IJAIR- Volume 6 Issue 9 (September 2017)

 


Sr/No/ Title Pdf
1 Power Quality Enhancement of Micro-grid Linked System by Using STATCOM.
D.Anil Kumar,Dr.T.Rama Subba Reddy,Dr.M.Rajendar Reddy

Abstract— A micro grid is a discrete power device which includes distributed energy resources able to run in tandem or independently from the precept grid. nowadays the preceding one is favored. The clever interconnection of allocated energy property determines the first rate of the power provided by means of using the energy delivered. it's miles acquired by using way of the best management techniques of micro-grids. This assignment offers with the adaptive manipulate approach for micro-grid which includes sun photovoltaic systems and wind energy structures. sun photovoltaic structures are grid interfaced through electricity digital converters and the wind power system through induction mills. The proposed controller is answerable for the efficient transfer the energetic energy and strength element improvement. The check gadget and the controller operation is demonstrated using MATLAB /Simulink.

Download
2 Removal Of Chromium (Vi) From Wastewater Using Cow Bone Charcoal.
Patrick E. Akpan, Emmanuel A. Edet, Bassey A. Etuk,Idongesit O. Ekpenyong

Abstract— The removal of chromium (VI), a heavy metal from aqueous system using cow bone charcoal was studied. The removal potential of the charcoal was investigated at 27°C using a particle size of 300µm. Batch experiments were conducted to examine the effects of the following parameters: adsorbent dosage (0.05-0.25g); contact time(1-25mins); pH (2-10). The results revealed that 0.1g of the adsorbent removed 88.7% of the adsorbate; that the equilibrium was achieved at 15 min of contact time and that 83% of the adsorbate was removed when the pH of the adsorbate was adjusted to pH = 6.

Download
3 Challenges to bring BS-VI engine to India.
P.Madhu

Abstract— Now a day emission is the biggest problem in world. It mostly coming from automobiles because the usage of bikes, cars, buses, lorries, trucks, vans, etc…these are increasing day by day due to need of humans to travel several places, and transporting the products from industries to several areas with help of vehicles. So the usage of automobiles is rapidly increased in each and every country in the world. By using of more vehicles the environment is completely changing the atmosphere condition, due to emission. Basically emission is caused due to unburned hydrocarbons and it comes from exhaust of automobiles, the government of India takes more steps to control the emission and finally they stop the production of BS-III engine norms and start the BS-IV engine norms in India at 2017. But the government of India is planning to introduce BS-VI engine norms in the year of 2020, and they skipping the BS-V engine norms due to various issues. Challenge to every automobile industry in India to manufacture the BS-VI engine with correct norms and to control the emission.

Download
4 Asymmetrical PWM Full-Bridge Converter for Renewable Energy Sources.
P.Kamalakar

Abstract— This paper provides a particularly green asymmetrical pulse-width modulated(APWM) full-bridge converter for renewable power resources. The proposed converteradopts full-bridge topology and uneven manage scheme to reap the 0-voltage switching(ZVS) turn-on of the strength switches of the primary facet and to lessen the circulatingcontemporary loss. Furthermore, the resonant circuit composed of the leakageinductance of the transformer and the blocking off capacitor gives the zerocontemporaryswitching (ZCS) flip-off for the output diode without the assist of anyauxiliary circuits. Accordingly, the opposite recuperation trouble of the output diode isremoved. Similarly, voltage stresses of the strength switches are clamped to the inputvoltage. Due to those traits, the proposed converter has the structure to decrease energylosses. Its miles in particular useful to the renewable strength conversion systems. To verifythe theoretical analysis and validity of the proposed converter, a 400W prototype is carriedout with the input voltage range from 40V to 80V.

Download
5 Wheat Acreage Area of Jalandhar District in Punjab and Health Monitoring of Crop Growing Stage.
ShubhamAich, Suraj Kumar Singh, Shruti Kanga and Sudhanshu.

Abstract— The real wheat delivering nations on the planet are India, China, USA, France, Russia, Canada and Australia. Worldwide interest for wheat is developing at 1 percent for every year. Yield development and profitability are controlled by countless, for example, hereditary capability of harvest cultivar, soil, climate and administration factors, which differ essentially crosswise over time and space. Early expectation of harvest yield is vital for arranging and taking different strategy choices. Numerous nations utilize the ordinary methods of information accumulation for edit observing and yield estimation in light of ground – based visits and reports. These techniques are subjective, expensive and tedious. Exact models have been created utilizing climate information which is additionally connected with various issues. With the starting of satellites, satellite information are being utilized for edit checking and yield expectation. Most investigations have uncovered a solid connection between remotely detected NDVI and harvest yield. An exertion has been made for near appraisal of these procedures the subtle elements of which are talked about in the paper. The present paper features on utilization of Remote Sensing (RS) and Geographical Information System (GIS) advancements for the wheat land estimation for Jalandhar district, Punjab, India. Wheat real estate estimation is a standout amongst the most essential parameter, if zone has a solid between yearly fluctuations while yield remains generally steady. Single date, cloud free LISS-III computerized information harmonizing with blossoming phase of wheat trim was utilized for land estimation. The regulatory limit of the examination region (Jalandhar District) is overlaid on the picture to remove all pixels having a place with think about locale. ERDAS IMAGINE 9.1 picture examination programming and Arc GIS 9.2 programming were utilized for information preparing and investigation. The refined preparing insights produced utilizing the multi-groups information are utilized for directed order utilizing most extreme probability.

