-based interfaces like the MIST, Malachi relies entirely on typed user
input.
|
Download
|
8 |
PERFORMANCE ASSESSMENT OF MATERIAL PROVIDER’S ORGANIZATION UNDER GREY-MULTI-OBJECTIVE OPTIMIZATION ON THE BASIS OF SIMPLE RATIO ANALYSIS TECHNIQUE ACH
Nagesh Chandra Sahu, Nitin Shukla
ABSTRACT-Green-economic-lean’ measurement is the holistic chain which stresses on strengthens
the means of implementation and regeneration of the manufacturing system of each firm globally.
In last decade, each firm has begun to establish the production with rapid rate in compensating
the high demand of goods with rich-quality of service level. In order to respond these matters,
firm perceived the necessity to balance their production chain of organization.
In the presented research work, the authors proposed a DSS, consist of module ‘green-economic-lean’
and grey--to evaluate the performance of stuff providers. Proposed DSS can make decision under
incomplete information of committee of decision makers (DMs)l) against vague practices.
This is core novelty of this paper.
|
Download
|
9 |
APPRAISING VALUE OF MATERIAL PROVIDER’S ORGANIZATION UNDER GREY-REFERENCE POINT APPROACH
Nagesh Chandra Sahu, Nitin Shukla
ABSTRACT-Utilization of grey sets theory in multi practices decision making model to benchmark material provider’s
under integrated approach help for decision making. Environmental-economic-waste minimization measurement is the complex
chain for each manufacturing system of each firm. In the presented research work, the authors proposed a DSS,
consist of module ‘Environmentaleconomic-waste minimization practices’ and greyReference
Point Approach to evaluate the performance of stuff providers. Proposed DSS can make decision under incomplete
information of committee of professionals (P) against vague practices.
|
Download
|
10 |
DESIGN OF DWT-SVD BASED AUDIO WATERMARKING USING ANGLE QUANTIZATION.
Divya chadar
ABSTRACT-An audio watermark is a unique electronic identifier embedded in an audio signal,
typically used to identify ownership of copyright. This thesis considers desired properties and
possible applications of audio watermarking algorithms. This thesis describes the different methods
involves in process of audio watermarking also it describe the available methods
developed by researchers for audio watermarking. This thesis also describes the problems
associate with audio watermarking and problems in available work. Proposed work is a new method
of audio watermark hiding inside another bigger cover standard audio cover. The method includes
‘harr’ wavelet based DWT decomposition of frequencies hence the audio samples of watermark gets
hidden only those parts of cover audio where human ears are less sensible according to HAS.
Proposed method also includes the SVD decomposition which is required for making our method robust
against the various communication of processing attacks like compression, filtering, fading or noise addition.
Proposed work is also using the concept of angular modulation which initially modifies the audio watermark
in to provide extra security and also extra robustness in communication. The design is been develop on MATLAB 2013b
version and verification of design o the same.
|
Download
|
11 |
DESIGN AND VERIFICATION OF UNIQUE KEY BASED SUDOKU FOR STEGANOGRAPHY IN IMAGES .
Ragya Kori
ABSTRACT-This work intends to give an overview of image steganography, its uses & techniques.
Paper work is an implementation of Image Steganography of same plaintext, the implementation
of a system that design of unique Sudoku generation for Sudoku based data hiding and high security
is the main concern of this paper. The system is based on a hybrid algorithm that applies
the techniques of Sudoku and steganography to offer different security features to images
transmitted between entities in internet. Based on the proposed algorithm, the authenticity and
integrity of the transmitted images can be verified either in the spatial domain or in the encrypted
domain or in both domains. The work is implemented on MATLAB design and simulation tool.
Paper work uses modified Sudoku based data protection and SNR is very high in present paper work.
|
Download
|
12 |
A SURVEY ON: HASH TAG RECOMMENDATION SYSTEM BASED ON SEMANTIC TF-IDF
Priyanka Shrivastava, Shailendra Gupta ,Pankaj Richhariya
ABSTRACT-Semantic measure and algorithm among the
text generated in various social media platform plays a
major role while automated data generation. Twitter is a
social media platform where a large number of tweets and
data generate in every hour where as the similarity major
text concern is important factor. Various example such as
#friend, #frd puts a similar message but unable to identify
as similar text with similarity major system. In existing
research author discussed various related technique to
measure it such as Shortest path, Wu & Palmer, Lin,
JiangConrath, Resnik, Lesk, LeacockChodorow, and
HirstStOnge. In base paper algorithm TF-IDF based
approach is given which is described as best among
available approach in recommendation system. The
algorithm further does not find similarity in between hash
tags, while it exhibit similarity measure only in between
tweets. Thus enhancement of existing work is going to
generate an algorithm extension to exhibit similarity
measure in between Hash tags occurrence in tweets,
which make more reliable and accessible in micro
blogging system.
|
Download
|
13 |
A SURVEY: TOEKN CARRIED DATA MONITORING OVER BUSINESS FRAMEWORK.
