IJAIR- Volume 6 Issue 8 (August 2017)

 


Sr/No/ Title Pdf
1 Experimental Verification And Enhancement Of Performance By Analysis Of Flow Through Solar Flat Plate Collector.
Divya N C, Srinatha K M, Harish H V

Abstract—Solar flat plate collector is a very simple device and is an efficient way to absorb energy from sun rays and use it. Flat Plate Collector is widely used for domestic hot-water, space heating/drying and where the fluid temperature is less than 1000 C. Any increase in heat transfer enhancement is an added advantage which will save energy.First variables like temperature, mass flow rate has been noted through experimental results using CATIA model design has been done and imported to ICEM CFD where meshing has been done.Analysis has been done through CFX where pre boundary conditions provided and finally results of experiment has been validated through CFD. After proving CFD has an effective tool for analysis. It has been used for further enhancement of heat transfer.In this project passive method is adopted in order to intensify the heat transfer by providing dimples on the inner surface of the tube.

Download
2 Study Design and Simulation of 32-Bit RISC-V Architecture Based on MIPS using VHDL.
Prateek Yadav,Abhishek Singh

Abstract—This paper presents the design of a 32 bit RISC (Reduced Instruction Set Computer) CPU which uses 3 stage pipelining architecture based on MIPS (Microprocessor Interlock Pipeline Stages) using VHDL. It also describes the instruction set, architecture and timing diagram of the processor. Floating point number to fixed number conversion is the main task while working on this numbers, this conversion has been achieved by using Float to Fixed number converter module. Finally, design, synthesis and simulation of the proposed RISC Processor based on MIPS has been achieved using Xilinx ISE 13.1i Simulator and coding is written in VHDL language.

Download
3 Structural analysis for final design of International Thermonuclear Experimental Reactor sector sub - assembly tool.
K.Kaviyarasan

Abstract—The Sector Sub-assembly Tool is a special tool for assembly of ITER Tokamak and is used to sub-assemble the 40◦Tokamak sector which consists of vacuum vessel sector, vacuum vessel thermal shield sector and two toroidal field coils. The sector assembled in the assembly building is a basic and fundamental unit for the construction of the ITER Tokamak. The functions of the Sector Sub-assembly Tool are to support and handle heavy components which weigh up to 1200 t. The Sector Sub-assembly Tool is one of the most important tools to perform the assembly of ITER. To assess the design and structural integrity of the Sector Sub-assembly tool, the structural analyses have been performed under the load combinations according to load specifications. The results of the structural analyses show that the stresses of the Sector Sub-assembly Tool are below the allowable stress. This paper provides briefly the result of structural analysis for the Sector Sub-assembly Tool.

Download
4 Models of online learning.
Dr.Jigneshkumar A. Chauhan, Mr.Jigarkumar D.Patel

Abstract—We development for the enactment of quality and sustainable on line leaning course requires an understanding of the effect of information and communication technology on the higher education market and on current education and education performs in order to identify critical success factors that have to be addressed in an on line learning strategy. New online education models are continually emerging as new research findings in the area of on line learning become available. E-learning models are challenges to improve structures to address the concerns of the learner and the experiments presented by the equipment so that online learning can take place successfully. In the considered scheduling process these models provide useful tools for evaluating existing online learning wits or influential critical achievement factors. In this publication we also showing the some of the concept of online learning media.

Download
5 Improvement in Performance of a Wireless Sensor Network by Applying Hybrid Techniques.
Ashwani Kumar Patel ,Dr. Sarita Singh Bhadauria

Abstract—Wireless sensor networks are wireless networks that consists of sensors in large scale to collect and propagate the environmental data. The gathered data is processed and on collected information further action is executed. Wireless sensor network (WSN) helps in remotely monitoring different parameters of environment. One of major concern in wireless sensor network is to mitigate the energy consumption so as to +increase the lifetime of network. There are various parameters to measure the performance of WSN system and we have taken two parameters packet delivery ratio (PDR) and throughput for performance measurement of system. In this paper we place base station in optimum position and with clustering cluster heads are generated. AMO is used for path selection for data transmission.Newapproach increases the performance of the system and also reduces the routing overhead.

Download
6 On Triangular Sum Graphs of some Graphs.
Dr. J.Devaraj,S.P.Reshma,C.Sunitha.

Abstract—A triangular sum labelling of a graph G is a one – to – one function f: V → N (where N is the set of all non – negative integers) that induces a bijection on f+: E (G) →{T1, T2, ...,Tq} of the edges of G defined by f+(uv) = f(u) + f(v), uv ϵE(G).In this paper we proved the following graphs star graphs S+(n,m), Generalized Butane graph, n – Centipede union Pn, Fork graph are triangular sum graphs.

Download
7 Multi-recursive-input Complete Convolutional Systems for Neuronal Boundary Recognition.
M Raveendra, Dr.G Harinatha Reddy.

Abstract—In the field of connectomics, neuroscientists look to distinguish cortical availability extensively. Neuronal limit recognition from the Electron Microscopy (EM) pictures is regularly done to help the programmed recreation of neuronal circuit. However, the division of EM pictures is a testing issue, as it requires the finder to have the capacity to distinguish both fiber like thin and bloblike thick film, while smothering the vague intracellular structure. In this paper, we propose multi-arrange multirecursive input completely convolutional systems to address this issue. The numerous recursive contributions for one phase, i.e., the various side yields with various responsive field sizes gained from the lower organize, give multi-scale logical limit data for the sequential learning. This outline is organically conceivable, as it prefers a human visual framework to contrast diverse conceivable division arrangements with address the questionable limit issue. Our multi-arrange systems are prepared end-to-end. It accomplishes promising outcomes on an open accessible mouse piriform cortex dataset, which essentially outflanks different contenders.