Download
6 Structural Modelling and Impact Variation Study of a Car Bumper at Varying Speeds.
Rajesh V, Srikantha K, Sagar.

Abstract— The fuel efficiency and emission gas regulation of passenger cars are two important issues in nowadays. The best thing is to increase the fuel efficiency without sacrificing safety is to employ thermoplastic materials in to the cars. Bumper is the one of the part having more weight. The bumper is made of steel, Aluminium, rubber, or plastic that is mounted on the front and rear sides of a passenger car. The bumper is to absorb the shock to prevent or reduce damage to the car. In this report the steel bumper is replaced with various other thermoplastic bumpers to study their characteristics at different speeds. In this the most important variables like materials, structures and impact conditions are studied for the analysis of bumper beam, in order to improve the crashworthiness during collision. The simulation of a bumper modelling using Pro/Engineer, and impact analysis is done by COSMOSWORKS by varying the speeds.

Download
7 A Comparative Study on Using Different Types Of Membrane Combination To Treat Sewage Wastewater.
Sachin Tiwari, Gaurav Chandrakar.

Abstract— In global scenario it lies in the fact that fresh water availability is very less thus the only option left for the maintaining the sustainable development is the reuse and recycling of the used water with a proper treatment. This project toward the sustainable development contributes the recycling of sewage water by using Membrane filtration process. The Membrane filtration process refers the technology based on the combination of membranes in series for the treatment of wastewater and its reuse. By using the different combinations of membrane the efficiency of water treatment can be optimized both in terms of effluent efficiencies and in terms of cost. In the process of membrane filtration the solid particulates are rejected by the membrane. Thus different types of membranes based upon their pore sizes and characteristics were used in a combination and the most efficient membrane combination has been proposed in this project. The Membrane filtration is basically a suspended growth activated sludge process that utilizes micro porous membranes for solid/liquid separation rather than secondary clarifiers. It represents a decisive breakthrough regarding effluent quality by delivering a hygienically pure effluent and by exhibiting an awfully high operational responsibility. Water supply and treatment demands are foreseen to face tremendous challenges over the coming decades to meet the alarming demand of water in the country. Various treatment processes have been predicted and membrane separation process has been identified as one of the possible solutions to meet future demands. Application and implementation of membrane filtration technique is expected well in treatment of wastewater. Membrane filtration technology is probably the membrane process which has its wide applicability and has the best prospects for the future in wastewater treatment. Recent researches have indicated that this technology is becoming accepted and is rapidly becoming the best available technology for many wastewater treatment applications. Thus, in this project various membranes have been identified and output quality parameters of each of the membrane is computed by performing the tests over the five main parameter of the water and have been used in different combinations for the analysis of best output parameter with the optimized cost.

Download
8 Buffer Overflow Exploits and Alleviations.
Sonu Sureshchandra Gupta.

Abstract— Over a decade ago, buffer overflow has caused immense security vulnerability and still continues. Just using few tools hackers are able to exploit the software applications and merge their attack code in applications. In this paper, I will be discussing buffer overflow exploits and various mitigation techniques for windows and Linux platforms. Apart from that, I will be discussing how we can prevent buffer overflow vulnerabilities by using combinations of different mitigation techniques while preserving the functionality and performance of the system.

Download
9 Highly Area & Speed Optimized FPGA based OFDM module .
Pragya Dubey,Prof. Md. Arif.

Abstract— These paper represent a generalization of Space-Time Codes from orthogonal designs. Particularly, we show in this work, that not only the Alamouti-scheme which was useful only for OSTBC for two transmit antennas, but also its generalized version achieves capacity in the case of one receive antenna. The drafted codes are then analyzed with respect to the bit error rate performance and the spectral efficiency with optimal as well as suboptimal receiver structures. In the second part of this work the combination of Space-Time Codes with conventional channel coding techniques is considered. New OSTBC is presented and the performance of Space-Time Codes with iterative algorithms for soft-input-soft-outputdecoding is analyzed and optimized with the help of Xilinx Integrated Simulation Environment, the coding part is done in VHDL and the synthesis of work is been develop on Xilinx 12.2. the obtain results are been compared with base works and found better.