Ansh Mishra, Shailendra Gupta ,Pankaj Richhariya
ABSTRACT-In this era, large amount of the information
in form of digital information is made available in digital
form. For many years, people have held the hypothesis
that using phrases for are a presentation of document and
topic should perform better than terms. In this synopsis
here investigate this fact with considering several states of
art data mining methods that give satisfactory results to
improve the effectiveness of the pattern. In the current
base, the paper author has taken technique which makes
use of signing data with token data technique which
further use for their operation monitoring over the
different level. They have worked with complete data
lifecycle associated with a token from its production to
consumption. The token carried data and their
monitoring framework makes use of its state detection
and operation. The approach token-log-based process
discovery algorithm is utilized in the system to monitoring
its activity. A further enhancement of technique stated as
in variable related detail mining over the data
|
Download
|
14 |
SURVEY: DATA INTEGRITY AND SECURE STORAGE OVER CLOUD
Akansha Shrivasava, Dr. Varsha Sharma
ABSTRACT-Data storage and its integrity monitoring is a high level task in cloud computing platform,
where multiple files with heavy size are stored and further there is chance to find
attack from different entities. In the scenario where the security check-up is not
possible manually, integrity verification technique works where the data can be break
into blocks and then further blocks can get security and further a integrity verification
can be perform using hashing algorithm. In this paper our objective is to survey such
techniques which claims as the best security and integrity checksum level technique to
provide data security assured. The paper further investigated the drawback of various existing technique in this field.
|
Download
|
15 |
Photosynthesis and Carbon Isotope Discrimination (∆13C) in Cassava (Manihot esculenta) Grown under Natural shade of Coconut Plantation
Krishnaprasad B.T, Savitha A, Bindumadhava,. and Krishnamurthy K.S
ABSTRACT--Cassava (Manihot esculenta) is an important food crop in developing country.
Due to non availability of land, famers are forced to grow the shade sensitive crops like
cassava under the canopy of plantation crops. In this study the effect of natural shade on
three genotypes of cassava with respect to their morphological and physiological changes were examined.
Three genotypes showed considerable changes in plant height, leaf number, stomatal number,
Net Assimilation Rate (NAR) and photosynthetic rates in response to shade.
Decrease in photosynthetic rate resulted in high internal CO2 concentration which
in turn lead to high carbon isotope discrimination (Δ13C) under shade.
Use of Δ13C as an indicator of photosynthetic efficiency under shade is discussed.
|
Download
|
16 |
Multiple Aggregator scheme for the Multimedia content extraction and utilization
Ashwini Narkhede, Hitesh Gupta
ABSTRACT--Content aggregation and multimedia data analysis takes a huge part today.
While working with multiple data format and data identity, its integrity there are few
components need to be extracted and monitored via different available medium.
Various feature and data extraction performed by different type of aggregator technically.
Current scenario make use of single aggregator and perform with number of content available for the extraction,
it cause lot of execution time and thus low performance with the required dimensions.
In this paper a work algorithm which is based on the multiple aggregators performed on single set
of data or multiple data is performed. The experiment conducted on the locally stored dataset as well as online
content available dataset. Which is executed by both the aggregator methods and further workbench is designed using Java API.
The execution result was monitored and it is observed as the proposed algorithm outperforms at best compare to existing protocol.
|
Download
|
17 |
Relation between Torsion and Normal Curvature of a geodesic on a developable
Ashu Vij
ABSTRACT--A developable surface is the surface generated by one-parameter family of planes.
As there are three planes namely the osculating plane, the normal plane and the rectifying
plane of a moving trihedral on any given space curve and equation of these planes contain
only one parameter usually the arc length 's' so envelopes of these planes are developable surfaces.
A geodesic on a developable surface (rectifying developable) is the line of shortest distance on the developable.
In this paper, a relation between torsion and curvature of a geodesic on a developable surface
is obtained mainly using Euler's Theorem and some other basic concepts of differential geometry.
|
Download
|
18 |
CLOUD LOAD BALANCING AND DATA SHARING APPROACH OVER MULTIPLE VIRTUAL MACHINE
Tripti Shrivastava, Raj Kumar Paul
ABSTRACT--Cloud Environment is work on internet based computing environment.
Variety of users, use this environment as per their requirements. Cloud computing and data
store provide the mechanism to understand and accessibility to third party storage system.
Enterprises utilize the environment of the cloud in various provided service model
such as SaaS, PaaS, and IaaS and cloud available usable models (private, Public, hybrid, and community).
Cloud data security and its usage over the different component, its accessibility, its sharing over the
components make use of data center, third party access and other provided components. There are often components
which make use of security concept, data workload sharing & balancing approach over the given paradigm.
There are data workload sharing & balancing approach is also given which make use of resources in proper manner.
Data workload sharing & balancing technique make use of existing resources in such a way that it takes
distribution accordingly. Current provided and working dissertation works on the comparison of the performance
of existing Round Robin and Throttle data workload sharing & balancing with proposed load sharing given algorithm.
To optimize and measure over the performance of any algorithm in virtual environment comparison parameters
which are like throughput, response computation time and waiting time are considered.
|
Download
|
19 |
A SURVEY : LOAD BALANCING AND DATA SHARING APPROACH OVER CLOUD ENVIRONMENT
Tripti Shrivastava, Raj Kumar Paul
ABSTRACT--Cloud computing and its various component take part in data
communication and propagation among the different resources.
Various approach for the load sharing, virtualization is introduced
to process data in smooth manner. Data cloud server
communication make important role in any communication. Thus
an study is required to perform resource utilization , proper load
balancing over the available components of cloud. Load balancing
approach make it usable and to distribute data properly among the
availability of resources. Previous techniques outperform different
algorithm such as Genetic approach which use population and
chromosome computation theory. Also algorithm Particle swarm
optimization is also been used in recent trends. In this paper a
contribution is to investigate the available load balancing approach
, cloud model and further a work which can be performed. Thus a
further research is going to enhance the load balancing approach to
solve current issues.
|
Download
|