Download
8 Review On Text Mining Techniques, Tools and Data Base.
R. Nandhini, Dr. R. Roseline.

Abstract—In this paper survey on text mining techniques such as Natural Language Processing (NLP) Based Techniques, Property function based Techniques, Rule based techniques, Semantic analysis based techniques, Neural Network based techniques, and Visualization techniques. Further text mining tools used for various applications are elaborated. The databases used for text mining are Bio Rat, EFIP, FACTA+, Hit Predict, Nagatome, Open DMAP, Poly search, PP Look, STRING, IMID, PPI Extractor, and Gene Ways also reviewed. Text mining techniques include categorization of Text, Summarization, Topic detection, Concept Extraction, Search, Non-Retrieval, Document Clustering, etc. [1]. Each of these techniques can be used in finding some non-trivial information from collection of documents.

Download
9 Flat Fading Channel – Modelling via HMM and HSMM.
Dr. S. Durairaj, G. Rema.

Abstract—Fading phenomena impact the performance of wireless communication systems. We proposed Modified Hidden Semi-Markov Model (MHSMM) for modeling the flat fading envelope process. The properties of the envelope process are dominated by the physical fading processes and speeds of the mobile terminal. Thus, the statistics of the fading process may be non-stationary, due to different fading conditions over some time durations. The MHSMM incorporate these time-variant statistics of the envelope process in a single model, which facilitates computations of the envelope probability density function and the auto correlation function. The study provides estimation schemes by simulation. It verifies the advantages of MHSMM and also the effectiveness of the associated parameter estimation schemes.

Download
10 Sybil Attack detection approach for detection and prevention of social image & textual data.
Salil Puri, Mukesh Kumar and Sitesh Kr. Sinha.

Abstract—Sybil attack and its spamming with the similar type of data populating among the available platforms. Data increasing in social media with an exponential growth in different format of storage such as image, textual and other format of sharing methods available. Various organization and people try to build an self propagating and create multiple identity to process their marketing content. In the view of reaching number of customers and showing the large number of followers to them. This comes to the Sybil identity which exhibit the large number of identity for same person with variants in uniqueness. Processing and finding the textual content similarity and identity is defined in past work which is effective by using NLP (Natural language processing) and other modularity given. Past approach help in learning textual data behavior, its purpose, its impact on the user by content matching, semantic matching or other neural based approach. In this research a proposed approach which is combination of identify textual similarity, image similarity using de-steganography, by using OCR approach over the text on image. Thus the technique embeds a hybrid searching of Sybil over textual and multimedia image data. A result analysis is performed with java API, which shows the efficiency of our proposed approach over existing scenario.

Download
11 A SURVEY ON DATA SCHEDULING AND ITS ANALYSIS ON BIG DATA.
Mukesh Rawat , Prof. Angad Singh.

Abstract—Now-a-days, large amount of data and its processing through a series of component via complex combination is derived. Data processing, its scheduling is a mechanism of processing large amount of data with appropriate component via scheduling it with given use. Data processing usage make virtual machine, data center and other component utilization for processing of real time or large input dataset. In this paper a survey of different scheduling mechanism, survey of different technique which take participate in multiple scheduling of data algorithms is performed. There are various past approach such as round robin, heuristic based approach, matrix based computation and other well defined peer structure architecture is defined. Paper also present an comparison of previous technique which help in exhibiting previous scheduling approach , their limitation and further work which can be done with their solution.

Download
12 A ADVANCE DATA SECURITY APPROACH OVER CLOUD COMPUTING & DATA AUDITING.
Amit Tiwari and Raj Kumar Paul.

Abstract—Cloud computing technique is recent trend of use which claims to the fastest computing for data and a secure storage. This algorithm also claims its low computation cost as it ask for pay as used model. Cloud computing environment give flexibility to user for the requirement fulfill for any computation on demand. According to cloud experts they say Cloud computing era is the recent trend in data storage and computing at other end in IT market where cloud provide a reliable and fast computing. Cloud are ease to access and various security encryption techniques been added to the cloud. The available architecture which contain 3 layer architecture which provide a best security model among the tradition storage technique. Security technique is recently used encryption technique where data store in encrypted form which can be unpack by the original user towards the data scheme. An efficient auditing and hashing technique such as CP-ABE been introduced by the several research article. In this paper, discuss about the various technique used in this era and the proposed dynamic auditing can be perform in cloud computing for ensuring the data integrity.

Download
13 Violence Against Women in Matrimonial Home: Existing Perspective in India
Dr. Shashi Nath Mandal

Abstract—'Matrimonial Home’ is not specifically defined in any matrimonial laws in India. However, with the introduction of Domestic Violence Act, a wife has a right to stay in her ‘matrimonial home' but no ownership right gets transferred to her. Again matrimonial violence mostly affect those women who belong to low socioeconomic status. But in the present so-called cultured society it is also increasing day by day. Interestingly, 'Wife' is not a defined term in matrimonial laws. According to section 125 of the Cr P C a wife includes a 'Divorced Wife' also. 'Maintenance' is defined in section 3 (b) of Hindu Adoption and Maintenance Act. This paper seeks to expose the complexities and challenges of the problem and also like to suggest the essential restructuring of official / administrative structure for bringing the desired changes in the lives of married women who are victims of matrimonial violence in their everyday life. The present work has been inspired by every day newspapers reporting which is full of news of some incidents where a married women has been tortured, even murdered by her husband or in-laws because her parents could not fulfill their need of dowry, or where a married women has been forced to commit suicide because of the act of cruelty and violence against her. The study is an attempt to unveil the important causative factors that relates to violence in matrimonial home and discussion about various types of violence which occur particularly in matrimonial homes. Purpose of this study is to delve into or examine the causes of various types of matrimonial violence.

Download