Download
10 DESIGN OF HIGH SPEED AND AREA EFFICIENT BCD MULTIPLIER WITH MODIFIED CONVERTORS .
Ruchira Dixit,Prof. Abhishek Singh.

Abstract— Now days we are living in digital world, where all the operations get performed more reliably and with highest accuracy by digital signal processor. MULTIPLIER is the key element of all these processor like Microprocessor, Microcontroller, DSP processor etc. In this paper we present a new method for implementing BCD multiplication more efficiently than previous proposals in current FPGA devices with 6-input LUTs. In particular, a combinational implementation maps quite well into the slice structure of the Xilinx Virtex-5/Virtex-6 families and it is highly pipeline-able. The synthesis results for a Virtex-6 device indicate that our proposal outperforms the area and latency figures of previous implementations in FPGAs.

Download
11 VARIABILITY AND CHARACTER ASSOCIATION IN CHILLI GERMPLASM .
T. Afrin1, M. S. Rahman, R. Ara, and S. N. Mojumder .

Abstract— The experiment was conducted at the Regional Spices Research Center, BARI, Gazipur, Bangladesh during the period from November 2015 to July 2016 to study the variability and character association of different chilligermplasm. Nineteen chilligermplasms were considered as treatment in anon replicated experiment. Data on different morphological, phenological and yield related characters were recordedand lots of variations were observed in respect of different characters. Fresh yield of green chilliand dry yield were ranged from 0.36 t/ha to 72.64 t/ha and 0.26 to 20.13 t/ha, respectively. The highest CV % (112.81) was observed in fresh yield of green chilli was followed by fruit weight of green chilli(107.94), dry yield (100.17), number of fruit per plant (98.20%). The germplasm showed strong correlation in noticeable characters and they grouped into four clusters. Distinct wide variation was found in cluster I, II, and IV

Download
12 A survey on learning and classification approach for the detection of masses and non-masses based on digital mammograms.
Rajinder kumar1,Sumit Chopra.

Abstract— Breast cancer is second most dangerous disease in the world after the lung cancer among women. Because of this reason, breast cancer detection is most focused area by many researchers. .Most of the cancercase symptoms are identified at the late stage, when the tumor becomes bigger in size and treatment becomes invasive case. The reduces help in less number of modalities for the treatment if Early detection of the cancer before the development of the symptoms may. The common Screening is the basic procedure for identification of breast cancer at an earliest stage. The mammography is an efficient screening method, in which abnormalities can be detected. It is difficult to identify the tumor in the breast tissue because tumors possess equal intensity in the breast tissue and appears poor in contrast. Then the computer aided detection helps for physicians and radiologist to find abnormality at an earliest in the absence of any symptoms. The proposed segmentation algorithm detects clearly defined region of mass using suitable segmentation technique. The efficiency of the algorithm is measured with many images of Mini-MIAS database. Mammography is a method used for the detection breast cancer. Many researchers worked in the breast cancer detection using their proposed segmentation methods used in it. So they have no solution given by researchers is best promising. It is a challenging problem to solve for researchers. This study describes the recent advances in image processing and machine learning techniques for breast cancer detection. The study shows that Local Binary Pattern method used for feature extraction and Support vector machine for classification as foremost technique used for breast cancer detection. The comparative study of literature work summarizes the effectiveness of different approach used by researchers for breast cancer detection.It is a challenging problem to solve for researchers.

Download
13 Data security and access control mechanism using Data security algorithms.
Lavleet Kaur, Atul Shrivastava.

Abstract— Data sharing platform find its unique concept of keeping the same copy and sync operation in between the files data. Cloud computing environment make it usable which work towards the data sharing with security. Access based control and providing security over the data is being performed by different research author. Algorithm such security improves the data complexity but still it out performed with single step encryption with single data key. A further study is performed here is survey of previous technique and our proposed multi-step approach to deal with large data storage and multi-phases security over it. Matrix defined steps to encrypt the data in multiple stage is defined here along with access based control over the cloud data. Our further investigation is going to perform research to apply technique over cloud environment and data sharing.

Download
14 Sentiment Analysis Text POS Tagging on Movie reviews using NLTK .
Akshaya R. Garje,K. V. Kale.

Abstract— User opinions or reviews are nothing but user generated content, and these are in huge number on the web that represents current form of user’s feedback. Sentiment analysis is nothing but classifying these reviews into either positive or negative. Part of Speech (POS) Tagging can be applied by various tools and in different programming languages. This paper highlights pre-processing of data corpus and a tagging method which models directly to tag sparsity with other properties of POS tag assignments. This work mainly focuses on the Natural Language Toolkit (NLTK) library in the Python environment. The application of generated results helps to make review with accurate classification.

Download